Add the ipfw command, for IP firewall construction.

Submitted by:	danny ugen
This commit is contained in:
Jordan K. Hubbard 1994-10-28 15:06:53 +00:00
parent 2461956095
commit b877c0f37e
Notes: svn2git 2020-12-20 02:59:44 +00:00
svn path=/cvs2svn/branches/ipfw/; revision=3965
4 changed files with 2145 additions and 0 deletions

5
sbin/ipfw/Makefile Normal file
View File

@ -0,0 +1,5 @@
PROG= ipfw
DPADD= ${LIBKVM}
LDADD= -lkvm
.include <bsd.prog.mk>

610
sbin/ipfw/README Normal file
View File

@ -0,0 +1,610 @@
*****************************************************************************
27 Oct 94
Hi again!
So thanx to Brian McGovern , i'v took this piece of code in hands again
and made some changes:
1) Port to FreeBSD 2.0 , so we will not go after time.
2) Some minor changes in kernel part to improve speed and such..
3) Chane in behaviour: now any recently added firewall definition
preferred on other matching but older firewalls.
REMEMBER: in any case universal IP firewall has larger preference
then special TCP/UDP/ICMP firewalls.
4) Cosmetical changes to control programm. Now it is called ipfw.
5) Changed ip_firewall.* to ip_fw.* in kernel,and shortened some long
variable names.
6) From now on we have user defined *policy*,which is DENY/ACCEPT for
every packet which does not matches any of firewalls.I.e.: if any
firewall defined and packet does not match them you may set it up
so it will be anyway throwed or anyway accepted.
Mostly that's all.
Bye!
--
-= Ugen J.S.Antsilevich =-
NetVision - Commercial Internet Provider
-----------------------------------------------------[C]---
NetVision - Home of Israeli Commercial Internet
E-mail: ugen@NetVision.net.il
HTTP: http://www.NetVision.net.il/~ugen/
Phone: +972-4-550330 Fax: +972-4-550122
*****************************************************************************
10 Jul 94
Hi again...So i sitted and stared at this nice working tool and thought to
myself that it's nice but something there it needs and have not..
So i took a piece of file and a keyboard and typed some strings.
What it was is:
o List facility improved...Now listing of currently installed firewall
entries does not go through kernel printf's ,which is really unnice to
one who runs it NOT from console:)
o Really important facility of deleting entries added..Yes , till this
day you had to remove all entries and then add them one by one again
to remove actually just one.Now it's over:)
o All this changes documented in this readme,while you will see where i
added my words just by vast number of mistaces in English.Well,i hope
you will forgive one Russian guy like me:)
So enjoy this new code and if you think it needs some additions - you
are welcome to suggest.Also i made some more warnings , while compiling
this code,i have no a clue where do they come from,however they does not
make any bad to programm.But if you will find way to remove them,feel free
to do it and post anywhere(and notify me as i also need this:)
Bye! Ugen J.S.Antsilevich
##########################################################################
# Ugen J.S.Antsilevich NetVision (Israel) System Staff Member #
#------------------------------------------------------------------------#
# Email: ugen@NetVision.net.il | Phone: 972-4-550330 #
# ugen@NetManage.co.il | Fax: 972-4-550122 #
#------------------------------------------------------------------------#
# WWW HomePage: http://www.NetVision.net.il/~ugen #
# Special : Volk@Les.Tambov.SU #
##########################################################################
*****************************************************************************
8 Jul 94
OK..so first of all,this is simple port to FreeBSD by Ugen J.S.Antsilevich
Actually all i had to do is to find appropriate place in kernel source files
for ipfirewall stuff..so all your thanks should go to the author...
Anyway i am porting it now to 1.1.5 (not much job though..:) so if you want
to ask something about write to me:
ugen@NetVision.net.il
That's it and let the --==REAL==-- author speak...
*****************************************************************************
Here's my ipfirewall facility. I consider it to still be beta quality mostly
because the various interfaces are pretty crude. Here's some information that
you'll probably find useful (in roughly the order in which you'll need to know
it). Some of this will be absurdly simplistic. Better safe than sorry...
This software was written for BSD/386. The current version has been ported
to BSD/386 v1.1. The context diffs are with respect to that version of
BSD/386. If you don't have access to BSD/386 v1.1 and can't make sense out of
the diffs, contact me and I'll send you the entire files (they are copyrighted
by UC-Berkeley with very 'friendly' conditions).
Speaking of copyrights, here's mine:
/*
* Copyright (c) 1993 Daniel Boulet
* Copyright (c) 1994 Ugen J.S.Antsilevich
*
* Redistribution and use in source forms, with and without modification,
* are permitted provided that this entire comment appears intact.
*
* Redistribution in binary form may occur without any restrictions.
* Obviously, it would be nice if you gave credit where credit is due
* but requiring it would be too onerous.
*
* This software is provided ``AS IS'' without any warranties of any kind.
*/
Enough introductory stuff, here we go...
1) The file IPFIREWALL is the configuration of kernel i use with
IPFIREWALL and GATEWAY options enabled. You may not find it useful.
About the only key things are that it enables the IPFIREWALL
option and the GATEWAY option. IPFIREWALL turns on my
stuff and GATEWAY turns your machine into an IP router.
There is nothing magical about the name of this file or the
ident name for the kernel.
2) The files ip_fw.c and ip_fw.h are new files that should be
placed into the /usr/src/sys/netinet directory.
3) The files ip_input.c and raw_ip.c are new patched versions of the
same files , they made up for version 2.0 of FreeBSD,however it was
some pre-Beta release we worked on , so to add it to other releases
just find all parts of code surrounded by:
#ifdef IPFIREWALL
....
#endif
and place in the appropriate places in the same files.
All those files are in /usr/src/sys/netinet directory of corse.
4) Add the line "netinet/ip_fw.c optional ipfirewall" to the
file /usr/src/sys/conf/files. This tells the config program to
include the netinet/ip_fw.c file if the IPFIREWALL option is
defined for a kernel.
5) The Makefile and ipfw.c files should go into directory probably
back in your home directory tree somewhere. If this ever becomes a
part of the system then they should go into the (newly created)
directory /usr/src/sbin/ipfw.
6) Build yourself a kernel, make a backup of the current kernel and
and install the new one. It should behave in a completely normal
fashion since you won't have defined any firewalls yet.
7) Explore the ipfw program. The smartest way to do this is to
compile the program and then run it.To do it you SHOULD be root
as the programm uses setsockopt on RAW sockets to define firewalls,
and also reads kernel symbols.If any other user will run ipw
it will detect that it isn't being run by root and will just
complain and exit.
The ipfw program takes command line parameters
and (assuming they are valid) issues a single appropriate setsockopt
call. If you're defining 5 firewalls then you'll have to run the
program 5 times. See below for a description of the command syntax
of ipfirewall.
====================================================================
WARNING!!! WARNING!!! WARNING!!! WARNING!!! WARNING!!! WARNING!!!
The ipfw program can be used to put your machine into very
disfunctional state.So if you want to test it make sure you
a) Have read carifully this README till it's end.
b) First time run it from machine console,as else you can
simply shut down your own access to it.
====================================================================
Make sure that you never setup the program as setuid root!!! Instead,
always run it from the root command line or from "/etc/rc.local"
as part of the boot process.
8) Use the "ipfirewall" checkb or checkf command (see below) to pass some
test packets through the firewalls that you've defined.
9) You may find it useful to create a file in which the first line is
"ipfirewall flush" to flush any existing firewalls and the remaining
lines are the ipfirewall commands needed to define the firewalls that
you want to use. This will ensure that you're always working from a
known state.
10) If you've gotten this far then you're probably ready to let the critter
see prime time. Copy your file of ipfirewall commands into the
/etc/rc.local file and reboot the system. Once you're up, use the
ipfirewall list command to see that you've got the firewalls that you
wanted and try to test the firewall with real packets from trusted
and untrusted hosts.
Enough of that. Here's the syntax for the ipfirewall command. It is rather
complex and yet simple at the same time (if you know what I mean). There
are seven sub-commands. Probably the easiest way to get into this is to give
you a roughly BNF style grammar for the command (curly brackets are used for
precedence, alternatives are separated by |, optional things are enclosed
in square brackets, white space is required if it appears below and must
not appear if there isn't any between the tokens below (i.e. no white space
around periods, colons or slashes, whitespace required between all other
tokens)):
command ::= ipfirewall <list> | <flush> | <check> | <add> | <del>
<list> ::= list
<flush> ::= flush
<check> ::= { checkb[locking] | checkf[orwarding] } <chkparms>
<add> ::= { addb[locking] | addf[orwarding] } <add-del-parms>
<del> ::= { delb[locking] | delf[orwarding] } <add-del-parms>
<chkparms> ::= <protocol> from <ipaddr> <port> to <ipaddr> <port>
<protocol> ::= tcp | udp
<ipaddr> ::= <int>.<int>.<int>.<int> | <hostname>
<hostname> ::= a host name from /etc/hosts
<port> ::= <int> | <service>
<service> ::= a service from /etc/services
<int> ::= a non-negative integer
<add-del-parms> ::= { accept | deny } { <universal_firewall> | <protocol_firewall> }
<universal_firewall> ::= all from <masked_ipaddr> to <masked_ipaddr>
<masked_ipaddr> ::= { <ipaddr>/<bits> } | { <ipaddr>:<ipaddr> } | <ipaddr>
<bits> ::= integer in the range 0 to 32 inclusive
<protocol_firewall> ::= <protocol> from <end_firewall> to <end_firewall>
<end_firewall> ::= <masked_ipaddr> <port_list>
<port_list> ::= [ <port>:<port> ] <sub_port_list>
<sub_port_list> ::= <port> [ <sub_port_list> ]
Although I think that the above grammar is complete, it isn't exactly what
one would call easy to comprehend! Here's the basic idea along with what
each of the forms mean:
The "ipfirewall list" command prints a list of the firewalls on both the
forwarding and blocking chain in some more or less understudable format.
The "ipfirewall flush" command empties the two firewall chains.
The "ipfirewall addblocking" and "ipfirewall addforwarding" commands take
a firewall description and add the firewall to the appropriate firewall
chain.Take notice,that if you will add some description more then once,
it will take more then one entry in memory.It does not lead to significant
slow down of computer operation though.
The "ipfirewall delblocking" and "ipfirewall delforwarding" commands take
a firewall description and deletes the firewall from the appropriate
firewall chain.The description must be exactly the same as it was defined
by add command.One delete command removes ALL same entries from firewall
chains.
There are two basic kinds of firewall descriptions. Universal firewall
descriptions match all IP packets between specified pairs of hosts.
Universal firewalls only check IP addresses (i.e. they match any combination
of protocol and port numbers). Protocol-specific firewalls match either
TCP/IP or UDP/IP packets between specified pairs of hosts. In addition
to host descriptions, protocol-specific firewalls optionally take a
description of which port numbers to match.
A host description consists of an IP address and a mask. The IP address
is specified as either a domain name or in the familiar
nn.nn.nn.nn format. The mask indicates how much of the IP address
should be looked at when vetting packets. There are two ways to
specify the mask. The first way is to suffix the IP address in the
firewall with a slash and an integer in the range 0 through 32 inclusive.
This integer is taken to be the number of high order bits of the IP
address which are to be checked (for example, 192.153.211.0/24 checks
the top 24 bits of the IP address, 192.153.211.17/32 checks all the
bits and 0.0.0.0/0 checks none of the bits (i.e. all IP addresses are
matched by this example)). The second way to specify a mask is to
suffix the IP address with a colon followed by another IP address.
This second address is the mask. Specifications equivalent to the
above three examples using this syntax would be
192.153.211.0:255.255.255.0
192.153.211.17:255.255.255.255
0.0.0.0:0.0.0.0
The first form is taken from the syntax accepted by a Telebit NetBlazer.
The second form is more along the lines of how a netmask is specified
in /etc/netmasks. Finally, if no mask is specified then a mask of all
1's is supplied (i.e. no mask is equivalent to /32 or :255.255.255.255).
The optional description of port numbers to mask can take three forms.
The simplest form is to omit the list in which case all port numbers
match. The next form is to specify a list of port numbers (either as
positive integers or service names from /etc/services). The final form
is actually a special case of the second form in which the first pair
of port numbers is separated by a colon instead of white space. This
pair specifies a range of port numbers (i.e. x:y specifies that all
ports between x and y inclusive should match). A port description
matches a particular port number if any of the following is true:
- the port description is null
- the first pair of port numbers is a range and the port number
is in the range (inclusive)
- the port number is equal to any of the port numbers in the list
There is a limit of a total of 10 port numbers in the source and
destination port lists. This limit is arbitrary and easy to increase.
It is determined by the value of the IP_FIREWALL_MAX_PORTS #define
variable in ip_firewall.h. Each increase of 1 for this value adds two
bytes to the size of each firewall. Since the size of a firewall is only
slightly over 30 bytes right now, this limit of 10 could probably
be increased by quite a bit before it became a concern. I've been
thinking of increasing it to 20 which would be longer than any
reasonable firewall would need and would only consume 20 more bytes
per firewall. The counter argument to any increase is that it is
always possible to construct an equivalent set of two or more firewalls
that behaves like a single firewall with a really long port list.
This probably all sounds hopelessly complicated. It is actually not
all that tricky (I'm just not very good at explaining it yet). A few
examples will probably help a lot now:
Block all IP packets originating from the host hackers-den:
ipfirewall addb deny all from hackers-den to 0.0.0.0/0
Block all telnet packets to our telnet server from anywhere:
ipfirewall addb deny tcp from 0.0.0.0/0 to mymachine/32 telnet
Don't forward telnet, rlogin and rsh packets onto our local
class C network:
ipfirewall addf deny tcp from 0.0.0.0/0 to ournetwork/24 telnet login shell
Don't let anyone on the local machine or any machine inside
our local network ftp access to games.com:
ipfirewall addb deny tcp from games.com ftp to 0.0.0.0/0
This last one might look a little strange. It doesn't prevent
anyone from sending packets to the games.com ftp server. What it
does do is block any packets that the games.com ftp server sends
back!
The "ipfirewall checkblocking" and "ipfirewall checkforwarding" commands
take a description of an IP packet and check to see if the blocking
or forwarding chain of firewalls respectively accept or reject the packet.
It is used to make sure that the firewalls that you've defined work as
expected. The basic syntax is probably best understood by looking at
a couple of examples:
ipfirewall checkb from bsdi.com 3001 to mymachine telnet
checks to see if the blocking firewall will block a telnet packet from
a telnet session originating on bsdi.com to the host mymachine will be
blocked or not. Note that someone connecting to our telnet server
could be using practically any port number. To be really sure, the
firewall used to prevent access should be as simple as possible and/or
you should try a variety of port numbers in addition to the rather
arbitrarily chosen port of 3001.
One final note on the check* ,add* and del* command syntax. The noise word
"to" exists in the syntax so that I can detect the end of a list of
port numbers in the from description. Since I needed a noise word to
detect this case, I added the noise word "from" in front of the from
case for consistency.
Finally, have a look at the file "filters". It is the set of filters
that I run at home.<Danny>
Also check "scripts",where individual access restrictions written.
We use those for our dial-in PPP/SLIP users,to allow some of them
to access our internal networks,while disallowing other.This way we
open access to user's IP,when he enters the system ,and shut it
down when he leaves.All those changes may be applyed at any time,
and so entries added and deleted from firewall while system is
is working.No any side effects will arise.<Ugen>
Now for a bit of a description of how the firewalls are applied (i.e. what
happens in the kernel):
When an IP packet is received, the ipintr() routine in ip_input.c is
called. This routine does a bit of basic error checking. If it
detects any errors in the packet it generally drops the packet on
the floor. The idea behind the ipfirewall facility is to treat packets
that we don't want to accept as bad packets (i.e. drop them on the
floor). The ipfirewall facility intercedes in the normal processing
at two points. Just after the basic sanity checks are done, we pass
any packets not targeted at the loopback network (127.0.0.0/8) to the
firewall checker along with the chain of blocking firewalls.If the firewall
checker tells us to block the packet then we branch to the "bad:" label
in ipintr() which is where all bad packets are dropped on the floor.
Otherwise, we allow normal processing of the packet to continue. The
exact point at which we intercede was chosen to be after the basic
sanity checking and before the option processing is done. We want to
be after the basic sanity checking so that we don't have to be able
to handle complete garbage. We want to be before the option processing
because option processing is done in separate rather complex routine.
Why bother doing this special processing if we might be dropping the
packet?
The second point at which we intercede is when a packet is about to be
forwarded to another host. All such packets are passed to the ip_forward
routine. The ipfirewall code is at the very top of this routine. If
the packet isn't targetted at the loopback interface (is it possible
that it could be when we reach this point? I doubt it but safety first)
then pass the packet to the firewall checker along with the forwarding
firewall chain. If the firewall checker indicates that the packet should
not be forwarded then we drop in (using code copied from a few lines
further into the routine which drops broadcast packets which are not
to be forwarded).
There are a couple of consequences of this approach:
1) Packets which are blocked are never forwarded (something to keep
in mind when designing firewalls).
2) Packets targeted at the loopback interface (127.0.0.0/8) are never
blocked. Blocking packets to the loopback interface seems pointless
and potentially quite confusing. It also makes a possibly common
case very cheap.
