Re: Unable to block ICMP

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Ronald wrote:

[...]

> That is weird, if you block ICMP outgoing in comodo, all the closed
> ports are shown as stealthed. This is really confusing ...

What is comodo?

Which scan test are you using? If it's a UDP scan this is not weird. If
a closed port (i.e. a port no service is listening on) is contacted, an
ICMP port unreachable message is sent back. By blocking this ICMP
message (or blocking all outgoing ICMP traffic), you get the same result
as if you blocked the incoming packet: the sender doesn't get a response
and so the port is 'stealthed'.
If it's a TCP scan, the kernel sends back a TCP Reset. In this case
blocking ICMP should have no effect (in this case: yes, it's weird).


BTW: If you block traffic to ports services are listening on, but accept
traffic to closed ports, someone who scans your IP knows:

1. You are there. He gets ICMP port unreachable messages or TCP Reset
for the closed but unblocked (not 'stealthed') ports.
2. He knows which ports you are running services on (-> the ports he
doesn't get the ICMP messages or TCP Reset).

This may not be what you want.


You wrote that skype requires to have everything open above port 1024.
This can't be true!
Skype works perfectly if you accept all outgoing traffic and

a) configure skype to use a certain port and accept incoming traffic to
this port,

or (better)

b) drop *all* incoming traffic and use connection tracking. This lets
pass all incoming packets belonging to a connection initialized by your
computer:
iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
(you can leave out the ',RELATED' but then you'll run into trouble with
e.g. FTP and ICMP error messages)



michael






[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux