Re: Iptables Block Netbios Broadcasts UDP 137-138

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, Nov 23, 2004 at 12:51:38PM -0800, Real Cucumber wrote:
> I cannot block LAN netbios broadcasts on a fedora core
> 2 Iptables box being used as an IDS.
> 
> It is therefore being 99% flooded with broadcasts.
> 
> I've tried:
> 
> iptables -A INPUT -p UDP --dport 137 -j DROP
> iptables -A INPUT -p UDP --dport 137 -s 0/0 -j DROP
> iptables -A INPUT -p UDP --dport 137 -s 192.168.0.0/24
> -j DROP
> 
> Nothing prevents them from getting through.
> 
> Is there anyway to do this?
> 
> If possible can someone email me direct at
> realcucumber@xxxxxxxxxxx
> 
> Thanks for any help in advance.

i actually like using:

  iptables -I INPUT -m pkttype --pkt-type broadcast -j DROP

IDS software (like snort, for example) operates at the BPF layer, which
is below where netfilter hooks into the stack.

so it's unclear what your really asking--if your asking, "i installed
these iptables filter rules to block netbios, but my snort logs are still
full of netbios traffic" the answer is, no--netfilter can't stop that.
a BPF appended to the end of your snort command can filter them out
though:

  snort $SNORT_CMD_OPTS not udp port '(137 or 138)'

or, more generically:

  snort $SNORT_CMD_OPTS not dst host '(255.255.255.255 or 192.168.0.255)'

if instead--you are actually asking how to block these packets at layer
3--i would suppose you might have a rule before your rules above that
allow the packets.

-j

--
"Dear Baby, Welcome to Dumpsville. Population: You"
        --The Simpsons


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux