diff options
Diffstat (limited to 'sbin/ipfw')
-rw-r--r-- | sbin/ipfw/README | 610 | ||||
-rw-r--r-- | sbin/ipfw/ipfirewall.4 | 206 | ||||
-rw-r--r-- | sbin/ipfw/ipfw.1 | 527 |
3 files changed, 0 insertions, 1343 deletions
diff --git a/sbin/ipfw/README b/sbin/ipfw/README deleted file mode 100644 index 1cc296c45631..000000000000 --- a/sbin/ipfw/README +++ /dev/null @@ -1,610 +0,0 @@ -***************************************************************************** -27 Oct 94 -Hi again! -So thanx to Brian McGovern , i'v took this piece of code in hands again -and made some changes: - 1) Port to FreeBSD 2.0 , so we will not go after time. - 2) Some minor changes in kernel part to improve speed and such.. - 3) Chane in behaviour: now any recently added firewall definition - preferred on other matching but older firewalls. - REMEMBER: in any case universal IP firewall has larger preference - then special TCP/UDP/ICMP firewalls. - 4) Cosmetical changes to control programm. Now it is called ipfw. - 5) Changed ip_firewall.* to ip_fw.* in kernel,and shortened some long - variable names. - 6) From now on we have user defined *policy*,which is DENY/ACCEPT for - every packet which does not matches any of firewalls.I.e.: if any - firewall defined and packet does not match them you may set it up - so it will be anyway throwed or anyway accepted. -Mostly that's all. -Bye! - --- - -= Ugen J.S.Antsilevich =- - NetVision - Commercial Internet Provider ------------------------------------------------------[C]--- -NetVision - Home of Israeli Commercial Internet - E-mail: ugen@NetVision.net.il - HTTP: http://www.NetVision.net.il/~ugen/ - Phone: +972-4-550330 Fax: +972-4-550122 - -***************************************************************************** -10 Jul 94 -Hi again...So i sitted and stared at this nice working tool and thought to -myself that it's nice but something there it needs and have not.. -So i took a piece of file and a keyboard and typed some strings. -What it was is: - -o List facility improved...Now listing of currently installed firewall - entries does not go through kernel printf's ,which is really unnice to - one who runs it NOT from console:) - -o Really important facility of deleting entries added..Yes , till this - day you had to remove all entries and then add them one by one again - to remove actually just one.Now it's over:) - -o All this changes documented in this readme,while you will see where i - added my words just by vast number of mistaces in English.Well,i hope - you will forgive one Russian guy like me:) - -So enjoy this new code and if you think it needs some additions - you -are welcome to suggest.Also i made some more warnings , while compiling -this code,i have no a clue where do they come from,however they does not -make any bad to programm.But if you will find way to remove them,feel free -to do it and post anywhere(and notify me as i also need this:) - - Bye! Ugen J.S.Antsilevich - - -########################################################################## -# Ugen J.S.Antsilevich NetVision (Israel) System Staff Member # -#------------------------------------------------------------------------# -# Email: ugen@NetVision.net.il | Phone: 972-4-550330 # -# ugen@NetManage.co.il | Fax: 972-4-550122 # -#------------------------------------------------------------------------# -# WWW HomePage: http://www.NetVision.net.il/~ugen # -# Special : Volk@Les.Tambov.SU # -########################################################################## - - -***************************************************************************** -8 Jul 94 -OK..so first of all,this is simple port to FreeBSD by Ugen J.S.Antsilevich -Actually all i had to do is to find appropriate place in kernel source files -for ipfirewall stuff..so all your thanks should go to the author... -Anyway i am porting it now to 1.1.5 (not much job though..:) so if you want -to ask something about write to me: - -ugen@NetVision.net.il - -That's it and let the --==REAL==-- author speak... -***************************************************************************** - -Here's my ipfirewall facility. I consider it to still be beta quality mostly -because the various interfaces are pretty crude. Here's some information that -you'll probably find useful (in roughly the order in which you'll need to know -it). Some of this will be absurdly simplistic. Better safe than sorry... - -This software was written for BSD/386. The current version has been ported -to BSD/386 v1.1. The context diffs are with respect to that version of -BSD/386. If you don't have access to BSD/386 v1.1 and can't make sense out of -the diffs, contact me and I'll send you the entire files (they are copyrighted -by UC-Berkeley with very 'friendly' conditions). - -Speaking of copyrights, here's mine: - -/* - * Copyright (c) 1993 Daniel Boulet - * Copyright (c) 1994 Ugen J.S.Antsilevich - * - * Redistribution and use in source forms, with and without modification, - * are permitted provided that this entire comment appears intact. - * - * Redistribution in binary form may occur without any restrictions. - * Obviously, it would be nice if you gave credit where credit is due - * but requiring it would be too onerous. - * - * This software is provided ``AS IS'' without any warranties of any kind. - */ - -Enough introductory stuff, here we go... - - 1) The file IPFIREWALL is the configuration of kernel i use with - IPFIREWALL and GATEWAY options enabled. You may not find it useful. - About the only key things are that it enables the IPFIREWALL - option and the GATEWAY option. IPFIREWALL turns on my - stuff and GATEWAY turns your machine into an IP router. - - There is nothing magical about the name of this file or the - ident name for the kernel. - - 2) The files ip_fw.c and ip_fw.h are new files that should be - placed into the /usr/src/sys/netinet directory. - - 3) The files ip_input.c and raw_ip.c are new patched versions of the - same files , they made up for version 2.0 of FreeBSD,however it was - some pre-Beta release we worked on , so to add it to other releases - just find all parts of code surrounded by: - #ifdef IPFIREWALL - .... - #endif - and place in the appropriate places in the same files. - All those files are in /usr/src/sys/netinet directory of corse. - - 4) Add the line "netinet/ip_fw.c optional ipfirewall" to the - file /usr/src/sys/conf/files. This tells the config program to - include the netinet/ip_fw.c file if the IPFIREWALL option is - defined for a kernel. - - 5) The Makefile and ipfw.c files should go into directory probably - back in your home directory tree somewhere. If this ever becomes a - part of the system then they should go into the (newly created) - directory /usr/src/sbin/ipfw. - - 6) Build yourself a kernel, make a backup of the current kernel and - and install the new one. It should behave in a completely normal - fashion since you won't have defined any firewalls yet. - - 7) Explore the ipfw program. The smartest way to do this is to - compile the program and then run it.To do it you SHOULD be root - as the programm uses setsockopt on RAW sockets to define firewalls, - and also reads kernel symbols.If any other user will run ipw - it will detect that it isn't being run by root and will just - complain and exit. - The ipfw program takes command line parameters - and (assuming they are valid) issues a single appropriate setsockopt - call. If you're defining 5 firewalls then you'll have to run the - program 5 times. See below for a description of the command syntax - of ipfirewall. - - ==================================================================== - WARNING!!! WARNING!!! WARNING!!! WARNING!!! WARNING!!! WARNING!!! - The ipfw program can be used to put your machine into very - disfunctional state.So if you want to test it make sure you - a) Have read carifully this README till it's end. - b) First time run it from machine console,as else you can - simply shut down your own access to it. - ==================================================================== - Make sure that you never setup the program as setuid root!!! Instead, - always run it from the root command line or from "/etc/rc.local" - as part of the boot process. - - 8) Use the "ipfirewall" checkb or checkf command (see below) to pass some - test packets through the firewalls that you've defined. - - 9) You may find it useful to create a file in which the first line is - "ipfirewall flush" to flush any existing firewalls and the remaining - lines are the ipfirewall commands needed to define the firewalls that - you want to use. This will ensure that you're always working from a - known state. - - 10) If you've gotten this far then you're probably ready to let the critter - see prime time. Copy your file of ipfirewall commands into the - /etc/rc.local file and reboot the system. Once you're up, use the - ipfirewall list command to see that you've got the firewalls that you - wanted and try to test the firewall with real packets from trusted - and untrusted hosts. - -Enough of that. Here's the syntax for the ipfirewall command. It is rather -complex and yet simple at the same time (if you know what I mean). There -are seven sub-commands. Probably the easiest way to get into this is to give -you a roughly BNF style grammar for the command (curly brackets are used for -precedence, alternatives are separated by |, optional things are enclosed -in square brackets, white space is required if it appears below and must -not appear if there isn't any between the tokens below (i.e. no white space -around periods, colons or slashes, whitespace required between all other -tokens)): - - command ::= ipfirewall <list> | <flush> | <check> | <add> | <del> - - <list> ::= list - - <flush> ::= flush - - <check> ::= { checkb[locking] | checkf[orwarding] } <chkparms> - - <add> ::= { addb[locking] | addf[orwarding] } <add-del-parms> - - <del> ::= { delb[locking] | delf[orwarding] } <add-del-parms> - - <chkparms> ::= <protocol> from <ipaddr> <port> to <ipaddr> <port> - - <protocol> ::= tcp | udp - - <ipaddr> ::= <int>.<int>.<int>.<int> | <hostname> - - <hostname> ::= a host name from /etc/hosts - - <port> ::= <int> | <service> - - <service> ::= a service from /etc/services - - <int> ::= a non-negative integer - - <add-del-parms> ::= { accept | deny } { <universal_firewall> | <protocol_firewall> } - - <universal_firewall> ::= all from <masked_ipaddr> to <masked_ipaddr> - - <masked_ipaddr> ::= { <ipaddr>/<bits> } | { <ipaddr>:<ipaddr> } | <ipaddr> - - <bits> ::= integer in the range 0 to 32 inclusive - - <protocol_firewall> ::= <protocol> from <end_firewall> to <end_firewall> - - <end_firewall> ::= <masked_ipaddr> <port_list> - - <port_list> ::= [ <port>:<port> ] <sub_port_list> - - <sub_port_list> ::= <port> [ <sub_port_list> ] - -Although I think that the above grammar is complete, it isn't exactly what -one would call easy to comprehend! Here's the basic idea along with what -each of the forms mean: - - The "ipfirewall list" command prints a list of the firewalls on both the - forwarding and blocking chain in some more or less understudable format. - - The "ipfirewall flush" command empties the two firewall chains. - - The "ipfirewall addblocking" and "ipfirewall addforwarding" commands take - a firewall description and add the firewall to the appropriate firewall - chain.Take notice,that if you will add some description more then once, - it will take more then one entry in memory.It does not lead to significant - slow down of computer operation though. - - The "ipfirewall delblocking" and "ipfirewall delforwarding" commands take - a firewall description and deletes the firewall from the appropriate - firewall chain.The description must be exactly the same as it was defined - by add command.One delete command removes ALL same entries from firewall - chains. - - There are two basic kinds of firewall descriptions. Universal firewall - descriptions match all IP packets between specified pairs of hosts. - Universal firewalls only check IP addresses (i.e. they match any combination - of protocol and port numbers). Protocol-specific firewalls match either - TCP/IP or UDP/IP packets between specified pairs of hosts. In addition - to host descriptions, protocol-specific firewalls optionally take a - description of which port numbers to match. - - A host description consists of an IP address and a mask. The IP address - is specified as either a domain name or in the familiar - nn.nn.nn.nn format. The mask indicates how much of the IP address - should be looked at when vetting packets. There are two ways to - specify the mask. The first way is to suffix the IP address in the - firewall with a slash and an integer in the range 0 through 32 inclusive. - This integer is taken to be the number of high order bits of the IP - address which are to be checked (for example, 192.153.211.0/24 checks - the top 24 bits of the IP address, 192.153.211.17/32 checks all the - bits and 0.0.0.0/0 checks none of the bits (i.e. all IP addresses are - matched by this example)). The second way to specify a mask is to - suffix the IP address with a colon followed by another IP address. - This second address is the mask. Specifications equivalent to the - above three examples using this syntax would be - - 192.153.211.0:255.255.255.0 - 192.153.211.17:255.255.255.255 - 0.0.0.0:0.0.0.0 - - The first form is taken from the syntax accepted by a Telebit NetBlazer. - The second form is more along the lines of how a netmask is specified - in /etc/netmasks. Finally, if no mask is specified then a mask of all - 1's is supplied (i.e. no mask is equivalent to /32 or :255.255.255.255). - - The optional description of port numbers to mask can take three forms. - The simplest form is to omit the list in which case all port numbers - match. The next form is to specify a list of port numbers (either as - positive integers or service names from /etc/services). The final form - is actually a special case of the second form in which the first pair - of port numbers is separated by a colon instead of white space. This - pair specifies a range of port numbers (i.e. x:y specifies that all - ports between x and y inclusive should match). A port description - matches a particular port number if any of the following is true: - - - the port description is null - - the first pair of port numbers is a range and the port number - is in the range (inclusive) - - the port number is equal to any of the port numbers in the list - - There is a limit of a total of 10 port numbers in the source and - destination port lists. This limit is arbitrary and easy to increase. - It is determined by the value of the IP_FIREWALL_MAX_PORTS #define - variable in ip_firewall.h. Each increase of 1 for this value adds two - bytes to the size of each firewall. Since the size of a firewall is only - slightly over 30 bytes right now, this limit of 10 could probably - be increased by quite a bit before it became a concern. I've been - thinking of increasing it to 20 which would be longer than any - reasonable firewall would need and would only consume 20 more bytes - per firewall. The counter argument to any increase is that it is - always possible to construct an equivalent set of two or more firewalls - that behaves like a single firewall with a really long port list. - - This probably all sounds hopelessly complicated. It is actually not - all that tricky (I'm just not very good at explaining it yet). A few - examples will probably help a lot now: - - Block all IP packets originating from the host hackers-den: - - ipfirewall addb deny all from hackers-den to 0.0.0.0/0 - - Block all telnet packets to our telnet server from anywhere: - - ipfirewall addb deny tcp from 