Re: Please Review My Rules

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Chris Miller wrote:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hey guys, if it's not too much trouble I would like to ask you all to take a second and review my rules. I have a CentOS box running iptables. I have servers in two different VLAN's (VLAN 5 and VLAN 6) that are all assigned private IP addresses in the 10.176.x.x range. I assign the public IP addresses to the iptables firewall and use static 1:1 NAT to translate traffic to the 10.176.x.x block. The public network is in VLAN 9.

In my example below, I have changed the public IP addresses to be 192.168.x.x just for the sake of not revealing the real IP addresses.

- -----------------------------------
iptables -A INPUT -d 192.168.59.5 -p icmp -j REJECT --reject-with icmp-port-unreachable iptables -A INPUT -d 192.168.59.7 -p icmp -j REJECT --reject-with icmp-port-unreachable iptables -A INPUT -d 192.168.56.8 -p icmp -j REJECT --reject-with icmp-port-unreachable iptables -A INPUT -d 192.168.58.4 -p icmp -j REJECT --reject-with icmp-port-unreachable iptables -A INPUT -d 192.168.58.37 -p icmp -j REJECT --reject-with icmp-port-unreachable iptables -A INPUT -d 192.168.57.6 -p icmp -j REJECT --reject-with icmp-port-unreachable


Are these all adresses of the firewall? If not, these rules will not do anything. If yes, why bother?

If your policy is set to ACCEPT, this will break things (most notably PMTUD). If your policy is set to DROP, why reject these?

Also note that if these are all the addresses of the firewall itself, the same can be achieved by simply saying

iptables -A INPUT -p icmp -j REJECT --reject-with icmp-port-unreachable

Even then, take into account that these addresses are reachable from both the inside LANS as well as the outside, are you sure you want to restrict the inside as wel?

Normally I write rules like this:

iptables -A INPUT -i $EXT_IF -j FROM_INTERNET
iptables -A INPUT -i $VLAN5 -j FROM_VLAN5
iptables -A INPUT -i $VLAN6 -j FROM_VLAN6

and the define the respective chains that describe what traffic coming from that interface is allowed. I seldom make destiction on addresses (in the INPUT chain), making the distinction on interface is much easier in the long run.


iptables -A FORWARD -o eth0.5 -m state --state NEW,RELATED,ESTABLISHED -j ACCEPT iptables -A FORWARD -o eth0.6 -m state --state NEW,RELATED,ESTABLISHED -j ACCEPT iptables -A FORWARD -i eth0.9 -m state --state RELATED,ESTABLISHED -j ACCEPT


Fine, but why not for INPUT and OUTPUT?


iptables -t nat -A PREROUTING -d 192.168.56.8 -i eth0.9 -j DNAT --to- destination 10.176.56.8 iptables -t nat -A PREROUTING -d 192.168.59.7 -i eth0.9 -j DNAT --to- destination 10.176.59.7 iptables -t nat -A PREROUTING -d 192.168.59.5 -i eth0.9 -j DNAT --to- destination 10.176.59.5 iptables -t nat -A PREROUTING -d 192.168.58.37 -i eth0.9 -j DNAT --to- destination 10.176.58.37 iptables -t nat -A PREROUTING -d 192.168.58.4 -i eth0.9 -j DNAT --to- destination 10.176.58.4 iptables -t nat -A PREROUTING -d 192.168.58.21 -i eth0.9 -j DNAT --to- destination 10.176.58.21 iptables -t nat -A PREROUTING -d 192.168.58.29 -i eth0.9 -j DNAT --to- destination 10.176.58.29 iptables -t nat -A PREROUTING -d 192.168.56.7 -i eth0.9 -j DNAT --to- destination 10.176.56.7 iptables -t nat -A PREROUTING -d 192.168.56.5 -i eth0.9 -j DNAT --to- destination 10.176.56.5 iptables -t nat -A PREROUTING -d 192.168.56.6 -i eth0.9 -j DNAT --to- destination 10.176.56.6 iptables -t nat -A PREROUTING -d 192.168.57.5 -i eth0.9 -j DNAT --to- destination 10.176.57.5

iptables -t nat -A POSTROUTING -s 10.176.56.8 -o eth0.9 -j SNAT --to- source 192.168.56.8 iptables -t nat -A POSTROUTING -s 10.176.59.7 -o eth0.9 -j SNAT --to- source 192.168.59.7 iptables -t nat -A POSTROUTING -s 10.176.59.5 -o eth0.9 -j SNAT --to- source 192.168.59.5 iptables -t nat -A POSTROUTING -s 10.176.58.37 -o eth0.9 -j SNAT --to- source 192.168.58.37 iptables -t nat -A POSTROUTING -s 10.176.58.4 -o eth0.9 -j SNAT --to- source 192.168.58.4 iptables -t nat -A POSTROUTING -s 10.176.58.21 -o eth0.9 -j SNAT --to- source 192.168.58.21 iptables -t nat -A POSTROUTING -s 10.176.58.29 -o eth0.9 -j SNAT --to- source 192.168.58.29 iptables -t nat -A POSTROUTING -s 10.176.56.7 -o eth0.9 -j SNAT --to- source 192.168.56.7 iptables -t nat -A POSTROUTING -s 10.176.56.5 -o eth0.9 -j SNAT --to- source 192.168.56.5 iptables -t nat -A POSTROUTING -s 10.176.56.6 -o eth0.9 -j SNAT --to- source 192.168.56.6 iptables -t nat -A POSTROUTING -s 10.176.57.5 -o eth0.9 -j SNAT --to- source 192.168.57.5


There is a target (was it NETMAP?) that can do this in just two rules, it maps a complete subnet to another subnet.

- -----------------------------------

Currently I don't do any filtering, it just forwards any and all requests for incoming traffic to whatever I have it set to translate to. I'm going to create a separate chain for each server and jump to that chain before I do the DNAT or SNAT rules to do traffic filtering. Is that a good approach?


Fine. However that is not done before the DNAT, the filter chain is always executed after the PREROUTING chain. Keep that in mind when using --destination, you need to match on the DNATted addresses.


Is there anything I should keep in mind when doing this type of setup?


I think I covered most.

HTH,
M4


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux