mirror of
https://gitlab.com/shorewall/code.git
synced 2024-11-24 16:43:21 +01:00
c93817f30b
The invariant sections clause doesn't quite match the official text. It should read: with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts not: with no Invariant Sections, with no Front-Cover, and with no Back-Cover Texts Signed-off-by: Jeremy Sowden <jeremy@azazel.net>
1082 lines
38 KiB
XML
1082 lines
38 KiB
XML
<?xml version="1.0" encoding="UTF-8"?>
|
|
<!DOCTYPE article PUBLIC "-//OASIS//DTD DocBook XML V4.4//EN"
|
|
"http://www.oasis-open.org/docbook/xml/4.4/docbookx.dtd">
|
|
<article>
|
|
<!--$Id$-->
|
|
|
|
<articleinfo>
|
|
<title>My Network Configuration</title>
|
|
|
|
<authorgroup>
|
|
<author>
|
|
<firstname>Tom</firstname>
|
|
|
|
<surname>Eastep</surname>
|
|
</author>
|
|
</authorgroup>
|
|
|
|
<pubdate><?dbtimestamp format="Y/m/d"?></pubdate>
|
|
|
|
<copyright>
|
|
<year>2009</year>
|
|
|
|
<year>2015</year>
|
|
|
|
<holder>Thomas M. Eastep</holder>
|
|
</copyright>
|
|
|
|
<legalnotice>
|
|
<para>Permission is granted to copy, distribute and/or modify this
|
|
document under the terms of the GNU Free Documentation License, Version
|
|
1.2 or any later version published by the Free Software Foundation; with
|
|
no Invariant Sections, no Front-Cover Texts, and no Back-Cover
|
|
Texts. A copy of the license is included in the section entitled
|
|
<quote><ulink url="GnuCopyright.htm">GNU Free Documentation
|
|
License</ulink></quote>.</para>
|
|
</legalnotice>
|
|
</articleinfo>
|
|
|
|
<caution>
|
|
<para>The ruleset shown in this article uses Shorewall features that are
|
|
not available in Shorewall versions prior to 4.6.11</para>
|
|
</caution>
|
|
|
|
<section>
|
|
<title>Introduction</title>
|
|
|
|
<para>The configuration described in this article represents the network
|
|
at shorewall.org during the summer of 2015. It uses the following
|
|
Shorewall features:</para>
|
|
|
|
<itemizedlist>
|
|
<listitem>
|
|
<para><ulink url="MultiISP.html">Two Internet
|
|
Interfaces</ulink></para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para>A DMZ with three "systems" using <ulink url="ProxyARP.htm">Proxy
|
|
ARP</ulink> and running in <ulink url="OpenVZ.html">Linux Containers
|
|
(LXC)</ulink></para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para><ulink url="6to4.htm">IPv6 Access through two 6to4
|
|
Tunnels</ulink></para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para><ulink url="ipsets.html">Ipsets</ulink></para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para><ulink url="Shorewall_Squid_Usage.html">Transparent proxy using
|
|
Squid</ulink></para>
|
|
</listitem>
|
|
</itemizedlist>
|
|
|
|
<para>Linux runs the firewall and the servers (although they run in LXC
|
|
containers on the firewall system). Linux is not used natively on any of
|
|
our other systems.. I rather run Windows natively (Windows 7 Professional)
|
|
and run Linux in VMs under <ulink
|
|
url="http://www.sun.com/software/products/virtualbox/">VirtualBox</ulink>.
|
|
This approach has a number of advantages:</para>
|
|
|
|
<orderedlist>
|
|
<listitem>
|
|
<para>Efficient disk utilization.</para>
|
|
|
|
<para>The virtual disks used by Linux are just files in the NTFS file
|
|
system. There is no need to pre-allocate one or more partitions for
|
|
use by Linux. Some large applications, like Google Earth, are
|
|
installed only on Windows.</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para>Avoids proprietary hardware issues.</para>
|
|
|
|
<para>The Linux VMs emulate standard hardware that is well-supported
|
|
by Linux.</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para>Avoids DRM hassles</para>
|
|
|
|
<para>All DRM-protected media can be handled under Windows.</para>
|
|
</listitem>
|
|
</orderedlist>
|
|
|
|
<para>VirtualBox is fast (when your processor supports virtualization
|
|
extensions) and very easy to use. I highly recommend it!</para>
|
|
</section>
|
|
|
|
<section>
