IPFW / NFSD

Mark Frasa mark at frasa.net
Wed Jan 25 04:58:57 PST 2006


fbsd_user schreef:
> 
> Post complete content of your rules file for review by people here
> on list.
> 
> 
> -----Original Message-----
> From: owner-freebsd-questions at freebsd.org
> [mailto:owner-freebsd-questions at freebsd.org]On Behalf Of Mark Frasa
> Sent: Wednesday, January 25, 2006 4:04 AM
> To: freebsd-questions at freebsd.org
> Subject: IPFW / NFSD
> 
> 
> Hello,
> 
> I am currently running 1 HTTP server on FreeBSD 6.0
> 
> Offcourse, like anyone that likes security, i am running IPFW and
> set
> the kernel to block by default.
> 
> Behind that HTTP server i am running 2 Linux boxes.
> 
> The problem is that when i enable the firewall and openup ports from
> rpcinfo -p:
> 
>     program vers proto   port  service
>      100000    4   tcp    111  rpcbind
>      100000    3   tcp    111  rpcbind
>      100000    2   tcp    111  rpcbind
>      100000    4   udp    111  rpcbind
>      100000    3   udp    111  rpcbind
>      100000    2   udp    111  rpcbind
>      100000    4 local    111  rpcbind
>      100000    3 local    111  rpcbind
>      100000    2 local    111  rpcbind
>      100005    1   udp    668  mountd
>      100005    3   udp    668  mountd
>      100005    1   tcp    984  mountd
>      100005    3   tcp    984  mountd
>      100003    2   udp   2049  nfs
>      100003    3   udp   2049  nfs
>      100003    2   tcp   2049  nfs
>      100003    3   tcp   2049  nfs
> 
> I opened up all these ports but i cant do an ls or write to nfs or
> whatever.
> Then i thought maybe it's trying something local so i added:
> 
> $cmd add 00225 allow ip from 1.2.3.4/24 to any keep-state
> 
> Even this does not work.
> 
> Tcpdump shows me that when i have ipfw open, it only communicates
> with
> port 2049 and i don't see anything more.
> 
> Can anybody help me out here?
> 
> Additional info:
> 
> { alltid at arcas } uname -a
> FreeBSD arcas 6.0-RELEASE-p1 FreeBSD 6.0-RELEASE-p1 #2: Wed Jan  4
> 15:45:38 UTC 2006     markfra at arcas:/usr/obj/usr/src/sys/ARCAS  i386
> 
> 
> Mark.
> _______________________________________________
> freebsd-questions at freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to
> "freebsd-questions-unsubscribe at freebsd.org"
> 
> _______________________________________________
> freebsd-questions at freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to "freebsd-questions-unsubscribe at freebsd.org"


Here is the list:

# Flush out the list before we begin.
ipfw -q -f flush

# Set rules command prefix
cmd="ipfw -q add"
pif="vr0"     # public interface name of NIC
               # facing the public Internet
secure="ip2.of.this.box"
arcas="ip.of.this.box"

$cmd 00010 allow all from any to any via lo0
$cmd 00015 check-state
$cmd 00100 allow ip from any to any out via $pif keep-state
$cmd 00200 allow tcp from any to $arcas 80 in via $pif
$cmd 00310 allow icmp from any to any in via $pif

# Allow in secure from selected ip's
$cmd 00410 allow tcp from x.x.x.x/32 to $secure 22 in via $pif keep-state
$cmd 00411 allow tcp from x.x.x.x/32 to $secure 22 in via $pif keep-state

# Allow in nfs requests on secured ip from own network only
$cmd 00425 allow ip from x.x.x.x/24 to $secure setup keep-state

# deny and log all packets that fell through to see what they are
$cmd 00999 deny log all from any to any

Mark.


More information about the freebsd-questions mailing list