aboutsummaryrefslogtreecommitdiff
path: root/pl_PL.ISO8859-2/books/handbook/firewalls/chapter.xml
diff options
context:
space:
mode:
Diffstat (limited to 'pl_PL.ISO8859-2/books/handbook/firewalls/chapter.xml')
-rw-r--r--pl_PL.ISO8859-2/books/handbook/firewalls/chapter.xml145
1 files changed, 59 insertions, 86 deletions
diff --git a/pl_PL.ISO8859-2/books/handbook/firewalls/chapter.xml b/pl_PL.ISO8859-2/books/handbook/firewalls/chapter.xml
index 09f6ecf083..c204509750 100644
--- a/pl_PL.ISO8859-2/books/handbook/firewalls/chapter.xml
+++ b/pl_PL.ISO8859-2/books/handbook/firewalls/chapter.xml
@@ -4,26 +4,17 @@
$FreeBSD$
-->
-
-<chapter id="firewalls">
- <chapterinfo>
+<chapter xmlns="http://docbook.org/ns/docbook" xmlns:xlink="http://www.w3.org/1999/xlink" version="5.0" xml:id="firewalls">
+ <info><title>Firewalls</title>
<authorgroup>
- <author>
- <firstname>Joseph J.</firstname>
- <surname>Barbish</surname>
- <contrib>Contributed by </contrib>
- </author>
+ <author><personname><firstname>Joseph J.</firstname><surname>Barbish</surname></personname><contrib>Contributed by </contrib></author>
</authorgroup>
<authorgroup>
- <author>
- <firstname>Brad</firstname>
- <surname>Davis</surname>
- <contrib>Converted to SGML and updated by </contrib>
- </author>
+ <author><personname><firstname>Brad</firstname><surname>Davis</surname></personname><contrib>Converted to SGML and updated by </contrib></author>
</authorgroup>
- </chapterinfo>
+ </info>
- <title>Firewalls</title>
+
<indexterm><primary>firewall</primary></indexterm>
@@ -33,7 +24,7 @@
<secondary>firewalls</secondary>
</indexterm>
- <sect1 id="firewalls-intro">
+ <sect1 xml:id="firewalls-intro">
<title>Introduction</title>
<para>Firewalls make it possible to filter
@@ -109,7 +100,7 @@
</itemizedlist>
</sect1>
- <sect1 id="firewalls-concepts">
+ <sect1 xml:id="firewalls-concepts">
<title>Firewall Concepts</title>
<indexterm>
@@ -141,7 +132,7 @@
optimal firewall for the site.</para>
</sect1>
- <sect1 id="firewalls-apps">
+ <sect1 xml:id="firewalls-apps">
<title>Firewall Packages</title>
<para>&os; has three different firewall packages built
@@ -174,11 +165,10 @@
<acronym>TCP</acronym>/IP works, what the different values in
the packet control fields are and how these values are used in a
normal session conversation. For a good explanation go to:
- <ulink
- url="http://www.ipprimer.com/overview.cfm"></ulink>.</para>
+ <uri xlink:href="http://www.ipprimer.com/overview.cfm">http://www.ipprimer.com/overview.cfm</uri>.</para>
</sect1>
- <sect1 id="firewalls-pf">
+ <sect1 xml:id="firewalls-pf">
<title>The OpenBSD Packet Filter (PF) and
<acronym>ALTQ</acronym></title>
@@ -203,8 +193,7 @@
this handbook firewall section as that would just be duplicated
effort.</para>
- <para>More info can be found at the PF for &os; web site: <ulink
- url="http://pf4freebsd.love2party.net/"></ulink>.</para>
+ <para>More info can be found at the PF for &os; web site: <uri xlink:href="http://pf4freebsd.love2party.net/">http://pf4freebsd.love2party.net/</uri>.</para>
<sect2>
<title>Enabling PF</title>
@@ -357,8 +346,7 @@ options ALTQ_NOPCC # Required for SMP build</programlisting>
<para><literal>options ALTQ_HFSC</literal> enables the
Hierarchical Fair Service Curve Packet Scheduler. For more
- information about <acronym>HFSC</acronym> see: <ulink
- url="http://www-2.cs.cmu.edu/~hzhang/HFSC/main.html"></ulink>.</para>
+ information about <acronym>HFSC</acronym> see: <uri xlink:href="http://www-2.cs.cmu.edu/~hzhang/HFSC/main.html">http://www-2.cs.cmu.edu/~hzhang/HFSC/main.html</uri>.</para>
<para><literal>options ALTQ_PRIQ</literal> enables Priority
Queuing (<acronym>PRIQ</acronym>). <acronym>PRIQ</acronym>
@@ -385,7 +373,7 @@ options ALTQ_NOPCC # Required for SMP build</programlisting>
the syntax is the same as one used in OpenBSD. A great
resource for configuring the <application>pf</application>
firewall has been written by OpenBSD team and is available at
- <ulink url="http://www.openbsd.org/faq/pf/"></ulink>.</para>
