TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Filtered: NMAP Port Scanner Sees Through IPtables Firewall (2006)

32 pointsby AJAlabsover 10 years ago

4 comments

ckuehlover 10 years ago
It seems that it might be more appropriate to simply have your default firewall rule be to drop incoming traffic, and to then open only those ports you need.<p>If you&#x27;re using a port whitelist (rather than blacklist), the problem the author identifies shouldn&#x27;t really exist.
评论 #8477108 未加载
评论 #8477043 未加载
gnowayover 10 years ago
I&#x27;ve always wondered what the actual best practice is with rejection rules. I tend to prefer issuing reset&#x2F;unreachable since as the article points out it does make the port look like it&#x27;s truly unused. On the other hand, eliminating the response packets has benefits of its own: the scan takes longer, the system doesn&#x27;t incur the response overhead and it won&#x27;t participate in any attack scenario depending on sending responses to a spoofed address.
评论 #8477074 未加载
cthalupaover 10 years ago
It depends on what you&#x27;re worried about as to why you would choose drop vs. reject<p>If you scan only that specific port, a DROP will make the IP address appear unused - so if you&#x27;re worried about someone scanning purely for port 22 and not anything else, a drop is the better choice.<p>(See: nmap an unused IP address with -P0 to ignore the fact there&#x27;s no icmp response to show the host is alive, and you get a &#x27;filtered&#x27;)<p>If you&#x27;re worried about people that are specifically trying to find see if a service is running on your specific server, a reject + reset might be the better choice.
Khaineover 10 years ago
How do you achieve the same outcome with pf or ipfw?