2000-01-29 13:54:44 +00:00
|
|
|
.\"
|
|
|
|
.\" $FreeBSD$
|
|
|
|
.\"
|
2000-05-04 17:34:31 +00:00
|
|
|
.Dd March 13, 2000
|
|
|
|
.Dt IP6FW 8
|
2000-01-29 13:54:44 +00:00
|
|
|
.Os FreeBSD
|
|
|
|
.Sh NAME
|
|
|
|
.Nm ip6fw
|
|
|
|
.Nd controlling utility for IPv6 firewall
|
|
|
|
.Sh SYNOPSIS
|
|
|
|
.Nm
|
|
|
|
.Ar file
|
2000-11-20 16:52:27 +00:00
|
|
|
.Nm
|
2000-05-04 17:34:31 +00:00
|
|
|
.Op Fl f | Fl q
|
2000-01-29 13:54:44 +00:00
|
|
|
flush
|
2000-11-20 16:52:27 +00:00
|
|
|
.Nm
|
2000-05-04 17:34:31 +00:00
|
|
|
.Op Fl q
|
2000-01-29 13:54:44 +00:00
|
|
|
zero
|
|
|
|
.Op Ar number ...
|
2000-11-20 16:52:27 +00:00
|
|
|
.Nm
|
2000-01-29 13:54:44 +00:00
|
|
|
delete
|
|
|
|
.Ar number ...
|
2000-11-20 16:52:27 +00:00
|
|
|
.Nm
|
2000-01-29 13:54:44 +00:00
|
|
|
.Op Fl aftN
|
|
|
|
list
|
|
|
|
.Op Ar number ...
|
2000-11-20 16:52:27 +00:00
|
|
|
.Nm
|
2000-05-04 17:34:31 +00:00
|
|
|
.Op Fl ftN
|
2000-01-29 13:54:44 +00:00
|
|
|
show
|
|
|
|
.Op Ar number ...
|
2000-11-20 16:52:27 +00:00
|
|
|
.Nm
|
2000-05-04 17:34:31 +00:00
|
|
|
.Op Fl q
|
2000-01-29 13:54:44 +00:00
|
|
|
add
|
|
|
|
.Op Ar number
|
|
|
|
.Ar action
|
|
|
|
.Op log
|
|
|
|
.Ar proto
|
|
|
|
from
|
|
|
|
.Ar src
|
|
|
|
to
|
|
|
|
.Ar dst
|
|
|
|
.Op via Ar name | ipv6no
|
|
|
|
.Op Ar options
|
|
|
|
.Sh DESCRIPTION
|
|
|
|
If used as shown in the first synopsis line, the
|
|
|
|
.Ar file
|
|
|
|
will be read line by line and applied as arguments to the
|
|
|
|
.Nm
|
|
|
|
command.
|
|
|
|
.Pp
|
|
|
|
The
|
|
|
|
.Nm
|
|
|
|
code works by going through the rule-list for each packet,
|
|
|
|
until a match is found.
|
|
|
|
All rules have two associated counters, a packet count and
|
|
|
|
a byte count.
|
|
|
|
These counters are updated when a packet matches the rule.
|
|
|
|
.Pp
|
2000-05-04 17:34:31 +00:00
|
|
|
The rules are ordered by a
|
|
|
|
.Dq line-number
|
|
|
|
from 1 to 65534 that is used
|
2000-03-01 11:27:47 +00:00
|
|
|
to order and delete rules.
|
|
|
|
Rules are tried in increasing order, and the
|
2000-01-29 13:54:44 +00:00
|
|
|
first rule that matches a packet applies.
|
|
|
|
Multiple rules may share the same number and apply in
|
|
|
|
the order in which they were added.
|
|
|
|
.Pp
|
|
|
|
If a rule is added without a number, it is numbered 100 higher
|
2000-03-01 11:27:47 +00:00
|
|
|
than the previous rule.
|
|
|
|
If the highest defined rule number is
|
2000-01-29 13:54:44 +00:00
|
|
|
greater than 65434, new rules are appended to the last rule.
|
|
|
|
.Pp
|
|
|
|
The delete operation deletes the first rule with number
|
|
|
|
.Ar number ,
|
|
|
|
if any.
|
|
|
|
.Pp
|
|
|
|
The list command prints out the current rule set.
