2004-02-14 19:06:39 +01:00
|
|
|
<?xml version="1.0" encoding="UTF-8"?>
|
2008-07-07 22:22:09 +02:00
|
|
|
<!DOCTYPE article PUBLIC "-//OASIS//DTD DocBook XML V4.4//EN"
|
|
|
|
"http://www.oasis-open.org/docbook/xml/4.4/docbookx.dtd">
|
2004-02-14 19:06:39 +01:00
|
|
|
<article>
|
|
|
|
<!--$Id$-->
|
|
|
|
|
|
|
|
<articleinfo>
|
|
|
|
<title>Shorewall Blacklisting Support</title>
|
|
|
|
|
|
|
|
<authorgroup>
|
|
|
|
<author>
|
|
|
|
<firstname>Tom</firstname>
|
|
|
|
|
|
|
|
<surname>Eastep</surname>
|
|
|
|
</author>
|
|
|
|
</authorgroup>
|
|
|
|
|
2006-07-07 03:04:16 +02:00
|
|
|
<pubdate><?dbtimestamp format="Y/m/d"?></pubdate>
|
2004-02-14 19:06:39 +01:00
|
|
|
|
|
|
|
<copyright>
|
2006-03-23 17:47:07 +01:00
|
|
|
<year>2002-2006</year>
|
2004-02-14 19:06:39 +01:00
|
|
|
|
|
|
|
<holder>Thomas M. Eastep</holder>
|
|
|
|
</copyright>
|
|
|
|
|
|
|
|
<legalnotice>
|
|
|
|
<para>Permission is granted to copy, distribute and/or modify this
|
|
|
|
document under the terms of the GNU Free Documentation License, Version
|
|
|
|
1.2 or any later version published by the Free Software Foundation; with
|
|
|
|
no Invariant Sections, with no Front-Cover, and with no Back-Cover
|
|
|
|
Texts. A copy of the license is included in the section entitled
|
2004-10-24 23:10:47 +02:00
|
|
|
<quote><ulink url="GnuCopyright.htm">GNU Free Documentation
|
|
|
|
License</ulink></quote>.</para>
|
2004-02-14 19:06:39 +01:00
|
|
|
</legalnotice>
|
|
|
|
</articleinfo>
|
|
|
|
|
2007-06-28 17:09:37 +02:00
|
|
|
<section id="Intro">
|
2004-02-14 19:06:39 +01:00
|
|
|
<title>Introduction</title>
|
|
|
|
|
|
|
|
<para>Shorewall supports two different forms of blacklisting; static and
|
2005-08-29 01:37:51 +02:00
|
|
|
dynamic. The BLACKLISTNEWONLY option in /etc/shorewall/shorewall.conf
|
|
|
|
controls the degree of blacklist filtering:</para>
|
2004-02-14 19:06:39 +01:00
|
|
|
|
|
|
|
<orderedlist>
|
|
|
|
<listitem>
|
2009-02-28 04:45:43 +01:00
|
|
|
<para>BLACKLISTNEWONLY=No -- All incoming packets are checked against
|
|
|
|
the blacklist. New blacklist entries can be used to terminate existing
|
|
|
|
connections.</para>
|
2004-02-14 19:06:39 +01:00
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>BLACKLISTNEWONLY=Yes -- The blacklists are only consulted for
|
|
|
|
new connection requests. Blacklists may not be used to terminate
|
|
|
|
existing connections. Only the source address is checked against the
|
|
|
|
blacklists.</para>
|
|
|
|
</listitem>
|
|
|
|
</orderedlist>
|
|
|
|
|
2004-03-17 16:03:46 +01:00
|
|
|
<important>
|
|
|
|
<para><emphasis role="bold">Only the source address is checked against
|
|
|
|
the blacklists</emphasis>. Blacklists only stop blacklisted hosts from
|
