1999-04-28 02:49:29 +00:00
|
|
|
.\"
|
1999-08-28 00:22:10 +00:00
|
|
|
.\" $FreeBSD$
|
1999-04-28 02:49:29 +00:00
|
|
|
.\"
|
2002-08-16 10:31:47 +00:00
|
|
|
.Dd August 13, 2002
|
1999-06-15 12:56:38 +00:00
|
|
|
.Dt IPFW 8
|
2001-07-10 11:04:34 +00:00
|
|
|
.Os
|
1994-11-17 09:50:30 +00:00
|
|
|
.Sh NAME
|
1995-10-26 05:36:24 +00:00
|
|
|
.Nm ipfw
|
2001-06-04 23:56:26 +00:00
|
|
|
.Nd IP firewall and traffic shaper control program
|
1994-11-17 09:50:30 +00:00
|
|
|
.Sh SYNOPSIS
|
2000-11-20 16:52:27 +00:00
|
|
|
.Nm
|
2002-08-19 12:36:54 +00:00
|
|
|
.Op Fl cq
|
2002-08-10 15:04:40 +00:00
|
|
|
.Cm add
|
|
|
|
.Ar rule
|
2000-11-20 16:52:27 +00:00
|
|
|
.Nm
|
2003-07-12 08:35:25 +00:00
|
|
|
.Op Fl acdefnNStT
|
2001-10-01 14:13:36 +00:00
|
|
|
.Brq Cm list | show
|
2003-07-12 07:01:48 +00:00
|
|
|
.Op Ar rule | first-last ...
|
2000-11-20 16:52:27 +00:00
|
|
|
.Nm
|
2002-08-10 15:04:40 +00:00
|
|
|
.Op Fl f | q
|
|
|
|
.Cm flush
|
2000-11-20 16:52:27 +00:00
|
|
|
.Nm
|
2002-08-10 15:04:40 +00:00
|
|
|
.Op Fl q
|
2002-08-16 10:31:47 +00:00
|
|
|
.Brq Cm delete | zero | resetlog
|
2002-08-10 15:04:40 +00:00
|
|
|
.Op Cm set
|
|
|
|
.Op Ar number ...
|
2003-01-12 03:31:10 +00:00
|
|
|
.Nm
|
|
|
|
.Cm enable
|
|
|
|
.Brq Cm firewall | one_pass | debug | verbose | dyn_keepalive
|
|
|
|
.Nm
|
|
|
|
.Cm disable
|
|
|
|
.Brq Cm firewall | one_pass | debug | verbose | dyn_keepalive
|
2002-08-16 10:31:47 +00:00
|
|
|
.Pp
|
2000-11-20 16:52:27 +00:00
|
|
|
.Nm
|
2002-08-16 10:31:47 +00:00
|
|
|
.Cm set Oo Cm disable Ar number ... Oc Op Cm enable Ar number ...
|
|
|
|
.Nm
|
|
|
|
.Cm set move
|
|
|
|
.Op Cm rule
|
|
|
|
.Ar number Cm to Ar number
|
2000-11-20 16:52:27 +00:00
|
|
|
.Nm
|
2002-08-16 10:31:47 +00:00
|
|
|
.Cm set swap Ar number number
|
|
|
|
.Nm
|
|
|
|
.Cm set show
|
2002-08-10 15:04:40 +00:00
|
|
|
.Pp
|
|
|
|
.Nm
|
|
|
|
.Brq Cm pipe | queue
|
2000-06-08 13:38:57 +00:00
|
|
|
.Ar number
|
|
|
|
.Cm config
|
2002-08-10 15:04:40 +00:00
|
|
|
.Ar config-options
|
2000-11-20 16:52:27 +00:00
|
|
|
.Nm
|
2002-08-10 15:04:40 +00:00
|
|
|
.Op Fl s Op Ar field
|
|
|
|
.Brq Cm pipe | queue
|
2001-10-01 14:13:36 +00:00
|
|
|
.Brq Cm delete | list | show
|
2000-01-08 11:19:19 +00:00
|
|
|
.Op Ar number ...
|
2002-08-10 15:04:40 +00:00
|
|
|
.Pp
|
|
|
|
.Nm
|
2003-07-12 08:35:25 +00:00
|
|
|
.Op Fl cnNqS
|
2002-08-10 15:04:40 +00:00
|
|
|
.Oo
|
|
|
|
.Fl p Ar preproc
|
2002-12-23 20:08:21 +00:00
|
|
|
.Oo
|
|
|
|
.Ar preproc-flags
|
2002-08-10 15:04:40 +00:00
|
|
|
.Oc
|
|
|
|
.Oc
|
|
|
|
.Ar pathname
|
1994-11-17 09:50:30 +00:00
|
|
|
.Sh DESCRIPTION
|
2002-07-06 19:34:18 +00:00
|
|
|
The
|
2000-01-08 11:19:19 +00:00
|
|
|
.Nm
|
2002-07-06 19:34:18 +00:00
|
|
|
utility is the user interface for controlling the
|
2002-08-10 15:04:40 +00:00
|
|
|
.Xr ipfw 4
|
|
|
|
firewall and the
|
2000-02-28 15:21:12 +00:00
|
|
|
.Xr dummynet 4
|
|
|
|
traffic shaper in
|
|
|
|
.Fx .
|
2000-01-08 11:19:19 +00:00
|
|
|
.Pp
|
2002-10-28 07:03:56 +00:00
|
|
|
.Bd -ragged -offset XXXX
|
2002-08-16 10:31:47 +00:00
|
|
|
.Em NOTE:
|
2002-10-28 07:03:56 +00:00
|
|
|
this manual page documents the newer version of
|
2002-08-16 10:31:47 +00:00
|
|
|
.Nm
|
2002-10-28 07:03:56 +00:00
|
|
|
introduced in
|
|
|
|
.Fx
|
|
|
|
CURRENT in July 2002, also known as
|
2002-08-16 10:31:47 +00:00
|
|
|
.Nm ipfw2 .
|
2002-08-16 14:27:22 +00:00
|
|
|
.Nm ipfw2
|
2002-10-28 07:03:56 +00:00
|
|
|
is a superset of the old firewall,
|
2002-08-16 10:31:47 +00:00
|
|
|
.Nm ipfw1 .
|
2002-10-28 07:03:56 +00:00
|
|
|
The differences between the two are listed in Section
|
|
|
|
.Sx IPFW2 ENHANCEMENTS ,
|
|
|
|
which you are encouraged to read to revise older rulesets and possibly
|
2002-08-16 10:31:47 +00:00
|
|
|
write them more efficiently.
|
2002-10-28 07:03:56 +00:00
|
|
|
See Section
|
|
|
|
.Sx USING IPFW2 IN FreeBSD-STABLE
|
|
|
|
for instructions on how to run
|
|
|
|
.Nm ipfw2
|
|
|
|
on
|
|
|
|
.Fx
|
|
|
|
STABLE.
|
|
|
|
.Ed
|
2002-08-16 10:31:47 +00:00
|
|
|
.Pp
|
2002-08-10 15:04:40 +00:00
|
|
|
An
|
|
|
|
.Nm
|
|
|
|
configuration, or
|
|
|
|
.Em ruleset ,
|
|
|
|
is made of a list of
|
|
|
|
.Em rules
|
|
|
|
numbered from 1 to 65535.
|
|
|
|
Packets are passed to
|
|
|
|
.Nm
|
2002-10-28 07:03:56 +00:00
|
|
|
from a number of different places in the protocol stack
|
2002-08-10 15:04:40 +00:00
|
|
|
(depending on the source and destination of the packet,
|
|
|
|
it is possible that
|
|
|
|
.Nm
|
|
|
|
is invoked multiple times on the same packet).
|
|
|
|
The packet passed to the firewall is compared
|
|
|
|
against each of the rules in the firewall
|
|
|
|
.Em ruleset .
|
|
|
|
When a match is found, the action corresponding to the
|
|
|
|
matching rule is performed.
|
|
|
|
.Pp
|
2000-02-28 15:21:12 +00:00
|
|
|
Depending on the action and certain system settings, packets
|
2002-08-10 15:04:40 +00:00
|
|
|
can be reinjected into the firewall at some rule after the
|
2000-02-28 15:21:12 +00:00
|
|
|
matching one for further processing.
|
2000-01-08 11:19:19 +00:00
|
|
|
.Pp
|
2002-08-10 15:04:40 +00:00
|
|
|
An
|
|
|
|
.Nm
|
|
|
|
ruleset always includes a
|
|
|
|
.Em default
|
2003-07-15 23:08:44 +00:00
|
|
|
rule (numbered 65535) which cannot be modified or deleted,
|
2001-09-27 23:44:27 +00:00
|
|
|
and matches all packets.
|
2002-08-10 15:04:40 +00:00
|
|
|
The action associated with the
|
|
|
|
.Em default
|
|
|
|
rule can be either
|
2000-02-28 15:21:12 +00:00
|
|
|
.Cm deny
|
2000-01-08 11:19:19 +00:00
|
|
|
or
|
2000-02-28 15:21:12 +00:00
|
|
|
.Cm allow
|
2000-01-08 11:19:19 +00:00
|
|
|
depending on how the kernel is configured.
|
|
|
|
.Pp
|
2000-02-10 14:25:26 +00:00
|
|
|
If the ruleset includes one or more rules with the
|
2000-02-28 15:21:12 +00:00
|
|
|
.Cm keep-state
|
2001-09-27 23:44:27 +00:00
|
|
|
or
|
|
|
|
.Cm limit
|
2000-02-10 14:25:26 +00:00
|
|
|
option, then
|
2000-02-28 15:21:12 +00:00
|
|
|
.Nm
|
2000-02-10 14:25:26 +00:00
|
|
|
assumes a
|
2000-02-28 15:21:12 +00:00
|
|
|
.Em stateful
|
2001-09-27 23:44:27 +00:00
|
|
|
behaviour, i.e. upon a match it will create dynamic rules matching
|
2000-02-28 15:21:12 +00:00
|
|
|
the exact parameters (addresses and ports) of the matching packet.
|
|
|
|
.Pp
|
|
|
|
These dynamic rules, which have a limited lifetime, are checked
|
|
|
|
at the first occurrence of a
|
2002-08-10 15:04:40 +00:00
|
|
|
.Cm check-state ,
|
2000-02-28 15:21:12 +00:00
|
|
|
.Cm keep-state
|
2002-08-10 15:04:40 +00:00
|
|
|
or
|
|
|
|
.Cm limit
|
2000-02-28 15:21:12 +00:00
|
|
|
rule, and are typically used to open the firewall on-demand to
|
|
|
|
legitimate traffic only.
|
|
|
|
See the
|
2002-08-16 10:31:47 +00:00
|
|
|
.Sx STATEFUL FIREWALL
|
2000-02-10 14:25:26 +00:00
|
|
|
and
|
2000-02-28 15:21:12 +00:00
|
|
|
.Sx EXAMPLES
|
2002-08-16 10:31:47 +00:00
|
|
|
Sections below for more information on the stateful behaviour of
|
2000-11-20 16:52:27 +00:00
|
|
|
.Nm .
|
2000-02-28 15:21:12 +00:00
|
|
|
.Pp
|
|
|
|
All rules (including dynamic ones) have a few associated counters:
|
|
|
|
a packet count, a byte count, a log count and a timestamp
|
|
|
|
indicating the time of the last match.
|
|
|
|
Counters can be displayed or reset with
|
2000-01-08 11:19:19 +00:00
|
|
|
.Nm
|
|
|
|
commands.
|
|
|
|
.Pp
|
|
|
|
Rules can be added with the
|
2000-02-28 15:21:12 +00:00
|
|
|
.Cm add
|
2002-08-10 15:04:40 +00:00
|
|
|
command; deleted individually or in groups with the
|
2000-02-28 15:21:12 +00:00
|
|
|
.Cm delete
|
2003-07-15 23:08:44 +00:00
|
|
|
command, and globally (except those in set 31) with the
|
2000-02-28 15:21:12 +00:00
|
|
|
.Cm flush
|
|
|
|
command; displayed, optionally with the content of the
|
|
|
|
counters, using the
|
|
|
|
.Cm show
|
2000-01-08 11:19:19 +00:00
|
|
|
and
|
2000-02-28 15:21:12 +00:00
|
|
|
.Cm list
|
|
|
|
commands.
|
|
|
|
Finally, counters can be reset with the
|
|
|
|
.Cm zero
|
2000-01-08 11:19:19 +00:00
|
|
|
and
|
2000-02-28 15:21:12 +00:00
|
|
|
.Cm resetlog
|
2000-01-08 11:19:19 +00:00
|
|
|
commands.
|
|
|
|
.Pp
|
2002-08-16 10:31:47 +00:00
|
|
|
Also, each rule belongs to one of 32 different
|
|
|
|
.Em sets
|
|
|
|
, and there are
|
|
|
|
.Nm
|
|
|
|
commands to atomically manipulate sets, such as enable,
|
|
|
|
disable, swap sets, move all rules in a set to another
|
|
|
|
one, delete all rules in a set. These can be useful to
|
|
|
|
install temporary configurations, or to test them.
|
|
|
|
See Section
|
|
|
|
.Sx SETS OF RULES
|
|
|
|
for more information on
|
|
|
|
.Em sets .
|
|
|
|
.Pp
|
2000-01-08 11:19:19 +00:00
|
|
|
The following options are available:
|
|
|
|
.Bl -tag -width indent
|
|
|
|
.It Fl a
|
2000-02-28 15:21:12 +00:00
|
|
|
While listing, show counter values.
|
2002-01-02 20:16:15 +00:00
|
|
|
The
|
2000-02-28 15:21:12 +00:00
|
|
|
.Cm show
|
2002-01-02 20:16:15 +00:00
|
|
|
command just implies this option.
|
2002-08-19 12:36:54 +00:00
|
|
|
.It Fl c
|
|
|
|
When entering or showing rules, print them in compact form,
|
|
|
|
i.e. without the optional "ip from any to any" string
|
|
|
|
when this does not carry any additional information.
|
2001-05-20 10:01:39 +00:00
|
|
|
.It Fl d
|
2001-06-04 23:56:26 +00:00
|
|
|
While listing, show dynamic rules in addition to static ones.
|
|
|
|
.It Fl e
|
|
|
|
While listing, if the
|
|
|
|
.Fl d
|
|
|
|
option was specified, also show expired dynamic rules.
|
2000-01-08 11:19:19 +00:00
|
|
|
.It Fl f
|
2000-02-28 15:21:12 +00:00
|
|
|
Don't ask for confirmation for commands that can cause problems
|
|
|
|
if misused,
|
|
|
|
.No i.e. Cm flush .
|
2002-08-16 10:31:47 +00:00
|
|
|
If there is no tty associated with the process, this is implied.
|
2003-07-08 08:07:03 +00:00
|
|
|
.It Fl n
|
|
|
|
Only check syntax of the command strings, without actually passing
|
|
|
|
them to the kernel.
|
2002-08-10 15:04:40 +00:00
|
|
|
.It Fl N
|
|
|
|
Try to resolve addresses and service names in output.
|
2000-01-08 11:19:19 +00:00
|
|
|
.It Fl q
|
2000-02-28 15:21:12 +00:00
|
|
|
While
|
|
|
|
.Cm add Ns ing ,
|
|
|
|
.Cm zero Ns ing ,
|
|
|
|
.Cm resetlog Ns ging
|
|
|
|
or
|
|
|
|
.Cm flush Ns ing ,
|
|
|
|
be quiet about actions
|
2001-08-07 15:48:51 +00:00
|
|
|
(implies
|
|
|
|
.Fl f ) .
|
2000-01-08 11:19:19 +00:00
|
|
|
This is useful for adjusting rules by executing multiple
|
|
|
|
.Nm
|
|
|
|
commands in a script
|
2001-08-07 15:48:51 +00:00
|
|
|
(e.g.,
|
|
|
|
.Ql sh\ /etc/rc.firewall ) ,
|
2000-01-08 11:19:19 +00:00
|
|
|
or by processing a file of many
|
2000-02-28 15:21:12 +00:00
|
|
|
.Nm
|
2002-10-28 07:03:56 +00:00
|
|
|
rules across a remote login session.
|
2000-02-28 15:21:12 +00:00
|
|
|
If a
|
|
|
|
.Cm flush
|
|
|
|
is performed in normal (verbose) mode (with the default kernel
|
|
|
|
configuration), it prints a message.
|
2002-08-10 15:04:40 +00:00
|
|
|
Because all rules are flushed, the message might not be delivered
|
|
|
|
to the login session, causing the remote login session to be closed
|
2002-10-28 07:03:56 +00:00
|
|
|
and the remainder of the ruleset to not be processed.
|
2002-08-10 15:04:40 +00:00
|
|
|
Access to the console would then be required to recover.
|
|
|
|
.It Fl S
|
2002-08-16 10:31:47 +00:00
|
|
|
While listing rules, show the
|
|
|
|
.Em set
|
|
|
|
each rule belongs to.
|
2002-08-10 15:04:40 +00:00
|
|
|
If this flag is not specified, disabled rules will not be
|
|
|
|
listed.
|
2000-02-28 15:21:12 +00:00
|
|
|
.It Fl s Op Ar field
|
|
|
|
While listing pipes, sort according to one of the four
|
2002-10-28 07:03:56 +00:00
|
|
|
counters (total or current packets or bytes).
|
2002-08-10 15:04:40 +00:00
|
|
|
.It Fl t
|
2003-07-12 08:35:25 +00:00
|
|
|
While listing, show last match timestamp (converted with ctime()).
|
|
|
|
.It Fl T
|
|
|
|
While listing, show last match timestamp (as seconds from the epoch).
|
|
|
|
This form can be more convenient for postprocessing by scripts.
|
2000-01-08 11:19:19 +00:00
|
|
|
.El
|
|
|
|
.Pp
|
2000-02-28 15:21:12 +00:00
|
|
|
To ease configuration, rules can be put into a file which is
|
|
|
|
processed using
|
2000-01-08 11:19:19 +00:00
|
|
|
.Nm
|
2003-01-05 00:09:23 +00:00
|
|
|
as shown in the last synopsis line.
|
2000-10-11 12:17:06 +00:00
|
|
|
An absolute
|
|
|
|
.Ar pathname
|
|
|
|
must be used.
|
2002-08-10 15:04:40 +00:00
|
|
|
The file will be read line by line and applied as arguments to the
|
1996-08-13 19:43:24 +00:00
|
|
|
.Nm
|
2000-02-28 15:21:12 +00:00
|
|
|
utility.
|
1996-02-24 13:39:46 +00:00
|
|
|
.Pp
|
1998-11-23 10:54:28 +00:00
|
|
|
Optionally, a preprocessor can be specified using
|
|
|
|
.Fl p Ar preproc
|
|
|
|
where
|
2000-10-11 12:17:06 +00:00
|
|
|
.Ar pathname
|
2000-02-28 15:21:12 +00:00
|
|
|
is to be piped through.
|
|
|
|
Useful preprocessors include
|
1998-11-23 10:54:28 +00:00
|
|
|
.Xr cpp 1
|
|
|
|
and
|
|
|
|
.Xr m4 1 .
|
|
|
|
If
|
|
|
|
.Ar preproc
|
2000-02-28 15:21:12 +00:00
|
|
|
doesn't start with a slash
|
|
|
|
.Pq Ql /
|
|
|
|
as its first character, the usual
|
1998-11-23 10:54:28 +00:00
|
|
|
.Ev PATH
|
2000-02-28 15:21:12 +00:00
|
|
|
name search is performed.
|
|
|
|
Care should be taken with this in environments where not all
|
2002-08-21 18:11:48 +00:00
|
|
|
file systems are mounted (yet) by the time
|
1998-11-23 10:54:28 +00:00
|
|
|
.Nm
|
2000-02-28 15:21:12 +00:00
|
|
|
is being run (e.g. when they are mounted over NFS).
|
|
|
|
Once
|
1998-11-23 10:54:28 +00:00
|
|
|
.Fl p
|
2002-12-23 20:08:21 +00:00
|
|
|
has been specified, any additional arguments as passed on to the preprocessor
|
|
|
|
for interpretation.
|
1998-11-23 10:54:28 +00:00
|
|
|
This allows for flexible configuration files (like conditionalizing
|
|
|
|
them on the local hostname) and the use of macros to centralize
|
|
|
|
frequently required arguments like IP addresses.
|
|
|
|
.Pp
|
2000-01-08 11:19:19 +00:00
|
|
|
The
|
1999-04-28 02:49:29 +00:00
|
|
|
.Nm
|
2000-02-28 15:21:12 +00:00
|
|
|
.Cm pipe
|
2002-08-10 15:04:40 +00:00
|
|
|
and
|
|
|
|
.Cm queue
|
2000-02-28 15:21:12 +00:00
|
|
|
commands are used to configure the traffic shaper, as shown in the
|
2002-10-28 07:03:56 +00:00
|
|
|
.Sx TRAFFIC SHAPER (DUMMYNET) CONFIGURATION
|
2002-08-16 10:31:47 +00:00
|
|
|
Section below.
|
2003-01-12 03:31:10 +00:00
|
|
|
.Pp
|
|
|
|
If the world and the kernel get out of sync the
|
|
|
|
.Nm
|
|
|
|
ABI may break, preventing you from being able to add any rules. This can
|
|
|
|
adversely effect the booting process. You can use
|
|
|
|
.Nm
|
|
|
|
.Cm disable
|
|
|
|
.Cm firewall
|
|
|
|
to temporarily disable the firewall to regain access to the network,
|
|
|
|
allowing you to fix the problem.
|
2002-08-10 15:04:40 +00:00
|
|
|
.Sh PACKET FLOW
|
2002-10-28 07:03:56 +00:00
|
|
|
A packet is checked against the active ruleset in multiple places
|
|
|
|
in the protocol stack, under control of several sysctl variables.
|
|
|
|
These places and variables are shown below, and it is important to
|
|
|
|
have this picture in mind in order to design a correct ruleset.
|
2002-08-10 15:04:40 +00:00
|
|
|
.Bd -literal -offset indent
|
|
|
|
^ to upper layers V
|
|
|
|
| |
|
|
|
|
+----------->-----------+
|
|
|
|
^ V
|
|
|
|
[ip_input] [ip_output] net.inet.ip.fw.enable=1
|
|
|
|
| |
|
|
|
|
^ V
|
|
|
|
[ether_demux] [ether_output_frame] net.link.ether.ipfw=1
|
|
|
|
| |
|
|
|
|
+-->--[bdg_forward]-->--+ net.link.ether.bridge_ipfw=1
|
|
|
|
^ V
|
|
|
|
| to devices |
|
|
|
|
.Ed
|
|
|
|
.Pp
|
|
|
|
As can be noted from the above picture, the number of
|
|
|
|
times the same packet goes through the firewall can
|
2002-09-08 09:01:08 +00:00
|
|
|
vary between 0 and 4 depending on packet source and
|
2002-08-10 15:04:40 +00:00
|
|
|
destination, and system configuration.
|
2002-10-28 07:03:56 +00:00
|
|
|
.Pp
|
|
|
|
Note that as packets flow through the stack, headers can be
|
|
|
|
stripped or added to it, and so they may or may not be available
|
|
|
|
for inspection.
|
|
|
|
E.g., incoming packets will include the MAC header when
|
2002-08-10 15:04:40 +00:00
|
|
|
.Nm
|
|
|
|
is invoked from
|
|
|
|
.Cm ether_demux() ,
|
|
|
|
but the same packets will have the MAC header stripped off when
|
|
|
|
.Nm
|
|
|
|
is invoked from
|
|
|
|
.Cm ip_input() .
|
2002-10-28 07:03:56 +00:00
|
|
|
.Pp
|
|
|
|
Also note that each packet is always checked against the complete ruleset,
|
|
|
|
irrespective of the place where the check occurs, or the source of the packet.
|
2002-08-10 15:04:40 +00:00
|
|
|
If a rule contains some match patterns or actions which are not valid
|
2002-10-28 07:03:56 +00:00
|
|
|
for the place of invocation (e.g. trying to match a MAC header within
|
2002-08-10 15:04:40 +00:00
|
|
|
.Cm ip_input()
|
2002-10-28 07:03:56 +00:00
|
|
|
), the match pattern will not match, but a
|
2002-08-19 12:36:54 +00:00
|
|
|
.Cm not
|
2002-10-28 07:03:56 +00:00
|
|
|
operator in front of such patterns
|
|
|
|
.Em will
|
|
|
|
cause the pattern to
|
2002-08-19 12:36:54 +00:00
|
|
|
.Em always
|
2002-10-28 07:03:56 +00:00
|
|
|
match on those packets.
|
|
|
|
It is thus the responsibility of
|
2002-08-10 15:04:40 +00:00
|
|
|
the programmer, if necessary, to write a suitable ruleset to
|
|
|
|
differentiate among the possible places.
|
|
|
|
.Cm skipto
|
|
|
|
rules can be useful here, as an example:
|
|
|
|
.Bd -literal -offset indent
|
|
|
|
# packets from ether_demux or bdg_forward
|
|
|
|
ipfw add 10 skipto 1000 all from any to any layer2 in
|
|
|
|
# packets from ip_input
|
|
|
|
ipfw add 10 skipto 2000 all from any to any not layer2 in
|
|
|
|
# packets from ip_output
|
|
|
|
ipfw add 10 skipto 3000 all from any to any not layer2 out
|
|
|
|
# packets from ether_output_frame
|
|
|
|
ipfw add 10 skipto 4000 all from any to any layer2 out
|
|
|
|
.Ed
|
|
|
|
.Pp
|
|
|
|
(yes, at the moment there is no way to differentiate between
|
|
|
|
ether_demux and bdg_forward).
|
2003-07-08 08:07:03 +00:00
|
|
|
.Sh SYNTAX
|
|
|
|
In general, each keyword or argument must be provided as
|
|
|
|
a separate command line argument, with no leading or trailing
|
|
|
|
spaces. Keywords are case-sensitive, whereas arguments may
|
|
|
|
or may not be case-sensitive depending on their nature
|
|
|
|
(e.g. uid's are, hostnames are not).
|
|
|
|
.Pp
|
|
|
|
In
|
|
|
|
.Nm ipfw2
|
|
|
|
you can introduce spaces after commas ',' to make
|
|
|
|
the line more readable. You can also put the entire
|
|
|
|
command (including flags) into a single argument.
|
|
|
|
E.g. the following forms are equivalent:
|
|
|
|
.Bd -literal -offset indent
|
|
|
|
ipfw -q add deny src-ip 10.0.0.0/24,127.0.0.1/8
|
|
|
|
ipfw -q add deny src-ip 10.0.0.0/24, 127.0.0.1/8
|
|
|
|
ipfw "-q add deny src-ip 10.0.0.0/24, 127.0.0.1/8"
|
|
|
|
.Ed
|
2000-01-08 11:19:19 +00:00
|
|
|
.Sh RULE FORMAT
|
2002-08-10 15:04:40 +00:00
|
|
|
The format of
|
1999-04-28 02:49:29 +00:00
|
|
|
.Nm
|
2002-08-10 15:04:40 +00:00
|
|
|
rules is the following:
|
|
|
|
.Bd -ragged -offset indent
|
|
|
|
.Op Ar rule_number
|
|
|
|
.Op Cm set Ar set_number
|
2000-02-28 15:21:12 +00:00
|
|
|
.Op Cm prob Ar match_probability
|
2002-08-10 15:04:40 +00:00
|
|
|
.br
|
|
|
|
.Ar " " action
|
2000-02-28 15:21:12 +00:00
|
|
|
.Op Cm log Op Cm logamount Ar number
|
2002-08-10 15:04:40 +00:00
|
|
|
.Ar body
|
2000-02-28 15:21:12 +00:00
|
|
|
.Ed
|
2000-01-08 11:19:19 +00:00
|
|
|
.Pp
|
2002-08-10 15:04:40 +00:00
|
|
|
where the body of the rule specifies which information is used
|
|
|
|
for filtering packets, among the following:
|
1999-04-28 02:49:29 +00:00
|
|
|
.Pp
|
2002-08-10 15:04:40 +00:00
|
|
|
.Bl -tag -width "Source and dest. addresses and ports" -offset XXX -compact
|
|
|
|
.It Layer-2 header fields
|
|
|
|
When available
|
|
|
|
.It IPv4 Protocol
|
|
|
|
TCP, UDP, ICMP, etc.
|
|
|
|
.It Source and dest. addresses and ports
|
2000-10-06 11:17:06 +00:00
|
|
|
.It Direction
|
2002-08-10 15:04:40 +00:00
|
|
|
See Section
|
|
|
|
.Sx PACKET FLOW
|
2000-10-06 11:17:06 +00:00
|
|
|
.It Transmit and receive interface
|
2002-08-10 15:04:40 +00:00
|
|
|
By name or address
|
|
|
|
.It Misc. IP header fields
|
|
|
|
Version, type of service, datagram length, identification,
|
|
|
|
fragment flag (non-zero IP offset),
|
|
|
|
Time To Live
|
2000-02-28 15:21:12 +00:00
|
|
|
.It IP options
|
2002-08-10 15:04:40 +00:00
|
|
|
.It Misc. TCP header fields
|
|
|
|
TCP flags (SYN, FIN, ACK, RST, etc.),
|
|
|
|
sequence number, acknowledgment number,
|
|
|
|
window
|
2000-10-06 11:17:06 +00:00
|
|
|
.It TCP options
|
2000-02-28 15:21:12 +00:00
|
|
|
.It ICMP types
|
2002-08-10 15:04:40 +00:00
|
|
|
for ICMP packets
|
|
|
|
.It User/group ID
|
2002-10-28 07:03:56 +00:00
|
|
|
When the packet can be associated with a local socket.
|
1999-04-28 02:49:29 +00:00
|
|
|
.El
|
|
|
|
.Pp
|
2002-08-10 15:04:40 +00:00
|
|
|
Note that some of the above information, e.g. source MAC or IP addresses and
|
|
|
|
TCP/UDP ports, could easily be spoofed, so filtering on those fields
|
|
|
|
alone might not guarantee the desired results.
|
2000-02-28 15:21:12 +00:00
|
|
|
.Bl -tag -width indent
|
2002-08-10 15:04:40 +00:00
|
|
|
.It Ar rule_number
|
|
|
|
Each rule is associated with a
|
|
|
|
.Ar rule_number
|
|
|
|
in the range 1..65535, with the latter reserved for the
|
|
|
|
.Em default
|
|
|
|
rule.
|
|
|
|
Rules are checked sequentially by rule number.
|
|
|
|
Multiple rules can have the same number, in which case they are
|
|
|
|
checked (and listed) according to the order in which they have
|
|
|
|
been added.
|
|
|
|
If a rule is entered without specifying a number, the kernel will
|
|
|
|
assign one in such a way that the rule becomes the last one
|
|
|
|
before the
|
|
|
|
.Em default
|
|
|
|
rule.
|
|
|
|
Automatic rule numbers are assigned by incrementing the last
|
|
|
|
non-default rule number by the value of the sysctl variable
|
|
|
|
.Ar net.inet.ip.fw.autoinc_step
|
|
|
|
which defaults to 100.
|
|
|
|
If this is not possible (e.g. because we would go beyond the
|
2002-10-28 07:03:56 +00:00
|
|
|
maximum allowed rule number), the number of the last
|
2002-08-10 15:04:40 +00:00
|
|
|
non-default value is used instead.
|
2002-08-16 10:31:47 +00:00
|
|
|
.It Cm set Ar set_number
|
2002-10-28 07:03:56 +00:00
|
|
|
Each rule is associated with a
|
2002-08-10 15:04:40 +00:00
|
|
|
.Ar set_number
|
2003-07-15 23:08:44 +00:00
|
|
|
in the range 0..31.
|
2002-08-10 15:04:40 +00:00
|
|
|
Sets can be individually disabled and enabled, so this parameter
|
|
|
|
is of fundamental importance for atomic ruleset manipulation.
|
|
|
|
It can be also used to simplify deletion of groups of rules.
|
|
|
|
If a rule is entered without specifying a set number,
|
|
|
|
set 0 will be used.
|
2003-07-15 23:08:44 +00:00
|
|
|
.br
|
|
|
|
Set 31 is special in that it cannot be disabled,
|
|
|
|
and rules in set 31 are not deleted by the
|
|
|
|
.Nm ipfw flush
|
|
|
|
command (but you can delete them with the
|
|
|
|
.Nm ipfw delete set 31
|
|
|
|
command).
|
|
|
|
Set 31 is also used for the
|
|
|
|
.Em default
|
|
|
|
rule.
|
2000-02-28 15:21:12 +00:00
|
|
|
.It Cm prob Ar match_probability
|
|
|
|
A match is only declared with the specified probability
|
|
|
|
(floating point number between 0 and 1).
|
|
|
|
This can be useful for a number of applications such as
|
|
|
|
random packet drop or
|
2001-08-07 15:48:51 +00:00
|
|
|
(in conjunction with
|
|
|
|
.Xr dummynet 4 )
|
2000-02-28 15:21:12 +00:00
|
|
|
to simulate the effect of multiple paths leading to out-of-order
|
1999-08-11 15:36:13 +00:00
|
|
|
packet delivery.
|
2002-11-26 19:51:40 +00:00
|
|
|
.Pp
|
|
|
|
Note: this condition is checked before any other condition, including
|
|
|
|
ones such as keep-state or check-state which might have side effects.
|
2002-08-10 15:04:40 +00:00
|
|
|
.It Cm log Op Cm logamount Ar number
|
|
|
|
When a packet matches a rule with the
|
|
|
|
.Cm log
|
|
|
|
keyword, a message will be
|
|
|
|
logged to
|
|
|
|
.Xr syslogd 8
|
|
|
|
with a
|
|
|
|
.Dv LOG_SECURITY
|
|
|
|
facility.
|
|
|
|
The logging only occurs if the sysctl variable
|
|
|
|
.Em net.inet.ip.fw.verbose
|
|
|
|
is set to 1
|
|
|
|
(which is the default when the kernel is compiled with
|
|
|
|
.Dv IPFIREWALL_VERBOSE
|
|
|
|
) and the number of packets logged so far for that
|
2002-10-28 07:03:56 +00:00
|
|
|
particular rule does not exceed the
|
2002-08-10 15:04:40 +00:00
|
|
|
.Cm logamount
|
|
|
|
parameter.
|
|
|
|
If no
|
|
|
|
.Cm logamount
|
|
|
|
is specified, the limit is taken from the sysctl variable
|
|
|
|
.Em net.inet.ip.fw.verbose_limit .
|
2002-10-28 07:03:56 +00:00
|
|
|
In both cases, a value of 0 removes the logging limit.
|
2002-08-10 15:04:40 +00:00
|
|
|
.Pp
|
|
|
|
Once the limit is reached, logging can be re-enabled by
|
2002-10-28 07:03:56 +00:00
|
|
|
clearing the logging counter or the packet counter for that entry, see the
|
2002-08-10 15:04:40 +00:00
|
|
|
.Cm resetlog
|
|
|
|
command.
|
|
|
|
.Pp
|
2002-11-26 19:51:40 +00:00
|
|
|
Note: logging is done after all other packet matching conditions
|
|
|
|
have been successfully verified, and before performing the final
|
|
|
|
action (accept, deny, etc.) on the packet.
|
2002-08-10 15:04:40 +00:00
|
|
|
.El
|
|
|
|
.Ss RULE ACTIONS
|
|
|
|
A rule can be associated with one of the following actions, which
|
|
|
|
will be executed when the packet matches the body of the rule.
