LinuxQuestions.org

LinuxQuestions.org (/questions/)
-   Slackware (https://www.linuxquestions.org/questions/slackware-14/)
-   -   Idea for Slackware 14.0 - Easy Firewall Generator (clone of AlienBob's) (https://www.linuxquestions.org/questions/slackware-14/idea-for-slackware-14-0-easy-firewall-generator-clone-of-alienbobs-4175413748/)

ReaperX7 06-27-2012 08:49 PM

Idea for Slackware 14.0 - Easy Firewall Generator (clone of AlienBob's)
 
I just realized that Slackware really doesn't include a ready to use Firewall by default that is setup by the user either during installation or post-installation using IPTables.

Why not add a simple extra set of tools to the BusyBox nCurses installer to generate a Firewall using a script program labeled something like "fwconfig" (similar to the current config scripts for Alsa, X11, Network, and such) that operates exactly like the Easy Firewall Generator webpage on AlienBob's (Eric's) website, and makes it executable for the boot sequence.

Would be a nice extra touch, IMO.

Any comments? Good idea? Bad idea? Etc?

cikrak 06-27-2012 09:01 PM

Quote:

Originally Posted by ReaperX7 (Post 4713716)
I just realized that Slackware really doesn't include a ready to use Firewall by default that is setup by the user either during installation or post-installation using IPTables.

Why not add a simple extra set of tools to the BusyBox nCurses installer to generate a Firewall using a script program labeled something like "fwconfig" (similar to the current config scripts for Alsa, X11, Network, and such) that operates exactly like the Easy Firewall Generator webpage on AlienBob's (Eric's) website, and makes it executable for the boot sequence.

Would be a nice extra touch, IMO.

Any comments? Good idea? Bad idea? Etc?

+1

This will be a value added in security for 'lazy' slackers like me :)

Alchemikos 06-27-2012 10:36 PM

Great Awesome idea

H_TeXMeX_H 06-28-2012 03:49 AM

I think it would be useful, and would improve default security in Slackware.

alekow 06-28-2012 04:29 AM

Not a bad idea at all :-) BTW - Alien, thanks for the generator!

ReaperX7 06-28-2012 02:49 PM

You know of all the things you never think about, it's simple basic security like a Firewall. If Windows, since XP Service Pack 2, can be secure out of the box with it's own pre-configured Firewall, why can't Linux, and especially Slackware have it's own firewall setup tool and firewall script?

You know, of all the Linux distributions out there, how many Linux distributions actually INCLUDE a firewall tool ready to go out of the box for IPTables at installation time? One or two, maybe? But are those mainstream distributions? Probably not.

Time to drop the boulder in the small pond and make a hell of a splash in my opinion.

chess 06-28-2012 02:53 PM

Quote:

Originally Posted by ReaperX7 (Post 4714386)
You know, of all the Linux distributions out there, how many Linux distributions actually INCLUDE a firewall tool ready to go out of the box for IPTables at installation time? One or two, maybe? But are those mainstream distributions? Probably not.

I believe Debian, Ubuntu, and others of its ilk include ufw and I also believe Fedora has its own gui frontend to iptables.

hitest 06-28-2012 04:27 PM

ReaperX7,

I like that idea a lot. I like and use Eric's script. I think that would be a very welcome addition to 14.0. :)

NoStressHQ 06-28-2012 05:26 PM

Well,

I'm glad this subject comes to "mainstream", as I tried to propose a script myself for that but barely had any answers :)...

It was last summer...

I'm still using this script. And have some other useful scripts but I don't have the time to setup a "blog" or something and feed it with "human pleasable" content ;)... But I'd be happy to team up with some folks in order to improve "3rd party slackware utilities"...

Cheers.

Garry.

ReaperX7 06-28-2012 07:01 PM

I've used Ubuntu before but I've never seen them have a ready-to-go Firewall out of the box. I have seen them have available a Firewall like Firestarter and FireHOL but they were never actually included in the general configuration, only in the online downloadable packages.

I wonder how Patrick would feel about a proposal such as this?

cikrak 06-28-2012 07:29 PM

Quote:

Originally Posted by NoStressHQ (Post 4714512)
Well,

I'm glad this subject comes to "mainstream", as I tried to propose a script myself for that but barely had any answers :)...