|
|
|
connecting to you — they do not stop you or your users from connecting
|
|
|
|
to blacklisted hosts .</para>
|
|
|
|
</important>
|
|
|
|
|
|
|
|
<important>
|
2005-08-29 01:37:51 +02:00
|
|
|
<para><emphasis role="bold">Dynamic Shorewall blacklisting is not
|
|
|
|
appropriate for blacklisting 1,000s of different addresses. Static
|
|
|
|
Blacklisting can handle large blacklists but only if you use
|
|
|
|
ipsets</emphasis>. Without ipsets, the blacklists will take forever to
|
2007-01-18 16:30:55 +01:00
|
|
|
load, and will have a very negative effect on firewall
|
2005-08-29 01:37:51 +02:00
|
|
|
performance.</para>
|
2004-03-17 16:03:46 +01:00
|
|
|
</important>
|
2004-02-14 19:06:39 +01:00
|
|
|
</section>
|
|
|
|
|
2007-06-28 17:09:37 +02:00
|
|
|
<section id="Static">
|
2004-02-14 19:06:39 +01:00
|
|
|
<title>Static Blacklisting</title>
|
|
|
|
|
|
|
|
<para>Shorewall static blacklisting support has the following
|
|
|
|
configuration parameters:</para>
|
|
|
|
|
|
|
|
<itemizedlist>
|
|
|
|
<listitem>
|
|
|
|
<para>You specify whether you want packets from blacklisted hosts
|
|
|
|
dropped or rejected using the BLACKLIST_DISPOSITION setting in <ulink
|
2007-07-04 02:10:35 +02:00
|
|
|
url="manpages/shorewall.conf.html"><filename>/etc/shorewall/shorewall.conf</filename>.</ulink></para>
|
2004-02-14 19:06:39 +01:00
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>You specify whether you want packets from blacklisted hosts
|
|
|
|
logged and at what syslog level using the BLACKLIST_LOGLEVEL setting
|
2004-10-24 23:10:47 +02:00
|
|
|
in <ulink
|
2007-07-04 02:10:35 +02:00
|
|
|
url="manpages/shorewall.conf.html"><filename>/etc/shorewall/shorewall.conf</filename></ulink>.</para>
|
2004-02-14 19:06:39 +01:00
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>You list the IP addresses/subnets that you wish to blacklist in
|
2004-10-24 23:10:47 +02:00
|
|
|
<ulink
|
2007-07-04 02:10:35 +02:00
|
|
|
url="manpages/shorewall-blacklist.html"><filename>/etc/shorewall/blacklist</filename></ulink>.
|
2005-08-29 01:37:51 +02:00
|
|
|
You may also specify PROTOCOL and Port numbers/Service names in the
|
|
|
|
blacklist file.</para>
|
2004-02-14 19:06:39 +01:00
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>You specify the interfaces whose incoming packets you want
|
|
|
|
checked against the blacklist using the <quote>blacklist</quote>
|
2004-10-24 23:10:47 +02:00
|
|
|
option in <ulink
|
2007-07-04 02:10:35 +02:00
|
|
|
url="manpages/shorewall-interfaces.html"><filename>/etc/shorewall/interfaces</filename></ulink>.</para>
|
2004-02-14 19:06:39 +01:00
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
2004-10-24 23:10:47 +02:00
|
|
|
<para>The black list is refreshed from
