/[soft]/drakwizard/trunk/firewall_wizard/scripts/bastille-firewall.cfg.default
ViewVC logotype

Contents of /drakwizard/trunk/firewall_wizard/scripts/bastille-firewall.cfg.default

Parent Directory Parent Directory | Revision Log Revision Log


Revision 486 - (show annotations) (download)
Tue Feb 8 00:14:32 2011 UTC (13 years, 2 months ago) by dmorgan
File size: 11140 byte(s)
Import cleaned drakwizard
1 #
2 # /etc/bastille-firewall.cfg
3 #
4 # Configuration fiel for both 2.2/ipchains and 2.4/netfilter scripts
5 #
6 # version 0.99-beta1
7 # Copyright (C) 1999-2001 Peter Watkins
8 #
9 # This program is distributed in the hope that it will be useful,
10 # but WITHOUT ANY WARRANTY; without even the implied warranty of
11 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 # GNU General Public License for more details.
13 #
14 # You should have received a copy of the GNU General Public License
15 # along with this program; if not, write to the Free Software
16 # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
17 #
18 # Thanks to David Ranch, Brad A, Don G, and others for their suggestions
19
20 # the configuration values should be whitespace-delimited lists of
21 # appropriate values, e.g.
22 # TCP_PUBLIC_SERVICES="80 smtp ssh"
23 # lists Web (port 80), SMTP mail, and Secure Shell ports
24 #
25 # This script is suitable for workstations or simple NAT firewalls;
26 # you may want to add more "output" restrictions for serious servers
27
28 # 0) DNS servers. You must list your DNS servers here so that
29 # the firewall will allow them to service your lookup requests
30 #
31 # List of DNS servers/networks to allow "domain" responses from
32 # This _could_ be nameservers as a list of <ip-address>/32 entries
33 #DNS_SERVERS="a.b.c.d/32 e.f.g.h/32"
34 # If you are running a caching nameserver, you'll need to allow from
35 # "0.0.0.0/0" so named can query any arbitrary nameserver
36 # (To enable a caching nameserver, you will also probably need to
37 # add "domain" to the TCP and UDP public service lists.)
38 #DNS_SERVERS="0.0.0.0/0"
39 #
40 # To have the DNS servers parsed from /etc/resolv.conf at runtime,
41 # as normal workstations will want, make this variable empty
42 #DNS_SERVERS=""
43 #
44 # Please make sure variable assignments are on single lines; do NOT
45 # use the "\" continuation character (so Bastille can change the
46 # values if it is run more than once)
47 DNS_SERVERS=""
48
49
50 # 1) define your interfaces
51 # Note a "+" acts as a wildcard, e.g. ppp+ would match any PPP
52 # interface
53 #
54 # list internal/trusted interfaces
55 # traffic from these interfaces will be allowed
56 # through the firewall, no restrictions
57 #TRUSTED_IFACES="lo" # MINIMAL/SAFEST
58 #
59 # list external/untrusted interfaces
60 #PUBLIC_IFACES="eth+ ppp+ slip+" # SAFEST
61 #
62 # list internal/partially-trusted interfaces
63 # e.g. if this acts as a NAT/IP Masq server and you
64 # don't want clients on those interfaces having
65 # full network access to services running on this
66 # server (as the TRUSTED_IFACES allows)
67 #INTERNAL_IFACES="" # SAFEST
68 #
69 # Please make sure variable assignments are on single lines; do NOT
70 # use the "\" continuation character (so Bastille can change the
71 # values if it is run more than once)
72 TRUSTED_IFACES="lo" # MINIMAL/SAFEST
73 PUBLIC_IFACES="eth+ ppp+" # SAFEST
74 INTERNAL_IFACES="" # SAFEST
75
76
77 # 2) services for which we want to log access attempts to syslog
78 # Note this only audits connection attempts from public interfaces
79 #
80 # Also see item 12, LOG_FAILURES
81 #
82 #TCP_AUDIT_SERVICES="telnet ftp imap pop3 finger sunrpc exec login linuxconf ssh"
83 # anyone probing for BackOrifice?
84 #UDP_AUDIT_SERVICES="31337"
85 # how about ICMP?