|
2000-02-28 15:21:12 +00:00
|
|
|
.Bl -tag -width indent
|
2002-08-10 15:04:40 +00:00
|
|
|
.It Cm allow | accept | pass | permit
|
1996-06-15 01:38:51 +00:00
|
|
|
Allow packets that match rule.
|
2000-02-28 15:21:12 +00:00
|
|
|
The search terminates.
|
|
|
|
.It Cm check-state
|
|
|
|
Checks the packet against the dynamic ruleset.
|
2002-08-10 15:04:40 +00:00
|
|
|
If a match is found, execute the action associated with
|
|
|
|
the rule which generated this dynamic rule, otherwise
|
|
|
|
move to the next rule.
|
|
|
|
.br
|
|
|
|
.Cm Check-state
|
|
|
|
rules do not have a body.
|
2000-02-10 14:25:26 +00:00
|
|
|
If no
|
2000-02-28 15:21:12 +00:00
|
|
|
.Cm check-state
|
2000-02-10 14:25:26 +00:00
|
|
|
rule is found, the dynamic ruleset is checked at the first
|
2000-02-28 15:21:12 +00:00
|
|
|
.Cm keep-state
|
2002-08-10 15:04:40 +00:00
|
|
|
or
|
|
|
|
.Cm limit
|
2000-02-10 14:25:26 +00:00
|
|
|
rule.
|
2002-08-10 15:04:40 +00:00
|
|
|
.It Cm count
|
|
|
|
Update counters for all packets that match rule.
|
|
|
|
The search continues with the next rule.
|
|
|
|
.It Cm deny | drop
|
|
|
|
Discard packets that match this rule.
|
|
|
|
The search terminates.
|
2000-02-28 15:21:12 +00:00
|
|
|
.It Cm divert Ar port
|
1997-06-02 05:02:37 +00:00
|
|
|
Divert packets that match this rule to the
|
|
|
|
.Xr divert 4
|
|
|
|
socket bound to port
|
1996-07-10 19:44:30 +00:00
|
|
|
.Ar port .
|
1996-02-24 13:39:46 +00:00
|
|
|
The search terminates.
|
2002-08-10 15:04:40 +00:00
|
|
|
.It Cm fwd | forward Ar ipaddr Ns Op , Ns Ar port
|
1998-07-06 03:20:19 +00:00
|
|
|
Change the next-hop on matching packets to
|
|
|
|
.Ar ipaddr ,
|
2002-10-28 07:03:56 +00:00
|
|
|
which can be an IP address in dotted quad format or a host name.
|
2002-08-10 15:04:40 +00:00
|
|
|
The search terminates if this rule matches.
|
|
|
|
.Pp
|
1998-07-06 03:20:19 +00:00
|
|
|
If
|
|
|
|
.Ar ipaddr
|
2002-08-10 15:04:40 +00:00
|
|
|
is a local address, then matching packets will be forwarded to
|
|
|
|
.Ar port
|
|
|
|
(or the port number in the packet if one is not specified in the rule)
|
|
|
|
on the local machine.
|
|
|
|
.br
|
1998-07-06 03:20:19 +00:00
|
|
|
If
|
|
|
|
.Ar ipaddr
|
2002-08-10 15:04:40 +00:00
|
|
|
is not a local address, then the port number
|
|
|
|
(if specified) is ignored, and the packet will be
|
|
|
|
forwarded to the remote address, using the route as found in
|
|
|
|
the local routing table for that IP.
|
|
|
|
.br
|
|
|
|
A
|
|
|
|
.Ar fwd
|
|
|
|
rule will not match layer-2 packets (those received
|
|
|
|
on ether_input, ether_output, or bridged).
|
|
|
|
.br
|
|
|
|
The
|
2002-01-10 15:41:06 +00:00
|
|
|
.Cm fwd
|
2002-08-10 15:04:40 +00:00
|
|
|
action does not change the contents of the packet at all.
|
|
|
|
In particular, the destination address remains unmodified, so
|
|
|
|
packets forwarded to another system will usually be rejected by that system
|
|
|
|
unless there is a matching rule on that system to capture them.
|
|
|
|
For packets forwarded locally,
|
|
|
|
the local address of the socket will be
|
|
|
|
set to the original destination address of the packet.
|
2002-09-22 11:30:51 +00:00
|
|
|
This makes the
|
2001-12-28 22:24:26 +00:00
|
|
|
.Xr netstat 1
|
2002-01-02 19:46:14 +00:00
|
|
|
entry look rather weird but is intended for
|
2001-12-28 22:24:26 +00:00
|
|
|
use with transparent proxy servers.
|
2000-02-28 15:21:12 +00:00
|
|
|
.It Cm pipe Ar pipe_nr
|
1999-08-11 15:36:13 +00:00
|
|
|
Pass packet to a
|
|
|
|
.Xr dummynet 4
|
2000-02-28 15:21:12 +00:00
|
|
|
.Dq pipe
|
|
|
|
(for bandwidth limitation, delay, etc.).
|
|
|
|
See the
|
2002-10-28 07:03:56 +00:00
|
|
|
.Sx TRAFFIC SHAPER (DUMMYNET) CONFIGURATION
|
2002-08-16 10:31:47 +00:00
|
|
|
Section for further information.
|
2000-02-28 15:21:12 +00:00
|
|
|
The search terminates; however, on exit from the pipe and if
|
|
|
|
the
|
|
|
|
.Xr sysctl 8
|
|
|
|
variable
|
|
|
|
.Em net.inet.ip.fw.one_pass
|
|
|
|
is not set, the packet is passed again to the firewall code
|
|
|
|
starting from the next rule.
|
2000-06-08 13:38:57 +00:00
|
|
|
.It Cm queue Ar queue_nr
|
|
|
|
Pass packet to a
|
|
|
|
.Xr dummynet 4
|
|
|
|
.Dq queue
|
2002-10-28 07:03:56 +00:00
|
|
|
(for bandwidth limitation using WF2Q+).
|
2002-08-10 15:04:40 +00:00
|
|
|
.It Cm reject
|
|
|
|
(Deprecated).
|
|
|
|
Synonym for
|
|
|
|
.Cm unreach host .
|
|
|
|
.It Cm reset
|
|
|
|
Discard packets that match this rule, and if the
|
|
|
|
packet is a TCP packet, try to send a TCP reset (RST) notice.
|
|
|
|
The search terminates.
|
2000-02-28 15:21:12 +00:00
|
|
|
.It Cm skipto Ar number
|
1997-06-02 05:02:37 +00:00
|
|
|
Skip all subsequent rules numbered less than
|
|
|
|
.Ar number .
|
|
|
|
The search continues with the first rule numbered
|
|
|
|
.Ar number
|
|
|
|
or higher.
|
2002-08-10 15:04:40 +00:00
|
|
|
.It Cm tee Ar port
|
|
|
|
Send a copy of packets matching this rule to the
|
|
|
|
.Xr divert 4
|
|
|
|
socket bound to port
|
|
|
|
.Ar port .
|
|
|
|
The search terminates and the original packet is accepted
|
2002-08-16 10:31:47 +00:00
|
|
|
(but see Section
|
2002-08-10 15:04:40 +00:00
|
|
|
.Sx BUGS
|
|
|
|
below).
|
|
|
|
.It Cm unreach Ar code
|
|
|
|
Discard packets that match this rule, and try to send an ICMP
|
|
|
|
unreachable notice with code
|
|
|
|
.Ar code ,
|
|
|
|
where
|
|
|
|
.Ar code
|
|
|
|
is a number from 0 to 255, or one of these aliases:
|
|
|
|
.Cm net , host , protocol , port ,
|
|
|
|
.Cm needfrag , srcfail , net-unknown , host-unknown ,
|
|
|
|
.Cm isolated , net-prohib , host-prohib , tosnet ,
|
|
|
|
.Cm toshost , filter-prohib , host-precedence
|
|
|
|
or
|
|
|
|
.Cm precedence-cutoff .
|
|
|
|
The search terminates.
|
1996-02-24 13:39:46 +00:00
|
|
|
.El
|
2002-08-10 15:04:40 +00:00
|
|
|
.Ss RULE BODY
|
|
|
|
The body of a rule contains zero or more patterns (such as
|
|
|
|
specific source and destination addresses or ports,
|
|
|
|
protocol options, incoming or outgoing interfaces, etc.)
|
|
|
|
that the packet must match in order to be recognised.
|
|
|
|
In general, the patterns are connected by (implicit)
|
2002-08-19 12:36:54 +00:00
|
|
|
.Cm and
|
|
|
|
operators -- i.e. all must match in order for the
|
2002-08-10 15:04:40 +00:00
|
|
|
rule to match.
|
|
|
|
Individual patterns can be prefixed by the
|
2002-08-19 12:36:54 +00:00
|
|
|
.Cm not
|
|
|
|
operator to reverse the result of the match, as in
|
2002-08-10 15:04:40 +00:00
|
|
|
.Pp
|
|
|
|
.Dl "ipfw add 100 allow ip from not 1.2.3.4 to any"
|
|
|
|
.Pp
|
|
|
|
Additionally, sets of alternative match patterns (
|
|
|
|
.Em or-blocks
|
|
|
|
) can be constructed by putting the patterns in
|
|
|
|
lists enclosed between parentheses ( ) or braces { }, and
|
2002-08-19 12:36:54 +00:00
|
|
|
using the
|
2002-08-10 15:04:40 +00:00
|
|
|
.Cm or
|
2002-08-19 12:36:54 +00:00
|
|
|
operator as follows:
|
2002-08-10 15:04:40 +00:00
|
|
|
.Pp
|
|
|
|
.Dl "ipfw add 100 allow ip from { x or not y or z } to any"
|
|
|
|
.Pp
|
|
|
|
Only one level of parentheses is allowed.
|
|
|
|
Beware that most shells have special meanings for parentheses
|
2002-08-19 12:36:54 +00:00
|
|
|
or braces, so it is advisable to put a backslash \\ in front of them
|
|
|
|
to prevent such interpretations.
|
2002-08-10 15:04:40 +00:00
|
|
|
.Pp
|
2002-08-19 04:52:15 +00:00
|
|
|
The body of a rule must in general include a source and destination
|
2002-10-28 07:03:56 +00:00
|
|
|
address specifier.
|
2002-08-10 15:04:40 +00:00
|
|
|
The keyword
|
|
|
|
.Ar any
|
|
|
|
can be used in various places to specify that the content of
|
|
|
|
a required field is irrelevant.
|
|
|
|
.Pp
|
2002-08-19 12:36:54 +00:00
|
|
|
The rule body has the following format:
|
2002-08-10 15:04:40 +00:00
|
|
|
.Bd -ragged -offset indent
|
2002-08-19 12:36:54 +00:00
|
|
|
.Op Ar proto Cm from Ar src Cm to Ar dst
|
2002-08-10 15:04:40 +00:00
|
|
|
.Op Ar options
|
|
|
|
.Ed
|
1996-02-24 13:39:46 +00:00
|
|
|
.Pp
|
2003-07-08 08:07:03 +00:00
|
|
|
The first part (proto from src to dst) is for backward
|
2002-08-19 12:36:54 +00:00
|
|
|
compatibility with
|
|
|
|
.Nm ipfw1 .
|
|
|
|
In
|
|
|
|
.Nm ipfw2
|
|
|
|
any match pattern (including MAC headers, IPv4 protocols,
|
|
|
|
addresses and ports) can be specified in the
|
2002-08-19 04:52:15 +00:00
|
|
|
.Ar options
|
2002-08-19 12:36:54 +00:00
|
|
|
section.
|
2002-08-16 10:31:47 +00:00
|
|
|
.Pp
|
|
|
|
Rule fields have the following meaning:
|
2002-08-10 15:04:40 +00:00
|
|
|
.Bl -tag -width indent
|
2002-08-19 12:36:54 +00:00
|
|
|
.It Ar proto : protocol | Cm { Ar protocol Cm or ... }
|
2003-07-08 08:07:03 +00:00
|
|
|
.It Ar protocol : Oo Cm not Oc Ar protocol-name | protocol-number
|
|
|
|
An IPv4 protocol specified by number or name
|
2002-08-19 12:36:54 +00:00
|
|
|
(for a complete list see
|
2000-02-28 15:21:12 +00:00
|
|
|
.Pa /etc/protocols ) .
|
2000-01-08 11:19:19 +00:00
|
|
|
The
|
2000-02-28 15:21:12 +00:00
|
|
|
.Cm ip
|
2000-01-08 11:19:19 +00:00
|
|
|
or
|
2000-02-28 15:21:12 +00:00
|
|
|
.Cm all
|
2000-01-08 11:19:19 +00:00
|
|
|
keywords mean any protocol will match.
|
2003-07-08 08:07:03 +00:00
|
|
|
.Pp
|
|
|
|
The
|
|
|
|
.Cm { Ar protocol Cm or ... }
|
|
|
|
format (an
|
|
|
|
.Em or-block )
|
|
|
|
is provided for convenience only but its use is deprecated.
|
|
|
|
.It Ar src No and Ar dst : Bro Cm addr | Cm { Ar addr Cm or ... } Brc Op Oo Cm not Oc Ar ports
|
|
|
|
An address (or a list, see below)
|
2002-08-10 15:04:40 +00:00
|
|
|
optionally followed by
|
2002-08-19 04:52:15 +00:00
|
|
|
.Ar ports
|
|
|
|
specifiers.
|
2003-07-08 08:07:03 +00:00
|
|
|
.Pp
|
|
|
|
The second format (
|
|
|
|
.Em or-block
|
|
|
|
with multiple addresses) is provided for convenience only and
|
|
|
|
its use is discouraged.
|
|
|
|
.It Ar addr : Oo Cm not Oc Brq Cm any | me | Ar addr-list | Ar addr-set
|
2002-08-10 15:04:40 +00:00
|
|
|
.It Cm any
|
|
|
|
matches any IP address.
|
|
|
|
.It Cm me
|
|
|
|
matches any IP address configured on an interface in the system.
|
|
|
|
The address list is evaluated at the time the packet is
|
|
|
|
analysed.
|
2003-07-08 08:07:03 +00:00
|
|
|
.It Ar addr-list : ip-addr Ns Op Ns , Ns Ar addr-list
|
|
|
|
.It Ar ip-addr :
|
|
|
|
A host or subnet address specified in one of the following ways:
|
|
|
|
.Bl -tag -width indent
|
2002-08-10 15:04:40 +00:00
|
|
|
.It Ar numeric-ip | hostname
|
|
|
|
Matches a single IPv4 address, specified as dotted-quad or a hostname.
|
|
|
|
Hostnames are resolved at the time the rule is added to the firewall list.
|
|
|
|
.It Ar addr Ns / Ns Ar masklen
|
|
|
|
Matches all addresses with base
|
|
|
|
.Ar addr
|
|
|
|
(specified as a dotted quad or a hostname)
|
|
|
|
and mask width of
|
|
|
|
.Cm masklen
|
|
|
|
bits.
|
|
|
|
As an example, 1.2.3.4/25 will match
|
|
|
|
all IP numbers from 1.2.3.0 to 1.2.3.127 .
|
2002-08-21 05:57:41 +00:00
|
|
|
.It Ar addr Ns : Ns Ar mask
|
|
|
|
Matches all addresses with base
|
|
|
|
.Ar addr
|
|
|
|
(specified as a dotted quad or a hostname)
|
|
|
|
and the mask of
|
|
|
|
.Ar mask ,
|
|
|
|
specified as a dotted quad.
|
|
|
|
As an example, 1.2.3.4/255.0.255.0 will match
|
|
|
|
1.*.3.*.
|
|
|
|
We suggest to use this form only for non-contiguous
|
|
|
|
masks, and resort to the
|
|
|
|
.Ar addr Ns / Ns Ar masklen
|
|
|
|
format for contiguous masks, which is more compact and less
|
|
|
|
error-prone.
|
1996-02-24 13:39:46 +00:00
|
|
|
.El
|
2003-07-08 08:07:03 +00:00
|
|
|
.It Ar addr-set : addr Ns Oo Ns / Ns Ar masklen Oc Ns Cm { Ns Ar list Ns Cm }
|
|
|
|
.It Ar list : Bro Ar num | num-num Brc Ns Op Ns , Ns Ar list
|
|
|
|
Matches all addresses with base address
|
|
|
|
.Ar addr
|
|
|
|
(specified as a dotted quad or a hostname)
|
|
|
|
and whose last byte is in the list between braces { } .
|
|
|
|
Note that there must be no spaces between braces and
|
|
|
|
numbers (spaces after commas are allowed).
|
|
|
|
Elements of the list can be specified as single entries
|
|
|
|
or ranges.
|
|
|
|
The
|
|
|
|
.Ar masklen
|
|
|
|
field is used to limit the size of the set of addresses,
|
|
|
|
and can have any value between 24 and 32. If not specified,
|
|
|
|
it will be assumed as 24.
|
|
|
|
.br
|
|
|
|
This format is particularly useful to handle sparse address sets
|
|
|
|
within a single rule. Because the matching occurs using a
|
|
|
|
bitmask, it takes constant time and dramatically reduces
|
|
|
|
the complexity of rulesets.
|
|
|
|
.br
|
|
|
|
As an example, an address specified as 1.2.3.4/24{128,35-55,89}
|
|
|
|
will match the following IP addresses:
|
|
|
|
.br
|
|
|
|
1.2.3.128, 1.2.3.35 to 1.2.3.55, 1.2.3.89 .
