#freebsd #firewall #ipfw

ipfw-rs

A Rust crate which allows to send commands to the FreeBSD IPFW firewall

1 unstable release

0.1.0 Mar 26, 2024

#170 in Operating systems

Download history 174/week @ 2024-03-25 25/week @ 2024-04-01

199 downloads per month

BSD-2-Clause

91KB
2.5K SLoC

#ipfw-rs

A issues tracking is at https://gitlab.com/4neko/ipfw-rs

A crate which provides userspace interface to FreeBSD IPFW Firewall which allows to control IPFW directly without executing ipfw(8) every time when it is required to block network host or to check the list.

This crate supports only actual and recent FreeBSD version which is 14.0, but it seems that protocol did not changed much, so may work on FreeBSD 13!

This is experimental crate and is used in "Aienma" project.

At the moment the following is supported:

  • Add, Remove, Test commands on tables (a list of hosts: IP/IPv6/DNS at the moment)
  • Flush table

Example



extern crate ipfw_rs;


use ipfw_rs::{Ipfw, IpfwCmd};

fn main() 
{
    let ipfw = Ipfw::new().unwrap();

    let res = 
        ipfw.ipfw_table_handler("testtable", IpfwCmd::Add { hosts: vec!["127.0.1.1", "127.0.2.0/24"], req_atomic_op: true }, false);

        match res
        {
            Ok(r) => println!("res: '{}'", r),
            Err(e) => println!("err: '{}'", e)
        }

    let res = 
        ipfw.ipfw_table_handler("testtable", IpfwCmd::Test { hosts: vec!["127.0.1.1", "127.0.2.0/24"]}, false);

        match res
        {
            Ok(r) => println!("res: '{}'", r),
            Err(e) => println!("err: '{}'", e)
        }

    
    let res = 
        ipfw.ipfw_table_handler("testtable", IpfwCmd::Flush, false); //{ hosts: vec!["127.0.1.2"] }, false);// { hosts: vec!["127.0.1.1", "127.0.2.0/24"], req_atomic_op: true }, false);

    match res
    {
        Ok(r) => println!("res: '{}'", r),
        Err(e) => println!("err: '{}'", e)
    }

    println!("Hello, world!");
}

Dependencies

~5–15MB
~176K SLoC