86 #ICMP_AUDIT_TYPES=""
87 #ICMP_AUDIT_TYPES="echo-request" # ping/MS tracert
88 #
89 # To enable auditing, you must have syslog configured to log "kern"
90 # messages of "info" level; typically you'd do this with a line in
91 # syslog.conf like
92 # kern.info /var/log/messages
93 # though the Bastille port monitor will normally want these messages
94 # logged to a named pipe instead, and the Bastille script normally
95 # configures syslog for "kern.*" which catches these messages
96 #
97 # Please make sure variable assignments are on single lines; do NOT
98 # use the "\" continuation character (so Bastille can change the
99 # values if it is run more than once)
100 TCP_AUDIT_SERVICES=""
101 UDP_AUDIT_SERVICES=""
102 ICMP_AUDIT_TYPES=""
103
104
105 # 3) services we allow connections to
106 #
107 # FTP note:
108 # To allow your machine to service "passive" FTP clients,
109 # you will need to make allowances for the passive data
110 # ports; Bastille users should read README.FTP for more
111 # information
112 #
113 # "public" interfaces:
114 # TCP services that "public" hosts should be allowed to connect to
115 #TCP_PUBLIC_SERVICES="" # MINIMAL/SAFEST
116 #
117 # UDP services that "public" hosts should be allowed to connect to
118 #UDP_PUBLIC_SERVICES="" # MINIMAL/SAFEST
119 #
120 # "internal" interfaces:
121 # (NB: you will need to repeat the "public" services if you want
122 # to allow "internal" hosts to reach those services, too.)
123 # TCP services that internal clients can connect to
124 #TCP_INTERNAL_SERVICES="" # MINIMAL/SAFEST
125 #
126 # UDP services that internal clients can connect to
127 #UDP_INTERNAL_SERVICES="" # MINIMAL/SAFEST
128 #
129 # Please make sure variable assignments are on single lines; do NOT
130 # use the "\" continuation character (so Bastille can change the
131 # values if it is run more than once)
132 #TCP_PUBLIC_SERVICES="109 53 143 80 20 21 22 110 443 25" # MINIMAL/SAFEST
133 TCP_PUBLIC_SERVICES="" # MINIMAL/SAFEST
134 UDP_PUBLIC_SERVICES="" # MINIMAL/SAFEST
135 TCP_INTERNAL_SERVICES="www ssh" # MINIMAL/SAFEST
136 UDP_INTERNAL_SERVICES="" # MINIMAL/SAFEST
137
138 # 4) FTP is a firewall nightmare; if you allow "normal" FTP connections,
139 # you must be careful to block any TCP services that are listening
140 # on high ports; it's safer to require your FTP clients to use
141 # "passive" mode.
142 #
143 # Note this will also force clients on machines
144 # that use this one for NAT/IP Masquerading to use passive mode
145 # for connections that go through this server (e.g. from the
146 # internal network to public Internet machines
147 #
148 # For more information about FTP, see the Bastille README.FTP doc
149 #
150 #FORCE_PASV_FTP="N"
151 #FORCE_PASV_FTP="Y" # SAFEST
152 #
153 FORCE_PASV_FTP="N" # SAFEST
154
155
156 # 5) Services to explicitly block. See FTP note above
157 # Note that ranges of ports are specified with colons, and you
158 # can specify an open range by using only one number, e.g.
159 # 1024: means ports >= 1024 and :6000 means ports <= 6000
160 #
161 # TCP services on high ports that should be blocked if not forcing passive FTP
162 # This should include X (6000:6010) and anything else revealed by 'netstat -an'
163 # (this does not matter unless you're not forcing "passive" FTP)
164 #TCP_BLOCKED_SERVICES="6000:6020"
165 #
166 # UDP services to block: this should be UDP services on high ports.
167 # Your only vulnerability from public interfaces are the DNS and
168 # NTP servers/networks (those with 0.0.0.0 for DNS servers should
169 # obviously be very careful here!)
