Re: Port Scan Detection

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wednesday 2011-05-04 23:16, netfilter@xxxxxxxxxxxxxx wrote:

>I have seen these rules used to detect a port scan:
>
>iptables -A INPUT -i $INTERFACE --proto tcp --tcp-flags SYN,ACK,FIN,RST
>RST -j LOG --log-prefix "PORT SCAN: " --log-level 6
>iptables -A INPUT -i $INTERFACE --proto tcp --tcp-flags SYN,ACK,FIN,RST
>RST -j DROP
>
>It seems to me that this is a legitimate TCP flag combination, unless
>I'm reading the rule wrong.


Bloggers using --tcp-flags to purportedly detect port scans are wasting 
their time. They could have just used -m conntrack --ctstate INVALID 
which should catch bogus flag combinations already.

Secondly, some scan types can use completely RFC-compliant traffic and 
therefore need a more sophisticated approach (cf. "Detecting 
and deceiving network scans" PDF).
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux