Re: Transparent proxy using IPFW

2009-12-08 Thread kalpin
Hello,

> 2009/11/30 
>
>> Dear All,
>>
>> Is it possible to do like my requirement below?
>>
>> 1. Setup portfwd in my server listen on port 555 and forward all
>> connection through this port to another server with same port or
>> different
>> port
>> 2. All client which connected through this port, then remote server
>> which
>> landed to the end can see the client's IP.
>>
>> example:
>>
>> Client IP: 202.15.15.16
>> FreeBSD IP: 202.16.17.18 listen on port 555
>> Remote Server IP: 202.89.89.90
>>
>> Client IP connect to 202.16.17.18 on port 555, and then FreeBSD forward
>> it
>> to 202.89.89.90 with same port or different port. Server with IP
>> 202.89.89.90 can see Client's IP 202.15.15.16.
>>
>> I am using FreeBSD 7.2-stable.
>>
>> Thank you
>>
>> Kalpin Erlangga Silaen
>>
>> ___
>> freebsd-questions@freebsd.org mailing list
>> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
>> To unsubscribe, send any mail to "
>> freebsd-questions-unsubscr...@freebsd.org"
>>
>
> you can but you will need to do some natting otherwise the return traffic
> will go direct to host a from c and not via your box host b
>
> or you could use nc via inetd
>
> eg
>
> some_service stream  tcp nowait  root
> /usr/local/bin/nc  nc -n -w 3  hostC port_on_hostc
> ___

I tried install rinetd, but it looks the IP come from the server not
client's ip. Also, I tried portfwd and portfwd need transparent proxy in
kernel. How do I enable this?

Need your advice.

Regards,

Kalpin Erlangga Silaen

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "freebsd-questions-unsubscr...@freebsd.org"


Re: Transparent proxy using IPFW

2009-11-30 Thread krad
2009/11/30 

> Dear All,
>
> Is it possible to do like my requirement below?
>
> 1. Setup portfwd in my server listen on port 555 and forward all
> connection through this port to another server with same port or different
> port
> 2. All client which connected through this port, then remote server which
> landed to the end can see the client's IP.
>
> example:
>
> Client IP: 202.15.15.16
> FreeBSD IP: 202.16.17.18 listen on port 555
> Remote Server IP: 202.89.89.90
>
> Client IP connect to 202.16.17.18 on port 555, and then FreeBSD forward it
> to 202.89.89.90 with same port or different port. Server with IP
> 202.89.89.90 can see Client's IP 202.15.15.16.
>
> I am using FreeBSD 7.2-stable.
>
> Thank you
>
> Kalpin Erlangga Silaen
>
> ___
> freebsd-questions@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to "
> freebsd-questions-unsubscr...@freebsd.org"
>

you can but you will need to do some natting otherwise the return traffic
will go direct to host a from c and not via your box host b

or you could use nc via inetd

eg

some_service stream  tcp nowait  root
/usr/local/bin/nc  nc -n -w 3  hostC port_on_hostc
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "freebsd-questions-unsubscr...@freebsd.org"


Transparent proxy using IPFW

2009-11-30 Thread kalpin
Dear All,

Is it possible to do like my requirement below?

1. Setup portfwd in my server listen on port 555 and forward all
connection through this port to another server with same port or different
port
2. All client which connected through this port, then remote server which
landed to the end can see the client's IP.

example:

Client IP: 202.15.15.16
FreeBSD IP: 202.16.17.18 listen on port 555
Remote Server IP: 202.89.89.90

Client IP connect to 202.16.17.18 on port 555, and then FreeBSD forward it
to 202.89.89.90 with same port or different port. Server with IP
202.89.89.90 can see Client's IP 202.15.15.16.

I am using FreeBSD 7.2-stable.

Thank you

Kalpin Erlangga Silaen

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "freebsd-questions-unsubscr...@freebsd.org"


Re: Is there anything weird I should know about using ipfw on alias addresses?

2008-12-04 Thread Brett Davidson

Found the problem.

Incorrect arp entry.

Thanks for your help.

Cheers,
Brett.

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: Is there anything weird I should know about using ipfw on alias addresses?

2008-12-04 Thread Ian Smith
On Thu, 4 Dec 2008, Brett Davidson wrote:
 > Ian Smith wrote:
 > > On Tue, 2 Dec 2008, Brett Davidson wrote:
 > >  > Ian Smith wrote:
 > >  > > On Mon, 01 Dec 2008 16:52:12 +1300 Brett Davidson <[EMAIL PROTECTED]>
 > >  > > wrote:
 > >  > >  > >  > ifconfig shows the alias addresses correctly bound.
 > >  > >  > Creating an ipfw rule and testing it from the command line works  >
 > >  > > (connects out from master address, not alias)
 > >  > >  >  >  From website on alias address, the firewall blocks the packets.
 > >  > >  >
 > >  > >  > The weird thing is that it tags them (in the security log) as
 > > coming  >
 > >  > > from the master address (not the alias) out the correct interface. In
 > > a  >
 > >  > > normal world that would mean the packet would match!
 > >  > >  >  > What's goin' on here Willis?
 > >  > >  > > Difficult to tell without seeing a) ifconfig b) netstat -rn c) at
 > > least the
 > >  > > relevant firewall rule/s and d) log entries that illustrate your
 > > problem.
 > >  > > Obscure sensitive information by all means, but otherwise pretend we
 > >  > > haven't the slightest clue how your system is configured :)
 > >  >
 > >  > Fair enough.
 > >  >  > ifconfig below:
 > >  >  > bce1: flags=8843 mtu 1500
 > >  >options=3b
 > >  >inet 210.5.50.5 netmask 0xffe0 broadcast 210.5.50.31
 > > NB ..
 > >  >inet 210.5.51.32 netmask 0x broadcast 210.5.51.32
 > >  >inet 210.5.51.27 netmask 0x broadcast 210.5.51.27
 > >  >inet 210.5.51.33 netmask 0x broadcast 210.5.51.33
 > >  >inet 210.5.51.34 netmask 0x broadcast 210.5.51.34
 > >  >inet 210.5.51.42 netmask 0x broadcast 210.5.51.42
 > >  >inet 210.5.51.4 netmask 0x broadcast 210.5.51.4
 > >  >ether 00:1c:c4:c0:56:94
 > >  >media: Ethernet autoselect (1000baseSX )
 > >  >status: active
 > >  >  > Relevant /etc/rc.conf entries :
 > >  > ifconfig_bce1="inet 210.5.50.5  netmask 255.255.255.224"
 > >  > ifconfig_bce1_alias0="inet 210.5.50.5 netmask 255.255.255.224"
 > > 
 > > Your first alias here is a repeat of the 'primary' address.  ifonfig seems
 > > to have resolved/merged that above, but it's not an alias.
 > > 
 > >   
 > True. Blame that on the piece of software (Plesk) that manages the IP
 > addresses for the websites we host.

Ok in this instance.  Please copy the list on replies, for archives.

 > >  > ifconfig_bce1_alias1="inet 210.5.51.4 netmask 255.255.255.255"
 > >  > ifconfig_bce1_alias2="inet 210.5.51.27 netmask 255.255.255.255"
 > >  > ifconfig_bce1_alias3="inet 210.5.51.32 netmask 255.255.255.255"
 > >  > ifconfig_bce1_alias4="inet 210.5.51.33 netmask 255.255.255.255"
 > >  > ifconfig_bce1_alias5="inet 210.5.51.34 netmask 255.255.255.255"
 > >  > ifconfig_bce1_alias6="inet 210.5.51.42 netmask 255.255.255.255"
 > > 
 > > I didn't spot on first reading this that the first address is in a
 > > different subnet than all the others.  I'm not entirely sure whether that's
 > > relevant, or how, just pointing it out as being non-obvious, and suspecting
 > > one of the 210.5.51 subnet should show a broader netmask.
 > >   
 > I've wondered that as well but it all works EXCEPT for when ipfw is involved.

Looks like we may need to see more, if not all, of your ipfw ruleset. 

'ipfw -ted show' is pretty good for seeing everything.  try adding 'log' 
to some more rules, until you can SEE where packets are getting blocked.

Doesn't 'tcpdump -pn -i bce1 host 210.5.51.42 and host 208.69.123.164' 
provide any good clues to these flows?  Or in this case maybe better:
tcpdump -pn -i bce1 host \(210.5.51.42 or 210.5.50.5\) and host 208.69.123.164

 > >  > Relevant ipfw rules :
 > >  > ipfw -q add 02012 allow tcp from any to 208.69.123.164 80 out via bce1
 > > setup
 > >  > keep-state
 > >  > ipfw -q add 02012 allow tcp from any to 208.69.123.164 443 out via bce1
 > > setup
 > >  > keep-state

Do you have a check-state rule?  Where?  Are there any skiptos that 
might miss anything?  Do you have rules affecting established traffic?  
Sorry, but I find this too like a guessing game, or pulling teeth :)

 > > netstat -finet -rn (or -rna) please?  unclear where your default route
 > > goes, or how the 210.5.51 subnet is routed or its netmask, but assume that
 > > 208.69.123.164 is probably accessed via the default route ..
 > > 
 > >   
 > Routing tables
 > 
 > Internet:
 > DestinationGatewayFlagsRefs  Use  Netif Expire
 > default210.5.50.1 UGS 0 296628406   bce1
 > 127.0.0.1  127.0.0.1  UH  0  4339898lo0
 > 172.16.1/24link#1 UC  00   bce0
 > 172.16.1.1 00:04:28:ad:10:00  UHLW10   bce0   1035
 > 172.16.1.4 00:04:23:08:28:30  UHLW1 167202525   bce0   1189
 > 172.16.1.8 00:04:23:b2:f7:17  UHLW10   bce0   1021
 > 172.16.1.9 00:0

Re: Is there anything weird I should know about using ipfw on alias addresses?

2008-12-03 Thread Ian Smith
On Tue, 2 Dec 2008, Brett Davidson wrote:
 > Ian Smith wrote:
 > > On Mon, 01 Dec 2008 16:52:12 +1300 Brett Davidson <[EMAIL PROTECTED]>
 > > wrote:
 > > 
 > >  > ifconfig shows the alias addresses correctly bound.
 > >  > Creating an ipfw rule and testing it from the command line works  >
 > > (connects out from master address, not alias)
 > >  >  >  From website on alias address, the firewall blocks the packets.
 > >  >
 > >  > The weird thing is that it tags them (in the security log) as coming  >
 > > from the master address (not the alias) out the correct interface. In a  >
 > > normal world that would mean the packet would match!
 > >  >  > What's goin' on here Willis?
 > > 
 > > Difficult to tell without seeing a) ifconfig b) netstat -rn c) at least the
 > > relevant firewall rule/s and d) log entries that illustrate your problem.
 > > Obscure sensitive information by all means, but otherwise pretend we
 > > haven't the slightest clue how your system is configured :)
 >
 > Fair enough.
 > 
 > ifconfig below:
 > 
 > bce1: flags=8843 mtu 1500
 >options=3b
 >inet 210.5.50.5 netmask 0xffe0 broadcast 210.5.50.31
NB ..
 >inet 210.5.51.32 netmask 0x broadcast 210.5.51.32
 >inet 210.5.51.27 netmask 0x broadcast 210.5.51.27
 >inet 210.5.51.33 netmask 0x broadcast 210.5.51.33
 >inet 210.5.51.34 netmask 0x broadcast 210.5.51.34
 >inet 210.5.51.42 netmask 0x broadcast 210.5.51.42
 >inet 210.5.51.4 netmask 0x broadcast 210.5.51.4
 >ether 00:1c:c4:c0:56:94
 >media: Ethernet autoselect (1000baseSX )
 >status: active
 > 
 > Relevant /etc/rc.conf entries :
 > ifconfig_bce1="inet 210.5.50.5  netmask 255.255.255.224"
 > ifconfig_bce1_alias0="inet 210.5.50.5 netmask 255.255.255.224"

Your first alias here is a repeat of the 'primary' address.  ifonfig 
seems to have resolved/merged that above, but it's not an alias.

 > ifconfig_bce1_alias1="inet 210.5.51.4 netmask 255.255.255.255"
 > ifconfig_bce1_alias2="inet 210.5.51.27 netmask 255.255.255.255"
 > ifconfig_bce1_alias3="inet 210.5.51.32 netmask 255.255.255.255"
 > ifconfig_bce1_alias4="inet 210.5.51.33 netmask 255.255.255.255"
 > ifconfig_bce1_alias5="inet 210.5.51.34 netmask 255.255.255.255"
 > ifconfig_bce1_alias6="inet 210.5.51.42 netmask 255.255.255.255"

I didn't spot on first reading this that the first address is in a 
different subnet than all the others.  I'm not entirely sure whether 
that's relevant, or how, just pointing it out as being non-obvious, and 
suspecting one of the 210.5.51 subnet should show a broader netmask.

 > Relevant ipfw rules :
 > ipfw -q add 02012 allow tcp from any to 208.69.123.164 80 out via bce1 setup
 > keep-state
 > ipfw -q add 02012 allow tcp from any to 208.69.123.164 443 out via bce1 setup
 > keep-state

netstat -finet -rn (or -rna) please?  unclear where your default route 
goes, or how the 210.5.51 subnet is routed or its netmask, but assume 
that 208.69.123.164 is probably accessed via the default route ..

 > Interesting entries in /var/log/security :
 > Dec  1 16:42:25  kernel: ipfw:  Deny TCP 210.5.50.5:49708
 > 208.69.123.164:80 out via bce1

Did that occur =after= the above rules were installed?  Just the one?  
Seems odd on face value, but without knowing what your other rules do.

 > What makes this interesting is that I can connect to that port via the
 > command line.

You mean like with 'telnet 208.69.123.164 80' ?  With 210.5.50.5 as 
source address?  tcpdump output may help understand or explain this.

 > It's the website that lives on 210.5.51.42 that is having problems. Why, if
 > the rule is valid enough for the command line is it having problems from an
 > aliased address?

Hang on; do you mean you're having a webserver on 210.5.51.42 trying to 
connect out to another webserver on 208.69.123.164 ?  If not, what?

I guess you have rules allowing inbound port 80 access to 210.5.51.42 ?

And that your upstream is routing 210.5.51.42/something to 210.5.50.5 ?

 > This MUST have something to do with the way ipfw is working with aliased
 > addresses but I'm blowed if I know what is wrong.

ipfw doesn't do anything different with any address in particular except 
when using the forward action.  ipfw certainly has no concept of primary 
or alias addresses, it just applies the addresses/masks you specify.

Nor does ipfw know or care (even when forwarding) whence the stack is 
next going to route outbound packets .. but netstat -rn will tell us.

cheers, Ian
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: Is there anything weird I should know about using ipfw on alias addresses?

2008-12-01 Thread Brett Davidson

Ian Smith wrote:

On Mon, 01 Dec 2008 16:52:12 +1300 Brett Davidson <[EMAIL PROTECTED]> wrote:

 > ifconfig shows the alias addresses correctly bound.
 > Creating an ipfw rule and testing it from the command line works 
 > (connects out from master address, not alias)
 > 
 >  From website on alias address, the firewall blocks the packets.

 >
 > The weird thing is that it tags them (in the security log) as coming 
 > from the master address (not the alias) out the correct interface. In a 
 > normal world that would mean the packet would match!
 > 
 > What's goin' on here Willis?


Difficult to tell without seeing a) ifconfig b) netstat -rn c) at least 
the relevant firewall rule/s and d) log entries that illustrate your 
problem.  Obscure sensitive information by all means, but otherwise 
pretend we haven't the slightest clue how your system is configured :)


cheers, Ian


  

Fair enough.

ifconfig below:

bce1: flags=8843 mtu 1500
  options=3b
  inet 210.5.50.5 netmask 0xffe0 broadcast 210.5.50.31
  inet 210.5.51.32 netmask 0x broadcast 210.5.51.32
  inet 210.5.51.27 netmask 0x broadcast 210.5.51.27
  inet 210.5.51.33 netmask 0x broadcast 210.5.51.33
  inet 210.5.51.34 netmask 0x broadcast 210.5.51.34
  inet 210.5.51.42 netmask 0x broadcast 210.5.51.42
  inet 210.5.51.4 netmask 0x broadcast 210.5.51.4
  ether 00:1c:c4:c0:56:94
  media: Ethernet autoselect (1000baseSX )
  status: active

Relevant /etc/rc.conf entries :
ifconfig_bce1="inet 210.5.50.5  netmask 255.255.255.224"
ifconfig_bce1_alias0="inet 210.5.50.5 netmask 255.255.255.224"
ifconfig_bce1_alias1="inet 210.5.51.4 netmask 255.255.255.255"
ifconfig_bce1_alias2="inet 210.5.51.27 netmask 255.255.255.255"
ifconfig_bce1_alias3="inet 210.5.51.32 netmask 255.255.255.255"
ifconfig_bce1_alias4="inet 210.5.51.33 netmask 255.255.255.255"
ifconfig_bce1_alias5="inet 210.5.51.34 netmask 255.255.255.255"
ifconfig_bce1_alias6="inet 210.5.51.42 netmask 255.255.255.255"

Relevant ipfw rules :
ipfw -q add 02012 allow tcp from any to 208.69.123.164 80 out via bce1 
setup keep-state
ipfw -q add 02012 allow tcp from any to 208.69.123.164 443 out via bce1 
setup keep-state


Interesting entries in /var/log/security :
Dec  1 16:42:25  kernel: ipfw:  Deny TCP 
210.5.50.5:49708 208.69.123.164:80 out via bce1


What makes this interesting is that I can connect to that port via the 
command line.


It's the website that lives on 210.5.51.42 that is having problems. Why, 
if the rule is valid enough for the command line is it having problems 
from an aliased address?
This MUST have something to do with the way ipfw is working with aliased 
addresses but I'm blowed if I know what is wrong.


Cheers
Brett.
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: Is there anything weird I should know about using ipfw on alias addresses?

2008-12-01 Thread Ian Smith
On Mon, 01 Dec 2008 16:52:12 +1300 Brett Davidson <[EMAIL PROTECTED]> wrote:

 > ifconfig shows the alias addresses correctly bound.
 > Creating an ipfw rule and testing it from the command line works 
 > (connects out from master address, not alias)
 > 
 >  From website on alias address, the firewall blocks the packets.
 >
 > The weird thing is that it tags them (in the security log) as coming 
 > from the master address (not the alias) out the correct interface. In a 
 > normal world that would mean the packet would match!
 > 
 > What's goin' on here Willis?

Difficult to tell without seeing a) ifconfig b) netstat -rn c) at least 
the relevant firewall rule/s and d) log entries that illustrate your 
problem.  Obscure sensitive information by all means, but otherwise 
pretend we haven't the slightest clue how your system is configured :)

cheers, Ian
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Is there anything weird I should know about using ipfw on alias addresses?

2008-11-30 Thread Brett Davidson

ifconfig shows the alias addresses correctly bound.
Creating an ipfw rule and testing it from the command line works 
(connects out from master address, not alias)


From website on alias address, the firewall blocks the packets.

The weird thing is that it tags them (in the security log) as coming 
from the master address (not the alias) out the correct interface. In a 
normal world that would mean the packet would match!


What's goin' on here Willis?

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: how to reject all mac addresses except some mac addresses using ipfw?

2008-06-25 Thread Ian Smith
On Tue, 24 Jun 2008 12:23:48 -0700 Chris St Denis <[EMAIL PROTECTED]> wrote:
 > Yavuz Maslak wrote:
 > > I use ipfw on freebsd7.
 > >
 > > I have two questions
 > >
 > > 1- I want to fix an ip address for each mac address. But some pc
 > > and servers have more than an ip address. How can I map multiple ip
 > > addresses for a mac address? 
 > > 2- I want to allow these fixed mac addresses using ipfw. After that
 > > I want to deny all mac address via the server's local ethernet card. 
 > > How can I do these cases? 

 > I haven't used ipfw for mac level filtering before, but it looks like 
 > the syntax is.
 > 
 > ipfw add allow MAC  any
 > ipfw add allow MAC  any
 > ipfw add allow MAC  any
 > ipfw add deny MAC any any
 > 
 > You'll probably have to include the server's own MAC in that list.

Firstly, a similar caveat; I haven't actually used this myself yet, but
scanning ipfw(8) for 'mac|MAC' reveals that it's not quite so simple.

You need to separate layer2 packets that have an associated MAC address,
from layer3 packets, that don't.  To filter layer2 packets you need to
set sysctl net.link.ether.ipfw=1 'Controls whether layer-2 packets are
passed to ipfw. Default is no (0)'  With this set, ipfw will be invoked
twice on each incoming packet, and twice on each outgoing one.

Testing here just on the input path, perhaps .. see ipfw(8):

# packets from ether_demux or bdg_forward
ipfw add 10 skipto 1000 all from any to any layer2 in recv $some_if
# packets from ip_input (layer 3)
ipfw add 10 skipto 2000 all from any to any not layer2 in recv $some_if
[.. see ipfw(8) example ..]

# incoming packets from ether_demux, having a mac address, on $some_if
# first example re Q1, two IP addresses having the same MAC (aliases?)
ipaddr1='192.168.0.30'
ipaddr2='192.168.0.31'  # or could use a list, or a table ..
srcmac1='de:ad:be:ef:c0:de'
ipaddr3='192.168.0.50'
srcmac3='de:af:fe:ca:dd:ed'
[..]
ipfw add 1000 skipto 1500 all from $ipaddr1 to any MAC any $srcmac1
ipfw add 1001 skipto 1500 all from $ipaddr2 to any MAC any $srcmac1
# another box
ipfw add 1010 skipto 1500 all from $ipaddr3 to any MAC any $srcmac3
[..]
ipfw add 1490 deny log all from any to any  # unknown MAC/IP pairs
ipfw add 1500 allow all from any to any   # proceed to layer 3 pass ..
[..]
ipfw add 2000 [.. layer 3 filtering as per usual ..]

Note that MAC addresses are specified dst-mac first, then src-mac, and
that you will also need to allow, if not check, outgoing layer2 pkts.

Completely untested: may contain syntax errors, traces of nuts, etc.

cheers, Ian

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: how to reject all mac addresses except some mac addresses using ipfw?

2008-06-24 Thread Chris St Denis

Yavuz Maslak wrote:

I use ipfw on freebsd7.

I have two questions

1- I want to fix an ip address for each mac address. But some pc and servers 
have more than an ip address. How can I map multiple ip addresses for a mac 
address?
2- I want to allow these fixed mac addresses using ipfw. After that I want to 
deny all mac address via the server's local ethernet card.  How can I do these 
cases?

Thanks

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

  
I haven't used ipfw for mac level filtering before, but it looks like 
the syntax is.


ipfw add allow MAC  any
ipfw add allow MAC  any
ipfw add allow MAC  any
ipfw add deny MAC any any

You'll probably have to include the server's own MAC in that list.


--
Chris St Denis
Programmer
SmarttNet (www.smartt.com)
Ph: 604-473-9700 Ext. 200
---
"Smart Internet Solutions For Businesses" 


___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: how to reject all mac addresses except some mac addresses using ipfw?

2008-06-24 Thread sfourman
would you have a working example on how to deny traffic from a mac
address if it is not using a allowed ip address.. I would like to use
pf

On 6/24/08, Chuck Swiger <[EMAIL PROTECTED]> wrote:
> On Jun 24, 2008, at 10:26 AM, Yavuz Maslak wrote:
>> 1- I want to fix an ip address for each mac address. But some pc and
>> servers have more than an ip address. How can I map multiple ip
>> addresses for a mac address?
>
> Most people use ifconfig, perhaps indirectly via /etc/rc.conf.
>
>> 2- I want to allow these fixed mac addresses using ipfw. After that
>> I want to deny all mac address via the server's local ethernet
>> card.  How can I do these cases?
>
> Few choose to go that route, but you can disable ARP and set up /etc/
> ethers, or you could even fire up your favorite firewall (IPFW, PF,
> whatever), and add allow rules for the permitted MAC addresses, and
> deny all others.
>
> --
> -Chuck
>
> ___
> freebsd-questions@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to "[EMAIL PROTECTED]"
>
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: how to reject all mac addresses except some mac addresses using ipfw?

2008-06-24 Thread Chuck Swiger

[ ...please don't top-post... ]

On Jun 24, 2008, at 11:42 AM, Yavuz Maslak wrote:

But  I should have asked different my first question.
I have meant that how can I restrict to use an ip address which I  
already

assigned to a computer, anyone can use at his pc?


There is nothing which can prevent someone from configuring a machine  
to use any IP address they want to set, assuming they have admin  
access to that machine.


Normally, you don't grant physical access to your network for people  
you don't trust, but if you need to provide network access to  
untrustworthy systems, then you need to look into setting up access  
control via VLANs, or maybe PPPoE, or something similar where you can  
isolate their network and only let their traffic talk to other things  
if they connect "properly"...


Regards,
--
-Chuck

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: how to reject all mac addresses except some mac addresses using ipfw?

2008-06-24 Thread Chuck Swiger

On Jun 24, 2008, at 10:26 AM, Yavuz Maslak wrote:
1- I want to fix an ip address for each mac address. But some pc and  
servers have more than an ip address. How can I map multiple ip  
addresses for a mac address?


Most people use ifconfig, perhaps indirectly via /etc/rc.conf.

2- I want to allow these fixed mac addresses using ipfw. After that  
I want to deny all mac address via the server's local ethernet  
card.  How can I do these cases?


Few choose to go that route, but you can disable ARP and set up /etc/ 
ethers, or you could even fire up your favorite firewall (IPFW, PF,  
whatever), and add allow rules for the permitted MAC addresses, and  
deny all others.


--
-Chuck

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


how to reject all mac addresses except some mac addresses using ipfw?

2008-06-24 Thread Yavuz Maslak
I use ipfw on freebsd7.

I have two questions

1- I want to fix an ip address for each mac address. But some pc and servers 
have more than an ip address. How can I map multiple ip addresses for a mac 
address?
2- I want to allow these fixed mac addresses using ipfw. After that I want to 
deny all mac address via the server's local ethernet card.  How can I do these 
cases?

Thanks

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: Limit # of connections per IP using ipfw?

2008-02-13 Thread patrick
Perfect, thanks!

On Feb 13, 2008 10:14 AM, Christopher Cowart
<[EMAIL PROTECTED]> wrote:
>
> On Wed, Feb 13, 2008 at 09:23:31AM -0800, patrick wrote:
> > Is there a way to limit the number of TCP connections from a
> > particular IP at a given time using ipfw? We are running Cyrus IMAP on
> > FreeBSD 6.2, and are sometimes subject to POP3 brute force login
> > attacks. I'm not sure if it's Cyrus or the SASL SQL plugin, but these
> > attacks grind the server to halt (the load level goes up beyond 350!).
> > The database against which authentication takes places is on a
> > separate server, so I know it's not MySQL's fault. I'd like to be able
> > to set a firewall rule to set a reasonable limit per IP for these
> > sorts of connections. I know that pf can do it, and I'm in the process
> > of figuring out how to migrate all of our stuff over to pf, but in the
> > meantime, I'd like to try to do this with ipfw.
>
> You can use limit rules. This should do the trick:
>
> # ipfw add allow tcp from any to me pop3s limit src-addr 5
>
> Check the ipfw man page section on limit for more info (though it's
> pretty brief).
>
> --
> Chris Cowart
> Network Technical Lead
> Network & Infrastructure Services, RSSP-IT
> UC Berkeley
>
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: Limit # of connections per IP using ipfw?

2008-02-13 Thread Christopher Cowart
On Wed, Feb 13, 2008 at 09:23:31AM -0800, patrick wrote:
> Is there a way to limit the number of TCP connections from a
> particular IP at a given time using ipfw? We are running Cyrus IMAP on
> FreeBSD 6.2, and are sometimes subject to POP3 brute force login
> attacks. I'm not sure if it's Cyrus or the SASL SQL plugin, but these
> attacks grind the server to halt (the load level goes up beyond 350!).
> The database against which authentication takes places is on a
> separate server, so I know it's not MySQL's fault. I'd like to be able
> to set a firewall rule to set a reasonable limit per IP for these
> sorts of connections. I know that pf can do it, and I'm in the process
> of figuring out how to migrate all of our stuff over to pf, but in the
> meantime, I'd like to try to do this with ipfw.

You can use limit rules. This should do the trick:

# ipfw add allow tcp from any to me pop3s limit src-addr 5

Check the ipfw man page section on limit for more info (though it's
pretty brief).

-- 
Chris Cowart
Network Technical Lead
Network & Infrastructure Services, RSSP-IT
UC Berkeley


pgpQqf8woDCZ5.pgp
Description: PGP signature


Limit # of connections per IP using ipfw?

2008-02-13 Thread patrick
Is there a way to limit the number of TCP connections from a
particular IP at a given time using ipfw? We are running Cyrus IMAP on
FreeBSD 6.2, and are sometimes subject to POP3 brute force login
attacks. I'm not sure if it's Cyrus or the SASL SQL plugin, but these
attacks grind the server to halt (the load level goes up beyond 350!).
The database against which authentication takes places is on a
separate server, so I know it's not MySQL's fault. I'd like to be able
to set a firewall rule to set a reasonable limit per IP for these
sorts of connections. I know that pf can do it, and I'm in the process
of figuring out how to migrate all of our stuff over to pf, but in the
meantime, I'd like to try to do this with ipfw.

