Re: blocking ports

2002-01-11 Thread martin f krafft
also sprach David Bishop <[EMAIL PROTECTED]> [2002.01.11.1550 +0100]: > > you can configure iptables to return ICMP type 3 "port unreachable" > > packets, just like the OS would, using the REJECT target. that's what > > you want to do. to get your desired effect. > > I'll look into that, thanks.

Re: blocking ports

2002-01-11 Thread martin f krafft
also sprach David Bishop <[EMAIL PROTECTED]> [2002.01.11.1550 +0100]: > > you can configure iptables to return ICMP type 3 "port unreachable" > > packets, just like the OS would, using the REJECT target. that's what > > you want to do. to get your desired effect. > > I'll look into that, thanks.

Re: blocking ports

2002-01-11 Thread David Bishop
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Thursday 10 January 2002 04:14 pm, martin f krafft wrote: > also sprach David Bishop <[EMAIL PROTECTED]> [2002.01.10.1634 +0100]: > > I'm running a server that's hot to the net, and running some insecure > > services (by necessity), like nfs. Of co

Re: blocking ports

2002-01-11 Thread David Bishop
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Thursday 10 January 2002 04:14 pm, martin f krafft wrote: > also sprach David Bishop <[EMAIL PROTECTED]> [2002.01.10.1634 +0100]: > > I'm running a server that's hot to the net, and running some insecure > > services (by necessity), like nfs. Of c

Re: blocking ports

2002-01-11 Thread Russell Coker
On Fri, 11 Jan 2002 00:14, martin f krafft wrote: > however, DENYing has the advantage of *severly* slowing any portscan, > and because obscurity is not a security measure[1] and REJECT not being > any safer then DENY, you are really not gaining anything... Another point is that you may not want t

Re: blocking ports

2002-01-11 Thread Michael Wood
On Fri, Jan 11, 2002 at 12:18:13AM +0100, martin f krafft wrote: > [greg: please wrap your lines at 76 characters...] > > also sprach Greg Hunt <[EMAIL PROTECTED]> [2002.01.10.1850 +0100]: > > The reason it reports it as filtered is if someone tries to > > connect to a port on which you're not run

Re: blocking ports

2002-01-11 Thread Russell Coker
On Fri, 11 Jan 2002 00:14, martin f krafft wrote: > however, DENYing has the advantage of *severly* slowing any portscan, > and because obscurity is not a security measure[1] and REJECT not being > any safer then DENY, you are really not gaining anything... Another point is that you may not want

Re: blocking ports

2002-01-11 Thread Michael Wood
On Fri, Jan 11, 2002 at 12:18:13AM +0100, martin f krafft wrote: > [greg: please wrap your lines at 76 characters...] > > also sprach Greg Hunt <[EMAIL PROTECTED]> [2002.01.10.1850 +0100]: > > The reason it reports it as filtered is if someone tries to > > connect to a port on which you're not ru

Re: blocking ports

2002-01-10 Thread martin f krafft
[greg: please wrap your lines at 76 characters...] also sprach Greg Hunt <[EMAIL PROTECTED]> [2002.01.10.1850 +0100]: > The reason it reports it as filtered is if someone tries to connect to > a port on which you're not running a service, say port 12345, your > server will respond back with a TCP/

Re: blocking ports

2002-01-10 Thread martin f krafft
also sprach David Bishop <[EMAIL PROTECTED]> [2002.01.10.1634 +0100]: > I'm running a server that's hot to the net, and running some insecure > services (by necessity), like nfs. Of course, I used iptables to > block all those ports, using nmap and netstat to double check all my > open ports. How

Re: blocking ports

2002-01-10 Thread martin f krafft
[greg: please wrap your lines at 76 characters...] also sprach Greg Hunt <[EMAIL PROTECTED]> [2002.01.10.1850 +0100]: > The reason it reports it as filtered is if someone tries to connect to > a port on which you're not running a service, say port 12345, your > server will respond back with a TCP

Re: blocking ports

2002-01-10 Thread martin f krafft
also sprach David Bishop <[EMAIL PROTECTED]> [2002.01.10.1634 +0100]: > I'm running a server that's hot to the net, and running some insecure > services (by necessity), like nfs. Of course, I used iptables to > block all those ports, using nmap and netstat to double check all my > open ports. Ho

Re: blocking ports

2002-01-10 Thread Dave Watkins
Firstly look through the services you run and see if they can be bound to a single interface only. If they run from inetd you can replace it with xinetd to gain this functionality. Secondly (and this may or may not work I've never actually tried it), you could try rejecting the packets rather t

Re: blocking ports

2002-01-10 Thread Dave Watkins
Firstly look through the services you run and see if they can be bound to a single interface only. If they run from inetd you can replace it with xinetd to gain this functionality. Secondly (and this may or may not work I've never actually tried it), you could try rejecting the packets rather

Re: blocking ports

2002-01-10 Thread Greg Hunt
The reason it reports it as filtered is if someone tries to connect to a port on which you're not running a service, say port 12345, your server will respond back with a TCP/IP packet with the RST, ACK flags set (I know RST, I think ACK too). nmap sees this as closed. If you filter something out

Re: blocking ports

2002-01-10 Thread Greg Hunt
The reason it reports it as filtered is if someone tries to connect to a port on which you're not running a service, say port 12345, your server will respond back with a TCP/IP packet with the RST, ACK flags set (I know RST, I think ACK too). nmap sees this as closed. If you filter something ou

blocking ports

2002-01-10 Thread David Bishop
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I'm running a server that's hot to the net, and running some insecure services (by necessity), like nfs. Of course, I used iptables to block all those ports, using nmap and netstat to double check all my open ports. However, what nmap reports back

blocking ports

2002-01-10 Thread David Bishop
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I'm running a server that's hot to the net, and running some insecure services (by necessity), like nfs. Of course, I used iptables to block all those ports, using nmap and netstat to double check all my open ports. However, what nmap reports bac