3) The sender of a packet which is blocked receives no indication that
the packet was dropped. The Telebit NetBlazer can be configured to
silently drop a blocked packet or to send back a "you can't get there
from here" packet to the sender. Implementing the later would have
been more work (possibly quite a bit more, I don't really know). Also,
I don't see any reason to give a potential hacker any more information
than necessary. Dropping the packet into the bit bucket seems like
the best way to keep a hacker guessing.<Danny>
Well,anyway i working on this feature.It would be made optional and
configurable by some ICMP_UNREACH_ON_DROP or like this.<Ugen>
Now for some details on how the firewall checker works:
The firewall checker takes two parameters. The first parameter is a pointer
to the packet in question. The second parameter is a pointer to the
appropriate firewall chain. At the present time, the firewall checker passes
these parameters to a second routine which is the real firewall checker.
If the real checker says NO then an appropriate message is printed
onto the console. This is useful for debugging purposes. Whether or
not it remains in the long term depends on whether it is considered useful
for logging purposes (I'm a little reluctant to leave it in since it
provides a hacker with a way to commit a "denial of service" offense
against you by filling up your /var/log/messages file's file system
with error messages. There are ways of preventing this but ...<Danny>).
In default configuration now no information about dropped packets
printed.You may,however,define it,as i do by adding
option IPFIREWALL_VERBOSE
to your kernel configuration file.Very useful thingy!<Ugen>
A return value of 0 from this routine (or the real firewall checker)
indicates that the packet is to be dropped. A value of 1 indicates
that the packet is to be accepted. In the early testing stages you
might want to make the top level firewall checker always return 1 even
if the real checker returns 0 just in case the real firewall checker
screws up (or your firewalls aren't as well designed as they should be).
In fact, this might be a useful optional feature (providing a way to
leave a door unlocked doesn't seem all that wise but it has to be
balanced against the inconvenience to legitimate users who might get
screwed up by poorly designed firewalls).
The real firewall returns 1 (accept the packet) if the chain is empty. If
efficiency is a concern (which it is in this code), this check should
be done in ip_input.c before calling the firewall checker.
Assuming that there is a firewall chain to scan through, the real firewall
checker picks up the src and dst IP addresses from the IP packet. It
then goes through the firewall chain looking for the first firewall that
matches the packet. Once a matching firewall has been found, a value of
1 is returned if the firewall is an accept firewall and a value of 0 is
returned otherwise.
The following processing is done for each firewall on the chain:
1) check the src and dst IP addresses. If they don't match then
there isn't any point in looking any further at this firewall.
This check is done by anding the packet's IP addresses the
with appropriate masks and comparing the results to the
appropriate addresses in the firewall. Note that the mask is
NOT applied to the address in the firewall. If it has any 1
bits that are 0 bits in the mask then the firewall will never
match (this will be checked in ipfirewall soon). If the addresses
match then we continue with the next step.
2) If the firewall is a universal firewall then we've got a match.
Return either 0 or 1 as appropriate. Otherwise, continue with
the next step.
3) Examine the IP protocol from the packet. If we havn't had to
look at it before then we get it and set a local variable to
IP_FIREWALL_TCP for TCP/IP packets, IP_FIREWALL_UDP for UDP/IP
packets, IP_FIREWALL_ICMP for ICMP packets, and IP_FIREWALL_UNIVERSAL
for all other packet types. Also, if the packet is a TCP/IP or
a UDP/IP packet, save the source and destination port numbers
at this point (taking advantage of the fact that the port numbers
are stored in the same place in either a TCP/IP or a UDP/IP
packet header). If the packet is neither a TCP/IP or a UDP/IP
packet then this firewall won't match it (on to the next firewall).
If this packet's protocol doesn't match this firewall's protocol
(which can't be universal or we wouldn't be here) then on to
the next firewall. Otherwise, continue with the next step.
4) We're checking either a TCP/IP or a UDP/IP packet. If the
firewall's source port list is empty or the packet's source
port matches something in the source port list AND if the firewall's
destination port list is empty or the packet's destination
port matches something in the destination port list then
we've got a match (return 0 or 1 as appropriate). Otherwise,
on to the next firewall.
As indicated above, if no packet on the chain matches the packet then
it is accepted if the first firewall was a deny firewall and it is rejected
if the first firewall was an accept packet. This is equivalent to the
default behaviour of a Telebit NetBlazer. They provide a way to override
this behaviour. I'm not convinced that it is necessary (I'm open to
suggestions).
That's about it for the firewall checker. The ipfirewall program communicates
with the kernel part of the firewall facility by making setsockopt calls
on RAW IP sockets. Only root is allowed to open a RAW IP socket. This
ensures that only root uses ipfirewall to manipulate the firewall facility.
Also, somewhere in the kernel source or on a man page, I read that the
RAW IP setsockopt calls are intended for manipulating the IP protocol layer
as opposed to manipulating any particular instance of a socket. This seems
like a reasonable description of what the firewall setsockopt command
codes do.
There are seven setsockopt command codes defined by the firewall facility
(in netinet/in.h). They are:
IP_FLUSH_FIREWALLS flush (i.e. free) both firewall chains.
IP_ADD_FORWARDING_FIREWALL add firewall pointed at by optval parm to
the end of the forwarding firewall chain.
IP_ADD_BLOCKING_FIREWALL add firewall pointed at by optval parm to
the end of the blocking firewall chain.
IP_DEL_FORWARDING_FIREWALL delete firewall pointed at by optval parm
from the forwarding firewall chain.
IP_DEL_BLOCKING_FIREWALL delete firewall pointed at by optval parm
from the blocking firewall chain.
IP_CHECK_FORWARDING_FIREWALL pass the IP packet do the firewall checker
along with the forwarding firewall chain.
Return 0 if packet was accepted, -1 (with
errno set to EACCES) if it wasn't.
IP_CHECK_BLOCKING_FIREWALL pass the IP packet do the firewall checker
along with the blocking firewall chain.
Return 0 if packet was accepted, -1 (with
errno set to EACCES) if it wasn't.