Thanks,

Patrick
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: Blocking traffic by Mac address using IPFW

2007-01-27 Thread Tek Bahadur Limbu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Thu, 25 Jan 2007 08:22:17 -0600
Kevin Kinsey <[EMAIL PROTECTED]> wrote:

> Tek Bahadur Limbu wrote:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA1
> > 
> > 
> > Dear All,
> > 
> > I need some help regarding using IPFW to block specific MAC
> > addresses. How do I block incoming traffic by a MAC address instead
> > of an IP address.
> > 
> > Can this be done using IPFW? Since I am quite new to FreeBSD, can
> > somebody shed some light on this issue?
> 
> Yes, it appears that ipfw(8) can do this --- check the manpage (quite
> a ways down, in the RULE OPTIONS section [ about byte 45000] for full 
> details; note also that there may be other issues involved.  Here is
> a short thread on the subject from a couple of years ago:
> 
> http://lists.freebsd.org/pipermail/freebsd-ipfw/2004-September/001375.html
> 
> Disclaimer: IANAE, and don't play one on television ;-)
> 
> HTH,
> 
> Kevin Kinsey
> -- 
> Heisenberg may have been here.
> 

Dear Kevin,

Thanks. I am looking at the links you provided.

- -- 


With best regards and good wishes,

Yours sincerely,

Tek Bahadur Limbu

(TAG/TDG Group)
Jwl Systems Department

Worldlink Communications Pvt. Ltd.

Jawalakhel, Nepal
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2.2 (FreeBSD)

iD8DBQFFvDTfVrOl+eVhOvYRAr8+AJ9cRvI687IxBsQwMsoW+gDRBvxUcwCfV8ed
RjZgBkI1c0m8SlB6cE3jJho=
=PIHo
-END PGP SIGNATURE-
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: Blocking traffic by Mac address using IPFW

2007-01-25 Thread Kevin Kinsey

Tek Bahadur Limbu wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Dear All,

I need some help regarding using IPFW to block specific MAC addresses.
How do I block incoming traffic by a MAC address instead of an IP
address.

Can this be done using IPFW? Since I am quite new to FreeBSD, can
somebody shed some light on this issue?


Yes, it appears that ipfw(8) can do this --- check the manpage (quite a 
ways down, in the RULE OPTIONS section [ about byte 45000] for full 
details; note also that there may be other issues involved.  Here is a 
short thread on the subject from a couple of years ago:


http://lists.freebsd.org/pipermail/freebsd-ipfw/2004-September/001375.html

Disclaimer: IANAE, and don't play one on television ;-)

HTH,

Kevin Kinsey
--
Heisenberg may have been here.
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Blocking traffic by Mac address using IPFW

2007-01-25 Thread Tek Bahadur Limbu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Dear All,

I need some help regarding using IPFW to block specific MAC addresses.
How do I block incoming traffic by a MAC address instead of an IP
address.

Can this be done using IPFW? Since I am quite new to FreeBSD, can
somebody shed some light on this issue?




- -- 


With best regards and good wishes,

Yours sincerely,

Tek Bahadur Limbu

(TAG/TDG Group)
Jwl Systems Department

Worldlink Communications Pvt. Ltd.

Jawalakhel, Nepal
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2.2 (FreeBSD)

iD8DBQFFuH/RVrOl+eVhOvYRAhdCAJwLVoPRkuw1gTXosLDsIC0HQUsoYgCeK402
90HvaqCMIcg9T7GzGl1PlDs=
=7Mft
-END PGP SIGNATURE-
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: Using IPFW to bypass hotmail.com

2007-01-09 Thread Tek Bahadur Limbu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


On Tue, 9 Jan 2007 15:28:44 +0100 (CET)
Oliver Fromme <[EMAIL PROTECTED]> wrote:

> Tek Bahadur Limbu wrote:
>  > I run a transparent squid proxy using IPFW below:
>  > 
>  > ipfw -q add allow tcp  from 192.168.55.0/24 to any  3128 in via
>  > bge0
> 
> That's not the rule for transparent proxying.  For that you
> need a "forward" (or "fwd") rule, not an "allow" rule.
> (Of course, the "allow" rule above might still be needed,
> but it's not the one that actually enables the transparent
> proxying).
> 
>  > Now I want the IP: 192.168.55.22 to bypass Squid when requesting
>  > www.hotmail.com.
>  > 
>  > How do I go about doing this using IPFW? Can somebody shed some
>  > light on this issue?
> 
> Simply add an "allow" rule for that IP, and place it
> _before_ the "forward" (or "fwd") rule in your rule set:
> 
> allow tcp from 192.168.55.22 to www.hotmail.com
> 
> Note that the hostname is not resolved dynamically, but
> at the time the rule is added to teh rule set.
> 
> Best regards
>Oliver
> 
> -- 
> Oliver Fromme,  secnetix GmbH & Co. KG, Marktplatz 29, 85567 Grafing
> Dienstleistungen mit Schwerpunkt FreeBSD: http://www.secnetix.de/bsd
> Any opinions expressed in this message may be personal to the author
> and may not necessarily reflect the opinions of secnetix in any way.
> 
> "To this day, many C programmers believe that 'strong typing'
> just means pounding extra hard on the keyboard."
> -- Peter van der Linden
> ___
> freebsd-questions@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to
> "[EMAIL PROTECTED]"
> 

Dear Oliver Fromme,

Thanks for your input. I really appreciate it. I have rechecked my
firewall and I do have the following rule:

$IPFW add fwd 127.0.0.1,3128 tcp from any to any 80 in


I have place your rule on top of the above rules like this:

ipfw -q allow tcp from 192.168.55.22 to www.hotmail.com
ipfw -a add fwd 127.0.0.1,3128 tcp from any to any 80 in
ipfw -q add allow tcp  from 192.168.55.0/24 to any  3128 in via bge0

Are the above rules correct ?


Once again, thanks alot.



 -- 


With best regards and good wishes,

Yours sincerely,

Tek Bahadur Limbu

(TAG/TDG Group)
Jwl Systems Department

Worldlink Communications Pvt. Ltd.

Jawalakhel, Nepal
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2.2 (FreeBSD)

iD8DBQFFpJc4VrOl+eVhOvYRAigpAJ9WDSsy7CsXtCI9qKwXLqsujnmHXQCcDstb
wwjEiMWm0P280aBFuhDsq+0=
=Vcsn
-END PGP SIGNATURE-
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: Using IPFW to bypass hotmail.com

2007-01-09 Thread Oliver Fromme
Tek Bahadur Limbu wrote:
 > I run a transparent squid proxy using IPFW below:
 > 
 > ipfw -q add allow tcp  from 192.168.55.0/24 to any  3128 in via bge0

That's not the rule for transparent proxying.  For that you
need a "forward" (or "fwd") rule, not an "allow" rule.
(Of course, the "allow" rule above might still be needed,
but it's not the one that actually enables the transparent
proxying).

 > Now I want the IP: 192.168.55.22 to bypass Squid when requesting
 > www.hotmail.com.
 > 
 > How do I go about doing this using IPFW? Can somebody shed some light
 > on this issue?

Simply add an "allow" rule for that IP, and place it
_before_ the "forward" (or "fwd") rule in your rule set:

allow tcp from 192.168.55.22 to www.hotmail.com

Note that the hostname is not resolved dynamically, but
at the time the rule is added to teh rule set.

Best regards
   Oliver

-- 
Oliver Fromme,  secnetix GmbH & Co. KG, Marktplatz 29, 85567 Grafing
Dienstleistungen mit Schwerpunkt FreeBSD: http://www.secnetix.de/bsd
Any opinions expressed in this message may be personal to the author
and may not necessarily reflect the opinions of secnetix in any way.

"To this day, many C programmers believe that 'strong typing'
just means pounding extra hard on the keyboard."
-- Peter van der Linden
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Using IPFW to bypass hotmail.com

2007-01-09 Thread Tek Bahadur Limbu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Dear All,

I run a transparent squid proxy using IPFW below:

ipfw -q add allow tcp  from 192.168.55.0/24 to any  3128 in via bge0

Now I want the IP: 192.168.55.22 to bypass Squid when requesting
www.hotmail.com.

How do I go about doing this using IPFW? Can somebody shed some light
on this issue?

Thanks.


- -- 


With best regards and good wishes,

Yours sincerely,

Tek Bahadur Limbu

(TAG/TDG Group)
Jwl Systems Department

Worldlink Communications Pvt. Ltd.

Jawalakhel, Nepal
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2.2 (FreeBSD)

iD8DBQFFo3IGVrOl+eVhOvYRAliLAJsEHVzJ/5517Jh4VO89dncftAU6GACgqsXo
cBxfF4URRL+dh5jiqaxZQAE=
=KwVZ
-END PGP SIGNATURE-
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


using ipfw for NAT mapping in a 1:1 fake:real IPs for VPN

2006-11-13 Thread James Bakner

Hi,

I have a pretty complicated setup currently and am trying to figure out 
exactly how to implement it.  I'm pretty unfamiliar with freebsd, the 
last incarnation I used was 4.3 and I only used it for a few months 
before moving to linux.


I have a VPN setup for an IP range 10.0.0.1-10.0.0.255 for clients 
connecting using OpenVPN.


Now I am  handling NAT for these up to 5 IPs.  I have 5 real IPs that 
are allocated to the machine that the VPN server runs on (OpenVPN).  I 
need each client to have a real and unique IP, although not from the 
client's viewpoint.


From my understanding, I would get OpenVPN to give out IPs 
10.0.0.1-10.0.0.5. 

I would then set up rather than a standard NAT for like 192.168.0.0/24 
through A.B.C.D (single real IP)


I would now set up
nat 10.0.0.1 through A.B.C.D
nat 10.0.0.2 through A.B.C.E etc

Does this make sense and am I missing something?  These would be going 
through BSD's tun-type device.


