Hello and much thanks for looking at the"active rules" I'm getting ready to paste.
My setup is one ldap od master, colocated with my isp, and running afp, dns, firewall, mail, open directory, and web services; it has no subnets... I run slave dns for it on a panther server running at home.
With the 10.4 GUI firewall tool, merely allowing the services I wanted to run with the appropriate check boxes, seemed to let too many ips request too many things... web logs get clogged with requests for files which don't exist, like login, or prxychk... smtp logs get swarmed with denied spam... except for the ones that didn't get denied, but somehow kept ips out of the log...
So I decided to try and move to a stateful firewall, by unchecking all the services, so serveradmin didn't create the 12000 series rules, but leaving the 65534 rule checked in advanced, and making all of my rules fit between 100 and 1000.
Rules 100-998 were loaded through a custom set that I placed in ipfw.conf, and based on the example at
http://macenterprise.org/content/view/124/77/.
I was going to paste ipfw.conf, as it has the respective services #commented with each rule, but unfortunately, working with ipfw remotely has inherent risks, and I have lost contact and must wait til morning to get my isp to run remote power cycle and hopefully have a window to make my corrections.
So all I have are the results of "active rules" from Tiger Admin's GUI, which I had copied earlier when I asked if I should post it before I was locked out:
As of 2005-08-23 00:36:04 -0700
00001 27 1647 allow udp from any 626 to any dst-port 626
## I've read other postings, where you suggested that this rule come later in a set, but I am not making this rule, it mysteriously appears even when deleted!
00100 35650 5992232 allow ip from any to any via lo0
00101 0 0 deny log logamount 1000 ip from any to 127.0.0.0/8
00102 0 0 deny log logamount 1000 ip from any to 127.0.0.0/8
00111 0 0 check-state
00113 0 0 deny ip from any to any frag in via en0
00115 90 4764 deny tcp from any to any established in via en0
00222 4602 532872 allow tcp from my.remote.ip to me dst-port 22 in via en0 setup keep-state
00223 0 0 allow tcp from my.ispz.ip to me dst-port 22 in via en0 setup keep-state
00224 0 0 allow tcp from any to any dst-port 22 out via en0 setup keep-state
00266 25 8516 deny ip from 220.0.0.0/8 to me in via en0 keep-state
00267 244 36207 deny ip from 221.0.0.0/8 to me in via en0 keep-state
00269 57 5988 deny ip from 218.0.0.0/8 to me in via en0 keep-state
00333 0 0 allow tcp from any to any dst-port 80 out via en0 setup keep-state
00334 0 0 allow tcp from any to any dst-port 16080 out via en0 setup keep-state
00335 0 0 allow tcp from any to any dst-port 443 out via en0 setup keep-state
00444 0 0 allow tcp from any to my.dns.server dst-port 53 in via en0 setup keep-state
00445 0 0 allow tcp from my.dns.server to my.ispz.dns1 dst-port 53 out via en0 setup keep-state
00446 0 0 allow tcp from my.dns.server to my.ispz.dns2 dst-port 53 out via en0 setup keep-state
00447 0 0 allow tcp from my.dns.server to my.slave.dns dst-port 53 out via en0 setup keep-state
00448 60 7247 allow udp from my.dns.server to my.ispz.dns1 dst-port 53 out via en0 keep-state
00449 0 0 allow udp from my.dns.server to my.ispz.dns2 dst-port 53 out via en0 keep-state
00450 0 0 allow udp from my.dns.server to my.ispz.dns3 dst-port 53 out via en0 keep-state
00554 0 0 allow tcp from any to any dst-port 311 out via en0 setup keep-state
00555 23877 7479280 allow tcp from any to me dst-port 311 in via en0 setup keep-state
00556 0 0 allow tcp from any to me dst-port 625 in via en0 setup keep-state
00557 0 0 allow tcp from any to me dst-port 626 in via en0 setup keep-state