Re: ipfw confusion

2013-08-22 Thread Gary Aitken
On 08/20/13 12:41, Dan Lists wrote: > You might turn on logging and post the logs of what is being blocked. > Sometimes things are being blocked by rules you do not expect. Thanks for the suggestion. I was seeing refusals from named and mistakenly interpreting them as ipfw issues. > On

Re: ipfw confusion

2013-08-20 Thread Dan Lists
a zone transfer request from > a secondary which is a tcp request. Others are probably udp. > > > On Sun, Aug 18, 2013 at 11:06 PM, Gary Aitken >wrote: > > > >> I'm having some weird ipfw behavior, or it seems weird to me, and am > >> looking >

Re: ipfw confusion

2013-08-19 Thread Gary Aitken
ate One of the requests which is being refused is a zone transfer request from a secondary which is a tcp request. Others are probably udp. > On Sun, Aug 18, 2013 at 11:06 PM, Gary Aitken wrote: > >> I'm having some weird ipfw behavior, or it seems weird to me, and am >> looking

Re: ipfw confusion

2013-08-19 Thread Gary Aitken
On 08/19/13 11:53, OpenSlate ChalkDust wrote: > On Sun, Aug 18, 2013 at 8:06 PM, Gary Aitken wrote: > >> I'm having some weird ipfw behavior, or it seems weird to me, and am >> looking >> for an explaination and then a way out. >> >> ipfw list >>

Re: ipfw confusion

2013-08-19 Thread Dan Lists
On Mon, Aug 19, 2013 at 1:06 AM, Gary Aitken wrote: > > ipfw list > ... > 21109 allow tcp from any to 12.32.44.142 dst-port 53 in via tun0 setup > keep-state > 21129 allow tcp from any to 12.32.36.65 dst-port 53 in via tun0 setup > keep-state > ... > 65534 deny log log

Re: ipfw confusion

2013-08-19 Thread OpenSlate ChalkDust
On Sun, Aug 18, 2013 at 8:06 PM, Gary Aitken wrote: > I'm having some weird ipfw behavior, or it seems weird to me, and am > looking > for an explaination and then a way out. > > ipfw list > ... > 21109 allow tcp from any to 12.32.44.142 dst-port 53 in via tun0 setup

Re: ipfw gateway rerouting

2013-08-19 Thread Michael Sierchio
# my kernel has # options ROUTETABLES=16 GATEWAY_0="10.3.255.0" GATEWAY_1="10.3.255.1" setfib 0 route add default $GATEWAY_0 setfib 1 route add default $GATEWAY_1 ipfw table 1 add $NET_0 0 ipfw table 1 add $NET_1 0 ipfw table 1 add $NET_2 1 ipfw table 1 add $NET

Re: ipfw confusion

2013-08-18 Thread Jason Cox
want to add rules to allow UDP as well. On Sun, Aug 18, 2013 at 11:06 PM, Gary Aitken wrote: > I'm having some weird ipfw behavior, or it seems weird to me, and am > looking > for an explaination and then a way out. > > ipfw list > ... > 21109 allow tcp from any to 12.32

ipfw confusion

2013-08-18 Thread Gary Aitken
I'm having some weird ipfw behavior, or it seems weird to me, and am looking for an explaination and then a way out. ipfw list ... 21109 allow tcp from any to 12.32.44.142 dst-port 53 in via tun0 setup keep-state 21129 allow tcp from any to 12.32.36.65 dst-port 53 in via tun0 setup keep-

ipfw gateway rerouting

2013-08-18 Thread Jos Chrispijn
Can someone please hint me to to good explanatory site that explains how to reroute a network server to different/non standard network gateway(s) with ipfw? thanks, Jos Chrispijn ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org

NAT loopback using natd and ipfw

2013-08-17 Thread Frank Leonhardt
Does anyone know how to get NAT loopback (aka NAT hairpin or NAT reflection) working with natd and ipfw? It seems to work with the in-kernel NAT without the need for configuration, but not if you're using natd. I have a feeling it may be something do do with the ipfw "diverted-loop

Re: Static Jail ID's (JID's) for use with IPFW?

2013-08-07 Thread Karl Pielorz
--On 07 August 2013 12:23 +0100 Arthur Chance wrote: I don't think the old /etc/rc.conf way of handling jails lets you do it, but the latest version of jail(8) introduced /etc/jail.conf and you should be able to add "jid = ;" parameters in there. Thanks - I'll check that out... I've no id

Re: Static Jail ID's (JID's) for use with IPFW?

2013-08-07 Thread Fbsd8
Karl Pielorz wrote: Hi, I have a number of jailed systems running - and I've been setting up ipfw rules for them. This is on FBSD 9.1. 'ipfw' lets you match on traffic to/from a Jail ID (JID) - however every time jails get started / stopped their JID changes [thus breakin

Re: Static Jail ID's (JID's) for use with IPFW?

2013-08-07 Thread Arthur Chance
On 07/08/2013 09:28, Karl Pielorz wrote: I have a number of jailed systems running - and I've been setting up ipfw rules for them. This is on FBSD 9.1. 'ipfw' lets you match on traffic to/from a Jail ID (JID) - however every time jails get started / stopped their JID changes [th

Static Jail ID's (JID's) for use with IPFW?

2013-08-07 Thread Karl Pielorz
Hi, I have a number of jailed systems running - and I've been setting up ipfw rules for them. This is on FBSD 9.1. 'ipfw' lets you match on traffic to/from a Jail ID (JID) - however every time jails get started / stopped their JID changes [thus breaking the firewall rules]

Using snort in inline mode with IPFW

2013-06-27 Thread Jack Mc Lauren
Hi all Have you guys ever tried this combination? Using snort in inline mode and IPFW as daq.  I have added the following lines to the default /usr/local/etc/snort/snort.conf file : config daq: ipfw config daq_mode: inline config policy_mode: inline And I use the following script to run snort

Re: Which is the public interface to use for ipfw when lagg(4)? [SOLVED]

2013-06-25 Thread Unga
Hi Mark Thanks for the reply. It worked. It was lagg1.Unga - Original Message - > From: Mark Felder > To: freebsd-questions@freebsd.org > Cc: > Sent: Tuesday, June 25, 2013 2:29 PM > Subject: Re: Which is the public interface to use for ipfw when lagg(4)? > > On

Re: Which is the public interface to use for ipfw when lagg(4)?

2013-06-25 Thread Mark Felder
On Tue, Jun 25, 2013, at 7:13, Unga wrote: > > What is the interface should I use for the pif? Is it lagg1? > The interface you should use is the interface the IPs are on. It doesn't matter what kind of interface it is. In this case it looks like lagg1. __

Which is the public interface to use for ipfw when lagg(4)?

2013-06-25 Thread Unga
ot;up" ifconfig_em3="up" ifconfig_lagg1="laggproto lacp laggport em1 laggport em3" ipv4_addrs_lagg1="publicIP1/29 publicIP2/32" The server is publicly accessed using publicIP1 and publicIP2. In the ipfw rules: cmd="ipfw -q add" pif="???" # All

Re: loading ipfw at boot time

2013-04-28 Thread Joe
Polytropon wrote: On Sat, 27 Apr 2013 21:23:58 -0400, Joe wrote: I know ipfw can be loaded at boot time by adding statements to /boot/loader.conf. Problem is I dont know what the ipfw module names are. How do I find the ipfw names to use? There are two ways. The first is to do a &qu

Re: loading ipfw at boot time

2013-04-28 Thread Polytropon
On Sat, 27 Apr 2013 21:23:58 -0400, Joe wrote: > I know ipfw can be loaded at boot time by adding statements to > /boot/loader.conf. > > Problem is I dont know what the ipfw module names are. > > How do I find the ipfw names to use? There are two ways. The first is to do

Re: loading ipfw at boot time

2013-04-28 Thread Joe
Andreas Mueller wrote: Hello there. I know ipfw can be loaded at boot time by adding statements to /boot/loader.conf. Problem is I dont know what the ipfw module names are. How do I find the ipfw names to use? Not using ipfw by myself, but according to the handbook, the modules are loaded

Re: loading ipfw at boot time

2013-04-27 Thread Andreas Mueller
Hello there. > I know ipfw can be loaded at boot time by adding statements to > /boot/loader.conf. > > Problem is I dont know what the ipfw module names are. > > How do I find the ipfw names to use? Not using ipfw by myself, but according to the handbook, the modules are lo

loading ipfw at boot time

2013-04-27 Thread Joe
I know ipfw can be loaded at boot time by adding statements to /boot/loader.conf. Problem is I dont know what the ipfw module names are. How do I find the ipfw names to use? ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org

ipfw+natd port forward does not work as intended

2013-04-03 Thread Unga
asing to 192.168.1.62, mtu 1500 bytes Out {default}[TCP]  [TCP] 192.168.1.62:45642 -> 192.168.1.1:1234 aliased to    [TCP] 192.168.1.62:45642 -> 192.168.1.1:1234 This is FreeBSD 8.1-RELEASE and the kernel is built with following options: options IPFIREWALL  #

