1.\" Copyright (c) 2001, Matthew Dillon. Terms and conditions are those of 2.\" the BSD Copyright as specified in the file "/usr/src/COPYRIGHT" in 3.\" the source tree. 4.\" 5.\" $FreeBSD$ 6.\" 7.Dd May 26, 2001 8.Dt FIREWALL 7 9.Os 10.Sh NAME 11.Nm firewall 12.Nd simple firewalls under FreeBSD 13.Sh FIREWALL BASICS 14A Firewall is most commonly used to protect an internal network 15from an outside network by preventing the outside network from 16making arbitrary connections into the internal network. Firewalls 17are also used to prevent outside entities from spoofing internal 18IP addresses and to isolate services such as NFS or SMBFS (Windows 19file sharing) within LAN segments. 20.Pp 21The 22.Fx 23firewalling system also has the capability to limit bandwidth using 24.Xr dummynet 4 . 25This feature can be useful when you need to guarantee a certain 26amount of bandwidth for a critical purpose. For example, if you 27are doing video conferencing over the Internet via your 28office T1 (1.5 MBits), you may wish to bandwidth-limit all other 29T1 traffic to 1 MBit in order to reserve at least 0.5 MBits 30for your video conferencing connections. Similarly if you are 31running a popular web or ftp site from a colocation facility 32you might want to limit bandwidth to prevent excessive band 33width charges from your provider. 34.Pp 35Finally, 36.Fx 37firewalls may be used to divert packets or change the next-hop 38address for packets to help route them to the correct destination. 39Packet diversion is most often used to support NAT (network 40address translation), which allows an internal network using 41a private IP space to make connections to the outside for browsing 42or other purposes. 43.Pp 44Constructing a firewall may appear to be trivial, but most people 45get them wrong. The most common mistake is to create an exclusive 46firewall rather then an inclusive firewall. An exclusive firewall 47allows all packets through except for those matching a set of rules. 48An inclusive firewall allows only packets matching the rulset 49through. Inclusive firewalls are much, much safer then exclusive 50firewalls but a tad more difficult to build properly. The 51second most common mistake is to blackhole everything except the 52particular port you want to let through. TCP/IP needs to be able 53to get certain types of ICMP errors to function properly - for 54example, to implement MTU discovery. Also, a number of common 55system daemons make reverse connections to the 56.Sy auth 57service in an attempt to authenticate the user making a connection. 58Auth is rather dangerous but the proper implementation is to return 59a TCP reset for the connection attempt rather then simply blackholing 60the packet. We cover these and other quirks involved with constructing 61a firewall in the sample firewall section below. 62.Sh IPFW KERNEL CONFIGURATION 63To use the ip firewall features of 64.Fx 65you must create a custom kernel with the 66.Sy IPFIREWALL 67option set. The kernel defaults its firewall to deny all 68packets by default, which means that if you do not load in 69a permissive ruleset via 70.Em /etc/rc.conf , 71rebooting into your new kernel will take the network offline 72and will prevent you from being able to access it if you 73are not sitting at the console. It is also quite common to 74update a kernel to a new release and reboot before updating 75the binaries. This can result in an incompatibility between 76the 77.Xr ipfw 8 78program and the kernel which prevents it from running in the 79boot sequence, also resulting in an inaccessible machine. 80Because of these problems the 81.Sy IPFIREWALL_DEFAULT_TO_ACCEPT 82kernel option is also available which changes the default firewall 83to pass through all packets. Note, however, that this is a very 84dangerous option to set because it means your firewall is disabled 85during booting. You should use this option while getting up to 86speed with 87.Fx 88firewalling, but get rid of it once you understand how it all works 89to close the loophole. There is a third option called 90.Sy IPDIVERT 91which allows you to use the firewall to divert packets to a user program 92and is necessary if you wish to use 93.Xr natd 8 94to give private internal networks access to the outside world. 