It was last summer...

I'm still using this script. And have some other useful scripts but I don't have the time to setup a "blog" or something and feed it with "human pleasable" content ;)... But I'd be happy to team up with some folks in order to improve "3rd party slackware utilities"...

Cheers.

Garry.

It would be nice if your script going to /testing first of Slackware-current. Hope your project will get more attention from Slackware users to try,test, and improve it.

Quote:

If the core Slackware team (Pat, AlienBob, ...) have some advices, requests or ideas for improvement, I think it might even be interesting to add it in "/extra" someday, as I suspect this would be a wish for some Slackers, and maybe improve first steps accessibility to newbies, having a firewall nearly 'out of the box'. Obviously it'll require a better packaging.
It doesn't hurt everyone :) NoStressHQ is ready now to take an action without Stress :D

allend 06-28-2012 08:21 PM

Personally, I do not like this idea. I recognise that iptables and firewall scripts are intimidating to new users, but there are many HOWTOs and examples available. Security is an issue that requires study and understanding. Scripts and GUI generators do not provide this.
If the desire is to protect a new user setting up on a home system, then firewall protection is very likely already being provided by the external modem/router.
If the desire is to setup a minimal firewall that blocks everything, then simply copy the already provided '/etc/ppp/firewall-standalone' to '/etc/rc.d/rc.firewall' and change the EXTIF if necessary.
Having a firewall setup at installation will be a hindrance to those trying to setup servers with various servers available.

Diantre 06-28-2012 08:47 PM

Quote:

Originally Posted by allend (Post 4714586)
Having a firewall setup at installation will be a hindrance to those trying to setup servers with various servers available.

Not necessarily. The firewall setup can be optional, if one needs it press "yes", and configure and create a rc.firewall script, or press "no" and create the firewall rules manually.

ReaperX7 06-28-2012 09:01 PM

You can always skip that step, which would obviously be provided as other existing tools provide if you feel a manual configuration is more your thing, or no configuration is needed.

The point of the tool's addition isn't to take away from existing tools out there, just supplement what's already there for the end-user who may want to setup his/her own Firewall and make it less a headache while providing a sense of having a tool that makes security readily available if desired.

While SPI Firewall's on Routers and other hardware are effective often sometimes this isn't enough if another computer is or has become compromised.

AlienBob's Firewall script by default when you visit his webpage configures a basic yet powerful Firewall for Dynamic IP Addresses on Single Systems. This should be at minimal, a setup for a normal user during installation. Even without understanding some level of security, the default configuration offers a very solid solution even a novice Linux user would benefit from. If needed the tool can be reran and the script updated to allow things like BitTorrent, MSN, etc. However, currently there is not a tool to do this on the system if it's offline. If you want to use AlienBobs EFG, you have to be online.

For IT professionals there are other tools even in his script that allow for Static IPs, specialized ports, and even application specific allowances, and some of which are server oriented.

http://www.slackware.com/~alien/efg/

If we can have tools to setup Xorg, ALSA, Network Addressing schemes, disk partitions, and even a window manager, why can't we have a tool that sets up a firewall with a basic to advanced level of configuration?

cikrak 06-28-2012 09:09 PM

Quote:

Originally Posted by allend (Post 4714586)
Having a firewall setup at installation will be a hindrance to those trying to setup servers with various servers available.

It's true, the core dev team need serious consideration and testing if firewall included during instalation. But the option menu to enable/disable this feature during instalation will solve the problem for user who need advance configuration. IMO, the idea proposed by ReaperX7 is simple (and basic) feature. So everyone can add,modify, or start their EXTIF if needed after post installation without worry.

It's nice if rc.firewall exist by default after instalation (although in blank page when I type nano /etc/rc.d/rc.firewall) :)

allend 06-29-2012 12:27 AM

Quote:

However, currently there is not a tool to do this on the system if it's offline. If you want to use AlienBobs EFG, you have to be online.
As I explained, you can get a minimal secure firewall from the default Slackware install.
If you want to trust your security to a script provided by someone else over the web, then feel free. I choose not to do so.