RE: Problems with IPFW causing failed DNS and FTP sessions

2013-04-01 Thread Don O'Neil
pid-file"/var/run/named/pid"; dump-file "/var/dump/named_dump.db"; statistics-file "/var/stats/named.stats"; }; zone "." { type hint; file "named.root"; }; I'm not sure the problem is specific to name

Re: Problems with IPFW causing failed DNS and FTP sessions

2013-04-01 Thread Michael Sierchio
Okay, what's your DNS setup? Are you running a recursive cache that contacts the root servers directly? Using your ISP's servers? Etc. As a mitigation step, I tried pointing my caches to 8.8.8.8 and 8.8.4.4. - but it turns out that Google is intentionally blocking (returning NX responses to) ma

RE: Problems with IPFW causing failed DNS and FTP sessions

2013-04-01 Thread Don O'Neil
- From: owner-freebsd-questi...@freebsd.org [mailto:owner-freebsd-questi...@freebsd.org] On Behalf Of Michael Sierchio Sent: Sunday, March 31, 2013 10:04 PM To: Don O'Neil Cc: freebsd-questions@freebsd.org Subject: Re: Problems with IPFW causing failed DNS and FTP sessions net.inet.ip.fw.dyn

Re: Problems with IPFW causing failed DNS and FTP sessions

2013-03-31 Thread Michael Sierchio
net.inet.ip.fw.dyn_short_lifetime ? net.inet.ip.fw.dyn_udp_lifetime ? You might want to increase these, given the current state of things... ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To uns

Re: Problems with IPFW causing failed DNS and FTP sessions

2013-03-31 Thread Michael Sierchio
On Sun, Mar 31, 2013 at 9:39 PM, Michael Powell wrote: > I'm probably not smart enough to be able to help directly with your problem > but I'd like to add that there is a snowballing DNS Amplification ddos > attack against SpamHaus going on which is spilling over Yes, this is very much true. Th

Re: Problems with IPFW causing failed DNS and FTP sessions

2013-03-31 Thread Michael Sierchio
at 9:33 PM, Don O'Neil wrote: > Thanks for the response... here's my full rullset: > > # ipfw list > 00100 check-state > 00101 allow tcp from any to any established > 00102 allow ip from any to any out keep-state > 00103 allow icmp from any to any > 00201 allow i

Re: Problems with IPFW causing failed DNS and FTP sessions

2013-03-31 Thread Michael Powell
Don O'Neil wrote: > Hi everyone. recently my server started having issues with DNS and FTP > sessions either not resolving or timing out. I've tracked the issue down > to IPFW. if I issue a 'sysctl net.inet.ip.fw.enable=0' then my issues go > away. > [snip]

RE: Problems with IPFW causing failed DNS and FTP sessions

2013-03-31 Thread Don O'Neil
Thanks for the response... here's my full rullset: # ipfw list 00100 check-state 00101 allow tcp from any to any established 00102 allow ip from any to any out keep-state 00103 allow icmp from any to any 00201 allow ip from any to any via lo0 00202 allow ip from any to 127.0.0.0/8 00203 all

Re: Problems with IPFW causing failed DNS and FTP sessions

2013-03-31 Thread Michael Sierchio
27;Neil wrote: > Hi everyone. recently my server started having issues with DNS and FTP > sessions either not resolving or timing out. I've tracked the issue down to > IPFW. if I issue a 'sysctl net.inet.ip.fw.enable=0' then my issues go away. > > > > I have the bas

Problems with IPFW causing failed DNS and FTP sessions

2013-03-31 Thread Don O'Neil
Hi everyone. recently my server started having issues with DNS and FTP sessions either not resolving or timing out. I've tracked the issue down to IPFW. if I issue a 'sysctl net.inet.ip.fw.enable=0' then my issues go away. I have the basic rules like this for dns; 01160 all

Problems with IPFW causing failed DNS and FTP sessions

2013-03-31 Thread Don O'Neil
Hi everyone. recently my server started having issues with DNS and FTP sessions either not resolving or timing out. I've tracked the issue down to IPFW. if I issue a 'sysctl net.inet.ip.fw.enable=0' then my issues go away. I have the basic rules like this for dns; 01160 all

Revisiting Traceroute Through ipfw FreeBSD9.x

2013-03-07 Thread Martin McCormick
I immediately found several plausible examples of what to put in the firewall rules file and the following rules were set just after the local loopback address: ip="139.78.2.13" setup_loopback # Allow traceroute to function, but not to get in. ${fwcmd} add unreach port ud

Re: IPFW stopped logging

2013-01-07 Thread Michael Sierchio
On Mon, Jan 7, 2013 at 12:33 PM, Jerry wrote: > > I have discovered that IPFW stopped logging any messages in the > security log over a week ago. I did a reset, etcetera, but without > favorable results. I even tried a cold reboot to see if that made any > difference; however, i

