From owner-freebsd-questions@FreeBSD.ORG Mon Mar 14 17:03:49 2005 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 9F9B216A4CF for ; Mon, 14 Mar 2005 17:03:49 +0000 (GMT) Received: from wproxy.gmail.com (wproxy.gmail.com [64.233.184.206]) by mx1.FreeBSD.org (Postfix) with ESMTP id 9CFE443D46 for ; Mon, 14 Mar 2005 17:03:48 +0000 (GMT) (envelope-from dot.sn1tch@gmail.com) Received: by wproxy.gmail.com with SMTP id 70so1763405wra for ; Mon, 14 Mar 2005 09:03:48 -0800 (PST) DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:reply-to:to:subject:cc:in-reply-to:mime-version:content-type:content-transfer-encoding:references; b=LR1mhghQMPC337DmVBaTioJMJ8A4SBJjgfp/MAl6iWQVUGcMtH8by3RCi+I0zafVTc+9F6DNURAe0Ue3h/szRIjSzM9ktaNEsHvNIIm14F1TwrzZqYT4egiF/VTR1A6YzLyDQ+OLWyTKrFcwtsvXYxP3r+AVdfZi5ieXpWMosag= Received: by 10.54.84.17 with SMTP id h17mr673413wrb; Mon, 14 Mar 2005 09:03:38 -0800 (PST) Received: by 10.54.31.67 with HTTP; Mon, 14 Mar 2005 09:03:37 -0800 (PST) Message-ID: Date: Mon, 14 Mar 2005 12:03:37 -0500 From: sn1tch To: daniel quinn In-Reply-To: <200503141152.55407.freebsd@danielquinn.org> Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit References: <200503141152.55407.freebsd@danielquinn.org> cc: freebsd-questions@freebsd.org Subject: Re: ipfw and nmap X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list Reply-To: sn1tch List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 14 Mar 2005 17:03:49 -0000 You could try using nmap with the -sA (ACK) scanning...this is good for mapping firewall rulesets to see what is being let in. You could also use -f (fragment) with -sS to send fragmented packets...this will show open ports unless most of the time too. But -sA is better since the firewall things its a legitimate request and not a port scan On Mon, 14 Mar 2005 11:52:54 -0500, daniel quinn wrote: > i've been experimenting with ipfw since moving some of my machines from linux > to freebsd and i've run across an oddity wrt nmap and freebsd firewalls. it > doesn't seem to work and the activity isn't logged either. > > the firewall is working though. ssh goes through, while other ports are being > blocked (and logged). i've confirmed this with telnet. but nmap still comes > up empty. i'd like to be able to do a proper portscan, but is this a feature > with ipfw or a lack of feature in nmap? > > for the purposes of this test, i've used a variation on the firewall supplied > in the freebsd handbook: > > www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/firewalls-ipfw.html > > -- > ...he who in dealing with the empire loves his subjects as one should love > one's body is the best person to whom one can commit the empire. > - lau tzu, "tao te ching: chapter xiii" > _______________________________________________ > freebsd-questions@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-questions > To unsubscribe, send any mail to "freebsd-questions-unsubscribe@freebsd.org" > -- You've officially been Gmailed