+ <uri xlink:href="http://www.openbsd.org/faq/pf/">http://www.openbsd.org/faq/pf/</uri>.</para>
<warning>
<para>When browsing the pf user's guide, please keep in mind that
@@ -402,7 +390,7 @@ options ALTQ_NOPCC # Required for SMP build</programlisting>
</sect2>
</sect1>
- <sect1 id="firewalls-ipf">
+ <sect1 xml:id="firewalls-ipf">
<title>The IPFILTER (IPF) Firewall</title>
<indexterm>
@@ -463,17 +451,13 @@ options ALTQ_NOPCC # Required for SMP build</programlisting>
the only rule set type covered herein.</para>
<para>For detailed explanation of the legacy rules processing
- method see: <ulink
- url="http://www.obfuscation.org/ipf/ipf-howto.html#TOC_1"></ulink>
- and <ulink
- url="http://coombs.anu.edu.au/~avalon/ip-filter.html"></ulink>.</para>
+ method see: <uri xlink:href="http://www.obfuscation.org/ipf/ipf-howto.html#TOC_1">http://www.obfuscation.org/ipf/ipf-howto.html#TOC_1</uri>
+ and <uri xlink:href="http://coombs.anu.edu.au/~avalon/ip-filter.html">http://coombs.anu.edu.au/~avalon/ip-filter.html</uri>.</para>
- <para>The IPF FAQ is at <ulink
- url="http://www.phildev.net/ipf/index.html"></ulink>.</para>
+ <para>The IPF FAQ is at <uri xlink:href="http://www.phildev.net/ipf/index.html">http://www.phildev.net/ipf/index.html</uri>.</para>
<para>A searchable archive of the open-source IPFilter mailing list is
- available at <ulink
- url="http://marc.theaimsgroup.com/?l=ipfilter"></ulink>.</para>
+ available at <uri xlink:href="http://marc.theaimsgroup.com/?l=ipfilter">http://marc.theaimsgroup.com/?l=ipfilter</uri>.</para>
<sect2>
<title>Enabling IPF</title>
@@ -541,7 +525,7 @@ options IPFILTER_DEFAULT_BLOCK</programlisting>
<para><literal>options IPFILTER_LOG</literal> enables the option
to have IPF log traffic by writing to the
- <devicename>ipl</devicename> packet logging pseudo&mdash;device
+ <filename>ipl</filename> packet logging pseudo&mdash;device
for every rule that has the <literal>log</literal>
keyword.</para>
@@ -822,7 +806,7 @@ LOG_ERR - packets which have been logged and which can be considered short</scre
<listitem>
<para>The name of the interface the packet was processed on,
- e.g. <devicename>dc0</devicename>.</para>
+ e.g. <filename>dc0</filename>.</para>
</listitem>
<listitem>
@@ -873,7 +857,7 @@ LOG_ERR - packets which have been logged and which can be considered short</scre
a slash, e.g. ICMP 3/3 for a port unreachable message.</para>
</sect2>
- <sect2 id="firewalls-ipf-rules-script">
+ <sect2 xml:id="firewalls-ipf-rules-script">
<title>Building the Rule Script with Symbolic
Substitution</title>
@@ -971,7 +955,7 @@ EOF
sh /etc/ipf.rules.script</programlisting>
<para>The permissions on this script file must be read,
- write, execute for owner <username>root</username>.</para>
+ write, execute for owner <systemitem class="username">root</systemitem>.</para>
<screen>&prompt.root; <userinput>chmod 700 /usr/local/etc/rc.d/ipf.loadrules.sh</userinput></screen>
</listitem>
@@ -1152,7 +1136,7 @@ sh /etc/ipf.rules.script</programlisting>
<!-- XXX - xref here -->
- the <devicename>ipl</devicename> log (as described in the
+ the <filename>ipl</filename> log (as described in the
LOGGING section below) if the selection parameters match the
packet.</para>
@@ -1242,8 +1226,7 @@ sh /etc/ipf.rules.script</programlisting>
<para>There is no way to match ranges of IP addresses which
do not express themselves easily as mask-length. See this
- web page for help on writing mask-length: <ulink
- url="http://jodies.de/ipcalc"></ulink>.</para>
+ web page for help on writing mask-length: <uri xlink:href="http://jodies.de/ipcalc">http://jodies.de/ipcalc</uri>.</para>
</sect3>
<sect3>
@@ -1383,8 +1366,8 @@ sh /etc/ipf.rules.script</programlisting>
function.</para>
<para>All &unix; flavored systems including &os; are designed to
- use interface <devicename>lo0</devicename> and IP address
- <hostid role="ipaddr">127.0.0.1</hostid> for internal
+ use interface <filename>lo0</filename> and IP address
+ <systemitem class="ipaddress">127.0.0.1</systemitem> for internal
communication within the operating system. The firewall rules
must contain rules to allow free unmolested movement of these
special internally used packets.</para>
@@ -1393,7 +1376,7 @@ sh /etc/ipf.rules.script</programlisting>
where you place your rules to authorize and control access out
to the public Internet and access requests arriving from the
public Internet. This can be your user PPP
- <devicename>tun0</devicename> interface or your NIC that is
+ <filename>tun0</filename> interface or your NIC that is
connected to your DSL or cable modem.</para>
<para>In cases where one or more NICs are cabled to private LANs
@@ -1453,13 +1436,11 @@ sh /etc/ipf.rules.script</programlisting>
<para>When you log packets with port numbers you do not
recognize, look it up in <filename>/etc/services</filename> or
- go to <ulink
- url="http://www.securitystats.com/tools/portsearch.php"></ulink>
+ go to <uri xlink:href="http://www.securitystats.com/tools/portsearch.php">http://www.securitystats.com/tools/portsearch.php</uri>
and do a port number lookup to find what the purpose of that
port number is.</para>
- <para>Check out this link for port numbers used by Trojans <ulink
- url="http://www.simovits.com/trojans/trojans.html"></ulink>.</para>
+ <para>Check out this link for port numbers used by Trojans <uri xlink:href="http://www.simovits.com/trojans/trojans.html">http://www.simovits.com/trojans/trojans.html</uri>.</para>
<para>The following rule set is a complete very secure
'inclusive' type of firewall rule set that I have used on my
@@ -1470,10 +1451,10 @@ sh /etc/ipf.rules.script</programlisting>
<para>If you see messages in your log that you want to stop
seeing just add a block rule in the inbound section.</para>
- <para>You have to change the <devicename>dc0</devicename>
+ <para>You have to change the <filename>dc0</filename>
interface name in every rule to the interface name of the Nic
card that connects your system to the public Internet. For
- user PPP it would be <devicename>tun0</devicename>.</para>
+ user PPP it would be <filename>tun0</filename>.</para>
<para>Add the following statements to
<filename>/etc/ipf.rules</filename>:</para>
@@ -1713,27 +1694,27 @@ block in log first quick on dc0 all
<tbody>
<row>
- <entry>Start IP <hostid role="ipaddr">10.0.0.0</hostid></entry>
+ <entry>Start IP <systemitem class="ipaddress">10.0.0.0</systemitem></entry>
<entry>-</entry>
- <entry>Ending IP <hostid role="ipaddr">10.255.255.255</hostid></entry>
+ <entry>Ending IP <systemitem class="ipaddress">10.255.255.255</systemitem></entry>
</row>
<row>
- <entry>Start IP <hostid role="ipaddr">172.16.0.0</hostid></entry>
+ <entry>Start IP <systemitem class="ipaddress">172.16.0.0</systemitem></entry>
<entry>-</entry>
- <entry>Ending IP <hostid role="ipaddr">172.31.255.255</hostid></entry>
+ <entry>Ending IP <systemitem class="ipaddress">172.31.255.255</systemitem></entry>
</row>
<row>
- <entry>Start IP <hostid role="ipaddr">192.168.0.0</hostid></entry>
+ <entry>Start IP <systemitem class="ipaddress">192.168.0.0</systemitem></entry>
<entry>-</entry>
- <entry>Ending IP <hostid role="ipaddr">192.168.255.255</hostid></entry>
+ <entry>Ending IP <systemitem class="ipaddress">192.168.255.255</systemitem></entry>
</row>
</tbody>
</tgroup>
@@ -1809,8 +1790,7 @@ block in log first quick on dc0 all
<para>The <replaceable>LAN_IP_RANGE</replaceable> is what your
internal clients use for IP Addressing, usually this is
- something like <hostid
- role="ipaddr">192.168.1.0/24</hostid>.</para>
+ something like <systemitem class="ipaddress">192.168.1.0/24</systemitem>.</para>
<para>The <replaceable>PUBLIC_ADDRESS</replaceable> can either
be the external IP address or the special keyword
@@ -1939,9 +1919,8 @@ block in log first quick on dc0 all
has to be some way to direct the inbound traffic to the
correct LAN PCs. IP<acronym>NAT</acronym> has the redirection
facilities of <acronym>NAT</acronym> to solve this problem.
- Lets say you have your web server on LAN address <hostid
- role="ipaddr">10.0.10.25</hostid> and your single public IP
- address is <hostid role="ipaddr">20.20.20.5</hostid> you would
+ Lets say you have your web server on LAN address <systemitem class="ipaddress">10.0.10.25</systemitem> and your single public IP
+ address is <systemitem class="ipaddress">20.20.20.5</systemitem> you would
code the rule like this:</para>
<programlisting>rdr dc0 20.20.20.5/32 port 80 -&gt; 10.0.10.25 port 80</programlisting>
@@ -1950,8 +1929,7 @@ block in log first quick on dc0 all
<programlisting>rdr dc0 0/32 port 80 -&gt; 10.0.10.25 port 80</programlisting>
- <para>or for a LAN DNS Server on LAN address of <hostid
- role="ipaddr">10.0.10.33</hostid> that needs to receive
+ <para>or for a LAN DNS Server on LAN address of <systemitem class="ipaddress">10.0.10.33</systemitem> that needs to receive
public DNS requests:</para>
<programlisting>rdr dc0 20.20.20.5/32 port 53 -&gt; 10.0.10.33 port 53 udp</programlisting>
@@ -1972,8 +1950,7 @@ block in log first quick on dc0 all
in how the data channel is acquired. Passive mode is more
secure as the data channel is acquired be the ordinal ftp
session requester. For a real good explanation of FTP and the
- different modes see <ulink
- url="http://www.slacksite.com/other/ftp.html"></ulink>.</para>
+ different modes see <uri xlink:href="http://www.slacksite.com/other/ftp.html">http://www.slacksite.com/other/ftp.html</uri>.</para>
<sect3>
<title>IP<acronym>NAT</acronym> Rules</title>
@@ -2058,7 +2035,7 @@ pass in quick on rl0 proto tcp from any to any port = 20 flags S keep state</pro
</sect2>
</sect1>
- <sect1 id="firewalls-ipfw">
+ <sect1 xml:id="firewalls-ipfw">
<title>IPFW</title>
<indexterm>
@@ -2104,7 +2081,7 @@ pass in quick on rl0 proto tcp from any to any port = 20 flags S keep state</pro
facilities, the 'fwd rule' forward facility, the bridge
facility, and the ipstealth facility.</para>
- <sect2 id="firewalls-ipfw-enable">
+ <sect2 xml:id="firewalls-ipfw-enable">
<title>Enabling IPFW</title>
<indexterm>
@@ -2138,7 +2115,7 @@ pass in quick on rl0 proto tcp from any to any port = 20 flags S keep state</pro
net.inet.ip.fw.verbose_limit=5</programlisting>
</sect2>
- <sect2 id="firewalls-ipfw-kernel">
+ <sect2 xml:id="firewalls-ipfw-kernel">
<title>Kernel Options</title>
<indexterm>
@@ -2226,7 +2203,7 @@ options IPV6FIREWALL_DEFAULT_TO_ACCEPT</programlisting>
</note>
</sect2>
- <sect2 id="firewalls-ipfw-rc">
+ <sect2 xml:id="firewalls-ipfw-rc">
<title><filename>/etc/rc.conf</filename> Options</title>
<para>If you do not have IPFW compiled into your kernel you will
@@ -2255,8 +2232,7 @@ options IPV6FIREWALL_DEFAULT_TO_ACCEPT</programlisting>
<para>The only thing that the
<varname>firewall_logging</varname> variable will do is
setting the <varname>net.inet.ip.fw.verbose</varname> sysctl
- variable to the value of <literal>1</literal> (see <xref
- linkend="firewalls-ipfw-enable"/>). There is no
+ variable to the value of <literal>1</literal> (see <xref linkend="firewalls-ipfw-enable"/>). There is no
<filename>rc.conf</filename> variable to set log limitations,
but it can be set via sysctl variable, manually or from the
<filename>/etc/sysctl.conf</filename> file:</para>
@@ -2271,7 +2247,7 @@ options IPV6FIREWALL_DEFAULT_TO_ACCEPT</programlisting>
options.</para>
</sect2>
- <sect2 id="firewalls-ipfw-cmd">
+ <sect2 xml:id="firewalls-ipfw-cmd">
<title>The IPFW Command</title>
<indexterm><primary><command>ipfw</command></primary></indexterm>
@@ -2330,7 +2306,7 @@ options IPV6FIREWALL_DEFAULT_TO_ACCEPT</programlisting>
<screen>&prompt.root; <userinput>ipfw zero NUM</userinput></screen>