IPFW stopped logging

2013-01-07 Thread Jerry
I have discovered that IPFW stopped logging any messages in the security log over a week ago. I did a reset, etcetera, but without favorable results. I even tried a cold reboot to see if that made any difference; however, it didn't. Other than that, it appears to be working fine. I am lookin

Re: Re[2]: How to allow httpd to run 'ipfw table 7 add ... '

2012-11-30 Thread Steve O'Hara-Smith
On Thu, 29 Nov 2012 23:03:08 +0200 Eugen Konkov wrote: > Здравствуйте, Steve. > SOHS> The only problem with this is it will allow apache to > SOHS> do anything with ipfw including flush all of the rules. I would > SOHS> suggest having apache dumping the paramet

Re: How to allow httpd to run 'ipfw table 7 add ... '

2012-11-29 Thread Devin Teske
On Nov 29, 2012, at 11:38 AM, Steve O'Hara-Smith wrote: > On Wed, 28 Nov 2012 20:09:03 -0800 > Devin Teske wrote: > >> >> On Nov 28, 2012, at 7:48 PM, Eugen Konkov wrote: >> >>> Hi. >>> >>> How to allow httpd to run this command &#

Re[2]: How to allow httpd to run 'ipfw table 7 add ... '

2012-11-29 Thread Eugen Konkov
Здравствуйте, Steve. Вы писали 29 ноября 2012 г., 21:38:35: SOHS> On Wed, 28 Nov 2012 20:09:03 -0800 SOHS> Devin Teske wrote: >> >> On Nov 28, 2012, at 7:48 PM, Eugen Konkov wrote: >> >> > Hi. >> > >> > How to allow httpd to run this com

Re: How to allow httpd to run 'ipfw table 7 add ... '

2012-11-29 Thread Steve O'Hara-Smith
On Wed, 28 Nov 2012 20:09:03 -0800 Devin Teske wrote: > > On Nov 28, 2012, at 7:48 PM, Eugen Konkov wrote: > > > Hi. > > > > How to allow httpd to run this command 'ipfw table 7 add ... '? > > > > imho the most secure way is to add an entry t

Re: How to allow httpd to run 'ipfw table 7 add ... '

2012-11-28 Thread Devin Teske
On Nov 28, 2012, at 7:48 PM, Eugen Konkov wrote: > Hi. > > How to allow httpd to run this command 'ipfw table 7 add ... '? > imho the most secure way is to add an entry to sudoers(5) (you can use visudo(8) to edit sudoers(5)) allowing the apache privilege-separation use

How to allow httpd to run 'ipfw table 7 add ... '

2012-11-28 Thread Eugen Konkov
Hi. How to allow httpd to run this command 'ipfw table 7 add ... '? -- Eugen mailto:kes-...@yandex.ru ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To u

marking packets in IPFW and recognize them in PF

2012-11-06 Thread s m
hello every body i want to mark some of my packets (by tag, mark, divert or anything else) in IPFW and recognize these packets in PF in the same system. please let me know if it is possible and how i can do that. i have freebsd 8.2. if it is impossible in freebsd 8.2, what about freebsd 9? can

Re: ipfw headers

2012-10-23 Thread Polytropon
ll path of studio.h in ipfw file and then compile it, another error > happened. do you know how i could fix it? thanks The normal inclusion #include should be sufficient. However, if you make your change to ipfw in the /usr/src tree, calling "make" might default to a differe

Re: ipfw headers

2012-10-23 Thread Mike Bristow
On Tue, Oct 23, 2012 at 05:35:45PM +0330, s m wrote: > thanks for your quick reply. you know, i want to add studio.h header but > the below error occurs: "no such file or directory". You appear to have misstyepd "stdio.h" (no u!). If that's not the case, please put the source you are trying to c

Re: ipfw headers

2012-10-23 Thread s m
thanks for your quick reply. you know, i want to add studio.h header but the below error occurs: "no such file or directory". i am sure that studio.h locates in usr/src/include but that error occured. if i write the full path of studio.h in ipfw file and then compile it, another error ha

Re: ipfw headers

2012-10-23 Thread Polytropon
On Tue, 23 Oct 2012 17:18:43 +0330, s m wrote: > hi every one > > i want to set TOS bit in ipfw but don't know how to do it directly. > therefore i want to change ipfw code in order to do it for me. i don't know > ipfw headers path (from where ipfw loads its head

ipfw headers

2012-10-23 Thread s m
hi every one i want to set TOS bit in ipfw but don't know how to do it directly. therefore i want to change ipfw code in order to do it for me. i don't know ipfw headers path (from where ipfw loads its headers). please help if somebody set TOS bit in any ways or know the path which ip

