Annotation of embedaddon/ipguard/doc/ipguard.8, revision 1.1.1.1
1.1 misho 1: .\"
2: .\" ipguard.8
3: .\"
4: .\" Copyright (c) 2010 SeaD <sead at deep.perm.ru>
5: .\"
6: .\" Redistribution and use in source and binary forms, with or without
7: .\" modification, are permitted provided that the following conditions
8: .\" are met:
9: .\" 1. Redistributions of source code must retain the above copyright
10: .\" notice, this list of conditions and the following disclaimer.
11: .\" 2. Redistributions in binary form must reproduce the above copyright
12: .\" notice, this list of conditions and the following disclaimer in the
13: .\" documentation and/or other materials provided with the distribution.
14: .\"
15: .\" THIS SOFTWARE IS PROVIDED BY AUTHOR AND CONTRIBUTORS ``AS IS'' AND
16: .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
17: .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
18: .\" ARE DISCLAIMED. IN NO EVENT SHALL AUTHOR OR CONTRIBUTORS BE LIABLE
19: .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
20: .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
21: .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
22: .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
23: .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
24: .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
25: .\" SUCH DAMAGE.
26: .\"
27: .\"## $Id: ipguard.8,v 1.15 2010/07/12 03:46:52 sead Exp $
28: .\"
29: .TH ipguard 8
30:
31: .SH NAME
32: .PP
33: ipguard \- tool designed to protect Ethernet LAN IP address space by ARP spoofing.
34:
35: .SH SYNOPSIS
36: .PP
37: .B ipguard
38: [\-h] [\-ajgrxziovd]
39: [\-f \fIethers\fP]
40: [\-l \fIlog\fP]
41: [\-p \fIpid\fP]
42: [\-m \fImac\fP]
43: [\-c \fIfilter\fP]
44: [\-u \fIseconds\fP]
45: [\-k \fIseconds\fP]
46: [\-n \fIfakes\fP]
47: [\-t \fImseconds\fP]
48: [\-b \fIbuf\fP]
49: [\-s \fIuser\fP]
50: <\iface>
51:
52: .SH DESCRIPTION
53: .PP
54: ipguard listens network for ARP packets. All permitted MAC-IP pairs
55: listed in 'ethers' file. If it receives one with MAC-IP pair, which is
56: not listed in 'ethers' file, it will send ARP reply with configured
57: fake address. This will prevent not permitted host to work properly
58: in local ethernet segment.
59:
60:
61: .SH OPTIONS
62: .TP
63: .B \-f | -e " \fIethers\fP"
64: Ethers file. Format of `ethers' file described in `ethers.sample' and ethers(5). Default `/etc/ethers'.
65: .TP
66: .B \-l " \fIlog\fP"
67: Log file. Default `/var/log/ipguard_<iface>.log'.
68: .TP
69: .B \-p " \fIpid\fP"
70: Pid file. Default `/var/run/ipguard_<iface>.pid'.
71: .TP
72: .B \-m " \fImac\fP"
73: Fake MAC address. Will be sent in ARP reply as MAC of unlisted computer. Default `de:ad:xx:xx:xx:xx', `x' == random hex number.
74: .TP
75: .B \-c " \fIfilter\fP"
76: PCAP filter expression. Default no filter.
77: .TP
78: .B \-u " \fIseconds\fP"
79: Update ethers interval. Time between checks `ethers' file for changes and rescan if any. Default 0 == no autoupdate.
80: .TP
81: .B \-k " \fIseconds\fP"
82: Periodic regenerate fake MAC address. Default 0 == no regenerate.
83: .TP
84: .B \-n " \fIfakes\fP"
85: Fake replies number. Default 2 replies.
86: .TP
87: .B \-t " \fImseconds\fP"
88: Time between fakes. Default 50 milliseconds.
89: .TP
90: .B \-b " \fIbuf\fP"
91: MAC buffer size. Number of last bad MAC-IP pairs stored in buffer. Default 0 == no buffer.
92: .TP
93: .B \-s " \fIuser\fP"
94: Drop root privileges to user. Default do not drop.
95: .TP
96: .B \-a
97: No address substitution. Like 0.0.0.0 or 00:00:00:00:00:00.
