vampire: Allow MPD traffic through.
[firewall] / vampire.m4
CommitLineData
bfdc045d
MW
1### -*-m4-*-
2###
3### Firewall configuration for vampire
4###
5### (c) 2008 Mark Wooding
6###
7
8###----- Licensing notice ---------------------------------------------------
9###
10### This program is free software; you can redistribute it and/or modify
11### it under the terms of the GNU General Public License as published by
12### the Free Software Foundation; either version 2 of the License, or
13### (at your option) any later version.
14###
15### This program is distributed in the hope that it will be useful,
16### but WITHOUT ANY WARRANTY; without even the implied warranty of
17### MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18### GNU General Public License for more details.
19###
20### You should have received a copy of the GNU General Public License
21### along with this program; if not, write to the Free Software Foundation,
22### Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
23
24###--------------------------------------------------------------------------
25### Network interfaces.
26
27m4_divert(44)m4_dnl
28## Interface definitions.
29if_untrusted=eth0.1
30if_trusted=eth0.0
31if_vpn=vpn-+
32if_its_mz=eth0.0
33if_its_pi=eth0.0
34
35m4_divert(-1)
36###--------------------------------------------------------------------------
37### vampire-specific rules.
38
2dc8f4af
MW
39m4_divert(35)m4_dnl
40errorchain ddos-evil-dns DROP
41## Invalid DNS request with probably-forged sender address, with intent to
42## cause DDOS.
43
bfdc045d 44m4_divert(82)m4_dnl
83610d8a
MW
45## Repelling evil DDos attack.
46run ipset -N ddos-evil-dns iphash 2>/dev/null || :
2dc8f4af 47run iptables -A inbound -g ddos-evil-dns \
83610d8a
MW
48 -m set --set ddos-evil-dns src \
49 -p udp --destination-port $port_dns
50
bfdc045d
MW
51## Externally visible services.
52allowservices inbound tcp \
53 finger ident \
54 dns \
55 ssh \
56 smtp \
57 gnutella_svc \
58 ftp ftp_data \
59 rsync \
04182f26 60 mpd \
bfdc045d
MW
61 http https \
62 git
78c56de1
MW
63allowservices inbound tcp \
64 tor_public tor_directory
bfdc045d
MW
65allowservices inbound udp \
66 dns \
67 tripe \
68 gnutella_svc
69
70## Provide DNS resolution to local untrusted hosts.
71for p in tcp udp; do
72 run iptables -A inbound -j ACCEPT \
73 -s 172.29.198.0/24 \
74 -p $p --destination-port $port_dns
75done
76
77## Provide syslog for evolution.
78run iptables -A inbound -j ACCEPT \
79 -s 172.29.198.2 \
80 -p udp --destination-port $port_syslog
81
82## Provide a web cache to local untrusted hosts.
83run iptables -A inbound -j ACCEPT \
84 -s 172.29.198.0/24 \
85 -p tcp --destination-port $port_squid
86
d6dd88f5
MW
87## Watch outgoing Tor usage.
88run iptables -A OUTPUT -m multiport \
89 -p tcp --source-ports $port_tor_public,$port_tor_directory
90
bfdc045d
MW
91## Other interesting things.
92dnsresolver inbound
93ntpclient inbound 158.152.1.76 158.152.1.204 194.159.253.2
94
95m4_divert(-1)
96###----- That's all, folks --------------------------------------------------