making services invisible

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



--=-Dfc73hjCcLqiBciLkDAH
Content-Type: text/plain
Content-Transfer-Encoding: 7bit

Use DROP instead of REJECT.

REJECT action tells tables to send back an ICMP message indicating that
you're REJECTing the packet.  DROPing will just DROP with no further
action.

--

On Thu, 2002-10-10 at 09:13, Julio Cesar Ody wrote:

    Hello. I'm using Slackware 8.1, kernel 2.4.18 and iptables v1.2.7a. I 
    blocked external acess to some services using the following rule:
    
    iptables -A INPUT -i ! eth0 -p tcp -m multiport --destination-port 
    <port1>,<port2>,<blablabla> -j REJECT
    
    However, when I perform a stealth scan using nmap on my host, I still 
    can see them running, but instead of "opened" I get them as "filtered". 
    Is there a way to block these results, making the services literally 
    invisible ? Appreciate any help, and also any technical information 
    (links, docs) regarding the answer.
    
    
    
    Julio Cesar Ody

--=-Dfc73hjCcLqiBciLkDAH
Content-Type: text/html; charset=utf-8

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 TRANSITIONAL//EN">
<HTML>
<HEAD>
  <META HTTP-EQUIV="Content-Type" CONTENT="text/html; CHARSET=UTF-8">
  <META NAME="GENERATOR" CONTENT="GtkHTML/1.0.4">
</HEAD>
<BODY>
Use DROP instead of REJECT.
<BR>

<BR>
REJECT action tells tables to send back an ICMP message indicating that you're REJECTing the packet.&nbsp; DROPing will just DROP with no further action.
<BR>

<BR>
--
<BR>

<BR>
On Thu, 2002-10-10 at 09:13, Julio Cesar Ody wrote:
    <BLOCKQUOTE>
<PRE><FONT COLOR="#505357"><FONT SIZE="3"><I>Hello. I'm using Slackware 8.1, kernel 2.4.18 and iptables v1.2.7a. I </FONT></FONT></I>
<FONT COLOR="#505357"><FONT SIZE="3"><I>blocked external acess to some services using the following rule:</FONT></FONT></I>
<FONT COLOR="#505357"><FONT SIZE="3"><I></FONT></FONT></I>
<FONT COLOR="#505357"><FONT SIZE="3"><I>iptables -A INPUT -i ! eth0 -p tcp -m multiport --destination-port </FONT></FONT></I>
<FONT COLOR="#505357"><FONT SIZE="3"><I>&lt;port1&gt;,&lt;port2&gt;,&lt;blablabla&gt; -j REJECT</FONT></FONT></I>
<FONT COLOR="#505357"><FONT SIZE="3"><I></FONT></FONT></I>
<FONT COLOR="#505357"><FONT SIZE="3"><I>However, when I perform a stealth scan using nmap on my host, I still </FONT></FONT></I>
<FONT COLOR="#505357"><FONT SIZE="3"><I>can see them running, but instead of &quot;opened&quot; I get them as &quot;filtered&quot;. </FONT></FONT></I>
<FONT COLOR="#505357"><FONT SIZE="3"><I>Is there a way to block these results, making the services literally </FONT></FONT></I>
<FONT COLOR="#505357"><FONT SIZE="3"><I>invisible ? Appreciate any help, and also any technical information </FONT></FONT></I>
<FONT COLOR="#505357"><FONT SIZE="3"><I>(links, docs) regarding the answer.</FONT></FONT></I>
<FONT COLOR="#505357"><FONT SIZE="3"><I></FONT></FONT></I>
<FONT COLOR="#505357"><FONT SIZE="3"><I></FONT></FONT></I>
<FONT COLOR="#505357"><FONT SIZE="3"><I></FONT></FONT></I>
<FONT COLOR="#505357"><FONT SIZE="3"><I>Julio Cesar Ody</FONT></FONT></I></PRE>
    </BLOCKQUOTE>
</BODY>
</HTML>

--=-Dfc73hjCcLqiBciLkDAH--



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux