Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 24 Aug 2004 22:55:13 +0200
From:      "Simon L. Nielsen" <simon@FreeBSD.org>
To:        Chris <racerx@makeworld.com>
Cc:        FreeBSD - ipfw <freebsd-ipfw@freebsd.org>
Subject:   Re: Denying multiple IP's
Message-ID:  <20040824205513.GJ760@zaphod.nitro.dk>
In-Reply-To: <412B6A23.1000708@makeworld.com>
References:  <412B6A23.1000708@makeworld.com>

next in thread | previous in thread | raw e-mail | index | archive | help

--SBT+cnFS/G3NVgv4
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On 2004.08.24 11:17:39 -0500, Chris wrote:
> I'm working with a friend of mine w/ipfw. Below are IP's that are trying=
=20
> to hack in via ssh. I suggested to use something in the form of:
>=20
> # Allow in SFTP, SSH, and SCP from public Internet
> ${fwcmd} add 090 pass log tcp from xxx.xxx.xxx.xxx/29 to ${ip} 22 setup=
=20
> limit src-addr 4
>=20
> But he mentions that he needs access to his box from potential client=20
> sites where the IP is unknown.
>=20
> There has to be a better way to block the below - suggestions?

If you use FreeBSD -CURRENT or -STABLE (newer than 4.10 and 5.2) you
could use the new table feature.  Otherwise if you use ipfw2 you could
use "or-blocks" e.g.

ipfw deny ip from { 1.2.4.5 or 1.2.4.7 or 1.2.5.7 } to any

or something like that.

In any case there is probably no need to have sperate tcp/udp rules,
you could just use "ip" and block all traffic from the IP's.

> #
> # IPs that seem to want to get in REALLY bad... deny all tcp/udp from IPs.
> #
>
> ${fwcmd} add 300 deny tcp from 24.79.68.179 to any
> ${fwcmd} add 301 deny udp from 24.79.68.179 to any
> ${fwcmd} add 302 deny tcp from 64.246.20.123 to any
> ${fwcmd} add 303 deny udp from 64.246.20.123 to any
> ${fwcmd} add 304 deny tcp from 81.223.99.90 to any
> ${fwcmd} add 305 deny udp from 81.223.99.90 to any
> ${fwcmd} add 306 deny tcp from 140.112.124.123 to any
> ${fwcmd} add 307 deny udp from 140.112.124.123 to any
> ${fwcmd} add 308 deny tcp from 193.145.87.3 to any
> ${fwcmd} add 309 deny udp from 193.145.87.3 to any
> ${fwcmd} add 310 deny tcp from 203.186.157.37 to any
> ${fwcmd} add 311 deny udp from 203.186.157.37 to any
> ${fwcmd} add 312 deny tcp from 210.204.129.11 to any
> ${fwcmd} add 313 deny udp from 210.204.129.11 to any
> ${fwcmd} add 314 deny tcp from 211.60.219.250 to any
> ${fwcmd} add 315 deny udp from 211.60.219.250 to any
> ${fwcmd} add 316 deny tcp from 211.252.9.126 to any
> ${fwcmd} add 317 deny udp from 211.252.9.126 to any
> ${fwcmd} add 318 deny tcp from 218.21.129.105 to any
> ${fwcmd} add 319 deny udp from 218.21.129.105 to any
> ${fwcmd} add 320 deny tcp from 218.49.183.17 to any
> ${fwcmd} add 321 deny udp from 218.49.183.17 to any
> ${fwcmd} add 322 deny tcp from 218.102.19.78 to any
> ${fwcmd} add 323 deny udp from 218.102.19.78 to any
> ${fwcmd} add 324 deny tcp from 218.237.66.152 to any
> ${fwcmd} add 325 deny udp from 218.237.66.152 to any
> ${fwcmd} add 326 deny tcp from 221.3.131.80 to any
> ${fwcmd} add 327 deny udp from 221.3.131.80 to any
>=20
> # Everything else is denied by default

--=20
Simon L. Nielsen
FreeBSD Documentation Team

--SBT+cnFS/G3NVgv4
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (FreeBSD)

iD8DBQFBK6sxh9pcDSc1mlERAj55AJ40hhW2updO7SXc8wV0w0meI9bLWwCfTT3q
K/+hTV/Vv8aaq9JVjpbHuxQ=
=32rK
-----END PGP SIGNATURE-----

--SBT+cnFS/G3NVgv4--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20040824205513.GJ760>