H_TeXMeX_H 06-29-2012 01:54 AM

Well, it should be choice during the install, something like "Would you like to configure a minimal firewall ?". Obviously, experts will choose no, and do it themselves. Newbies and lazy users (like me) will choose yes. It will improve default security in these cases. I don't see anything wrong with AlienBob's EFG, I've never had problems with and it provides good protection as I see from online tests.

NoStressHQ 06-29-2012 02:46 AM

Quote:

Originally Posted by ReaperX7 (Post 4714610)
However, currently there is not a tool to do this on the system if it's offline. If you want to use AlienBobs EFG, you have to be online.

That's not true: the bash script conversion I did (see above) is a port of the PHP generator as a BASH script... It IS DONE to be run "offline"...

Edit: well, to be fair, it's a port of "parts" of the php script I used... I might (will) require some improvement and more features... But I'm ok to do this work if people need those features.

NoStressHQ 06-29-2012 02:47 AM

Quote:

Originally Posted by cikrak (Post 4714561)
It would be nice if your script going to /testing first of Slackware-current. Hope your project will get more attention from Slackware users to try,test, and improve it.



It doesn't hurt everyone :) NoStressHQ is ready now to take an action without Stress :D

Yeah and I'd be glad to package it as a "slackbuild", and work on improvements on it.

Cheers

solarfields 06-29-2012 02:57 AM

It would be very nice to have an easy way to set up a firewall.
I actually still use Chess Griffin's firewall from a document I found years ago titled Slackware security (IIRK). Thanks Chess! And thanks to allend for pointing to /etc/ppp/firewall-standalone! I had never looked there...:o

cikrak 06-29-2012 06:16 AM

Quote:

Originally Posted by NoStressHQ (Post 4714778)
Yeah and I'd be glad to package it as a "slackbuild", and work on improvements on it.

Cheers

I propose the name like NoStressHQ-*.txz :) No Stress for lazy Slackers, HIGH QUALITY firewall ;)

Cheers

allend 06-29-2012 07:13 AM

My problem with an easier firewall setup is that it encourages a user to think that all that needs to be done to securely set up services such as NFS or SSH is elect to start the daemon during the install and then open ports in the firewall. Both the examples that I cite require further changes to a default Slackware install in order to to achieve an appropriately configured and secure setup. Merely opening ports in a firewall is only part of the setup process.
I do not wish to denigrate firewall setup scripts. I have used Alien_Bob's EFG and have learned from the output.

ReaperX7 06-29-2012 02:51 PM

The point of the tools is to at least get some basic level of security integrated into Slackware's setup not for the advanced users with their custom setup scripts, but for beginner/novice users who don't understand the complex startup scripts for IPTables.

For many users starting out, they don't understand how anything works on Linux until AFTER they get online and start reading. Before they get online they have a system that is NOT secure even in the least. It's only after they get everything from online websites, documents, and such they finally learn how to setup a Firewall on Linux, but by that time, it could be too late. The basic firewall or even advanced setup script(s) that could be implemented at least offer some fundamental baseline for what type of security we should strive for. Even at the most basic level of configuration AlienBOB's script does block a lot of unwanted traffic and only allows valid protocols from applications loaded.

For the advanced users running servers, yes we don't need it and that part of the setup and system configuration CAN be skipped. Even I don't use the basic setup of AlienBOB's script. I actually have some customizations just for my system to handle ports, protocols, and which traffic from other systems on my network can see and communicate with my machine, but in comparison, something is better than nothing. By offering at least some basic level we can at least tell the beginner user, "Yes you have a firewall setup tool, yes the firewall works, and yes your system has protection, but there are documents out there to allow for more advanced features when and if you need them."

This tool is needed for the system regardless of how we look at it. Yes, it's not a tool for advanced users, but for beginners it's a sign that the project cares about your security.

And as stated, if you don't want to use it, you can skip it... Just like some of us skip the installation section to create a Bootable USB Stick for LILO, and Testing Custom Screen Fonts.

cikrak 06-29-2012 10:24 PM

Quote:

Originally Posted by ReaperX7 (Post 4715253)
"Yes you have a firewall setup tool, yes the firewall works, and yes your system has protection, but there are documents out there to allow for more advanced features when and if you need them."

This tool will give enough time for coffee morning break while thinking advanced features,...or handle another non technical stuff (from the first online).

volkerdi 06-29-2012 10:55 PM

Quote:

Originally Posted by ReaperX7 (Post 4715253)
For many users starting out, they don't understand how anything works on Linux until AFTER they get online and start reading. Before they get online they have a system that is NOT secure even in the least.

Really? I'm curious where the security issues are on a freshly installed, unfirewalled machine that would let people break in the moment you got online.

allend 06-29-2012 11:17 PM

Quote:

Originally Posted by ReaperX7
"Yes you have a firewall setup tool, yes the firewall works, and yes your system has protection, but there are documents out there to allow for more advanced features when and if you need them."
That reads a lot like:
Quote:

If you need to set up your Linux machine as a router for other systems,
you'll want to set up the interfaces in /etc/rc.d/rc.inet1.conf, and
set up NAT support with something like this in /etc/rc.d/rc.firewall,
and then make rc.firewall executable.

# Delete and flush. Default table is "filter".
# Others like "nat" must be explicitly stated.
iptables --flush
# Flush all the rules in filter and nat tables
iptables --table nat --flush
# Delete all chains that are not in default filter and nat table
iptables --delete-chain
iptables --table nat --delete-chain
# Set up IP FORWARDing and Masquerading
iptables --table nat --append POSTROUTING --out-interface eth0 -j MASQUERADE
iptables --append FORWARD --in-interface eth1 -j ACCEPT
echo "Enabling ip_forwarding..."
echo 1 > /proc/sys/net/ipv4/ip_forward

It's possible to expand (or reduce ;-) this script for just about any
firewall needed. See "man iptables" for lots of information.
All Slackware users should know where that quote came from.

NoStressHQ 07-01-2012 04:29 AM

Quote:

Originally Posted by allend (Post 4715484)
That reads a lot like:

All Slackware users should know where that quote came from.

That's a shade I dislike... Are we "playing a game" ? Do you want to know who's got the bigger d*ck ?? Seriously... That reminds one of my colleague "playing teacher" with another one instead of just doing its job...

Where are the "leader board" so I can see if me too I can be "the geekier slacker around" ??? I like slackware because it's straightforward, vanilla and so on... NOT because it makes me feel superior to other people because *I* would know in which deeply hidden documentation some quote is...

Seriously that is off topic and does not help the debate...

The debate is: There ARE noobs, even using Slackware, and even if you don't mind, there also are professionals (myself) not willing to write many time the same stuff... sorry, I'm a programmer, for 23 years now, and I never like writing the same thing twice, moreover I got the brain to automate a "dull task"... If you like doing those no brain task by hand that's your freedom, having some tool that helps people not to write the script, just using easy and human readable data (yet itself a script that can itself be generated or whatever), I really don't understand where it bothers the one that like to type useless stuff (yes useful, but brainless once you have done it), they can... The one who'd rather have a life instead of opening vi etc, those people would be able to do something else AND have a firewall AND have a control on how this firewall is setup.

I'm not into the graphical tools... BUt complaining because a helper, not mandatory, could be too easy for the people... Sorry but this is deeply stupid...

(Nothing personal allend, this is the content of your message that brang one of my turns, something like that http://www.youtube.com/watch?v=kG36n8vFAmE :) )

NoStressHQ 07-01-2012 04:37 AM

Quote:

Originally Posted by volkerdi (Post 4715477)
Really? I'm curious where the security issues are on a freshly installed, unfirewalled machine that would let people break in the moment you got online.

Hi Pat,

Sorry, but there is at least another one, obviously it's unfirewalled, but also SSH deamon accept root connection (this is not a safe behavior for a server plugged directly on the web).
Edit: well, thinking about that, it's not really a "leak", you really need to be able to connect as root during the early install phase, and the fact that you should first create a user then, disable the remote root access, is a "good habit", but the system can't do or propose a lot more without getting into something overkill.

There might be some other, but I don't remind at the time (..of wakening :) )...

BTW, we are not criticizing nor willing to impose anything on slackware, we just propose things that we think could be useful to some of us, and if it can help "noobs" to come to slackware, I'd be happy.

Thanks for all the hard work,

Cheers

Garry.

H_TeXMeX_H 07-01-2012 06:44 AM

Quote:

Originally Posted by NoStressHQ (Post 4716198)
Hi Pat,

Sorry, but there is at least another one, obviously it's unfirewalled, but also SSH deamon accept root connection (this is not a safe behavior for a server plugged directly on the web).
Edit: well, thinking about that, it's not really a "leak", you really need to be able to connect as root during the early install phase, and the fact that you should first create a user then, disable the remote root access, is a "good habit", but the system can't do or propose a lot more without getting into something overkill.

There might be some other, but I don't remind at the time (..of wakening :) )...

BTW, we are not criticizing nor willing to impose anything on slackware, we just propose things that we think could be useful to some of us, and if it can help "noobs" to come to slackware, I'd be happy.

Thanks for all the hard work,

Cheers

Garry.

I agree. It stops port scanning, where hackers look for vulnerable services with open and unfirewalled ports. It helps prevent exploitation of bugs in unpatched services or unknown exploits in services with open ports. I don't see how not having a firewall by default is more secure than having a basic one. The first thing I do after installing slackware is copy in my old rc.firewall (one generated by EFG).

Alien Bob 07-01-2012 08:18 AM

Quote:

Originally Posted by NoStressHQ (Post 4716193)
That's a shade I dislike... Are we "playing a game" ? Do you want to know who's got the bigger d*ck ?? Seriously... That reminds one of my colleague "playing teacher" with another one instead of just doing its job...

Where are the "leader board" so I can see if me too I can be "the geekier slacker around" ??? I like slackware because it's straightforward, vanilla and so on... NOT because it makes me feel superior to other people because *I* would know in which deeply hidden documentation some quote is...

Seriously that is off topic and does not help the debate...

It is not off-topic actually. That quote is taken from the email root has in her mailbox immediately after a fresh install of Slackware...
In Slackware 13.37 that email has the subject "Welcome to Linux (Slackware 13.37)!" and you are well-advised to read it!

Also, Slackware does not activate the SSH daemon by default. You, the person installing Slackware, makes the conscious decision of activating it (or not) during installation.

Eric

ppr:kut 07-01-2012 09:53 AM

Because I think it fits: http://noobfarm.org/viewquote.php?id=1667

NonNonBa 07-01-2012 10:38 AM

Quote:

Originally Posted by NoStressHQ
Sorry, but there is at least another one, obviously it's unfirewalled, [...]

Not absolutely true. I don't know for other countries, but I don't think the French ISPs are particularly innovative. By there, the boxes provided by the ISPs are configured to reject all the input connections, so the real problem is more to success in dealing with insane web interfaces to finally get the ports you need open.

Quote:

Originally Posted by NoStressHQ
[...]but also SSH deamon accept root connection (this is not a safe behavior for a server plugged directly on the web).

In the case of an headless machine, it's just the sane default setting. This is the problem when you want a "noob-proof" thing, you are drawn to fight the skilled users which will first have to break the default config to then do what they need.

However, I agree IPtables is not the easiest thing to deal with, when you want to learn to control the firewall. Many people -- and not only noob -- seem to dream to an OpenBSD's pf Linux clone (and indeed nftables was taking that way). Maybe include shorewall or this kind of thing could help to fix this...

H_TeXMeX_H 07-01-2012 12:13 PM

Quote:

Originally Posted by NonNonBa (Post 4716369)
Maybe include shorewall or this kind of thing could help to fix this...

It's true it might be a better idea. I mean I no longer use the slackware internet config scripts, I use wicd, because it is a lot easier to work with especially with wifi. Still, I guess I could install shorewall or something like it myself ... you know I just might.

ReaperX7 07-01-2012 03:24 PM

Shorewall from the last times I've tried to use it takes a lot of configuration time to setup, configure, reconfigure several times, hoping you get it right. A script to configure Shorewall would be a real undertaking though, but would make the process easier to setup everything and the fact that Shorewall6 supports IPv6 would be a good addition as well.

Perhaps a small compromise...

Could an offline form of AlienBOB's webpage for setting up the IPTables firewall be included on the DVD in /extra?

H_TeXMeX_H 07-02-2012 01:06 PM

What about firewall builder, it looks reasonably easy to use:
http://www.fwbuilder.org/
You can use it to generate scripts in a similar but more GUI way. It is GPL'd by the way, just in case you think the site looks proprietary.
http://www.youtube.com/watch?v=Q5GPrkwyGxw

ReaperX7 07-02-2012 01:31 PM

FwBuilder might be too advanced for some users. It might be best to want a firewall that anyone can use and can be setup with a script generation tool that doesn't require advanced level and knowledge of firewalls, IP addressing, and such tasks.

Shorewall seems better because it's just non-architectural scripts that require an editor or script generator. AlienBOB's EFG fits this because it more or less the same thing, but just uses a webpage based script generation tool to create the rc.firewall script to load modules for the kernel and setup addressing schemes, ports, etc.

However, regardless which would ever be useful, you want something for everybody of any skill level and it has to be optional to setup.

T3slider 07-02-2012 01:57 PM

Quote:

Originally Posted by ReaperX7 (Post 4717356)
However, regardless which would ever be useful, you want something for everybody of any skill level and it has to be optional to setup.

What you are describing doesn't sound anything like Slackware at all. Slackware, in my opinion, is a distro that makes things simple rather than easy. It has already done this by checking for /etc/rc.d/rc.firewall from rc.inet2, allowing you to just drop in any firewall script using any firewall tool you may desire. It is simple yet flexible and makes no assumptions. While I suppose I wouldn't *object* to a firewall script during setup as long as it allows me to skip it, I don't see the need and as far as I'm concerned the current rc.firewall situation falls in line with the rest of the design decisions in Slackware (no multilib, but setup for multilib by using lib64 on 64-bit systems, for example). I use the EFG to create a base and modify the resulting script to fit my needs. The current situation fits me just fine, and since Slackware is meant to be the thinking man's distro I would think anyone who knows anything about computers would know about firewalls as a concept and find a way to implement it in Slackware if they didn't already know how. There are hundreds of iptables firewall tutorials available, and shorewall, firehol and fwbuilder are all available from slackbuilds.org.

cikrak 07-02-2012 07:45 PM

Choose your answer :

A.ONLY a blank rc.firewall.
B.ONLY rc.firewall with very basic script.
C.Installer option + blank rc.firewall
D.Installer option + very basic firewall
E.Installer option + generator scripts included
F.All the anwers wrong. (Only BDFL can choose this ) :D

Maybe the easy route just make rc.firewall exist. The user will enable this features if he want it (just change it to 755).The problem is the content of rc.firewall it self. Every user have different agenda, so the content should be a basic one.

ReaperX7 07-02-2012 08:20 PM

Quote:

Originally Posted by T3slider (Post 4717381)
What you are describing doesn't sound anything like Slackware at all. Slackware, in my opinion, is a distro that makes things simple rather than easy. It has already done this by checking for /etc/rc.d/rc.firewall from rc.inet2, allowing you to just drop in any firewall script using any firewall tool you may desire. It is simple yet flexible and makes no assumptions. While I suppose I wouldn't *object* to a firewall script during setup as long as it allows me to skip it, I don't see the need and as far as I'm concerned the current rc.firewall situation falls in line with the rest of the design decisions in Slackware (no multilib, but setup for multilib by using lib64 on 64-bit systems, for example). I use the EFG to create a base and modify the resulting script to fit my needs. The current situation fits me just fine, and since Slackware is meant to be the thinking man's distro I would think anyone who knows anything about computers would know about firewalls as a concept and find a way to implement it in Slackware if they didn't already know how. There are hundreds of iptables firewall tutorials available, and shorewall, firehol and fwbuilder are all available from slackbuilds.org.

How would Slackware be different than it is? To include one extra tool/step during setup/configuration to configure some basic level of internet/network security or allow an advanced user to program in what they want for their firewall? LILO sets up this way and most people don't "think" about how they want to configure LILO. They just set it up with the basics, pick what resolution they want for the framebuffer, and go with it. There are those who chose to customize LILO to their hearts desire but that's them. Heck, if you're crazy enough you can even skip LILO, not that it's recommended or advised you do so.

Plus I did leave the option out to discuss including an offline webpage on the installation disk for EFG, possibly in /extra.

