ClosedBSD is a firewall and network address translation utility which boots off of a single floppy disk, and requires no hard drive. ClosedBSD is based off of the FreeBSD kernel, and uses ipfw as it’s native ruleset management system, and natd as it’s network address translation utility. ClosedBSD also features an advanced ncurses based configuration manager (screenshots) which allows you to seamlessly configure your firewall ruleset using protocol filters, port forwarding, and network address translation mechanisms through a simple to use menu interface. DHCP is disabled for this beta release.
ClosedBSD – A FreeBSD and Firewall on a Floppy
About The Author

Eugenia Loli
Ex-programmer, ex-editor in chief at OSNews.com, now a visual artist/filmmaker.
Follow me on Twitter @EugeniaLoli
10 Comments
yes, in 3.x there was no stateful firewalling in ipfw’s implementation but beginning with 4.0 which was released almost 2 years ago there IS one. so your information is a little bit dated

I’m wondering why nobody has made a floppy router from OpenBSD? It’s seems like a good idea to me cause OpenBSD sole purpose is basicly to be damn secure. If I had the skills I’d do it myself.
Anyway I hope PicoBSD supports DHCP because it will be a pain to reset all my network settings when I set up a floppy disk router.

Ivan,
Well, then the ipfw manpage for FreeBSD 4.* is also dated.
I’ll login to a FreeBSD 4.* box in a bit to make sure.
I’m pretty sure about the manpage, though my guess is that the manpage must outdated as any respectable packet filtering implementation does stateful stuff and it did strike me as odd that that feature was still missing from FreeBSD, so you’re probably right and I’m probably mistaken.

This is similar to an existing free firwall. It spawned from the linux router project, but Coyote Linux is essentially Linux on a floppy, but it’s running ipchains.
<href=”http://www.coyotelinux.com“>Coyote Linux

> I’m wondering why nobody has made a floppy router from
> OpenBSD?
“emBSD is a stripped down version of OpenBSD. The concept for emBSD is a small foot print operating system for x86 (or other) hardware to use as little hard disk space as possible yet provide a fully functional Routing Firewall

“Off of” is redundant at best, but booting or being “based” is never “off.” A distribution is “based on” but never “based off.” You can “boot from” but never “boot off.” And never, never, never use “off of.”
Thank you.
Ah firewalls, who needs em? Just leave everything open so the guests feel welcome. You will make lots of new friends.
Well now I guess I have no excuse to set up that subnet for the wife to play on – the old AMDK2/233 can now have a use as a subnet router
I’m a bit confused by this…
Natd is userspace right? I’ve heard that it’s performance isn’t too impressive. But even if what I’ve heard about natd is incorrect, ipfw doesn’t do connection tracking, it doesn’t do “stateful” firewalling. What does this mean? Well, lets say we have a rule to allow established connections to pass, ipfw doesn’t actually keep track of the connection to see if it’s a truly established connection, it just takes the word of the packet, so if the packet says “Yep, I’m established!” ipfw lets it through, regardless of whether it really is or not (though most of the time it’s true I’ll admit). ipf does real connection tracking, as does iptables (ipchains didn’t of course).
I could be wrong, but I know this was the case with ipfw in freebsd 3.* and the manpage for ipfw in FreeBSD 4.* seems to suggest the behavior of ipfw is still stateless. FreeBSD CAN use ipf, so why not use it?
BTW, this is why you can have rules that match against NEW, ESTABLISHED and RELATED connections for icmp and udp under iptables (at least it appears to work this way
). Udp and ICMP are obviously connectionless protocols, but iptables (netfilter really) still tracks those connections. If I remember correctly, older versions of iptables did not, so if you tried to do so on one of those protocols with an older version of netfilter/iptables, you would get an error (like invalied argument or something). Not sure if ipf will track udp and icmp, I don’t think I’ve tried it, it’s been a while since I’ve worked with ipf anyway. Ipf will do it’s own nat.
Nice, added it to the collection of free firewall tools unter http://www.freefire.org“