At 14:14:46.15 on 11-AUG-2007 in message
<[EMAIL PROTECTED]>, I wrote:
> OK, I actually have more than a couple questions. I'm basically
>pursuing two IPF-related topics. The first should be relatively easy to
>address.
>
> First of all, I'm contemplating upgrading an OpenBSD-based firewall.
>Is IPF supported with the most recent stable OpenBSD release (i.e. v4.1 as I
>compose this message)? If so, what version of IPF would be the most stable?
>(FWIW, I prefer IPF over pf.)
>
> I'm conceptualizing a network authentication system for people
>accessing a firewalled network from "outside." I'm hoping to code things via
>various scripting mechanisms, rather than compiling anything. The UI is
>planned to be a Web page. The idea is that the remote user hits a secure Web
>form requiring authentication. Upon successful login, the Web server "back-
>end" will initiate addition of a few IPF rules into the authentication table,
>presumably via...
>
>% echo "<ipf-rule1>[\n<ipf-rule2>[etc.]]"|ipf -P -f -
>
>I am inferring from ipf(5) that the above will work with a pre-defined preauth
>rule (or set of such rules), but it's not exactly clear to me how. For
>example, "-P" creates a "temporary" entry in the authentication rule table.
>What defines the lifespan of the entry? If that's left to me, do I just need
>to subsequently repeat the above with the "-r" flag? A typical rule set for a
>protocol I might want to handle this way currently looks something like this
>(using MS Remote Desktop as an example):
>
>block return-rst in quick on fxp0 proto tcp \
> from any to any port = 3389 head 3389
># Miscreants we don't care about
>block return-rst in quick proto tcp \
> from <remote-CIDR> to any flags S/SAFR group 3389
>[...etc...]
># Allow access to local net.
>pass in log first quick proto tcp \
> from any to <local-CIDR> flags S/SAFR keep state keep frags group 3389
>
>Could I merely modify that last pass rule to use the same syntax, only
> starting
>it with "preauth" instead of "pass" and then use the above ipf command to
>include a pass rule citing the specific IP address from which the remote user
>authenticated? I would also be interested in transitioning to this solution
>for a short time. Assuming all that's necessary is the switch from "pass" to
>"preauth", could I add a subsequent "pass" rule (identical to the one above)
>immediately after the preauth rule to allow "unauthenticated" access for a
>time?
>[...]
With regard to OpenBSD 4.1 support, Darren responded...
<Hmmm, I'll look into this and get back to you in a week with some patches.
<The major issue is usually all of the device major/minor files that need
<t be fiddled with.
<
<I'm a bit short for time right now, so I'll answer the rest of your
<question later.
I'm (also) still looking for answers and/or documentation for the
authentication-related questions.
Thanks for your consideration,
Mike
--
| Systems Specialist: CBE,MSE
Michael T. Davis (Mike) | Departmental Networking/Computing
http://www.ecr6.ohio-state.edu/~davism/ | The Ohio State University
| 197 Watts, (614) 292-6928