|
|
|
|
.Pp
|
|
|
|
The show command is equivalent to `ip6fw -a list'.
|
|
|
|
.Pp
|
|
|
|
The zero operation zeroes the counters associated with rule number
|
|
|
|
.Ar number .
|
|
|
|
.Pp
|
|
|
|
The flush operation removes all rules.
|
|
|
|
.Pp
|
2000-05-04 17:34:31 +00:00
|
|
|
Any command beginning with a
|
|
|
|
.Sq # ,
|
|
|
|
or being all blank, is ignored.
|
2000-01-29 13:54:44 +00:00
|
|
|
.Pp
|
|
|
|
One rule is always present:
|
|
|
|
.Bd -literal -offset center
|
|
|
|
65535 deny all from any to any
|
|
|
|
.Ed
|
|
|
|
.Pp
|
|
|
|
This rule is the default policy, i.e., don't allow anything at all.
|
|
|
|
Your job in setting up rules is to modify this policy to match your
|
|
|
|
needs.
|
|
|
|
.Pp
|
|
|
|
The following options are available:
|
|
|
|
.Bl -tag -width flag
|
|
|
|
.It Fl a
|
2000-05-04 17:34:31 +00:00
|
|
|
While listing, show counter values. See also
|
|
|
|
.Dq show
|
|
|
|
command.
|
2000-01-29 13:54:44 +00:00
|
|
|
.It Fl f
|
|
|
|
Don't ask for confirmation for commands that can cause problems if misused
|
|
|
|
(ie; flush).
|
|
|
|
.Ar Note ,
|
|
|
|
if there is no tty associated with the process, this is implied.
|
|
|
|
.It Fl q
|
|
|
|
While adding, zeroing or flushing, be quiet about actions (implies '-f').
|
|
|
|
This is useful for adjusting rules by executing multiple ip6fw commands in a
|
|
|
|
script (e.g. sh /etc/rc.firewall), or by processing a file of many ip6fw rules,
|
|
|
|
across a remote login session. If a flush is performed in normal
|
|
|
|
(verbose) mode, it prints a message. Because all rules are flushed, the
|
|
|
|
message cannot be delivered to the login session, the login session is
|
|
|
|
closed and the remainder of the ruleset is not processed. Access to the
|
|
|
|
console is required to recover.
|
|
|
|
.It Fl t
|
|
|
|
While listing, show last match timestamp.
|
|
|
|
.It Fl N
|
|
|
|
Try to resolve addresses and service names in output.
|
|
|
|
.El
|
|
|
|
.Pp
|
|
|
|
.Ar action :
|
|
|
|
.Bl -hang -offset flag -width 1234567890123456
|
|
|
|
.It Ar allow
|
|
|
|
Allow packets that match rule.
|
2000-03-01 11:27:47 +00:00
|
|
|
The search terminates.
|
|
|
|
Aliases are
|
2000-01-29 13:54:44 +00:00
|
|
|
.Ar pass ,
|
|
|
|
.Ar permit ,
|
|
|
|
and
|
|
|
|
.Ar accept .
|
|
|
|
.It Ar deny
|
|
|
|
Discard packets that match this rule.
|
|
|
|
The search terminates.
|
|
|
|
.Ar Drop
|
|
|
|
is an alias for
|
|
|
|
.Ar deny .
|
|
|
|
.It Ar reject
|
|
|
|
(Deprecated.) Discard packets that match this rule, and try to send an ICMPv6
|
|
|
|
host unreachable notice.
|
|
|
|
The search terminates.
|
|
|
|
.It Ar unreach code
|
|
|
|
Discard packets that match this rule, and try to send an ICMPv6
|
|
|
|
unreachable notice with code
|
|
|
|
.Ar code ,
|
|
|
|
where
|
|
|
|
.Ar code
|
|
|
|
is a number from zero to 255, or one of these aliases:
|
|
|
|
.Ar noroute ,
|
|
|
|
.Ar admin ,
|
|
|
|
.Ar notneighbor ,
|
|
|
|
.Ar addr ,
|
|
|
|
or
|
|
|
|
.Ar noport ,
|
|
|
|
The search terminates.
|
|
|
|
.It Ar reset
|
2000-03-01 11:27:47 +00:00
|
|
|
TCP packets only.
