~mdw
/
firewall
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
Makefile: New target for tracking diversions.
[firewall]
/
vampire.m4
diff --git
a/vampire.m4
b/vampire.m4
index
3a389ca
..
e378447
100644
(file)
--- a/
vampire.m4
+++ b/
vampire.m4
@@
-1,4
+1,4
@@
-### -*-
m4
-*-
+### -*-
sh
-*-
###
### Firewall configuration for vampire
###
###
### Firewall configuration for vampire
###
@@
-22,69
+22,75
@@
### Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
###--------------------------------------------------------------------------
### Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
###--------------------------------------------------------------------------
+### Config settings.
+
+## This router is involved in a routing asymmetry.
+setconf(rp_filter, 0)
+setconf(log_martians, 0)
+
+###--------------------------------------------------------------------------
### Network interfaces.
m4_divert(44)m4_dnl
## Interface definitions.
### Network interfaces.
m4_divert(44)m4_dnl
## Interface definitions.
-if_untrusted=eth0.1
-if_trusted=eth0.0
+if_dmz=eth0.0
+if_trusted=eth0.1
+if_safe=$if_dmz,$if_trusted
+if_untrusted=eth0.3
if_vpn=vpn-+
if_vpn=vpn-+
-if_its_mz=eth0.0
-if_its_pi=eth0.0
+if_iodine=dns+
+if_its_mz=$if_dmz,$if_trusted
+if_its_pi=$if_dmz,$if_trusted
m4_divert(-1)
###--------------------------------------------------------------------------
### vampire-specific rules.
m4_divert(82)m4_dnl
m4_divert(-1)
###--------------------------------------------------------------------------
### vampire-specific rules.
m4_divert(82)m4_dnl
-## Repelling evil DDos attack.
-run ipset -N ddos-evil-dns iphash 2>/dev/null || :
-run iptables -A inbound -j DROP \
- -m set --set ddos-evil-dns src \
- -p udp --destination-port $port_dns
-
## Externally visible services.
allowservices inbound tcp \
finger ident \
## Externally visible services.
allowservices inbound tcp \
finger ident \
- dns \
+ dns
iodine
\
ssh \
ssh \
- smtp \
+ smtp
submission
\
gnutella_svc \
ftp ftp_data \
rsync \
gnutella_svc \
ftp ftp_data \
rsync \
- http https \
- git
-allowservices inbound tcp \
- tor_public tor_directory
+ imaps \
+ disorder mpd \
+ http https squid \
+ git \
+ tor_public tor_directory i2p
allowservices inbound udp \
allowservices inbound udp \
- dns \
+ dns
iodine
\
tripe \
tripe \
- gnutella_svc
+ gnutella_svc \
+ i2p
+
+## Extend some services to local untrusted hosts.
+clearchain inbound-untrusted
+run iptables -A inbound -j inbound-untrusted \
+ -s 172.29.198.0/24
-## Provide DNS resolution to local untrusted hosts.
-for p in tcp udp; do
- run iptables -A inbound -j ACCEPT \
-
-s 172.29.198.0/24
\
- -p $p --destination-port $port_dns
-done
+allowservices inbound-untrusted tcp \
+ dns \
+ netbios_ssn microsoft_ds
+
allowservices inbound-untrusted udp
\
+ dns \
+ tftp
## Provide syslog for evolution.
run iptables -A inbound -j ACCEPT \
-s 172.29.198.2 \
-p udp --destination-port $port_syslog
## Provide syslog for evolution.
run iptables -A inbound -j ACCEPT \
-s 172.29.198.2 \
-p udp --destination-port $port_syslog
-## Provide a web cache to local untrusted hosts.
-run iptables -A inbound -j ACCEPT \
- -s 172.29.198.0/24 \
- -p tcp --destination-port $port_squid
-
## Watch outgoing Tor usage.
run iptables -A OUTPUT -m multiport \
-p tcp --source-ports $port_tor_public,$port_tor_directory
## Other interesting things.
dnsresolver inbound
## Watch outgoing Tor usage.
run iptables -A OUTPUT -m multiport \
-p tcp --source-ports $port_tor_public,$port_tor_directory
## Other interesting things.
dnsresolver inbound
-ntpclient inbound
158.152.1.76 158.152.1.204 194.159.253.2
+ntpclient inbound
$ntp_servers
m4_divert(-1)
###----- That's all, folks --------------------------------------------------
m4_divert(-1)
###----- That's all, folks --------------------------------------------------