Date: Thu, 15 Sep 2005 13:43:56 -0500 From: "Boris Karloff" <modelt20@canada.com> To: freebsd-questions@freebsd.org Subject: NMAP probing of network ports Message-ID: <4329c0ec.244.232.3162@canada.com>
next in thread | raw e-mail | index | archive | help
Hello:
How do I cause freeBSD 5.4 to not respond to an nmap
inquiry? I have already tried creating a line in rc.firewall
that says:
${fwcmd} deny all from any to any
${fwcmd} drop all from any to any
I know these are active, since 1) I see them on the screen
at startup, and 2) pinging from any computer to any computer
results in a timeout.
(both of these should drop all TCP packets; but apparently,
they cause a RESET message to be sent.)
I've also tried adding the following to sysctl.conf:
net.inet.tcp.blackhole=2
net.inet.udp.blackhole=1
Again, these don't seem to prevent my freeBSD from sending a
packet (probably a RESET or UNREACHABLE-HOST ack).
Once the person sending the nmap to this machine has the IP,
its a simple step for them to ip-flood this machine; or
worse.
How do I make freeBSD not acknowledge the fingerprint from
nmap?
Thanks in advance.
Harold.
----------------------------------------
Upgrade your account today for increased storage; mail
forwarding or POP enabled e-mail with automatic virus
scanning. Visit
http://www.canada.com/email/premiumservices.html for more
information.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4329c0ec.244.232.3162>