|
|
|
|
<filename>/etc/shorewall/blacklist</filename> by the <quote><ulink
|
|
|
|
url="starting_and_stopping_shorewall.htm"><command>shorewall
|
2004-02-14 19:06:39 +01:00
|
|
|
refresh</command></ulink></quote> command.</para>
|
|
|
|
</listitem>
|
|
|
|
</itemizedlist>
|
2004-10-24 23:10:47 +02:00
|
|
|
|
|
|
|
<para>Users with a large static black list may want to set the
|
|
|
|
DELAYBLACKLISTLOAD option in shorewall.conf (added in Shorewall version
|
|
|
|
2.2.0). When DELAYBLACKLISTLOAD=Yes, Shorewall will enable new connections
|
|
|
|
before loading the blacklist rules. While this may allow connections from
|
|
|
|
blacklisted hosts to slip by during construction of the blacklist, it can
|
|
|
|
substantially reduce the time that all new connections are disabled during
|
|
|
|
"shorewall [re]start".</para>
|
2005-08-29 01:37:51 +02:00
|
|
|
|
|
|
|
<para>Beginning with Shorewall 2.4.0, you can use <ulink
|
|
|
|
url="ipsets.html">ipsets</ulink> to define your static blacklist. Here's
|
|
|
|
an example:</para>
|
|
|
|
|
|
|
|
<programlisting>#ADDRESS/SUBNET PROTOCOL PORT
|
|
|
|
+Blacklistports[dst]
|
|
|
|
+Blacklistnets[src,dst]
|
|
|
|
+Blacklist[src,dst]
|
|
|
|
#LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE</programlisting>
|
|
|
|
|
|
|
|
<para>In this example, there is a portmap ipset
|
|
|
|
<emphasis>Blacklistports</emphasis> that blacklists all traffic with
|
2007-01-18 16:30:55 +01:00
|
|
|
destination ports included in the ipset. There are also
|
2005-08-29 01:37:51 +02:00
|
|
|
<emphasis>Blacklistnets</emphasis> (type <emphasis>nethash</emphasis>) and
|
|
|
|
<emphasis>Blacklist</emphasis> (type <emphasis>iphash</emphasis>) ipsets
|
|
|
|
that allow blacklisting networks and individual IP addresses. Note that
|
|
|
|
[src,dst] is specified so that individual entries in the sets can be bound
|
|
|
|
to other portmap ipsets to allow blacklisting (<emphasis>source
|
|
|
|
address</emphasis>, <emphasis>destination port</emphasis>) combinations.
|
|
|
|
For example:</para>
|
|
|
|
|
|
|
|
<programlisting>ipset -N SMTP portmap --from 1 --to 31
|
|
|
|
ipset -A SMTP 25
|
|
|
|
ipset -A Blacklist 206.124.146.177
|
|
|
|
ipset -B Blacklist 206.124.146.177 -b SMTP</programlisting>
|
|
|
|
|
|
|
|
<para>This will blacklist SMTP traffic from host 206.124.146.177.</para>
|
2004-02-14 19:06:39 +01:00
|
|
|
</section>
|
|
|
|
|
2007-06-28 17:09:37 +02:00
|
|
|
<section id="Dynamic">
|
2004-02-14 19:06:39 +01:00
|
|
|
<title>Dynamic Blacklisting</title>
|
|
|
|
|
2010-02-02 20:13:44 +01:00
|
|
|
<para>Beginning with Shorewall 4.4.7, dynamic blacklisting is enabled by
|
|
|
|
setting DYNAMIC_BLACKLIST=Yes in <filename>shorewall.conf</filename>.
|
|
|
|
Prior to that release, the feature is always enabled.</para>
|
|
|
|
|
|
|
|
<para>Once enabled, dynamic blacklisting doesn't use any configuration
|
|
|
|
parameters but is rather controlled using /sbin/shorewall[-lite]
|
|
|
|
commands:</para>
|
2004-02-14 19:06:39 +01:00
|
|
|
|
|
|
|
<itemizedlist>
|
|
|
|
<listitem>
|
2004-10-24 23:10:47 +02:00
|
|
|
<para>drop <emphasis><ip address list></emphasis> - causes
|
2004-02-14 19:06:39 +01:00
|
|
|
packets from the listed IP addresses to be silently dropped by the
|
|
|
|
firewall.</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
2004-10-24 23:10:47 +02:00
|
|
|
<para>reject <emphasis><ip address list></emphasis> - causes
|
|
|
|
packets from the listed IP addresses to be rejected by the
|
|
|
|
firewall.</para>
|
2004-02-14 19:06:39 +01:00
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
2004-10-24 23:10:47 +02:00
|
|
|
<para>allow <emphasis><ip address list></emphasis> - re-enables
|
|
|
|
receipt of packets from hosts previously blacklisted by a
|
|
|
|
<emphasis>drop</emphasis> or <emphasis>reject</emphasis>
|
|
|
|
command.</para>
|
2004-02-14 19:06:39 +01:00
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>save - save the dynamic blacklisting configuration so that it
|
|
|
|
will be automatically restored the next time that the firewall is
|
|
|
|
restarted.</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
2004-10-24 23:10:47 +02:00
|
|
|
<para>show dynamic - displays the dynamic blacklisting
|
|
|
|
configuration.</para>
|
2004-02-14 19:06:39 +01:00
|
|
|
</listitem>
|
2006-03-23 17:47:07 +01:00
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>logdrop <emphasis><ip address list></emphasis> - causes
|
|
|
|
packets from the listed IP addresses to be dropped and logged by the
|
|
|
|
firewall. Logging will occur at the level specified by the
|
|
|
|
BLACKLIST_LOGLEVEL setting at the last [re]start (logging will be at
|
|
|
|
the 'info' level if no BLACKLIST_LOGLEVEL was given).</para>
|
|
|
|
</listitem>
|
|
|
|
|
|
|
|
<listitem>
|
|
|
|
<para>logreject <emphasis><ip address list></emphasis> - causes
|
|
|
|
packets from the listed IP addresses to be rejected and logged by the
|
|
|
|
firewall. Logging will occur at the level specified by the
|
|
|
|
BLACKLIST_LOGLEVEL setting at the last [re]start (logging will be at
|
|
|
|
the 'info' level if no BLACKLIST_LOGLEVEL was given).</para>
|
|
|
|
</listitem>
|
|
|
|
</itemizedlist>
|
|
|
|
|
2004-10-24 23:10:47 +02:00
|
|
|
<para>Dynamic blacklisting is not dependent on the
|
|
|
|
<quote>blacklist</quote> option in
|
|
|
|
<filename>/etc/shorewall/interfaces</filename>.</para>
|
2004-02-14 19:06:39 +01:00
|
|
|
|
2007-06-28 17:09:37 +02:00
|
|
|
<example id="Ignore">
|
2004-02-14 19:06:39 +01:00
|
|
|
<title>Ignore packets from a pair of systems</title>
|
|
|
|
|
2006-06-13 02:07:00 +02:00
|
|
|
<programlisting> <command>shorewall[-lite] drop 192.0.2.124 192.0.2.125</command></programlisting>
|
2004-02-14 19:06:39 +01:00
|
|
|
|
|
|
|
<para>Drops packets from hosts 192.0.2.124 and 192.0.2.125</para>
|
|
|
|
</example>
|
|
|
|
|
2007-06-28 17:09:37 +02:00
|
|
|
<example id="Allow">
|
2005-05-28 00:49:26 +02:00
|
|
|
<title>Re-enable packets from a system</title>
|
2004-02-14 19:06:39 +01:00
|
|
|
|
2006-06-13 02:07:00 +02:00
|
|
|
<programlisting> <command>shorewall[-lite] allow 192.0.2.125</command></programlisting>
|
2004-02-14 19:06:39 +01:00
|
|
|
|
|
|
|
<para>Re-enables traffic from 192.0.2.125.</para>
|
|
|
|
</example>
|
2009-10-06 19:20:09 +02:00
|
|
|
|
|
|
|
<example>
|
|
|
|
<title>Displaying the Dynamic Blacklist</title>
|
|
|
|
|
|
|
|
<programlisting> <command>shorewall show dynamic</command></programlisting>
|
|
|
|
|
|
|
|
<para>Displays the 'dynamic' chain which contains rules for the dynamic
|
|
|
|
blacklist. The <firstterm>source</firstterm> column contains the set of
|
|
|
|
blacklisted addresses.</para>
|
|
|
|
</example>
|
2004-02-14 19:06:39 +01:00
|
|
|
</section>
|
2007-07-04 02:10:35 +02:00
|
|
|
</article>
|