The decision to remove Gnome was big but then find out we have to rely on some of it's libraries and find out we need to add some back in to support packages using them as dependencies. Yet many seem to think adding Gnome libraries back in for dependencies is the end of the world. It's just dependencies and while Slackware is growing all the time, it's evolving all the time as well. We knew eventually it wasn't going to be an OS limited to just 1 CD-ROM disk or even now 1 DVD-ROM disk. With time all things change to some extent.

However, as anything goes, it's just discussion, ideas being tossed back and forth, conversion, and even some debate. Better to be a ripple in a pond than a wave in the ocean.

cikrak 07-02-2012 08:37 PM

Quote:

Originally Posted by ReaperX7 (Post 4717638)
They just set it up with the basics, pick what resolution they want for the framebuffer, and go with it. There are those who chose to customize LILO to their hearts desire but that's them.

I believe the basics configuration will not make Slackware dictate their user how to run their system (firewall).

I like the sample and warning from FreeBSD related to firewall :

http://www.freebsd.org/doc/en_US.ISO...alls-ipfw.html

Quote:

The IPFW sample ruleset (found in /etc/rc.firewall and /etc/rc.firewall6) in the standard FreeBSD install is rather simple and it is not expected to be used directly without modifications. The example does not use stateful filtering, which is beneficial in most setups...

ReaperX7 07-03-2012 05:36 AM

Posting from my phone:

I would suggest that if a firewall was ever included that even at the bsic configuration that it's a stateful packet inspection firewall rather than a stateless firewall. However there could be an option to have a generic rc.firewall script setup as such for a stateful packet inspection and filtering scheme for dynamic addresses already in the /etc/rc.d directory and all the end user has to do is run chmod +x against it from root to enable it.

bormant 07-04-2012 07:44 AM

We have /usr/share/mkinitrd/mkinitrd_command_generator.sh with no option in installer to use it.
As for me /usr/share/iptables/firewall_generator.sh placed in iptables package and mentioned in documentation (CHANGES_AND_HINTS.TXT) with no option in installer seems the best solution.

H_TeXMeX_H 07-04-2012 08:15 AM

Quote:

Originally Posted by bormant (Post 4719034)
We have /usr/share/mkinitrd/mkinitrd_command_generator.sh with no option in installer to use it.
As for me /usr/share/iptables/firewall_generator.sh placed in iptables package and mentioned in documentation (CHANGES_AND_HINTS.TXT) with no option in installer seems the best solution.

Yeah, that is also possible, although I don't see why it shouldn't be mentioned in the installer.

ReaperX7 07-04-2012 02:02 PM

Cool.

Slax-Dude 07-05-2012 12:43 PM

+1 for the firewall config script in the installer, although it should be "skippable"

Scripts that automate system configuration (like liloconfig or mkinitrd_command_generator.sh) are already present in Slackware, so I don't think making things easier goes against the distro's philosophy.

T3slider 07-05-2012 01:32 PM

Quote:

Originally Posted by Slax-Dude (Post 4720107)
+1 for the firewall config script in the installer, although it should be "shippable"

Scripts that automate system configuration (like liloconfig or mkinitrd_command_generator.sh) are already present in Slackware, so I don't think making things easier goes against the distro's philosophy.

Creating a lilo.conf and an initrd are both required just to get the system to boot. They are not the same thing as a firewall. The other scripts included in the installer/pkgtool are simple configuration tools that unambiguously select one option out of a finite number of options. A firewall cannot be represented by such a simple script/configuration and is a fundamentally different concept. For example, timeconfig allows you to set your timezone. There is really only one 'correct' answer to select. This is *not* the case with a firewall.

I will repeat that I wouldn't object to a firewall script being included, but pretending that it is a simple matter of shipping a do-everything script is not helping. Enabling a good, secure firewall *will* flood Pat with support requests asking why network services aren't working (why can't I ssh to my box???). Since the way to prevent those support requests is to get users to understand what they're doing, allowing users to implement their own firewalls via rc.firewall puts the responsibility on the user instead of the maintainer. I would much rather Pat spend his time juggling package versions and patches to try and get a good, stable, functional Slackware than worrying about writing firewall scripts and responding to e-mails from uninformed users, especially when there's a very good chance that I and anyone else looking for more than the bare minimum firewall will end up rewriting it anyway. Pumping out a stable distro and knowing which versions of software to include (for ~1000 packages) so that everything works well is beyond my capability and time constraints, but creating a firewall is well within my abilities. I would rather more time be spent on the former than the latter.

The EFG already exists (and is hosted on slackware.com) and is a noob-friendly way to create a firewall without any additional support required from Pat. I think it's sufficient. Of course that is just one man's opinion.

Also see this from rc.inet2:
Code:

# If there is a firewall script, run it before enabling packet forwarding.
# See the HOWTOs on http://www.netfilter.org/ for documentation on
# setting up a firewall or NAT on Linux.  In some cases this might need to
# be moved past the section below dealing with IP packet forwarding.

Perhaps a note in Slackware-HOWTO or similar would officially document the 'hidden' rc.firewall capability and then no one would have an excuse for not knowing about it already.

Alien Bob 07-05-2012 02:13 PM

Quote:

Originally Posted by T3slider (Post 4720132)
Perhaps a note in Slackware-HOWTO or similar would officially document the 'hidden' rc.firewall capability and then no one would have an excuse for not knowing about it already.

Someone already pointed it out in an earlier post, but it was dismissed as being an arrogant comment by the next poster, while in fact it was a message which every Slacker should recognize:

Code:

If you need to set up your Linux machine as a router for other systems,
you'll want to set up the interfaces in /etc/rc.d/rc.inet1.conf, and
set up NAT support with something like this in /etc/rc.d/rc.firewall,
and then make rc.firewall executable.

# Delete and flush.  Default table is "filter".
# Others like "nat" must be explicitly stated.
iptables --flush
# Flush all the rules in filter and nat tables
iptables --table nat --flush
# Delete all chains that are not in default filter and nat table
iptables --delete-chain
iptables --table nat --delete-chain
# Set up IP FORWARDing and Masquerading
iptables --table nat --append POSTROUTING --out-interface eth0 -j MASQUERADE
iptables --append FORWARD --in-interface eth1 -j ACCEPT
echo "Enabling ip_forwarding..."
echo 1 > /proc/sys/net/ipv4/ip_forward

It's possible to expand (or reduce ;-) this script for just about any
firewall needed.  See "man iptables" for lots of information.

After a Slackware installation, when you log in as user root (at that time, the only user account) you are greeted with "you have mail". If you take the time to actually read that mail, you will find the above quote in the email entitled "Welcome to Linux (Slackware 13.37)!" (the number will change with every new release).

chess 07-05-2012 02:19 PM

Quote:

Originally Posted by T3slider (Post 4720132)
Enabling a good, secure firewall *will* flood Pat with support requests asking why network services aren't working (why can't I ssh to my box???). Since the way to prevent those support requests is to get users to understand what they're doing, allowing users to implement their own firewalls via rc.firewall puts the responsibility on the user instead of the maintainer. I would much rather Pat spend his time juggling package versions and patches to try and get a good, stable, functional Slackware than worrying about writing firewall scripts and responding to e-mails from uninformed users, especially when there's a very good chance that I and anyone else looking for more than the bare minimum firewall will end up rewriting it anyway. Pumping out a stable distro and knowing which versions of software to include (for ~1000 packages) so that everything works well is beyond my capability and time constraints, but creating a firewall is well within my abilities. I would rather more time be spent on the former than the latter.

I agree and this is why a firewall script should not be included IMHO.

T3slider 07-05-2012 02:49 PM

Quote:

Originally Posted by Alien Bob (Post 4720174)
Someone already pointed it out in an earlier post, but it was dismissed as being an arrogant comment by the next poster, while in fact it was a message which every Slacker should recognize:
...
After a Slackware installation, when you log in as user root (at that time, the only user account) you are greeted with "you have mail". If you take the time to actually read that mail, you will find the above quote in the email entitled "Welcome to Linux (Slackware 13.37)!" (the number will change with every new release).

Well there you go, no excuse. ;) Been a while since I read that (and while I did read the entire thread my poor memory deleted allend's post from my brain).

ReaperX7 07-05-2012 04:52 PM

Going off what Eric said, the HOWTO documentation could be added to to include more information into this perhaps. That being said couldn't a sample firewall script be provided like the sample Samba script?


All times are GMT -5. The time now is 07:43 AM.