|
|
|
|
.It Ar ports : Bro Ar port | port Ns \&- Ns Ar port Ns Brc Ns Op , Ns Ar ports
|
2002-08-19 04:52:15 +00:00
|
|
|
For protocols which support port numbers (such as TCP and UDP), optional
|
2002-08-10 15:04:40 +00:00
|
|
|
.Cm ports
|
|
|
|
may be specified as one or more ports or port ranges, separated
|
|
|
|
by commas but no spaces, and an optional
|
2000-02-28 15:21:12 +00:00
|
|
|
.Cm not
|
2002-08-19 04:52:15 +00:00
|
|
|
operator.
|
2000-01-08 11:19:19 +00:00
|
|
|
The
|
2000-02-28 15:21:12 +00:00
|
|
|
.Ql \&-
|
2000-01-08 11:19:19 +00:00
|
|
|
notation specifies a range of ports (including boundaries).
|
|
|
|
.Pp
|
2000-02-28 15:21:12 +00:00
|
|
|
Service names (from
|
1996-06-15 01:38:51 +00:00
|
|
|
.Pa /etc/services )
|
1997-06-23 22:32:13 +00:00
|
|
|
may be used instead of numeric port values.
|
2002-08-19 04:52:15 +00:00
|
|
|
The length of the port list is limited to 30 ports or ranges,
|
|
|
|
though one can specify larger ranges by using an
|
2002-08-10 15:04:40 +00:00
|
|
|
.Em or-block
|
2002-08-19 04:52:15 +00:00
|
|
|
in the
|
|
|
|
.Cm options
|
|
|
|
section of the rule.
|
2002-08-10 15:04:40 +00:00
|
|
|
.Pp
|
2000-02-28 15:21:12 +00:00
|
|
|
A backslash
|
|
|
|
.Pq Ql \e
|
|
|
|
can be used to escape the dash
|
|
|
|
.Pq Ql -
|
2002-08-19 12:36:54 +00:00
|
|
|
character in a service name (from a shell, the backslash must be
|
2002-10-28 07:03:56 +00:00
|
|
|
typed twice to avoid the shell itself interpreting it as an escape
|
2002-08-19 12:36:54 +00:00
|
|
|
character).
|
1999-06-15 12:56:38 +00:00
|
|
|
.Pp
|
2000-02-28 15:21:12 +00:00
|
|
|
.Dl "ipfw add count tcp from any ftp\e\e-data-ftp to any"
|
1996-06-15 01:38:51 +00:00
|
|
|
.Pp
|
1998-02-12 00:57:06 +00:00
|
|
|
Fragmented packets which have a non-zero offset (i.e. not the first
|
|
|
|
fragment) will never match a rule which has one or more port
|
2000-02-28 15:21:12 +00:00
|
|
|
specifications.
|
|
|
|
See the
|
|
|
|
.Cm frag
|
1998-02-12 00:57:06 +00:00
|
|
|
option for details on matching fragmented packets.
|
1997-06-02 05:02:37 +00:00
|
|
|
.El
|
2002-08-19 04:52:15 +00:00
|
|
|
.Ss RULE OPTIONS (MATCH PATTERNS)
|
2002-08-10 15:04:40 +00:00
|
|
|
Additional match patterns can be used within
|
|
|
|
rules. Zero or more of these so-called
|
|
|
|
.Em options
|
|
|
|
can be present in a rule, optionally prefixed by the
|
|
|
|
.Cm not
|
|
|
|
operand, and possibly grouped into
|
|
|
|
.Em or-blocks .
|
|
|
|
.Pp
|
2002-08-19 04:52:15 +00:00
|
|
|
The following match patterns can be used (listed in alphabetical order):
|
2002-08-10 15:04:40 +00:00
|
|
|
.Bl -tag -width indent
|
2003-07-12 07:01:48 +00:00
|
|
|
.It Cm // this is a comment.
|
|
|
|
Inserts the specified text as a comment in the rule.
|
|
|
|
Everything following // is considered as a comment and stored in the rule.
|
|
|
|
You can have comment-only rules, which are listed as having a
|
|
|
|
.Cm count
|
|
|
|
action followed by the comment.
|
2002-08-10 15:04:40 +00:00
|
|
|
.It Cm bridged
|
|
|
|
Matches only bridged packets.
|
2003-06-22 17:33:19 +00:00
|
|
|
.It Cm dst-ip Ar ip-address
|
2002-08-19 04:52:15 +00:00
|
|
|
Matches IP packets whose destination IP is one of the address(es)
|
|
|
|
specified as argument.
|
2003-06-22 17:33:19 +00:00
|
|
|
.It Cm dst-port Ar ports
|
2002-08-19 04:52:15 +00:00
|
|
|
Matches IP packets whose destination port is one of the port(s)
|
|
|
|
specified as argument.
|
2002-08-10 15:04:40 +00:00
|
|
|
.It Cm established
|
2002-08-19 04:52:15 +00:00
|
|
|
Matches TCP packets that have the RST or ACK bits set.
|
2002-08-10 15:04:40 +00:00
|
|
|
.It Cm frag
|
2002-08-19 04:52:15 +00:00
|
|
|
Matches packets that are fragments and not the first
|
|
|
|
fragment of an IP datagram. Note that these packets will not have
|
|
|
|
the next protocol header (e.g. TCP, UDP) so options that look into
|
|
|
|
these headers cannot match.
|
2002-08-10 15:04:40 +00:00
|
|
|
.It Cm gid Ar group
|
2002-08-19 04:52:15 +00:00
|
|
|
Matches all TCP or UDP packets sent by or received for a
|
2002-08-10 15:04:40 +00:00
|
|
|
.Ar group .
|
|
|
|
A
|
|
|
|
.Ar group
|
2002-08-19 04:52:15 +00:00
|
|
|
may be specified by name or number.
|
2002-08-10 15:04:40 +00:00
|
|
|
.It Cm icmptypes Ar types
|
2002-08-19 04:52:15 +00:00
|
|
|
Matches ICMP packets whose ICMP type is in the list
|
2002-08-10 15:04:40 +00:00
|
|
|
.Ar types .
|
2003-07-12 07:01:48 +00:00
|
|
|
The list may be specified as any combination of
|
|
|
|
individual types (numeric) separated by commas.
|
|
|
|
.Em Ranges are not allowed.
|
2002-08-10 15:04:40 +00:00
|
|
|
The supported ICMP types are:
|
|
|
|
.Pp
|
|
|
|
echo reply
|
|
|
|
.Pq Cm 0 ,
|
|
|
|
destination unreachable
|
|
|
|
.Pq Cm 3 ,
|
|
|
|
source quench
|
|
|
|
.Pq Cm 4 ,
|
|
|
|
redirect
|
|
|
|
.Pq Cm 5 ,
|
|
|
|
echo request
|
|
|
|
.Pq Cm 8 ,
|
|
|
|
router advertisement
|
|
|
|
.Pq Cm 9 ,
|
|
|
|
router solicitation
|
|
|
|
.Pq Cm 10 ,
|
|
|
|
time-to-live exceeded
|
|
|
|
.Pq Cm 11 ,
|
|
|
|
IP header bad
|
|
|
|
.Pq Cm 12 ,
|
|
|
|
timestamp request
|
|
|
|
.Pq Cm 13 ,
|
|
|
|
timestamp reply
|
|
|
|
.Pq Cm 14 ,
|
|
|
|
information request
|
|
|
|
.Pq Cm 15 ,
|
|
|
|
information reply
|
|
|
|
.Pq Cm 16 ,
|
|
|
|
address mask request
|
|
|
|
.Pq Cm 17
|
|
|
|
and address mask reply
|
|
|
|
.Pq Cm 18 .
|
|
|
|
.It Cm in | out
|
2002-08-19 04:52:15 +00:00
|
|
|
Matches incoming or outgoing packets, respectively.
|
2002-08-10 15:04:40 +00:00
|
|
|
.Cm in
|
|
|
|
and
|
|
|
|
.Cm out
|
|
|
|
are mutually exclusive (in fact,
|
|
|
|
.Cm out
|
|
|
|
is implemented as
|
2002-08-19 04:52:15 +00:00
|
|
|
.Cm not in Ns No ).
|
2003-06-22 17:33:19 +00:00
|
|
|
.It Cm ipid Ar id-list
|
2002-08-19 04:52:15 +00:00
|
|
|
Matches IP packets whose
|
|
|
|
.Cm ip_id
|
2003-06-22 17:33:19 +00:00
|
|
|
field has value included in
|
|
|
|
.Ar id-list ,
|
|
|
|
which is either a single value or a list of values or ranges
|
|
|
|
specified in the same way as
|
|
|
|
.Ar ports .
|
|
|
|
.It Cm iplen Ar len-list
|
2002-08-19 04:52:15 +00:00
|
|
|
Matches IP packets whose total length, including header and data, is
|
2003-06-22 17:33:19 +00:00
|
|
|
in the set
|
|
|
|
.Ar len-list ,
|
|
|
|
which is either a single value or a list of values or ranges
|
|
|
|
specified in the same way as
|
|
|
|
.Ar ports .
|
2002-08-10 15:04:40 +00:00
|
|
|
.It Cm ipoptions Ar spec
|
2002-08-19 04:52:15 +00:00
|
|
|
Matches packets whose IP header contains the comma separated list of
|
2002-08-10 15:04:40 +00:00
|
|
|
options specified in
|
|
|
|
.Ar spec .
|
|
|
|
The supported IP options are:
|
|
|
|
.Pp
|
|
|
|
.Cm ssrr
|
|
|
|
(strict source route),
|
|
|
|
.Cm lsrr
|
|
|
|
(loose source route),
|
|
|
|
.Cm rr
|
|
|
|
(record packet route) and
|
|
|
|
.Cm ts
|
|
|
|
(timestamp).
|
|
|
|
The absence of a particular option may be denoted
|
|
|
|
with a
|
|
|
|
.Ql \&! .
|
|
|
|
.It Cm ipprecedence Ar precedence
|
2002-08-19 04:52:15 +00:00
|
|
|
Matches IP packets whose precedence field is equal to
|
2002-08-10 15:04:40 +00:00
|
|
|
.Ar precedence .
|
2003-07-04 21:42:32 +00:00
|
|
|
.It Cm ipsec
|
|
|
|
Matches packets that have IPSEC history associated with them
|
|
|
|
(i.e. the packet comes encapsulated in IPSEC, the kernel
|
|
|
|
has IPSEC support and IPSEC_FILTERGIF option, and can correctly
|
|
|
|
decapsulate it).
|
|
|
|
.Pp
|
|
|
|
Note that specifying
|
|
|
|
.Cm ipsec
|
|
|
|
is different from specifying
|
|
|
|
.Cm proto Ar ipsec
|
|
|
|
as the latter will only look at the specific IP protocol field,
|
|
|
|
irrespective of IPSEC kernel support and the validity of the IPSEC data.
|
2002-08-10 15:04:40 +00:00
|
|
|
.It Cm iptos Ar spec
|
2002-08-19 04:52:15 +00:00
|
|
|
Matches IP packets whose
|
|
|
|
.Cm tos
|
|
|
|
field contains the comma separated list of
|
2002-08-10 15:04:40 +00:00
|
|
|
service types specified in
|
|
|
|
.Ar spec .
|
|
|
|
The supported IP types of service are:
|
|
|
|
.Pp
|
|
|
|
.Cm lowdelay
|
|
|
|
.Pq Dv IPTOS_LOWDELAY ,
|
|
|
|
.Cm throughput
|
|
|
|
.Pq Dv IPTOS_THROUGHPUT ,
|
|
|
|
.Cm reliability
|
|
|
|
.Pq Dv IPTOS_RELIABILITY ,
|
|
|
|
.Cm mincost
|
|
|
|
.Pq Dv IPTOS_MINCOST ,
|
|
|
|
.Cm congestion
|
|
|
|
.Pq Dv IPTOS_CE .
|
|
|
|
The absence of a particular type may be denoted
|
|
|
|
with a
|
|
|
|
.Ql \&! .
|
2003-06-22 17:33:19 +00:00
|
|
|
.It Cm ipttl Ar ttl-list
|
|
|
|
Matches IP packets whose time to live is included in
|
|
|
|
.Ar ttl-list ,
|
|
|
|
which is either a single value or a list of values or ranges
|
|
|
|
specified in the same way as
|
|
|
|
.Ar ports .
|
2002-08-10 15:04:40 +00:00
|
|
|
.It Cm ipversion Ar ver
|
2002-08-19 04:52:15 +00:00
|
|
|
Matches IP packets whose IP version field is
|
2002-08-10 15:04:40 +00:00
|
|
|
.Ar ver .
|
|
|
|
.It Cm keep-state
|
|
|
|
Upon a match, the firewall will create a dynamic rule, whose
|
2002-10-28 07:03:56 +00:00
|
|
|
default behaviour is to match bidirectional traffic between
|
2002-08-10 15:04:40 +00:00
|
|
|
source and destination IP/port using the same protocol.
|
|
|
|
The rule has a limited lifetime (controlled by a set of
|
|
|
|
.Xr sysctl 8
|
|
|
|
variables), and the lifetime is refreshed every time a matching
|
|
|
|
packet is found.
|
|
|
|
.It Cm layer2
|
|
|
|
Matches only layer2 packets, i.e. those passed to
|
|
|
|
.Nm
|
|
|
|
from ether_demux() and ether_output_frame().
|
|
|
|
.It Cm limit Bro Cm src-addr | src-port | dst-addr | dst-port Brc Ar N
|
|
|
|
The firewall will only allow
|
|
|
|
.Ar N
|
|
|
|
connections with the same
|
|
|
|
set of parameters as specified in the rule.
|
|
|
|
One or more
|
|
|
|
of source and destination addresses and ports can be
|
|
|
|
specified.
|
2002-08-19 04:52:15 +00:00
|
|
|
.It Cm { MAC | mac } Ar dst-mac src-mac
|
2002-08-19 12:36:54 +00:00
|
|
|
Match packets with a given
|
|
|
|
.Ar dst-mac
|
|
|
|
and
|
2002-09-22 11:30:51 +00:00
|
|
|
.Ar src-mac
|
2002-08-19 12:36:54 +00:00
|
|
|
addresses, specified as the
|
|
|
|
.Cm any
|
|
|
|
keyword (matching any MAC address), or six groups of hex digits
|
2002-10-28 07:03:56 +00:00
|
|
|
separated by colons,
|
2002-08-19 12:36:54 +00:00
|
|
|
and optionally followed by a mask indicating how many bits are
|
|
|
|
significant, as in
|
|
|
|
.Pp
|
|
|
|
.Dl "MAC 10:20:30:40:50:60/33 any"
|
|
|
|
.Pp
|
|
|
|
Note that the order of MAC addresses (destination first,
|
|
|
|
source second) is
|
|
|
|
the same as on the wire, but the opposite of the one used for
|
|
|
|
IP addresses.
|
2002-08-19 04:52:15 +00:00
|
|
|
.It Cm mac-type Ar mac-type
|
2002-08-19 12:36:54 +00:00
|
|
|
Matches packets whose Ethernet Type field
|
2002-08-19 04:52:15 +00:00
|
|
|
corresponds to one of those specified as argument.
|
2002-08-19 12:36:54 +00:00
|
|
|
.Ar mac-type
|
|
|
|
is specified in the same way as
|
|
|
|
.Cm port numbers
|
|
|
|
(i.e. one or more comma-separated single values or ranges).
|
|
|
|
You can use symbolic names for known values such as
|
|
|
|
.Em vlan , ipv4, ipv6 .
|
2002-10-28 07:03:56 +00:00
|
|
|
Values can be entered as decimal or hexadecimal (if prefixed by 0x),
|
2002-08-19 12:36:54 +00:00
|
|
|
and they are always printed as hexadecimal (unless the
|
|
|
|
.Cm -N
|
|
|
|
option is used, in which case symbolic resolution will be attempted).
|
2002-08-19 04:52:15 +00:00
|
|
|
.It Cm proto Ar protocol
|
|
|
|
Matches packets with the corresponding IPv4 protocol.
|
2002-08-10 15:04:40 +00:00
|
|
|
.It Cm recv | xmit | via Brq Ar ifX | Ar if Ns Cm * | Ar ipno | Ar any
|
2002-10-28 07:03:56 +00:00
|
|
|
Matches packets received, transmitted or going through,
|
2002-08-19 04:52:15 +00:00
|
|
|
respectively, the interface specified by exact name
|
|
|
|
.Ns No ( Ar ifX Ns No ),
|
|
|
|
by device name
|
|
|
|
.Ns No ( Ar if Ns Ar * Ns No ),
|
|
|
|
by IP address, or through some interface.
|
1997-06-02 05:02:37 +00:00
|
|
|
.Pp
|
|
|
|
The
|
2000-02-28 15:21:12 +00:00
|
|
|
.Cm via
|
1997-06-02 05:02:37 +00:00
|
|
|
keyword causes the interface to always be checked.
|
|
|
|
If
|
2000-02-28 15:21:12 +00:00
|
|
|
.Cm recv
|
1997-06-02 05:02:37 +00:00
|
|
|
or
|
2000-02-28 15:21:12 +00:00
|
|
|
.Cm xmit
|
1997-06-02 05:02:37 +00:00
|
|
|
is used instead of
|
2000-02-28 15:21:12 +00:00
|
|
|
.Cm via ,
|
2001-10-14 22:46:05 +00:00
|
|
|
then only the receive or transmit interface (respectively)
|
2000-02-28 15:21:12 +00:00
|
|
|
is checked.
|
|
|
|
By specifying both, it is possible to match packets based on
|
|
|
|
both receive and transmit interface, e.g.:
|
1997-06-02 05:02:37 +00:00
|
|
|
.Pp
|
2002-08-10 15:04:40 +00:00
|
|
|
.Dl "ipfw add deny ip from any to any out recv ed0 xmit ed1"
|
1996-02-24 13:39:46 +00:00
|
|
|
.Pp
|
1997-06-02 05:02:37 +00:00
|
|
|
The
|
2000-02-28 15:21:12 +00:00
|
|
|
.Cm recv
|
|
|
|
interface can be tested on either incoming or outgoing packets,
|
|
|
|
while the
|
|
|
|
.Cm xmit
|
|
|
|
interface can only be tested on outgoing packets.