The IP_ADD_* and IP_DEL_* command codes do a fair bit of validity checking.
It is quite unlikely that a garbage firewall could get past them that
would cause major problems in the firewall checker. It IS possible for
a garbage packet to get past the checks which causes major grief because
it either blocks or accepts packets according to unusual rules (the rules
will conform to the ones described above but will probably come as quite
a surprise).
The IP_CHECK_* command codes expect the optval parameter to point
to a struct ip immediately followed by a header appropriate to the protocol
value described in the ip_p field of the ip header. The exact requirements
are as follows:
- The length of the optval parameter must be at least
sizeof(struct ip) + 2 * sizeof(u_short)
since this is the amount of memory that might be referenced by
the firewall checker.
- The ip_hl field of the ip structure must be equal to
sizeof(struct ip) / sizeof(int)
since this value indicates that the tcp/udp/??? header immediately
follows the ip header (appropriate for the purposes that this
interface is intended for).
Failure to follow these rules (for either the IP_ADD_*,IP_DEL_* or the
IP_CHECK_*_FIREWALL commands) will result in a return value of -1 with
errno set to EINVAL (for now, it will also result in an appropriate
message on the console).
To read current configuration of firewalls,the kvm_read() function used.
Symbols,which you have to find are :
struct ip_firewall * ip_firewall_blocking_chain ;
struct ip_firewall * ip_firewall_forwarding_chain ;
Both are pointers to the linked list of firewall entries.
Of corse you have to be at least kmem group member,to read kernel symbols.
That's about all that I can think of for now. There are a couple of details
that are worth reading about in the ip_firewall.h file. Other than that, let
me know how you do. If you have any problems, give me a call at home (403
449-1835) or send me e-mail at "danny@BouletFermat.ab.ca". If you call, please
keep in mind that I live in the Canadian Mountain timezone (GMT-0600).
-Danny
So that's it..if you want to say something to me-call me or mail:
Phone: 972-4-550-330
E-mail ugen@NetVision.net.il
If you call,remember that i live in Israel timezone which is GMT+02.
-Ugen

524
sbin/ipfw/ipfw.1 Normal file
View File

@ -0,0 +1,524 @@
.\"
.\" ipfw - a utility for manipulating the configuration of an IP firewall.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\"
.\" @(#)ipfw.1
.\"
.TH ipfw 1 "October 27, 1994" "" "FreeBSD"
.SH NAME
ipfw - a utility for manipulating the configuration of an IP firewall.
.SH SYNOPSIS
.na
.B ipfw
.RB [options]
.SH DESCRIPTION
The
.B ipfw
command is used to configure an active IP firewall, setting masks on just
what sites are allowed to connect through it, which packets are rejected,
etc.
.SH OPTIONS
The command-line syntax of this command is rather involved, and rather than
spend a lot of time that I just don't have at the moment creating a
.B real
man page, with properly formatted sections and all, I'm just going to loosely
format the README I got. This really needs an nroff expert to go through
it with a chainsaw and do a
.N REAL
job of formatting it! This all looks rather horrible at present, and
I would actually almost recommend that you simply read the man page text
directly, rather than trying to format it. Sorry, but I do NOT speak
nroff, nor do I ever wish to learn how! :-) [-jkh].
.PP
For a sample kernel configuration file that will enable the right kernel
features necessary for firewalling, see
.I /sys/i386/conf/IPFIREWALL
.
.PP
.B WARNING!!! WARNING!!! WARNING!!! WARNING!!! WARNING!!! WARNING!!!
.PP
This utility can be used to put your machine into very dysfunctional state,
so if you want to test it then you should first make sure to read this man page
all the way through, and don't run it anywhere from the system console!
Using
.I ipfw
incorrectly is a really good way to kick yourself off your own machine
if you're logged in over a network! Also make sure to never set this
utility to be setuid root! It's a blatant security hole that way.
Instead, run it as root or from "/etc/rc.local" as part of the boot process.
It's also a good idea to use the checkb or checkf command options (see below)
to pass some test packets through the firewalls that you've defined before
going "live".
.PP
You may find it useful to create a file in which the first line is
.I firewall flush
to flush any existing firewalls before defining the explicit firewalls
that you wish to use. This will ensure that you're always working from a
known state.
.PP
The syntax for the
.BI ipfirewall
command option is rather complex and yet simple at the same time (if you know
what I mean). There are seven sub-commands, and probably the easiest way to
get into this is to give you a roughly BNF style grammar for the command
(curly brackets are used for precedence, alternatives are separated by |,
optional things are enclosed in square brackets, white space is required if
it appears below and must not appear if there isn't any between the tokens
below (i.e. no white space around periods, colons or slashes, whitespace
required between all other tokens)):
.PP
.nf
command ::= ipfirewall <list> | <flush> | <check> | <add> | <del>
<list> ::= list
<flush> ::= flush
<check> ::= { checkb[locking] | checkf[orwarding] } <chkparms>
<add> ::= { addb[locking] | addf[orwarding] } <add-del-parms>
<del> ::= { delb[locking] | delf[orwarding] } <add-del-parms>
<chkparms> ::= <protocol> from <ipaddr> <port> to <ipaddr> <port>
<protocol> ::= tcp | udp
<ipaddr> ::= <int>.<int>.<int>.<int> | <hostname>
<hostname> ::= a host name from /etc/hosts
<port> ::= <int> | <service>
<service> ::= a service from /etc/services
<int> ::= a non-negative integer
<add-del-parms> ::= { accept | deny } { <universal_firewall> | <protocol_firewall> }
<universal_firewall> ::= all from <masked_ipaddr> to <masked_ipaddr>
<masked_ipaddr> ::= { <ipaddr>/<bits> } | { <ipaddr>:<ipaddr> } | <ipaddr>
<bits> ::= integer in the range 0 to 32 inclusive
<protocol_firewall> ::= <protocol> from <end_firewall> to <end_firewall>
<end_firewall> ::= <masked_ipaddr> <port_list>
<port_list> ::= [ <port>:<port> ] <sub_port_list>
<sub_port_list> ::= <port> [ <sub_port_list> ]
.fi
.PP
Although I think that the above grammar is complete, it isn't exactly what
one would call easy to comprehend! Here's the basic idea along with what
each of the forms mean:
.PP
The
.I ipfirewall list
command prints a list of the firewalls on both the
forwarding and blocking chain in some more or less comprehensible format.