95If you want to be able to limit the bandwidth used by certain types of 96traffic, the 97.Sy DUMMYNET 98option must be used to enable 99.Em ipfw pipe 100rules. 101.Sh SAMPLE IPFW-BASED FIREWALL 102Here is an example ipfw-based firewall taken from a machine with three 103interface cards. fxp0 is connected to the 'exposed' LAN. Machines 104on this LAN are dual-homed with both internal 10. IP addresses and 105Internet-routed IP addresses. In our example, 192.100.5.x represents 106the Internet-routed IP block while 10.x.x.x represents the internal 107networks. While it isn't relevant to the example, 10.0.1.x is 108assigned as the internal address block for the LAN on fxp0, 10.0.2.x 109for the LAN on fxp1, and 10.0.3.x for the LAN on fxp2. 110.Pp 111In this example we want to isolate all three LANs from the Internet 112as well as isolate them from each other, and we want to give all 113internal addresses access to the Internet through a NAT gateway running 114on this machine. To make the NAT gateway work, the firewall machine 115is given two Internet-exposed addresses on fxp0 in addition to an 116internal 10. address on fxp0: one exposed address (not shown) 117represents the machine's official address, and the second exposed 118address (192.100.5.5 in our example) represents the NAT gateway 119rendezvous IP. We make the example more complex by giving the machines 120on the exposed LAN internal 10.0.0.x addresses as well as exposed 121addresses. The idea here is that you can bind internal services 122to internal addresses even on exposed machines and still protect 123those services from the Internet. The only services you run on 124exposed IP addresses would be the ones you wish to expose to the 125Internet. 126.Pp 127It is important to note that the 10.0.0.x network in our example 128is not protected by our firewall. You must make sure that your 129Internet router protects this network from outside spoofing. 130Also, in our example, we pretty much give the exposed hosts free 131reign on our internal network when operating services through 132internal IP addresses (10.0.0.x). This is somewhat of security 133risk... what if an exposed host is compromised? To remove the 134risk and force everything coming in via LAN0 to go through 135the firewall, remove rules 01010 and 01011. 136.Pp 137Finally, note that the use of internal addresses represents a 138big piece of our firewall protection mechanism. With proper 139spoofing safeguards in place, nothing outside can directly 140access an internal (LAN1 or LAN2) host. 141.Bd -literal 142# /etc/rc.conf 143# 144firewall_enable="YES" 145firewall_type="/etc/ipfw.conf" 146 147# temporary port binding range let 148# through the firewall. 149# 150# NOTE: heavily loaded services running through the firewall may require 151# a larger port range for local-size binding. 4000-10000 or 4000-30000 152# might be a better choice. 153ip_portrange_first=4000 154ip_portrange_last=5000 155\&... 156.Ed 157.Pp 158.Bd -literal 159# /etc/ipfw.conf 160# 161# FIREWALL: the firewall machine / nat gateway 162# LAN0 10.0.0.X and 192.100.5.X (dual homed) 163# LAN1 10.0.1.X 164# LAN2 10.0.2.X 165# sw: ethernet switch (unmanaged) 166# 167# 192.100.5.x represents IP addresses exposed to the Internet 168# (i.e. Internet routeable). 