|
|
|
|
So
|
|
|
|
.Cm out
|
1997-06-02 05:02:37 +00:00
|
|
|
is required (and
|
2000-02-28 15:21:12 +00:00
|
|
|
.Cm in
|
|
|
|
is invalid) whenever
|
|
|
|
.Cm xmit
|
|
|
|
is used.
|
1997-06-02 05:02:37 +00:00
|
|
|
.Pp
|
2000-02-28 15:21:12 +00:00
|
|
|
A packet may not have a receive or transmit interface: packets
|
|
|
|
originating from the local host have no receive interface,
|
|
|
|
while packets destined for the local host have no transmit
|
|
|
|
interface.
|
2002-08-10 15:04:40 +00:00
|
|
|
.It Cm setup
|
2002-08-19 04:52:15 +00:00
|
|
|
Matches TCP packets that have the SYN bit set but no ACK bit.
|
2002-08-10 15:04:40 +00:00
|
|
|
This is the short form of
|
|
|
|
.Dq Li tcpflags\ syn,!ack .
|
2002-08-19 04:52:15 +00:00
|
|
|
.It Cm src-ip Ar ip-address
|
|
|
|
Matches IP packets whose source IP is one of the address(es)
|
|
|
|
specified as argument.
|
|
|
|
.It Cm src-port Ar ports
|
|
|
|
Matches IP packets whose source port is one of the port(s)
|
|
|
|
specified as argument.
|
2000-10-06 11:17:06 +00:00
|
|
|
.It Cm tcpack Ar ack
|
1996-02-24 13:39:46 +00:00
|
|
|
TCP packets only.
|
2000-10-06 11:17:06 +00:00
|
|
|
Match if the TCP header acknowledgment number field is set to
|
|
|
|
.Ar ack .
|
2000-02-28 15:21:12 +00:00
|
|
|
.It Cm tcpflags Ar spec
|
1996-02-24 13:39:46 +00:00
|
|
|
TCP packets only.
|
1999-05-29 08:12:38 +00:00
|
|
|
Match if the TCP header contains the comma separated list of
|
1996-06-15 01:38:51 +00:00
|
|
|
flags specified in
|
|
|
|
.Ar spec .
|
|
|
|
The supported TCP flags are:
|
2000-01-08 11:19:19 +00:00
|
|
|
.Pp
|
2000-02-28 15:21:12 +00:00
|
|
|
.Cm fin ,
|
|
|
|
.Cm syn ,
|
|
|
|
.Cm rst ,
|
|
|
|
.Cm psh ,
|
|
|
|
.Cm ack
|
1996-06-15 01:38:51 +00:00
|
|
|
and
|
2000-02-28 15:21:12 +00:00
|
|
|
.Cm urg .
|
1996-06-15 01:38:51 +00:00
|
|
|
The absence of a particular flag may be denoted
|
1999-04-28 02:49:29 +00:00
|
|
|
with a
|
2000-12-18 15:16:24 +00:00
|
|
|
.Ql \&! .
|
1998-02-12 00:57:06 +00:00
|
|
|
A rule which contains a
|
2000-02-28 15:21:12 +00:00
|
|
|
.Cm tcpflags
|
1998-02-12 00:57:06 +00:00
|
|
|
specification can never match a fragmented packet which has
|
2000-02-28 15:21:12 +00:00
|
|
|
a non-zero offset.
|
|
|
|
See the
|
|
|
|
.Cm frag
|
1998-02-12 00:57:06 +00:00
|
|
|
option for details on matching fragmented packets.
|
2002-08-10 15:04:40 +00:00
|
|
|
.It Cm tcpseq Ar seq
|
2000-10-06 11:17:06 +00:00
|
|
|
TCP packets only.
|
2002-08-10 15:04:40 +00:00
|
|
|
Match if the TCP header sequence number field is set to
|
|
|
|
.Ar seq .
|
2000-10-06 11:17:06 +00:00
|
|
|
.It Cm tcpwin Ar win
|
|
|
|
TCP packets only.
|
|
|
|
Match if the TCP header window field is set to
|
|
|
|
.Ar win .
|
|
|
|
.It Cm tcpoptions Ar spec
|
|
|
|
TCP packets only.
|
|
|
|
Match if the TCP header contains the comma separated list of
|
|
|
|
options specified in
|
|
|
|
.Ar spec .
|
|
|
|
The supported TCP options are:
|
|
|
|
.Pp
|
|
|
|
.Cm mss
|
|
|
|
(maximum segment size),
|
|
|
|
.Cm window
|
|
|
|
(tcp window advertisement),
|
|
|
|
.Cm sack
|
|
|
|
(selective ack),
|
|
|
|
.Cm ts
|
|
|
|
(rfc1323 timestamp) and
|
|
|
|
.Cm cc
|
|
|
|
(rfc1644 t/tcp connection count).
|
|
|
|
The absence of a particular option may be denoted
|
|
|
|
with a
|
2000-12-18 15:16:24 +00:00
|
|
|
.Ql \&! .
|
2000-02-28 15:21:12 +00:00
|
|
|
.It Cm uid Ar user
|
2000-01-08 11:19:19 +00:00
|
|
|
Match all TCP or UDP packets sent by or received for a
|
|
|
|
.Ar user .
|
|
|
|
A
|
|
|
|
.Ar user
|
|
|
|
may be matched by name or identification number.
|
2003-03-15 01:13:00 +00:00
|
|
|
.It Cm verrevpath
|
|
|
|
For incoming packets,
|
|
|
|
a routing table lookup is done on the packet's source address.
|
|
|
|
If the interface on which the packet entered the system matches the
|
|
|
|
outgoing interface for the route,
|
|
|
|
the packet matches.
|
|
|
|
If the interfaces do not match up,
|
|
|
|
the packet does not match.
|
|
|
|
All outgoing packets or packets with no incoming interface match.
|
|
|
|
.Pp
|
|
|
|
The name and functionality of the option is intentionally similar to
|
|
|
|
the Cisco IOS command:
|
|
|
|
.Pp
|
|
|
|
.Dl ip verify unicast reverse-path
|
|
|
|
.Pp
|
|
|
|
This option can be used to make anti-spoofing rules.
|
2000-02-28 15:21:12 +00:00
|
|
|
.El
|
2002-08-16 10:31:47 +00:00
|
|
|
.Sh SETS OF RULES
|
|
|
|
Each rule belongs to one of 32 different
|
|
|
|
.Em sets
|
|
|
|
, numbered 0 to 31.
|
|
|
|
Set 31 is reserved for the default rule.
|
|
|
|
.Pp
|
|
|
|
By default, rules are put in set 0, unless you use the
|
|
|
|
.Cm set N
|
|
|
|
attribute when entering a new rule.
|
|
|
|
Sets can be individually and atomically enabled or disabled,
|
|
|
|
so this mechanism permits an easy way to store multiple configurations
|
|
|
|
of the firewall and quickly (and atomically) switch between them.
|
|
|
|
The command to enable/disable sets is
|
2002-10-28 07:03:56 +00:00
|
|
|
.Bd -ragged -offset indent
|
2002-08-16 10:31:47 +00:00
|
|
|
.Nm
|
2002-10-28 07:03:56 +00:00
|
|
|
.Cm set Oo Cm disable Ar number ... Oc Op Cm enable Ar number ...
|
|
|
|
.Ed
|
2002-08-16 10:31:47 +00:00
|
|
|
.Pp
|
|
|
|
where multiple
|
|
|
|
.Cm enable
|
|
|
|
or
|
|
|
|
.Cm disable
|
|
|
|
sections can be specified.
|
|
|
|
Command execution is atomic on all the sets specified in the command.
|
|
|
|
By default, all sets are enabled.
|
|
|
|
.Pp
|
2002-10-28 07:03:56 +00:00
|
|
|
When you disable a set, its rules behave as if they do not exist
|
2002-08-16 10:31:47 +00:00
|
|
|
in the firewall configuration, with only one exception:
|
2002-10-28 07:03:56 +00:00
|
|
|
.Bd -ragged -offset indent
|
2002-08-16 10:31:47 +00:00
|
|
|
dynamic rules created from a rule before it had been disabled
|
|
|
|
will still be active until they expire. In order to delete
|
|
|
|
dynamic rules you have to explicitly delete the parent rule
|
2002-10-28 07:03:56 +00:00
|
|
|
which generated them.
|
|
|
|
.Ed
|
2002-08-16 10:31:47 +00:00
|
|
|
.Pp
|
2002-10-28 07:03:56 +00:00
|
|
|
The set number of rules can be changed with the command
|
|
|
|
.Bd -ragged -offset indent
|
2003-03-03 22:46:36 +00:00
|
|
|
.Nm
|
2002-08-16 10:31:47 +00:00
|
|
|
.Cm set move
|
|
|
|
.Brq Cm rule Ar rule-number | old-set
|
|
|
|
.Cm to Ar new-set
|
2002-10-28 07:03:56 +00:00
|
|
|
.Ed
|
2002-08-16 10:31:47 +00:00
|
|
|
.Pp
|
|
|
|
Also, you can atomically swap two rulesets with the command
|
2002-10-28 07:03:56 +00:00
|
|
|
.Bd -ragged -offset indent
|
2002-08-16 10:31:47 +00:00
|
|
|
.Nm
|
|
|
|
.Cm set swap Ar first-set second-set
|
2002-10-28 07:03:56 +00:00
|
|
|
.Ed
|
2002-08-16 10:31:47 +00:00
|
|
|
.Pp
|
|
|
|
See the
|
|
|
|
.Sx EXAMPLES
|
|
|
|
Section on some possible uses of sets of rules.
|
2002-08-10 15:04:40 +00:00
|
|
|
.Sh STATEFUL FIREWALL
|
2002-08-16 10:31:47 +00:00
|
|
|
Stateful operation is a way for the firewall to dynamically
|
|
|
|
create rules for specific flows when packets that
|
|
|
|
match a given pattern are detected. Support for stateful
|
|
|
|
operation comes through the
|
|
|
|
.Cm check-state , keep-state
|
|
|
|
and
|
|
|
|
.Cm limit
|
|
|
|
options of
|
|
|
|
.Nm rules.
|
|
|
|
.Pp
|
|
|
|
Dynamic rules are created when a packet matches a
|
|
|
|
.Cm keep-state
|
|
|
|
or
|
|
|
|
.Cm limit
|
|
|
|
rule, causing the creation of a
|
|
|
|
.Em dynamic
|
|
|
|
rule which will match all and only packets with
|
|
|
|
a given
|
|
|
|
.Em protocol
|
|
|
|
between a
|
|
|
|
.Em src-ip/src-port dst-ip/dst-port
|
|
|
|
pair of addresses (
|
|
|
|
.Em src
|
|
|
|
and
|
|
|
|
.Em dst
|
|
|
|
are used here only to denote the initial match addresses, but they
|
|
|
|
are completely equivalent afterwards).
|
|
|
|
Dynamic rules will be checked at the first
|
|
|
|
.Cm check-state, keep-state
|
|
|
|
or
|
|
|
|
.Cm limit
|
|
|
|
occurrence, and the action performed upon a match will be the same
|
|
|
|
as in the parent rule.
|
|
|
|
.Pp
|
|
|
|
Note that no additional attributes other than protocol and IP addresses
|
|
|
|
and ports are checked on dynamic rules.
|
|
|
|
.Pp
|
|
|
|
The typical use of dynamic rules is to keep a closed firewall configuration,
|
|
|
|
but let the first TCP SYN packet from the inside network install a
|
|
|
|
dynamic rule for the flow so that packets belonging to that session
|
|
|
|
will be allowed through the firewall:
|
|
|
|
.Pp
|
|
|
|
.Dl "ipfw add check-state"
|
2003-02-04 01:33:25 +00:00
|
|
|
.Dl "ipfw add allow tcp from my-subnet to any setup keep-state"
|
2002-08-16 10:31:47 +00:00
|
|
|
.Dl "ipfw add deny tcp from any to any"
|
|
|
|
.Pp
|
|
|
|
A similar approach can be used for UDP, where an UDP packet coming
|
|
|
|
from the inside will install a dynamic rule to let the response through
|
|
|
|
the firewall:
|
|
|
|
.Pp
|
|
|
|
.Dl "ipfw add check-state"
|
2003-02-04 01:33:25 +00:00
|
|
|
.Dl "ipfw add allow udp from my-subnet to any keep-state"
|
2002-08-16 10:31:47 +00:00
|
|
|
.Dl "ipfw add deny udp from any to any"
|
|
|
|
.Pp
|
|
|
|
Dynamic rules expire after some time, which depends on the status
|
|
|
|
of the flow and the setting of some
|
|
|
|
.Cm sysctl
|
|
|
|
variables.
|
|
|
|
See Section
|
|
|
|
.Sx SYSCTL VARIABLES
|
|
|
|
for more details.
|
|
|
|
For TCP sessions, dynamic rules can be instructed to periodically
|
|
|
|
send keepalive packets to refresh the state of the rule when it is
|
|
|
|
about to expire.
|
|
|
|
.Pp
|
|
|
|
See Section
|
|
|
|
.Sx EXAMPLES
|
|
|
|
for more examples on how to use dynamic rules.
|
2002-10-28 07:03:56 +00:00
|
|
|
.Sh TRAFFIC SHAPER (DUMMYNET) CONFIGURATION
|
2000-02-28 15:21:12 +00:00
|
|
|
.Nm
|
2002-08-16 10:31:47 +00:00
|
|
|
is also the user interface for the
|
2000-01-08 11:19:19 +00:00
|
|
|
.Xr dummynet 4
|
|
|
|
traffic shaper.
|
2000-06-08 13:38:57 +00:00
|
|
|
.Pp
|
2002-10-28 07:03:56 +00:00
|
|
|
.Nm dummynet
|
|
|
|
operates by first using the firewall to classify packets and divide them into
|
|
|
|
.Em flows ,
|
|
|
|
using any match pattern that can be used in
|
|
|
|
.Nm
|
|
|
|
rules.
|
|
|
|
Depending on local policies, a flow can contain packets for a single
|
|
|
|
TCP connection, or from/to a given host, or entire subnet, or a
|
|
|
|
protocol type, etc.
|
|
|
|
.Pp
|
|
|
|
Packets belonging to the same flow are then passed to either of two
|
|
|
|
different objects, which implement the traffic regulation:
|
|
|
|
.Bl -hang -offset XXXX
|
|
|
|
.It Em pipe
|
|
|
|
A pipe emulates a link with given bandwidth, propagation delay,
|
2000-06-12 09:43:00 +00:00
|
|
|
queue size and packet loss rate.
|
2002-10-28 07:03:56 +00:00
|
|
|
Packets are queued in front of the pipe as they come out from the classifier,
|
|
|
|
and then transferred to the pipe according to the pipe's parameters.
|
|
|
|
.Pp
|
|
|
|
.It Em queue
|
|
|
|
A queue
|
|
|
|
is an abstraction used to implement the WF2Q+
|
|
|
|
(Worst-case Fair Weighted Fair Queueing) policy, which is
|
|
|
|
an efficient variant of the WFQ policy.
|
|
|
|
.br
|
|
|
|
The queue associates a
|
|
|
|
.Em weight
|
|
|
|
and a reference pipe to each flow, and then all backlogged (i.e.,
|
|
|
|
with packets queued) flows linked to the same pipe share the pipe's
|
|
|
|
bandwidth proportionally to their weights.
|
|
|
|
Note that weights are not priorities; a flow with a lower weight
|
|
|
|
is still guaranteed to get its fraction of the bandwidth even if a
|
|
|
|
flow with a higher weight is permanently backlogged.
|
2000-06-08 13:38:57 +00:00
|
|
|
.Pp
|
2002-10-28 07:03:56 +00:00
|
|
|
.El
|
|
|
|
In practice,
|
|
|
|
.Em pipes
|
|
|
|
can be used to set hard limits to the bandwidth that a flow can use, whereas
|
|
|
|
.Em queues
|
|
|
|
can be used to determine how different flow share the available bandwidth.
|
2000-06-08 13:38:57 +00:00
|
|
|
.Pp
|
2000-01-08 11:19:19 +00:00
|
|
|
The
|
2002-10-28 07:03:56 +00:00
|
|
|
.Em pipe
|
|
|
|
and
|
|
|
|
.Em queue
|
|
|
|
configuration commands are the following:
|
2002-08-10 15:04:40 +00:00
|
|
|
.Bd -ragged -offset indent
|
|
|
|
.Cm pipe Ar number Cm config Ar pipe-configuration
|
2000-01-08 11:19:19 +00:00
|
|
|
.Pp
|
2002-08-10 15:04:40 +00:00
|
|
|
.Cm queue Ar number Cm config Ar queue-configuration
|
2000-06-08 13:38:57 +00:00
|
|
|
.Ed
|
2000-06-12 09:43:00 +00:00
|
|
|
.Pp
|
2000-01-08 11:19:19 +00:00
|
|
|
The following parameters can be configured for a pipe:
|
2002-08-10 15:04:40 +00:00
|
|
|
.Pp
|
|
|
|
.Bl -tag -width indent -compact
|
2000-06-12 09:43:00 +00:00
|
|
|
.It Cm bw Ar bandwidth | device
|
2000-01-08 11:19:19 +00:00
|
|
|
Bandwidth, measured in
|
2000-02-28 15:21:12 +00:00
|
|
|
.Sm off
|
2001-10-01 14:13:36 +00:00
|
|
|
.Op Cm K | M
|
|
|
|
.Brq Cm bit/s | Byte/s .
|
2000-02-28 15:21:12 +00:00
|
|
|
.Sm on
|
|
|
|
.Pp
|
2000-01-08 11:19:19 +00:00
|
|
|
A value of 0 (default) means unlimited bandwidth.