|
|
<title>Network Topology</title>
|
|
|
|
<para>Our network is diagrammed in the following graphic.</para>
|
|
|
|
<graphic fileref="images/Network2015.png"/>
|
|
|
|
<para>We have two accounts with Comcast:</para>
|
|
|
|
<orderedlist>
|
|
<listitem>
|
|
<para>ComcastC</para>
|
|
|
|
<para>This is a high-speed (40mb/8mb) link with a single dynamic IPv4
|
|
address. We are not allowed to run servers accessible through this
|
|
account.</para>
|
|
</listitem>
|
|
|
|
<listitem>
|
|
<para>ComcastB</para>
|
|
|
|
<para>Comcast Business Class Service with a /29
|
|
(70.90.191.120/29).</para>
|
|
</listitem>
|
|
</orderedlist>
|
|
|
|
<para>The wired local network is restricted to my home office. The
|
|
wireless network is managed by a wireless router which we use only as an
|
|
access point -- its WAN interface is unused and it is configured to not do
|
|
NAT. The wireless network uses WPA2 personal security.</para>
|
|
</section>
|
|
|
|
<section>
|
|
<title>Shorewall Configuration</title>
|
|
|
|
<para>This section contains excerpts from the Shorewall
|
|
configuration.</para>
|
|
|
|
<section>
|
|
<title>/etc/shorewall/mirrors</title>
|
|
|
|
<programlisting>MIRRORS=62.216.169.37,\
|
|
62.216.184.105,\
|
|
63.229.2.114,\
|
|
...</programlisting>
|
|
|
|
<para>Defines the IP addresses of the Shorewall mirror sites.</para>
|
|
</section>
|
|
|
|
<section id="params">
|
|
<title>/etc/shorewall/params</title>
|
|
|
|
<para><programlisting>INCLUDE mirrors
|
|
|
|
LOG="NFLOG(0,0,1)"
|
|
|
|
INT_IF=eth0
|
|
TUN_IF=tun+
|
|
COMB_IF=eth2
|
|
COMC_IF=eth1
|
|
|
|
MYNET=70.90.191.120/29 #External IP addresses handled by this router
|
|
DMZ_NET=70.90.191.124/31
|
|
FW_NET=70.90.191.120/30
|
|
INT_NET=172.20.1.0/24
|
|
DYN_NET=$(find_first_interface_address_if_any $COMC_IF)
|
|
SMC_ADDR=10.1.10.11
|
|
|
|
[ -n "${DYN_NET:=67.170.122.219}" ]
|
|
|
|
DYN_NET=${DYN_NET}/32
|
|
|
|
DMZ=fw:$DMZ_NET
|
|
|
|
LISTS=:70.90.191.124
|
|
SERVER=:70.90.191.125
|
|
MAIL=172.20.1.200
|
|
|
|
PROXY=Yes
|
|
STATISTICAL=Yes
|
|
SQUID2=Yes
|
|
|
|
[ -n "${EXPERIMENTAL:=0}" ]
|
|
</programlisting>As shown, this file defines variables to hold the various
|
|
lists of IP addresses that I need to maintain. To simplify network
|
|
reconfiguration, I also use variables to define the log level and the
|
|
network interfaces.</para>
|
|
</section>
|
|
|
|
<section id="conf">
|
|
<title>/etc/shorewall/shorewall.conf</title>
|
|
|
|
<para><programlisting>###############################################################################
|
|
# S T A R T U P E N A B L E D
|
|
###############################################################################
|
|
|
|
STARTUP_ENABLED=Yes
|
|
|
|
###############################################################################
|
|
# V E R B O S I T Y
|
|
###############################################################################
|
|
|
|
VERBOSITY=1
|
|
|
|
###############################################################################
|
|
# L O G G I N G
|
|
###############################################################################
|
|
|
|
BLACKLIST_LOG_LEVEL=none
|
|
|
|
INVALID_LOG_LEVEL=
|
|
|
|
LOG_BACKEND=ULOG
|
|
|
|
LOG_MARTIANS=Yes
|
|
|
|
LOG_VERBOSITY=1
|
|
|
|
LOGALLNEW=
|
|
|
|
LOGFILE=/var/log/ulogd/ulogd.syslogemu.log
|
|
|
|
LOGFORMAT=": %s %s"
|
|
|
|
LOGTAGONLY=Yes
|
|
|
|
LOGLIMIT="s:5/min"
|
|
|
|
MACLIST_LOG_LEVEL="$LOG"
|
|
|
|
RELATED_LOG_LEVEL="$LOG"
|
|
|
|
RPFILTER_LOG_LEVEL=info
|
|
|
|
SFILTER_LOG_LEVEL="$LOG"
|
|
|
|
SMURF_LOG_LEVEL="$LOG"
|
|
|
|
STARTUP_LOG=/var/log/shorewall-init.log
|
|
|
|
TCP_FLAGS_LOG_LEVEL="$LOG"
|
|
|
|
UNTRACKED_LOG_LEVEL=
|
|
|
|
###############################################################################
|
|
# L O C A T I O N O F F I L E S A N D D I R E C T O R I E S
|
|
###############################################################################
|
|
|
|
ARPTABLES=
|
|
|
|
CONFIG_PATH="/etc/shorewall:/etc/shorewall-common:/usr/share/shorewall:/usr/share/shorewall/Shorewall"
|
|
|
|
GEOIPDIR=/usr/share/xt_geoip/LE
|
|
|
|
IPTABLES=/sbin/iptables
|
|
|
|
IP=/sbin/ip
|
|
|
|
IPSET=
|
|
|
|
LOCKFILE=/var/lib/shorewall/lock
|
|
|
|
MODULESDIR=
|
|
|
|
NFACCT=
|
|
|
|
PATH="/usr/local/sbin:/sbin:/bin:/usr/sbin:/usr/bin:/usr/local/bin"
|
|
|
|
PERL=/usr/bin/perl
|
|
|
|
RESTOREFILE=
|
|
|
|
SHOREWALL_SHELL=/bin/bash
|
|
|
|
SUBSYSLOCK=
|
|
|
|
TC=
|
|
|
|
###############################################################################
|
|
# D E F A U L T A C T I O N S / M A C R O S
|
|
###############################################################################
|
|
|
|
ACCEPT_DEFAULT=none
|
|
DROP_DEFAULT=Drop
|
|
NFQUEUE_DEFAULT=none
|
|
QUEUE_DEFAULT=none
|
|
REJECT_DEFAULT=Reject
|
|
|
|
###############################################################################
|
|
# R S H / R C P C O M M A N D S
|
|
###############################################################################
|
|
|
|
RCP_COMMAND='scp ${files} ${root}@${system}:${destination}'
|
|
RSH_COMMAND='ssh ${root}@${system} ${command}'
|
|
|
|
###############################################################################
|
|
# F I R E W A L L O P T I O N S
|
|
###############################################################################
|
|
|
|
ACCOUNTING=Yes
|
|
|
|
ACCOUNTING_TABLE=mangle
|
|
|
|
ADD_IP_ALIASES=No
|
|
|
|
ADD_SNAT_ALIASES=No
|
|
|
|
ADMINISABSENTMINDED=Yes
|
|
|
|
BASIC_FILTERS=No
|
|
|
|
IGNOREUNKNOWNVARIABLES=No
|
|
|
|
AUTOCOMMENT=Yes
|
|
|
|
AUTOHELPERS=Yes
|
|
|
|
AUTOMAKE=Yes
|
|
|
|
BLACKLIST="NEW,INVALID,UNTRACKED"
|
|
|
|
CHAIN_SCRIPTS=No
|
|
|
|
CLAMPMSS=Yes
|
|
|
|
CLEAR_TC=Yes
|
|
|
|
COMPLETE=No
|
|
|
|
DEFER_DNS_RESOLUTION=No
|
|
|
|
DELETE_THEN_ADD=No
|
|
|
|
DETECT_DNAT_IPADDRS=No
|
|
|
|
DISABLE_IPV6=No
|
|
|
|
DONT_LOAD="nf_nat_sip,nf_conntrack_sip,nf_conntrack_h323,nf_nat_h323"
|
|
|
|
DYNAMIC_BLACKLIST=Yes
|
|
|
|
EXPAND_POLICIES=Yes
|
|
|
|
EXPORTMODULES=Yes
|
|
|
|
FASTACCEPT=Yes
|
|
|
|
FORWARD_CLEAR_MARK=Yes
|
|
|
|
HELPERS="ftp,irc"
|
|
|
|
IMPLICIT_CONTINUE=No
|
|
|
|
INLINE_MATCHES=Yes
|
|
|
|
IPSET_WARNINGS=No
|
|
|
|
IP_FORWARDING=Yes
|
|
|
|
KEEP_RT_TABLES=Yes
|
|
|
|
LEGACY_FASTSTART=Yes
|
|
|
|
LOAD_HELPERS_ONLY=Yes
|
|
|
|
MACLIST_TABLE=mangle
|
|
|
|
MACLIST_TTL=60
|
|
|
|
MANGLE_ENABLED=Yes
|
|
|
|
MAPOLDACTIONS=No
|
|
|
|
MARK_IN_FORWARD_CHAIN=No
|
|
|
|
MODULE_SUFFIX="ko ko.xz"
|
|
|
|
MULTICAST=No
|
|
|
|
MUTEX_TIMEOUT=60
|
|
|
|
NULL_ROUTE_RFC1918=unreachable
|
|
|
|
OPTIMIZE=All
|
|
|
|
OPTIMIZE_ACCOUNTING=No
|
|
|
|
REJECT_ACTION=RejectAct
|
|
|
|
REQUIRE_INTERFACE=No
|
|
|
|
RESTORE_DEFAULT_ROUTE=No
|
|
|
|
RESTORE_ROUTEMARKS=Yes
|
|
|
|
RETAIN_ALIASES=No
|
|
|
|
ROUTE_FILTER=No
|
|
|
|
SAVE_ARPTABLES=Yes
|
|
|
|
SAVE_IPSETS=ipv4
|
|
|
|
TC_ENABLED=No
|
|
|
|
TC_EXPERT=No
|
|
|
|
TC_PRIOMAP="2 3 3 3 2 3 1 1 2 2 2 2 2 2 2 2"
|
|
|
|
TRACK_PROVIDERS=Yes
|
|
|
|
TRACK_RULES=No
|
|
|
|
USE_DEFAULT_RT=Yes
|
|
|
|
USE_PHYSICAL_NAMES=Yes
|
|
|
|
USE_RT_NAMES=Yes
|
|
|
|
WARNOLDCAPVERSION=Yes
|
|
|
|
WORKAROUNDS=No
|
|
|
|
ZONE2ZONE=-
|
|
|
|
###############################################################################
|
|
# P A C K E T D I S P O S I T I O N
|
|
###############################################################################
|
|
|
|
BLACKLIST_DISPOSITION=DROP
|
|
|
|
INVALID_DISPOSITION=CONTINUE
|
|
|
|
MACLIST_DISPOSITION=ACCEPT
|
|
|
|
RELATED_DISPOSITION=REJECT
|
|
|
|
RPFILTER_DISPOSITION=DROP
|
|
|
|
SMURF_DISPOSITION=DROP
|
|
|
|
SFILTER_DISPOSITION=DROP
|
|
|
|
TCP_FLAGS_DISPOSITION=DROP
|
|
|
|
UNTRACKED_DISPOSITION=DROP
|
|
|
|
################################################################################
|
|
# P A C K E T M A R K L A Y O U T
|
|
################################################################################
|
|
|
|
TC_BITS=8
|
|
|
|
PROVIDER_BITS=2
|
|
|
|
PROVIDER_OFFSET=16
|
|
|
|
MASK_BITS=8
|
|
|
|
ZONE_BITS=0
|
|
|
|
################################################################################
|
|
# L E G A C Y O P T I O N
|
|
# D O N O T D E L E T E O R A L T E R
|
|
################################################################################
|
|
|
|
IPSECFILE=zones</programlisting>I don't believe that there is anything
|
|
remarkable there</para>
|
|
</section>
|
|
|
|
<section>
|
|
<title>/etc/shorewall/actions</title>
|
|
|
|
<para><programlisting>Mirrors # Accept traffic from Shorewall Mirrors
|
|
SSHLIMIT
|
|
SSH_BL
|
|
tarpit inline # Wrapper for TARPIT
|
|
|
|
</programlisting></para>
|
|
</section>
|
|
|
|
<section>
|
|
<title>/etc/shorewall/action.Mirrors</title>
|
|
|
|
<para><programlisting>#TARGET SOURCE DEST PROTO DPORT SPORT ORIGDEST RATE
|
|
?COMMENT Accept traffic from Mirrors
|
|
?FORMAT 2
|
|
DEFAULTS -
|
|
$1 $MIRRORS
|
|
</programlisting>I make this into an action so the rather long list of rules
|
|
go into their own chain. See the <link linkend="rules">rules</link> file
|
|
-- this action is used for rsync traffic.</para>
|
|
</section>
|
|
|
|
<section>
|
|
<title>/etc/shorewall/action.tarpit</title>
|
|
|
|
<programlisting>#ACTION SOURCE DEST PROTO DPORT SPORT ORIGDEST RATE USER MARK CONNLIMIT TIME HEADERS SWITCH HELPER
|
|
$LOG { rate=s:1/min }
|
|
TARPIT
|
|
</programlisting>
|
|
|
|
<para/>
|
|
</section>
|
|
|
|
<section id="zones">
|
|
<title>/etc/shorewall/zones</title>
|
|
|
|
<para><programlisting>#ZONE TYPE
|
|
fw firewall
|
|
loc ip #Local Zone
|
|
net ipv4 #Internet
|
|
dmz ipv4 #LXC Containers
|
|
smc:net ip #10.0.1.0/24
|
|
</programlisting></para>
|
|
</section>
|
|
|
|
<section id="interfaces">
|
|
<title>/etc/shorewall/interfaces</title>
|
|
|
|
<para><programlisting>#ZONE INTERFACE OPTIONS
|
|
loc INT_IF dhcp,physical=$INT_IF,ignore=1,wait=5,routefilter,nets=172.20.1.0/24,routeback,tcpflags=0
|
|
net COMB_IF optional,sourceroute=0,routefilter=0,arp_ignore=1,proxyarp=0,physical=$COMB_IF,upnp,nosmurfs,tcpflags
|
|
net COMC_IF optional,sourceroute=0,routefilter=0,arp_ignore=1,proxyarp=0,physical=$COMC_IF,upnp,nosmurfs,tcpflags,dhcp
|
|
dmz br0 routeback,proxyarp=1,required,wait=30
|
|
- ifb0 ignore
|
|
</programlisting></para>
|
|
</section>
|
|
|
|
<section id="hosts">
|
|
<title>/etc/shorewall/hosts</title>
|
|
|
|
<para><programlisting>#ZONE HOST(S) OPTIONS
|
|
smc COMB_IF:10.1.10.0/24 mss=1400
|
|
smc COMC_IF:10.0.0.0/24
|
|
</programlisting></para>
|
|
</section>
|
|
|
|
<section id="policy">
|
|
<title>/etc/shorewall/policy</title>
|
|
|
|
<para><programlisting>#SOURCE DEST POLICY LOGLEVEL LIMIT
|
|
$FW dmz REJECT $LOG
|
|
$FW net REJECT $LOG
|
|
?else
|
|
$FW dmz REJECT $LOG
|
|
$FW net REJECT $LOG
|
|
$FW all ACCEPT
|
|
smc loc ACCEPT
|
|
smc fw CONTINUE
|
|
smc net NONE
|
|
loc smc ACCEPT
|
|
loc net ACCEPT
|
|
loc fw REJECT $LOG
|
|
net net NONE
|
|
net smc NONE
|
|
net all DROP:Drop $LOG 8/sec:30
|
|
dmz fw REJECT:Reject $LOG
|
|
all all REJECT:Reject $LOG
|
|
</programlisting></para>
|
|
</section>
|
|
|
|
<section id="accounting">
|
|
<title>/etc/shorewall/accounting</title>
|
|
|
|
<para><programlisting>#ACTION CHAIN SOURCE DESTINATION PROTO DPORT SPORT USER MARK IPSEC
|
|
?COMMENT
|
|
?SECTION PREROUTING
|
|
?SECTION INPUT
|
|
ACCOUNT(fw-net,$FW_NET) - COMB_IF
|
|
COUNT - COMB_IF - tcp - 80
|
|
COUNT - COMC_IF - tcp - 80
|
|
COUNT - br0:70.90.191.124 - tcp 80 =
|
|
|
|
?SECTION OUTPUT
|
|
ACCOUNT(fw-net,$FW_NET) - - COMB_IF
|
|
COUNT - - COMB_IF tcp 80
|
|
COUNT - - COMC_IF tcp 80
|
|
|
|
?SECTION FORWARD
|
|
ACCOUNT(dmz-net,$DMZ_NET) - br0 COMB_IF
|
|
ACCOUNT(dmz-net,$DMZ_NET) - COMB_IF br0
|
|
ACCOUNT(loc-net,$INT_NET) - COMB_IF INT_IF
|
|
ACCOUNT(loc-net,$INT_NET) - INT_IF COMB_IF
|
|
|
|
</programlisting></para>
|
|
</section>
|
|
|
|
<section id="blacklist">
|
|
<title>/etc/shorewall/blrules</title>
|
|
|
|
<para><programlisting>#ACTION SOURCE DEST PROTO DPORT SPORT ORIGDEST RATE USER MARK CONNLIMIT TIME HEADERS SWITCH
|
|
WHITELIST net:70.90.191.126 all
|
|
BLACKLIST net:+blacklist all
|
|
