mirror of
https://github.com/The-Art-of-Hacking/h4cker
synced 2024-11-22 10:53:03 +00:00
227 lines
5.8 KiB
Markdown
227 lines
5.8 KiB
Markdown
|
# UFW: Uncomplicated Firewall — Cheat Sheet
|
|||
|
|
|||
|
## Installation
|
|||
|
If you are using Ubuntu then UFW will be installed by default. If you are using Debian or a derivative, then you can install UFW by entering the following
|
|||
|
```
|
|||
|
root@host:~# apt-get install ufw
|
|||
|
```
|
|||
|
|
|||
|
UFW is not available in CentOS, and although you can install it from source, that is outside the scope of this tutorial.
|
|||
|
|
|||
|
## Checking status
|
|||
|
When you check the status, UFW will either tell you that it is inactive,
|
|||
|
|
|||
|
```
|
|||
|
root@host:~# ufw status
|
|||
|
Status: inactive
|
|||
|
```
|
|||
|
or it will tell you it is active and list the firewall rules.
|
|||
|
```
|
|||
|
root@host:~# ufw status
|
|||
|
Status: active
|
|||
|
To Action From
|
|||
|
-- ------ ----
|
|||
|
22/tcp ALLOW Anywhere
|
|||
|
22/tcp (v6) ALLOW Anywhere (v6)
|
|||
|
```
|
|||
|
|
|||
|
Rules can also be numbered, which is particularly useful when you wish to delete one.
|
|||
|
|
|||
|
```
|
|||
|
root@host:~# ufw status numbered
|
|||
|
Status: active
|
|||
|
To Action From -- ------ ----
|
|||
|
[ 1] WWW Full ALLOW IN Anywhere
|
|||
|
[ 2] WWW Full (v6) ALLOW IN Anywhere (v6)
|
|||
|
|
|||
|
```
|
|||
|
|
|||
|
Not that if you have no rules enables, you will just be told it is active
|
|||
|
|
|||
|
```
|
|||
|
root@host:~# ufw status
|
|||
|
Status: active
|
|||
|
```
|
|||
|
|
|||
|
## Enable and disable
|
|||
|
Enabling and disabling are from the following commands. Warning; if you are working on a remote system, allow the SSH rule before you enable UFW or you risk losing your shell access.
|
|||
|
|
|||
|
```
|
|||
|
root@host:~# ufw enable
|
|||
|
Firewall is active and enabled on system startup
|
|||
|
root@host:~# ufw disable
|
|||
|
Firewall stopped and disabled on system startup
|
|||
|
```
|
|||
|
|
|||
|
## Deleting rules
|
|||
|
The easiest way to delete a rule is to delete it by number, but you can also delete it by definition.
|
|||
|
|
|||
|
```
|
|||
|
root@host:~# ufw status numbered
|
|||
|
Status: active
|
|||
|
To Action From -- ------ ----
|
|||
|
[ 1] 22/tcp ALLOW IN Anywhere
|
|||
|
[ 2] 22/tcp (v6) ALLOW IN Anywhere (v6)
|
|||
|
```
|
|||
|
Note that as there are 2 rules (ipv4 and ipv6) for every pre-defined service, delete will only remove the rule for one protocol.
|
|||
|
|
|||
|
```
|
|||
|
root@host:~# ufw delete 2
|
|||
|
Deleting:
|
|||
|
allow 22/tcp
|
|||
|
Proceed with operation (y|n)? y
|
|||
|
Rule deleted (v6)
|
|||
|
```
|
|||
|
|
|||
|
## Logging
|
|||
|
Logging is on by default, but can rapidly fill your log files with noise. Enable and disable thusly
|
|||
|
|
|||
|
```
|
|||
|
root@host:~# ufw logging on
|
|||
|
Logging enabled
|
|||
|
root@host:~# ufw logging off
|
|||
|
Logging disabled
|
|||
|
|
|||
|
```
|
|||
|
You can also change the logging levels if necessary, but low is the default.
|
|||
|
|
|||
|
```
|
|||
|
root@host:~# ufw logging medium
|
|||
|
Logging enabled
|
|||
|
Pre-defined rules
|
|||
|
```
|
|||
|
|
|||
|
One of the strengths for sysadmins who may only infrequently change firewall rules is the set of pre-defined rules that UFW ships with. These obviously assume that you are running services on default ports and will NOT work if you have tried to obfuscate by assigning non-default ports. They also assume you will be allowing ALL traffic to these port (see later for how to restrict traffic sources and destinations.
|
|||
|
```
|
|||
|
root@host:~# ufw app list
|
|||
|
Available applications:
|
|||
|
AIM
|
|||
|
Bonjour
|
|||
|
CIFS
|
|||
|
CUPS
|
|||
|
DNS
|
|||
|
Deluge
|
|||
|
IMAP
|
|||
|
IMAPS
|
|||
|
IPP
|
|||
|
KTorrent
|
|||
|
Kerberos Admin
|
|||
|
Kerberos Full
|
|||
|
Kerberos KDC
|
|||
|
Kerberos Password
|
|||
|
LDAP
|
|||
|
LDAPS
|
|||
|
LPD
|
|||
|
MSN
|
|||
|
MSN SSL
|
|||
|
Mail submission
|
|||
|
NFS
|
|||
|
POP3
|
|||
|
POP3S
|
|||
|
PeopleNearby
|
|||
|
SMTP
|
|||
|
SSH
|
|||
|
Socks
|
|||
|
Telnet
|
|||
|
Transmission
|
|||
|
Transparent Proxy
|
|||
|
VNC
|
|||
|
WWW
|
|||
|
WWW Cache
|
|||
|
WWW Full
|
|||
|
WWW Secure
|
|||
|
XMPP
|
|||
|
Yahoo
|
|||
|
qBittorrent
|
|||
|
svnserve
|
|||
|
```
|
|||
|
|
|||
|
You can see a full list of these and their definitions in /etc/ufw/applications.d.
|
|||
|
|
|||
|
## SSH
|
|||
|
If you are running a remote server, you almost certainly want this rule enabled.
|
|||
|
|
|||
|
```
|
|||
|
root@host:~# ufw allow ssh
|
|||
|
Rule added
|
|||
|
Rule added (v6)
|
|||
|
root@host:~# ufw status
|
|||
|
Status: active
|
|||
|
To Action From
|
|||
|
-- ------ ----
|
|||
|
22/tcp ALLOW Anywhere
|
|||
|
22/tcp (v6) ALLOW Anywhere (v6)
|
|||
|
http(s)
|
|||
|
|
|||
|
```
|
|||
|
|
|||
|
You can enable both port 80 (http) and 443 (https) in one go with the following command, but there are options to only enable one
|
|||
|
|
|||
|
```
|
|||
|
root@host:~# ufw allow www\ full
|
|||
|
Rules updated
|
|||
|
Rules updated (v6)
|
|||
|
root@host:~# ufw status
|
|||
|
[sudo] password for simon:
|
|||
|
Status: active
|
|||
|
To Action From
|
|||
|
-- ------ ----
|
|||
|
WWW Full ALLOW Anywhere
|
|||
|
WWW Full (v6) ALLOW Anywhere (v6)
|
|||
|
|
|||
|
```
|
|||
|
|
|||
|
## More complex usage
|
|||
|
Port and protocol
|
|||
|
|
|||
|
```
|
|||
|
root@host:~# ufw allow 45/tcp
|
|||
|
Rule added
|
|||
|
Rule added (v6)
|
|||
|
```
|
|||
|
|
|||
|
### Source and Destination
|
|||
|
Allow only from an IP
|
|||
|
|
|||
|
```
|
|||
|
root@host:~# ufw allow from 192.168.1.1 port 62
|
|||
|
Rule added
|
|||
|
root@host:~# ufw status
|
|||
|
Status: active
|
|||
|
To Action From
|
|||
|
-- ------ ----
|
|||
|
Anywhere ALLOW 192.168.1.1 62
|
|||
|
|
|||
|
```
|
|||
|
|
|||
|
Allow only to a certain local interface
|
|||
|
```
|
|||
|
root@host:~# ufw allow to 127.0.0.2 port 62
|
|||
|
Rule added
|
|||
|
root@host:~# ufw status
|
|||
|
Status: active
|
|||
|
To Action From
|
|||
|
-- ------ ----
|
|||
|
127.0.0.2 62 ALLOW Anywhere
|
|||
|
|
|||
|
```
|
|||
|
|
|||
|
### Protocol only
|
|||
|
|
|||
|
If you have followed my ipsec tutorial, you will need the firewall ports open to establish the key exchange – this is one of the few protolcols which do not require a port number.
|
|||
|
```
|
|||
|
root@host:~# ufw allow to 127.0.0.3 proto esp
|
|||
|
Rule added
|
|||
|
|
|||
|
root@host:~# ufw allow to 127.0.0.3 proto ah
|
|||
|
Rule added
|
|||
|
root@host:~# ufw status
|
|||
|
Status: active
|
|||
|
To Action From
|
|||
|
-- ------ ----
|
|||
|
127.0.0.3/esp ALLOW Anywhere
|
|||
|
127.0.0.3/ah ALLOW Anywhere
|
|||
|
```
|
|||
|
|
|||
|
Note that you need a destination in this instance.
|