|
2002-10-28 07:03:56 +00:00
|
|
|
The unit must immediately follow the number, as in
|
2000-06-12 09:43:00 +00:00
|
|
|
.Pp
|
2002-08-10 15:04:40 +00:00
|
|
|
.Dl "ipfw pipe 1 config bw 300Kbit/s"
|
2000-06-12 09:43:00 +00:00
|
|
|
.Pp
|
2002-10-28 07:03:56 +00:00
|
|
|
If a device name is specified instead of a numeric value, as in
|
|
|
|
.Pp
|
|
|
|
.Dl "ipfw pipe 1 config bw tun0"
|
|
|
|
.Pp
|
|
|
|
then the transmit clock is supplied by the specified device.
|
2000-06-12 09:43:00 +00:00
|
|
|
At the moment only the
|
|
|
|
.Xr tun 4
|
|
|
|
device supports this
|
|
|
|
functionality, for use in conjunction with
|
|
|
|
.Xr ppp 8 .
|
2002-08-10 15:04:40 +00:00
|
|
|
.Pp
|
2000-02-28 15:21:12 +00:00
|
|
|
.It Cm delay Ar ms-delay
|
|
|
|
Propagation delay, measured in milliseconds.
|
|
|
|
The value is rounded to the next multiple of the clock tick
|
|
|
|
(typically 10ms, but it is a good practice to run kernels
|
|
|
|
with
|
|
|
|
.Dq "options HZ=1000"
|
|
|
|
to reduce
|
|
|
|
the granularity to 1ms or less).
|
|
|
|
Default value is 0, meaning no delay.
|
2002-08-10 15:04:40 +00:00
|
|
|
.El
|
|
|
|
.Pp
|
|
|
|
The following parameters can be configured for a queue:
|
|
|
|
.Pp
|
|
|
|
.Bl -tag -width indent -compact
|
|
|
|
.It Cm pipe Ar pipe_nr
|
|
|
|
Connects a queue to the specified pipe.
|
2002-10-28 07:03:56 +00:00
|
|
|
Multiple queues (with the same or different weights) can be connected to
|
|
|
|
the same pipe, which specifies the aggregate rate for the set of queues.
|
2002-08-10 15:04:40 +00:00
|
|
|
.Pp
|
|
|
|
.It Cm weight Ar weight
|
|
|
|
Specifies the weight to be used for flows matching this queue.
|
|
|
|
The weight must be in the range 1..100, and defaults to 1.
|
|
|
|
.El
|
|
|
|
.Pp
|
|
|
|
Finally, the following parameters can be configured for both
|
|
|
|
pipes and queues:
|
|
|
|
.Pp
|
2002-10-28 07:03:56 +00:00
|
|
|
.Bl -tag -width XXXX -compact
|
2002-08-10 15:04:40 +00:00
|
|
|
.Pp
|
|
|
|
.It Cm buckets Ar hash-table-size
|
|
|
|
Specifies the size of the hash table used for storing the
|
|
|
|
various queues.
|
|
|
|
Default value is 64 controlled by the
|
|
|
|
.Xr sysctl 8
|
|
|
|
variable
|
|
|
|
.Em net.inet.ip.dummynet.hash_size ,
|
2002-10-12 07:45:23 +00:00
|
|
|
allowed range is 16 to 65536.
|
2002-08-10 15:04:40 +00:00
|
|
|
.Pp
|
2000-02-28 15:21:12 +00:00
|
|
|
.It Cm mask Ar mask-specifier
|
2002-10-28 07:03:56 +00:00
|
|
|
Packets sent to a given pipe or queue by an
|
|
|
|
.Nm
|
|
|
|
rule can be further classified into multiple flows, each of which is then
|
|
|
|
sent to a different
|
|
|
|
.Em dynamic
|
|
|
|
pipe or queue.
|
2000-02-28 15:21:12 +00:00
|
|
|
A flow identifier is constructed by masking the IP addresses,
|
2002-10-28 07:03:56 +00:00
|
|
|
ports and protocol types as specified with the
|
|
|
|
.Cm mask
|
|
|
|
options in the configuration of the pipe or queue.
|
|
|
|
For each different flow identifier, a new pipe or queue is created
|
|
|
|
with the same parameters as the original object, and matching packets
|
|
|
|
are sent to it.
|
|
|
|
.Pp
|
|
|
|
Thus, when
|
|
|
|
.Em dynamic pipes
|
|
|
|
are used, each flow will get the same bandwidth as defined by the pipe,
|
|
|
|
whereas when
|
|
|
|
.Em dynamic queues
|
|
|
|
are used, each flow will share the parent's pipe bandwidth evenly
|
|
|
|
with other flows generated by the same queue (note that other queues
|
|
|
|
with different weights might be connected to the same pipe).
|
|
|
|
.br
|
|
|
|
Available mask specifiers are a combination of one or more of the following:
|
|
|
|
.Pp
|
2000-02-28 15:21:12 +00:00
|
|
|
.Cm dst-ip Ar mask ,
|
|
|
|
.Cm src-ip Ar mask ,
|
|
|
|
.Cm dst-port Ar mask ,
|
|
|
|
.Cm src-port Ar mask ,
|
|
|
|
.Cm proto Ar mask
|
|
|
|
or
|
|
|
|
.Cm all ,
|
2002-10-28 07:03:56 +00:00
|
|
|
.Pp
|
2000-01-08 11:19:19 +00:00
|
|
|
where the latter means all bits in all fields are significant.
|
2002-08-10 15:04:40 +00:00
|
|
|
.Pp
|
2002-08-16 10:31:47 +00:00
|
|
|
.It Cm noerror
|
|
|
|
When a packet is dropped by a dummynet queue or pipe, the error
|
|
|
|
is normally reported to the caller routine in the kernel, in the
|
|
|
|
same way as it happens when a device queue fills up. Setting this
|
|
|
|
option reports the packet as successfully delivered, which can be
|
|
|
|
needed for some experimental setups where you want to simulate
|
|
|
|
loss or congestion at a remote router.
|
|
|
|
.Pp
|
2002-08-10 15:04:40 +00:00
|
|
|
.It Cm plr Ar packet-loss-rate
|
|
|
|
Packet loss rate.
|
|
|
|
Argument
|
|
|
|
.Ar packet-loss-rate
|
|
|
|
is a floating-point number between 0 and 1, with 0 meaning no
|
|
|
|
loss, 1 meaning 100% loss.
|
|
|
|
The loss rate is internally represented on 31 bits.
|
|
|
|
.Pp
|
2002-08-16 10:31:47 +00:00
|
|
|
.It Cm queue Brq Ar slots | size Ns Cm Kbytes
|
|
|
|
Queue size, in
|
|
|
|
.Ar slots
|
|
|
|
or
|
|
|
|
.Cm KBytes .
|
|
|
|
Default value is 50 slots, which
|
|
|
|
is the typical queue size for Ethernet devices.
|
|
|
|
Note that for slow speed links you should keep the queue
|
|
|
|
size short or your traffic might be affected by a significant
|
|
|
|
queueing delay.
|
|
|
|
E.g., 50 max-sized ethernet packets (1500 bytes) mean 600Kbit
|
|
|
|
or 20s of queue on a 30Kbit/s pipe.
|
|
|
|
Even worse effect can result if you get packets from an
|
|
|
|
interface with a much larger MTU, e.g. the loopback interface
|
|
|
|
with its 16KB packets.
|
|
|
|
.Pp
|
2001-10-01 14:13:36 +00:00
|
|
|
.It Cm red | gred Ar w_q Ns / Ns Ar min_th Ns / Ns Ar max_th Ns / Ns Ar max_p
|
2001-12-14 21:51:28 +00:00
|
|
|
Make use of the RED (Random Early Detection) queue management algorithm.
|
2000-06-12 09:43:00 +00:00
|
|
|
.Ar w_q
|
|
|
|
and
|
|
|
|
.Ar max_p
|
|
|
|
are floating
|
|
|
|
point numbers between 0 and 1 (0 not included), while
|
|
|
|
.Ar min_th
|
|
|
|
and
|
|
|
|
.Ar max_th
|
|
|
|
are integer numbers specifying thresholds for queue management
|
|
|
|
(thresholds are computed in bytes if the queue has been defined
|
|
|
|
in bytes, in slots otherwise).
|
|
|
|
The
|
|
|
|
.Xr dummynet 4
|
|
|
|
also supports the gentle RED variant (gred).
|
|
|
|
Three
|
|
|
|
.Xr sysctl 8
|
|
|
|
variables can be used to control the RED behaviour:
|
|
|
|
.Bl -tag -width indent
|
|
|
|
.It Em net.inet.ip.dummynet.red_lookup_depth
|
2000-06-08 13:38:57 +00:00
|
|
|
specifies the accuracy in computing the average queue
|
2000-06-12 09:43:00 +00:00
|
|
|
when the link is idle (defaults to 256, must be greater than zero)
|
|
|
|
.It Em net.inet.ip.dummynet.red_avg_pkt_size
|
|
|
|
specifies the expected average packet size (defaults to 512, must be
|
|
|
|
greater than zero)
|
|
|
|
.It Em net.inet.ip.dummynet.red_max_pkt_size
|
|
|
|
specifies the expected maximum packet size, only used when queue
|
|
|
|
thresholds are in bytes (defaults to 1500, must be greater than zero).
|
|
|
|
.El
|
1996-02-24 13:39:46 +00:00
|
|
|
.El
|
|
|
|
.Sh CHECKLIST
|
|
|
|
Here are some important points to consider when designing your
|
|
|
|
rules:
|
2000-02-28 15:21:12 +00:00
|
|
|
.Bl -bullet
|
|
|
|
.It
|
|
|
|
Remember that you filter both packets going
|
|
|
|
.Cm in
|
|
|
|
and
|
|
|
|
.Cm out .
|
1996-06-15 01:38:51 +00:00
|
|
|
Most connections need packets going in both directions.
|
1996-02-24 13:39:46 +00:00
|
|
|
.It
|
|
|
|
Remember to test very carefully.
|
1996-06-15 01:38:51 +00:00
|
|
|
It is a good idea to be near the console when doing this.
|
2001-06-06 20:56:56 +00:00
|
|
|
If you cannot be near the console,
|
|
|
|
use an auto-recovery script such as the one in
|
|
|
|
.Pa /usr/share/examples/ipfw/change_rules.sh .
|
1996-02-24 13:39:46 +00:00
|
|
|
.It
|
|
|
|
Don't forget the loopback interface.
|
|
|
|
.El
|
|
|
|
.Sh FINE POINTS
|
2000-10-30 09:44:20 +00:00
|
|
|
.Bl -bullet
|
|
|
|
.It
|
2002-05-01 06:29:16 +00:00
|
|
|
There are circumstances where fragmented datagrams are unconditionally
|
|
|
|
dropped.
|
|
|
|
TCP packets are dropped if they do not contain at least 20 bytes of
|
|
|
|
TCP header, UDP packets are dropped if they do not contain a full 8
|
|
|
|
byte UDP header, and ICMP packets are dropped if they do not contain
|
|
|
|
4 bytes of ICMP header, enough to specify the ICMP type, code, and
|
|
|
|
checksum.
|
|
|
|
These packets are simply logged as
|
|
|
|
.Dq pullup failed
|
|
|
|
since there may not be enough good data in the packet to produce a
|
|
|
|
meaningful log entry.
|
|
|
|
.It
|
|
|
|
Another type of packet is unconditionally dropped, a TCP packet with a
|
|
|
|
fragment offset of one.
|
2000-02-28 15:21:12 +00:00
|
|
|
This is a valid packet, but it only has one use, to try
|
2001-03-16 07:39:46 +00:00
|
|
|
to circumvent firewalls.
|
|
|
|
When logging is enabled, these packets are
|
2001-03-16 01:28:11 +00:00
|
|
|
reported as being dropped by rule -1.
|
2000-10-30 09:44:20 +00:00
|
|
|
.It
|
2000-02-28 15:21:12 +00:00
|
|
|
If you are logged in over a network, loading the
|
|
|
|
.Xr kld 4
|
|
|
|
version of
|
1996-02-24 13:39:46 +00:00
|
|
|
.Nm
|
|
|
|
is probably not as straightforward as you would think.
|
2000-02-28 15:21:12 +00:00
|
|
|
I recommend the following command line:
|
|
|
|
.Bd -literal -offset indent
|
2003-03-03 22:46:36 +00:00
|
|
|
kldload ipfw && \e
|
2000-02-28 15:21:12 +00:00
|
|
|
ipfw add 32000 allow ip from any to any
|
1996-02-24 13:39:46 +00:00
|
|
|
.Ed
|
1996-12-23 02:03:15 +00:00
|
|
|
.Pp
|
1996-06-15 01:38:51 +00:00
|
|
|
Along the same lines, doing an
|
2000-02-28 15:21:12 +00:00
|
|
|
.Bd -literal -offset indent
|
1996-02-24 13:39:46 +00:00
|
|
|
ipfw flush
|
|
|
|
.Ed
|
1996-12-23 02:03:15 +00:00
|
|
|
.Pp
|
1996-02-24 13:39:46 +00:00
|
|
|
in similar surroundings is also a bad idea.
|
2000-10-30 09:44:20 +00:00
|
|
|
.It
|
2000-02-28 15:21:12 +00:00
|
|
|
The
|
|
|
|
.Nm
|
|
|
|
filter list may not be modified if the system security level
|
1999-04-28 02:49:29 +00:00
|
|
|
is set to 3 or higher
|
2001-08-07 15:48:51 +00:00
|
|
|
(see
|
1998-12-16 17:10:03 +00:00
|
|
|
.Xr init 8
|
2001-08-07 15:48:51 +00:00
|
|
|
for information on system security levels).
|
2000-10-30 09:44:20 +00:00
|
|
|
.El
|
1996-07-10 19:44:30 +00:00
|
|
|
.Sh PACKET DIVERSION
|
2000-02-28 15:21:12 +00:00
|
|
|
A
|
|
|
|
.Xr divert 4
|
|
|
|
socket bound to the specified port will receive all packets
|
|
|
|
diverted to that port.
|
1996-07-10 19:44:30 +00:00
|
|
|
If no socket is bound to the destination port, or if the kernel
|
2000-02-28 15:21:12 +00:00
|
|
|
wasn't compiled with divert socket support, the packets are
|
|
|
|
dropped.
|
2000-02-10 14:25:26 +00:00
|
|
|
.Sh SYSCTL VARIABLES
|
|
|
|
A set of
|
2000-02-28 15:21:12 +00:00
|
|
|
.Xr sysctl 8
|
2002-08-16 14:27:22 +00:00
|
|
|
variables controls the behaviour of the firewall and
|
|
|
|
associated modules (
|
|
|
|
.Nm dummynet, bridge
|
|
|
|
).
|
2001-09-27 23:44:27 +00:00
|
|
|
These are shown below together with their default value
|
|
|
|
(but always check with the
|
2001-10-01 14:13:36 +00:00
|
|
|
.Xr sysctl 8
|
2001-09-27 23:44:27 +00:00
|
|
|
command what value is actually in use) and meaning:
|
2000-02-28 15:21:12 +00:00
|
|
|
.Bl -tag -width indent
|
2002-08-16 14:27:22 +00:00
|
|
|
.It Em net.inet.ip.dummynet.expire : No 1
|
|
|
|
Lazily delete dynamic pipes/queue once they have no pending traffic.
|
|
|
|
You can disable this by setting the variable to 0, in which case
|
|
|
|
the pipes/queues will only be deleted when the threshold is reached.
|
|
|
|
.It Em net.inet.ip.dummynet.hash_size : No 64
|
|
|
|
Default size of the hash table used for dynamic pipes/queues.
|
|
|
|
This value is used when no
|
|
|
|
.Cm buckets
|
|
|
|
option is specified when configuring a pipe/queue.
|
|
|
|
.It Em net.inet.ip.dummynet.max_chain_len : No 16
|
|
|
|
Target value for the maximum number of pipes/queues in a hash bucket.
|
|
|
|
The product
|
|
|
|
.Cm max_chain_len*hash_size
|
|
|
|
is used to determine the threshold over which empty pipes/queues
|
|
|
|
will be expired even when
|
|
|
|
.Cm net.inet.ip.dummynet.expire=0 .
|
2002-10-28 07:03:56 +00:00
|
|
|
.It Em net.inet.ip.dummynet.red_lookup_depth : No 256
|
|
|
|
.It Em net.inet.ip.dummynet.red_avg_pkt_size : No 512
|
|
|
|
.It Em net.inet.ip.dummynet.red_max_pkt_size : No 1500
|
2002-08-16 14:27:22 +00:00
|
|
|
Parameters used in the computations of the drop probability
|
|
|
|
for the RED algorithm.
|
2002-08-16 10:31:47 +00:00
|
|
|
.It Em net.inet.ip.fw.autoinc_step : No 100
|
2002-10-28 07:03:56 +00:00
|
|
|
Delta between rule numbers when auto-generating them.
|
2002-08-16 10:31:47 +00:00
|
|
|
The value must be in the range 1..1000.
|
2003-07-22 07:41:24 +00:00
|
|
|
This variable is only present in
|
|
|
|
.Nm ipfw2 ,
|
|
|
|
the delta is hardwired to 100 in
|
|
|
|
.Nm ipfw1 .
|
2002-08-16 10:31:47 +00:00
|
|
|
.It Em net.inet.ip.fw.curr_dyn_buckets : Em net.inet.ip.fw.dyn_buckets
|
|
|
|
The current number of buckets in the hash table for dynamic rules
|
|
|
|
(readonly).
|
2000-02-28 15:21:12 +00:00
|
|
|
.It Em net.inet.ip.fw.debug : No 1
|
|
|
|
Controls debugging messages produced by
|
2000-11-20 16:52:27 +00:00
|
|
|
.Nm .
