[Fwd: Firewall-easy setup difficulties]

2004-11-10 Thread Tim Beauregard
--- Begin Message ---
Hi,

Could someone kindly help me with firewall setup with my home cable
(dhcp) internet connection?  I wish to use firewall-easy purely because
I know nothing about configuration of firewalls.  I can't recall having
changed the firewall-easy.conf file (attached).

I'm using debian unstable, 2.6.7 kernel.

The output I currently see is below:

debian:/home/tim# firewall-easy start
Running kernel 2.6.7
2.4 kernel support
-> iptables list OK
2.2 kernel support
NO ipchains list, firewall kernel support?
NO ipmasqadm list, port forwarding kernel support?
2.0 kernel support
NO ipfwadm list, firewall kernel support?
firewall-easy: iptables support detected
firewall-easy: iptables support detected

AUTODETECTION
loopback   = 127.0.0.0/255.0.0.0
local net  =
  local IP =
DNS servers = 62.31.176.39 194.117.134.19 195.188.53.175
ADSL iface  =
  gw =

-> Securing kernel (secure-kernel-24)
-> Setting up firewall (firewall-iptables)

 STATUS:1 
iptables -A ACCEPTLOG -m limit --limit 3/minute -j LOG
--log-prefix ACCEPT->
iptables: No chain/target/match by that name


 STATUS:1 
iptables -A DROPLOG -m limit --limit 3/minute -j LOG
--log-prefix DROP->
iptables: No chain/target/match by that name


 STATUS:1 
iptables -A RST -p tcp -j REJECT --reject-with tcp-reset
iptables: No chain/target/match by that name


 STATUS:1 
iptables -A RST -p udp -j REJECT
iptables: No chain/target/match by that name


 STATUS:1 
iptables -A RSTLOG -m limit --limit 3/minute -j LOG --log-prefix
REJECT->
iptables: No chain/target/match by that name


 STATUS:1 
iptables -A RSTLOG -p tcp -j REJECT --reject-with tcp-reset
iptables: No chain/target/match by that name


 STATUS:1 
iptables -A RSTLOG -p udp -j REJECT
iptables: No chain/target/match by that name


 STATUS:1 
iptables -t mangle -A PREROUTING -j TOS --set-tos 0x10 -p tcp -d
0/0 --dport 1024:65535 -s 0/0 --sport www
iptables: No chain/target/match by that name


 STATUS:1 
iptables -t mangle -A PREROUTING -j TOS --set-tos 0x10 -p tcp -s
0/0 --sport 1024:65535 -d 0/0 --dport www
iptables: No chain/target/match by that name


 STATUS:1 
iptables -t mangle -A PREROUTING -j TOS --set-tos 0x08 -p tcp -d
0/0 --dport 1024:65535 -s 0/0 --sport rsync
iptables: No chain/target/match by that name


 STATUS:1 
iptables -t mangle -A PREROUTING -j TOS --set-tos 0x08 -p tcp -s
0/0 --sport 1024:65535 -d 0/0 --dport rsync
iptables: No chain/target/match by that name


 STATUS:1 
iptables -t mangle -A PREROUTING -j TOS --set-tos 0x08 -p tcp -d
0/0 --dport 1024:65535 -s 0/0 --sport 1024:65535
iptables: No chain/target/match by that name


 STATUS:1 
iptables -t mangle -A PREROUTING -j TOS --set-tos 0x08 -p tcp -s
0/0 --sport 1024:65535 -d 0/0 --dport 1024:65535
iptables: No chain/target/match by that name


TESTING FIREWALL

debian:/home/tim#
(no error messages, just a command prompt)

My kernel .configs I think are relevant are:

CONFIG_SYSVIPC=y
CONFIG_SYSCTL=y
CONFIG_BLK_DEV_LOOP=y
CONFIG_SYN_COOKIES=y
CONFIG_INET_AH=y
CONFIG_INET_ESP=y
CONFIG_INET_IPCOMP=y
CONFIG_IP_NF_CONNTRACK=y
CONFIG_IP_NF_IPTABLES=y
CONFIG_IP_NF_MATCH_STATE=m
CONFIG_IP_NF_FILTER=y
CONFIG_IP_NF_NAT=y
CONFIG_IP_NF_NAT_NEEDED=y
CONFIG_IP_NF_TARGET_MASQUERADE=y
CONFIG_IP_NF_MANGLE=m
CONFIG_PROC_FS=y
CONFIG_PROC_KCORE=y
CONFIG_SYSFS=y
# firewall-easy.conf
#
# use vars as with bash format (no spaces allowed before/after the equal)
#


 HOME USER CONFIG


LOCALNET_IFACES=
#LOCALNET_IFACES=eth0   # Interfaces without firewall (better none)

ADSL_IFACES=
#ADSL_IFACES=eth1   # To get ADSL config by DHCP


# HIGH SECURITY OPTION
FTP=""  # active FTP not available

# MEDIUM SECURITY OPTION
#FTP="1.1.1.1 2.2.2.2"  # My active FTP servers (FTP is usually passive)

# LOW SECURITY OPTION
#FTP="0/0"  # NOT RECOMMENDED: This allow all active ftp at the
# price of being visible to scanings from port 20


NTP=""  # Time servers (NTP) to access in Internet

NO_IP=""# Remote IPs to deny access to our system



 CONFIG OPTIONS
# no matter their value, just if they exist or not

TESTFW=yes  # Uncomment to do firewall test in start
 #NOLOG=yes # Uncomment to NOT do ANY LOG (only 2.2 kernel)
 #LOGALLDENY=yes# Uncomment to log all denied rule (debug)
 #DEBUG=yes # Uncomment to debug


# STRATEGY NO SERVICES (only 2.4 kernel)
# Instead of being invisible which is the default config, you 

Re: preserving sendmail configuration security hacks

2004-11-10 Thread Richard A Nelson
On Wed, 10 Nov 2004, Duncan Simpson wrote:

> I can put the rulesets Local_check_* rulesets in the LOCAL_RULESETS in
> sendmail.mc and delete the blank ones make sendmail.cf generates
> manually but this is suboptimal. Is there a way of writing the
> sendmail.mc file so the extra rules in the Local_check_* rulesets
> appear.

I do stuff like this all the time (in sendmail.mc, or include):
LOCAL_RULESETS
# Allow etrn,expn,vrfy from anyplace allowed to relay through us
SLocal_check_commands
...
# No pause for port 587(MSP) as authentication is required
SLocal_greet_pause
...

The last case does cause two occurances of Slocal_greet_pause... but
unlike the Bat book V2 (still gotta get V3), sendmail doesn't complain
- and does the right thing.

I'd be happy to look over you setup if you'd like...  If you've got
anything that might be generally applicable, I'd love to merge it into
what I'm putting together... a set of hacks to increase security and
simplify things as much as possible.

-- 
Rick Nelson
"What you end up with, after running an operating system concept through
these many marketing coffee filters, is something not unlike plain hot
water."
(By Matt Welsh)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



preserving sendmail configuration security hacks

2004-11-10 Thread Duncan Simpson
One of my mail servers runs sendmail and some extra security features
are implemented in the Local_check_relay ruleset---in particualr it only
allows a small list of IP addresses to connect.

There are also a few other Local_check_* rulesets which are non-standard
and do things like tweaking the relay restrictions and providing
additional resistance to thrid party relaying.

I can put the rulesets Local_check_* rulesets in the LOCAL_RULESETS in
sendmail.mc and delete the blank ones make sendmail.cf generates
manually but this is suboptimal. Is there a way of writing the
sendmail.mc file so the extra rules in the Local_check_* rulesets
appear.

I read the m4 source and saw items for handling LOCAL_RULE_0 and
LOCAL_RULE_3 (both of which I use for some special effects) but nothign
similar appears where the blank Local_check_* rulsets are defined. I
have my doubts about the ability of postfix and exim to handle
everythign required.

 




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]