0.0.0.0/0 to mymachine/32 telnet - - Don't forward telnet, rlogin and rsh packets onto our local - class C network: - - ipfirewall addf deny tcp from 0.0.0.0/0 to ournetwork/24 telnet login shell - - Don't let anyone on the local machine or any machine inside - our local network ftp access to games.com: - - ipfirewall addb deny tcp from games.com ftp to 0.0.0.0/0 - - This last one might look a little strange. It doesn't prevent - anyone from sending packets to the games.com ftp server. What it - does do is block any packets that the games.com ftp server sends - back! - - The "ipfirewall checkblocking" and "ipfirewall checkforwarding" commands - take a description of an IP packet and check to see if the blocking - or forwarding chain of firewalls respectively accept or reject the packet. - It is used to make sure that the firewalls that you've defined work as - expected. The basic syntax is probably best understood by looking at - a couple of examples: - - ipfirewall checkb from bsdi.com 3001 to mymachine telnet - - checks to see if the blocking firewall will block a telnet packet from - a telnet session originating on bsdi.com to the host mymachine will be - blocked or not. Note that someone connecting to our telnet server - could be using practically any port number. To be really sure, the - firewall used to prevent access should be as simple as possible and/or - you should try a variety of port numbers in addition to the rather - arbitrarily chosen port of 3001. - - One final note on the check* ,add* and del* command syntax. The noise word - "to" exists in the syntax so that I can detect the end of a list of - port numbers in the from description. Since I needed a noise word to - detect this case, I added the noise word "from" in front of the from - case for consistency. - - Finally, have a look at the file "filters". It is the set of filters - that I run at home.<Danny> - Also check "scripts",where individual access restrictions written. - We use those for our dial-in PPP/SLIP users,to allow some of them - to access our internal networks,while disallowing other.This way we - open access to user's IP,when he enters the system ,and shut it - down when he leaves.All those changes may be applyed at any time, - and so entries added and deleted from firewall while system is - is working.No any side effects will arise.<Ugen> - -Now for a bit of a description of how the firewalls are applied (i.e. what -happens in the kernel): - - When an IP packet is received, the ipintr() routine in ip_input.c is - called. This routine does a bit of basic error checking. If it - detects any errors in the packet it generally drops the packet on - the floor. The idea behind the ipfirewall facility is to treat packets - that we don't want to accept as bad packets (i.e. drop them on the - floor). The ipfirewall facility intercedes in the normal processing - at two points. Just after the basic sanity checks are done, we pass - any packets not targeted at the loopback network (127.0.0.0/8) to the - firewall checker along with the chain of blocking firewalls.If the firewall - checker tells us to block the packet then we branch to the "bad:" label - in ipintr() which is where all bad packets are dropped on the floor. - Otherwise, we allow normal processing of the packet to continue. The - exact point at which we intercede was chosen to be after the basic - sanity checking and before the option processing is done. We want to - be after the basic sanity checking so that we don't have to be able - to handle complete garbage. We want to be before the option processing - because option processing is done in separate rather complex routine. - Why bother doing this special processing if we might be dropping the - packet? - - The second point at which we intercede is when a packet is about to be - forwarded to another host. All such packets are passed to the ip_forward - routine. The ipfirewall code is at the very top of this routine. If - the packet isn't targetted at the loopback interface (is it possible - that it could be when we reach this point? I doubt it but safety first) - then pass the packet to the firewall checker along with the forwarding - firewall chain. If the firewall checker indicates that the packet should - not be forwarded then we drop in (using code copied from a few lines - further into the routine which drops broadcast packets which are not - to be forwarded). - -There are a couple of consequences of this approach: - - 1) Packets which are blocked are never forwarded (something to keep - in mind when designing firewalls). - 2) Packets targeted at the loopback interface (127.0.0.0/8) are never - blocked. Blocking packets to the loopback interface seems pointless - and potentially quite confusing. It also makes a possibly common - case very cheap. - 3) The sender of a packet which is blocked receives no indication that - the packet was dropped. The Telebit NetBlazer can be configured to - silently drop a blocked packet or to send back a "you can't get there - from here" packet to the sender. Implementing the later would have - been more work (possibly quite a bit more, I don't really know). Also, - I don't see any reason to give a potential hacker any more information - than necessary. Dropping the packet into the bit bucket seems like - the best way to keep a hacker guessing.<Danny> - Well,anyway i working on this feature.It would be made optional and - configurable by some ICMP_UNREACH_ON_DROP or like this.<Ugen> - -Now for some details on how the firewall checker works: - - The firewall checker takes two parameters. The first parameter is a pointer - to the packet in question. The second parameter is a pointer to the - appropriate firewall chain. At the present time, the firewall checker passes - these parameters to a second routine which is the real firewall checker. - If the real checker says NO then an appropriate message is printed - onto the console. This is useful for debugging purposes. Whether or - not it remains in the long term depends on whether it is considered useful - for logging purposes (I'm a little reluctant to leave it in since it - provides a hacker with a way to commit a "denial of service" offense - against you by filling up your /var/log/messages file's file system - with error messages. There are ways of preventing this but ...<Danny>). - In default configuration now no information about dropped packets - printed.You may,however,define it,as i do by adding - option IPFIREWALL_VERBOSE - to your kernel configuration file.Very useful thingy!<Ugen> - - A return value of 0 from this routine (or the real firewall checker) - indicates that the packet is to be dropped. A value of 1 indicates - that the packet is to be accepted. In the early testing stages you - might want to make the top level firewall checker always return 1 even - if the real checker returns 0 just in case the real firewall checker - screws up (or your firewalls aren't as well designed as they should be). - In fact, this might be a useful optional feature (providing a way to - leave a door unlocked doesn't seem all that wise but it has to be - balanced against the inconvenience to legitimate users who might get - screwed up by poorly designed firewalls). - - The real firewall returns 1 (accept the packet) if the chain is empty. If - efficiency is a concern (which it is in this code), this check should - be done in ip_input.c before calling the firewall checker. - - Assuming that there is a firewall chain to scan through, the real firewall - checker picks up the src and dst IP addresses from the IP packet. It - then goes through the firewall chain looking for the first firewall that - matches the packet. Once a matching firewall has been found, a value of - 1 is returned if the firewall is an accept firewall and a value of 0 is - returned otherwise. - - The following processing