BLACKLIST net all udp 1023:1033,1434,5948,23773
|
|
DROP net all tcp 57,1433,1434,2401,2745,3127,3306,3410,4899,5554,5948,6101,8081,9898,23773
|
|
DROP net:63.149.127.103 all
|
|
DROP net:175.143.53.113 all
|
|
DROP net:121.134.248.190 all
|
|
REJECT net:188.176.145.22 dmz tcp 25
|
|
DROP net fw udp 111
|
|
Invalid(DROP) net all</programlisting></para>
|
|
</section>
|
|
|
|
<section id="findgw">
|
|
<title>/etc/shorewall/findgw</title>
|
|
|
|
<para><programlisting>if [ -f /var/lib/dhcpcd/dhcpcd-eth1.info ]; then
|
|
. /var/lib/dhcpcd/dhcpcd-eth1.info
|
|
echo $GATEWAY
|
|
fi
|
|
</programlisting>The Comcast line has a dynamic IP address assigned with the
|
|
help of dhclient.</para>
|
|
</section>
|
|
|
|
<section id="isusable">
|
|
<title>/etc/shorewall/isusable</title>
|
|
|
|
<para><programlisting>local status
|
|
status=0
|
|
|
|
[ -f /etc/shorewall/${1}.status ] && status=$(cat /etc/shorewall/${1}.status)
|
|
|
|
return $status</programlisting>For use with <ulink
|
|
url="MultiISP.html#lsm">lsm</ulink>.</para>
|
|
</section>
|
|
|
|
<section id="libprivate">
|
|
<title>/etc/shorewall/lib.private</title>
|
|
|
|
<para><programlisting>start_lsm() {
|
|
#
|
|
# Kill any existing lsm process(es)
|
|
#
|
|
killall lsm 2> /dev/null
|
|
#
|
|
# Create the Shorewall-specific part of the LSM configuration. This file is
|
|
# included by /etc/lsm/lsm.conf
|
|
#
|
|
# ComcastB has a static gateway while ComcastC's is dynamic
|
|
#
|
|
cat <<EOF > /etc/lsm/shorewall.conf
|
|
connection {
|
|
name=ComcastB
|
|
checkip=76.28.230.1
|
|
device=$COMB_IF
|
|
ttl=2
|
|
}
|
|
|
|
connection {
|
|
name=ComcastC
|
|
checkip=76.28.230.188
|
|
device=$COMC_IF
|
|
ttl=3
|
|
}
|
|
EOF
|
|
|
|
cat <<EOF > /var/lib/shorewall/eth0.info
|
|
ETH0_GATEWAY=$SW_ETH0_GATEWAY
|
|
ETH0_ADDRESS=$SW_ETH0_ADDRESS
|
|
EOF
|
|
#
|
|
# Clear status on start
|
|
#
|
|
if [ $COMMAND = start ]; then
|
|
for interface in eth0 eth1; do
|
|
echo 0 > ${VARDIR}/$interface.status
|
|
done
|
|
fi
|
|
#
|
|
# Run LSM -- by default, it forks into the background
|
|
#
|
|
/usr/local/sbin/lsm /etc/lsm/lsm.conf >> /var/log/lsm
|
|
}</programlisting>This function configures and starts <ulink
|
|
url="MultiISP.html#lsm">lsm</ulink>.</para>
|
|
</section>
|
|
|
|
<section id="masq">
|
|
<title>/etc/shorewall/masq</title>
|
|
|
|
<para><programlisting>#INTERFACE SOURCE ADDRESS PROTO
|
|
|
|
?COMMENT Use the SMC's local net address when communicating with that net
|
|
|
|
COMB_IF:10.1.10.0/24 0.0.0.0/0 %{SMC_ADDR}
|
|
|
|
?COMMENT Masquerade Local Network
|
|
|
|
COMB_IF !70.90.191.120/29 70.90.191.121 ; -m statistic --mode random --probability 0.50
|
|
COMB_IF !70.90.191.120/29 70.90.191.123
|
|
COMC_IF 0.0.0.0/0
|
|
#INT_IF:172.20.1.15 172.20.1.0/24 172.20.1.254
|
|
|
|
br0 70.90.191.120/29 70.90.191.121 tcp 80
|
|
</programlisting>I split connections out of COMB_IF between the two IP
|
|
addresses configured on the interface.</para>
|
|
</section>
|
|
|
|
<section>
|
|
<title>/etc/shorewall/conntrack</title>
|
|
|
|
<para><programlisting>?FORMAT 2
|
|
#ACTION SOURCE DEST PROTO DPORT SPORT
|
|
#
|
|
DROP net - udp 3551
|
|
NOTRACK net - tcp 23
|
|
NOTRACK loc 172.20.1.255 udp
|
|
NOTRACK loc 255.255.255.255 udp
|
|
NOTRACK $FW 255.255.255.255 udp
|
|
NOTRACK $FW 172.20.1.255 udp
|
|
NOTRACK $FW 70.90.191.127 udp
|
|
NOTRACK net:192.88.99.1 -
|
|
NOTRACK $FW 192.88.99.1
|
|
|
|
?if $AUTOHELPERS
|
|
?if __CT_TARGET && __AMANDA_HELPER
|
|
CT:helper:amanda all - udp 10080
|
|
?endif
|
|
?if __CT_TARGET && __FTP_HELPER
|
|
CT:helper:ftp all - tcp 21
|
|
?endif
|
|
?if __CT_TARGET && __H323_HELPER
|
|
CT:helper:RAS all - udp 1719
|
|
CT:helper:Q.931 all - tcp 1720
|
|
?endif
|
|
?if __CT_TARGET && __IRC_HELPER
|
|
CT:helper:irc all - tcp 6667
|
|
?endif
|
|
?if __CT_TARGET && __NETBIOS_NS_HELPER
|
|
CT:helper:netbios-ns all - udp 137
|
|
?endif
|
|
?if __CT_TARGET && __PPTP_HELPER
|
|
CT:helper:pptp all - tcp 1729
|
|
?endif
|
|
?if __CT_TARGET && __SANE_HELPER
|
|
CT:helper:sane all - tcp 6566
|
|
?endif
|
|
#?if __CT_TARGET && __SIP_HELPER
|
|
#CT:helper:sip all - udp 5060
|
|
#?endif
|
|
?if __CT_TARGET && __SNMP_HELPER
|
|
CT:helper:snmp all - udp 161
|
|
?endif
|
|
?if __CT_TARGET && __TFTP_HELPER
|
|
CT:helper:tftp all - udp 69
|
|
?endif
|
|
?endif
|
|
</programlisting>This file omits the 6to4 traffic originating from 6to4 relays
|
|
as well as broadcast traffic (which Netfilter doesn't handle).</para>
|
|
</section>
|
|
|
|
<section>
|
|
<title>/etc/shorewall/providers</title>
|
|
|
|
<para><programlisting>#NAME NUMBER MARK DUPLICATE INTERFACE GATEWAY OPTIONS COPY
|
|
?IF $STATISTICAL
|
|
ComcastB 1 0x10000 - COMB_IF 70.90.191.126 loose,load=0.66666667,fallback
|
|
ComcastC 2 0x20000 - COMC_IF detect loose,load=0.33333333
|
|
?ELSE
|
|
ComcastB 1 0x10000 - COMB_IF 70.90.191.126 nohostroute,loose,balance=2
|
|
ComcastC 2 0x20000 - COMC_IF detect nohostroute,loose,balance
|
|
?ENDIF
|
|
?IF $PROXY && ! $SQUID2
|
|
TProxy 3 - - lo - tproxy
|
|
?ENDIF
|
|
root@gateway:/etc/shorewall#
|
|
</programlisting>See the <ulink url="???">Multi-ISP article</ulink> for an
|
|
explaination of the multi-ISP aspects of this configuration.</para>
|
|
</section>
|
|
|
|
<section id="proxyarp">
|
|
<title>/etc/shorewall/proxyarp</title>
|
|
|
|
<para><programlisting><empty></programlisting>As mentioned <link
|
|
linkend="interfaces">above</link>, I set the proxyarp on the associated
|
|
external interface instead of defining proxy ARP in this file.</para>
|
|
</section>
|
|
|
|
<section id="restored">
|
|
<title>/etc/shorewall/restored</title>
|
|
|
|
<para><programlisting>if [ -z "$(ps ax | grep 'lsm ' | grep -v 'grep ' )" ]; then
|
|
start_lsm
|
|
fi
|
|
|
|
chmod 744 ${VARDIR}/state</programlisting>If lsm isn't running then start it.
|
|
Make the state file world-readable.</para>
|
|
</section>
|
|
|
|
<section id="rtrules">
|
|
<title>/etc/shorewall/rtrules</title>
|
|
|
|
<para><programlisting>#SOURCE DEST PROVIDER PRIORITY
|
|
70.90.191.121,\
|
|
70.90.191.123 - ComcastB 1000
|
|
&COMC_IF - ComcastC 1000
|
|
br0 - ComcastB 11000
|
|
172.20.1.191 - ComcastB 1000</programlisting>These
|
|
entries simply ensure that outgoing traffic uses the correct
|
|
interface.</para>
|
|
</section>
|
|
|
|
<section id="routestopped">
|
|
<title>/etc/shorewall/stoppedrules</title>
|
|
|
|
<para><programlisting>#TARGET HOST(S) DEST PROTO DPORT SPORT
|
|
ACCEPT INT_IF:172.20.1.0/24 $FW
|
|
NOTRACK COMB_IF - 41
|
|
NOTRACK $FW COMB_IF 41
|
|
ACCEPT COMB_IF $FW 41
|
|
ACCEPT COMC_IF $FW udp 67:68</programlisting>Keep
|
|
the lights on while Shorewall is stopped.</para>
|
|
</section>
|
|
|
|
<section id="rules">
|
|
<title>/etc/shorewall/rules</title>
|
|
|
|
<para><programlisting>################################################################################################################################################################################################
|
|
#ACTION SOURCE DEST PROTO DPORT SPORT ORIGDEST RATE USER MARK CONNLIMIT TIME HEADERS SWITCH
|
|
?if $VERSION < 40500
|
|
?SHELL echo " ERROR: Shorewall version is too low" >&2; exit 1
|
|
?endif
|
|
|
|
?begin perl
|
|
1;
|
|
?end perl
|
|
|
|
?SECTION ALL
|
|
|
|
#ACCEPT net:smc.shorewall.net $FW
|
|
#RST(LOG) all all
|
|
|
|
?SECTION ESTABLISHED
|
|
|
|
#SSH(REJECT) net loc:1.2.3.4 { time=timestart=18:48 }
|
|
|
|
?SECTION RELATED
|
|
ACCEPT all dmz:70.90.191.125 tcp 61001:62000 { helper=ftp }
|
|
ACCEPT dmz all tcp { helper=ftp }
|
|
ACCEPT all net tcp { helper=ftp }
|
|
ACCEPT all all icmp
|
|
RST(ACCEPT) all all tcp
|
|
ACCEPT dmz dmz
|
|
ACCEPT $FW all
|
|
|
|
?SECTION INVALID
|
|
DROP net all
|
|
?SECTION UNTRACKED
|
|
|
|
ACCEPT net:192.88.99.1 $FW 41
|
|
tarpit net all tcp 23
|
|
|
|
Broadcast(ACCEPT)\
|
|
all $FW
|
|
ACCEPT all $FW udp
|
|
CONTINUE loc $FW
|
|
CONTINUE $FW all
|
|
|
|
?SECTION NEW
|
|
|
|
DNSAmp(ACCEPT) loc fw
|
|
REJECT:$LOG loc net tcp 25 #Stop direct loc->net SMTP (Comcast uses submission).
