summaryrefslogtreecommitdiffstats
path: root/etc/rc.firewall6
diff options
context:
space:
mode:
Diffstat (limited to 'etc/rc.firewall6')
-rw-r--r--etc/rc.firewall6257
1 files changed, 257 insertions, 0 deletions
diff --git a/etc/rc.firewall6 b/etc/rc.firewall6
new file mode 100644
index 0000000..df2d7a2
--- /dev/null
+++ b/etc/rc.firewall6
@@ -0,0 +1,257 @@
+############
+# Setup system for IPv6 firewall service.
+# $FreeBSD$
+
+# Suck in the configuration variables.
+if [ -z "${source_rc_confs_defined}" ]; then
+ if [ -r /etc/defaults/rc.conf ]; then
+ . /etc/defaults/rc.conf
+ source_rc_confs
+ elif [ -r /etc/rc.conf ]; then
+ . /etc/rc.conf
+ fi
+fi
+
+############
+# Define the firewall type in /etc/rc.conf. Valid values are:
+# open - will allow anyone in
+# client - will try to protect just this machine
+# simple - will try to protect a whole network
+# closed - totally disables IP services except via lo0 interface
+# UNKNOWN - disables the loading of firewall rules.
+# filename - will load the rules in the given filename (full path required)
+#
+# For ``client'' and ``simple'' the entries below should be customized
+# appropriately.
+
+############
+#
+# If you don't know enough about packet filtering, we suggest that you
+# take time to read this book:
+#
+# Building Internet Firewalls
+# Brent Chapman and Elizabeth Zwicky
+#
+# O'Reilly & Associates, Inc
+# ISBN 1-56592-124-0
+# http://www.ora.com/
+#
+# For a more advanced treatment of Internet Security read:
+#
+# Firewalls & Internet Security
+# Repelling the wily hacker
+# William R. Cheswick, Steven M. Bellowin
+#
+# Addison-Wesley
+# ISBN 0-201-6337-4
+# http://www.awl.com/
+#
+
+if [ -n "${1}" ]; then
+ ipv6_firewall_type="${1}"
+fi
+
+############
+# Set quiet mode if requested
+#
+case ${ipv6_firewall_quiet} in
+[Yy][Ee][Ss])
+ fw6cmd="/sbin/ip6fw -q"
+ ;;
+*)
+ fw6cmd="/sbin/ip6fw"
+ ;;
+esac
+
+############
+# Flush out the list before we begin.
+#
+${fw6cmd} -f flush
+
+############
+# If you just configured ipfw in the kernel as a tool to solve network
+# problems or you just want to disallow some particular kinds of traffic
+# then you will want to change the default policy to open. You can also
+# do this as your only action by setting the ipv6_firewall_type to ``open''.
+#
+# ${fw6cmd} add 65000 pass all from any to any
+
+############
+# Only in rare cases do you want to change these rules
+#
+${fw6cmd} add 100 pass all from any to any via lo0
+#
+# ND
+#
+# DAD
+${fw6cmd} add pass ipv6-icmp from ff02::/16 to ::
+${fw6cmd} add pass ipv6-icmp from :: to ff02::/16
+# RS, RA, NS, NA, redirect...
+${fw6cmd} add pass ipv6-icmp from fe80::/10 to fe80::/10
+${fw6cmd} add pass ipv6-icmp from fe80::/10 to ff02::/16
+
+
+# Prototype setups.
+#
+case ${ipv6_firewall_type} in
+[Oo][Pp][Ee][Nn])
+ ${fw6cmd} add 65000 pass all from any to any
+ ;;
+
+[Cc][Ll][Ii][Ee][Nn][Tt])
+ ############
+ # This is a prototype setup that will protect your system somewhat
+ # against people from outside your own network.
+ ############
+
+ # set these to your network and prefixlen and ip
+ #
+ # This needs more work
+ #
+ net="3ffe:505:2:1::"
+ prefixlen="64"
+ ip="3ffe:505:2:1::1"
+
+ # Allow any traffic to or from my own net.
+ ${fw6cmd} add pass all from ${ip} to ${net}/${prefixlen}
+ ${fw6cmd} add pass all from ${net}/${prefixlen} to ${ip}
+
+ # Allow TCP through if setup succeeded
+ ${fw6cmd} add pass tcp from any to any established
+
+ # Allow IP fragments to pass through
+ ${fw6cmd} add pass all from any to any frag
+
+ # Allow setup of incoming email
+ ${fw6cmd} add pass tcp from any to ${ip} 25 setup
+
+ # Allow setup of outgoing TCP connections only
+ ${fw6cmd} add pass tcp from ${ip} to any setup
+
+ # Disallow setup of all other TCP connections
+ ${fw6cmd} add deny tcp from any to any setup
+
+ # Allow DNS queries out in the world
+ ${fw6cmd} add pass udp from any 53 to ${ip}
+ ${fw6cmd} add pass udp from ${ip} to any 53
+
+ # Allow NTP queries out in the world
+ ${fw6cmd} add pass udp from any 123 to ${ip}
+ ${fw6cmd} add pass udp from ${ip} to any 123
+
+ # Everything else is denied by default, unless the
+ # IPFIREWALL_DEFAULT_TO_ACCEPT option is set in your kernel
+ # config file.
+ ;;
+
+[Ss][Ii][Mm][Pp][Ll][Ee])
+ ############
+ # This is a prototype setup for a simple firewall. Configure this
+ # machine as a named server and ntp server, and point all the machines
+ # on the inside at this machine for those services.
