1 | #!/bin/sh -
|
---|
2 | # Copyright (c) 1996 Poul-Henning Kamp
|
---|
3 | # All rights reserved.
|
---|
4 | #
|
---|
5 | # Redistribution and use in source and binary forms, with or without
|
---|
6 | # modification, are permitted provided that the following conditions
|
---|
7 | # are met:
|
---|
8 | # 1. Redistributions of source code must retain the above copyright
|
---|
9 | # notice, this list of conditions and the following disclaimer.
|
---|
10 | # 2. Redistributions in binary form must reproduce the above copyright
|
---|
11 | # notice, this list of conditions and the following disclaimer in the
|
---|
12 | # documentation and/or other materials provided with the distribution.
|
---|
13 | #
|
---|
14 | # THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
|
---|
15 | # ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
---|
16 | # IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
---|
17 | # ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
---|
18 | # FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
---|
19 | # DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
---|
20 | # OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
---|
21 | # HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
---|
22 | # LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
---|
23 | # OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
---|
24 | # SUCH DAMAGE.
|
---|
25 | #
|
---|
26 | # $FreeBSD: src/etc/rc.firewall,v 1.52.2.3.4.1 2009/04/15 03:14:26 kensmith Exp $
|
---|
27 | #
|
---|
28 |
|
---|
29 | #
|
---|
30 | # Setup system for ipfw(4) firewall service.
|
---|
31 | #
|
---|
32 |
|
---|
33 | # Suck in the configuration variables.
|
---|
34 | if [ -z "${source_rc_confs_defined}" ]; then
|
---|
35 | if [ -r /etc/defaults/rc.conf ]; then
|
---|
36 | . /etc/defaults/rc.conf
|
---|
37 | source_rc_confs
|
---|
38 | elif [ -r /etc/rc.conf ]; then
|
---|
39 | . /etc/rc.conf
|
---|
40 | fi
|
---|
41 | fi
|
---|
42 |
|
---|
43 | trusted_net="84.106.113.143"
|
---|
44 |
|
---|
45 | # Deny and (if wanted) log the rest unconditionally.
|
---|
46 | log="log logamount 500" # The default of 100 is too low.
|
---|
47 | sysctl net.inet.ip.fw.verbose=1 >/dev/null
|
---|
48 |
|
---|
49 | setup_loopback () {
|
---|
50 | log="log logamount 500" # The default of 100 is too low.
|
---|
51 | ############
|
---|
52 | # Only in rare cases do you want to change these rules
|
---|
53 | #
|
---|
54 | ${fwcmd} add 100 pass all from any to any via lo0
|
---|
55 | ${fwcmd} add 200 deny ${log} all from any to 127.0.0.0/8
|
---|
56 | #${fwcmd} add 300 deny ${log} ip from 127.0.0.0/8 to any
|
---|
57 |
|
---|
58 | ${fw6cmd} add 100 pass ip6 from any to any via lo0
|
---|
59 | ${fw6cmd} add 200 deny ${log} ip6 from any to ::1
|
---|
60 | ${fw6cmd} add 300 deny ${log} ip6 from ::1 to any
|
---|
61 | #
|
---|
62 | # ND
|
---|
63 | #
|
---|
64 | # DAD
|
---|
65 | ${fw6cmd} add pass ip6 from :: to ff02::/16 proto ipv6-icmp
|
---|
66 | # RS, RA, NS, NA, redirect...
|
---|
67 | ${fw6cmd} add pass ip6 from fe80::/10 to fe80::/10 proto ipv6-icmp
|
---|
68 | ${fw6cmd} add pass ip6 from fe80::/10 to ff02::/16 proto ipv6-icmp
|
---|
69 | }
|
---|
70 |
|
---|
71 | if [ -n "${1}" ]; then
|
---|
72 | firewall_type="${1}"
|
---|
73 | fi
|
---|
74 |
|
---|
75 | ############
|
---|
76 | # Set quiet mode if requested
|
---|
77 | #
|
---|
78 | case ${firewall_quiet} in
|
---|
79 | [Yy][Ee][Ss])
|
---|
80 | fwcmd="/sbin/ipfw -q"
|
---|
81 | ;;
|
---|
82 | *)
|
---|
83 | fwcmd="/sbin/ipfw"
|
---|
84 | ;;
|
---|
85 | esac
|
---|
86 | case ${ipv6_firewall_quiet} in
|
---|
87 | [Yy][Ee][Ss])
|
---|
88 | fw6cmd="/sbin/ipfw -q"
|
---|
89 | ;;
|
---|
90 | *)
|
---|
91 | fw6cmd="/sbin/ipfw"
|
---|
92 | ;;
|
---|
93 | esac
|
---|
94 |
|
---|
95 | ############
|
---|
96 | # Flush out the list before we begin.
