-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Mon, 9 Dec 2002 22:02:57 -0500, Michael Fratoni wrote:
On Monday 09 December 2002 09:35 pm, Jeff Stillwall wrote:
I just replaced a commercial firewall with a RH 7.3 machine running
IPTables. Several non-IT employees found comfort in
Thanks to everyone to suggested rejecting packets instead of dropping them.
I should be able to make that change soon, and I'll let you know if it
helped. Thank you!
--
Jeff Stillwall
[EMAIL PROTECTED]
--
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]?subject=unsubscribe
Slightly OFF-TOPIC,
I have a Cable Modem that dishes out a DHCP address to my Linux
Gateway/Firewall server behind which is my home network.
I used to get scanned several times a day the time until I started
dropping ICMP Echo-requests, now I only get scanned once or twice a
week, and usually
Hopefully, this is only slightly off-topic.
I just replaced a commercial firewall with a RH 7.3 machine running
IPTables. Several non-IT employees found comfort in running Gibson's port
scan (http://www.grc.com). With the old firewall in place, a port scan
showed all ports as 'stealth' (besides
On Mon, 9 Dec 2002, Jeff Stillwall wrote:
Hopefully, this is only slightly off-topic.
Who knows... :-)
Being that there really should be 'no evidence that these ports exist'
(because they don't!), what's the real deal here? Basically, I know not to
trust everything grc says, but I have
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Monday 09 December 2002 09:35 pm, Jeff Stillwall wrote:
Hopefully, this is only slightly off-topic.
I just replaced a commercial firewall with a RH 7.3 machine running
IPTables. Several non-IT employees found comfort in running Gibson's
port
On Mon, Dec 09, 2002 at 10:02:57PM -0500, Michael Fratoni wrote:
If your firewall is refusing the connections, the scanner will show closed
ports. If the rules instead drop the packets, the ports will show up as
stealth.
Try changing the firewall rules policy from REJECT to DROP
Note that