Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 20 Aug 2001 10:39:10 -0700
From:      Erick Mechler <emechler@techometer.net>
To:        Martin McCormick <martin@dc.cis.okstate.edu>
Cc:        security@FreeBSD.ORG
Subject:   Re: Firewall Rule Logic
Message-ID:  <20010820103910.B36920@techometer.net>
In-Reply-To: <E15YdI2-0002Qo-00@dc.cis.okstate.edu>; from Martin McCormick on Sun, Aug 19, 2001 at 07:51:38PM -0500
References:  <E15YdI2-0002Qo-00@dc.cis.okstate.edu>

next in thread | previous in thread | raw e-mail | index | archive | help
You'll want to setup something that goes like this:

  ...deny spoofing attacks
  ...allow all from localhost
  ...allow all established tcp connections
  ...allow all outgoing tcp connections
  ...allow specific ports (such as ssh, smtp, etc)
  ...deny all tcp connections

You'll want to duplicate this basic setup for your UDP/ICMP rules, etc.

:: 	Can I put a line at the end of the rule chain that goes
:: something like:
:: 
:: ${fwcmd} add 400 deny log tcp from any to a.host.okstate.edu all
:: and then put one rule per allowed port in to open up just those
:: ports that we need?

I have the following rule to disallow all outside access:

  ${fwcmd} add deny log tcp from any to any in via ${oif}

The ${oif} part can be important if your box is doing routing, or has more
than one interface.

--Erick

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010820103910.B36920>