170 #UDP_BLOCKED_SERVICES="2049"
171 #
172 # types of ICMP packets to allow
173 #ICMP_ALLOWED_TYPES="destination-unreachable" # MINIMAL/SAFEST
174 # the following allows you to ping/traceroute outbound
175 #ICMP_ALLOWED_TYPES="destination-unreachable echo-reply time-exceeded"
176 #
177 # Please make sure variable assignments are on single lines; do NOT
178 # use the "\" continuation character (so Bastille can change the
179 # values if it is run more than once)
180 TCP_BLOCKED_SERVICES="6000:6020"
181 UDP_BLOCKED_SERVICES="2049"
182 ICMP_ALLOWED_TYPES="destination-unreachable echo-reply time-exceeded"
183
184
185 # 6) Source Address Verification helps prevent "IP Spoofing" attacks
186 #
187 ENABLE_SRC_ADDR_VERIFY="Y" # SAFEST
188
189
190 # 7) IP Masquerading / NAT. List your internal/masq'ed networks here
191 #
192 # Also see item 4, FORCE_PASV_FTP, as that setting affects
193 # clients using IP Masquerading through this machine
194 #
195 # Set this variable if you're using IP Masq / NAT for a local network
196 #IP_MASQ_NETWORK="" # DISABLE/SAFEST
197 #IP_MASQ_NETWORK="10.0.0.0/8" # example
198 #IP_MASQ_NETWORK="192.168.0.0/16" # example
199 #
200 # Have lots of masq hosts? uncomment the following six lines
201 # and list the hosts/networks in /etc/firewall-masqhosts
202 # the script assumes any address without a "/" netmask afterwards
203 # is an individual address (netmask /255.255.255.255):
204 #if [ -f /etc/firewall-masqhosts ]; then
205 # echo "Reading list of masq hosts from /etc/firewall-masqhosts"
206 # # Read the file, but use 'awk' to strip comments
207 # # Note the sed bracket phrase includes a space and tab char
208 # IP_MASQ_NETWORK=`cat /etc/firewall-masqhosts | awk -F\# '/\// {print $1; next} /[0-9]/ {print $1"/32"}' |sed 's:[ ]*::g'`
209 #fi
210 #
211 # Masq modules
212 # NB: The script will prepend "ip_masq_" to each module name
213 #IP_MASQ_MODULES="cuseeme ftp irc quake raudio vdolive" # ALL (?)
214 #IP_MASQ_MODULES="ftp raudio vdolive" # RECOMMENDED
215 #
216 # Please make sure variable assignments are on single lines; do NOT
217 # use the "\" continuation character (so Bastille can change the
218 # values if it is run more than once)
219 IP_MASQ_NETWORK="192.168.4.0/24" # DISABLE/SAFEST
220 IP_MASQ_MODULES="" # RECOMMENDED
221
222
223 # 8) How to react to disallowed packets
224 # whether to "REJECT" or "DENY" disallowed packets; if you're running any
225 # public services, you probably ought to use "REJECT"; if in serious stealth
226 # mode, choose "DENY" so simple probes don't know if there's anything out there
227 # NOTE: disallowed ICMP packets are discarded with "DENY", as
228 # it would not make sense to "reject" the packet if you're
229 # trying to disallow ping/traceroute
230 #
231 REJECT_METHOD="DENY"
232
233
234 # 9) DHCP
235 # In case your server needs to get a DHCP address from some other
236 # machine (e.g. cable modem)
237 #DHCP_IFACES="eth0" # example, to allow you to query on eth0
238 #DHCP_IFACES="" # DISABLED
239 #
240 # Please make sure variable assignments are on single lines; do NOT
241 # use the "\" continuation character (so Bastille can change the
242 # values if it is run more than once)
243 DHCP_IFACES="" # DISABLED
244
245
246 # 10) more UDP fun. List IP addresses or network space of NTP servers
247 #
248 #NTP_SERVERS="" # DISABLE NTP QUERIES / SAFEST
249 #NTP_SERVERS="a.b.c.d/32 e.f.g.h/32" # example, to allow querying 2 servers
250 #
251 # Please make sure variable assignments are on single lines; do NOT
252 # use the "\" continuation character (so Bastille can change the
253 # values if it is run more than once)
254 NTP_SERVERS="" # DISABLE NTP QUERIES / SAFEST
255
256
257 # 11) more ICMP. Control the outbound ICMP to make yourself invisible to
258 # traceroute probes
259 #
260 #ICMP_OUTBOUND_DISABLED_TYPES="destination-unreachable time-exceeded"
261 #
262 # Please make sure variable assignments are on single lines; do NOT
263 # use the "\" continuation character (so Bastille can change the
264 # values if it is run more than once)
265 ICMP_OUTBOUND_DISABLED_TYPES="destination-unreachable time-exceeded"
266
267
268 # 12) Logging
269 # With this enabled, ipchains will log all blocked packets.
270 # ** this could generate huge logs **
271 # This is primarily intended for the port mointoring system;
272 # also note that you probably do not want to "AUDIT" any services
273 # that you are not allowing, as doing so would mean duplicate
274 # logging
275 LOG_FAILURES="N" # do not log blocked packets
276
277 # 13) Block fragmented packets
278 # There's no good reason to allow these
279 #ALLOW_FRAGMENTS="N" # safest
280 ALLOW_FRAGMENTS="Y" # old behavior
281
282 # 14) Prevent SMB broadcasts from leaking out NAT setup
283 # Windows machines will poll teh net with SMB broadcasts,
284 # basically advertising their existence. Most folks agree
285 # that this traffic should be dropped
286 #DROP_SMB_NAT_BCAST="N" # allow them (are you sure?)
287 DROP_SMB_NAT_BCAST="Y" # drop those packets
288

  ViewVC Help
Powered by ViewVC 1.1.30