Deep Dive into OpenBSD's `pf` Firewall
OpenBSD’s `pf` (Packet Filter) is one of the most powerful and flexible firewalling tools available today. Known for its simplicity, security, and performance, `pf` is widely used in OpenBSD and FreeBSD systems. This tutorial provides an in-depth look at `pf`, covering its features, configuration, and practical use cases.
What is `pf`?
`pf` is a stateful packet filter that was introduced in OpenBSD 3.0 as a replacement for IPFilter. It is designed to be simple, secure, and efficient, making it ideal for a wide range of use cases, from personal firewalls to enterprise-grade network security.
Key Features of `pf`
`pf` offers a rich set of features that make it a versatile firewalling tool:
- Stateful Filtering: Tracks the state of connections and allows related packets automatically.
- NAT and Redirection: Supports Network Address Translation (NAT) and port redirection.
- Traffic Shaping: Includes `altq` for bandwidth management and prioritization.
- High Availability: Supports `CARP` (Common Address Redundancy Protocol) for failover and redundancy.
- Logging: Provides detailed logging of packet activity using `pflog`.
- Table Management: Allows dynamic and efficient management of IP address lists using tables.
Getting Started with `pf`
To use `pf`, you need to configure its rules in the `pf.conf` file, which is typically located in `/etc/pf.conf`. The basic structure of `pf.conf` includes:
- Macros: Define reusable variables for IP addresses, ports, etc.
- Tables: Define dynamic lists of IP addresses.
- Options: Configure global settings for `pf`.
- Rules: Define filtering, NAT, and redirection rules.
Enabling `pf`
To enable `pf`, use the following commands:
# Enable pf
pfctl -e
# Load the configuration file
pfctl -f /etc/pf.conf
Basic Configuration Example
Here’s a simple example of a `pf.conf` file:
# Macros
ext_if = "em0" # External interface
int_if = "em1" # Internal interface
local_net = "192.168.1.0/24"
# Options
set skip on lo # Skip filtering on the loopback interface
# NAT
nat on $ext_if from $local_net to any -> ($ext_if)
# Filtering Rules
block all
pass out on $ext_if proto tcp to port 80 keep state
pass in on $int_if from $local_net to any keep state
Explanation
- Macros: Define variables for interfaces and networks to simplify the configuration.
- Options: Skip filtering on the loopback interface to avoid blocking internal traffic.
- NAT: Enable NAT for traffic from the internal network to the external interface.
- Rules: Block all traffic by default, then allow specific traffic (e.g., HTTP and internal traffic).
Advanced Features
Once you’re comfortable with the basics, you can explore `pf`’s advanced features:
1. Traffic Shaping with `altq`
`altq` allows you to manage bandwidth and prioritize traffic. Example:
altq on $ext_if cbq bandwidth 100Mb queue { http, ssh }
queue http bandwidth 80% cbq(default)
queue ssh bandwidth 20%
pass out on $ext_if proto tcp to port 80 keep state queue http
pass out on $ext_if proto tcp to port 22 keep state queue ssh
2. High Availability with `CARP`
`CARP` provides redundancy by allowing multiple firewalls to share a virtual IP address. Example:
vhid 1 pass "sharedsecret"
pass in on $ext_if proto carp keep state
3. Dynamic Tables
Tables allow you to manage large lists of IP addresses efficiently. Example:
table persist
block in quick from
You can dynamically add or remove IPs using `pfctl`:
pfctl -t blocked_ips -T add 192.168.1.100
pfctl -t blocked_ips -T delete 192.168.1.100
Logging and Monitoring
`pf` provides robust logging and monitoring capabilities:
- Logging: Use `pflog` to log packet activity. Example:
pass in log on $ext_if proto tcp to port 22
tcpdump -n -e -ttt -i pflog0
Practical Use Cases
Here are some common use cases for `pf`:
- Home Firewall: Secure your home network with NAT and basic filtering rules.
- Web Server Protection: Allow only HTTP/HTTPS traffic and block everything else.
- VPN Gateway: Use `pf` to secure VPN traffic and manage access to internal resources.
- Intrusion Prevention: Block malicious IPs dynamically using tables and external threat feeds.
Best Practices
To maximize the effectiveness of your `pf` firewall, follow these best practices:
- Principle of Least Privilege: Block all traffic by default and allow only what is necessary.
- Use Macros and Tables: Simplify your configuration and make it easier to manage.
- Enable Logging: Log all critical rules to monitor traffic and troubleshoot issues.
- Test Configurations: Test your `pf.conf` file in a staging environment before deploying it to production.
- Keep Rules Organized: Group related rules together and use comments to document your configuration.
Conclusion
OpenBSD’s `pf` is a powerful and versatile firewalling tool that combines simplicity with advanced features. Whether you’re securing a home network or managing an enterprise-grade firewall, `pf` provides the flexibility and performance you need. In the next tutorial, we’ll explore FreeBSD’s `ipfw` firewall and its unique features. Stay tuned!
Check out some other Bands on Bandcamp.com. Crazy Fingers (Vancouver 1991), Flying Butt Pliers, and Hammy Ham Hands.
Proudly powered by a Text Editor, an IDE, an SFTP client, some Internet searches, and more recently help from some AI.
2025 dispelled.ca end of file.