Date: Fri, 17 Sep 2004 13:39:23 -0500 From: Norm Vilmer <norm@etherealconsulting.com> To: Micheal Patterson <micheal@tsgincorporated.com> Cc: freebsd-questions@freebsd.org Subject: Re: Too many dynamic rules, sorry Message-ID: <414B2F5B.4090702@etherealconsulting.com> In-Reply-To: <07af01c49cdd$e9910f80$4df24243@tsgincorporated.com> References: <414A6E9C.4060708@etherealconsulting.com><020b01c49c76$e3d1ada0$0201a8c0@dredster> <414AF79C.4030809@etherealconsulting.com> <06af01c49cc5$b0b615b0$4df24243@tsgincorporated.com> <414B02FD.6020703@etherealconsulting.com> <06fd01c49ccd$36e91450$4df24243@tsgincorporated.com> <414B150C.6090608@etherealconsulting.com> <07af01c49cdd$e9910f80$4df24243@tsgincorporated.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Micheal Patterson wrote:
>
> ----- Original Message -----
> From: "Norm Vilmer" <norm@etherealconsulting.com>
> To: "Micheal Patterson" <micheal@tsgincorporated.com>
> Cc: <freebsd-questions@freebsd.org>
> Sent: Friday, September 17, 2004 11:47 AM
> Subject: Re: Too many dynamic rules, sorry
>
>
>
>>Micheal Patterson wrote:
>>
>>>----- Original Message -----
>>>From: "Norm Vilmer" <norm@etherealconsulting.com>
>>>To: "Micheal Patterson" <micheal@tsgincorporated.com>
>>>Cc: <freebsd-questions@freebsd.org>
>>>Sent: Friday, September 17, 2004 10:30 AM
>>>Subject: Re: Too many dynamic rules, sorry
>>>
>>>
>>><snip>
>>>
>>>>I do have a check-state rule
>>>>
>>>>add 00200 check-state
>>>>
>>>>Norm Vilmer
>>>
>>>
>>>Ok. Then right above the check-state entry, place an
>>>
>>>allow ip from 123.123.123/24 to 123.123.123./24
>>>
>>>Replace the ip's with the appropriate network/metric for your lan and
>
> that
>
>>>will allow lan traffic to go to itself unhindered by any stateful
>
> checks.
>
>>>--
>>>
>>>Micheal Patterson
>>>TSG Network Administration
>>>405-917-0600
>>>
>>>
>>>
>>
>>would this be the same?
>>
>>add 00200 allow all from any to any via ${iif} keep-state
>>add 00210 check-state
>>
>>
>
>
> The goal is to not use dynamic rules for your local lan, only the traffic
> from the lan to the net. Otherwise, you're wasting dynamic state table space
> for rules that aren't necessary.
>
> A very basic stateful ruleset:
>
> ipfw add 100 allow ip from 1.1.1.0/24 to 1.1.1.0/24
> ipfw add 500 check-state
> ipfw add 600 allow ip from 1.1.1.0/24 to any keep-state
> ipfw add 65000 deny log ip from any to any
>
> That type of ruleset, will allow local traffic without using state table,
> and the entry at 1000 will catch everything else outbound and use state
> tables for it. If it's not originating from your network, and there's no
> state entry, it's blocked by 65000.
>
> --
>
> Micheal Patterson
> TSG Network Administration
> 405-917-0600
>
> _______________________________________________
> freebsd-questions@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to "freebsd-questions-unsubscribe@freebsd.org"
>
I tried your suggestion and got the same results and I think I
understand why. If I have this right, it's putting keep-state on
a rule that cause dynamic rules to be created. Well, I have
removed all the keep-state's except for the one you specified.
I launched the nmap attack against my public ip, however, the
machine I launched it from is on the same network segment as the
firewalls internal interface. So the traffic is going out the firewall
then coming back in. If I am correct, this is a major Doh! on my part.
Of course the net.inet.ip.fw.dyn_count is climbing, the
ipfw add 600 allow ip from 1.1.1.0/24 to any keep-state
rule is the culprit due to the outbound traffic.
So I really need to nmap my firewall from another location
to complete my test.
Hmmm, does this mean that I can mess up my firewall by running
nmap on a machine inside my firewall. It appears so.
Do you know what the maximum value for net.inet.ip.fw.dyn_max is?
I thought I read 8192....
Norm Vilmer
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?414B2F5B.4090702>
