need ipfw clarification
Bill Moran
wmoran at potentialtech.com
Fri Feb 4 13:40:19 PST 2005
I'm confusing natd forwarding with IPFW forwarding.
My apoligies for posting incorrect information, and thanks to Julian for
correcting me.
Julian Elischer <julian at elischer.org> wrote:
>
> Bill Moran wrote:
>
> >Duane Winner <dwinner-lists at att.net> wrote:
> >
> >
> >
> >>Thanks Roberto,
> >>
> >>Just to make sure I understand though, I only need to be concerned
> >>"forwarding" and "forward rules" if I'm setting up a multi-homed host
> >>(i.e., router), is this correct?
> >>
> >>
> >
> >It doesn't even apply then. IPFW forwarding forwards packets and rewrites
> >their IP headers to make one machine look like another. While this is
> >commonly used on firewalls, it's not the same thing as turning on
> >forwarding (i.e. routing between interfaces) and isn't required to set
> >up a multi-homed "router".
> >
>
>
> Actually that's not QUITE correct..
> ipfw forwarding works as it does because it does NOT rewrite any headers.
> The packet just shows up at the other place without any clue as to how
> it got there. :-)
>
> >
> >For example, I use IPFW forwarding so that my firewall forwards VNC
> >packets to my desktop, so outsiders can connect directly to my desktop
> >through the firewall.
> >
> >
> ipfw forwarding is actually two different services.
>
> What it does is different depending on whether the forwarding target is
> the local machine or
> is another machine.
>
> When forwarding to another machine, the unalterred packet is sent to
> that machine without
> alteration. If that other machine feels that the packet belongs
> elsewhere, it may send it on or
> even back.
>
> The second form is when the local machine is the target. The packet is
> sent to the socket listenning on
> the nominated port locally, regardless of what destination machine it is
> supposed to go to.
>
> If you use type 1 to forward to another machine then if the packet is
> not naturally destined for that
> machine, you may need the same rule (working in the second form) on
> that machine to make sure
> that it is used on that machine instead of being forwarded elsewhere.
>
> The neat part about local forwarding is that the local socket itself
> thinks it is on the intended destination
> machine so doing a getsockname() returns the address of the intended target.
> This makes proxying an absolutly simple process, as the sockaddr
> returned can be used directly to open
> a socket to the intended target..
>
>
> >
> >
> >>If I'm just using ipfw for single-host based firewall protection, then
> >>forwarding doesn't apply, right?
> >>
> >>
> >
> >That's correct.
> >
> >
> >
> >>Thanks again,
> >>Duane
> >>
> >>
> >>
> >>Roberto Nunnari wrote:
> >>
> >>
> >>
> >>>Hi Duane.
> >>>
> >>>I had the same problem.. With 5.2.1 I had working forward rules
> >>>and that were broke with 5.3
> >>>
> >>>after some fiddling I managed to have that work again.. just
> >>>add them to your kernel:
> >>>
> >>>options IPFIREWALL
> >>>options IPFIREWALL_DEFAULT_TO_ACCEPT
> >>>options IPFIREWALL_VERBOSE
> >>>options IPFIREWALL_FORWARD
> >>>
> >>>if you don't add them to your kernel, forwarding in ipfw will
> >>>be disabled.
> >>>
> >>>Ciao.
> >>>
> >>>
> >>>Duane Winner wrote:
> >>>
> >>>
> >>>
> >>>>Hello,
> >>>>
> >>>>I noticed that after enabling firewall in my kernel (5.3-release), my
> >>>>dmesg now gives me this:
> >>>>
> >>>>ipfw2 initialized, divert disabled, rule-based forwarding disabled,
> >>>>default to accept, logging limited to 5 packets/entry by default
> >>>>
> >>>>
> >>>>On 5.2.1, I used to get this:
> >>>>
> >>>>ipfw2 initialized, divert disabled, rule-based forwarding enabled,
> >>>>default to accept, logging disabled
> >>>>
> >>>>If both cases, I am adding this to my KERNEL config:
> >>>>
> >>>>options IPFIREWALL
> >>>>options IPFIREWALL_DEFAULT_TO_ACCEPT
> >>>>
> >>>>
> >>>>It seems that the major difference between 5.2.1 and 5.3 is that now
> >>>>rule-based forwarding is disabled.
> >>>>
> >>>>Is this correct? And what exactly is rule-based forwarding? I'm
> >>>>guessing that it doesn't really apply to my situation, as in these
> >>>>cases, I am using IPFW to create a deny all inbound to my laptop when
> >>>>I'm on the road. But I just want to make sure.
> >>>>
> >>>>Thanks,
> >>>>DW
> >>>>_______________________________________________
> >>>>freebsd-security at freebsd.org mailing list
> >>>>http://lists.freebsd.org/mailman/listinfo/freebsd-security
> >>>>To unsubscribe, send any mail to
> >>>>"freebsd-security-unsubscribe at freebsd.org"
> >>>>
> >>>>
> >>>
> >>>
> >>>
> >>_______________________________________________
> >>freebsd-security at freebsd.org mailing list
> >>http://lists.freebsd.org/mailman/listinfo/freebsd-security
> >>To unsubscribe, send any mail to "freebsd-security-unsubscribe at freebsd.org"
> >>
> >>
> >
> >
> >
> >
>
--
Bill Moran
Potential Technologies
http://www.potentialtech.com
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 187 bytes
Desc: not available
Url : http://lists.freebsd.org/pipermail/freebsd-security/attachments/20050204/7b168ece/attachment.bin
More information about the freebsd-security
mailing list