ipfilter problems
Erik Nørgaard
norgaard at locolomo.org
Sat Apr 2 13:35:52 PST 2005
Angelin Lalev wrote:
> Two days ago I've switched the firewall on my FreeBSD 5.3 RELEASE
> router from ipfw to ipfilter. The firewalls are not my speciality
> and ipfilter looked simplier way to do NAT with firewall, because
> it separates NAT rules from filtering rules.
>
> The router has two interfaces rl0 (192.168.0.254/24) and rl1
> (82.137.64.106/29, 192.168.5.1/24, 10.1.6.2/24).
> The ipfilter is compiled in kernel:
> ======================
> options IPFILTER
> options IPFILTER_LOG
> options IPFILTER_DEFAULT_BLOCK
>
> /etc/ipnat.conf
> ============
> map rl1 192.168.0.1/27 -> 82.137.64.106/32
>
> /etc/ipf.rules
> ============
> pass in quick on lo0
> pass out quick on lo0
> pass out quick on rl0 all
> pass in quick on rl0 all
> pass in quick on rl1 proto tcp from 192.168.5.1/24 to 192.168.5.1 port =
> 80 flags S keep state
> pass in quick on rl1 proto tcp from 192.168.5.1/24 to 192.168.5.1 port =
> 3128 flags S keep state
> # local counter-strike server. No NAT.
> pass in quick on rl1 from 192.168.5.1/24 to 192.168.0.50 keep state
> block in quick on rl1 from 192.168.5.1/24 to any
> pass out quick on rl1 all keep state
>
> The problem
> ========
> On 192.168.0.0/24 network I have 6 machines. The router itself is an old
> 166 MHz Pentium box, but load averages are not bigger than 10%. When one
> of the machins makes dns lookup (the dns server is on outside -
> 62.73.78.2) it fails with timeout in about 9 of 10 times.
> ipfstat -t shows that a rule is created - something like this:
> Source IP Dest IP ST PR
> pkts. bytes 192.168.0.4,1029 62.73.78.2,53 0/0 udp
> 165 9992
> Any help will be appreciated.
Well, the short answer is: there is no keep state in the line
pass in quick on rl0 all
the dns reply you get back times out because your default rule is block
and there is nowhere in the "in" rules for rl1 that allows the reply back.
Some recomendations:
1) I have a bit of dificulty understanding your network setup - why do
you have two private networks on your external interface? May scetch in
a diagram.
2) Having default block can be done by adding the rules
block in all
block out all
in the op of the ruleset rather than compile in the kernel. It makes
it explicit. It also means that you can connect if no rules are
pressent - this is usefull for installing while the machine is behind
a gateway.
Anyway, with your pass in all rules, you have almost effectively
disabled the default block anyway.
2) For your security, in all pass rules, state "from" and "to" even if
it is "any" it makes it more explicit. Split on protocols for
security and control.
3) At least when setting up your firewall, use "log" in all block rules
and enable ipmon, then you can see where your packets are blocked.
4) Use groups to structure your rules, and group them accordingly
visually. It makes them easier to manage and for large rulesets
optimises the firewall.
5) Always keep state! Doing so, all "out" rules only apply to the
gateway itself, it makes the ruleset shorter and firewall faster.
6) You probably want to enable the ftp-proxy in your nat-rule and define
which port-ranges are used for nat'ed connections.
and a lot more you'll learn along the way :-)
Erik
--
Ph: +34.666334818 web: http://www.locolomo.org
S/MIME Certificate: http://www.locolomo.org/crt/2004071206.crt
Subject ID: A9:76:7A:ED:06:95:2B:8D:48:97:CE:F2:3F:42:C8:F2:22:DE:4C:B9
Fingerprint: 4A:E8:63:38:46:F6:9A:5D:B4:DC:29:41:3F:62:D3:0A:73:25:67:C2
More information about the freebsd-questions
mailing list