|
|
|
|
Discard packets that match this rule,
|
2000-01-29 13:54:44 +00:00
|
|
|
and try to send a TCP reset (RST) notice.
|
|
|
|
The search terminates
|
2000-05-04 17:34:31 +00:00
|
|
|
.Em (not working yet) .
|
2000-01-29 13:54:44 +00:00
|
|
|
.It Ar count
|
|
|
|
Update counters for all packets that match rule.
|
|
|
|
The search continues with the next rule.
|
|
|
|
.It Ar skipto number
|
|
|
|
Skip all subsequent rules numbered less than
|
|
|
|
.Ar number .
|
|
|
|
The search continues with the first rule numbered
|
|
|
|
.Ar number
|
|
|
|
or higher.
|
|
|
|
.El
|
|
|
|
.Pp
|
|
|
|
If the kernel was compiled with
|
|
|
|
.Dv IP6FIREWALL_VERBOSE ,
|
2000-05-04 17:34:31 +00:00
|
|
|
then when a packet matches a rule with the
|
|
|
|
.Dq log
|
2000-01-29 13:54:44 +00:00
|
|
|
keyword a message will be printed on the console.
|
|
|
|
If the kernel was compiled with the
|
|
|
|
.Dv IP6FIREWALL_VERBOSE_LIMIT
|
|
|
|
option, then logging will cease after the number of packets
|
|
|
|
specified by the option are received for that particular
|
|
|
|
chain entry. Logging may then be re-enabled by clearing
|
|
|
|
the packet counter for that entry.
|
|
|
|
.Pp
|
|
|
|
Console logging and the log limit are adjustable dynamically
|
|
|
|
through the
|
|
|
|
.Xr sysctl 8
|
|
|
|
interface.
|
|
|
|
.Pp
|
|
|
|
.Ar proto :
|
|
|
|
.Bl -hang -offset flag -width 1234567890123456
|
|
|
|
.It Ar ipv6
|
2000-03-01 11:27:47 +00:00
|
|
|
All packets match.
|
|
|
|
The alias
|
2000-01-29 13:54:44 +00:00
|
|
|
.Ar all
|
|
|
|
has the same effect.
|
|
|
|
.It Ar tcp
|
|
|
|
Only TCP packets match.
|
|
|
|
.It Ar udp
|
|
|
|
Only UDP packets match.
|
|
|
|
.It Ar ipv6-icmp
|
|
|
|
Only ICMPv6 packets match.
|
|
|
|
.It Ar <number|name>
|
|
|
|
Only packets for the specified protocol matches (see
|
|
|
|
.Pa /etc/protocols
|
|
|
|
for a complete list).
|
|
|
|
.El
|
|
|
|
.Pp
|
|
|
|
.Ar src
|
|
|
|
and
|
|
|
|
.Ar dst :
|
|
|
|
.Bl -hang -offset flag
|
|
|
|
.It Ar <address/prefixlen>
|
|
|
|
.Op Ar ports
|
|
|
|
.El
|
|
|
|
.Pp
|
|
|
|
The
|
|
|
|
.Em <address/prefixlen>
|
|
|
|
may be specified as:
|
|
|
|
.Bl -hang -offset flag -width 1234567890123456
|
|
|
|
.It Ar ipv6no
|
2000-05-04 17:34:31 +00:00
|
|
|
An ipv6number of the form
|
|
|
|
.Li fec0::1:2:3:4.
|
2000-01-29 13:54:44 +00:00
|
|
|
.It Ar ipv6no/prefixlen
|
2000-05-04 17:34:31 +00:00
|
|
|
An ipv6number with a prefix length of the form
|
|
|
|
.Li fec0::1:2:3:4/112.
|
2000-01-29 13:54:44 +00:00
|
|
|
.El
|
|
|
|
.Pp
|
|
|
|
The sense of the match can be inverted by preceding an address with the
|
2000-05-04 17:34:31 +00:00
|
|
|
.Dq not
|
|
|
|
modifier, causing all other addresses to be matched instead.
|
2000-03-01 11:27:47 +00:00
|
|
|
This
|
2000-01-29 13:54:44 +00:00
|
|
|
does not affect the selection of port numbers.
