Difference between revisions of "OpenBSD Firewall / PF"

From Hackerspace ACKspace
Jump to: navigation, search
Line 3: Line 3:
 
|Members=Antarez, Vicarious
 
|Members=Antarez, Vicarious
 
|Description=building a gateway on openbsd
 
|Description=building a gateway on openbsd
}}
+
}}  
 
In this talk we will be building a highly available firewalling gateway. It is not a lecture or talk, it's a hands-on workshop.  
 
In this talk we will be building a highly available firewalling gateway. It is not a lecture or talk, it's a hands-on workshop.  
  
how to play:
+
how to play:  
  
* Log into the wireless network "antareztest"  
+
*Log into the wireless network "antareztest"  
* SSH to the gateway in that lan (192.168.1.254 or 192.168.1.252)
+
*SSH to the gateway in that lan (192.168.1.254 or 192.168.1.252)  
* Login as "root" password "bier"
+
*Login as "root" password "bier"  
* use "tmux a" to attach to the shared session
+
*use "tmux a" to attach to the shared session  
* break things, discuss, fix things
+
*break things, discuss, fix things
 +
 
 +
 
 +
<pre>
 +
 
 +
# PF Rules ACKspace gateway 2
 +
 
 +
### Macros ###
 +
ext_if = "fxp0"
 +
int_if = "{ fxp1 vlan10 vlan11 vlan12 vlan13 vlan14 vlan15 vlan16 vlan17 vlan18 vlan19 vlan20 vlan21 vlan22 vlan23 vlan24 vl$
 +
gw2_ext = "213.125.94.212"
 +
icmp_types="echoreq"
 +
tcp_services="{ ssh }"
 +
private_networks="{ 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16, 255.255.255.255/32, 127.0.0.0/8 }"
 +
 
 +
### Skip Policy ###
 +
 
 +
# Skip any filtering if it is on infterface localhost
 +
set skip on lo
 +
 
 +
### Block Policy ###
 +
 
 +
# Provide nice blocked messages
 +
set block-policy return
 +
 
 +
 
 +
### Default Policy ###
 +
 
 +
# Block all unless a allow rule exists
 +
block in log
 +
block out log
 +
 
 +
</pre>

Revision as of 13:33, 11 June 2011

Project: OpenBSD Firewall / PF
Featured:
State Active
Members Antarez, Vicarious
GitHub No GitHub project defined. Add your project here.
Description building a gateway on openbsd
Picture
No project picture! Fill in form Picture or Upload a jpeg here

In this talk we will be building a highly available firewalling gateway. It is not a lecture or talk, it's a hands-on workshop.

how to play:

  • Log into the wireless network "antareztest"
  • SSH to the gateway in that lan (192.168.1.254 or 192.168.1.252)
  • Login as "root" password "bier"
  • use "tmux a" to attach to the shared session
  • break things, discuss, fix things



# PF Rules ACKspace gateway 2

### Macros ###
ext_if = "fxp0"
int_if = "{ fxp1 vlan10 vlan11 vlan12 vlan13 vlan14 vlan15 vlan16 vlan17 vlan18 vlan19 vlan20 vlan21 vlan22 vlan23 vlan24 vl$
gw2_ext = "213.125.94.212"
icmp_types="echoreq"
tcp_services="{ ssh }"
private_networks="{ 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16, 255.255.255.255/32, 127.0.0.0/8 }"

### Skip Policy ###

# Skip any filtering if it is on infterface localhost
set skip on lo

### Block Policy ###

# Provide nice blocked messages
set block-policy return


### Default Policy ###

# Block all unless a allow rule exists
block in log
block out log