3 # Setup system for IPv6 firewall service.
6 # Suck in the configuration variables.
7 if [ -z "${source_rc_confs_defined}" ]; then
8 if [ -r /etc/defaults/rc.conf ]; then
9 . /etc/defaults/rc.conf
11 elif [ -r /etc/rc.conf ]; then
17 # Define the firewall type in /etc/rc.conf. Valid values are:
18 # open - will allow anyone in
19 # client - will try to protect just this machine
20 # simple - will try to protect a whole network
21 # closed - totally disables IP services except via lo0 interface
22 # UNKNOWN - disables the loading of firewall rules.
23 # filename - will load the rules in the given filename (full path required)
25 # For ``client'' and ``simple'' the entries below should be customized
30 # If you don't know enough about packet filtering, we suggest that you
31 # take time to read this book:
33 # Building Internet Firewalls, 2nd Edition
34 # Brent Chapman and Elizabeth Zwicky
36 # O'Reilly & Associates, Inc
39 # http://www.oreilly.com/catalog/fire2/
41 # For a more advanced treatment of Internet Security read:
43 # Firewalls & Internet Security
44 # Repelling the wily hacker
45 # William R. Cheswick, Steven M. Bellowin
50 # http://www.awlonline.com/product/0%2C2627%2C0201633574%2C00.html
55 # Only in rare cases do you want to change these rules
57 ${fw6cmd} add 100 pass ip6 from any to any via lo0
58 ${fw6cmd} add 200 deny ip6 from any to ::1
59 ${fw6cmd} add 300 deny ip6 from ::1 to any
64 ${fw6cmd} add pass ip6 from :: to ff02::/16 proto ipv6-icmp
65 # RS, RA, NS, NA, redirect...
66 ${fw6cmd} add pass ip6 from fe80::/10 to fe80::/10 proto ipv6-icmp
67 ${fw6cmd} add pass ip6 from fe80::/10 to ff02::/16 proto ipv6-icmp
70 if [ -n "${1}" ]; then
71 ipv6_firewall_type="${1}"
75 # Set quiet mode if requested
77 case ${ipv6_firewall_quiet} in
79 fw6cmd="/sbin/ipfw -q"
87 # Flush out the list before we begin.
92 # If you just configured ipfw in the kernel as a tool to solve network
93 # problems or you just want to disallow some particular kinds of traffic
94 # then you will want to change the default policy to open. You can also
95 # do this as your only action by setting the ipv6_firewall_type to ``open''.
97 # ${fw6cmd} add 65000 pass all from any to any
102 case ${ipv6_firewall_type} in
105 ${fw6cmd} add 65000 pass ip6 from any to any
108 [Cc][Ll][Ii][Ee][Nn][Tt])
110 # This is a prototype setup that will protect your system somewhat
111 # against people from outside your own network.
114 # set these to your network and prefixlen and ip
116 # This needs more work
124 # Allow any traffic to or from my own net.
125 ${fw6cmd} add pass ip6 from ${ip} to ${net}/${prefixlen}
126 ${fw6cmd} add pass ip6 from ${net}/${prefixlen} to ${ip}
128 # Allow any link-local multicast traffic
129 ${fw6cmd} add pass ip6 from fe80::/10 to ff02::/16
130 ${fw6cmd} add pass ip6 from ${net}/${prefixlen} to ff02::/16
132 # Allow TCP through if setup succeeded
133 ${fw6cmd} add pass ip6 from any to any established proto tcp
135 # Allow IP fragments to pass through
136 ${fw6cmd} add pass ip6 from any to any frag
138 # Allow setup of incoming email
139 ${fw6cmd} add pass ip6 from any to ${ip} 25 setup proto tcp
141 # Allow setup of outgoing TCP connections only
142 ${fw6cmd} add pass ip6 from ${ip} to any setup proto tcp
144 # Disallow setup of all other TCP connections
145 ${fw6cmd} add deny ip6 from any to any setup proto tcp
147 # Allow DNS queries out in the world
148 ${fw6cmd} add pass ip6 from any 53 to ${ip} proto udp
149 ${fw6cmd} add pass ip6 from ${ip} to any 53 proto udp
151 # Allow NTP queries out in the world
152 ${fw6cmd} add pass ip6 from any 123 to ${ip} proto udp
153 ${fw6cmd} add pass ip6 from ${ip} to any 123 proto udp
155 # Allow ICMPv6 destination unreach
156 ${fw6cmd} add pass ip6 from any to any icmp6types 1 proto ipv6-icmp
158 # Allow NS/NA/toobig (don't filter it out)
159 ${fw6cmd} add pass ip6 from any to any icmp6types 2,135,136 \
162 # Everything else is denied by default, unless the
163 # IPV6FIREWALL_DEFAULT_TO_ACCEPT option is set in your kernel
167 [Ss][Ii][Mm][Pp][Ll][Ee])
169 # This is a prototype setup for a simple firewall. Configure this
170 # machine as a DNS and NTP server, and point all the machines
171 # on the inside at this machine for those services.
174 # set these to your outside interface network and prefixlen and ip
176 onet="2001:db8:2:1::"
178 oip="2001:db8:2:1::1"
180 # set these to your inside interface network and prefixlen and ip
182 inet="2001:db8:2:2::"
184 iip="2001:db8:2:2::1"
189 ${fw6cmd} add deny ip6 from ${inet}/${iprefixlen} to any in via ${oif}
190 ${fw6cmd} add deny ip6 from ${onet}/${oprefixlen} to any in via ${iif}
192 # Stop unique local unicast address on the outside interface
193 ${fw6cmd} add deny ip6 from fc00::/7 to any via ${oif}
194 ${fw6cmd} add deny ip6 from any to fc00::/7 via ${oif}
196 # Stop site-local on the outside interface
197 ${fw6cmd} add deny ip6 from fec0::/10 to any via ${oif}
198 ${fw6cmd} add deny ip6 from any to fec0::/10 via ${oif}
200 # Disallow "internal" addresses to appear on the wire.
201 ${fw6cmd} add deny ip6 from ::ffff:0.0.0.0/96 to any via ${oif}
202 ${fw6cmd} add deny ip6 from any to ::ffff:0.0.0.0/96 via ${oif}
204 # Disallow packets to malicious IPv4 compatible prefix.
205 ${fw6cmd} add deny ip6 from ::224.0.0.0/100 to any via ${oif}
206 ${fw6cmd} add deny ip6 from any to ::224.0.0.0/100 via ${oif}
207 ${fw6cmd} add deny ip6 from ::127.0.0.0/104 to any via ${oif}
208 ${fw6cmd} add deny ip6 from any to ::127.0.0.0/104 via ${oif}
209 ${fw6cmd} add deny ip6 from ::0.0.0.0/104 to any via ${oif}
210 ${fw6cmd} add deny ip6 from any to ::0.0.0.0/104 via ${oif}
211 ${fw6cmd} add deny ip6 from ::255.0.0.0/104 to any via ${oif}
212 ${fw6cmd} add deny ip6 from any to ::255.0.0.0/104 via ${oif}
214 ${fw6cmd} add deny ip6 from ::0.0.0.0/96 to any via ${oif}
215 ${fw6cmd} add deny ip6 from any to ::0.0.0.0/96 via ${oif}
217 # Disallow packets to malicious 6to4 prefix.
218 ${fw6cmd} add deny ip6 from 2002:e000::/20 to any via ${oif}
219 ${fw6cmd} add deny ip6 from any to 2002:e000::/20 via ${oif}
220 ${fw6cmd} add deny ip6 from 2002:7f00::/24 to any via ${oif}
221 ${fw6cmd} add deny ip6 from any to 2002:7f00::/24 via ${oif}
222 ${fw6cmd} add deny ip6 from 2002:0000::/24 to any via ${oif}
223 ${fw6cmd} add deny ip6 from any to 2002:0000::/24 via ${oif}
224 ${fw6cmd} add deny ip6 from 2002:ff00::/24 to any via ${oif}
225 ${fw6cmd} add deny ip6 from any to 2002:ff00::/24 via ${oif}
227 ${fw6cmd} add deny ip6 from 2002:0a00::/24 to any via ${oif}
228 ${fw6cmd} add deny ip6 from any to 2002:0a00::/24 via ${oif}
229 ${fw6cmd} add deny ip6 from 2002:ac10::/28 to any via ${oif}
230 ${fw6cmd} add deny ip6 from any to 2002:ac10::/28 via ${oif}
231 ${fw6cmd} add deny ip6 from 2002:c0a8::/32 to any via ${oif}
232 ${fw6cmd} add deny ip6 from any to 2002:c0a8::/32 via ${oif}
234 ${fw6cmd} add deny ip6 from ff05::/16 to any via ${oif}
235 ${fw6cmd} add deny ip6 from any to ff05::/16 via ${oif}
237 # Allow TCP through if setup succeeded
238 ${fw6cmd} add pass tcp from any to any established
240 # Allow IP fragments to pass through
241 ${fw6cmd} add pass ip6 from any to any frag
243 # Allow setup of incoming email
244 ${fw6cmd} add pass ip6 from any to ${oip} 25 setup proto tcp
246 # Allow access to our DNS
247 ${fw6cmd} add pass ip6 from any to ${oip} 53 setup proto tcp
248 ${fw6cmd} add pass ip6 from any to ${oip} 53 proto udp
249 ${fw6cmd} add pass ip6 from ${oip} 53 to any proto udp
251 # Allow access to our WWW
252 ${fw6cmd} add pass ip6 from any to ${oip} 80 setup proto tcp
254 # Reject&Log all setup of incoming connections from the outside
255 ${fw6cmd} add deny log ip6 from any to any in via ${oif} setup \
258 # Allow setup of any other TCP connection
259 ${fw6cmd} add pass ip6 from any to any setup proto tcp
261 # Allow DNS queries out in the world
262 ${fw6cmd} add pass ip6 from any 53 to ${oip} proto udp
263 ${fw6cmd} add pass ip6 from ${oip} to any 53 proto udp
265 # Allow NTP queries out in the world
266 ${fw6cmd} add pass ip6 from any 123 to ${oip} proto udp
267 ${fw6cmd} add pass ip6 from ${oip} to any 123 proto udp
270 #${fw6cmd} add pass ip6 from fe80::/10 521 to ff02::9 521 proto udp
271 #${fw6cmd} add pass ip6 from fe80::/10 521 to fe80::/10 521 proto udp
273 # Allow ICMPv6 destination unreach
274 ${fw6cmd} add pass ip6 from any to any icmp6types 1 proto ipv6-icmp
276 # Allow NS/NA/toobig (don't filter it out)
277 ${fw6cmd} add pass ip6 from any to any icmp6types 2,135,136 \
280 # Everything else is denied by default, unless the
281 # IPV6FIREWALL_DEFAULT_TO_ACCEPT option is set in your kernel
285 [Cc][Ll][Oo][Ss][Ee][Dd])
286 # Only enable the loopback interface
287 ${fw6cmd} add 100 pass ip6 from any to any via lo0
289 [Uu][Nn][Kk][Nn][Oo][Ww][Nn])
292 if [ -r "${ipv6_firewall_type}" ]; then
293 ${fw6cmd} ${ipv6_firewall_flags} ${ipv6_firewall_type}