|
---|
97 | ${fwcmd} -f flush
|
---|
98 |
|
---|
99 | setup_loopback
|
---|
100 |
|
---|
101 | ############
|
---|
102 | # If you just configured ipfw in the kernel as a tool to solve network
|
---|
103 | # problems or you just want to disallow some particular kinds of traffic
|
---|
104 | # then you will want to change the default policy to open. You can also
|
---|
105 | # do this as your only action by setting the firewall_type to ``open''.
|
---|
106 | #
|
---|
107 | # ${fwcmd} add 65000 pass all from any to any
|
---|
108 |
|
---|
109 |
|
---|
110 |
|
---|
111 | ############
|
---|
112 | # This is a prototype setup based after simple firewall.
|
---|
113 | #
|
---|
114 | # Configuration:
|
---|
115 | # firewall_oif: Outside network interface.
|
---|
116 | ############
|
---|
117 |
|
---|
118 | # set these to your outside interface network
|
---|
119 | oif="$firewall_oif"
|
---|
120 |
|
---|
121 | # Allow jail to reach outside world
|
---|
122 | ${fwcmd} add nat 1 ip from 10.0.0.0/24 to any out via ${oif}
|
---|
123 | ${fwcmd} add nat 1 ip from any to 78.46.85.230 in via ${oif}
|
---|
124 | ${fwcmd} nat 1 config if ${oif}
|
---|
125 |
|
---|
126 | # Stop RFC1918 nets on the outside interface
|
---|
127 | ${fwcmd} add deny ${log} all from any to 10.0.0.0/8 via ${oif}
|
---|
128 | ${fwcmd} add deny ${log} all from any to 172.16.0.0/12 via ${oif}
|
---|
129 | ${fwcmd} add deny ${log} all from any to 192.168.0.0/16 via ${oif}
|
---|
130 |
|
---|
131 | # Stop draft-manning-dsua-03.txt (1 May 2000) nets (includes RESERVED-1,
|
---|
132 | # DHCP auto-configuration, NET-TEST, MULTICAST (class D), and class E)
|
---|
133 | # on the outside interface
|
---|
134 | ${fwcmd} add deny ${log} all from any to 0.0.0.0/8 via ${oif}
|
---|
135 | ${fwcmd} add deny ${log} all from any to 169.254.0.0/16 via ${oif}
|
---|
136 | ${fwcmd} add deny ${log} all from any to 192.0.2.0/24 via ${oif}
|
---|
137 | ${fwcmd} add deny ${log} all from any to 224.0.0.0/4 via ${oif}
|
---|
138 | ${fwcmd} add deny ${log} all from any to 240.0.0.0/4 via ${oif}
|
---|
139 |
|
---|
140 | # Stop RFC1918 nets on the outside interface
|
---|
141 | ${fwcmd} add deny ${log} all from 10.0.0.0/8 to any via ${oif}
|
---|
142 | ${fwcmd} add deny ${log} all from 172.16.0.0/12 to any via ${oif}
|
---|
143 | ${fwcmd} add deny ${log} all from 192.168.0.0/16 to any via ${oif}
|
---|
144 |
|
---|
145 | # Stop draft-manning-dsua-03.txt (1 May 2000) nets (includes RESERVED-1,
|
---|
146 | # DHCP auto-configuration, NET-TEST, MULTICAST (class D), and class E)
|
---|
147 | # on the outside interface
|
---|
148 | ${fwcmd} add deny ${log} all from 0.0.0.0/8 to any via ${oif}
|
---|
149 | ${fwcmd} add deny ${log} all from 169.254.0.0/16 to any via ${oif}
|
---|
150 | ${fwcmd} add deny ${log} all from 192.0.2.0/24 to any via ${oif}
|
---|
151 | ${fwcmd} add deny ${log} all from 224.0.0.0/4 to any via ${oif}
|
---|
152 | ${fwcmd} add deny ${log} all from 240.0.0.0/4 to any via ${oif}
|
---|
153 |
|
---|
154 | # Stop unique local unicast address on the outside interface
|
---|
155 | ${fw6cmd} add deny ${log} ip6 from fc00::/7 to any via ${oif}
|
---|
156 | ${fw6cmd} add deny ${log} ip6 from any to fc00::/7 via ${oif}
|
---|
157 |
|
---|
158 | # Stop site-local on the outside interface
|
---|
159 | ${fw6cmd} add deny ${log} ip6 from fec0::/10 to any via ${oif}
|
---|
160 | ${fw6cmd} add deny ${log} ip6 from any to fec0::/10 via ${oif}
|
---|
161 |
|
---|
162 | # Disallow "internal" addresses to appear on the wire.