|
|
|
|
.Pp
|
|
|
|
With the TCP and UDP protocols, optional
|
|
|
|
.Em ports
|
|
|
|
may be specified as:
|
|
|
|
.Pp
|
|
|
|
.Bl -hang -offset flag
|
|
|
|
.It Ns {port|port-port} Ns Op ,port Ns Op ,...
|
|
|
|
.El
|
|
|
|
.Pp
|
|
|
|
Service names (from
|
|
|
|
.Pa /etc/services )
|
|
|
|
may be used instead of numeric port values.
|
|
|
|
A range may only be specified as the first value,
|
|
|
|
and the length of the port list is limited to
|
|
|
|
.Dv IP6_FW_MAX_PORTS
|
|
|
|
(as defined in
|
|
|
|
.Pa /usr/src/sys/netinet/ip6_fw.h )
|
|
|
|
ports.
|
|
|
|
.Pp
|
|
|
|
Fragmented packets which have a non-zero offset (i.e. not the first
|
|
|
|
fragment) will never match a rule which has one or more port
|
|
|
|
specifications. See the
|
|
|
|
.Ar frag
|
|
|
|
option for details on matching fragmented packets.
|
|
|
|
.Pp
|
|
|
|
Rules can apply to packets when they are incoming, or outgoing, or both.
|
|
|
|
The
|
|
|
|
.Ar in
|
|
|
|
keyword indicates the rule should only match incoming packets.
|
|
|
|
The
|
|
|
|
.Ar out
|
|
|
|
keyword indicates the rule should only match outgoing packets.
|
|
|
|
.Pp
|
|
|
|
To match packets going through a certain interface, specify
|
|
|
|
the interface using
|
|
|
|
.Ar via :
|
|
|
|
.Bl -hang -offset flag -width 1234567890123456
|
|
|
|
.It Ar via ifX
|
|
|
|
Packet must be going through interface
|
|
|
|
.Ar ifX.
|
|
|
|
.It Ar via if*
|
|
|
|
Packet must be going through interface
|
|
|
|
.Ar ifX ,
|
|
|
|
where X is any unit number.
|
|
|
|
.It Ar via any
|
|
|
|
Packet must be going through
|
|
|
|
.Em some
|
|
|
|
interface.
|
|
|
|
.It Ar via ipv6no
|
|
|
|
Packet must be going through the interface having IPv6 address
|
|
|
|
.Ar ipv6no .
|
|
|
|
.El
|
|
|
|
.Pp
|
|
|
|
The
|
|
|
|
.Ar via
|
|
|
|
keyword causes the interface to always be checked.
|
|
|
|
If
|
|
|
|
.Ar recv
|
|
|
|
or
|
|
|
|
.Ar xmit
|
|
|
|
is used instead of
|
|
|
|
.Ar via ,
|
|
|
|
then the only receive or transmit interface (respectively) is checked.
|
|
|
|
By specifying both, it is possible to match packets based on both receive
|
|
|
|
and transmit interface, e.g.:
|
|
|
|
.Pp
|
|
|
|
.Dl "ip6fw add 100 deny ip from any to any out recv ed0 xmit ed1"
|
|
|
|
.Pp
|
|
|
|
The
|
|
|
|
.Ar recv
|
|
|
|
interface can be tested on either incoming or outgoing packets, while the
|
|
|
|
.Ar xmit
|
2000-03-01 11:27:47 +00:00
|
|
|
interface can only be tested on outgoing packets.
|
|
|
|
So
|
2000-01-29 13:54:44 +00:00
|
|
|
.Ar out
|
|
|
|
is required (and
|
|
|
|
.Ar in
|
|
|
|
invalid) whenver
|
|
|
|
.Ar xmit
|
2000-03-01 11:27:47 +00:00
|
|
|
is used.
|
|
|
|
Specifying
|
2000-01-29 13:54:44 +00:00
|
|
|
.Ar via
|
|
|
|
together with
|
|
|
|
.Ar xmit
|
|
|
|
or
|
|
|
|
.Ar recv
|
|
|
|
is invalid.
|
|
|
|
.Pp
|
|
|
|
A packet may not have a receive or transmit interface: packets originating
|
|
|
|
from the local host have no receive interface. while packets destined for
|
|
|
|
the local host have no transmit interface.