Thanks,

-James
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: Using IPFW to redirect all outgoing SMTP traffic to localhost

2006-06-22 Thread Chuck Swiger

Kieran Simkin wrote:

I have an IPFW question that I'm a bit stuck on and
could do with some help. Basically what I'm trying to do is count and
limit the number of e-mails each user on the system is allowed to send.
I've got this working fine within the e-mail server and everything's
dandy, except for the fact that it's easy to bypass the mail server by
making direct SMTP connections to the target hosts. 


Yes.  Use the firewall to do something like:

ipfw add pass tcp from any to MAILSERVER 25 keep-state
ipfw add pass tcp from MAILSERVER to any 25 keep-state
ipfw add unreach filter-prohib log tcp from any to any 25

(I suppose you could use a deny instead, but getting an actual ICMP error is 
probably more useful in this situation)


--
-Chuck

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Using IPFW to redirect all outgoing SMTP traffic to localhost

2006-06-22 Thread Kieran Simkin



Hi Guys,
I have an IPFW question that I'm a bit stuck on and
could do with some help. Basically what I'm trying to do is count and
limit the number of e-mails each user on the system is allowed to send.
I've got this working fine within the e-mail server and everything's
dandy, except for the fact that it's easy to bypass the mail server by
making direct SMTP connections to the target hosts. 
What I need to
be able to do is force all connections to any host on port 25 to be
redirected to localhost. Ideally I'd just be able to forward all outgoing
connections with dst port 25 to localhost. If this is not possible, I
would be happy to simply firewall all outbound traffic with dst port
25.
 There is a caveat:
I need port 25 redirection/blocking to
occur for all users except those which I name (ie, the mailserver and
certain admin users). Of course, the mail server must be able to send
e-mail to external hosts, and I'd like certain other users on the system
to be able to do this as well.
To be honest I'm not really sure
where to start writing an IPFW rule to do this - and pointers would be
greatly appreciated.
Best regards,

~Kieran Simkin
Digital Crocus
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: IP Banning (Using IPFW)

2006-02-09 Thread Daniel A.
On 2/9/06, Chris <[EMAIL PROTECTED]> wrote:
> On 07/02/06, David Scheidt <[EMAIL PROTECTED]> wrote:
> >
> > On Tue, Feb 07, 2006 at 12:40:22AM +0200, Atis wrote:
> > > On Sun, 5 Feb 2006 18:55:13 -0500
> > > David Scheidt <[EMAIL PROTECTED]> wrote:
> > >
> > > >
> > > > Nonsense.  There may be some people that only scan well-known ports,
> > > > but it's much more common to scan every port on a machine.  If you're
> > > > running a server on a non-standard port, an attacker will find it.
> > > >
> > >
> > > sure, but 99% of the time the machines attacking your server are zombies
> > > that do not care to do a full portscan. i suppose the purpose is to
> > > find other misconfigured, easy-to-hack computers on the network. by
> > > putting your services on non-standard ports you get rid of these
> > > mindless drones and don't pollute log files with useless garbage.
> > >
> > > now if somebody _does_ actually target your server in particular then
> > > this is definitely not the solution.
> > >
> > > anywayz, putting things on non-standard ports helps a lot, and is
> > > one of the first and easiest security measures an administrator
> > > may consider.
> > >
> >
> > Taking your clothes off and painting yourself blue is also one of the
> > first and easiest security measures to consider.  It's even more
> > effective, too.  I know of no machine that's been cracked that had a
> > wheel naked and painted blue.  I've seen lots running standard
> > services on non-standard ports.
> >
> > Security through obscurity doesn't work, it makes tracking down
> > other problems harder, and creates work to maintain non-standard
> > configurations.
>
>
> I understand his point, I see 2 types of problems we have to deal with.  The
> thousands of drones that scan for boxes that are vulnerable to a specific
> exploit, they will often scan ip ranges on a specific port and if its open
> see if its vulnerable.  For these types of intruders chnging ports is very
> effective since you would simply be skipped past on their scan, for most of
> us 99% of attempted intrusions are zombie based or some script a kid has
> downloaded of the web.
>
> The argument against changing ports is of course when you have a persistent
> hacker who wants in, he will of course scan all the ports and find the
> service and this type of protection is nullified.  In this scenario if you
> havent taken additional measures to secure the box then you may be in
> trouble,
>
> I personally move things like sshd of its normal port simply to stop my logs
> been flooded with brute force logins and since I am the only one who uses
> ssh there is no downside to it, I of course dont rely on this alone and keep
> my software up to date amongst other security measures it is simply an extra
> layer of skin on the onion.  For things like httpd I keep on port 80 as I
> think moving the port of that is more hassle then its worth.
I've seen someone mention how to move httpd to a non-reserved port (ie
8080), and let that change be transparent for the end-user by using
ipf. I dont know how, though.
>
> Chris
> ___
> freebsd-questions@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to "[EMAIL PROTECTED]"
>
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: IP Banning (Using IPFW)

2006-02-08 Thread Chris
On 07/02/06, David Scheidt <[EMAIL PROTECTED]> wrote:
>
> On Tue, Feb 07, 2006 at 12:40:22AM +0200, Atis wrote:
> > On Sun, 5 Feb 2006 18:55:13 -0500
> > David Scheidt <[EMAIL PROTECTED]> wrote:
> >
> > >
> > > Nonsense.  There may be some people that only scan well-known ports,
> > > but it's much more common to scan every port on a machine.  If you're
> > > running a server on a non-standard port, an attacker will find it.
> > >
> >
> > sure, but 99% of the time the machines attacking your server are zombies
> > that do not care to do a full portscan. i suppose the purpose is to
> > find other misconfigured, easy-to-hack computers on the network. by
> > putting your services on non-standard ports you get rid of these
> > mindless drones and don't pollute log files with useless garbage.
> >
> > now if somebody _does_ actually target your server in particular then
> > this is definitely not the solution.
> >
> > anywayz, putting things on non-standard ports helps a lot, and is
> > one of the first and easiest security measures an administrator
> > may consider.
> >
>
> Taking your clothes off and painting yourself blue is also one of the
> first and easiest security measures to consider.  It's even more
> effective, too.  I know of no machine that's been cracked that had a
> wheel naked and painted blue.  I've seen lots running standard
> services on non-standard ports.
>
> Security through obscurity doesn't work, it makes tracking down
> other problems harder, and creates work to maintain non-standard
> configurations.


I understand his point, I see 2 types of problems we have to deal with.  The
thousands of drones that scan for boxes that are vulnerable to a specific
exploit, they will often scan ip ranges on a specific port and if its open
see if its vulnerable.  For these types of intruders chnging ports is very
effective since you would simply be skipped past on their scan, for most of
us 99% of attempted intrusions are zombie based or some script a kid has
downloaded of the web.

The argument against changing ports is of course when you have a persistent
hacker who wants in, he will of course scan all the ports and find the
service and this type of protection is nullified.  In this scenario if you
havent taken additional measures to secure the box then you may be in
trouble,

I personally move things like sshd of its normal port simply to stop my logs
been flooded with brute force logins and since I am the only one who uses
ssh there is no downside to it, I of course dont rely on this alone and keep
my software up to date amongst other security measures it is simply an extra
layer of skin on the onion.  For things like httpd I keep on port 80 as I
think moving the port of that is more hassle then its worth.

Chris
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: IP Banning (Using IPFW)

2006-02-06 Thread David Scheidt
On Tue, Feb 07, 2006 at 12:40:22AM +0200, Atis wrote:
> On Sun, 5 Feb 2006 18:55:13 -0500
> David Scheidt <[EMAIL PROTECTED]> wrote:
> 
> > 
> > Nonsense.  There may be some people that only scan well-known ports,
> > but it's much more common to scan every port on a machine.  If you're
> > running a server on a non-standard port, an attacker will find it.
> > 
> 
> sure, but 99% of the time the machines attacking your server are zombies
> that do not care to do a full portscan. i suppose the purpose is to
> find other misconfigured, easy-to-hack computers on the network. by
> putting your services on non-standard ports you get rid of these
> mindless drones and don't pollute log files with useless garbage.
> 
> now if somebody _does_ actually target your server in particular then
> this is definitely not the solution.
> 
> anywayz, putting things on non-standard ports helps a lot, and is
> one of the first and easiest security measures an administrator
> may consider.
> 

Taking your clothes off and painting yourself blue is also one of the
first and easiest security measures to consider.  It's even more
effective, too.  I know of no machine that's been cracked that had a
wheel naked and painted blue.  I've seen lots running standard
services on non-standard ports.

Security through obscurity doesn't work, it makes tracking down
other problems harder, and creates work to maintain non-standard
configurations.

David
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: IP Banning (Using IPFW)

2006-02-06 Thread Atis
On Sun, 5 Feb 2006 18:55:13 -0500
David Scheidt <[EMAIL PROTECTED]> wrote:

> 
> Nonsense.  There may be some people that only scan well-known ports,
> but it's much more common to scan every port on a machine.  If you're
> running a server on a non-standard port, an attacker will find it.
> 

sure, but 99% of the time the machines attacking your server are zombies
that do not care to do a full portscan. i suppose the purpose is to
find other misconfigured, easy-to-hack computers on the network. by
putting your services on non-standard ports you get rid of these
mindless drones and don't pollute log files with useless garbage.

now if somebody _does_ actually target your server in particular then
this is definitely not the solution.

anywayz, putting things on non-standard ports helps a lot, and is
one of the first and easiest security measures an administrator
may consider.


Atis
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: IP Banning (Using IPFW)

2006-02-05 Thread David Scheidt
On Sun, Feb 05, 2006 at 05:38:11PM -0500, fbsd_user wrote:
> 
> You missed to whole meaning.
> Attackers only scan for the published service port numbers,
> that is what is meant by "portscan the box".
> Those high order port numbers are dynamically
> used during normal session conversation.
> So any response from those port numbers if an
> attacker scanned that high would be meaningless.
> Please check your facts before commenting.

Nonsense.  There may be some people that only scan well-known ports,
but it's much more common to scan every port on a machine.  If you're
running a server on a non-standard port, an attacker will find it.