|
|
REJECT:$LOG loc net udp 1025:1031 #MS Messaging
|
|
|
|
?COMMENT Stop NETBIOS crap
|
|
|
|
REJECT all net tcp 137,445
|
|
REJECT all net udp 137:139
|
|
|
|
?COMMENT Disallow port 333
|
|
|
|
REJECT all net tcp 3333
|
|
|
|
?COMMENT Stop Teredo
|
|
|
|
REJECT all net udp 3544
|
|
|
|
?COMMENT Stop my idiotic work laptop from sending to the net with an HP source IP address
|
|
|
|
{ action=DROP, source=loc:!172.20.0.0/22, dest=net } #
|
|
|
|
?COMMENT
|
|
|
|
#dropInvalid net all tcp
|
|
################################################################################################################################################################################################
|
|
# Local network to DMZ
|
|
#
|
|
DNAT loc dmz:70.90.191.125 tcp www - 70.90.191.123
|
|
ACCEPT loc dmz tcp ssh,smtp,465,548,587,www,ftp,imaps,https,5901:5903
|
|
ACCEPT loc dmz udp 3478:3479,33434:33524
|
|
################################################################################################################################################################################################
|
|
# SMC network to DMZ
|
|
#
|
|
ACCEPT smc dmz tcp ssh,smtp,465,587,www,ftp,imaps,https,5901:5903
|
|
ACCEPT smc dmz udp 33434:33524
|
|
################################################################################################################################################################################################
|
|
# SMC network to LOC
|
|
#
|
|
################################################################################################################################################################################################
|
|
# Local Network to Firewall
|
|
#
|
|
|
|
?IF $SQUID2
|
|
REDIRECT loc 3128 tcp 80 {origdest="!172.20.1.0/24,70.90.191.120/29,155.98.64.80,81.19.16.0/21,10.1.10.1"}
|
|
?ENDIF
|
|
|
|
ACCEPT loc fw udp 53,111,123,177,192,631,1024:
|
|
SMB(ACCEPT) loc fw
|
|
ACCEPT loc fw tcp 22,53,80,111,229,548,2049,3000,32765:61000
|
|
ACCEPT loc fw tcp 3128
|
|
mDNS(ACCEPT) loc fw
|
|
ACCEPT loc fw tcp 5001
|
|
|
|
ACCEPT loc:172.20.2.149 fw tcp 3551 #APCUPSD
|
|
|
|
################################################################################################################################################################################################
|
|
# SMC Network to Firewall
|
|
#
|
|
ACCEPT smc fw udp 53,111,123,177,192,631,1024:
|
|
SMB(ACCEPT) smc fw
|
|
ACCEPT smc fw tcp 22,53,111,548,2049,3000,3128,32765:32768,49152
|
|
mDNS(ACCEPT) smc fw
|
|
################################################################################################################################################################################################
|
|
# SMC Network to multiple destinations
|
|
#
|
|
Ping(ACCEPT) smc dmz,fw
|
|
################################################################################################################################################################################################
|
|
# Local Network to Internet
|
|
#REJECT:info loc net tcp 80,443
|
|
################################################################################################################################################################################################
|
|
# Local Network to multiple destinations
|
|
#
|
|
Ping(ACCEPT) loc dmz,fw
|
|
################################################################################################################################################################################################
|
|
# Internet to ALL -- drop NewNotSyn packets
|
|
#
|
|
dropNotSyn net fw,loc,smc tcp
|
|
AutoBL(SSH,60,-,-,-,-,$LOG)\
|
|
net all tcp 22
|
|
################################################################################################################################################################################################
|
|
# Internet to DMZ
|
|
#
|
|
ACCEPT net dmz udp 33434:33454
|
|
ACCEPT net dmz tcp 25 - - smtp:2/min:4,mail:60/min:100
|
|
DNAT- net 70.90.191.125 tcp https - 70.90.191.123
|
|
DNAT- net 70.90.191.125 tcp http - 70.90.191.123
|
|
DNAT- all 172.20.2.44 tcp ssh - 70.90.191.123
|
|
ACCEPT net dmz:70.90.191.122 tcp https,imaps
|
|
ACCEPT net dmz:70.90.191.124 tcp http,https,465,587,imaps
|
|
ACCEPT net dmz:70.90.191.125 tcp http,ftp
|
|
Mirrors(ACCEPT:none)\ #Continuation test
|
|
net dmz tcp 873
|
|
Ping(ACCEPT) net dmz
|
|
DROP net dmz tcp http,https
|
|
################################################################################################################################################################################################
|
|
#
|
|
# UPnP
|
|
#
|
|
ACCEPT loc fw udp 1900
|
|
forwardUPnP net loc
|
|
#
|
|
# Silently Handle common probes
|
|
#
|
|
REJECT net loc tcp www,ftp,https
|
|
DROP net loc icmp 8
|
|
################################################################################################################################################################################################
|
|
# DMZ to DMZ
|
|
#
|
|
################################################################################################################################################################################################
|
|
DNAT dmz dmz:70.90.191.125:80 tcp 80 - 70.90.191.121
|
|
# DMZ to Internet
|
|
#
|
|
ACCEPT dmz net udp ntp,domain
|
|
ACCEPT dmz net tcp domain,echo,ftp,ssh,smtp,whois,www,81,nntp,https,993,465,587,2401,2702,2703,5901,8080,9418,11371
|
|
#
|
|
# Some FTP clients seem prone to sending the PORT command split over two packets. This prevents the FTP connection tracking