98: .TP
99: .B \-j
100: Disable first MAC-IP pair autodetect from interface.
101: .TP
102: .B \-g
103: Default to grant. Do not block MAC or IP if both not in list.
104: .TP
105: .B \-r
106: Read only. Do not send anything to net. Only listen.
107: .TP
108: .B \-x
109: Duplex mode. Send fake packets not only to pirate but to request for pirate's address too.
110: .TP
111: .B \-z
112: Send broadcast who-has to fix all client ARP tables broked by pirate.
113: .TP
114: .B \-i
115: Hidden mode. Do not block gratuitous ARP packets.
116: .TP
117: .B \-o
118: Promiscuous mode. Enable promiscuous mode. Usually useless.
119: .TP
120: .B \-v
121: Verbose. Some more messages.
122: .TP
123: .B \-d
124: Don't fork. Do not go to background and write all events to STDERR.
125: .TP
126: .B \-dd
127: Debug
128: .TP
129: .B \-ddd
130: Debug more
131: .TP
132: .B \-h
133: Help. Short command line parameters description.
134:
135: .SH EXAMPLES
136: .TP
137: Normal recommended mode, duplex, broadcast fix, autoupdate /etc/ethers every 5 min:
138: .B ipguard -xz -u 300 fxp0
139: .TP
140: Same but with PCAP filter for only 192.168.1.0/24 network:
141: .B ipguard -xz -u 300 -c 'net 192.168.0.0/24' fxp0
142: .TP
143: Read-only mode and remember last 100 not listed in `ethers' MACs. Useful for initial MAC-IP pairs collection:
144: .B ipguard -r -b 100 -f /dev/null rl0
145: .TP
146: Run ipguard for a while then `killall -USR2 ipguard' and you'll get dump of 100 most recent MAC-IP pairs.
147: .TP
148: Do not go to background and be more verbose, with test ethers file:
149: .B ipguard -vd -f /tmp/ethers my1
150: .br
151:
152: .SH TIPS
153: .PP
154: First MAC-IP pair in `ethers' always must be self MAC/IP addresses.
155: Normally them automatically taken from listening interface.
156: But if `-j' option specified then make sure that first pair
157: is a source MAC/IP.
158: .PP
159: If you want to start more than one ipguard on segment for
160: redundancy, you must specify same fake MAC address for every
161: ipguard and find method to synchronize `ethers' files.
162:
163: .SH SIGNALS
164: .TP
165: .B SIGHUP
166: rescan `ethers' and reopen log file
167: .TP
168: .B SIGUSR1
169: dump some tables and statistics
170: .TP
171: .B SIGUSR2
172: dump new MAC-IP table in ethers(5) format
173:
174: .SH FILES
175: .TP
176: .B /etc/ethers
177: MAC-IP pairs list
178: .TP
179: .B /var/log/ipguard_<iface>.log
180: log file
181: .TP
182: .B /var/run/ipguard_<iface>.pid
183: pid file
184:
185: .SH SEE ALSO
186: .PP
187: RFC 826, ethers(5), tcpdump(1), pcap(3), libnet
188:
189: .SH BUGS
190: .PP
191: Do not use wildcard IP 0.0.0.0 in `ethers' with -x option. Legal clients will be banned. Discovered by irix.
192: .PP
193: Strange bug with libnet_get_hwaddr() isn't working on OpenBSD 4.0 discovered by irix. Use -j option.
194: .PP
195: ipguard will not prevent changing MAC address along with IP by pirate.
196: .PP
197: Signals HUP, USR1 or USR2 works only when received new ARP packet. It's not a bug, it's a feature.
198: .PP
199: When using -s <user> option ipguard will drop root privileges after creating log and pid files. So it will not delete or reopen these files.
200: .PP
201: Probably too many command line options. Another one or two and i'll put them all into /etc/ethers as comments.
202: .PP
203: ipguard was written as simple small tool and i haven't any plans for support of external databases SQL/LDAP/Whatever. Use scripts.
204:
205: .SH AUTHOR
206: .PP
207: SeaD <sead at deep.perm.ru>
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>