|
2000-02-28 15:21:12 +00:00
|
|
|
.It Em net.inet.ip.fw.dyn_buckets : No 256
|
2002-08-16 10:31:47 +00:00
|
|
|
The number of buckets in the hash table for dynamic rules.
|
2002-08-16 14:27:22 +00:00
|
|
|
Must be a power of 2, up to 65536.
|
2002-08-16 10:31:47 +00:00
|
|
|
It only takes effect when all dynamic rules have expired, so you
|
|
|
|
are advised to use a
|
2000-02-28 15:21:12 +00:00
|
|
|
.Cm flush
|
2002-08-16 10:31:47 +00:00
|
|
|
command to make sure that the hash table is resized.
|
2000-02-28 15:21:12 +00:00
|
|
|
.It Em net.inet.ip.fw.dyn_count : No 3
|
|
|
|
Current number of dynamic rules
|
2001-08-07 15:48:51 +00:00
|
|
|
(read-only).
|
2002-08-16 10:31:47 +00:00
|
|
|
.It Em net.inet.ip.fw.dyn_keepalive : No 1
|
|
|
|
Enables generation of keepalive packets for
|
|
|
|
.Cm keep-state
|
|
|
|
rules on TCP sessions. A keepalive is generated to both
|
|
|
|
sides of the connection every 5 seconds for the last 20
|
|
|
|
seconds of the lifetime of the rule.
|
|
|
|
.It Em net.inet.ip.fw.dyn_max : No 8192
|
2000-02-28 15:21:12 +00:00
|
|
|
Maximum number of dynamic rules.
|
|
|
|
When you hit this limit, no more dynamic rules can be
|
|
|
|
installed until old ones expire.
|
|
|
|
.It Em net.inet.ip.fw.dyn_ack_lifetime : No 300
|
|
|
|
.It Em net.inet.ip.fw.dyn_syn_lifetime : No 20
|
2001-09-27 23:44:27 +00:00
|
|
|
.It Em net.inet.ip.fw.dyn_fin_lifetime : No 1
|
|
|
|
.It Em net.inet.ip.fw.dyn_rst_lifetime : No 1
|
|
|
|
.It Em net.inet.ip.fw.dyn_udp_lifetime : No 5
|
2000-02-28 15:21:12 +00:00
|
|
|
.It Em net.inet.ip.fw.dyn_short_lifetime : No 30
|
|
|
|
These variables control the lifetime, in seconds, of dynamic
|
|
|
|
rules.
|
2000-02-10 14:25:26 +00:00
|
|
|
Upon the initial SYN exchange the lifetime is kept short,
|
|
|
|
then increased after both SYN have been seen, then decreased
|
2002-08-16 10:31:47 +00:00
|
|
|
again during the final FIN exchange or when a RST is received.
|
|
|
|
Both
|
|
|
|
.Em dyn_fin_lifetime
|
|
|
|
and
|
|
|
|
.Em dyn_rst_lifetime
|
|
|
|
must be strictly lower than 5 seconds, the period of
|
|
|
|
repetition of keepalives. The firewall enforces that.
|
|
|
|
.It Em net.inet.ip.fw.enable : No 1
|
|
|
|
Enables the firewall.
|
|
|
|
Setting this variable to 0 lets you run your machine without
|
|
|
|
firewall even if compiled in.
|
|
|
|
.It Em net.inet.ip.fw.one_pass : No 1
|
|
|
|
When set, the packet exiting from the
|
|
|
|
.Xr dummynet 4
|
|
|
|
pipe is not passed though the firewall again.
|
|
|
|
Otherwise, after a pipe action, the packet is
|
|
|
|
reinjected into the firewall at the next rule.
|
|
|
|
.It Em net.inet.ip.fw.verbose : No 1
|
|
|
|
Enables verbose messages.
|
|
|
|
.It Em net.inet.ip.fw.verbose_limit : No 0
|
|
|
|
Limits the number of messages produced by a verbose firewall.
|
2002-08-10 15:04:40 +00:00
|
|
|
.It Em net.link.ether.ipfw : No 0
|
|
|
|
Controls whether layer-2 packets are passed to
|
|
|
|
.Nm .
|
|
|
|
Default is no.
|
|
|
|
.It Em net.link.ether.bridge_ipfw : No 0
|
|
|
|
Controls whether bridged packets are passed to
|
|
|
|
.Nm .
|
|
|
|
Default is no.
|
2000-02-10 14:25:26 +00:00
|
|
|
.El
|
2002-10-28 07:03:56 +00:00
|
|
|
.Sh USING IPFW2 IN FreeBSD-STABLE
|
|
|
|
.Nm ipfw2
|
|
|
|
is standard in
|
|
|
|
.Fx
|
|
|
|
CURRENT, whereas
|
|
|
|
.Fx
|
|
|
|
STABLE still uses
|
|
|
|
.Nm ipfw1
|
|
|
|
unless the kernel is compiled with
|
|
|
|
.Cm options IPFW2 ,
|
|
|
|
and
|
|
|
|
.Nm /sbin/ipfw
|
|
|
|
and
|
|
|
|
.Nm /usr/lib/libalias
|
|
|
|
are recompiled with
|
|
|
|
.Cm -DIPFW2
|
|
|
|
and reinstalled (the same effect can be achieved by adding
|
|
|
|
.Cm IPFW2=TRUE
|
|
|
|
to
|
|
|
|
.Nm /etc/make.conf
|
|
|
|
before a buildworld).
|
|
|
|
.Pp
|
2002-08-16 10:31:47 +00:00
|
|
|
.Sh IPFW2 ENHANCEMENTS
|
|
|
|
This Section lists the features that have been introduced in
|
|
|
|
.Nm ipfw2
|
2002-10-28 07:03:56 +00:00
|
|
|
which were not present in
|
2002-08-16 10:31:47 +00:00
|
|
|
.Nm ipfw1 .
|
|
|
|
We list them in order of the potential impact that they can
|
|
|
|
have in writing your rulesets.
|
|
|
|
You might want to consider using these features in order to
|
|
|
|
write your rulesets in a more efficient way.
|
|
|
|
.Bl -tag -width indent
|
2003-07-08 08:07:03 +00:00
|
|
|
.It Syntax and flags
|
|
|
|
.Nm ipfw1
|
|
|
|
does not support the -n flag (only test syntax),
|
|
|
|
nor it allows spaces after commas or supports all
|
|
|
|
rule fields in a single argument.
|
2002-08-19 04:52:15 +00:00
|
|
|
.It Handling of non-IPv4 packets
|
|
|
|
.Nm ipfw1
|
|
|
|
will silently accept all non-IPv4 packets (which
|
|
|
|
.Nm ipfw1
|
|
|
|
will only see when
|
|
|
|
.Em net.link.ether.bridge_ipfw=1 Ns
|
|
|
|
).
|
|
|
|
.Nm ipfw2
|
|
|
|
will filter all packets (including non-IPv4 ones) according to the ruleset.
|
|
|
|
To achieve the same behaviour as
|
|
|
|
.Nm ipfw1
|
|
|
|
you can use the following as the very first rule in your ruleset:
|
|
|
|
.Pp
|
2002-08-19 12:36:54 +00:00
|
|
|
.Dl "ipfw add 1 allow layer2 not mac-type ip"
|
2002-08-19 04:52:15 +00:00
|
|
|
.Pp
|
2002-08-19 12:36:54 +00:00
|
|
|
The
|
|
|
|
.Cm layer2
|
2002-10-28 07:03:56 +00:00
|
|
|
option might seem redundant, but it is necessary -- packets
|
2002-08-19 12:36:54 +00:00
|
|
|
passed to the firewall from layer3 will not have a MAC header,
|
|
|
|
so the
|
|
|
|
.Cm mac-type ip
|
|
|
|
pattern will always fail on them, and the
|
|
|
|
.Cm not
|
|
|
|
operator will make this rule into a pass-all.
|
2003-07-08 08:07:03 +00:00
|
|
|
.It Addresses
|
2002-08-16 10:31:47 +00:00
|
|
|
.Nm ipfw1
|
2003-07-08 08:07:03 +00:00
|
|
|
does not supports address sets or lists of addresses.
|
2002-08-16 14:27:22 +00:00
|
|
|
.Pp
|
2002-08-16 10:31:47 +00:00
|
|
|
.It Port specifications
|
|
|
|
.Nm ipfw1
|
|
|
|
only allows one port range when specifying TCP and UDP ports, and
|
|
|
|
is limited to 10 entries instead of the 15 allowed by
|
|
|
|
.Nm ipfw2 .
|
|
|
|
Also, in
|
|
|
|
.Nm ipfw1
|
|
|
|
you can only specify ports when the rule is requesting
|
|
|
|
.Cm tcp
|
|
|
|
or
|
|
|
|
.Cm udp
|
|
|
|
packets. With
|
|
|
|
.Nm ipfw2
|
|
|
|
you can put port specifications in rules matching all packets,
|
|
|
|
and the match will be attempted only on those packets carrying
|
|
|
|
protocols which include port identifiers.
|
2002-08-16 14:27:22 +00:00
|
|
|
.Pp
|
|
|
|
Finally,
|
|
|
|
.Nm ipfw1
|
|
|
|
allowed the first port entry to be specified as
|
|
|
|
.Ar port:mask
|
|
|
|
where
|
|
|
|
.Ar mask
|
|
|
|
can be an arbitrary 16-bit mask.
|
|
|
|
This syntax is of questionable usefulness and it is not
|
|
|
|
supported anymore in
|
|
|
|
.Nm ipfw2 .
|
2002-08-16 10:31:47 +00:00
|
|
|
.It Or-blocks
|
|
|
|
.Nm ipfw1
|
2002-08-16 14:27:22 +00:00
|
|
|
does not support Or-blocks.
|
2002-08-16 10:31:47 +00:00
|
|
|
.It keepalives
|
|
|
|
.Nm ipfw1
|
|
|
|
does not generate keepalives for stateful sessions.
|
|
|
|
As a consequence, it might cause idle sessions to drop because
|
|
|
|
the lifetime of the dynamic rules expires.
|
|
|
|
.It Sets of rules
|
|
|
|
.Nm ipfw1
|
|
|
|
does not implement sets of rules.
|
|
|
|
.It MAC header filtering and Layer-2 firewalling.
|
|
|
|
.Nm ipfw1
|
2002-10-28 07:03:56 +00:00
|
|
|
does not implement filtering on MAC header fields, nor is it
|
2002-08-16 10:31:47 +00:00
|
|
|
invoked on packets from
|
|
|
|
.Cm ether_demux()
|
|
|
|
and
|
|
|
|
.Cm ether_output_frame().
|
|
|
|
The sysctl variable
|
|
|
|
.Em net.link.ether.ipfw
|
|
|
|
has no effect there.
|
2002-08-16 14:27:22 +00:00
|
|
|
.It Options
|
2003-06-22 17:33:19 +00:00
|
|
|
In
|
|
|
|
.Nm ipfw1 ,
|
|
|
|
the following options only accept a single value as an argument:
|
|
|
|
.Pp
|
|
|
|
.Cm ipid, iplen, ipttl
|
|
|
|
.Pp
|
|
|
|
The following options are not implemented by
|
|
|
|
.Nm ipfw1 :
|
2002-08-19 12:36:54 +00:00
|
|
|
.Pp
|
|
|
|
.Cm dst-ip, dst-port, layer2, mac, mac-type, src-ip, src-port.
|
|
|
|
.Pp
|
2003-06-22 17:33:19 +00:00
|
|
|
Additionally, the RELENG_4 version of
|
2002-08-19 12:36:54 +00:00
|
|
|
.Nm ipfw1
|
2003-06-22 17:33:19 +00:00
|
|
|
does not implement the following options:
|
2002-08-16 14:27:22 +00:00
|
|
|
.Pp
|
2002-08-19 12:36:54 +00:00
|
|
|
.Cm ipid, iplen, ipprecedence, iptos, ipttl,
|
2002-10-28 07:03:56 +00:00
|
|
|
.Cm ipversion, tcpack, tcpseq, tcpwin .
|
2002-08-16 14:27:22 +00:00
|
|
|
.It Dummynet options
|
|
|
|
The following option for
|
|
|
|
.Nm dummynet
|
|
|
|
pipes/queues is not supported:
|
|
|
|
.Cm noerror .
|
2002-08-16 10:31:47 +00:00
|
|
|
.El
|
1994-11-17 09:50:30 +00:00
|
|
|
.Sh EXAMPLES
|
2002-08-16 10:31:47 +00:00
|
|
|
There are far too many possible uses of
|
|
|
|
.Nm
|
|
|
|
so this Section will only give a small set of examples.
|
|
|
|
.Pp
|
|
|
|
.Ss BASIC PACKET FILTERING
|
1995-10-26 05:36:24 +00:00
|
|
|
This command adds an entry which denies all tcp packets from
|
1998-04-08 12:00:48 +00:00
|
|
|
.Em cracker.evil.org
|
1995-10-26 05:36:24 +00:00
|
|
|
to the telnet port of
|
|
|
|
.Em wolf.tambov.su
|
|
|
|
from being forwarded by the host:
|
|
|
|
.Pp
|
2000-02-28 15:21:12 +00:00
|
|
|
.Dl "ipfw add deny tcp from cracker.evil.org to wolf.tambov.su telnet"
|
|
|
|
.Pp
|
2002-10-28 07:03:56 +00:00
|
|
|
This one disallows any connection from the entire cracker's
|
2000-02-28 15:21:12 +00:00
|
|
|
network to my host:
|
1995-10-26 05:36:24 +00:00
|
|
|
.Pp
|
2000-02-28 15:21:12 +00:00
|
|
|
.Dl "ipfw add deny ip from 123.45.67.0/24 to my.host.org"
|
1995-10-26 05:36:24 +00:00
|
|
|
.Pp
|
2000-02-10 14:25:26 +00:00
|
|
|
A first and efficient way to limit access (not using dynamic rules)
|
2000-02-28 15:21:12 +00:00
|
|
|
is the use of the following rules:
|
2000-02-10 14:25:26 +00:00
|
|
|
.Pp
|
|
|
|
.Dl "ipfw add allow tcp from any to any established"
|
|
|
|
.Dl "ipfw add allow tcp from net1 portlist1 to net2 portlist2 setup"
|
|
|
|
.Dl "ipfw add allow tcp from net3 portlist3 to net3 portlist3 setup"
|
|
|
|
.Dl "..."
|
|
|
|
.Dl "ipfw add deny tcp from any to any"
|
|
|
|
.Pp
|
2000-02-28 15:21:12 +00:00
|
|
|
The first rule will be a quick match for normal TCP packets,
|
|
|
|
but it will not match the initial SYN packet, which will be
|
2000-02-10 14:25:26 +00:00
|
|
|
matched by the
|
2000-02-28 15:21:12 +00:00
|
|
|
.Cm setup
|
2000-02-10 14:25:26 +00:00
|
|
|
rules only for selected source/destination pairs.
|
|
|
|
All other SYN packets will be rejected by the final
|
2000-02-28 15:21:12 +00:00
|
|
|
.Cm deny
|
2000-02-10 14:25:26 +00:00
|
|
|
rule.
|
|
|
|
.Pp
|
2002-08-16 10:31:47 +00:00
|
|
|
If you administer one or more subnets, you can take advantage of the
|
|
|
|
.Nm ipfw2
|
|
|
|
syntax to specify address sets and or-blocks and write extremely
|
|
|
|
compact rulesets which selectively enable services to blocks
|
|
|
|
of clients, as below:
|
|
|
|
.Pp
|
|
|
|
.Dl "goodguys=\*q{ 10.1.2.0/24{20,35,66,18} or 10.2.3.0/28{6,3,11} }\*q"
|
|
|
|
.Dl "badguys=\*q10.1.2.0/24{8,38,60}\*q"
|
|
|
|
.Dl ""
|
|
|
|
.Dl "ipfw add allow ip from ${goodguys} to any"
|
|
|
|
.Dl "ipfw add deny ip from ${badguys} to any"
|
|
|
|
.Dl "... normal policies ..."
|
|
|
|
.Pp
|
|
|
|
The
|
|
|
|
.Nm ipfw1
|
|
|
|
syntax would require a separate rule for each IP in the above
|
|
|
|
example.
|
2003-03-15 01:13:00 +00:00
|
|
|
.Pp
|
|
|
|
The
|
|
|
|
.Cm verrevpath
|
|
|
|
option could be used to do automated anti-spoofing by adding the
|
|
|
|
following to the top of a ruleset:
|
|
|
|
.Pp
|
|
|
|
.Dl "ipfw add deny ip from any to any not verrevpath in"
|
|
|
|
.Pp
|
|
|
|
This rule drops all incoming packets that appear to be coming to the
|
|
|
|
sytem on the wrong interface. For example, a packet with a source
|
|
|
|
address belonging to a host on a protected internal network would be
|
|
|
|
dropped if it tried to enter the system from an external interface.
|
2002-08-16 10:31:47 +00:00
|
|
|
.Ss DYNAMIC RULES
|
2000-02-10 14:25:26 +00:00
|
|
|
In order to protect a site from flood attacks involving fake
|
|
|
|
TCP packets, it is safer to use dynamic rules:
|
|
|
|
.Pp
|
|
|
|
.Dl "ipfw add check-state"
|
|
|
|
.Dl "ipfw add deny tcp from any to any established"
|
|
|
|
.Dl "ipfw add allow tcp from my-net to any setup keep-state"
|
|
|
|
.Pp
|
|
|
|
This will let the firewall install dynamic rules only for
|
2000-02-28 15:21:12 +00:00
|
|
|
those connection which start with a regular SYN packet coming
|
|
|
|
from the inside of our network.
