Date: Mon, 8 Jul 2002 23:02:03 +0300 From: Peter Pentchev <roam@ringlet.net> To: twig les <twigles@yahoo.com> Cc: Klaus Steden <klaus@compt.com>, "Dalin S. Owen" <dowen@nexusxi.com>, Laurence Brockman <laurence@fluxinc.com>, security@FreeBSD.ORG Subject: Re: hiding OS name Message-ID: <20020708200203.GB363@straylight.oblivion.bg> In-Reply-To: <20020708195244.79411.qmail@web10107.mail.yahoo.com> References: <20020708183726.GA363@straylight.oblivion.bg> <20020708195244.79411.qmail@web10107.mail.yahoo.com>
index | next in thread | previous in thread | raw e-mail
[-- Attachment #1 --] On Mon, Jul 08, 2002 at 12:52:44PM -0700, twig les wrote: > > > --- Peter Pentchev <roam@ringlet.net> wrote: > > On Mon, Jul 08, 2002 at 02:13:42PM -0400, Klaus > > Steden wrote: > > > > Portsentry may help > > (/usr/ports/security/portsentry I > > > > believe). Won't hide the OS, but it may shut > > down > > > > scans before they get that far. <shrug>, never > > tested > > > > it that way. > > > > > > > A friend of mine runs portsentry configured to > > blackhole every IP that > > > attempts to connect to a port where no server is > > running (in conjunction with > > > a strict firewall); that can be done in FreeBSD > > without using portsentry, via > > > the blackhole sysctl MIBs. See blackhole(4). > > > > > > It's not a bad means to keep people out of your > > machines. > > > > I know I'm going to regret posting in this thread, > > but so be it :) > > > > Does your friend know that, unlikely as it is made > > by modern ingress and > > egress routing practices, IP spoofing is still not > > quite ruled out? > > Will your friend's portsentry setup happily > > blackhole e.g. his ISP's > > nameserver, or the root nameservers, or > > www.cnn.com's IP addresses, > > simply because somebody found a way to send a TCP > > SYN packet with a > > forged source address to e.g. your friend's > > machine's port 3? :) > > Nah, they have an ignore file of IPs to never block. > rude but simple and effective. <personality class="r_l_stevenson" char="mr-hide"> Uhm... ok... excuse me for a second, I have to start a little loop on several dozens of machines here; a simple loop, yeah, netblocks, that's right; well, I know it will not get too far, but I could probably get in a couple of thousand 'deny' rules into that firewall before they notice, can't I now? And if I start with the right netblocks, I could block half his favorite sites in a couple of minutes.. Oh, a reboot? Bother.. Okay, so I'll kill that in, say, a day, and start over again.. Oh hey, what's that badge that just fell outta yer pocket? Look, man, I gotta scramble, some cousin's probably having a baby right now or something.. :P </personality> What, do you put half the Internet in that ignore file? :) G'luck, Peter -- Peter Pentchev roam@ringlet.net roam@FreeBSD.org PGP key: http://people.FreeBSD.org/~roam/roam.key.asc Key fingerprint FDBA FD79 C26F 3C51 C95E DF9E ED18 B68D 1619 4553 I am the meaning of this sentence. [-- Attachment #2 --] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (FreeBSD) iD8DBQE9Ke+77Ri2jRYZRVMRApD2AKCbeb6iNYYO1A1xuw+KpA8rRIDW0gCgnKcL EAveuVHDrjS8QlRaqMgn6TQ= =rREA -----END PGP SIGNATURE-----help
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020708200203.GB363>