Re[2]: ipfw counters for tables

2012-07-23 Thread Ian Smith
On Mon, 23 Jul 2012 13:13:47 +0300, Eugen Konkov wrote: > , Ian. > ?? ?? 23 2012 ?., 8:27:50: > IS> In freebsd-questions Digest, Vol 424, Issue 10, Message: 10 > IS> On Sun, 22 Jul 2012 14:55:46 +0300 Eugen Konkov > wrote: > IS> Hi Eugen,

Re[2]: ipfw counters for tables

2012-07-23 Thread Eugen Konkov
Здравствуйте, Ian. Вы писали 23 июля 2012 г., 8:27:50: IS> In freebsd-questions Digest, Vol 424, Issue 10, Message: 10 IS> On Sun, 22 Jul 2012 14:55:46 +0300 Eugen Konkov wrote: IS> Hi Eugen, >> I use ipfw tables to allow host to access to internet. >> is there counte

Re: ipfw counters for tables

2012-07-22 Thread Ian Smith
In freebsd-questions Digest, Vol 424, Issue 10, Message: 10 On Sun, 22 Jul 2012 14:55:46 +0300 Eugen Konkov wrote: Hi Eugen, > I use ipfw tables to allow host to access to internet. > is there counter for matched packets/bytes for table entry like for > ipfw rule? > >

ipfw counters for tables

2012-07-22 Thread Eugen Konkov
Hi I use ipfw tables to allow host to access to internet. is there counter for matched packets/bytes for table entry like for ipfw rule? #ipfw show 901 rule packetsbytes 00901 302271108 27717115967 allow ip from 10.10.1.3 to any #ipfw table 7 list ---table(7)--- 10.7.60.41/32 100

Re: ipfw subnetting

2012-06-15 Thread Wojciech Puchar
can anyone suggest what i'm doing wrong here. Desired:drop everything from 180.0.0.0 to 180.255.255.255 ipfw -q add 137 deny all from 180.0.0.0/8 to any nothing wrong. all is fine. ___ freebsd-questions@freebsd.org mailing list

implementing ipv6 into my ipfw ruleset...

2012-06-05 Thread Jason Usher
I have a fairly simple ipfw ruleset, which looks like: 100 allow tcp from any to any established 110 allow icmp from any to any icmptypes 0,3,8,11 120 deny icmp from any to any 130 allow ip from any to any via lo0 200 allow udp from me to any 53 210 allow udp from any 53 to me 220 allow udp

Re: ipfw subnetting

2012-05-21 Thread Michael Sierchio
On Mon, May 21, 2012 at 10:19 AM, Paul Macdonald wrote: > this is now resolved, i hadn't realised (embarrassingly) that ipfw list will > show rules if if the fw is disabled. You should consider using tables, which allow you to add ad hoc nets, etc. and you can swap rulesets atomic

Re: ipfw subnetting

2012-05-21 Thread Paul Macdonald
On 21/05/2012 17:01, Paul Macdonald wrote: On 21/05/2012 16:44, Michael Sierchio wrote: On Mon, May 21, 2012 at 8:30 AM, Paul Macdonald wrote: A very open firewall test script is as follows: this is now resolved, i hadn't realised (embarrassingly) that ipfw list will show rules if i

Re: ipfw subnetting

2012-05-21 Thread Ian Smith
gest what i'm doing wrong here. > > > > > > Desired:drop everything from 180.0.0.0 to 180.255.255.255 > > > > > > ipfw -q add 137 deny all from 180.0.0.0/8 to any > > > > t23# ipfw -q add 137 deny all from 180.0.0.0/8 to any > >

Re: ipfw subnetting

2012-05-21 Thread Michael Powell
Paul Macdonald wrote: [snip] It has been many years since I used IPFW as I moved on to IPFILTER, and then on to PF which is what I use now. I don't even recall exactly why I chose to utilize both setting directionality of flow per specific interface. I suspect that somehow there is some

Re: ipfw subnetting

2012-05-21 Thread Paul Macdonald
nterface Is this ruleset just protecting this host itself, or are you using it as a firewall for an internal network? ipfw add allow ip from any to any via lo0 ifpw add allow ip from $local_net to $local_net ipfw add deny log ip from 180.0.0.0/8 to any in recv $ext_if ipfw add check-state ipfw add

Re: ipfw subnetting

2012-05-21 Thread Michael Sierchio
this ruleset just protecting this host itself, or are you using it as a firewall for an internal network? ipfw add allow ip from any to any via lo0 ifpw add allow ip from $local_net to $local_net ipfw add deny log ip from 180.0.0.0/8 to any in recv $ext_if ipfw add check-state ipfw add allow t