|
|
|
|
.Pp
|
|
|
|
Additional
|
|
|
|
.Ar options :
|
|
|
|
.Bl -hang -offset flag -width 1234567890123456
|
|
|
|
.It frag
|
|
|
|
Matches if the packet is a fragment and this is not the first fragment
|
|
|
|
of the datagram.
|
|
|
|
.Ar frag
|
|
|
|
may not be used in conjunction with either
|
|
|
|
.Ar tcpflags
|
|
|
|
or TCP/UDP port specifications.
|
|
|
|
.It in
|
|
|
|
Matches if this packet was on the way in.
|
|
|
|
.It out
|
|
|
|
Matches if this packet was on the way out.
|
|
|
|
.It ipv6options Ar spec
|
|
|
|
Matches if the IPv6 header contains the comma separated list of
|
|
|
|
options specified in
|
|
|
|
.Ar spec .
|
|
|
|
The supported IPv6 options are:
|
|
|
|
.Ar hopopt
|
|
|
|
(hop-by-hop options header),
|
|
|
|
.Ar route
|
|
|
|
(routing header),
|
|
|
|
.Ar frag
|
|
|
|
(fragment header),
|
|
|
|
.Ar esp
|
|
|
|
(encapsulating security payload),
|
|
|
|
.Ar ah
|
|
|
|
(authentication header),
|
|
|
|
.Ar nonxt
|
|
|
|
(no next header), and
|
|
|
|
.Ar opts
|
|
|
|
(destination options header).
|
|
|
|
The absence of a particular option may be denoted
|
2000-05-04 17:34:31 +00:00
|
|
|
with a
|
|
|
|
.Dq !
|
2000-01-29 13:54:44 +00:00
|
|
|
.Em (not working yet).
|
|
|
|
.It established
|
|
|
|
Matches packets that have the RST or ACK bits set.
|
|
|
|
TCP packets only.
|
|
|
|
.It setup
|
|
|
|
Matches packets that have the SYN bit set but no ACK bit.
|
|
|
|
TCP packets only.
|
|
|
|
.It tcpflags Ar spec
|
|
|
|
Matches if the TCP header contains the comma separated list of
|
|
|
|
flags specified in
|
|
|
|
.Ar spec .
|
|
|
|
The supported TCP flags are:
|
|
|
|
.Ar fin ,
|
|
|
|
.Ar syn ,
|
|
|
|
.Ar rst ,
|
|
|
|
.Ar psh ,
|
|
|
|
.Ar ack ,
|
|
|
|
and
|
|
|
|
.Ar urg .
|
|
|
|
The absence of a particular flag may be denoted
|
2000-05-04 17:34:31 +00:00
|
|
|
with a
|
|
|
|
.Dq ! .
|
2000-01-29 13:54:44 +00:00
|
|
|
A rule which contains a
|
|
|
|
.Ar tcpflags
|
|
|
|
specification can never match a fragmented packet which has
|
|
|
|
a non-zero offset. See the
|
|
|
|
.Ar frag
|
|
|
|
option for details on matching fragmented packets.
|
|
|
|
.It icmptypes Ar types
|
|
|
|
Matches if the ICMPv6 type is in the list
|
|
|
|
.Ar types .
|
|
|
|
The list may be specified as any combination of ranges
|
|
|
|
or individual types separated by commas.
|
|
|
|
.El
|
|
|
|
.Sh CHECKLIST
|
|
|
|
Here are some important points to consider when designing your
|
|
|
|
rules:
|
|
|
|
.Bl -bullet -hang -offset flag
|
|
|
|
.It
|
|
|
|
Remember that you filter both packets going in and out.
|
|
|
|
Most connections need packets going in both directions.
|
|
|
|
.It
|
|
|
|
Remember to test very carefully.
|
|
|
|
It is a good idea to be near the console when doing this.
|
|
|
|
.It
|
|
|
|
Don't forget the loopback interface.
|
|
|
|
.El
|
|
|
|
.Sh FINE POINTS
|
|
|
|
There is one kind of packet that the firewall will always discard,
|
|
|
|
that is an IPv6 fragment with a fragment offset of one.
|
|
|
|
This is a valid packet, but it only has one use, to try to circumvent
|
|
|
|
firewalls.
