It looks like people were more interested in whinging about receiving
a few emails from auto-responders (yes, I realize life can be tough)
that answering the question, so...


On Wed, Feb 28, 2001 at 09:01:12PM -0500, [EMAIL PROTECTED] wrote:
>   Is there any reason in particular why PortSentry and an IPChains
> firewall would not work together?  
> 
>   I ask this because ever since I implemented my IPChains firewall
> PortSentry no longer logs scans and since does not add the offender to the
> ipchains rules.  I am pretty certain that part of the reason is due to the
> default rule being DENY and then just allowing certain
> hosts/packets/etc...  

The ipchains rules filter out the packets before PortSentry has a chance
to see then and consider whether they're portscans or not. You'll only
see PortScan pick up the packets if they get thru the ipchains filters.

 
>   I guess what I really am asking is:  Is there a way to have the best of
> both worlds?  I like the security of the default rule being DENY, but I
> also really liked the way PortSentry handled scans as far as the logging
> and the addition of their IP to the rules, thus specifically denying
> anything from that IP.  

You could always log the ipchains-DENYd packets, pick up the IP addresses
from that, and block those addresses. I haven't looked at the PortSentry
source code but it should be easy enough to swipe the code for that. Um,
I mean be inspired by it.

Stil


-- 
Stilgherrian, Operations Manager
Taurfish Technology Services (ARBN V8636744)
http://www.taurfish.com.au/
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to