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: IP Banning (Using IPFW)

2006-02-05 Thread Daniel A.
I know for a fact, that if a hacker wants to root a box, the first and
least thing he does is to
nmap -p1-65535 -Avv host
And yeah, it does detect services on unusual ports. And regardless of
what you say, assigning nondefault ports is security through
obscurity.

On 2/5/06, fbsd_user <[EMAIL PROTECTED]> wrote:
> You missed to whole meaning.
> Attackers only scan for the published service port numbers,
> that is what is meant by "portscan the box".
> Those high order port numbers are dynamically
> used during normal session conversation.
> So any response from those port numbers if an
> attacker scanned that high would be meaningless.
> Please check your facts before commenting.
>
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] Behalf Of Daniel A.
> Sent: Sunday, February 05, 2006 4:58 PM
> To: [EMAIL PROTECTED]
> Cc: [EMAIL PROTECTED]; Michael A. Alestock
> Subject: Re: IP Banning (Using IPFW)
>
>
> On 2/5/06, fbsd_user <[EMAIL PROTECTED]> wrote:
> > I find this kind of approach is treating the symptom and not the
> > cause.
> > The basic problem is the services have well published port numbers
> > and attackers beat on those known port numbers. A much simpler
> > approach is to change the standard port numbers to some high order
> > port number. See /etc/services  SSH logon command allows for a
> port
> > number and the same for telnet. Your remote users will be the only
> > people knowing your selected port numbers for those services. This
> > way a attackers port scan will show the well published port
> numbers
> > as not open so they will pass on attacking those ports on your ip
> > address. This way your bandwidth usage will be reduced as
> attackers
> > find your ip address as having nothing of interest.
> >
> > This same kind of thing can also be done for port 80 by using the
> > web forwarding function of Zoneedit pointing to different port for
> > your web server. Only people coming to your site through dns will
> be
> > forwarded to the correct port.
> >
> > The clear key here is attackers roll through a large range of ip
> > address port scanning for open ports. By using nonstandard port
> > numbers for your services you stop the attacker even finding you
> in
> > the first place.
> >
> > good luck what ever you choose to do.
> You just argued against yourself. If an attacker is genuinely
> interested in rooting someones box, that attacker will most likely
> portscan the box - And thereby discovering that you have assigned
> alternative port numbers to your services.
> Security through obscurity is a bad place to start.
> >
> > -Original Message-
> > From: [EMAIL PROTECTED]
> > [mailto:[EMAIL PROTECTED] Behalf Of Michael
> A.
> > Alestock
> > Sent: Sunday, February 05, 2006 10:42 AM
> > To: [EMAIL PROTECTED]
> > Subject: IP Banning (Using IPFW)
> > Importance: High
> >
> >
> > Hello,
> >
> > I was wondering if there's some sort of port available that can
> > actively
> > ban IPs that try and bruteforce a service such as SSH or Telnet,
> by
> > scanning the /var/log/auth.log log for Regex such as "Illegal
> User"
> > or
> > "LOGIN FAILURES", and then using IPFW to essentially deny (ban)
> that
> > IP
> > for a certain period of time or possibly forever.
> >
> > I've seen a very useful one that works for linux (fail2ban), and
> was
> > wondering if one exists for FreeBSD's IPFW?
> >
> > I've looked around in /usr/ports/security and /usr/ports/net but
> > can't
> > seem to find anything that closely resembles that.
> >
> > Your help would be greatly appreciated Thanks in advance!
> >
> > >> Michael A., USA... Loyal FreeBSD user since 2000.
> > ___
> > freebsd-questions@freebsd.org mailing list
> > http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> > To unsubscribe, send any mail to
> > "[EMAIL PROTECTED]"
> >
> > ___
> > freebsd-questions@freebsd.org mailing list
> > http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> > To unsubscribe, send any mail to
> "[EMAIL PROTECTED]"
> >
> ___
> freebsd-questions@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to
> "[EMAIL PROTECTED]"
>
>
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


RE: IP Banning (Using IPFW)

2006-02-05 Thread fbsd_user
You missed to whole meaning.
Attackers only scan for the published service port numbers,
that is what is meant by "portscan the box".
Those high order port numbers are dynamically
used during normal session conversation.
So any response from those port numbers if an
attacker scanned that high would be meaningless.
Please check your facts before commenting.

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Daniel A.
Sent: Sunday, February 05, 2006 4:58 PM
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]; Michael A. Alestock
Subject: Re: IP Banning (Using IPFW)


On 2/5/06, fbsd_user <[EMAIL PROTECTED]> wrote:
> I find this kind of approach is treating the symptom and not the
> cause.
> The basic problem is the services have well published port numbers
> and attackers beat on those known port numbers. A much simpler
> approach is to change the standard port numbers to some high order
> port number. See /etc/services  SSH logon command allows for a
port
> number and the same for telnet. Your remote users will be the only
> people knowing your selected port numbers for those services. This
> way a attackers port scan will show the well published port
numbers
> as not open so they will pass on attacking those ports on your ip
> address. This way your bandwidth usage will be reduced as
attackers
> find your ip address as having nothing of interest.
>
> This same kind of thing can also be done for port 80 by using the
> web forwarding function of Zoneedit pointing to different port for
> your web server. Only people coming to your site through dns will
be
> forwarded to the correct port.
>
> The clear key here is attackers roll through a large range of ip
> address port scanning for open ports. By using nonstandard port
> numbers for your services you stop the attacker even finding you
in
> the first place.
>
> good luck what ever you choose to do.
You just argued against yourself. If an attacker is genuinely
interested in rooting someones box, that attacker will most likely
portscan the box - And thereby discovering that you have assigned
alternative port numbers to your services.
Security through obscurity is a bad place to start.
>
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] Behalf Of Michael
A.
> Alestock
> Sent: Sunday, February 05, 2006 10:42 AM
> To: [EMAIL PROTECTED]
> Subject: IP Banning (Using IPFW)
> Importance: High
>
>
> Hello,
>
> I was wondering if there's some sort of port available that can
> actively
> ban IPs that try and bruteforce a service such as SSH or Telnet,
by
> scanning the /var/log/auth.log log for Regex such as "Illegal
User"
> or
> "LOGIN FAILURES", and then using IPFW to essentially deny (ban)
that
> IP
> for a certain period of time or possibly forever.
>
> I've seen a very useful one that works for linux (fail2ban), and
was
> wondering if one exists for FreeBSD's IPFW?
>
> I've looked around in /usr/ports/security and /usr/ports/net but
> can't
> seem to find anything that closely resembles that.
>
> Your help would be greatly appreciated Thanks in advance!
>
> >> Michael A., USA... Loyal FreeBSD user since 2000.
> ___
> freebsd-questions@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to
> "[EMAIL PROTECTED]"
>
> ___
> freebsd-questions@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to
"[EMAIL PROTECTED]"
>
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to
"[EMAIL PROTECTED]"

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: IP Banning (Using IPFW)

2006-02-05 Thread Daniel A.
On 2/5/06, fbsd_user <[EMAIL PROTECTED]> wrote:
> I find this kind of approach is treating the symptom and not the
> cause.
> The basic problem is the services have well published port numbers
> and attackers beat on those known port numbers. A much simpler
> approach is to change the standard port numbers to some high order
> port number. See /etc/services  SSH logon command allows for a port
> number and the same for telnet. Your remote users will be the only
> people knowing your selected port numbers for those services. This
> way a attackers port scan will show the well published port numbers
> as not open so they will pass on attacking those ports on your ip
> address. This way your bandwidth usage will be reduced as attackers
> find your ip address as having nothing of interest.
>
> This same kind of thing can also be done for port 80 by using the
> web forwarding function of Zoneedit pointing to different port for
> your web server. Only people coming to your site through dns will be
> forwarded to the correct port.
>
> The clear key here is attackers roll through a large range of ip
> address port scanning for open ports. By using nonstandard port
> numbers for your services you stop the attacker even finding you in
> the first place.
>
> good luck what ever you choose to do.
You just argued against yourself. If an attacker is genuinely
interested in rooting someones box, that attacker will most likely
portscan the box - And thereby discovering that you have assigned
alternative port numbers to your services.
Security through obscurity is a bad place to start.
>
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] Behalf Of Michael A.
> Alestock
> Sent: Sunday, February 05, 2006 10:42 AM
> To: [EMAIL PROTECTED]
> Subject: IP Banning (Using IPFW)
> Importance: High
>
>
> Hello,
>
> I was wondering if there's some sort of port available that can
> actively
> ban IPs that try and bruteforce a service such as SSH or Telnet, by
> scanning the /var/log/auth.log log for Regex such as "Illegal User"
> or
> "LOGIN FAILURES", and then using IPFW to essentially deny (ban) that
> IP
> for a certain period of time or possibly forever.
>
> I've seen a very useful one that works for linux (fail2ban), and was
> wondering if one exists for FreeBSD's IPFW?
>
> I've looked around in /usr/ports/security and /usr/ports/net but
> can't
> seem to find anything that closely resembles that.
>
> Your help would be greatly appreciated Thanks in advance!
>
> >> Michael A., USA... Loyal FreeBSD user since 2000.
> ___
> freebsd-questions@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to
> "[EMAIL PROTECTED]"
>
> ___
> freebsd-questions@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to "[EMAIL PROTECTED]"
>
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


RE: IP Banning (Using IPFW)

2006-02-05 Thread fbsd_user
I find this kind of approach is treating the symptom and not the
cause.
The basic problem is the services have well published port numbers
and attackers beat on those known port numbers. A much simpler
approach is to change the standard port numbers to some high order
port number. See /etc/services  SSH logon command allows for a port
number and the same for telnet. Your remote users will be the only
people knowing your selected port numbers for those services. This
way a attackers port scan will show the well published port numbers
as not open so they will pass on attacking those ports on your ip
address. This way your bandwidth usage will be reduced as attackers
find your ip address as having nothing of interest.