is done for each firewall on the chain: - - 1) check the src and dst IP addresses. If they don't match then - there isn't any point in looking any further at this firewall. - This check is done by anding the packet's IP addresses the - with appropriate masks and comparing the results to the - appropriate addresses in the firewall. Note that the mask is - NOT applied to the address in the firewall. If it has any 1 - bits that are 0 bits in the mask then the firewall will never - match (this will be checked in ipfirewall soon). If the addresses - match then we continue with the next step. - - 2) If the firewall is a universal firewall then we've got a match. - Return either 0 or 1 as appropriate. Otherwise, continue with - the next step. - - 3) Examine the IP protocol from the packet. If we havn't had to - look at it before then we get it and set a local variable to - IP_FIREWALL_TCP for TCP/IP packets, IP_FIREWALL_UDP for UDP/IP - packets, IP_FIREWALL_ICMP for ICMP packets, and IP_FIREWALL_UNIVERSAL - for all other packet types. Also, if the packet is a TCP/IP or - a UDP/IP packet, save the source and destination port numbers - at this point (taking advantage of the fact that the port numbers - are stored in the same place in either a TCP/IP or a UDP/IP - packet header). If the packet is neither a TCP/IP or a UDP/IP - packet then this firewall won't match it (on to the next firewall). - If this packet's protocol doesn't match this firewall's protocol - (which can't be universal or we wouldn't be here) then on to - the next firewall. Otherwise, continue with the next step. - - 4) We're checking either a TCP/IP or a UDP/IP packet. If the - firewall's source port list is empty or the packet's source - port matches something in the source port list AND if the firewall's - destination port list is empty or the packet's destination - port matches something in the destination port list then - we've got a match (return 0 or 1 as appropriate). Otherwise, - on to the next firewall. - - As indicated above, if no packet on the chain matches the packet then - it is accepted if the first firewall was a deny firewall and it is rejected - if the first firewall was an accept packet. This is equivalent to the - default behaviour of a Telebit NetBlazer. They provide a way to override - this behaviour. I'm not convinced that it is necessary (I'm open to - suggestions). - -That's about it for the firewall checker. The ipfirewall program communicates -with the kernel part of the firewall facility by making setsockopt calls -on RAW IP sockets. Only root is allowed to open a RAW IP socket. This -ensures that only root uses ipfirewall to manipulate the firewall facility. -Also, somewhere in the kernel source or on a man page, I read that the -RAW IP setsockopt calls are intended for manipulating the IP protocol layer -as opposed to manipulating any particular instance of a socket. This seems -like a reasonable description of what the firewall setsockopt command -codes do. - -There are seven setsockopt command codes defined by the firewall facility -(in netinet/in.h). They are: - - IP_FLUSH_FIREWALLS flush (i.e. free) both firewall chains. - - IP_ADD_FORWARDING_FIREWALL add firewall pointed at by optval parm to - the end of the forwarding firewall chain. - - IP_ADD_BLOCKING_FIREWALL add firewall pointed at by optval parm to - the end of the blocking firewall chain. - - IP_DEL_FORWARDING_FIREWALL delete firewall pointed at by optval parm - from the forwarding firewall chain. - - IP_DEL_BLOCKING_FIREWALL delete firewall pointed at by optval parm - from the blocking firewall chain. - - IP_CHECK_FORWARDING_FIREWALL pass the IP packet do the firewall checker - along with the forwarding firewall chain. - Return 0 if packet was accepted, -1 (with - errno set to EACCES) if it wasn't. - - IP_CHECK_BLOCKING_FIREWALL pass the IP packet do the firewall checker - along with the blocking firewall chain. - Return 0 if packet was accepted, -1 (with - errno set to EACCES) if it wasn't. - - The IP_ADD_* and IP_DEL_* command codes do a fair bit of validity checking. - It is quite unlikely that a garbage firewall could get past them that - would cause major problems in the firewall checker. It IS possible for - a garbage packet to get past the checks which causes major grief because - it either blocks or accepts packets according to unusual rules (the rules - will conform to the ones described above but will probably come as quite - a surprise). - - The IP_CHECK_* command codes expect the optval parameter to point - to a struct ip immediately followed by a header appropriate to the protocol - value described in the ip_p field of the ip header. The exact requirements - are as follows: - - - The length of the optval parameter must be at least - - sizeof(struct ip) + 2 * sizeof(u_short) - - since this is the amount of memory that might be referenced by - the firewall checker. - - - The ip_hl field of the ip structure must be equal to - - sizeof(struct ip) / sizeof(int) - - since this value indicates that the tcp/udp/??? header immediately - follows the ip header (appropriate for the purposes that this - interface is intended for). - - Failure to follow these rules (for either the IP_ADD_*,IP_DEL_* or the - IP_CHECK_*_FIREWALL commands) will result in a return value of -1 with - errno set to EINVAL (for now, it will also result in an appropriate - message on the console). - - To read current configuration of firewalls,the kvm_read() function used. - Symbols,which you have to find are : - struct ip_firewall * ip_firewall_blocking_chain ; - struct ip_firewall * ip_firewall_forwarding_chain ; - Both are pointers to the linked list of firewall entries. - Of corse you have to be at least kmem group member,to read kernel symbols. - -That's about all that I can think of for now. There are a couple of details -that are worth reading about in the ip_firewall.h file. Other than that, let -me know how you do. If you have any problems, give me a call at home (403 -449-1835) or send me e-mail at "danny@BouletFermat.ab.ca". If you call, please -keep in mind that I live in the Canadian Mountain timezone (GMT-0600). - --Danny - -So that's it..if you want to say something to me-call me or mail: -Phone: 972-4-550-330 -E-mail ugen@NetVision.net.il -If you call,remember that i live in Israel timezone which is GMT+02. - --Ugen - diff --git a/sbin/ipfw/ipfirewall.4 b/sbin/ipfw/ipfirewall.4 deleted file mode 100644 index f11cbd54b304..000000000000 --- a/sbin/ipfw/ipfirewall.4 +++ /dev/null @@ -1,206 +0,0 @@ -.Dd November 16, 1994 -.Dt IPFW(4)/IPACCT 4 -.Os -.Sh NAME - - ipfirewall,ipfw - IP packets filter. - ipaccounting,ipacct - IP packets/traffic accounting. - -.Sh SYNOPSIS -#include <netinet/ip_fw.h> - -setsockopt(raw_socket,IPPROTO_IP,<ipfw/ipacct option>, - <struct ip|struct ipfw>,<size>) - -Ipfw options: - IP_FW_ADD_BLK - add entry to blocking chain. - IP_FW_ADD_FWD - add entry to forwarding chain. - IP_FW_CHK_BLK - check ip packet against blocking chain. - IP_FW_CHK_FWD - check ip packet against forwarding chain. - IP_FW_DEL_BLK - delete entry from blocking chain. - IP_FW_DEL_FWD - delete entry from forwarding chain. - IP_FW_FLUSH - flush all blocking & forwarding chain entries. - IP_FW_POLICY - define default ipfw policy. - -Ipacct options: - IP_ACCT_ADD - add entry to accounting chain. - IP_ACCT_DEL - delete entry from accounting chain. - IP_ACCT_FLUSH - flush all accounting chain entries. - IP_ACCT_ZERO - zero all accounting chain entries. - -Ipfw/ipacct entry structure: - #define IP_FW_MAX_PORTS 10 - -struct ip_fw { - struct ip_fw *next; - struct in_addr src, dst; - struct in_addr src_mask, dst_mask; - u_short flags; - u_short n_src_p, n_dst_p; - u_short ports[IP_FW_MAX_PORTS]; - u_long p_cnt,b_cnt; -} - -Flags values for "flags" field: - IP_FW_F_ALL - The entry should match all IP packets. - IP_FW_F_TCP - The entry should match TCP packets. - IP_FW_F_UDP - The entry should match UDP packets. - IP_FW_F_ICMP - The entry should match ICMP packets. - IP_FW_F_KIND - Mask value to separate protocol kind. - IP_FW_F_ACCEPT - This entry is accepting ( see below ) - IP_FW_F_SRNG - Source ports are range ( see below ) - IP_FW_F_DRNG - Destination ports are range ( see below ) - IP_FW_F_PRN - Print this entry ( see below ) - IP_FW_F_BIDIR - This acct entry is bidirectional ( see below ) - IP_FW_F_MASK - Mask to match all valid flag bits. - -Kernel symbols to kvm_nlist(): - struct ip_fw *ip_fw_blk_chain - chain of forwarding entries. - struct ip_fw *ip_fw_fwd_chain - chain of blocking entries. - int ip_fw_policy - default policy. - struct ip_fw *ip_acct_chain - chain of accounting entries. - -Options in the kernel configuration file: - IPFIREWALL - enable ipfirewall. - IPFIREWALL_VERBOSE - enable firewall output ( see below ) - DEBUG_IPFIREWALL - enable extensive debugging output. - IPACCT - enable ipaccounting. - -.Sh DESCRIPTION -Ipfirewall (later ipfw) is a system facility,which allows filtering -of incoming and/or forwarding packets on the protocol+source/destination -adress/ports base. -Ipaccounting (later ipacct) is a system facility,which allows counting -of incoming,outgoing and forwarding traffic by packet/byte count. - -Basic idea is that every packet checked against number of entries -in several chains.There are 3 chains: - Blocking - this chain defines whenever packet should be accepted - ever for local delivery or for forwarding. - Forwarding - this chain defines whenever packet should be accepted - for forwarding only. - Accounting - this chain defines types of packets , which should be - counted. - -Entries added to chains by means of setsockopt() call on RAW IP socket. -Options to add/remove specific entries or to flush all entries described -above. Value passed to setsockopt() is a value of struct ip_fw for -entry. If entry added , it checked by such rules that when we start -searching chain for matching entry the first matching is the best match, -[ or at least one of them :^) ]. - That means: - * First in chain entries with specific protocol and small ranges - of src/dst adresses and ports. - * Later going entries with wider ranges of ports and adresses. - * Later entries matching every port for some adress range. - * Later universal entries matching any protocol. - -While deleting entry , every entry which equal to that passed to -setsockopt() will be removed. -Flush removes all entries. - -Every entry have several fields,by which packets matched: - struct ip_fw *next - next entry in chain.(Set internally) - - struct in_addr src - source adress to be matched. - struct in_addr src_mask - source adress mask. - To match whole networks/subnets or adress groups - mask bits should be zeroed here and also - in src_mask field. Valuable bits should be set - in src_mask field. - struct in_addr dst - destination adress to be matched. - struct in_addr dst_mask - destination adress mask. - - u_short flags - flags field.See exact description of flags meaning - in description later. - - u_short n_src_p - number of source ports in "ports" array. - u_short n_dst_p - number of destination ports in "ports" array. - u_short ports[] - ports array.Overall length currently defined - to reasonable maximum - 10,and could be changed. - The packet's src port can ever match one of - ports[0] ... ports[--n_src_p] numbers,or if - flag IP_FW_F_SRNG set take port[0] as bottom - range value and ports[1] as top one.n_src_p should - be set to 2 then.If n_src_p equal to 0 , every port - match. The same rules apply to packet's dst port, - except that it matched against ports[n_src_p] ... - ... ports[n_src_p+n_dst_p--],or if IP_FW_F_DRNG set, - range is ports[n_src_p] to ports[n_srcp++]. - - u_long p_cnt - packets count for ipacct entries. - u_long b_cnt - bytes count for ipacct entries. - -Packet matching proceeds in following way: - -a) If packet entry protocol set to ALL, see c). - -b) If entry protocol set to TCP/UDP/ICMP and packet protocol - different - no match,if packet protocol and entry protocol - same - continue. - -c) If source addres pattern does not equal to packets sources adress - masked with src_mask , or destination pattern not equal to packets - destination adress masked with dst_mask - no match. - If they does and protocol set to ALL/ICMP - got match. - If they does and protocol set to TCP/UDP - continue. - -d) If src port doesn't match or dst port doesn't match - all - packet don't match. If they does - got match. - -In ipfw packet matched consequently against every chain entry. -Search continues untill first matching entry found.If IP_FW_F_ACCEPT -flag set - packet accepted.If it is not set - packet denied. -If no matching entry found , all unmatched packets ever accepted or -denied depending on global polici value. It can be set with -IP_FW_POLICY raw socket option. Deny value is 0, other values -(default 1) is accept. - -Entries can be added with IP_FW_F_PRN flag set.If kernel compiled -with IPFIREWALL_VERBOSE option,packets matching this entries will -be printed by kernel printf's. - -If some chain is empty,every packet accepted by this chain no -matter what default policy is. - -To check whenever or not packet denied by some chain , checking -options to setsockopt() can be issued. Then the argument is -a buffer representing ip packet,thus it has to be -struct ip + struct tcphdr . -Then setsockopt() return value 0 on accept or another on deny. - -Ipaccounting entries added the same way as ipfw ones.Packet checked -against all entries in chain and values of p_cnt and b_cnt in matching -entries rised.p_cnt rises by 1 and b_cnt by ip_len value of ip packet. -Thus all traffic size counted including IP headers. - -If IP_FW_F_BIDIR flag is set in accounting entry,packets counted are -those which match entry in standart way along with packets which match -entry while their source and destination addr/port pairs swapped. - -Zero option allows all accounting to be cleared. - -.Sh DIAGNOSTICS - -[EINVAL] The IP option field was improperly formed; an option - field was shorter than the minimum value or longer than - the option buffer provided.An structural error in - ip_fw structure occured (n_src_p+n_dst_p too big, - ports set for ALL/ICMP protocols etc.) - -.Sh SEE ALSO - -ip(4), setsockopt(2), kvm_nlist(3), kvm_read(3) - -.Sh BUGS - Ipfw/ipacct facilities are new and , although serious bugs has -been tracked,some less important ones expected. - This man page also uncomplete bad styled. - -.Sh HISTORY - Ipfw facility has been intitially written as package to BSDI -by Daniel Boulet <danny@BouletFermat.ab.ca>. - It has been havily modified and ported to FreeBSD 2.0 -by Ugen J.S.Antsilevich <ugen@NetVision.net.il> - Ipacct facility written for FreeBSD 2.0 -by Ugen J.S.Antsilevich <ugen@NetVision.net.il> diff --git a/sbin/ipfw/ipfw.1 b/sbin/ipfw/ipfw.1 deleted file mode 100644 index 720b259470dd..000000000000 --- a/sbin/ipfw/ipfw.1 +++ /dev/null @@ -1,527 +0,0 @@ -.\" -.\" ipfw - a utility for manipulating the configuration of an IP firewall. -.\" -.\" Redistribution and use in source and binary forms, with or without -.\" modification, are permitted provided that the following conditions -.\" are met: -.\" 1. Redistributions of source code must retain the above copyright -.\" notice, this list of conditions and the following disclaimer. -.\" 2. Redistributions in binary form must reproduce the above copyright -.\" notice, this list of conditions and the following disclaimer in the -.\" documentation and/or other materials provided with the distribution. -.\" -.\" @(#)ipfw.1 -.\" -.TH ipfw 1 "October 27, 1994" "" "FreeBSD" - -.SH NAME -ipfw - a utility for manipulating the configuration of an IP firewall. -.SH SYNOPSIS -.na -.B ipfw -.RB [options] -.SH DESCRIPTION -The -.B ipfw -command is used to configure an active IP firewall, setting masks on just -what sites are allowed to connect through it, which packets are rejected, -etc. -.SH OPTIONS -The command-line syntax of this command is rather involved, and rather than -spend a lot of time that I just don't have at the moment creating a -.B real -man page, with properly formatted sections and all, I'm just going to loosely -format the README I got. This really needs an nroff expert to go through -it with a chainsaw and do a -.N REAL -job of formatting it! This all looks rather horrible at present, and -I would actually almost recommend that you simply read the man page text -directly, rather than trying to format it. Sorry, but I do NOT speak -nroff, nor do I ever wish to learn how! :-) [-jkh]. -.PP -For a sample kernel configuration file that will enable the right kernel -features necessary for firewalling, see -.I /sys/i386/conf/IPFIREWALL -. -.PP -.B WARNING!!! WARNING!!! WARNING!!! WARNING!!! WARNING!!! WARNING!!! -.PP -This utility can be used to put your machine into very dysfunctional state, -so if you want to test it then you should first make sure to read this man page -all the way through, and don't run it anywhere from the system console! -Using -.I ipfw -incorrectly is a really good way to kick yourself off your own machine -if you're logged in over a network! Also make sure to never set this -utility to be setuid root! It's a blatant security hole that way. -Instead, run it as root or from "/etc/rc.local" as part of the boot process. -It's also a good idea to use the checkb or checkf command options (see below) -to pass some test packets through the firewalls that you've defined before -going "live". -.PP -You may find it useful to create a file in which the first line is -.I firewall flush -to flush any existing firewalls before defining the explicit firewalls -that you wish to use. This will ensure that you're always working from a -known state. -.PP -The syntax for the -.BI ipfirewall -command option is rather complex and yet simple at the same time (if you know -what I mean). There are seven sub-commands, and probably the easiest way to -get into this is to give you a roughly BNF style grammar for the command -(curly brackets are used for precedence, alternatives are separated by |, -optional things are enclosed in square brackets, white space is required if -it appears below and must not appear if there isn't any between the tokens -below (i.e. no white space around periods, colons or slashes, whitespace -required between all other tokens)): -.PP -.nf - command ::= ipfirewall <list> | <flush> | <check> | <add> | <del> - <list> ::= list - <flush> ::= flush - <check> ::= { checkb[locking] | checkf[orwarding] } <chkparms> - <add> ::= { addb[locking] | addf[orwarding] } <add-del-parms> - <del> ::= { delb[locking] | delf[orwarding] } <add-del-parms> - <chkparms> ::= <protocol> from <ipaddr> <port> to <ipaddr> <port> - <protocol> ::= tcp | udp - <ipaddr> ::= <int>.<int>.<int>.<int> | <hostname> - <hostname> ::= a host name from /etc/hosts - <port> ::= <int> | <service> - <service> ::= a service from /etc/services - <int> ::= a non-negative integer - <add-del-parms> ::= { accept | deny } { <universal_firewall> | <protocol_firewall> } - <universal_firewall> ::= all from <masked_ipaddr> to <masked_ipaddr> - <masked_ipaddr> ::= { <ipaddr>/<bits> } | { <ipaddr>:<ipaddr> } | <ipaddr> - <bits> ::= integer in the range 0 to 32 inclusive - <protocol_firewall> ::= <protocol> from <end_firewall> to <end_firewall> - <end_firewall> ::= <masked_ipaddr> <port_list> - <port_list> ::= [ <port>:<port> ] <sub_port_list> - <sub_port_list> ::= <port> [ <sub_port_list> ] -.fi -.PP -Although I think that the above grammar is complete, it isn't exactly what -one would call easy to comprehend! Here's the basic idea along with what -each of the forms mean: -.PP -The -.I ipfirewall list -command prints a list of the firewalls on both the -forwarding and blocking chain in some more or less comprehensible format. -.PP -The -.I ipfirewall flush -command empties the two firewall chains. -.PP -The -.I ipfirewall addblocking -and -.I ipfirewall addforwarding -commands take a firewall description and add the firewall to the appropriate -firewall chain. Note that you'll probably need to add some descriptions more -then once, which will naturally take more then one entry in memory. It does -not lead to significant degradation of performance, so don't worry about it. -.PP -The -.I ipfirewall delblocking -and -.I ipfirewall delforwarding -commands take a firewall description and delete the firewall from the -appropriate firewall chain. The description must exactly match that given -to an earlier add command. One delete command removes ALL matching entries -from firewall chains. -.PP -There are two basic kinds of firewall descriptions. Universal firewall -descriptions match all IP packets between specified pairs of hosts. -Universal firewalls only check IP addresses (e.g. they match any combination -of protocol and port numbers). Protocol-specific firewalls match either -TCP/IP or UDP/IP packets between specified pairs of hosts. In addition -to host descriptions, protocol-specific firewalls optionally take a -description of which port numbers to match. -.PP -A host description consists of an IP address and a mask. The IP address -is specified as either a domain name or in the familiar -nn.nn.nn.nn format. The mask indicates how much of the IP address -should be looked at when vetting packets. There are two ways to -specify the mask. The first way is to suffix the IP address in the -firewall with a slash and an integer in the range 0 through 32 inclusive. -This integer is taken to be the number of high order bits of the IP -address which are to be checked (for example, 192.153.211.0/24 checks -the top 24 bits of the IP address, 192.153.211.17/32 checks all the -bits and 0.0.0.0/0 checks none of the bits (i.e. all IP addresses are -matched by this example)). The second way to specify a mask is to -suffix the IP address with a colon followed by another IP address. -This second address is the mask. Specifications equivalent to the -above three examples using this syntax would be -.PP -.nf -192.153.211.0:255.255.255.0 -192.153.211.17:255.255.255.255 -0.0.0.0:0.0.0.0 -.fi -.PP -The first form is taken from the syntax accepted by a Telebit NetBlazer. -The second form is more along the lines of how a netmask is specified -in /etc/netmasks. Finally, if no mask is specified then a mask of all -1's is supplied (i.e. no mask is equivalent to /32 or :255.255.255.255). -.PP -The optional description of port numbers to mask can take three forms. -The simplest form is to omit the list in which case all port numbers -match. The next form is to specify a list of port numbers (either as -positive integers or service names from /etc/services). The final form -is actually a special case of the second form in which the first pair -of port numbers is separated by a colon instead of white space. This -pair specifies a range of port numbers (i.e. x:y specifies that all -ports between x and y inclusive should match). A port description -matches a particular port number if any of the following is true: -.nf - - the port description is null - - - the first pair of port numbers is a range and the port number - is in the range (inclusive) - - - the port number is equal to any of the port numbers in the list -.fi -.PP -There is a limit of a total of 10 port numbers in the source and -destination port lists. This limit is arbitrary and easy to increase. -It is determined by the value of the IP_FIREWALL_MAX_PORTS #define -variable in ip_firewall.h. Each increase of 1 for this value adds two -bytes to the size of each firewall. Since the size of a firewall is only -slightly over 30 bytes right now, this limit of 10 could probably -be increased by quite a bit before it became a concern. I've been -thinking of increasing it to 20 which would be longer than any -reasonable firewall would need and would only consume 20 more bytes -per firewall. The counter argument to any increase is that it is -always possible to construct an equivalent set of two or more firewalls -that behaves like a single firewall with a really long port list. -.PP -This probably all sounds hopelessly complicated. It is actually not -all that tricky (I'm just not very good at explaining it yet). A few -examples will probably help a lot now: -.PP -Block all IP packets originating from the host hackers-den: -.PP -.nf - ipfirewall addb deny all from hackers-den to 0.0.0.0/0 -.fi -.PP -Block all telnet packets to our telnet server from anywhere: -.PP -.nf - ipfirewall addb deny tcp from 0.0.0.0/0 to mymachine/32 telnet -.fi -.PP -Don't forward telnet, rlogin and rsh packets onto our local -class C network: -.PP -.nf - ipfirewall addf deny tcp from 0.0.0.0/0 to ournetwork/24 telnet login shell -.fi -.PP -Don't let anyone on the local machine or any machine inside -our local network ftp access to games.com: -.PP -.nf - ipfirewall addb deny tcp from games.com ftp to 0.0.0.0/0 -.fi -.PP -This last one might look a little strange. It doesn't prevent -anyone from sending packets to the games.com ftp server. What it -does do is block any packets that the games.com ftp server sends -back! -.PP -The -.I ipfirewall checkblocking -and -.I ipfirewall checkforwarding -commands take a description of an IP packet and check to see if the blocking -or forwarding chain of firewalls respectively accept or reject the packet. -It is used to make sure that the firewalls that you've defined work as -expected. The basic syntax is probably best understood by looking at -a couple of examples: -.PP -.nf - ipfirewall checkb from bsdi.com 3001 to mymachine telnet -.fi -.PP -checks to see if the blocking firewall will block a telnet packet from -a telnet session originating on bsdi.com to the host mymachine will be -blocked or not. Note that someone connecting to our telnet server -could be using practically any port number. To be really sure, the -firewall used to prevent access should be as simple as possible and/or -you should try a variety of port numbers in addition to the rather -arbitrarily chosen port of 3001. -.PP -One final note on the check* ,add* and del* command syntax. The noise word -"to" exists in the syntax so that I can detect the end of a list of -port numbers in the from description. Since I needed a noise word to -detect this case, I added the noise word "from" in front of the from -case for consistency. -.PP -Finally, have a look at the file -.I "/usr/share/misc/ipfw.samp.filters" -. It is the set of filters that I run at home [Danny]. -.PP -Also check -.I "/usr/share/misc/ipfw.samp.scripts" -For examples of individual access restrictions. -We [NetVision] use those for our dial-in PPP/SLIP users to allow some of them -to access our internal networks, while disallowing others. -This way we open access for the user's IP when he enters the system and shut it -down when he leaves. All such changes may be applyed at any time, -and so entries added and deleted from firewall while the system is -is working have no other side effects [Ugen]. - -.SH "TECHNICAL DETAILS" -A bit of a description of how the firewalls are applied (i.e. what happens in -the kernel) may be instructive to the advanced firewall-builder: -.PP -When an IP packet is received, the ipintr() routine in ip_input.c is -called. This routine does a bit of basic error checking. If it -detects any errors in the packet it generally drops the packet on -the floor. The idea behind the ipfirewall facility is to treat packets -that we don't want to accept as bad packets (i.e. drop them on the -floor). The ipfirewall facility intercedes in the normal processing -at two points. Just after the basic sanity checks are done, we pass -any packets not targeted at the loopback network (127.0.0.0/8) to the -firewall checker along with the chain of blocking firewalls.If the firewall -checker tells us to block the packet then we branch to the "bad:" label -in ipintr() which is where all bad packets are dropped on the floor. -Otherwise, we allow normal processing of the packet to continue. The -exact point at which we intercede was chosen to be after the basic -sanity checking and before the option processing is done. We want to -be after the basic sanity checking so that we don't have to be able -to handle complete garbage. We want to be before the option processing -because option processing is done in separate rather complex routine. -Why bother doing this special processing if we might be dropping the -packet? -.PP -The second point at which we intercede is when a packet is about to be -forwarded to another host. All such packets are passed to the ip_forward -routine. The ipfirewall code is at the very top of this routine. If -the packet isn't targetted at the loopback interface (is it possible -that it could be when we reach this point? I doubt it but safety first) -then pass the packet to the firewall checker along with the forwarding -firewall chain. If the firewall checker indicates that the packet should -not be forwarded then we drop in (using code copied from a few lines -further into the routine which drops broadcast packets which are not -to be forwarded). -.PP -There are a couple of consequences of this approach: -.PP -1) Packets which are blocked are never forwarded (something to keep -in mind when designing firewalls). -.PP -2) Packets targeted at the loopback interface (127.0.0.0/8) are never -blocked. Blocking packets to the loopback interface seems pointless -and potentially quite confusing. It also makes a possibly common -case very cheap. -.PP -3) The sender of a packet which is blocked receives no indication that -the packet was dropped. The Telebit NetBlazer can be configured to -silently drop a blocked packet or to send back a "you can't get there -from here" packet to the sender. Implementing the later would have -been more work (possibly quite a bit more, I don't really know). Also, -I don't see any reason to give a potential hacker any more information -than necessary. Dropping the packet into the bit bucket seems like -the best way to keep a hacker guessing. [Danny] -.PP -(I am working on this feature, it would be made optional and -configurable by some ICMP_UNREACH_ON_DROP option, or such [Ugen]). -.PP -The firewall checker takes two parameters. The first parameter is a pointer -to the packet in question. The second parameter is a pointer to the -appropriate firewall chain. At the present time, the firewall checker passes -these parameters to a second routine which is the real firewall checker. -If the real checker says NO then an appropriate message is printed -onto the console. This is useful for debugging purposes. Whether or -not it remains in the long term depends on whether it is considered useful -for logging purposes (I'm a little reluctant to leave it in since it -provides a hacker with a way to commit a "denial of service" offense -against you by filling up your /var/log/messages file's file system -with error messages. There are ways of preventing this but ... [Danny]). -In default configuration now no information about dropped packets -printed.You may, however, define it as i do by adding -.I options IPFIREWALL_VERBOSE -to your kernel configuration file. Very useful thingy! [Ugen] - -.PP -A return value of 0 from this routine (or the real firewall checker) -indicates that the packet is to be dropped. A value of 1 indicates -that the packet is to be accepted. In the early testing stages you -might want to make the top level firewall checker always return 1 even -if the real checker returns 0 just in case the real firewall