Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 13 Apr 1996 16:02:03 +0200 (MET DST)
From:      Andreas Klemm <andreas@knobel.GUN.de>
To:        Poul-Henning Kamp <phk@critter.tfs.com>
Cc:        Bill Fenner <fenner@parc.xerox.com>, current@freebsd.org
Subject:   Re: rc.firewall has some syntax errors and sample config hangs machine 
Message-ID:  <Pine.BSF.3.92.960413153705.672A-100000@knobel.gun.de>
In-Reply-To: <14052.829301116@critter.tfs.com>

next in thread | previous in thread | raw e-mail | index | archive | help
-----BEGIN PGP SIGNED MESSAGE-----

On Fri, 12 Apr 1996, Poul-Henning Kamp wrote:

> I have just committed the fix to ip_input.c, thanks for the help, and
> sorry for the delay.

Everything is working fine now. No panics anymore ! Thanks !

It would be fine, if the firewall configurations in /etc/rc.firewall
could be enhanced. For example one could add more examples, so
that people could pick up better, what they really need ...

I suggest adding the following which is a typical end user configuration.
Dialup to internet via Modem and PPP. Allow everything outgoing, deny
and log everythig incoming... Perhaps someone could check, if my ideas
of rules are ok... thanks...

Here in short my ipfw policy

FireWall chain entries: 256 0
01000 allow all from 127.0.0.1 to 127.0.0.1
01100 deny log tcp from any to any via tun0 setup
65000 allow all from any to any
65535 deny all from any to any

Here my suggested diffs

Index: rc.firewall
===================================================================
RCS file: /cvs/src/etc/rc.firewall,v
retrieving revision 1.2
diff -u -r1.2 rc.firewall
- --- rc.firewall	1996/04/12 09:16:42	1.2
+++ rc.firewall	1996/04/13 13:58:46
@@ -30,6 +30,11 @@
 #

 ############
+# flush all rules, so you can modify and restart rc.firewall if you like
+
+/sbin/ipfw flush
+
+############
 # If you just configured ipfw in the kernel as a tool to solve network
 # problems or you just want to disallow some particular kinds of traffic
 # they you will want to change the default policy to open.
@@ -41,11 +46,38 @@
 /sbin/ipfw add 1000 pass all from 127.0.0.1 to 127.0.0.1

 ############
- -# This is a prototype setup that will protect your system somewhat against
- -# people from outside your own network.
+# These are some prototype setups, where some will protect your system
+# somewhat against people from outside your own network.
 #
 # To enable simply change "false" to "true" in the if line and set the
 # variables to your network parameters
+
+if false ; then
+
+    # Configuration Suggestion for a typical FreeBSD "leafe-site"
+    # dials up to internet via Modem using PPP (ppp -auto ondemand)
+    # every outgoing traffic is allowed
+    # every incoming tcp traffic is denied and logged
+
+    # set these to your outside interface network and netmask and ip
+    oif="tun0"
+    onet="192.109.159.0"
+    omask="255.255.255.0"
+    oip="192.109.159.141"
+
+    # set these to your inside interface network and netmask and ip
+    iif="ed0"
+    inet="149.237.250.0"
+    imask="255.255.255.0"
+    iip="149.237.250.1"
+
+    # Reject&Log all setup of incoming connections from the outside
+    /sbin/ipfw add deny log tcp from any to any via ${oif} setup
+
+    # The rest is allowed
+    /sbin/ipfw add 65000 pass all from any to any
+
+fi

 if false ; then
     # set these to your network and netmask and ip



- --
andreas@knobel.gun.de         /\/\___      Wiechers & Partner Datentechnik GmbH
   Andreas Klemm          ___/\/\/         $$  Support Unix - aklemm@wup.de  $$
pgp p-key  http://www-swiss.ai.mit.edu/~bal/pks-toplev.html  >>> powered by <<<
ftp://sunsite.unc.edu/pub/Linux/system/Printing/aps-491.tgz  >>>    FreeBSD <<<

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBMW+z2/MLpmkD/U+FAQFH9gP9HRpKQAoeU0uX81kk3Win2dfbip/obYV7
EkFbAVzzKsOEnVI/2GsPZU/sFlGYC0TMxAabNEGGCoU1+JyN6yEDe1VYEfV1o/vR
rWupApxq8GrrXW/2GI6yD+JkFVUjaezmLHDWOGcWPAVHE7QLxLnE5dAd7zmKG46d
1eAVpZsELAE=
=Gfck
-----END PGP SIGNATURE-----




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.92.960413153705.672A-100000>