Firewall Rule Definitions

Firewall configuration in debops.ferm is done through a flexible definition of rules. There are a number of variables which are used to reference a set of default rules and can be extended by user defined rules. Here a description of the involved configurations should be given so that everyone can customize the ruleset according to individual requirements.

Default rules

By default debops.ferm configures a number of rules as soon as a host is part of the [debops_all_hosts] Ansible host group. The rules created by default are defined in defaults/main.yml and activated by being listed in ferm__default_rules. They consist of basic rules for setting the iptables default policies, restricting extensive connection attempts, logging and more.

In case a firewall is not required or preferred this behaviour can be disabled by setting ferm__enabled to False in the inventory.

Custom rules

A custom rule can be enabled by adding a rule definition to one of the predefined rule lists (ferm__rules, ferm__group_rules, ferm__host_rules or ferm__dependent_rules) in the Ansible inventory. Each rule has to be defined as a YAML dict using some of the following keys:

domain

Optional. iptables domain used for the firewall rule. Possible values: ip, ip6. Defaults to ferm__domains.

table

Optional. iptables table to which the rule is added or from which it is removed. Defaults to filter.

chain

Optional. iptables chain to which the rule is added or from which it is removed. Defaults to INPUT.

by_role

Optional. Name of the Ansible role in the format ROLE_OWNER.ROLE_NAME which is responsable for the rule. This will be included as a comment in the generated rule file.

Depending on the chosen type, many additional variables are supported. Please check the individual rule type description below.

Rule types

There exist a number of predefined rule types for generating firewall rules through ferm. Following a list of the available rule types which can be used to create custom rules.

The 'accept' type

This rule type can be used to create rules that match interfaces, ports, remote IP addresses/subnets and can accept the packets, reject, or redirect to a different chain. The following type-specific YAML keys are supported:

accept_any

Optional. Match all source addresses by default. Possible values: True or False. Defaults to True. If this option is set to False and item.target is set to REJECT all traffic is blocked by default. As soon as item.saddr is not empty, this configuration doesn't matter anymore.

daddr

Optional. List of destination IP addresses or networks to which the rule is applied.

dport

Optional. List of destination ports to which the rule is applied.

include

Optional. Custom ferm configuration file to include. See ferm include for more details.

interface

Optional. List of network interfaces for incoming packets to which the rule is applied.

interface_present

Optional. Same as item.interface but first check if specified network interfaces exists before adding the firewall rules.

multiport

Optional. Use iptables multiport extension. Possible values: True or False. Defaults to False.

outerface

Optional. List of network interfaces for outgoing packets to which the rule is applied.

outerface_present

Optional. Same as item.outerface but first check if specified network interface exists before adding the firewall rule.

protocol

Optional. Network protocol to which the rule is applied.

protocol_syn

Optional. Match TCP packet with only the SYN flag set. Possible values True or False. If set to False it will match all other packets except the ones with only the SYN flag set. Defaults to unset.

realgoto

Optional. After packet match jump to custom chain. See ferm realgoto for more details.

reject_with

Optional. Define reject message being sent when the rule item.target is set to REJECT. Defaults to icmp-admin-prohibited.

saddr

Optional. List of source IP addresses or networks to which this rule is applied.

sport

Optional. List of source ports to which the rule is applied.

state

Optional. Connection state which should be matched. Possible values: INVALID, ESTABLISHED, NEW, RELATED, UNTRACKED or comma-separated combination thereof.

subchain

Optional. Subchain name. If more than 3 addresses are listed in target.saddr move resulting iptables rules into a separate subchain with the given name. See ferm subchain for more details.

target

Optional. iptables jump target. Possible values: ACCEPT, DROP, REJECT, RETURN, NOP or a custom target. Defaults to ACCEPT.

The 'ansible_controller' type

Similar to the accept type but defaults to the SSH target port and sets the source address to the host running Ansible if not overwritten through the item.ansible_controllers key. The following type-specific YAML keys are supported:

ansible_controllers

Optional. List of source IP address which are added to item.saddr. Overwrites auto-detection of the Ansible controller address.

daddr

Optional. List of destination IP addresses or networks to which the rule is applied.

dport

Optional. List of destination ports to which the rule is applied. Defaults to ssh.

include

Optional. Custom ferm configuration file to include. See ferm include for more details.

interface

Optional. List of network interfaces for incoming packets to which the rule is applied.

multiport

Optional. Use iptables multiport extension. Possible values: True or False. Defaults to False.

outerface

Optional. List of network interfaces for outgoing packets to which the rule is applied.

protocol

Optional. Network protocol to which the rule is applied. Defaults to tcp.

protocol_syn

Optional. Match TCP packet with only the SYN flag set. Possible values True or False. If set to False it will match all other packets except the ones with only the SYN flag set. Defaults to unset.

