Victor Sudakov wrote:

[snip]
> 
> I have looked at your ruleset. First you have:
> 
> [dd]
>> $fwcmd add divert natd ip from any to me in via ppp0
>> $fwcmd add divert natd ip from 10.10.0.0/8 to any out via ppp0
>> $fwcmd add check-state
>> 
> 
> [dd]
> 
> and only later you have your keep-state rules:
> 
>> 
>> $fwcmd add allow udp from any to any via ppp0 keep-state
>> $fwcmd add allow log icmp from any to any icmptypes 3,4
>> 
>> $fwcmd add allow tcp from any to me 80 via ppp0 keep-state
>> 
>> $fwcmd add deny log tcp from any to any in recv ppp0 setup
>> $fwcmd add allow tcp from any to any out xmit ppp0 setup keep-state
>> $fwcmd add allow tcp from any to any via ppp0 established keep-state
> 
> This means your dynamic rules will contain an already NAT-ted address,
> which is useless.
> 
> With my example ruleset below, where would you put the keep-state
> option?
> 
> 
> 00100 divert 8668 ip from any to table(1) out via rl0
> 00200 deny log logamount 100 ip from 10.0.0.0/8 to any out via rl0
> 00300 deny log logamount 100 ip from 172.16.0.0/12 to any out via rl0
> 00400 deny log logamount 100 ip from 192.168.0.0/16 to any out via rl0
> 
> 00500 divert 8668 ip from table(1) to any in via rl0
> 00600 check-state
        ^^^^^^^^^^^
Yes - the check-state line is required first in order to make use of the 
keep-state line later in the ruleset.

00650 allow ip from table(1) to any in via rl0 keep-state

Or wherever you are intending to set up state for a rule in the state table.

> 00700 deny log logamount 100 ip from any to 10.0.0.0/8 in via rl0
> 00800 deny log logamount 100 ip from any to 172.16.0.0/12 in via rl0
> 00900 deny log logamount 100 ip from any to 192.168.0.0/16 in via rl0
> 
> 65535 allow ip from any to any
> 
> 
$fwcmd add allow tcp from any to any out xmit ppp0 setup keep-state
$fwcmd add allow tcp from any to any via ppp0 established keep-state

Note in these two rules the setting of the SYN flag with "setup". This 
allows the initial 3-way TCP handshake. The subsequent "established" line is 
where it will "remember" the traffic. It is not truly necessary to have it 
split between two lines like this, as a looser example:

$fwcmd add allow tcp from any to me 80 via ppp0 keep-state

Of course, you will need to adjust for the direction(s) of your traffic 
flow, that is, in order to meet your specific needs. My example rule was 
intended for use as an endpoint where I was mainly interested in blocking 
all inbound traffic with a very limited number of exceptions with state 
being used to allow back in from the outside all return traffic originated 
by me, and only me.

It's been something on the order of 6-7 years since I last used ipfw. For 
something like 2-3 years after that I used ipfilter. When pf was imported 
from OpenBSD and became stable I made the move to pf. 

So my recall of specifics related to ipfw is dim at best. Was just hoping 
you could pick out some detail which may be of use to you. Your needs may be 
different from mine and consequently there is no real one magic "copy this 
for plug and play" ruleset. Mine was just one example where I was trying to 
illustrate one possibility of utilizing state. And this from a working 
ruleset that I used for years.

-Mike



_______________________________________________
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "freebsd-questions-unsubscr...@freebsd.org"

Reply via email to