|
|
# code from processing the command and setting up the proper expectation
|
|
# The following rule allows active FTP to work in these cases
|
|
# but logs the connection so I can keep an eye on this potential security hole.
|
|
#
|
|
ACCEPT:$LOG dmz net tcp 1024: 20
|
|
|
|
Ping(ACCEPT) dmz all
|
|
################################################################################################################################################################################################
|
|
# DMZ to fw
|
|
#
|
|
DNS(ACCEPT) dmz $FW
|
|
HTTP(ACCEPT) dmz $FW
|
|
Ping(ACCEPT) dmz $FW
|
|
################################################################################################################################################################################################
|
|
# Internet to Firewall
|
|
#
|
|
|
|
REJECT net fw tcp www,ftp,https
|
|
ACCEPT net fw udp 3478:3479,33434:33454
|
|
ACCEPT net fw tcp 22 - - s:ssh:1/min:3
|
|
ACCEPT net fw tcp 51413
|
|
?COMMENT IPv6 tunnel ping
|
|
|
|
ACCEPT net fw:70.90.191.121,70.90.191.122/31\
|
|
icmp 8
|
|
ACCEPT net:COMC_IF fw icmp 8
|
|
|
|
?COMMENT
|
|
|
|
################################################################################################################################################################################################
|
|
# Firewall to DMZ
|
|
#
|
|
ACCEPT fw dmz tcp www,ftp,ssh,smtp,https,465,587,993,3128,5901
|
|
REJECT fw dmz udp 137:139
|
|
Ping(ACCEPT) fw dmz
|
|
################################################################################################################################################################################################
|
|
# Firewall to NET
|
|
#
|
|
DNS(ACCEPT) fw net
|
|
NTP(ACCEPT) fw net
|
|
DNAT- fw 172.20.1.254:3128 tcp 80 - - - !:proxy
|
|
ACCEPT+ fw net tcp 43,80,443,3466 - - - -
|
|
ACCEPT fw net tcp 3128 - - - !:proxy
|
|
FTP(ACCEPT) fw net - - - - - proxy
|
|
Git(ACCEPT) fw net - - - - - teastep
|
|
ACCEPT fw net tcp 22
|
|
NNTP(ACCEPT) fw net
|
|
Ping(ACCEPT) fw net
|
|
ACCEPT fw net udp 33434:33524
|
|
#ACCEPT:info fw net - - - - - root
|
|
ACCEPT fw net tcp 25,143,993 - - - teastep
|
|
################################################################################################################################################################################################
|
|
#
|
|
?COMMENT Freenode Probes
|
|
DROP net:\
|
|
82.96.96.3,\
|
|
85.190.0.3 any!loc,smc
|
|
?COMMENT
|
|
################################################################################################################################################################################################
|
|
</programlisting></para>
|
|
</section>
|
|
|
|
<section id="started">
|
|
<title>/etc/shorewall/started</title>
|
|
|
|
<para><programlisting>if [ "$COMMAND" = start -o -z "$(ps ax | grep 'lsm ' | grep -v 'grep ' )" ]; then
|
|
start_lsm
|
|
fi
|
|
</programlisting>If lsm isn't running then start it.</para>
|
|
</section>
|
|
|
|
<section id="stopped">
|
|
<title>/etc/shorewall/stopped</title>
|
|
|
|
<para><programlisting>if [ "$COMMAND" = stop -o "$COMMAND" = clear ]; then
|
|
killall lsm 2> /dev/null
|
|
fi
|
|
|
|
chmod 744 ${VARDIR}/state</programlisting>Kill lsm if the command is stop or
|
|
clear. Make the state file world-readable.</para>
|
|
</section>
|
|
|
|
<section id="tunnels">
|
|
<title>/etc/shorewall/tunnels</title>
|
|
|
|
<para><programlisting>#TYPE ZONE GATEWAY GATEWAY
|
|
# ZONE
|
|
6to4 net 216.218.226.238
|
|
6to4 net 192.88.99.1
|
|
</programlisting></para>
|
|
</section>
|
|
</section>
|
|
</article>
|