Date: Fri, 30 Jul 1999 12:22:57 -0600 From: Oscar Bonilla <obonilla@fisicc-ufm.edu> To: "David B. Aas" <dave@ciminot.com> Cc: questions@freebsd.org, obonilla@fisicc-ufm.edu Subject: Re: FW: Need consulting help with v3.2 firewall configuration Message-ID: <19990730122256.A1784@fisicc-ufm.edu> In-Reply-To: <000401bed9ff$44528860$0fc8a8c0@dave.ciminot.com>; from David B. Aas on Thu, Jul 29, 1999 at 03:16:38PM -0500 References: <000401bed9ff$44528860$0fc8a8c0@dave.ciminot.com>
next in thread | previous in thread | raw e-mail | index | archive | help
AFAICS you're not allowing your clients to do DNS queries... see below On Thu, Jul 29, 1999 at 03:16:38PM -0500, David B. Aas wrote: > Whoops! > > I forgot to include my rules. Sorry for the extra email. > > # Setup system for firewall service. > # $Id: rc.firewall,v 1.19.2.1 1999/02/10 18:08:38 jkh Exp $ > # Customized by Dave Aas 1999/07/20 > > # Suck in the configuration variables. > if [ -f /etc/defaults/rc.conf ]; then > . /etc/defaults/rc.conf > elif [ -f /etc/rc.conf ]; then > . /etc/rc.conf > fi > > # Flush out the list before we begin. > ipfw -f flush > > # Divert internal ip addresses > ipfw add 100 divert natd all from any to any via ${natd_interface} > > # Allow all outbound traffic > ipfw add 150 allow all from any to any out > > # Only in rare cases do you want to change these rules > ipfw add 200 pass all from any to any via lo0 > ipfw add 300 deny all from any to 127.0.0.0/8 > > # Stop spoofing > ipfw add 400 deny all from ${inet}:${imask} to any in via ${oif} > ipfw add 500 deny all from ${onet}:${omask} to any in via ${iif} > > # Allow TCP through if setup succeeded > ipfw add 600 pass tcp from any to any established > > # Allow setup of incoming email > ipfw add 700 pass tcp from any to ${oip} 25 setup > ipfw add 710 allow tcp from any to any 110 setup > > # Allow access to our DNS > ipfw add 800 pass tcp from any to ${oip} 53 setup this says let my machine talk to DNS servers on the internet for zone transfers (TCP) > > # Allow access to our WWW > ipfw add 900 pass tcp from any to ${oip} 80 setup > > # Other webserver traffic > ipfw add 910 allow tcp from any to ${oip} 80 in via ${oif} > ipfw add 920 allow tcp from any to ${oip} 3128 in via ${oif} > > # Allow setup of outgoing TCP connections only > ipfw add 1000 allow tcp from ${oip}:${omask} to any setup > ipfw add 1100 allow tcp from ${iip}:${imask} to any setup > > # Allow maintenance from CI > ipfw add 1200 allow tcp from ${maintip} to ${oip} 21 setup > ipfw add 1300 allow tcp from ${maintip} to ${oip} 23 setup > > # Allow DNS queries out in the world > ipfw add 1400 pass udp from any 53 to ${oip} > ipfw add 1500 pass udp from ${oip} to any 53 this says allow my server to ask DNS queries from the internet. You should add a rule saying "let my clients do DNS queries" I would change those previous two rules for ipfw add 1400 pass udp from any 53 to any ipfw add 1500 pass udp from any to any 53 regards, -Oscar -- For PGP Public Key: finger obonilla@fisicc-ufm.edu To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19990730122256.A1784>