+ ############
+
+ # set these to your outside interface network and prefixlen and ip
+ oif="ed0"
+ onet="3ffe:505:2:1::"
+ oprefixlen="64"
+ oip="3ffe:505:2:1::1"
+
+ # set these to your inside interface network and prefixlen and ip
+ iif="ed1"
+ inet="3ffe:505:2:2::"
+ iprefixlen="64"
+ iip="3ffe:505:2:2::1"
+
+ # Stop spoofing
+ ${fw6cmd} add deny all from ${inet}/${iprefixlen} to any in via ${oif}
+ ${fw6cmd} add deny all from ${onet}/${oprefixlen} to any in via ${iif}
+
+ # Stop site-local on the outside interface
+ ${fw6cmd} add deny all from ff02::/16 to any via ${oif}
+ ${fw6cmd} add deny all from any to ff02::/16 via ${oif}
+
+ # Disallow "internal" addresses to appear on the wire.
+ ${fw6cmd} add deny all from ::ffff:0.0.0.0/96 to any via ${oif}
+ ${fw6cmd} add deny all from any to ::ffff:0.0.0.0/96 via ${oif}
+
+ # Disallow packets to malicious IPv4 compatible prefix.
+ ${fw6cmd} add deny all from ::224.0.0.0/100 to any via ${oif}
+ ${fw6cmd} add deny all from any to ::224.0.0.0/100 via ${oif}
+ ${fw6cmd} add deny all from ::127.0.0.0/104 to any via ${oif}
+ ${fw6cmd} add deny all from any to ::127.0.0.0/104 via ${oif}
+ ${fw6cmd} add deny all from ::0.0.0.0/104 to any via ${oif}
+ ${fw6cmd} add deny all from any to ::0.0.0.0/104 via ${oif}
+ ${fw6cmd} add deny all from ::255.0.0.0/104 to any via ${oif}
+ ${fw6cmd} add deny all from any to ::255.0.0.0/104 via ${oif}
+
+ ${fw6cmd} add deny all from ::0.0.0.0/96 to any via ${oif}
+ ${fw6cmd} add deny all from any to ::0.0.0.0/96 via ${oif}
+
+ # Disallow packets to malicious 6to4 prefix.
+ ${fw6cmd} add deny all from 2002:e000::/20 to any via ${oif}
+ ${fw6cmd} add deny all from any to 2002:e000::/20 via ${oif}
+ ${fw6cmd} add deny all from 2002:7f00::/24 to any via ${oif}
+ ${fw6cmd} add deny all from any to 2002:7f00::/24 via ${oif}
+ ${fw6cmd} add deny all from 2002:0000::/24 to any via ${oif}
+ ${fw6cmd} add deny all from any to 2002:0000::/24 via ${oif}
+ ${fw6cmd} add deny all from 2002:ff00::/24 to any via ${oif}
+ ${fw6cmd} add deny all from any to 2002:ff00::/24 via ${oif}
+
+ ${fw6cmd} add deny all from 2002:0a00::/24 to any via ${oif}
+ ${fw6cmd} add deny all from any to 2002:0a00::/24 via ${oif}
+ ${fw6cmd} add deny all from 2002:ac10::/28 to any via ${oif}
+ ${fw6cmd} add deny all from any to 2002:ac10::/28 via ${oif}
+ ${fw6cmd} add deny all from 2002:c0a8::/32 to any via ${oif}
+ ${fw6cmd} add deny all from any to 2002:c0a8::/32 via ${oif}
+
+ ${fw6cmd} add deny all from ff05::/32 to any via ${oif}
+ ${fw6cmd} add deny all from any to ff05::/32 via ${oif}
+
+ # Allow TCP through if setup succeeded
+ ${fw6cmd} add pass tcp from any to any established
+
+ # Allow IP fragments to pass through
+ ${fw6cmd} add pass all from any to any frag
+
+ # Allow setup of incoming email
+ ${fw6cmd} add pass tcp from any to ${oip} 25 setup
+
+ # Allow access to our DNS
+ ${fw6cmd} add pass tcp from any to ${oip} 53 setup
+ ${fw6cmd} add pass udp from any to ${oip} 53
+ ${fw6cmd} add pass udp from ${oip} 53 to any
+
+ # Allow access to our WWW
+ ${fw6cmd} add pass tcp from any to ${oip} 80 setup
+
+ # Reject&Log all setup of incoming connections from the outside
+ ${fw6cmd} add deny log tcp from any to any in via ${oif} setup
+
+ # Allow setup of any other TCP connection
+ ${fw6cmd} add pass tcp from any to any setup
+
+ # Allow DNS queries out in the world
+ ${fw6cmd} add pass udp from any 53 to ${oip}
+ ${fw6cmd} add pass udp from ${oip} to any 53
+
+ # Allow NTP queries out in the world
+ ${fw6cmd} add pass udp from any 123 to ${oip}
+ ${fw6cmd} add pass udp from ${oip} to any 123
+
+ # RIPng
+ #${fw6cmd} add pass udp from fe80::/10 521 to ff02::9 521
+
+ # Everything else is denied by default, unless the
+ # IPFIREWALL_DEFAULT_TO_ACCEPT option is set in your kernel
+ # config file.
+ ;;
+
+[Uu][Nn][Kk][Nn][Oo][Ww][Nn])
+ ;;
+*)
+ if [ -r "${ipv6_firewall_type}" ]; then
+ ${fw6cmd} ${ipv6_firewall_flags} ${ipv6_firewall_type}
+ fi
+ ;;
+esac
OpenPOWER on IntegriCloud