RE: is it possible to block ip packets that contains experimentaltcp options ?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I assume that LOG-AND-DROP is your own chain, crafted so that you can
perform both functions with a single entry?



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Paul Blondé
 


> -----Original Message-----
> From: netfilter-bounces@xxxxxxxxxxxxxxxxxxx 
> [mailto:netfilter-bounces@xxxxxxxxxxxxxxxxxxx] On Behalf Of Marc Cozzi
> Sent: Wednesday, May 16, 2007 5:19 AM
> To: netfilter@xxxxxxxxxxxxxxxxxxx
> Subject: RE: is it possible to block ip packets that contains 
> experimentaltcp options ?
> 
> 
> 
> Glenn,
> 
> Not sure what you mean by "experimental" however, there are
> some conditions of flags that should never occur on the
> network. These can be trapped with rules similar to the following.
> 
> iptables -A BLOCKED -m state --state INVALID -j LOG-AND-DROP
> iptables -A BLOCKED -p tcp --tcp-flags ALL ALL -j LOG-AND-DROP
> iptables -A BLOCKED -p tcp --tcp-flags ALL NONE -j LOG-AND-DROP
> 
>   --marc
> 
> 
> > -----Original Message-----
> > From: Glenn Terjesen [mailto:glenn@xxxxxxxxx] 
> > Sent: Wednesday, May 16, 2007 5:24 AM
> > To: netfilter@xxxxxxxxxxxxxxxxxxx
> > Subject: is it possible to block ip packets that contains 
> > experimental tcp options ?
> > 
> > Hello,
> > got a iptables firewall filtering our servers.
> > 
> > Is it possible to block tcp packets that contains 
> > experimental tcp options ?
> > 
> > AND is it smart to do so ?
> > 
> > 
> > --
> > Mvh Glenn Terjesen @ Webcat AS
> > Tlf: +47 37 02 20 20
> > E-post: support@xxxxxxxxx
> > 
> 




[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux