A quick introduction to the program ipchains.
by Pedro Bueno
Today, one of the most important topics in the computation world is security. How to improve security in a single or interconnected machine is sometimes hard to understand and difficult to implement. In this article, I will discuss how to implement a simple firewall on a Linux machine using IP chains.
IP chains could be new to users who upgraded their 2.0.36 kernels to the 2.2.x series, but old to those who worked in the 2.1.x series. ipchains is a rewrite of the well-known ipfwadm, which was a rewrite of BSD's ipfw, and was used to build firewalls in 2.0.x kernels. The are many reasons for this rewrite but perhaps the most important is ipfwadm couldn't allow protocols other than TCP, UDP or ICMP and it didn't handle fragments.
Linux IP firewall chaining software is a program that uses the kernel IP packet filtering capability. A packet filter looks at the header of a packet and decides the fate of the entire packet. It can decide to DENY the packet (discard the packet as if it had never received it), ACCEPT (let the packet pass through), or REJECT (like deny, but notify the source of the packet).
When you build your firewall you are looking for control and security of your network, and good firewall scripts are the key to this objective's success. If you are constantly receiving a ping flood from a specific IP address, you can deny all packets received from that IP, by creating a chain with this policy. ipchains is able to read the policies of the scripts and give instructions to the IP packet filtering as to how to handle the incoming/outcoming packets.
First, your kernel must be able to use IP chains. Look for the file /proc/net/ip_fwchains, if it exists, everything is okay. If not, you need to recompile your kernel and set these options:
CONFIG_FIREWALL=y CONFIG_IP_FIREWALL=yNext you need to know the syntax of ipchains necessary to create functional scripts. Let's imagine a hypothetical file called scriptf with some rules :
ipchains -N ippolicy ipchains -I input -j ippolicy ipchains -A ippolicy -p icmp -s 198.162.1.2 -j\ DENY ipchains -A ippolicy -p TCP -t 200.241.233.1 -j\ DENYThis script will DENY every packet with the ICMP protocol from the specific source addresses (in our example: 192.168.1.2) and also DENY every packet with the TCP protocol where the target is the choosen address (again in our example: 200.241.233.1). Here's a step-by-step explanation:
/etc/rc.d/init.d/scritpfin the file /etc/rc.d/rc.sysinit to start it. An important option that could help you in the future is the -F flag, which is used when you want to create new rules and override all previous rules, that is:
ipchains -F ippolicy
Ip chains is a very powerful tool that allows you to create many complex rules in order to protect your network. Just for fun, I built a small C program to build simple firewall scripts and simplify the rc.d process. It is open source and available at http://linuxgo.persogo.com.br/ipchains.html. Good places to get more information on how to build great scripts are the HOWTOs (see Resources). Read them before you start to build your own firewall scripts.
Pedro Paulo Ferreira Bueno, Science Computer Student from Catholic University of Goias (UCG- Brazil), is the manager of LinuxGO, the Goias Linux User Group and the network card moderator at Linux Knowledge base. He is a maniac linux user since he started with Linux in Kernel 2.0.7 . When he is not in front of his linux machine he is probability playing soccer. He can be reached at pedro.bueno@persogo.com.br.