Date: Wed, 10 Nov 1999 16:17:26 +0000 From: Ben Smithurst <ben@scientia.demon.co.uk> To: Giorgos Keramidas <keramida@ceid.upatras.gr> Cc: freebsd-questions@freebsd.org Subject: Re: Port 137 hitting my server Message-ID: <19991110161725.A3387@strontium.scientia.demon.co.uk> In-Reply-To: <86u2mv862r.fsf@localhost.hell.gr> References: <86emdz68a0.fsf@localhost.hell.gr> <Pine.SOL.4.10.9911091512360.25266-100000@icg> <99Nov10.104437est.40326@border.alcanet.com.au> <86u2mv862r.fsf@localhost.hell.gr>
next in thread | previous in thread | raw e-mail | index | archive | help
Giorgos Keramidas wrote:
> In fact FreeBSd does have a nice way of rejecting all these connection
> attempts to port 137, but not a daemon per se. If you don't find
> recompiling the kernel a tedious task to do, the firewall support of
> FreeBSD is quite suitable for this task. A simple set of rules like
>
> 0100 deny udp from any to any 137 via if0
> 0200 pass ip from any to any
>
> should be enough for this task.
You don't even need to recompile the kernel, ipfw works fine as a module
(in my case at least, I'm not sure how you use the various IPFIREWALL_*
options when ipfw is a kld).
--
Ben Smithurst | PGP: 0x99392F7D
ben@scientia.demon.co.uk | key available from keyservers and
| ben+pgp@scientia.demon.co.uk
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19991110161725.A3387>