|
|
|
|
.Pp
|
2000-05-04 17:34:31 +00:00
|
|
|
If you are logged in over a network, loading the KLD version of
|
2000-01-29 13:54:44 +00:00
|
|
|
.Nm
|
|
|
|
is probably not as straightforward as you would think
|
|
|
|
.Em (not supported).
|
|
|
|
I recommend this command line:
|
|
|
|
.Bd -literal -offset center
|
2000-05-04 17:34:31 +00:00
|
|
|
kldload /modules/ip6fw_mod.o && \e
|
2000-01-29 13:54:44 +00:00
|
|
|
ip6fw add 32000 allow all from any to any
|
|
|
|
.Ed
|
|
|
|
.Pp
|
|
|
|
Along the same lines, doing an
|
|
|
|
.Bd -literal -offset center
|
|
|
|
ip6fw flush
|
|
|
|
.Ed
|
|
|
|
.Pp
|
|
|
|
in similar surroundings is also a bad idea.
|
|
|
|
.Sh PACKET DIVERSION
|
|
|
|
not supported.
|
|
|
|
.Sh EXAMPLES
|
|
|
|
This command adds an entry which denies all tcp packets from
|
|
|
|
.Em hacker.evil.org
|
|
|
|
to the telnet port of
|
|
|
|
.Em wolf.tambov.su
|
|
|
|
from being forwarded by the host:
|
|
|
|
.Pp
|
|
|
|
.Dl ip6fw add deny tcp from hacker.evil.org to wolf.tambov.su 23
|
|
|
|
.Pp
|
|
|
|
This one disallows any connection from the entire hackers network to
|
|
|
|
my host:
|
|
|
|
.Pp
|
|
|
|
.Dl ip6fw addf deny all from fec0::123:45:67:0/112 to my.host.org
|
|
|
|
.Pp
|
|
|
|
Here is a good usage of the list command to see accounting records
|
|
|
|
and timestamp information:
|
|
|
|
.Pp
|
|
|
|
.Dl ip6fw -at l
|
|
|
|
.Pp
|
|
|
|
or in short form without timestamps:
|
|
|
|
.Pp
|
|
|
|
.Dl ip6fw -a l
|
|
|
|
.Pp
|
|
|
|
.Sh SEE ALSO
|
|
|
|
.Xr ip 4 ,
|
|
|
|
.Xr ipfirewall 4 ,
|
|
|
|
.Xr protocols 5 ,
|
|
|
|
.Xr services 5 ,
|
|
|
|
.Xr reboot 8 ,
|
2000-05-04 17:34:31 +00:00
|
|
|
.Xr sysctl 8 ,
|
|
|
|
.Xr syslogd 8
|
2000-01-29 13:54:44 +00:00
|
|
|
.Sh BUGS
|
|
|
|
.Pp
|
|
|
|
.Em WARNING!!WARNING!!WARNING!!WARNING!!WARNING!!WARNING!!WARNING!!
|
|
|
|
.Pp
|
2000-03-01 11:27:47 +00:00
|
|
|
This program can put your computer in rather unusable state.
|
|
|
|
When
|
2000-01-29 13:54:44 +00:00
|
|
|
using it for the first time, work on the console of the computer, and
|
|
|
|
do
|
|
|
|
.Em NOT
|
|
|
|
do anything you don't understand.
|
|
|
|
.Pp
|
|
|
|
When manipulating/adding chain entries, service and protocol names are
|
|
|
|
not accepted.
|
|
|
|
.Sh AUTHORS
|
2000-05-04 17:34:31 +00:00
|
|
|
.An Ugen J. S. Antsilevich ,
|
|
|
|
.An Poul-Henning Kamp ,
|
|
|
|
.An Alex Nash ,
|
|
|
|
.An Archie Cobbs .
|
2000-11-22 09:35:58 +00:00
|
|
|
.Pp
|
|
|
|
.An -nosplit
|
2000-05-04 17:34:31 +00:00
|
|
|
API based upon code written by
|
|
|
|
.An Daniel Boulet
|
|
|
|
for BSDI.
|
2000-01-29 13:54:44 +00:00
|
|
|
.Sh HISTORY
|
|
|
|
.Nm
|
|
|
|
first appeared in
|
2000-02-09 19:54:14 +00:00
|
|
|
.Fx 4.0 .
|