</sect2>
- <sect2 id="firewalls-ipfw-rules">
+ <sect2 xml:id="firewalls-ipfw-rules">
<title>IPFW Rule Sets</title>
<!-- XXX: looks incorrect (and duplicated 2 times in this chapter):
@@ -2401,7 +2377,7 @@ options IPV6FIREWALL_DEFAULT_TO_ACCEPT</programlisting>
end up locking your self out.</para>
</warning>
- <sect3 id="firewalls-ipfw-rules-syntax">
+ <sect3 xml:id="firewalls-ipfw-rules-syntax">
<title>Rule Syntax</title>
<indexterm>
@@ -2532,8 +2508,7 @@ options IPV6FIREWALL_DEFAULT_TO_ACCEPT</programlisting>
specified as a dotted IP address numeric form/mask-length,
or as single dotted IP address numeric form. This is a
mandatory requirement. See this link for help on writing
- mask-lengths. <ulink
- url="http://jodies.de/ipcalc"></ulink></para>
+ mask-lengths. <uri xlink:href="http://jodies.de/ipcalc">http://jodies.de/ipcalc</uri></para>
<para><parameter>port number</parameter></para>
@@ -2565,7 +2540,7 @@ options IPV6FIREWALL_DEFAULT_TO_ACCEPT</programlisting>
<para><parameter>keep-state</parameter></para>
- <para>This is a mandatory> keyword. Upon a match, the
+ <para>This is a mandatory&gt; keyword. Upon a match, the
firewall will create a dynamic rule, whose default behavior
is to match bidirectional traffic between source and
destination IP/port using the same protocol.</para>
@@ -2681,7 +2656,7 @@ options IPV6FIREWALL_DEFAULT_TO_ACCEPT</programlisting>
in the <filename>/etc/syslog.conf</filename> file.</para>
</sect3>
- <sect3 id="firewalls-ipfw-rules-script">
+ <sect3 xml:id="firewalls-ipfw-rules-script">
<title>Building a Rule Script</title>
<para>Most experienced IPFW users create a file containing the
@@ -2756,8 +2731,8 @@ ks="keep-state" # just too lazy to key this each time
to have rules to allow the firewall to function.</para>
<para>All &unix; flavored operating systems, &os; included, are
- designed to use interface <devicename>lo0</devicename> and IP
- address <hostid role="ipaddr">127.0.0.1</hostid> for internal
+ designed to use interface <filename>lo0</filename> and IP
+ address <systemitem class="ipaddress">127.0.0.1</systemitem> for internal
communication with in the operating system. The firewall
rules must contain rules to allow free unmolested movement of
these special internally used packets.</para>
@@ -2766,7 +2741,7 @@ ks="keep-state" # just too lazy to key this each time
which you code your rules to authorize and control access out
to the public Internet and access requests arriving from the
public Internet. This can be your ppp
- <devicename>tun0</devicename> interface or your NIC that is
+ <filename>tun0</filename> interface or your NIC that is
connected to your DSL or cable modem.</para>
<para>In cases where one or more than one NIC are connected to
@@ -2813,12 +2788,10 @@ ks="keep-state" # just too lazy to key this each time
The less the attackers can learn about your system the more
secure it is. When you log packets with port numbers you do
not recognize, look the numbers up in
- <filename>/etc/services/</filename> or go to <ulink
- url="http://www.securitystats.com/tools/portsearch.php"></ulink>
+ <filename>/etc/services/</filename> or go to <uri xlink:href="http://www.securitystats.com/tools/portsearch.php">http://www.securitystats.com/tools/portsearch.php</uri>
and do a port number lookup to find what the purpose of that
port number is. Check out this link for port numbers used by
- Trojans: <ulink
- url="http://www.simovits.com/trojans/trojans.html"></ulink>.</para>
+ Trojans: <uri xlink:href="http://www.simovits.com/trojans/trojans.html">http://www.simovits.com/trojans/trojans.html</uri>.</para>
</sect3>
<sect3>