.PP
The
.I ipfirewall flush
command empties the two firewall chains.
.PP
The
.I ipfirewall addblocking
and
.I ipfirewall addforwarding
commands take a firewall description and add the firewall to the appropriate
firewall chain. Note that you'll probably need to add some descriptions more
then once, which will naturally take more then one entry in memory. It does
not lead to significant degradation of performance, so don't worry about it.
.PP
The
.I ipfirewall delblocking
and
.I ipfirewall delforwarding
commands take a firewall description and delete the firewall from the
appropriate firewall chain. The description must exactly match that given
to an earlier add command. One delete command removes ALL matching entries
from firewall chains.
.PP
There are two basic kinds of firewall descriptions. Universal firewall
descriptions match all IP packets between specified pairs of hosts.
Universal firewalls only check IP addresses (e.g. they match any combination
of protocol and port numbers). Protocol-specific firewalls match either
TCP/IP or UDP/IP packets between specified pairs of hosts. In addition
to host descriptions, protocol-specific firewalls optionally take a
description of which port numbers to match.
.PP
A host description consists of an IP address and a mask. The IP address
is specified as either a domain name or in the familiar
nn.nn.nn.nn format. The mask indicates how much of the IP address
should be looked at when vetting packets. There are two ways to
specify the mask. The first way is to suffix the IP address in the
firewall with a slash and an integer in the range 0 through 32 inclusive.
This integer is taken to be the number of high order bits of the IP
address which are to be checked (for example, 192.153.211.0/24 checks
the top 24 bits of the IP address, 192.153.211.17/32 checks all the
bits and 0.0.0.0/0 checks none of the bits (i.e. all IP addresses are
matched by this example)). The second way to specify a mask is to
suffix the IP address with a colon followed by another IP address.
This second address is the mask. Specifications equivalent to the
above three examples using this syntax would be
.PP
.nf
192.153.211.0:255.255.255.0
192.153.211.17:255.255.255.255
0.0.0.0:0.0.0.0
.fi
.PP
The first form is taken from the syntax accepted by a Telebit NetBlazer.
The second form is more along the lines of how a netmask is specified
in /etc/netmasks. Finally, if no mask is specified then a mask of all
1's is supplied (i.e. no mask is equivalent to /32 or :255.255.255.255).
.PP
The optional description of port numbers to mask can take three forms.
The simplest form is to omit the list in which case all port numbers
match. The next form is to specify a list of port numbers (either as
positive integers or service names from /etc/services). The final form
is actually a special case of the second form in which the first pair
of port numbers is separated by a colon instead of white space. This
pair specifies a range of port numbers (i.e. x:y specifies that all
ports between x and y inclusive should match). A port description
matches a particular port number if any of the following is true:
.nf
- the port description is null
- the first pair of port numbers is a range and the port number
is in the range (inclusive)
- the port number is equal to any of the port numbers in the list
.fi
.PP
There is a limit of a total of 10 port numbers in the source and
destination port lists. This limit is arbitrary and easy to increase.
It is determined by the value of the IP_FIREWALL_MAX_PORTS #define
variable in ip_firewall.h. Each increase of 1 for this value adds two
bytes to the size of each firewall. Since the size of a firewall is only
slightly over 30 bytes right now, this limit of 10 could probably
be increased by quite a bit before it became a concern. I've been
thinking of increasing it to 20 which would be longer than any
reasonable firewall would need and would only consume 20 more bytes
per firewall. The counter argument to any increase is that it is
always possible to construct an equivalent set of two or more firewalls
that behaves like a single firewall with a really long port list.
.PP
This probably all sounds hopelessly complicated. It is actually not
all that tricky (I'm just not very good at explaining it yet). A few
examples will probably help a lot now:
.PP
Block all IP packets originating from the host hackers-den:
.PP
.nf
ipfirewall addb deny all from hackers-den to 0.0.0.0/0
.fi
.PP
Block all telnet packets to our telnet server from anywhere:
.PP
.nf
ipfirewall addb deny tcp from 0.0.0.0/0 to mymachine/32 telnet
.fi
.PP
Don't forward telnet, rlogin and rsh packets onto our local
class C network:
.PP
.nf
ipfirewall addf deny tcp from 0.0.0.0/0 to ournetwork/24 telnet login shell
.fi
.PP
Don't let anyone on the local machine or any machine inside
our local network ftp access to games.com:
.PP
.nf
ipfirewall addb deny tcp from games.com ftp to 0.0.0.0/0
.fi
.PP
This last one might look a little strange. It doesn't prevent
anyone from sending packets to the games.com ftp server. What it
does do is block any packets that the games.com ftp server sends
back!
.PP
The
.I ipfirewall checkblocking
and
.I ipfirewall checkforwarding
commands take a description of an IP packet and check to see if the blocking
or forwarding chain of firewalls respectively accept or reject the packet.
It is used to make sure that the firewalls that you've defined work as
expected. The basic syntax is probably best understood by looking at
a couple of examples:
.PP
.nf
ipfirewall checkb from bsdi.com 3001 to mymachine telnet
.fi
.PP
checks to see if the blocking firewall will block a telnet packet from
a telnet session originating on bsdi.com to the host mymachine will be
blocked or not. Note that someone connecting to our telnet server
could be using practically any port number. To be really sure, the
firewall used to prevent access should be as simple as possible and/or
you should try a variety of port numbers in addition to the rather
arbitrarily chosen port of 3001.
.PP
One final note on the check* ,add* and del* command syntax. The noise word
"to" exists in the syntax so that I can detect the end of a list of
port numbers in the from description. Since I needed a noise word to
detect this case, I added the noise word "from" in front of the from
case for consistency.
.PP
Finally, have a look at the file
.I "/usr/share/misc/ipfw.samp.filters"
. It is the set of filters that I run at home [Danny].
.PP
Also check
.I "/usr/share/misc/ipfw.samp.scripts"
For examples of individual access restrictions.
We [NetVision] use those for our dial-in PPP/SLIP users to allow some of them
to access our internal networks, while disallowing others.
This way we open access for the user's IP when he enters the system and shut it
down when he leaves. All such changes may be applyed at any time,
and so entries added and deleted from firewall while the system is
is working have no other side effects [Ugen].
.SH "TECHNICAL DETAILS"
A bit of a description of how the firewalls are applied (i.e. what happens in
the kernel) may be instructive to the advanced firewall-builder:
.PP
When an IP packet is received, the ipintr() routine in ip_input.c is
called. This routine does a bit of basic error checking. If it
detects any errors in the packet it generally drops the packet on
the floor. The idea behind the ipfirewall facility is to treat packets
that we don't want to accept as bad packets (i.e. drop them on the
floor). The ipfirewall facility intercedes in the normal processing
at two points. Just after the basic sanity checks are done, we pass
any packets not targeted at the loopback network (127.0.0.0/8) to the
firewall checker along with the chain of blocking firewalls.If the firewall
checker tells us to block the packet then we branch to the "bad:" label
in ipintr() which is where all bad packets are dropped on the floor.
Otherwise, we allow normal processing of the packet to continue. The
exact point at which we intercede was chosen to be after the basic
sanity checking and before the option processing is done. We want to
be after the basic sanity checking so that we don't have to be able
to handle complete garbage. We want to be before the option processing
because option processing is done in separate rather complex routine.
Why bother doing this special processing if we might be dropping the
packet?
.PP
The second point at which we intercede is when a packet is about to be
forwarded to another host. All such packets are passed to the ip_forward
routine. The ipfirewall code is at the very top of this routine. If
the packet isn't targetted at the loopback interface (is it possible
that it could be when we reach this point? I doubt it but safety first)
then pass the packet to the firewall checker along with the forwarding
firewall chain. If the firewall checker indicates that the packet should
not be forwarded then we drop in (using code copied from a few lines
further into the routine which drops broadcast packets which are not
to be forwarded).
.PP
There are a couple of consequences of this approach:
.PP
1) Packets which are blocked are never forwarded (something to keep
in mind when designing firewalls).
.PP
2) Packets targeted at the loopback interface (127.0.0.0/8) are never
blocked. Blocking packets to the loopback interface seems pointless
and potentially quite confusing. It also makes a possibly common
case very cheap.
.PP
3) The sender of a packet which is blocked receives no indication that
the packet was dropped. The Telebit NetBlazer can be configured to
silently drop a blocked packet or to send back a "you can't get there
from here" packet to the sender. Implementing the later would have
been more work (possibly quite a bit more, I don't really know). Also,
I don't see any reason to give a potential hacker any more information
than necessary. Dropping the packet into the bit bucket seems like
the best way to keep a hacker guessing. [Danny]
.PP
(I am working on this feature, it would be made optional and
configurable by some ICMP_UNREACH_ON_DROP option, or such [Ugen]).
.PP
The firewall checker takes two parameters. The first parameter is a pointer
to the packet in question. The second parameter is a pointer to the
appropriate firewall chain. At the present time, the firewall checker passes
these parameters to a second routine which is the real firewall checker.
If the real checker says NO then an appropriate message is printed
onto the console. This is useful for debugging purposes. Whether or
not it remains in the long term depends on whether it is considered useful
for logging purposes (I'm a little reluctant to leave it in since it
provides a hacker with a way to commit a "denial of service" offense
against you by filling up your /var/log/messages file's file system
with error messages. There are ways of preventing this but ... [Danny]).
In default configuration now no information about dropped packets
printed.You may, however, define it as i do by adding
.I options IPFIREWALL_VERBOSE
to your kernel configuration file. Very useful thingy! [Ugen]
.PP
A return value of 0 from this routine (or the real firewall checker)
indicates that the packet is to be dropped. A value of 1 indicates
that the packet is to be accepted. In the early testing stages you
might want to make the top level firewall checker always return 1 even
if the real checker returns 0 just in case the real firewall checker
screws up (or your firewalls aren't as well designed as they should be).
In fact, this might be a useful optional feature (providing a way to
leave a door unlocked doesn't seem all that wise but it has to be
balanced against the inconvenience to legitimate users who might get
screwed up by poorly designed firewalls).
.PP
The real firewall returns 1 (accept the packet) if the chain is empty. If
efficiency is a concern (which it is in this code), this check should
be done in ip_input.c before calling the firewall checker.
.PP
Assuming that there is a firewall chain to scan through, the real firewall
checker picks up the src and dst IP addresses from the IP packet. It
then goes through the firewall chain looking for the first firewall that
matches the packet. Once a matching firewall has been found, a value of
1 is returned if the firewall is an accept firewall and a value of 0 is
returned otherwise.
.PP
The following processing is done for each firewall on the chain:
.PP
1) check the src and dst IP addresses. If they don't match then
there isn't any point in looking any further at this firewall.
This check is done by anding the packet's IP addresses the
with appropriate masks and comparing the results to the
appropriate addresses in the firewall. Note that the mask is
NOT applied to the address in the firewall. If it has any 1
bits that are 0 bits in the mask then the firewall will never
match (this will be checked in ipfirewall soon). If the addresses
match then we continue with the next step.
.PP
2) If the firewall is a universal firewall then we've got a match.
Return either 0 or 1 as appropriate. Otherwise, continue with
the next step.
.PP
3) Examine the IP protocol from the packet. If we havn't had to
look at it before then we get it and set a local variable to
IP_FIREWALL_TCP for TCP/IP packets, IP_FIREWALL_UDP for UDP/IP
packets, IP_FIREWALL_ICMP for ICMP packets, and IP_FIREWALL_UNIVERSAL
for all other packet types. Also, if the packet is a TCP/IP or
a UDP/IP packet, save the source and destination port numbers
at this point (taking advantage of the fact that the port numbers
are stored in the same place in either a TCP/IP or a UDP/IP
packet header). If the packet is neither a TCP/IP or a UDP/IP
packet then this firewall won't match it (on to the next firewall).
If this packet's protocol doesn't match this firewall's protocol
(which can't be universal or we wouldn't be here) then on to
the next firewall. Otherwise, continue with the next step.
.PP
4) We're checking either a TCP/IP or a UDP/IP packet. If the
firewall's source port list is empty or the packet's source
port matches something in the source port list AND if the firewall's
destination port list is empty or the packet's destination
port matches something in the destination port list then
we've got a match (return 0 or 1 as appropriate). Otherwise,
on to the next firewall.
.PP
As indicated above, if no packet on the chain matches the packet then
it is accepted if the first firewall was a deny firewall and it is rejected
if the first firewall was an accept packet. This is equivalent to the
default behaviour of a Telebit NetBlazer. They provide a way to override
this behaviour. I'm not convinced that it is necessary (I'm open to
suggestions).
.PP
That's about it for the firewall checker. The
.I ipfw
program communicates with the kernel part of the firewall facility by making
setsockopt calls on RAW IP sockets. Only root is allowed to open a RAW IP
socket. This ensures that only root uses
.I ipfw to manipulate the firewall facility.
Also, somewhere in the kernel source or on a man page, I read that the
RAW IP setsockopt calls are intended for manipulating the IP protocol layer
as opposed to manipulating any particular instance of a socket. This seems
like a reasonable description of what the firewall setsockopt command
codes do.
.PP
There are seven setsockopt command codes defined by the firewall facility
(in netinet/in.h). They are:
.PP
.nf
IP_FLUSH_FIREWALLS flush (i.e. free) both firewall chains.
IP_ADD_FORWARDING_FIREWALL add firewall pointed at by optval parm to
the end of the forwarding firewall chain.
IP_ADD_BLOCKING_FIREWALL add firewall pointed at by optval parm to
the end of the blocking firewall chain.
IP_DEL_FORWARDING_FIREWALL delete firewall pointed at by optval parm
from the forwarding firewall chain.
IP_DEL_BLOCKING_FIREWALL delete firewall pointed at by optval parm
from the blocking firewall chain.
IP_CHECK_FORWARDING_FIREWALL pass the IP packet do the firewall checker
along with the forwarding firewall chain.
Return 0 if packet was accepted, -1 (with
errno set to EACCES) if it wasn't.
IP_CHECK_BLOCKING_FIREWALL pass the IP packet do the firewall checker
along with the blocking firewall chain.
Return 0 if packet was accepted, -1 (with
errno set to EACCES) if it wasn't.
The IP_ADD_* and IP_DEL_* command codes do a fair bit of validity checking.
It is quite unlikely that a garbage firewall could get past them that
would cause major problems in the firewall checker. It IS possible for
a garbage packet to get past the checks which causes major grief because
it either blocks or accepts packets according to unusual rules (the rules
will conform to the ones described above but will probably come as quite
a surprise).
The IP_CHECK_* command codes expect the optval parameter to point
to a struct ip immediately followed by a header appropriate to the protocol
value described in the ip_p field of the ip header. The exact requirements
are as follows:
- The length of the optval parameter must be at least
sizeof(struct ip) + 2 * sizeof(u_short)
since this is the amount of memory that might be referenced by
the firewall checker.
- The ip_hl field of the ip structure must be equal to
sizeof(struct ip) / sizeof(int)
since this value indicates that the tcp/udp/??? header immediately
follows the ip header (appropriate for the purposes that this
interface is intended for).
Failure to follow these rules (for either the IP_ADD_*,IP_DEL_* or the
IP_CHECK_*_FIREWALL commands) will result in a return value of -1 with
errno set to EINVAL (for now, it will also result in an appropriate
message on the console).
To read current configuration of firewalls,the kvm_read() function used.
Symbols,which you have to find are :
struct ip_firewall * ip_firewall_blocking_chain ;
struct ip_firewall * ip_firewall_forwarding_chain ;
Both are pointers to the linked list of firewall entries.
Of course, you must at least be a member of group kmem to read kernel
symbols.
.fi
.PP
There are a couple of additional details that are worth reading about in
the ip_firewall.h file. Other than that, let the authors know how you do!
If you have any problems, you may call Danny Boulet at home (403 449-1835)
or send e-mail to <danny@BouletFermat.ab.ca>. If you call, please keep in
mind that Danny lives in the Canadian Mountain timezone (GMT-0600).
.PP
You may also reach some commercial users of this package (and also those
responsible for porting it to FreeBSD and adding several additional
commands), at 972-4-550-330, or via email at <ugen@NetVision.net.il>.
If you call, remember that Ugen lives in the Israel timezone, which is GMT+02.
.SH FILES
/usr/share/misc/ipfw.samp.filters
/usr/share/misc/ipfw.samp.scripts
.SH "BUGS"
You can very easily hose your machine utterly if you don't know what you're
doing. Dieses Befehl ist nur fuer Experten!
.SH "SEE ALSO"
.BR reboot (1) ,
.BR /sys/i386/conf/IPFIREWALL
.SH AUTHORS
Daniel Boulet <danny@BouletFermat.ab.ca>
Ugen J.S.Antsilevich <ugen@NetVision.net.il>
Jordan K. Hubbard <jkh@FreeBSD.org> [Crimes committed in this manpage]

1006
sbin/ipfw/ipfw.c Normal file

File diff suppressed because it is too large Load Diff