Date: Tue, 20 Feb 2001 12:05:46 -0800 (PST) From: Nick Sayer <nsayer@quack.kfu.com> To: freebsd-security@freebsd.org Subject: /etc/rc.firewall fixes Message-ID: <200102202005.f1KK5kv83619@medusa.kfu.com>
next in thread | raw e-mail | index | archive | help
I would like to suggest a new "simple" firewall configuration.
I recently put a security fix in the prototype /etc/rc.firewall
stuff to close up a rather glaring security hole.
The old stuff did
pass udp from any 53 to ${oip}
which allows someone to communicate, for instance, with port 2049 so
long as they bind their end to 53. The state keeping stuff is the
correct solution.
My proposed "simple" firewall config goes something like this:
check-state
pass udp from ${mynet} to any keep-state
pass all from ${mynet} to any
pass tcp from any to any established
pass icmp from any to any
This simple set of rules represents a simple one-way set up. UDP is
allowed to go out, and matching replies are allowed to come back in.
TCP sessions are allowed to go out only.
By itself it is not a complete ruleset, but I think it is a better one
than any of the examples we presently have. I haven't committed this
because I wanted to start some discussion first and commit the resulting
consensus.
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200102202005.f1KK5kv83619>