realgoto

Optional. After packet match jump to custom chain. See ferm realgoto for more details.

reject_with

Optional. Define reject message being sent when the rule item.target is set to REJECT. Defaults to icmp-admin-prohibited.

saddr

Optional. List of source IP addresses or networks to which this rule is applied.

sport

Optional. List of source ports to which the rule is applied.

state

Optional. Connection state which should be matched. Possible values: INVALID, ESTABLISHED, NEW, RELATED, UNTRACKED or comma-separated combination thereof.

subchain

Optional. Subchain name. If more than 3 addresses are listed in target.saddr move resulting iptables rules into a separate subchain with the given name. See ferm subchain for more details.

target

Optional. iptables jump target. Possible values: ACCEPT, DROP, REJECT, RETURN, NOP or a custom target. Defaults to ACCEPT.

The 'connection_tracking' type

This type is used to enable connection tracking using the iptables conntrack or iptables state extension. The following type-specific YAML keys are supported:

tracking_active_target

Optional. iptables jump target for valid connections. Defaults to ACCEPT.

tracking_invalid_target

Optional. iptables jump target for invalid connections. Defaults to DROP.

tracking_module

Optional. iptables module used for connection tracking. Possible values: state or conntrack. Defaults to conntrack.

interface

Optional. List of network interfaces for incoming packets to which the rule is applied.

outerface

Optional. List of network interfaces for outgoing packets to which the rule is applied.

interface_not

Optional. List of network interfaces for incoming packets which are excluded from the rule.

outerface_not

Optional. List of network interfaces for outgoing packets which are excluded from the rule.

The 'custom' type

The type used to define custom ferm rules. The following additional YAML keys are supported:

rules

ferm rule definition, required.

by_role

Optional. Add comment to generated ferm rule definition file that rule is defined in the given Ansible role.

This template is used among others in a debops.libvirtd custom ferm rule.

The 'default_policy' type

This type is used to define iptables default policies. The following type-specific YAML keys are supported:

policy

iptables chain policy, required.

The 'dmz' type

This type can be used to enable connection forwarding to another host. If item.port is not specified, all traffic is forwarded. The following type-specific YAML keys are supported:

multiport

Optional. Use iptables multiport extension. Possible values: True or False. Defaults to False.

interface

Optional. List of public network interfaces which accept connections. At least one of interface or public_ip is required.

public_ip

Optional. IPv4 address on the public network which accepts connections. At least one of interface or public_ip is required. Only 1 IP address should be used at a time.

private_ip

IPv4 address of the host on the internal network, required. Only 1 IP address should be used at a time.

protocol(s)

Optional. List of protocols to forward. Defaults to tcp.

port(s)

Optional. List of ports to forward.

dport

Optional. Destination port to forward to. Only needs to be specified if internal destination port is different from the original destination port.

snat_ip

Optional. IP address for source address translation. If set the source IP is rewritten to this address. This is typically the IP address of the firewall host on the internal network. This is useful if traffic from the private_ip would otherwise not be routed back to the firewall host.

The 'hashlimit' type

This type is used to define rate limit rules using the iptables hashlimit extension. The following type-specific YAML keys are supported:

daddr

Optional. List of destination IP addresses or networks to which the rule is applied.

dport

Optional. List of destination ports to which the rule is applied.

hashlimit_burst

Optional. Number of packets to match within the expiration time. Defaults to 5.

hashlimit_expire

Optional. Expiration time of hash entries in seconds. Defaults to 1.8.

hashlimit_target

Optional. Jump target used when packet matches the hashlimit rule which means that the rate limit is not reached yet. Defaults to RETURN.

hashlimit_mode

Optional. Options to take into consideration when associating packet streams. Possible values: srcip, srcport, dstip, dstport or a comma-separated list thereof. Defaults to srcip.

interface

Optional. List of network interfaces for incoming packets to which the rule is applied.

interface_present

Optional. Same as item.interface but first check if specified network interfaces exists before adding the firewall rules.

outerface

Optional. List of network interfaces for outgoing packets to which the rule is applied.

outerface_present

Optional. Same as item.outerface but first check if specified network interface exists before adding the firewall rule.

include

Optional. Custom ferm configuration file to include. See ferm include for more details.

log

Optional. Write rate limit hits to syslog. Possible values: True and False. Defaults to True.

protocol

Optional. Network protocol to which the rule is applied.

protocol_syn

Optional. Match TCP packet with only the SYN flag set. Possible values True or False. If set to False it will match all other packets except the ones with only the SYN flag set. Defaults to unset.

reject_with

Optional. Define reject message being sent when the rule item.target is set to REJECT. Defaults to icmp-admin-prohibited.

state

Optional. Connection state which should be matched. Possible values: INVALID, ESTABLISHED, NEW, RELATED, UNTRACKED or comma-separated combination thereof.

subchain

Optional. Subchain name. Move resulting iptables rules into a separate subchain with the given name. See ferm subchain for more details.

target

Optional. iptables jump target in case the rate limit is reached. Defaults to REJECT.

