Re: My pf.conf and an nmap scan

2010-11-16 Thread woolsherpahat
OK, so about these rules: @1 block return in log all @2 pass out quick on sis0 proto tcp all flags S/SA modulate state @3 pass out all flags S/SA keep state I still don't see how that opens any ports for outbound traffic returning as part of a request from inbound traffic. All traffic

Re: My pf.conf and an nmap scan

2010-11-15 Thread Henning Brauer
* Kevin Chadwick ma1l1i...@yahoo.co.uk [2010-11-14 17:43]: I'd say drop mode saves some resources in case of dos no. if the attack is doen using the stack of the atacking host(s), sending the damn RAT back will ave you ressources. I don't see timeouts for users connecting to the wrong place

Re: My pf.conf and an nmap scan

2010-11-14 Thread Kevin Chadwick
On Fri, 12 Nov 2010 17:29:53 -0500 Chris Smith obsd_m...@chrissmith.org wrote: On Fri, Nov 12, 2010 at 5:06 PM, David Astua dast...@gmail.com wrote: Check this: http://www.chiark.greenend.org.uk/~peterb/network/drop-vs-reject Good article. Stealth mode is highly overrated. I generally use

Re: My pf.conf and an nmap scan

2010-11-14 Thread Peter N. M. Hansteen
Kevin Chadwick ma1l1i...@yahoo.co.uk writes: I'd say drop mode saves some resources in case of dos and does slow down the scan. I don't see timeouts for users connecting to the wrong place as a big problem at all, though the messages may help them very occasionally. For the drop vs return

Re: My pf.conf and an nmap scan

2010-11-13 Thread woolsherpahat
On Fri, Nov 12, 2010 at 2:16 PM, Frank Brodbeck f...@guug.de wrote: and please stop using macros for interfaces. What exactly is wrong with using macros for interfaces? It seems very common, and is repeated in both the OpenBSD's PF FAQ and The Book of PF. OK, so about these rules: @1 block

My pf.conf and an nmap scan

2010-11-12 Thread woolsherpahat
Hello @misc! I have a lovely little Soekris 4501 running OpenBSD 4.7 (Release). However, I get some strange results if I run a nmap scan on it from work. I get hundreds of ports listed as open. Now it's likely that I have mis-configured my firewall but I can' see exactly where. Hopefully someone

Re: My pf.conf and an nmap scan

2010-11-12 Thread woolsherpahat
(please see my in-line comments) On Fri, Nov 12, 2010 at 12:09 PM, Kenneth Gober kgo...@gmail.com wrote: is it this? # redirect external ssh traffic from ? pass in log on $ext_if inet proto tcp to ($ext_if) port ?\ rdr-to 127.0.0.1 port 22 to me, that rule looks like it will

Re: My pf.conf and an nmap scan

2010-11-12 Thread woolsherpahat
On Fri, Nov 12, 2010 at 12:53 PM, woolsherpahat woolsherpa...@gmail.com wrote: On Fri, Nov 12, 2010 at 12:09 PM, Kenneth Gober kgo...@gmail.com wrote: is it this? # redirect external ssh traffic from ? pass in log on $ext_if inet proto tcp to ($ext_if) port ?\ rdr-to 127.0.0.1

Re: My pf.conf and an nmap scan

2010-11-12 Thread xSAPPYx
Try: set block-policy return You should get your proper closed messages in nmap On Fri, Nov 12, 2010 at 13:27, woolsherpahat woolsherpa...@gmail.com wrote: (please see my in-line comments) On Fri, Nov 12, 2010 at 12:09 PM, Kenneth Gober kgo...@gmail.com wrote: is it this? # redirect

Re: My pf.conf and an nmap scan

2010-11-12 Thread David Astua
2010/11/12 xSAPPYx xsap...@gmail.com: Try: set block-policy return You should get your proper closed messages in nmap On Fri, Nov 12, 2010 at 13:27, woolsherpahat woolsherpa...@gmail.com wrote: (please see my in-line comments) On Fri, Nov 12, 2010 at 12:09 PM, Kenneth Gober

Re: My pf.conf and an nmap scan

2010-11-12 Thread woolsherpahat
# policy: default allow on all outbound traffic on all interfaces pass out Guess what's this part is doing. It enables any traffic from your router to outside world and will open appropriate ports back to your network. OK. That makes sense, but all inbound traffic is dropped... so while all

Re: My pf.conf and an nmap scan

2010-11-12 Thread Chris Smith
On Fri, Nov 12, 2010 at 5:06 PM, David Astua dast...@gmail.com wrote: Check this: http://www.chiark.greenend.org.uk/~peterb/network/drop-vs-reject Good article. Stealth mode is highly overrated. I generally use return except in the case of bogons.