Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 8 Jul 2002 23:02:03 +0300
From:      Peter Pentchev <roam@ringlet.net>
To:        twig les <twigles@yahoo.com>
Cc:        Klaus Steden <klaus@compt.com>, "Dalin S. Owen" <dowen@nexusxi.com>, Laurence Brockman <laurence@fluxinc.com>, security@FreeBSD.ORG
Subject:   Re: hiding OS name
Message-ID:  <20020708200203.GB363@straylight.oblivion.bg>
In-Reply-To: <20020708195244.79411.qmail@web10107.mail.yahoo.com>
References:  <20020708183726.GA363@straylight.oblivion.bg> <20020708195244.79411.qmail@web10107.mail.yahoo.com>

index | next in thread | previous in thread | raw e-mail

[-- Attachment #1 --]
On Mon, Jul 08, 2002 at 12:52:44PM -0700, twig les wrote:
> 
> 
> --- Peter Pentchev <roam@ringlet.net> wrote:
> > On Mon, Jul 08, 2002 at 02:13:42PM -0400, Klaus
> > Steden wrote:
> > > > Portsentry may help
> > (/usr/ports/security/portsentry I
> > > > believe).  Won't hide the OS, but it may shut
> > down
> > > > scans before they get that far.  <shrug>, never
> > tested
> > > > it that way.
> > > > 
> > > A friend of mine runs portsentry configured to
> > blackhole every IP that
> > > attempts to connect to a port where no server is
> > running (in conjunction with
> > > a strict firewall); that can be done in FreeBSD
> > without using portsentry, via
> > > the blackhole sysctl MIBs. See blackhole(4).
> > > 
> > > It's not a bad means to keep people out of your
> > machines.
> > 
> > I know I'm going to regret posting in this thread,
> > but so be it :)
> > 
> > Does your friend know that, unlikely as it is made
> > by modern ingress and
> > egress routing practices, IP spoofing is still not
> > quite ruled out?
> > Will your friend's portsentry setup happily
> > blackhole e.g. his ISP's
> > nameserver, or the root nameservers, or
> > www.cnn.com's IP addresses,
> > simply because somebody found a way to send a TCP
> > SYN packet with a
> > forged source address to e.g. your friend's
> > machine's port 3? :)
> 
> Nah, they have an ignore file of IPs to never block. 
> rude but simple and effective.

<personality class="r_l_stevenson" char="mr-hide">
Uhm... ok... excuse me for a second, I have to start a little loop on
several dozens of machines here; a simple loop, yeah, netblocks, that's
right; well, I know it will not get too far, but I could probably get in
a couple of thousand 'deny' rules into that firewall before they notice,
can't I now?  And if I start with the right netblocks, I could block
half his favorite sites in a couple of minutes..  Oh, a reboot?
Bother.. Okay, so I'll kill that in, say, a day, and start over again..

Oh hey, what's that badge that just fell outta yer pocket?  Look, man, I
gotta scramble, some cousin's probably having a baby right now or
something.. :P
</personality>

What, do you put half the Internet in that ignore file? :)

G'luck,
Peter

-- 
Peter Pentchev	roam@ringlet.net	roam@FreeBSD.org
PGP key:	http://people.FreeBSD.org/~roam/roam.key.asc
Key fingerprint	FDBA FD79 C26F 3C51 C95E  DF9E ED18 B68D 1619 4553
I am the meaning of this sentence.

[-- Attachment #2 --]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (FreeBSD)

iD8DBQE9Ke+77Ri2jRYZRVMRApD2AKCbeb6iNYYO1A1xuw+KpA8rRIDW0gCgnKcL
EAveuVHDrjS8QlRaqMgn6TQ=
=rREA
-----END PGP SIGNATURE-----
help

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020708200203.GB363>