PF (firewall)
From Wikipedia, the free encyclopedia
PF (Packet Filter, also written pf) is a BSD licensed stateful packet filter, a central piece of software for firewalling. It is comparable to iptables, ipfw and ipfilter. PF is developed on OpenBSD, but has been ported to many other operating systems.
Contents |
[edit] History
PF was primarily written by Daniel Hartmeier. It appeared in OpenBSD 3.0, which was released on 1 December 2001.[1]
PF was originally designed as replacement for Darren Reed's IPFilter, from which it derives much of its rule syntax. IPFilter was removed from OpenBSD's CVS tree on 30 May 2001 due to OpenBSD developers' concerns with its license.[2]
[edit] Features
The filtering syntax is similar to IPFilter, with some modifications to make it clearer. Network Address Translation (NAT) and Quality of Service (QoS) have been integrated into PF, QoS by importing the ALTQ queuing software and linking it with PF's configuration. Features such as pfsync and CARP for failover and redundancy, authpf for session authentication, and ftp-proxy to ease firewalling the difficult FTP protocol, have also extended PF.
PF's logging is configurable per rule within the pf.conf and logs are provided from PF by a pseudo-network interface called pflog, which is the only way to lift data from kernel-level mode for user-level programs. Logs may be monitored using standard utilities such as tcpdump, which in OpenBSD has been extended especially for the purpose, or saved to disk in a modified tcpdump/pcap binary format using the pflogd daemon.
[edit] Ports
Apart from its home platform OpenBSD, PF is also installed by default in FreeBSD starting with version 5.3, in NetBSD from version 3.0, and appeared in DragonFly BSD from version 1.2. Core force, a firewalling and security product for Microsoft Windows, is derived from PF.
[edit] Annotated example pf.conf file
## Macros # The internal interface (connected to the local network). int_if="xl0" ## Options # Set the default policy to return RSTs or ICMPs for blocked traffic. set block-policy return # Ignore the loopback interface entirely. set skip on lo0 ## Translation rules # NAT traffic on the interface in the default egress interface group (to # which the interface out of which the default route goes is assigned) from the # local network. nat on egress from $int_if:network to any -> (egress) ## Filtering rules # Default deny rule, with all blocked packets logged. block log all # Pass all traffic to and from the local network, using quick so that later # rules are not evaluated if a packet matches this. Some rulesets would restrict # local traffic much further. pass quick on $int_if all # Permit all traffic going out, keep state so that replies are automatically passed; # many rulesets would have many rules here, restricting traffic in and out on the # external (egress) interface. (keep state is not needed in the newest version of pf) pass out keep state
[edit] See also
[edit] Notes and references
[edit] Books
- The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall by Peter N. M. Hansteen. No Starch Press. 2007. ISBN 9781593271657.
- Building Firewalls with OpenBSD and PF, 2nd Edition by Jacek Artymiak. 2003. ISBN 83-916651-1-9.
- The OpenBSD PF Packet Filter Book: PF for NetBSD, FreeBSD, DragonFly and OpenBSD. Published by Reed Media Services. 2006. ISBN 0-9790342-0-5.
[edit] External links
The Wikibook Guide to Unix has a page on the topic of |
- OpenBSD's pf man page
- OpenBSD's pfctl man page
- The OpenBSD PF guide
- The OpenBSD 3.6 release song with humorous background information on PF's creation
- PF section on Daniel Hartmeier's site
- PF tutorial by Peter N. M. Hansteen
- Pf "how to" and HFSC Quality of Service explanation with examples
|