Overhaul address classification.
[firewall] / jem.m4
CommitLineData
775bd287 1### -*-sh-*-
bfdc045d 2###
a3972fea 3### Firewall configuration for jem
bfdc045d
MW
4###
5### (c) 2008 Mark Wooding
6###
7
8###----- Licensing notice ---------------------------------------------------
9###
10### This program is free software; you can redistribute it and/or modify
11### it under the terms of the GNU General Public License as published by
12### the Free Software Foundation; either version 2 of the License, or
13### (at your option) any later version.
14###
15### This program is distributed in the hope that it will be useful,
16### but WITHOUT ANY WARRANTY; without even the implied warranty of
17### MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18### GNU General Public License for more details.
19###
20### You should have received a copy of the GNU General Public License
21### along with this program; if not, write to the Free Software Foundation,
22### Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
23
24###--------------------------------------------------------------------------
a3972fea
MW
25### Config settings.
26
27## This host isn't a router.
28setconf(forward, 0)
29
08926d25
MW
30## This host is involved in a routing asymmetry.
31setconf(rp_filter, 0)
32setconf(log_martians, 0)
33
a3972fea 34###--------------------------------------------------------------------------
a3972fea 35### jem-specific rules.
bfdc045d 36
a4d8cae3 37m4_divert(84)m4_dnl
302fff40
MW
38## Set up the SAUCE sinbin. Unfortunately, ipset is a bit brittle. This
39## isn't a completely critical part of the firewall security, so don't make
40## this fail the entire script.
41errorchain sauce REJECT
42makeset sauce iphash || :
43iptables -A inbound -g sauce -m set --match-set sauce src || :
44
bfdc045d
MW
45## Externally visible services.
46allowservices inbound tcp \
bfdc045d 47 ssh \
6f74cc82 48 ident \
77e84a02 49 smtp submission \
bfdc045d 50 http https \
a3972fea 51 imaps
bfdc045d
MW
52
53## Provide DNS resolution to local untrusted hosts.
54for p in tcp udp; do
55 run iptables -A inbound -j ACCEPT \
56 -s 172.29.198.0/24 \
57 -p $p --destination-port $port_dns
58done
59
bfdc045d
MW
60m4_divert(-1)
61###----- That's all, folks --------------------------------------------------