Provided by: uif_1.1.4-2_all bug

NAME

       uif.conf — Tool for generating optimized packet filter rules

DESCRIPTION

       First  of all, the syntax of this configuration file is far from being perfect. If you've got some better
       ideas just drop me a line...  /etc/uif/uif.conf is the default configuration file for uif(8).  This  file
       may  contain  several sections and comments. Each section begins with the section name and the left curly
       brace and ends with the right curly brace in a single line. A comment starts with a hash mark (#) at  the
       beginning of a line.

       Blank  lines  are  silently  ignored.  The  following  sections  are  valid: include, include4, include6,
       sysconfig, service, network, interface, marker, filter,  nat,  input,  output,  forward,  masquerade  and
       stateless.

       The  sections  service,  network,  marker and interface have all a very similar syntax.  Each line starts
       with an identifier followed by one or more blanks and one or more section  specific  entries  or  defined
       identifiers  separated  by blanks.  A valid identifier is case sensitive and consists of letters, digits,
       underscores and hyphens.

       If two or more identifiers in one section are equal, the corresponding entries are merged  to  the  first
       identifier.  Hence,  it's not possible to overwrite perviously defined identifiers. As a result the order
       of the section entries is irrelevant and it's possible to define a section more than once.

   include section
       Include other configuration files. Each line in this section, enclosed in quotation marks ("), must be  a
       valid filename. The contents of this file are added to the actual configuration file and each file should
       contain at least one section (a comment only file is not really useful...).

   include4 section
       Include other configuration files but ONLY in IPv4 mode (WITHOUT -6 switch to uif).  Otherwise equivalent
       to the include section above.

   include6 section
       Include other configuration files but ONLY in IPv6 mode (WITH -6 switch to uif).  Otherwise equivalent to
       the include section above.

   sysconfig section
       Set some global settings. Each line in this section starts with one of the following identifiers followed
       by  one  or  more blanks and the desired value: LogLevel, LogPrefix, LogLimit, LogBurst, Limit, Burst and
       AccountPrefix. If there are multiple definitions of one entry the last definition is stored.

       LogLevel
               A valid default log priority (see syslog.conf(5))

       LogPrefix
               The default log prefix. Each iptables logmessage starts with this prefix.

       LogLimit
               The default limit value for logmessages (see iptables(8))

       LogBurst
               The default burst value for logmessages (see iptables(8))

       Limit   The default limit value (see iptables(8))

       Burst   The default burst value (see iptables(8))

       AccountPrefix
               The default prefix for accounting chains.

   service section
       This section  defines  all  needed  services.  A  service  description  starts  with  the  protocol  (see
       protocols(5))  followed  by parameters in parenthesis. Most protocols don't need any parameters. The only
       exceptions are tcp, udp and icmp.  The  tcp  and  udp  parameter  defines  the  source  and  destionation
       port(-range).  The source and destination ports are separated by a slash (/) and portranges are separated
       by a colon (eg. tcp(123:333/99): tcp protocol, source-portrange  123-333,  destination  port  99).  Empty
       source  or  destination  ports  are expanded to 1:65535. The icmp protocol parameter must be a valid icmp
       type (see iptables -p icmp --help).

   network section
       This section defines all needed networks and hosts. A  network  description  starts  with  a  valid  IPv4
       address  (dotted  quad), an optional netmask in cidr notation (number of bits) or an optional MAC-address
       (with   a   prefixed   equal   sign   (=).   Some    valid    entries    are:    127.0.0.1    127.0.0.0/8
       192.168.0.1=00:00:00:00:00:FF.

   interface section
       This section defines all needed (physical and bridged) interfaces (eg. eth0, lo, ppp0).

   marker section
       This section defines all needed numerical (decimal) values for packet marking purposes.

   filter, nat, input, output, forward, masquerade and stateless sections
       Due  to  better partitioning of the packetfilter, rules can be split into these sections. Internally they
       are equivalent and contain all rules. As an exception to all other sections the order of entries in these
       sections is important.

       The default policy for the chains INPUT, OUTPUT and FORWARD  is  DROP  (see  iptables(8))  and  it's  not
       possible to change this.

       Each line in in this section begins with in, out, fw, nat, masq, slin, slout or slfw followed by '+', '-'
       or  a  mark identifier enclosed in curly braces (or, in case of fw followed by '>').  The identifiers in,
       out and fw define rules for incoming, outgoing and forwarded IP-packets.  Each  packet  with  an  INVALID
       state  (see  iptables(8)) is matched by slin, slout and slfw. The lines starting with nat and masq define
       rules to modify the source or destination address or the destination port.

       The plus and minus signs specify the type of the rule: '+' accepts matching packets and '-'  drops  them.
       As  a special case the identifier out and fw accept the greater than (>) sign to modify the MSS depending
       on the PMTU (see iptables(8))

       A very basic ruleset may look like this: out+

       This allows every outgoing traffic and rejects all incoming connections (because of the default policy).

       To be more specific, each line may contain several  parameters.  Each  parameter  starts  with  a  single
       character  followed  by  an  equal  sign  (=)  and  one  or  more  previously defined identifiers (in the
       corresponding sections) separated by commas. The following parameters are valid:

       s       The source address or network.

       d       The destination address or network.

       i       The input interface.

       o       The output interface.

       pi      The physical input interface (only useful when used with bridged interfaces).

       po      The physical output interface (only useful when used with bridged interfaces).

       p       The service description (protocol).

       m       The mark field associated with a packet.

       S       The the new source address in nat rules.

       D       The the new destination address in nat rules.

       P       The the new service description in nat rules. This is only valid with tcp or udp packets.

       f       This parameter sets some 'flags'. A flag definition starts with the flag identifier and  optional
               parameters in parenthesis. Valid flags are:

               log  -  Logs  matching  packages to syslog. The given parameter is included in the log entry. The
               number of logged packets and the loglevel can be set in the sysconfig section.

               reject - Only valid in DROP rules. This is used to send back an error packet in response  to  the
               matched  packet.  The  default  behaviour  is a packet with set RST flag on tcp connections and a
               destination-unreachable icmp  packet  in  every  other  case.  Valid  parameters  are  listed  in
               iptables(8) in the REJECT section.

               account  -  Create  an  accounting  chain  for all matching packages and possible responses.  The
               optional parameter is a part of the name of the chain.

               limit - Limits the number of matching packets. The  default  values  are  set  in  the  sysconfig
               section.  Other  values  can  be defined with the optional parameter.  The first entry sets a new
               limit and the second parameter (separated by a comma (,)) sets the burst  value  (see  Limit  and
               Burst in sysconfig section).
       It's  possible  to  invert  the  identifier of one of following parameters - if it expands to ecactly one
       object - by prepending a exclamation mark (!): s, d, i, o, p (eg.: s=!local p=!http).

FILES

       Configuration   files   are   located   in   /etc/uif.   There   is    a    sample    configuration    in
       /usr/share/doc/uif/uif.conf.tmpl.gz.

SEE ALSO

       iptables(8) uif(8)

AUTHOR

       This   manual   page   was   written   by   Jörg   Platte   <joerg.platte@gmx.de>   and  Cajus  Pollmeier
       <pollmeier@gonicus.de>, for the Debian GNU/Linux system (but may be used by others).

Debian                                             June, 2013                                        UIF.CONF(5)