This same kind of thing can also be done for port 80 by using the
web forwarding function of Zoneedit pointing to different port for
your web server. Only people coming to your site through dns will be
forwarded to the correct port.

The clear key here is attackers roll through a large range of ip
address port scanning for open ports. By using nonstandard port
numbers for your services you stop the attacker even finding you in
the first place.

good luck what ever you choose to do.

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Michael A.
Alestock
Sent: Sunday, February 05, 2006 10:42 AM
To: [EMAIL PROTECTED]
Subject: IP Banning (Using IPFW)
Importance: High


Hello,

I was wondering if there's some sort of port available that can
actively
ban IPs that try and bruteforce a service such as SSH or Telnet, by
scanning the /var/log/auth.log log for Regex such as "Illegal User"
or
"LOGIN FAILURES", and then using IPFW to essentially deny (ban) that
IP
for a certain period of time or possibly forever.

I've seen a very useful one that works for linux (fail2ban), and was
wondering if one exists for FreeBSD's IPFW?

I've looked around in /usr/ports/security and /usr/ports/net but
can't
seem to find anything that closely resembles that.

Your help would be greatly appreciated Thanks in advance!

>> Michael A., USA... Loyal FreeBSD user since 2000.
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to
"[EMAIL PROTECTED]"

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: IP Banning (Using IPFW)

2006-02-05 Thread Philip Hallstrom
I was wondering if there's some sort of port available that can actively ban 
IPs that try and bruteforce a service such as SSH or Telnet, by scanning the 
/var/log/auth.log log for Regex such as "Illegal User" or "LOGIN FAILURES", 
and then using IPFW to essentially deny (ban) that IP for a certain period of 
time or possibly forever.


I've seen a very useful one that works for linux (fail2ban), and was 
wondering if one exists for FreeBSD's IPFW?


There are some in the ports, but you can write your own pretty easy too. 
The one thing I didn't like about the ones in the ports is the app was 
responsible for removing the rules after a set amount of time.  Which 
could be a problem if that app crashed for some reason.  You could lock 
yourself out permanently...


Here's a quick perl script I wrote that does what you want...

http://pastebin.com/540575

Combine that with these two crontab entries:

0-59/4 * * * * /sbin/ipfw delete 501 >/dev/null 2>&1
2-59/4 * * * * /sbin/ipfw delete 500 >/dev/null 2>&1

-philip
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


IP Banning (Using IPFW)

2006-02-05 Thread Michael A. Alestock

Hello,

I was wondering if there's some sort of port available that can actively 
ban IPs that try and bruteforce a service such as SSH or Telnet, by 
scanning the /var/log/auth.log log for Regex such as "Illegal User" or 
"LOGIN FAILURES", and then using IPFW to essentially deny (ban) that IP 
for a certain period of time or possibly forever.


I've seen a very useful one that works for linux (fail2ban), and was 
wondering if one exists for FreeBSD's IPFW?


I've looked around in /usr/ports/security and /usr/ports/net but can't 
seem to find anything that closely resembles that.


Your help would be greatly appreciated Thanks in advance!


Michael A., USA... Loyal FreeBSD user since 2000.

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: how may i deny many streams downloads using ipfw

2004-09-23 Thread Ion-Mihai Tetcu
On Fri, 24 Sep 2004 10:00:32 +0600
stepan <[EMAIL PROTECTED]> wrote:

> Hi all!
> 
>  sorry for my english...
>  
>  Please tell me, how to set disable of many streams download
>  (using Flashget or Reget) via my FreeBSD-4.7.1 router using firewall.
>  My `pipe' settings are ineffective where whit this programs.

See ipfw man page and search for ``limit'' key-word
allow tcp from any to any limit dst-addr 5


-- 
IOnut
Unregistered ;) FreeBSD "user"
5.3-BETA4 - try `sysctl debug.witness_watch=0`
and prepare to fly :-)


___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


how may i deny many streams downloads using ipfw

2004-09-23 Thread stepan
Hi all!

 sorry for my english...
 
 Please tell me, how to set disable of many streams download
 (using Flashget or Reget) via my FreeBSD-4.7.1 router using firewall.
 My `pipe' settings are ineffective where whit this programs.

 Best regards
 
 stepan
   mailto:[EMAIL PROTECTED]


___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: Using IPFW & DUMMYNET with an existing IPFILTER/IPNAT setup for QoS

2004-08-12 Thread Siddhartha Jain
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
J. Seth Henry wrote:
| Hello,
| I have an existing FreeBSD based router/internet gateway system that
is using
| ipfilter & ipnat. It performs quite well, and my wife would be mightily
| irritated if I screwed it up. :)
|
http://www.phildev.net/ipf/IPFfreebsd.html#12
HTH,
Siddhartha
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.1 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFBGyumOGaxOP7knVwRAiaYAKCJweNshwFaDKBBAtYqq6SNCb9ZdQCbBZec
VEmbnLEjV7arnsWz9k/jm2c=
=xpRU
-END PGP SIGNATURE-
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Using IPFW & DUMMYNET with an existing IPFILTER/IPNAT setup for QoS

2004-08-11 Thread J. Seth Henry
Hello,
I have an existing FreeBSD based router/internet gateway system that is using 
ipfilter & ipnat. It performs quite well, and my wife would be mightily 
irritated if I screwed it up. :)

However, we have VoIP through Vonage, and a standard Comcast cable modem 
connection to the Internet. Most of the time, everything works well, but when 
I upload large files to the office via FTP, the sound gets choppy - to the 
point where we end up having to use our cell phones.

So, I would like to set up IPFW & DUMMYNET to provide a basic QoS service.

All I really need to do is reserve sufficient bandwidth for, or give highest 
priority to, the ATA - followed by ssh. I believe it needs at least 128kbps 
in each direction for adequate sound quality. I merely want to give ssh 
traffic a higher priority (or reserve bandwidth for) over everything else, so 
that I can still get into my systems even when an ftp session is running.

First, a bit about my (fairly simple) network:

--< external IF: fxp0ROUTER internal IF: xl0 >---< SWITCH >

The switch has its own management port, 2 SmartUPS with management cards, a 
Cisco ATA, and 5 PC's.

To simplify management of IP addresses, I use isc-dhcp for both obtaining the 
router WAN address (dhclient), and for distributing fixed addresses to all of 
the network hosts (dhcpd) (except for the switch and UPS' - which don't 
support DHCP correctly) I don't yet manage local DNS services, so I simply 
distribute a fixed hosts file. 

The router is also a stratum 2 time server for the nework (all hosts that can 
synchronize their clocks to the router, not an external time server) via 
ntpd. 

Eventually, I plan to run a local DNS server - but I haven't gotten around to 
it yet. I would like to run my own to support my local naming scheme, without 
passing any information back up the tree, as well as caching DNS information 
should Comcast have a DNS problem. This, however, is a task for another day.

So, we have:


#
# Outside Interface
#

pass in quick on fxp0 proto tcp from any to any port = 21 flags S keep frags 
keep state
pass in quick on fxp0 proto tcp from any to any port = 22 flags S keep frags 
keep state
pass in quick on fxp0 proto tcp from any to any port = 23 flags S keep frags 
keep state
pass in quick on fxp0 proto udp from any to any port = 68 keep state
pass in quick on fxp0 proto tcp from any to any port = 110 flags S keep frags 
keep state

pass out quick on fxp0 proto tcp from any to any flags S keep frags keep state
pass out quick on fxp0 proto udp from any to any keep state keep frags
pass out quick on fxp0 proto icmp from any to any keep state

block out quick on fxp0 all
block in log quick on fxp0 all

#
# Inside Interface
#
pass in quick on xl0 all
pass out quick on xl0 all

#
# Loopback Interface
#
pass in quick on lo0 all
pass out quick on lo0 all


map fxp0 192.168.1.254/24 -> 0/32 proxy port ftp ftp/tcp
rdr fxp0 0.0.0.0/0 port 21 -> 192.168.1.2 port 21 tcp
rdr fxp0 0.0.0.0/0 port 22 -> 192.168.1.2 port 22 tcp
#below is a irc identd port forwarding example
#rdr fxp0 0.0.0.0/0 port 113 -> 192.168.1.5 port 113 tcp
map fxp0 192.168.1.254/24 -> 0/32 portmap tcp/udp auto
map fxp0 192.168.1.254/24 -> 0/32


# dhcpd.conf

# option definitions common to all supported networks...
option domain-name "gambrl01.md.comcast.net";
option domain-name-servers 68.48.0.6, 68.48.0.12;

default-lease-time 600;
max-lease-time 7200;

# If this DHCP server is the official DHCP server for the local
# network, the authoritative directive should be uncommented.
authoritative;

# ad-hoc DNS update scheme - set to "none" to disable dynamic DNS updates.
ddns-update-style ad-hoc;

# Use this to send dhcp log messages to a different log file (you also
# have to hack syslog.conf to complete the redirection).
log-facility local7;

# Local systems are defined here, and use DHCP as a convenience

host alexandria {
  hardware ethernet 00:30:48:21:8b:8a;
  fixed-address alexandria;
}

host switch {
  hardware ethernet 00:50:ba:ec:61:b3;
  fixed-address switch;
}

host net_ups {
  hardware ethernet 00:c0:b7:6a:00:dd;
  fixed-address net_ups;
}

host serv_ups {
  hardware ethernet 00:c0:b7:a3:a5:67;
  fixed-address serv_ups;
}

host vonage-ata {
  hardware ethernet 00:0d:29:0a:af:2e;
  fixed-address vonage-ata;
}

host office_pc {
  hardware ethernet 00:50:04:ae:90:16;
  fixed-address office_pc;
}

host den_pc {
  hardware ethernet 00:d0:b7:ab:cb:fd;
  fixed-address den_pc;
}

host bedroom_pc {
  hardware ethernet 00:e0:81:23:c2:fd;
  fixed-address bedroom_pc;
}

host spyglass {
  hardware ethernet 00:04:5a:95:47:

mail forwarding using ipfw

2004-04-06 Thread free bsd
dear all,
 i have network like this

lanX.com -
  |
lanA.com  IPFW FBSD  lanB.com ===> to Internet
|   |
lanC.com ---|   |--- lanD.com 

right now,... lanA.com , lanC.com, lanD.com have
smtpoutgoing to internet via lanB.com

the problem is ..  i want to make ruleset in IPFW FBSD
that email outgoing from lanC.com , lanD.com, and
lanA.com through lanX.com before go to lanB.com
without change configuration smtpoutgoing in the
lanA,lanC,lanD only in IPFW_FBSD .. (is it possible
???)