The 'include' type

This type can be used to include custom ferm configuration files. The following type-specific YAML keys are supported:

include

Optional. Custom ferm configuration file to include. See ferm include for more details.

The 'log' type

This type can be used to specify logging rules using the iptables log extension. The following type-specific YAML keys are supported:

include

Optional. Custom ferm configuration file to include. See ferm include for more details.

log_burst

Optional. Burst limit of packets being logged. Defaults to ferm__log_burst.

log_ip_options

Optional. Log IP options of packet. Possible values: True or False. Defaults to True.

log_level

Optional. Log level for firewall messages. Possible values are: emerg, alert, crit, error, warning, notice, info or debug. Defaults to warning.

log_limit

Optional. Rate limit of packets being logged. Defaults to ferm__log_limit.

log_prefix

Optional. Prefix (up to 29 characters) for firewall log messages. Defaults to iptables-log:

log_target

Optional. Select how iptables performs logging. Possible values: LOG, ULOG, NFLOG. Defaults to LOG.

log_tcp_options

Optional. Log TCP options of packet. Possible values: True or False. Defaults to False.

log_tcp_sequence

Optional. Log TCP sequence of packet. Possible values: True or False. Defaults to False.

realgoto

Optional. After packet match jump to custom chain. See ferm realgoto for more details.

reject_with

Optional. Define reject message being sent when the rule item.target is set to REJECT. Defaults to icmp-admin-prohibited.

target

Optional. iptables jump target for logged packets.

The 'recent' type

This type can be used to track connections and respond accordingly by using the iptables recent extension. The following type-specific YAML keys are supported:

dport

Optional. List of destination ports to which the rule is applied.

include

Optional. Custom ferm configuration file to include. See ferm include for more details.

multiport

Optional. Use iptables multiport extension. Possible values: True or False. Defaults to False.

protocol

Optional. Network protocol to which the rule is applied.

protocol_syn

Optional. Match TCP packet with only the SYN flag set. Possible values True or False. If set to False it will match all other packets except the ones with only the SYN flag set. Defaults to unset.

recent_hitcount

Optional. Must be used in combination with item.recent_update. Match if address is in the list and at least the given number of packets were received so far.

recent_log

Optional. Log packets matching the rule. Possible values: True or False. Defaults to ferm__log. If this is set to True ferm__log must be enabled too for the packet to be logged.

recent_name

Optional. Name of the list. Defaults to DEFAULT.

recent_remove

Optional. Remove address from the list. Possible values: True or False. Defaults to False. Mutually exclusive with item.recent_update.

recent_seconds

Optional. Must be used in combination with item.recent_update. Match if address is in the list and was last seen within the given number of seconds.

recent_set_name

Optional. Add the source address of a matching packet to the given list. This must correspond with item.recent_name of a second rule which would potentially act on the packet, e. g. reject it.

recent_target

Optional. iptables jump target when packet has hit the recent list. Possible values: ACCEPT, DROP, REJECT, RETURN, NOP or a custom target. Defaults to NOP.

recent_update

Optional. Update "last-seen" timestamp. Possible values: True or False. Defaults to False. Mutually exclusive with item.recent_remove.

reject_with

Optional. Define reject message being sent when the rule item.target is set to REJECT. Defaults to icmp-admin-prohibited.

state

Optional. Connection state which should be matched. Possible values: INVALID, ESTABLISHED, NEW, RELATED, UNTRACKED or comma-separated combination thereof.

subchain

Optional. Subchain name. Move resulting iptables rules into a separate subchain with the name given. See ferm subchain for more details.

When using the recent type make sure to always define two rules:

  • One for matching the packet against the address list using the item.recent_update feature. If this filter matches you likely want to set the item.recent_target to DROP or REJECT.

  • To clear the source address from the list again in case the connection restrictions are not met, add a second role using item.recent_remove.

The 'reject' type

This type is used to reject all traffic. It can be added for example as a final rule in a custom chain.

Legacy rules

Legacy rules are the (old) deprecated way to configure firewall rules using a simpler less flexible syntax than described above. As support for these is likely going to be removed in the future, they shouldn't be used anymore.

Support for legacy rules is still enabled by default. However, they are stored in a separate iptables INPUT chain called debops-legacy-input-rules. In case you haven't defined any legacy rules and none of the DebOps roles you are using are still depending on it, disable support completely by setting ferm__include_legacy to False which will avoid the additional chain from being created.

If you're not sure if you still have legacy rules defined, look for variable names with only on '_' after the ferm prefix (e. g. ferm_input_list and ferm_input_dependent_list).