[TriLUG] OT - limiting access to destination ports
jason tower
jtower at cerient.net
Thu Apr 24 13:21:18 EDT 2008
oh, and be aware that if those rules work you may lock out ssh access
from your host
Christopher L Merrill wrote:
> So I've read some PF docs and looked at our existing pf.conf file.
>
> After these lines:
> > block in
> > pass out keep state
>
> if I add these lines (where $int_if is the internal firewall interface
> and my machine is 192.168.1.220):
>
> > pass out quick on $int_if proto tcp from 192.168.1.220 to any port 80
> > pass out quick on $int_if proto tcp from 192.168.1.220 to any port 443
> > pass out quick on $int_if proto tcp from 192.168.1.220 to any port 53
> > block out quick on $int_if proto tcp from 192.168.1.220 to any
>
> will this accomplish my goal of limiting anything on my machine (including
> flash and my browser) to only connect on ports 80/443 on the various
> web servers I visit (and allow 53 for DNS resolution)?
>
> TIA!
> Chris
>
>
> Robert Dale wrote:
>> I don't know _how_ to do this on _BSD_ - linux, yes ;) - but
>> conceptually, you create some outgoing rules like
>>
>> allow 80
>> allow 443
>> deny all
>>
>> On Wed, Apr 23, 2008 at 4:22 PM, Christopher L Merrill
>> <chris at webperformance.com> wrote:
>>> I want to block the Flash player in IE (on XP) from connecting to anything
>>> other than ports 80 and 443 on the destination servers. Note this is for
>>> testing some specific stuff - the goal is to force flash to use these ports
>>> instead of other ports for streaming video. I haven't found a way for
>>> Windows Firewall to do this. I've tried TCP/IP port-filtering - but haven't
>>> found the magic combination that blocks the videos but allows the browser
>>> to operate.
>>>
>>> At my disposal, we have a BSD firewall in the office that all our machines
>>> are sitting behind. In addition, I have a Linux machine that is configured
>>> with Apache and mod_proxy. At home, I'm behind a Linsys WRT54 (stock firmware).
>>>
>>> Note that this need only be a temporary solution - something I can turn
>>> on for a few minutes for testing and then turn off - so preventing
>>> _anything_ on our network from connection to anything besides ports
>>> 80 and 443 would be acceptable as long as the browser is still functional
>>> (I guess that implies DNS queries would need to get through as well?)
>>> I think I can determine which destination IPs I want to block, so
>>> a solution that is limited to a few IPs would work, too. If the solution
>>> was only functional for a specific source IP address, that would work, too.
>>>
>>> Any suggestions how I might accomplish my goal (in 2 hours or less)?
>>>
>>>
>>>
>>>
>>> --
>>> ------------------------------------------------------------------------ -
>>> Chris Merrill | Web Performance, Inc.
>>> chris at webperformance.com | http://webperformance.com
>>> 919-433-1762 | 919-845-7601
>>>
>>> Website Load Testing and Stress Testing Software & Services
>>> ------------------------------------------------------------------------ -
>>> --
>>> TriLUG mailing list : http://www.trilug.org/mailman/listinfo/trilug
>>> TriLUG Organizational FAQ : http://trilug.org/faq/
>>> TriLUG Member Services FAQ : http://members.trilug.org/services_faq/
>>>
>
>
More information about the TriLUG
mailing list