Re: ipfw subnetting

2012-05-21 Thread Paul Macdonald
On 21/05/2012 14:50, Ian Smith wrote: In freebsd-questions Digest, Vol 416, Issue 1, Message: 26 On Mon, 21 May 2012 10:06:12 +0100 Paul Macdonald wrote: > can anyone suggest what i'm doing wrong here. > > Desired:drop everything from 180.0.0.0 to 180.255.255.255

Re: ipfw subnetting

2012-05-21 Thread Ian Smith
In freebsd-questions Digest, Vol 416, Issue 1, Message: 26 On Mon, 21 May 2012 10:06:12 +0100 Paul Macdonald wrote: > can anyone suggest what i'm doing wrong here. > > Desired:drop everything from 180.0.0.0 to 180.255.255.255 > > ipfw -q add 137 deny all from 180

ipfw subnetting

2012-05-21 Thread Paul Macdonald
Hi, can anyone suggest what i'm doing wrong here. Desired:drop everything from 180.0.0.0 to 180.255.255.255 ipfw -q add 137 deny all from 180.0.0.0/8 to any thanks Paul. -- - Paul Macdonald IFDNRG Ltd Web and video hosting - t:

ipfw FreeBSD 10

2012-04-11 Thread Robert Huff
KES writes: > building kernel with this options: > options IPFIREWALL #enable ipfw > options IPFIREWALL_VERBOSE #enable log > options IPFIREWALL_FORWARD #enable fwd > options IPDIVERT > options L

ipfw FreeBSD 10

2012-04-11 Thread KES
building kernel with this options: options IPFIREWALL #enable ipfw options IPFIREWALL_VERBOSE #enable log options IPFIREWALL_FORWARD #enable fwd options IPDIVERT options LIBALIAS options IPFIREWALL_NAT #enable nat do

Re: HowTo easy use IPFW

2012-02-05 Thread Коньков Евгений
Здравствуйте, Julian. Вы писали 5 февраля 2012 г., 9:15:35: JE> On 2/4/12 10:53 PM, Julian Elischer wrote: >> On 2/2/12 1:33 AM, Коньков Евгений wrote: >>> this is the mine script which helps me keep my firewall very clean >>> and safe. >>> >>> It is easy to understand even if you have a thousan

Re: HowTo easy use IPFW

2012-02-04 Thread Kevin Oberman
2012/2/4 Julian Elischer : > On 2/2/12 1:33 AM, Коньков Евгений wrote: >> >> this is the mine script which helps me keep my firewall very clean and >> safe. >> >> It is easy to understand even if you have a thousands rules, I think =) >> >> please comment. >> >> PS. If anybody may, please put into

Re: HowTo easy use IPFW

2012-02-04 Thread Julian Elischer
On 2/2/12 1:33 AM, Коньков Евгений wrote: this is the mine script which helps me keep my firewall very clean and safe. It is easy to understand even if you have a thousands rules, I think =) please comment. PS. If anybody may, please put into ports tree. thank you. it would probably be get m

Re: HowTo easy use IPFW

2012-02-04 Thread Julian Elischer
On 2/4/12 10:53 PM, Julian Elischer wrote: On 2/2/12 1:33 AM, Коньков Евгений wrote: this is the mine script which helps me keep my firewall very clean and safe. It is easy to understand even if you have a thousands ruBTWles, I think =) please comment. PS. If anybody may, please put into p

Re: HowTo easy use IPFW

2012-02-02 Thread Jerry
On Thu, 2 Feb 2012 12:10:14 -0500 Jason Hellenthal articulated: > For that you should review the documents etc... at > http://freebsd.org/docs Which will get you a big: 404 - Not Found You could start here though: http://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/firewalls-concepts.html

Re: HowTo easy use IPFW

2012-02-02 Thread Jason Hellenthal
You are welcome to create a port and submit it for reccomendation... For that you should review the documents etc... at http://freebsd.org/docs Good Luck On Thu, Feb 02, 2012 at 11:33:14AM +0200, Коньков Евгений wrote: > this is the mine script which helps me keep my firewall very clean and saf

HowTo easy use IPFW

2012-02-02 Thread Коньков Евгений
this is the mine script which helps me keep my firewall very clean and safe. It is easy to understand even if you have a thousands rules, I think =) please comment. PS. If anybody may, please put into ports tree. thank you. usr-local-etc-firewall.rar Description: Binary data __

Re: IPFW transparent VS dummynet rules

2012-01-08 Thread budsz
It seems that you may have one_pass set to 1.  Set to 0, packets will >  > > continue through the ruleset on exit from pipe/s, so to your fwd rule. >  > > >  > > cheers, Ian >  > >  > Thank you very much, lazy to read ipfw(8) :) >  > >  > pipe pipe_nr >  >  

Re: IPFW transparent VS dummynet rules

2012-01-07 Thread Ian Smith
config bw ${bwclup} mask src-ip 0x > > ${fwcmd} add 70 fwd ${ipproxy},${portproxy} tcp from ${ipclproxy} to > any dst-port ${porthttp} in via ${ifint0} > > The limiter working but fwd didn't work. Anyone have a clue for fix > this dilemma? Quoting ipfw(8):

IPFW transparent VS dummynet rules

2012-01-07 Thread budsz
Hi folks, I already found the mistake of my ruleset sequence on my box, for ex: ${fwcmd} add 30 fwd ${ipproxy},${portproxy} tcp from ${ipclproxy} to any dst-port ${porthttp} in via ${ifint0} ${fwcmd} add 52 pipe 2 ip from any to ${ipclient} via ${ifint0} ${fwcmd} add 53 pipe 3 ip from ${ipclient

SOLVED: ipfw And ping

2011-12-06 Thread Tim Daneliuk
I have a fairly restrictive firewall but I wanted to open a hole for ping and traceroute - both outbound from a NATed LAN as well as inbound to the boundary FreeBSD machine. The magic sauce turned out to be: ipfw add allow icmp from any to any icmptypes 0,3,4,8,11,12 The other insight here

Re: ipfw And ping

2011-12-04 Thread Ian Smith
gt; But isn't that handled by setting: > > > net.inet.icmp.drop_redirect=1 Yes, but generally clearer to allow what you want and drop the rest. > > # This is the ICMP rule we generally use: > > # ipfw add 10 allow icmp from any to any in icmptypes > > 0,3,4,11,12,14,16,18 > > >

Re: ipfw And ping

2011-12-03 Thread Tim Daneliuk
On 12/04/2011 01:04 AM, Ian Smith wrote: For one, google 'icmp redirect attack' But isn't that handled by setting: net.inet.icmp.drop_redirect=1 # This is the ICMP rule we generally use: # ipfw add 10 allow icmp from any to any in icmptypes 0,3,4,11,12,14,16,18

Re: ipfw And ping

2011-12-03 Thread Ian Smith
ottling ICMP rates via > sysctl because - AFAIK - the only overt ICMP attack is to flood a > target in hopes of getting Denial Of Services. > > As with you, I remain open to someone presenting a scenario > wherein a particular ICMP protocol could actually cause harm... For one, goo

Re: ipfw And ping

2011-12-02 Thread Коньков Евгений
Здравствуйте, Tim. Вы писали 2 декабря 2011 г., 1:25:04: TD> I have a fairly restrictive ipfw setup on a FBSD 8.2-STABLE machine. TD> Pings were not getting through so I added this near the top TD> of the rule set: TD># TD># Allow icmp TD># TD>${

Re: ipfw And ping

2011-12-02 Thread Tim Daneliuk
On 12/01/2011 05:45 PM, Jon Radel wrote: On 12/1/11 6:25 PM, Tim Daneliuk wrote: I have a fairly restrictive ipfw setup on a FBSD 8.2-STABLE machine. Pings were not getting through so I added this near the top of the rule set: # # Allow icmp # ${FWCMD} add allow icmp from any to any

Re: ipfw And ping

2011-12-02 Thread Jon Radel
On 12/1/11 6:25 PM, Tim Daneliuk wrote: I have a fairly restrictive ipfw setup on a FBSD 8.2-STABLE machine. Pings were not getting through so I added this near the top of the rule set: # # Allow icmp # ${FWCMD} add allow icmp from any to any It does work but, two questions: 1) Is

Re: ipfw And ping

2011-12-01 Thread Robert Bonomi
Tim Daneliuk wrote: > To: Robert Bonomi > Subject: Re: ipfw And ping > > On 12/01/2011 09:12 PM, Robert Bonomi wrote: > >> From tun...@tundraware.com Thu Dec 1 20:57:55 2011 > >> Date: Thu, 01 Dec 2011 20:56:03 -0600 > >> > >> Both. > >

Re: ipfw And ping

2011-12-01 Thread Tim Daneliuk
On 12/01/2011 08:56 PM, Robert Bonomi wrote: Similarly, I let the firewall respond to pings adressed to it's _external_ interface, but silently drop anything addressed any further inside my network. (If they can _reach_ my firewall, then a problem, whatever it is, *is* 'my problem' and that's

