source: hybrid/branches/releng-11/nanobsd/files/etc/pf.hybrid.conf@ 13757

Last change on this file since 13757 was 13724, checked in by rick, 8 years ago

ruleset does not allow empty port definitions.

File size: 4.8 KB
RevLine 
[10446]1#
[10580]2# Wireless Leiden PF firewall configuration for (iLeiden) Proxy Setup.
[10446]3#
[10580]4# N.B: The features points are shared between all firewall configurations to
5# make comparisions more easy to do
6#
[10446]7# 1) It supports outgoing NAT to specified ports. The so called iLeiden setup.
8# 3) It protects the private MGMT network from WL requests to it's own services.
9# 4) It portects the $ext_if by only allowing an subset of services.
10# 5) The Wireless Leiden facing interfaces are not firewalled.
[10448]11# 6) WL Captive Portal Support for interfaces who needs it.
12# 7) Optional: Exposure of WL services to the outside
[10579]13# 9) Protect the Wireless Network from junk traffic.
[10580]14#
15# Rick van der Zwet <rick@wirelessleiden.nl>
16#
[10446]17
[13160]18# Standard port allow listings for external services
[13700]19allow_ext_in_tcp="1022"
[10448]20
[13700]21allow_ext_out_tcp = "domain, http, https"
22allow_ext_out_udp = "domain, ntp"
[13160]23
[10610]24
[10448]25# Default configuration for ALIX2 with vr0 as external interface and wlan0 as
[13233]26# the public accesspoint in iLeiden setup, aliases on external interface OK.
[11543]27ext_if="vr0"
28inet_if="vr0"
[10448]29captive_portal_interfaces="wlan0"
30publicnat="http,https"
[10520]31masterip="127.0.0.1"
[10589]32# For an traditional proxy setup set (no iLeiden clients!), uncomment:
[10448]33#publicnat=0
34
[10610]35# Global standards. NOT to be edited.
36wl_net="172.16.0.0/12"
[10842]37private="{ 10.0.0.0/8, 192.168.0.0/16 }"
[10610]38ileiden_ports="http,https"
39
[10446]40# Always be nice, and return the fact we are blocking the packets
41set block-policy return
42
[10448]43# Table used to authorized hosts (6)
44table <wlportal> persist counters
45
[10446]46# Do NOT allow NAT to the Private Network (3)
[10578]47no nat from $wl_net to $private
[10446]48
[13233]49# Nat the internet for iLeiden functionality allow for alias on vr0 (1)
[13694]50nat on $inet_if inet proto tcp from $wl_net to ! $wl_net port { $publicnat } -> ($inet_if:0)
[10578]51
[10448]52
53# Redirect user to captive portal they have not clicked OK yet (6)
[10610]54no rdr on { $captive_portal_interfaces } proto tcp from <wlportal> to !$wl_net port http
55rdr on { $captive_portal_interfaces } proto tcp from $wl_net to !$wl_net port http -> 172.31.255.1 port 8081
[10448]56
[10704]57# Load autogenerated entries, like the remote mappings (7)
58include "/etc/pf.hybrid.conf.local"
[10694]59
60# Make the device on WL find the proper gateway back (7)
61nat on ! $ext_if inet from any to $wl_net tagged SRV -> $masterip
62
63# Special allow rules for inbound piercing (7)
64pass in quick on $ext_if inet tagged SRV keep state
65
[10446]66# Localhost is considered safe (5)
67pass quick on lo0 all
68
69# By default all interfaces are open (5)
70pass all
71
[10579]72# By default deny all outgoing traffic to avoid systems spamming the network (9)
73block out on { $captive_portal_interfaces } from any to !$wl_net
74
75# Note: not even HTTPS traffic allowed for those who has not clicked OK yet (6)
[10610]76pass out on { $captive_portal_interfaces } proto tcp from <wlportal> to !$wl_net port { $publicnat } keep state
[10579]77
[10446]78# External interface is permissive (4)
[10997]79block on $ext_if inet from any to !$wl_net
[11543]80block on $inet_if inet from any to !$wl_net
[10446]81
[10842]82# Allow internal WL traffic on alias $ext_if interfaces (5)
83pass in quick on $ext_if from $wl_net to $wl_net
84pass out quick on $ext_if from $wl_net to $wl_net
85
[13160]86# Expose some local services for the external world (WWW) network (4)
[10610]87pass in on $ext_if inet proto tcp from any to $ext_if port { $allow_ext_in_tcp } keep state
[10446]88pass in on $ext_if inet proto icmp from any to $ext_if icmp-type { echoreq }
89
90# Packets going out are the ones to the internet with an certain limit (1)
[11543]91pass out on $inet_if inet proto tcp from $wl_net to any port { $publicnat } keep state \
[10446]92 (max-src-conn-rate 100/10, max-src-conn 10)
93
94# For proper functioning allow the local machine to initiate requests outside (4)
[10610]95pass out on $ext_if inet proto udp from $ext_if to any port { $allow_ext_out_udp } keep state
96pass out on $ext_if inet proto tcp from $ext_if to any port { $allow_ext_out_tcp } keep state
[11543]97pass out on $ext_if inet proto icmp from $ext_if to any icmp-type { echoreq, trace }
[10446]98
[11543]99# For proper functioning allow the local machine to initiate requests outside + vpn (4)
100pass out on $inet_if inet proto udp from $inet_if to any port { $allow_ext_out_udp } keep state
101pass out on $inet_if inet proto tcp from $inet_if to any port { $allow_ext_out_tcp } keep state
102pass out on $inet_if inet proto icmp from $inet_if to any icmp-type { echoreq, trace }
103
104# Uncomment to UDP traceroute from this host to start
105#pass out on $ext_if inet proto udp from $ext_if to any port 33434 >< 33464 keep state
106#pass out on $inet_if inet proto udp from $inet_if to any port 33434 >< 33464 keep state
107
[10446]108# Do not allow connections to the local MGNT LAN to start (3)
109block out on $ext_if from any to $private
110
111# Limited acess PRIVATE network to allow DHCP/DNS to function (3)
112pass out on $ext_if inet proto {udp, tcp} from $ext_if to $private port {domain} keep state
113
114# Uncomment to allow limited access to MGNT interfaces ON the private network (3)
115#pass out on $ext_if inet proto tcp from $ext_if to $private port {ssh, http, https} keep state
116
Note: See TracBrowser for help on using the repository browser.