|
---|
163 | ${fw6cmd} add deny ${log} ip6 from ::ffff:0.0.0.0/96 to any via ${oif}
|
---|
164 | ${fw6cmd} add deny ${log} ip6 from any to ::ffff:0.0.0.0/96 via ${oif}
|
---|
165 |
|
---|
166 | # Disallow packets to malicious IPv4 compatible prefix.
|
---|
167 | ${fw6cmd} add deny ${log} ip6 from ::224.0.0.0/100 to any via ${oif}
|
---|
168 | ${fw6cmd} add deny ${log} ip6 from any to ::224.0.0.0/100 via ${oif}
|
---|
169 | ${fw6cmd} add deny ${log} ip6 from ::127.0.0.0/104 to any via ${oif}
|
---|
170 | ${fw6cmd} add deny ${log} ip6 from any to ::127.0.0.0/104 via ${oif}
|
---|
171 | ${fw6cmd} add deny ${log} ip6 from ::0.0.0.0/104 to any via ${oif}
|
---|
172 | ${fw6cmd} add deny ${log} ip6 from any to ::0.0.0.0/104 via ${oif}
|
---|
173 | ${fw6cmd} add deny ${log} ip6 from ::255.0.0.0/104 to any via ${oif}
|
---|
174 | ${fw6cmd} add deny ${log} ip6 from any to ::255.0.0.0/104 via ${oif}
|
---|
175 |
|
---|
176 | ${fw6cmd} add deny ${log} ip6 from ::0.0.0.0/96 to any via ${oif}
|
---|
177 | ${fw6cmd} add deny ${log} ip6 from any to ::0.0.0.0/96 via ${oif}
|
---|
178 |
|
---|
179 | # Disallow packets to malicious 6to4 prefix.
|
---|
180 | ${fw6cmd} add deny ${log} ip6 from 2002:e000::/20 to any via ${oif}
|
---|
181 | ${fw6cmd} add deny ${log} ip6 from any to 2002:e000::/20 via ${oif}
|
---|
182 | ${fw6cmd} add deny ${log} ip6 from 2002:7f00::/24 to any via ${oif}
|
---|
183 | ${fw6cmd} add deny ${log} ip6 from any to 2002:7f00::/24 via ${oif}
|
---|
184 | ${fw6cmd} add deny ${log} ip6 from 2002:0000::/24 to any via ${oif}
|
---|
185 | ${fw6cmd} add deny ${log} ip6 from any to 2002:0000::/24 via ${oif}
|
---|
186 | ${fw6cmd} add deny ${log} ip6 from 2002:ff00::/24 to any via ${oif}
|
---|
187 | ${fw6cmd} add deny ${log} ip6 from any to 2002:ff00::/24 via ${oif}
|
---|
188 |
|
---|
189 | ${fw6cmd} add deny ${log} ip6 from 2002:0a00::/24 to any via ${oif}
|
---|
190 | ${fw6cmd} add deny ${log} ip6 from any to 2002:0a00::/24 via ${oif}
|
---|
191 | ${fw6cmd} add deny ${log} ip6 from 2002:ac10::/28 to any via ${oif}
|
---|
192 | ${fw6cmd} add deny ${log} ip6 from any to 2002:ac10::/28 via ${oif}
|
---|
193 | ${fw6cmd} add deny ${log} ip6 from 2002:c0a8::/32 to any via ${oif}
|
---|
194 | ${fw6cmd} add deny ${log} ip6 from any to 2002:c0a8::/32 via ${oif}
|
---|
195 |
|
---|
196 | ${fw6cmd} add deny ${log} ip6 from ff05::/16 to any via ${oif}
|
---|
197 | ${fw6cmd} add deny ${log} ip6 from any to ff05::/16 via ${oif}
|
---|
198 |
|
---|
199 | # Allow TCP through if setup succeeded
|
---|
200 | ${fw6cmd} add pass ip6 from any to any established proto tcp
|
---|
201 | ${fwcmd} add pass tcp from any to any established
|
---|
202 |
|
---|
203 | # Allow any link-local multicast traffic
|
---|
204 | ${fw6cmd} add pass ip6 from fe80::/10 to ff02::/16
|
---|
205 |
|
---|
206 | # Deployment to production system, thus limited exposure
|
---|
207 | # ${fwcmd} add pass tcp from 213.125.247.82 to 144.76.7.58 25,80,443
|
---|
208 | # ${fwcmd} add deny ${log} tcp from any to 144.76.7.58 25,80,443
|
---|
209 | # ${fw6cmd} add pass tcp from 2001:1af8:febe:0:b6b6:76ff:fe4f:1cd5 to 2a01:4f8:190:8221::4:1 25,80,443
|
---|
210 | # ${fw6cmd} add pass tcp from 2001:980:488a:1:b6b6:76ff:fe4f:1cd5 to 2a01:4f8:190:8221::4:1 25,80,443
|
---|
211 | # ${fw6cmd} add deny ${log} tcp from any to 2a01:4f8:190:8221::4:1 25,80,443
|
---|
212 |
|
---|
213 | # HACK!
|
---|
214 | ${fw6cmd} add pass ip6 from any to any
|
---|
215 |
|
---|
216 | # Allow IP fragments to pass through
|
---|
217 | ${fwcmd} add pass all from any to any frag
|
---|
218 | ${fw6cmd} add pass ip6 from any to any frag
|
---|
219 |
|
---|
220 | # Allow ICMP queries to arrive
|
---|
221 | ${fwcmd} add pass icmp from any to any icmptype 0,3,4,8,11
|
---|
222 | ${fw6cmd} add pass ip6 from any to any icmp6types 1,2,3,4,128 proto ipv6-icmp
|
---|
223 |
|
---|
224 | # Allow NS/ACK/NA/toobig (don't filter it out)
|
---|
225 | ${fw6cmd} add pass ip6 from any to me icmp6types 2,129,135,136 proto ipv6-icmp
|
---|
226 | ${fw6cmd} add pass ip6 from me to any proto ipv6-icmp
|
---|
227 |
|
---|
228 |
|
---|
229 | # Allow setup of incoming email
|
---|
230 | ${fwcmd} add pass tcp from any to me 25 setup
|
---|
231 | ${fw6cmd} add pass ip6 from any to me 25 setup proto tcp
|
---|
232 |
|
---|
233 | # Allow setup of incoming email (smtps)
|
---|
234 | ${fwcmd} add pass tcp from any to me 465 setup
|
---|
235 | ${fw6cmd} add pass ip6 from any to me 465 setup proto tcp
|
---|
236 |
|
---|
237 | # Allow setup of incoming email (submission)
|
---|
238 | ${fwcmd} add pass tcp from any to me 587 setup
|
---|
239 | ${fw6cmd} add pass ip6 from any to me 587 setup proto tcp
|
---|
240 |
|
---|
241 | # Allow access to our FTP
|
---|
242 | ${fwcmd} add pass tcp from any to me 21 setup
|
---|
243 | ${fw6cmd} add pass ip6 from any to me 21 setup proto tcp
|
---|
244 |
|
---|
245 | # Allow access to our DNS
|
---|
246 | ${fwcmd} add pass tcp from any to me 53 setup
|
---|
247 | ${fw6cmd} add pass ip6 from any to me 53 setup proto tcp
|
---|
248 |
|
---|
249 | # Allow access to our Syslog
|
---|
250 | ${fwcmd} add pass udp from any to me 514
|
---|
251 | ${fwcmd} add pass udp from me 514 to any
|
---|
252 |
|
---|
253 | # Allow access to our DNS (ivp6)
|
---|
254 | ${fwcmd} add pass udp from any to me 53
|
---|
255 | ${fwcmd} add pass udp from me 53 to any
|
---|
256 | ${fw6cmd} add pass ip6 from any to me 53 proto udp
|
---|
257 | ${fw6cmd} add pass ip6 from me 53 to any proto udp
|
---|
258 |
|
---|
259 | # Allow access to our NTP
|
---|
260 | ${fwcmd} add pass udp from any to me 123
|
---|
261 | ${fwcmd} add pass udp from me 123 to any
|
---|
262 | ${fw6cmd} add pass ip6 from any to me 123 proto udp
|
---|
263 | ${fw6cmd} add pass ip6 from me 123 to any proto udp