10.x.x.x represent internal IPs 169# (not exposed) 170# 171# [LAN1] 172# ^ 173# | 174# FIREWALL -->[LAN2] 175# | 176# [LAN0] 177# | 178# +--> exposed host A 179# +--> exposed host B 180# +--> exposed host C 181# | 182# INTERNET (secondary firewall) 183# ROUTER 184# | 185# [Internet] 186# 187# NOT SHOWN: The INTERNET ROUTER must contain rules to disallow 188# all packets with source IP addresses in the 10. block in order 189# to protect the dual-homed 10.0.0.x block. Exposed hosts are 190# not otherwise protected in this example - they should only bind 191# exposed services to exposed IPs but can safely bind internal 192# services to internal IPs. 193# 194# The NAT gateway works by taking packets sent from internal 195# IP addresses to external IP addresses and routing them to natd, which 196# is listening on port 8668. This is handled by rule 00300. Data coming 197# back to natd from the outside world must also be routed to natd using 198# rule 00301. To make the example interesting, we note that we do 199# NOT have to run internal requests to exposed hosts through natd 200# (rule 00290) because those exposed hosts know about our 201# 10. network. This can reduce the load on natd. Also note that we 202# of course do not have to route internal<->internal traffic through 203# natd since those hosts know how to route our 10. internal network. 204# The natd command we run from /etc/rc.local is shown below. See 205# also the in-kernel version of natd, ipnat. 206# 207# natd -s -u -a 208.161.114.67 208# 209# 210add 00290 skipto 1000 ip from 10.0.0.0/8 to 192.100.5.0/24 211add 00300 divert 8668 ip from 10.0.0.0/8 to not 10.0.0.0/8 212add 00301 divert 8668 ip from not 10.0.0.0/8 to 192.100.5.5 213 214# Short cut the rules to avoid running high bandwidths through 215# the entire rule set. Allow established tcp connections through, 216# and shortcut all outgoing packets under the assumption that 217# we need only firewall incoming packets. 218# 219# Allowing established tcp connections through creates a small 220# hole but may be necessary to avoid overloading your firewall. 221# If you are worried, you can move the rule to after the spoof 222# checks. 223# 224add 01000 allow tcp from any to any established 225add 01001 allow all from any to any out via fxp0 226add 01001 allow all from any to any out via fxp1 227add 01001 allow all from any to any out via fxp2 228 229# Spoof protection. This depends on how well you trust your 230# internal networks. Packets received via fxp1 MUST come from 231# 10.0.1.x. Packets received via fxp2 MUST come from 10.0.2.x. 232# Packets received via fxp0 cannot come from the LAN1 or LAN2 233# blocks. We can't protect 10.0.0.x here, the Internet router 234# must do that for us. 235# 236add 01500 deny all from not 10.0.1.0/24 in via fxp1 237add 01500 deny all from not 10.0.2.0/24 in via fxp2 238add 01501 deny all from 10.0.1.0/24 in via fxp0 239add 01501 deny all from 10.0.2.0/24 in via fxp0 240 241# In this example rule set there are no restrictions between 242# internal hosts, even those on the exposed LAN (as long as 243# they use an internal IP address). This represents a 244# potential security hole (what if an exposed host is 245# compromised?). If you want full restrictions to apply 246# between the three LANs, firewalling them off from each 247# other for added security, remove these two rules. 248# 249# If you want to isolate LAN1 and LAN2, but still want 250# to give exposed hosts free reign with each other, get 251# rid of rule 01010 and keep rule 01011. 252# 253# (commented out, uncomment for less restrictive firewall) 254#add 01010 allow all from 10.0.0.0/8 to 10.0.0.0/8 255#add 01011 allow all from 192.100.5.0/24 to 192.100.5.0/24 256# 257 258# SPECIFIC SERVICES ALLOWED FROM SPECIFIC LANS 259# 260# If using a more restrictive firewall, allow specific LANs 261# access to specific services running on the firewall itself. 262# In this case we assume LAN1 needs access to filesharing running 263# on the firewall. If using a less restrictive firewall 264# (allowing rule 01010), you don't need these rules. 265# 266add 01012 allow tcp from 10.0.1.0/8 to 10.0.1.1 139 267add 01012 allow udp from 10.0.1.0/8 to 10.0.1.1 137,138 268 269# GENERAL SERVICES ALLOWED TO CROSS INTERNAL AND EXPOSED LANS 270# 271# We allow specific UDP services through: DNS lookups, ntalk, and ntp. 272# Note that internal services are protected by virtue of having 273# spoof-proof internal IP addresses (10. net), so these rules 274# really only apply to services bound to exposed IPs. We have 275# to allow UDP fragments or larger fragmented UDP packets will 276# not survive the firewall. 