Re: ipfw And ping

2011-12-01 Thread Tim Daneliuk
On 12/01/2011 08:56 PM, Robert Bonomi wrote: From owner-freebsd-questi...@freebsd.org Thu Dec 1 17:27:19 2011 Date: Thu, 01 Dec 2011 17:25:04 -0600 From: Tim Daneliuk To: FreeBSD Mailing List Subject: ipfw And ping I have a fairly restrictive ipfw setup on a FBSD 8.2-STABLE machine. Pings

Re: ipfw And ping

2011-12-01 Thread Robert Bonomi
> From owner-freebsd-questi...@freebsd.org Thu Dec 1 17:27:19 2011 > Date: Thu, 01 Dec 2011 17:25:04 -0600 > From: Tim Daneliuk > To: FreeBSD Mailing List > Subject: ipfw And ping > > I have a fairly restrictive ipfw setup on a FBSD 8.2-STABLE machine. > Pings were

Re: ipfw And ping

2011-12-01 Thread Michael Sierchio
diagnose problems. On Thu, Dec 1, 2011 at 3:25 PM, Tim Daneliuk wrote: > I have a fairly restrictive ipfw setup on  a FBSD 8.2-STABLE machine. > Pings were not getting through so I added this near the top > of the rule set: > >  # >  # Allow icmp >  # > >  ${FWCMD}

ipfw And ping

2011-12-01 Thread Tim Daneliuk
I have a fairly restrictive ipfw setup on a FBSD 8.2-STABLE machine. Pings were not getting through so I added this near the top of the rule set: # # Allow icmp # ${FWCMD} add allow icmp from any to any It does work but, two questions: 1) Is there a better way? 2) Will this

Re: Configuring IPFW

2011-10-24 Thread Alessandro Spinella
On 10/22/11 15:56, Carmel wrote: I am attempting to set up a firewall using IPFW with a stateful behavior. While I have investigated how to set up these rules, I have run into conflicting opinions as to whether to all or deny "established" behavior. hi, Carmel the point is : an

Re: Configuring IPFW

2011-10-22 Thread Robert Bonomi
> Date: Sat, 22 Oct 2011 12:08:56 -0500 > To: FreeBSD > Subject: Re: Configuring IPFW > > On Sat, 22 Oct 2011 09:56:12 -0400 > Carmel wrote: > > > I am attempting to set up a firewall using IPFW with a stateful > > behavior. > > > > While I have i

Re: Configuring IPFW

2011-10-22 Thread Michael Sierchio
On Sat, Oct 22, 2011 at 10:08 AM, Conrad J. Sabatier wrote: > > Similarly, for udp rules, be sure to include the keep-state (but not > setup) keyword. > RIght - if you're just protecting a single host, for example, your ruleset might be something like ipfw add 1000 allow ip fr

Re: Configuring IPFW

2011-10-22 Thread Michael Sierchio
n as well. Suppose you wanted to permit outbound TCP connections using stateful rules. If em0 is the outside interface of your firewall If you're using stateful rules, you would do something like this: ipfw add 1000 check-state ipfw add 2500 allow tcp from any to any out xmit em0 setup keep-state

Re: Configuring IPFW

2011-10-22 Thread Conrad J. Sabatier
On Sat, 22 Oct 2011 09:56:12 -0400 Carmel wrote: > I am attempting to set up a firewall using IPFW with a stateful > behavior. > > While I have investigated how to set up these rules, I have run into > conflicting opinions as to whether to all or deny "established"

Re: Configuring IPFW

2011-10-22 Thread RW
On Sat, 22 Oct 2011 09:56:12 -0400 Carmel wrote: > I am attempting to set up a firewall using IPFW with a stateful > behavior. > > While I have investigated how to set up these rules, I have run into > conflicting opinions as to whether to all or deny "established"

Configuring IPFW

2011-10-22 Thread Carmel
I am attempting to set up a firewall using IPFW with a stateful behavior. While I have investigated how to set up these rules, I have run into conflicting opinions as to whether to all or deny "established" behavior. EXAMPLE: (preceded by a "checkstate" rule) allow

max entries for table of ipfw?

2011-09-17 Thread Anton
What's the limit of entries for table of ipfw? Thanks in advance. -- best regards, Anton ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to "freebsd

Re: IPFW

2011-07-25 Thread Bas Smeelen
On 07/25/2011 09:36 AM, Jos Chrispijn wrote: > Dear group, > Is there a web driven configuration for ipfw after I installed it on my > server? webmin /usr/ports/sysutils/webmin/ the BSD Firewall module http://www.webmin.com/standard.html DISCLAIMER: This e-mail is for the intended re

  1   2   3   4   5   6   7   8   9   10   >