|
---|
264 |
|
---|
265 | # Allow access to our WWW
|
---|
266 | ${fwcmd} add pass tcp from any to me 80 setup
|
---|
267 | ${fw6cmd} add pass ip6 from any to me 80 setup proto tcp
|
---|
268 | ${fwcmd} add pass tcp from any to me 443 setup
|
---|
269 | ${fw6cmd} add pass ip6 from any to me 443 setup proto tcp
|
---|
270 |
|
---|
271 | # Allow access to our SNMP
|
---|
272 | ${fwcmd} add pass udp from any to me 161
|
---|
273 | ${fwcmd} add pass udp from me 161 to any
|
---|
274 | ${fw6cmd} add pass ip6 from any to me 161 proto udp
|
---|
275 | ${fw6cmd} add pass ip6 from me 161 to any proto udp
|
---|
276 |
|
---|
277 | # Allow access to our SSH (sshguard operating in 55000 - 55050)
|
---|
278 | ${fwcmd} add 56000 pass tcp from any to me 22 setup
|
---|
279 | ${fw6cmd} add 56001 pass ip6 from any to me 22 setup proto tcp
|
---|
280 | ${fwcmd} add 56002 pass tcp from any to me 1022 setup
|
---|
281 | ${fw6cmd} add 56003 pass ip6 from any to me 1022 setup proto tcp
|
---|
282 |
|
---|
283 | # Allow access to our IMAP
|
---|
284 | ${fwcmd} add pass tcp from any to me 143 setup
|
---|
285 | ${fw6cmd} add pass ip6 from any to me 143 setup proto tcp
|
---|
286 |
|
---|
287 | # Allow access to our IMAPS
|
---|
288 | ${fwcmd} add pass tcp from any to me 993 setup
|
---|
289 | ${fw6cmd} add pass ip6 from any to me 993 setup proto tcp
|
---|
290 |
|
---|
291 | # Allow access to our IPERF
|
---|
292 | ${fwcmd} add pass tcp from any to me 5001 setup
|
---|
293 | ${fw6cmd} add pass ip6 from any to me 5001 setup proto tcp
|
---|
294 |
|
---|
295 | # Allow access to our DARKSTAT
|
---|
296 | ${fwcmd} add pass tcp from ${trusted_net} to me 667 setup
|
---|
297 | ${fw6cmd} add pass ip6 from ${trusted_net} to me 667 setup proto tcp
|
---|
298 |
|
---|
299 | # Reject&Log all setup of incoming connections from the outside
|
---|
300 | ${fwcmd} add deny ${log} tcp from any to any in via ${oif} setup
|
---|
301 |
|
---|
302 | # Allow setup of outgoing connections only
|
---|
303 | ${fwcmd} add pass tcp from me to any setup
|
---|
304 | ${fw6cmd} add pass ip6 from me to any setup proto tcp
|
---|
305 |
|
---|
306 | # Allow DNS queries out in the world
|
---|
307 | ${fwcmd} add pass udp from me to any 53 keep-state
|
---|
308 | ${fw6cmd} add pass ip6 from me to any 53 proto udp
|
---|
309 |
|
---|
310 | # Allow NTP queries out in the world
|
---|
311 | ${fwcmd} add pass udp from me to any 123 keep-state
|
---|
312 | ${fw6cmd} add pass ip6 from any 123 to me proto udp
|
---|
313 | ${fw6cmd} add pass ip6 from me to any 123 proto udp
|
---|
314 |
|
---|
315 | # Everything else is denied by default, unless the
|
---|
316 | # IPFIREWALL_DEFAULT_TO_ACCEPT option is set in your kernel
|
---|
317 | # config file.
|
---|
318 | ${fwcmd} add deny ${log} ip from any to any
|
---|
319 | ${fwcmd} add deny ${log} ip6 from any to any
|
---|