|
|
|
|
Dynamic rules are checked when encountering the first
|
|
|
|
.Cm check-state
|
2000-02-10 14:25:26 +00:00
|
|
|
or
|
2000-02-28 15:21:12 +00:00
|
|
|
.Cm keep-state
|
|
|
|
rule.
|
|
|
|
A
|
|
|
|
.Cm check-state
|
2002-10-28 07:03:56 +00:00
|
|
|
rule should usually be placed near the beginning of the
|
2000-02-28 15:21:12 +00:00
|
|
|
ruleset to minimize the amount of work scanning the ruleset.
|
|
|
|
Your mileage may vary.
|
|
|
|
.Pp
|
2001-09-27 23:44:27 +00:00
|
|
|
To limit the number of connections a user can open
|
|
|
|
you can use the following type of rules:
|
|
|
|
.Pp
|
|
|
|
.Dl "ipfw add allow tcp from my-net/24 to any setup limit src-addr 10"
|
|
|
|
.Dl "ipfw add allow tcp from any to me setup limit src-addr 4"
|
|
|
|
.Pp
|
|
|
|
The former (assuming it runs on a gateway) will allow each host
|
2001-10-01 14:13:36 +00:00
|
|
|
on a /24 network to open at most 10 TCP connections.
|
2001-09-27 23:44:27 +00:00
|
|
|
The latter can be placed on a server to make sure that a single
|
|
|
|
client does not use more than 4 simultaneous connections.
|
|
|
|
.Pp
|
2000-02-28 15:21:12 +00:00
|
|
|
.Em BEWARE :
|
2000-02-10 14:25:26 +00:00
|
|
|
stateful rules can be subject to denial-of-service attacks
|
|
|
|
by a SYN-flood which opens a huge number of dynamic rules.
|
2000-02-28 15:21:12 +00:00
|
|
|
The effects of such attacks can be partially limited by
|
|
|
|
acting on a set of
|
|
|
|
.Xr sysctl 8
|
2000-02-10 14:25:26 +00:00
|
|
|
variables which control the operation of the firewall.
|
|
|
|
.Pp
|
1999-04-28 02:49:29 +00:00
|
|
|
Here is a good usage of the
|
2000-02-28 15:21:12 +00:00
|
|
|
.Cm list
|
|
|
|
command to see accounting records and timestamp information:
|
1995-10-26 05:36:24 +00:00
|
|
|
.Pp
|
2000-02-28 15:21:12 +00:00
|
|
|
.Dl ipfw -at list
|
1995-10-26 05:36:24 +00:00
|
|
|
.Pp
|
1997-05-15 00:51:08 +00:00
|
|
|
or in short form without timestamps:
|
1995-10-26 05:36:24 +00:00
|
|
|
.Pp
|
2000-02-28 15:21:12 +00:00
|
|
|
.Dl ipfw -a list
|
1995-10-26 05:36:24 +00:00
|
|
|
.Pp
|
2002-01-02 20:16:15 +00:00
|
|
|
which is equivalent to:
|
|
|
|
.Pp
|
|
|
|
.Dl ipfw show
|
|
|
|
.Pp
|
2000-02-28 15:21:12 +00:00
|
|
|
Next rule diverts all incoming packets from 192.168.2.0/24
|
|
|
|
to divert port 5000:
|
1996-07-10 19:44:30 +00:00
|
|
|
.Pp
|
2000-02-28 15:21:12 +00:00
|
|
|
.Dl ipfw divert 5000 ip from 192.168.2.0/24 to any in
|
2000-01-08 11:19:19 +00:00
|
|
|
.Pp
|
2002-08-16 10:31:47 +00:00
|
|
|
.Ss TRAFFIC SHAPING
|
2000-02-28 15:21:12 +00:00
|
|
|
The following rules show some of the applications of
|
|
|
|
.Nm
|
|
|
|
and
|
|
|
|
.Xr dummynet 4
|
|
|
|
for simulations and the like.
|
2000-01-08 11:19:19 +00:00
|
|
|
.Pp
|
2000-02-28 15:21:12 +00:00
|
|
|
This rule drops random incoming packets with a probability
|
|
|
|
of 5%:
|
2000-01-08 11:19:19 +00:00
|
|
|
.Pp
|
|
|
|
.Dl "ipfw add prob 0.05 deny ip from any to any in"
|
|
|
|
.Pp
|
|
|
|
A similar effect can be achieved making use of dummynet pipes:
|
|
|
|
.Pp
|
|
|
|
.Dl "ipfw add pipe 10 ip from any to any"
|
|
|
|
.Dl "ipfw pipe 10 config plr 0.05"
|
|
|
|
.Pp
|
2000-02-28 15:21:12 +00:00
|
|
|
We can use pipes to artificially limit bandwidth, e.g. on a
|
|
|
|
machine acting as a router, if we want to limit traffic from
|
|
|
|
local clients on 192.168.2.0/24 we do:
|
2000-01-08 11:19:19 +00:00
|
|
|
.Pp
|
|
|
|
.Dl "ipfw add pipe 1 ip from 192.168.2.0/24 to any out"
|
|
|
|
.Dl "ipfw pipe 1 config bw 300Kbit/s queue 50KBytes"
|
|
|
|
.Pp
|
|
|
|
note that we use the
|
2000-02-28 15:21:12 +00:00
|
|
|
.Cm out
|
|
|
|
modifier so that the rule is not used twice.
|
|
|
|
Remember in fact that
|
|
|
|
.Nm
|
|
|
|
rules are checked both on incoming and outgoing packets.
|
2000-01-08 11:19:19 +00:00
|
|
|
.Pp
|
2002-10-28 07:03:56 +00:00
|
|
|
Should we want to simulate a bidirectional link with bandwidth
|
2000-01-08 11:19:19 +00:00
|
|
|
limitations, the correct way is the following:
|
|
|
|
.Pp
|
|
|
|
.Dl "ipfw add pipe 1 ip from any to any out"
|
|
|
|
.Dl "ipfw add pipe 2 ip from any to any in"
|
|
|
|
.Dl "ipfw pipe 1 config bw 64Kbit/s queue 10Kbytes"
|
|
|
|
.Dl "ipfw pipe 2 config bw 64Kbit/s queue 10Kbytes"
|
|
|
|
.Pp
|
2000-02-28 15:21:12 +00:00
|
|
|
The above can be very useful, e.g. if you want to see how
|
2002-10-28 07:03:56 +00:00
|
|
|
your fancy Web page will look for a residential user who
|
2000-02-28 15:21:12 +00:00
|
|
|
is connected only through a slow link.
|
|
|
|
You should not use only one pipe for both directions, unless
|
|
|
|
you want to simulate a half-duplex medium (e.g. AppleTalk,
|
|
|
|
Ethernet, IRDA).
|
2000-01-08 11:19:19 +00:00
|
|
|
It is not necessary that both pipes have the same configuration,
|
|
|
|
so we can also simulate asymmetric links.
|
|
|
|
.Pp
|
2002-10-28 07:03:56 +00:00
|
|
|
Should we want to verify network performance with the RED queue
|
2000-06-12 09:43:00 +00:00
|
|
|
management algorithm:
|
2000-06-08 13:38:57 +00:00
|
|
|
.Pp
|
|
|
|
.Dl "ipfw add pipe 1 ip from any to any"
|
|
|
|
.Dl "ipfw pipe 1 config bw 500Kbit/s queue 100 red 0.002/30/80/0.1"
|
|
|
|
.Pp
|
2000-02-28 15:21:12 +00:00
|
|
|
Another typical application of the traffic shaper is to
|
|
|
|
introduce some delay in the communication.
|
2002-10-28 07:03:56 +00:00
|
|
|
This can significantly affect applications which do a lot of Remote
|
2000-02-28 15:21:12 +00:00
|
|
|
Procedure Calls, and where the round-trip-time of the
|
|
|
|
connection often becomes a limiting factor much more than
|
|
|
|
bandwidth:
|
2000-01-08 11:19:19 +00:00
|
|
|
.Pp
|
|
|
|
.Dl "ipfw add pipe 1 ip from any to any out"
|
|
|
|
.Dl "ipfw add pipe 2 ip from any to any in"
|
|
|
|
.Dl "ipfw pipe 1 config delay 250ms bw 1Mbit/s"
|
|
|
|
.Dl "ipfw pipe 2 config delay 250ms bw 1Mbit/s"
|
|
|
|
.Pp
|
2000-02-28 15:21:12 +00:00
|
|
|
Per-flow queueing can be useful for a variety of purposes.
|
|
|
|
A very simple one is counting traffic:
|
2000-01-08 11:19:19 +00:00
|
|
|
.Pp
|
|
|
|
.Dl "ipfw add pipe 1 tcp from any to any"
|
|
|
|
.Dl "ipfw add pipe 1 udp from any to any"
|
|
|
|
.Dl "ipfw add pipe 1 ip from any to any"
|
|
|
|
.Dl "ipfw pipe 1 config mask all"
|
|
|
|
.Pp
|
2000-02-28 15:21:12 +00:00
|
|
|
The above set of rules will create queues (and collect
|
|
|
|
statistics) for all traffic.
|
|
|
|
Because the pipes have no limitations, the only effect is
|
|
|
|
collecting statistics.
|
|
|
|
Note that we need 3 rules, not just the last one, because
|
|
|
|
when
|
|
|
|
.Nm
|
|
|
|
tries to match IP packets it will not consider ports, so we
|
|
|
|
would not see connections on separate ports as different
|
|
|
|
ones.
|
2000-01-08 11:19:19 +00:00
|
|
|
.Pp
|
2000-02-28 15:21:12 +00:00
|
|
|
A more sophisticated example is limiting the outbound traffic
|
|
|
|
on a net with per-host limits, rather than per-network limits:
|
2000-01-08 11:19:19 +00:00
|
|
|
.Pp
|
|
|
|
.Dl "ipfw add pipe 1 ip from 192.168.2.0/24 to any out"
|
|
|
|
.Dl "ipfw add pipe 2 ip from any to 192.168.2.0/24 in"
|
|
|
|
.Dl "ipfw pipe 1 config mask src-ip 0x000000ff bw 200Kbit/s queue 20Kbytes"
|
|
|
|
.Dl "ipfw pipe 2 config mask dst-ip 0x000000ff bw 200Kbit/s queue 20Kbytes"
|
2002-08-16 10:31:47 +00:00
|
|
|
.Ss SETS OF RULES
|
|
|
|
To add a set of rules atomically, e.g. set 18:
|
|
|
|
.Pp
|
2003-06-23 07:48:32 +00:00
|
|
|
.Dl "ipfw set disable 18"
|
2002-08-16 10:31:47 +00:00
|
|
|
.Dl "ipfw add NN set 18 ... # repeat as needed"
|
2003-06-23 07:48:32 +00:00
|
|
|
.Dl "ipfw set enable 18"
|
2002-08-16 10:31:47 +00:00
|
|
|
.Pp
|
|
|
|
To delete a set of rules atomically the command is simply:
|
|
|
|
.Pp
|
|
|
|
.Dl "ipfw delete set 18"
|
|
|
|
.Pp
|
|
|
|
To test a ruleset and disable it and regain control if something goes wrong:
|
|
|
|
.Pp
|
2003-06-23 07:48:32 +00:00
|
|
|
.Dl "ipfw set disable 18"
|
2002-08-16 10:31:47 +00:00
|
|
|
.Dl "ipfw add NN set 18 ... # repeat as needed"
|
2003-06-23 07:48:32 +00:00
|
|
|
.Dl "ipfw set enable 18; echo done; sleep 30 && ipfw set disable 18"
|
2002-08-16 10:31:47 +00:00
|
|
|
.Pp
|
|
|
|
Here if everything goes well, you press control-C before the "sleep"
|
|
|
|
terminates, and your ruleset will be left active. Otherwise, e.g. if
|
|
|
|
you cannot access your box, the ruleset will be disabled after
|
|
|
|
the sleep terminates thus restoring the previous situation.
|
1994-11-17 09:50:30 +00:00
|
|
|
.Sh SEE ALSO
|
1998-11-23 10:54:28 +00:00
|
|
|
.Xr cpp 1 ,
|
|
|
|
.Xr m4 1 ,
|
2000-02-28 15:21:12 +00:00
|
|
|
.Xr bridge 4 ,
|
1997-09-29 19:11:55 +00:00
|
|
|
.Xr divert 4 ,
|
1999-08-11 15:36:13 +00:00
|
|
|
.Xr dummynet 4 ,
|
1995-10-26 05:36:24 +00:00
|
|
|
.Xr ip 4 ,
|
1997-06-23 22:32:13 +00:00
|
|
|
.Xr ipfirewall 4 ,
|
1996-08-05 02:38:51 +00:00
|
|
|
.Xr protocols 5 ,
|
|
|
|
.Xr services 5 ,
|
1998-12-16 17:10:03 +00:00
|
|
|
.Xr init 8 ,
|
1999-04-08 13:56:25 +00:00
|
|
|
.Xr kldload 8 ,
|
1995-10-26 05:36:24 +00:00
|
|
|
.Xr reboot 8 ,
|
1997-09-29 19:11:55 +00:00
|
|
|
.Xr sysctl 8 ,
|
2000-11-15 16:44:24 +00:00
|
|
|
.Xr syslogd 8
|
1994-11-17 09:50:30 +00:00
|
|
|
.Sh BUGS
|
2002-08-16 14:27:22 +00:00
|
|
|
The syntax has grown over the years and sometimes it might be confusing.
|
|
|
|
Unfortunately, backward compatibility prevents cleaning up mistakes
|
2002-10-28 07:03:56 +00:00
|
|
|
made in the definition of the syntax.
|
2000-01-08 11:19:19 +00:00
|
|
|
.Pp
|
2002-08-16 14:27:22 +00:00
|
|
|
.Em !!! WARNING !!!
|
1995-10-26 05:36:24 +00:00
|
|
|
.Pp
|
2002-08-10 15:04:40 +00:00
|
|
|
Misconfiguring the firewall can put your computer in an unusable state,
|
|
|
|
possibly shutting down network services and requiring console access to
|
2002-10-28 07:03:56 +00:00
|
|
|
regain control of it.
|
1997-06-02 05:02:37 +00:00
|
|
|
.Pp
|
|
|
|
Incoming packet fragments diverted by
|
2000-02-28 15:21:12 +00:00
|
|
|
.Cm divert
|
1999-12-06 01:00:24 +00:00
|
|
|
or
|
2000-02-28 15:21:12 +00:00
|
|
|
.Cm tee
|
1999-12-06 01:00:24 +00:00
|
|
|
are reassembled before delivery to the socket.
|
2002-08-10 15:04:40 +00:00
|
|
|
The action used on those packet is the one from the
|
|
|
|
rule which matches the first fragment of the packet.
|
1997-06-23 22:32:13 +00:00
|
|
|
.Pp
|
1999-12-06 01:00:24 +00:00
|
|
|
Packets that match a
|
2000-02-28 15:21:12 +00:00
|
|
|
.Cm tee
|
1999-12-06 01:00:24 +00:00
|
|
|
rule should not be immediately accepted, but should continue
|
2000-02-28 15:21:12 +00:00
|
|
|
going through the rule list.
|
|
|
|
This may be fixed in a later version.
|
2002-01-03 01:00:23 +00:00
|
|
|
.Pp
|
|
|
|
Packets diverted to userland, and then reinserted by a userland process
|
2003-07-08 13:24:42 +00:00
|
|
|
may lose various packet attributes.
|
|
|
|
The packet source interface name
|
|
|
|
will be preserved if it is shorter than 8 bytes and the userland process
|
|
|
|
saves and reuses the sockaddr_in
|
|
|
|
(as does
|
|
|
|
.Xr natd 8 ) ;
|
|
|
|
otherwise, it may be lost.
|
2002-01-03 01:00:23 +00:00
|
|
|
If a packet is reinserted in this manner, later rules may be incorrectly
|
|
|
|
applied, making the order of
|
|
|
|
.Cm divert
|
|
|
|
rules in the rule sequence very important.
|
1996-08-13 19:43:24 +00:00
|
|
|
.Sh AUTHORS
|
1998-03-19 07:46:04 +00:00
|
|
|
.An Ugen J. S. Antsilevich ,
|
|
|
|
.An Poul-Henning Kamp ,
|
|
|
|
.An Alex Nash ,
|
2000-01-08 11:19:19 +00:00
|
|
|
.An Archie Cobbs ,
|
|
|
|
.An Luigi Rizzo .
|
|
|
|
.Pp
|
2000-11-22 09:35:58 +00:00
|
|
|
.An -nosplit
|
1998-03-19 07:46:04 +00:00
|
|
|
API based upon code written by
|
2000-11-22 09:35:58 +00:00
|
|
|
.An Daniel Boulet
|
1998-03-19 07:46:04 +00:00
|
|
|
for BSDI.
|
2000-01-08 11:19:19 +00:00
|
|
|
.Pp
|
2000-02-28 15:21:12 +00:00
|
|
|
Work on
|
|
|
|
.Xr dummynet 4
|
|
|
|
traffic shaper supported by Akamba Corp.
|
1994-11-17 09:50:30 +00:00
|
|
|
.Sh HISTORY
|
2000-02-28 15:21:12 +00:00
|
|
|
The
|
|
|
|
.Nm
|
|
|
|
utility first appeared in
|
1996-08-23 00:57:08 +00:00
|
|
|
.Fx 2.0 .
|
2000-02-28 15:21:12 +00:00
|
|
|
.Xr dummynet 4
|
2000-01-08 11:19:19 +00:00
|
|
|
was introduced in
|
2000-02-10 14:25:26 +00:00
|
|
|
.Fx 2.2.8 .
|
|
|
|
Stateful extensions were introduced in
|
2000-02-28 15:21:12 +00:00
|
|
|
.Fx 4.0 .
|
2002-08-16 14:27:22 +00:00
|
|
|
.Nm ipfw2
|
|
|
|
was introduced in Summer 2002.
|