checker -screws up (or your firewalls aren't as well designed as they should be). -In fact, this might be a useful optional feature (providing a way to -leave a door unlocked doesn't seem all that wise but it has to be -balanced against the inconvenience to legitimate users who might get -screwed up by poorly designed firewalls). - -.PP -The real firewall returns 1 (accept the packet) if the chain is empty. If -efficiency is a concern (which it is in this code), this check should -be done in ip_input.c before calling the firewall checker. - -.PP -Assuming that there is a firewall chain to scan through, the real firewall -checker picks up the src and dst IP addresses from the IP packet. It -then goes through the firewall chain looking for the first firewall that -matches the packet. Once a matching firewall has been found, a value of -1 is returned if the firewall is an accept firewall and a value of 0 is -returned otherwise. -.PP -The following processing is done for each firewall on the chain: -.PP -1) check the src and dst IP addresses. If they don't match then -there isn't any point in looking any further at this firewall. -This check is done by anding the packet's IP addresses the -with appropriate masks and comparing the results to the -appropriate addresses in the firewall. Note that the mask is -NOT applied to the address in the firewall. If it has any 1 -bits that are 0 bits in the mask then the firewall will never -match (this will be checked in ipfirewall soon). If the addresses -match then we continue with the next step. -.PP -2) If the firewall is a universal firewall then we've got a match. -Return either 0 or 1 as appropriate. Otherwise, continue with -the next step. -.PP -3) Examine the IP protocol from the packet. If we havn't had to -look at it before then we get it and set a local variable to -IP_FIREWALL_TCP for TCP/IP packets, IP_FIREWALL_UDP for UDP/IP -packets, IP_FIREWALL_ICMP for ICMP packets, and IP_FIREWALL_UNIVERSAL -for all other packet types. Also, if the packet is a TCP/IP or -a UDP/IP packet, save the source and destination port numbers -at this point (taking advantage of the fact that the port numbers -are stored in the same place in either a TCP/IP or a UDP/IP -packet header). If the packet is neither a TCP/IP or a UDP/IP -packet then this firewall won't match it (on to the next firewall). -If this packet's protocol doesn't match this firewall's protocol -(which can't be universal or we wouldn't be here) then on to -the next firewall. Otherwise, continue with the next step. -.PP -4) We're checking either a TCP/IP or a UDP/IP packet. If the -firewall's source port list is empty or the packet's source -port matches something in the source port list AND if the firewall's -destination port list is empty or the packet's destination -port matches something in the destination port list then -we've got a match (return 0 or 1 as appropriate). Otherwise, -on to the next firewall. -.PP -As indicated above, if no packet on the chain matches the packet then -it is accepted if the first firewall was a deny firewall and it is rejected -if the first firewall was an accept packet. This is equivalent to the -default behaviour of a Telebit NetBlazer. They provide a way to override -this behaviour. I'm not convinced that it is necessary (I'm open to -suggestions). -.PP -That's about it for the firewall checker. The -.I ipfw -program communicates with the kernel part of the firewall facility by making -setsockopt calls on RAW IP sockets. Only root is allowed to open a RAW IP -socket. This ensures that only root uses -.I ipfw to manipulate the firewall facility. -Also, somewhere in the kernel source or on a man page, I read that the -RAW IP setsockopt calls are intended for manipulating the IP protocol layer -as opposed to manipulating any particular instance of a socket. This seems -like a reasonable description of what the firewall setsockopt command -codes do. -.PP -There are seven setsockopt command codes defined by the firewall facility -(in netinet/in.h). They are: -.PP -.nf - IP_FLUSH_FIREWALLS flush (i.e. free) both firewall chains. - - IP_ADD_FORWARDING_FIREWALL add firewall pointed at by optval parm to - the end of the forwarding firewall chain. - - IP_ADD_BLOCKING_FIREWALL add firewall pointed at by optval parm to - the end of the blocking firewall chain. - - IP_DEL_FORWARDING_FIREWALL delete firewall pointed at by optval parm - from the forwarding firewall chain. - - IP_DEL_BLOCKING_FIREWALL delete firewall pointed at by optval parm - from the blocking firewall chain. - - IP_CHECK_FORWARDING_FIREWALL pass the IP packet do the firewall checker - along with the forwarding firewall chain. - Return 0 if packet was accepted, -1 (with - errno set to EACCES) if it wasn't. - - IP_CHECK_BLOCKING_FIREWALL pass the IP packet do the firewall checker - along with the blocking firewall chain. - Return 0 if packet was accepted, -1 (with - errno set to EACCES) if it wasn't. - - The IP_ADD_* and IP_DEL_* command codes do a fair bit of validity checking. - It is quite unlikely that a garbage firewall could get past them that - would cause major problems in the firewall checker. It IS possible for - a garbage packet to get past the checks which causes major grief because - it either blocks or accepts packets according to unusual rules (the rules - will conform to the ones described above but will probably come as quite - a surprise). - - The IP_CHECK_* command codes expect the optval parameter to point - to a struct ip immediately followed by a header appropriate to the protocol - value described in the ip_p field of the ip header. The exact requirements - are as follows: - - - The length of the optval parameter must be at least - - sizeof(struct ip) + 2 * sizeof(u_short) - - since this is the amount of memory that might be referenced by - the firewall checker. - - - The ip_hl field of the ip structure must be equal to - - sizeof(struct ip) / sizeof(int) - - since this value indicates that the tcp/udp/??? header immediately - follows the ip header (appropriate for the purposes that this - interface is intended for). - - Failure to follow these rules (for either the IP_ADD_*,IP_DEL_* or the - IP_CHECK_*_FIREWALL commands) will result in a return value of -1 with - errno set to EINVAL (for now, it will also result in an appropriate - message on the console). - - To read current configuration of firewalls,the kvm_read() function used. - Symbols,which you have to find are : - struct ip_firewall * ip_firewall_blocking_chain ; - struct ip_firewall * ip_firewall_forwarding_chain ; - Both are pointers to the linked list of firewall entries. - Of course, you must at least be a member of group kmem to read kernel - symbols. -.fi -.PP -There are a couple of additional details that are worth reading about in -the ip_firewall.h file. Other than that, let the authors know how you do! -If you have any problems, you may call Danny Boulet at home (403 449-1835) -or send e-mail to <danny@BouletFermat.ab.ca>. If you call, please keep in -mind that Danny lives in the Canadian Mountain timezone (GMT-0600). -.PP -You may also reach some commercial users of this package (and also those -responsible for porting it to FreeBSD and adding several additional -commands), at 972-4-550-330, or via email at <ugen@NetVision.net.il>. -If you call, remember that Ugen lives in the Israel timezone, which is GMT+02. - -.SH FILES -/usr/share/misc/ipfw.samp.filters -/usr/share/misc/ipfw.samp.scripts -.SH "BUGS" -You can very easily hose your machine utterly if you don't know what you're -doing. Dieses Befehl ist nur fuer Experten! -.SH "SEE ALSO" -.BR reboot (1) , -.PP -.BR /sys/i386/conf/IPFIREWALL -.SH AUTHORS -Daniel Boulet <danny@BouletFermat.ab.ca> -.PP -Ugen J.S.Antsilevich <ugen@NetVision.net.il> -.PP -Jordan K. Hubbard <jkh@FreeBSD.org> [Crimes committed in this manpage] |