| 1 | ### -*-sh-*- |
| 2 | ### |
| 3 | ### Firewall configuration for fender actual |
| 4 | ### |
| 5 | ### (c) 2008 Mark Wooding |
| 6 | ### |
| 7 | |
| 8 | ###----- Licensing notice --------------------------------------------------- |
| 9 | ### |
| 10 | ### This program is free software; you can redistribute it and/or modify |
| 11 | ### it under the terms of the GNU General Public License as published by |
| 12 | ### the Free Software Foundation; either version 2 of the License, or |
| 13 | ### (at your option) any later version. |
| 14 | ### |
| 15 | ### This program is distributed in the hope that it will be useful, |
| 16 | ### but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 17 | ### MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| 18 | ### GNU General Public License for more details. |
| 19 | ### |
| 20 | ### You should have received a copy of the GNU General Public License |
| 21 | ### along with this program; if not, write to the Free Software Foundation, |
| 22 | ### Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. |
| 23 | |
| 24 | ###-------------------------------------------------------------------------- |
| 25 | ### fender-specific rules. |
| 26 | |
| 27 | m4_divert(86)m4_dnl |
| 28 | ## Externally visible services. |
| 29 | allowservices inbound tcp \ |
| 30 | ssh \ |
| 31 | ident |
| 32 | |
| 33 | ## We have to provide NTP service. The guests sync to our clock. |
| 34 | ntpclient inbound $ntp_servers |
| 35 | |
| 36 | ## Guaranteed black hole. Put this at the very front of the chain. |
| 37 | run iptables -I INPUT -d 212.13.198.78 -j DROP |
| 38 | run ip6tables -I INPUT -d 2001:ba8:0:1d9::ffff -j DROP |
| 39 | |
| 40 | ## Ethernet bridge-level filtering for source addresses. |
| 41 | run ebtables -F |
| 42 | for c in bad-source-addr check-eth0; do |
| 43 | run ebtables -X $c >/dev/null 2>&1 || : |
| 44 | done |
| 45 | for i in log limit ip ip6; do run modprobe ebt-$i; done |
| 46 | run ebtables -N bad-source-addr |
| 47 | run ebtables -A bad-source-addr \ |
| 48 | --limit 20/second --limit-burst 100 \ |
| 49 | --log-prefix "fw: bad-source-addr(br) " --log-ip --log-ip6 |
| 50 | run ebtables -A bad-source-addr -j DROP |
| 51 | run ebtables -N check-eth0 |
| 52 | run ebtables -A check-eth0 -j RETURN -p ip --ip-source ! 212.13.198.64/28 |
| 53 | run ebtables -A check-eth0 -j RETURN -p ip6 --ip6-source 2001:ba8:0:1d9::1 |
| 54 | run ebtables -A check-eth0 -j bad-source-addr \ |
| 55 | -p ip6 --ip6-source 2001:ba8:1d9::/48 |
| 56 | run ebtables -A check-eth0 -j bad-source-addr \ |
| 57 | -p ip6 --ip6-source 2001:ba8:0:1d9::/64 |
| 58 | run ebtables -A check-eth0 -j RETURN -p ip6 |
| 59 | run ebtables -A check-eth0 -j RETURN -p ip --ip-source 212.13.198.64/30 |
| 60 | run ebtables -A check-eth0 -j RETURN -p ip --ip-source 212.13.198.68 |
| 61 | run ebtables -A check-eth0 -j bad-source-addr -p ip |
| 62 | run ebtables -A INPUT -j check-eth0 -i bond0 |
| 63 | run ebtables -A FORWARD -j check-eth0 -i bond0 |
| 64 | |
| 65 | m4_divert(-1) |
| 66 | ###----- That's all, folks -------------------------------------------------- |