__
Do you Yahoo!?
Yahoo! Small Business $15K Web Design Giveaway 
http://promotions.yahoo.com/design_giveaway/
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


RE: Using IPFW/NAT with multiport PCI cards

2004-03-30 Thread Toni Heinonen
> I am writing to request for advise/recommendations on the 
> subject. I've
> been tasked to build a router/firewall based on FreeBSD. I'd 
> like to use
> 5.2-RELEASE.
> 
> Now my only problem is that I have played a little with ipfw in a
> situation where I have just two interfaces, 1 external and 1 internal.
> My current requirement however involves one external interface and
> four (or more) internal interfaces (which should all be SEPARATE
> networks, invisible from each other).

Sure, this is possible. To tell you the truth, if you're not sure how to do it, the 
cheapest and easiest way would be to just get 4 ethernet cards for the internal 
interfaces. However, the most dynamic way would be to get an ethernet card that 
supports 802.1q or Cisco ISL, which are switch trunking protocols. You could then 
separate the networks into different virtual LANs in a switch, that was connected to 
the 802.1q NIC. That NIC would then have an IP address from each of the networks.

I'm not sure how 802.1q can be configured in FreeBSD, but that shouldn't be too hard - 
the more difficult part should be configuring the switch.
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: Using IPFW/NAT with multiport PCI cards

2004-03-30 Thread Wayne Pascoe
On Tue, Mar 30, 2004 at 11:06:16AM +0300, Odhiambo Washington wrote:

> Now my only problem is that I have played a little with ipfw in a
> situation where I have just two interfaces, 1 external and 1 internal.
> My current requirement however involves one external interface and
> four (or more) internal interfaces (which should all be SEPARATE
> networks, invisible from each other).
>
> Is this doable? (I hope someone has done this before). I would say I am
> a total newbie on this one.

Not only is it doable, it's fairly trivial if you've done a 1 in, 1 out
ipfw firewall before. You just take that idea and grow it a little.

> 2. Guides/Pointers on HOWTO configure this WRT to ipfw configuration.
>Any minute gotchas/clues will be highly appreciated. URL links
>pointing to people's experiences also welcome.

Just set the firewall to deny by default and add your rules really...
Here's an example that would allow FTP to one network and HTTP to
another...

${fwcmd} add allow tcp from any to 192.168.1.0/24 80 tcpflags syn keep-state in via 
xl0 
${fwcmd} add allow tcp from any to 192.168.2.0/24 21 tcpflags syn keep-state in via 
xl0 

You can also have rules between your networks as well... This one allows
all machines on one of the protected networks to ssh to all machines in
the other network.

${fwcmd} add allow tcp from 192.168.1.0/24 to 192.168.2.0/24 22 tcpflags syn 
keep-state in via xl1 

Note the following things about this rule...

1. I've specified a source range to allow. 
2. I've used a different interface. This guarantees that this traffic
   isn't coming in via the main external interface, but that it is
   coming in on one of the protected interfaces.

Of course, everywhere I've used an entire range here, you could use a
single IP range. Combining IP addresses with via interface statements
lets you be pretty flexible :)

Hope this helps some ? 

-- 
Wayne Pascoe
BSD is for people who love UNIX; Linux is for
people who hate Windows 
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Using IPFW/NAT with multiport PCI cards

2004-03-30 Thread Odhiambo Washington
Dear Ladies and Gentlemen,

I am writing to request for advise/recommendations on the subject. I've
been tasked to build a router/firewall based on FreeBSD. I'd like to use
5.2-RELEASE.

Now my only problem is that I have played a little with ipfw in a
situation where I have just two interfaces, 1 external and 1 internal.
My current requirement however involves one external interface and
four (or more) internal interfaces (which should all be SEPARATE
networks, invisible from each other).

Is this doable? (I hope someone has done this before). I would say I am
a total newbie on this one.

I am looking for recommendations on the following aspects:

1. Known compatible quad port PCI ethernet cards. The cost is a factor,
   but perhaps may not be very important as compared to
   functionality/stability.

2. Guides/Pointers on HOWTO configure this WRT to ipfw configuration.
   Any minute gotchas/clues will be highly appreciated. URL links
   pointing to people's experiences also welcome.


Thanking you in advance.


-Wash

http://www.netmeister.org/news/learn2quote.html

--
+==+
|\  _,,,---,,_ | Odhiambo Washington<[EMAIL PROTECTED]>
Zzz /,`.-'`'-.  ;-;;,_ | Wananchi Online Ltd.   www.wananchi.com
   |,4-  ) )-,_. ,\ (  `'-'| Tel: +254 20 313985-9  +254 20 313922
  '---''(_/--'  `-'\_) | GSM: +254 722 743223   +254 733 744121
+==+
Anyone who uses the phrase "easy as taking candy from a baby" has never
tried taking candy from a baby.
-- Robin Hood
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: using ipfw

2004-03-02 Thread Jonathan Arnold
Karan Gupta wrote:
Newbie here so pls excuse if this question sounds trivial
Here's a bunch of links posted to questions a little while ago
for ipfw help:
http://freebsd.amazingdev.com/blog/archives/000112.html

--
Jonathan Arnold (mailto:[EMAIL PROTECTED])
Daemon Dancing in the Dark, a FreeBSD weblog:
http://freebsd.amazingdev.com/blog/
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: using ipfw

2004-03-02 Thread Kevin D. Kinsey, DaleCo, S.P.
Karan Gupta wrote:

Newbie here so pls excuse if this question sounds trivial

i use a single bsd router to service 2 properties. I want ppl on prop A to get 1.024kbit/s and the ones on prop B to get 256kbit/sprop B is connected on the same network as prop A using a wireless device that has the an IP within the network range. Can is add a pipe to limit data from the IP address of the wireless device to 256kbit/s & achieve what i desire?



Karan Gupta
(949) 355-4042
[EMAIL PROTECTED]
EdgeFocus Inc
65 Enterprise Aliso Viejo CA 92656
 

Something like this, for one pipe, assuming an xl NIC and
using your dotted quad IP's:
ipfw add pipe 1 tcp from any to ip.of.some.box via xl0
ipfw pipe 1 config bw 1024Kbit/s
You probably need to check that you have the following in
your kernel config
   options DUMMYNET
   options HZ=1000


HTH,

Kevin Kinsey
DaleCo, S.P.
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


using ipfw

2004-03-02 Thread Karan Gupta
Newbie here so pls excuse if this question sounds trivial

i use a single bsd router to service 2 properties. I want ppl on prop A to get 
1.024kbit/s and the ones on prop B to get 256kbit/sprop B is connected on the same 
network as prop A using a wireless device that has the an IP within the network range. 
Can is add a pipe to limit data from the IP address of the wireless device to 
256kbit/s & achieve what i desire?



Karan Gupta
(949) 355-4042
[EMAIL PROTECTED]
EdgeFocus Inc
65 Enterprise Aliso Viejo CA 92656
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: using ipfw and ipf/ipnat together

2004-02-17 Thread Fernando Gleiser
On Tue, 17 Feb 2004, Nelis Lamprecht wrote:

> Hi,
>
> I would like to make use of ipfw/dummynet traffic shaper and use it
> together with ipnat/ipf's filtering. Hope this is possible ?

It works fine

>
> Can someone suggest what I would or would not need to use in my rc.conf
> and kernel please. I have selected the following ( FreeBSD 5.2R ):

It looks fine

>
> Seeing as though I'm not using ipfw filtering I thought I could just
> allow everything through by default. Will dummynet still work if
> IPFIREWALL_DEFAULT_TO_ACCEPT is set ?

Yes, it will.




Fer

___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


using ipfw and ipf/ipnat together

2004-02-16 Thread Nelis Lamprecht
Hi,

I would like to make use of ipfw/dummynet traffic shaper and use it
together with ipnat/ipf's filtering. Hope this is possible ? This is a
personal preference so no need to tell me why I should just use ipfw
etc. 

Can someone suggest what I would or would not need to use in my rc.conf
and kernel please. I have selected the following ( FreeBSD 5.2R ):

rc.conf:

ipfilter_enable="YES"
ipfilter_program="/sbin/ipf"
ipfilter_rules="/etc/ipf.rules"
ipfilter_flags=""
ipnat_enable="YES"
ipnat_program="/sbin/ipnat"
ipnat_rules="/etc/ipnat.rules"
ipmon_enable="YES"
ipmon_program="/sbin/ipmon"
ipmon_flags="-Dsvn"
ipnat_enable="YES"

kernel config:

options IPFILTER#ipfilter support
options IPFILTER_LOG#ipfilter logging
options PFIL_HOOKS  #required by IPFILTER
options IPFILTER_DEFAULT_BLOCK  #block all packets by default
options IPFIREWALL  #firewall
options IPFIREWALL_DEFAULT_TO_ACCEPT#allow everything by default
options DUMMYNET#bandwidth limiter
options IPSTEALTH   #support for stealth forwarding

Seeing as though I'm not using ipfw filtering I thought I could just
allow everything through by default. Will dummynet still work if
IPFIREWALL_DEFAULT_TO_ACCEPT is set ?

Any suggestions appreciated.

Thanks.

-- 
Nelis Lamprecht
PGP: http://www.8ball.co.za/pgpkey/nelis.asc
"Unix IS user friendly.. It's just selective about who its friends are."


signature.asc
Description: This is a digitally signed message part