277# 278# If we want to expose high-numbered temporary service ports 279# for things like DNS lookup responses we can use a port range, 280# in this example 4000-65535, and we set to /etc/rc.conf variables 281# on all exposed machines to make sure they bind temporary ports 282# to the exposed port range (see rc.conf example above) 283# 284add 02000 allow udp from any to any 4000-65535,domain,ntalk,ntp 285add 02500 allow udp from any to any frag 286 287# Allow similar services for TCP. Again, these only apply to 288# services bound to exposed addresses. NOTE: we allow 'auth' 289# through but do not actually run an identd server on any exposed 290# port. This allows the machine being authed to respond with a 291# TCP RESET. Throwing the packet away would result in delays 292# when connecting to remote services that do reverse ident lookups. 293# 294# Note that we do not allow tcp fragments through, and that we do 295# not allow fragments in general (except for UDP fragments). We 296# expect the TCP mtu discovery protocol to work properly so there 297# should be no TCP fragments. 298# 299add 03000 allow tcp from any to any http,https 300add 03000 allow tcp from any to any 4000-65535,ssh,smtp,domain,ntalk 301add 03000 allow tcp from any to any auth,pop3,ftp,ftp-data 302 303# It is important to allow certain ICMP types through: 304# 305# 0 Echo Reply 306# 3 Destination Unreachable 307# 4 Source Quench (typically not allowed) 308# 5 Redirect (typically not allowed - can be dangerous!) 309# 8 Echo 310# 11 Time Exceeded 311# 12 Parameter Problem 312# 13 Timestamp 313# 14 Timestamp Reply 314# 315# Sometimes people need to allow ICMP REDIRECT packets, which is 316# type 5, but if you allow it make sure that your Internet router 317# disallows it. 318 319add 04000 allow icmp from any to any icmptypes 0,5,8,11,12,13,14 320 321# log any remaining fragments that get through. Might be useful, 322# otherwise don't bother. Have a final deny rule as a safety to 323# guarantee that your firewall is inclusive no matter how the kernel 324# is configured. 325# 326add 05000 deny log ip from any to any frag 327add 06000 deny all from any to any 328.Ed 329.Sh PORT BINDING INTERNAL AND EXTERNAL SERVICES 330We've mentioned multi-homing hosts and binding services to internal or 331external addresses but we haven't really explained it. When you have a 332host with multiple IP addresses assigned to it, you can bind services run 333on that host to specific IPs or interfaces rather then all IPs. Take 334the firewall machine for example: With three interfaces 335and two exposed IP addresses 336on one of those interfaces, the firewall machine is known by 5 different 337IP addresses (10.0.0.1, 10.0.1.1, 10.0.2.1, 192.100.5.5, and say 338192.100.5.1). If the firewall is providing file sharing services to the 339windows LAN segment (say it is LAN1), you can use samba's 'bind interfaces' 340directive to specifically bind it to just the LAN1 IP address. That 341way the file sharing services will not be made available to other LAN 342segments. The same goes for NFS. If LAN2 has your UNIX engineering 343workstations, you can tell nfsd to bind specifically to 10.0.2.1. You 344can specify how to bind virtually every service on the machine and you 345can use a light 346.Xr jail 8 347to indirectly bind services that do not otherwise give you the option. 348.Sh SEE ALSO 349.Xr ipnat 1 , 350.Xr dummynet 4 , 351.Xr ipnat 5 , 352.Xr rc.conf 5 , 353.Xr smb.conf 5 [ /usr/ports/net/samba ] , 354.Xr samba 7 [ /usr/ports/net/samba ] , 355.Xr config 8 , 356.Xr ipfw 8 , 357.Xr jail 8 , 358.Xr natd 8 , 359.Xr nfsd 8 360.Sh ADDITIONAL READING 361.Xr ipf 5 , 362.Xr ipf 8 , 363.Xr ipfstat 8 364.Sh HISTORY 365The 366.Nm 367manual page was originally written by 368.An Matthew Dillon 369and first appeared 370in 371.Fx 4.3 , 372May 2001. 373