2008/11/10 Sam Kuper <[EMAIL PROTECTED]>

> By using REJECT instead of DROP, you have no stealth. This means you can be
> port-scanned to look for weaknesses, e.g. unpatched OpenSSH vulnerabilities,
> etc.
>

That said, if SSH traffic is blocked, an OpenSSH vuln. might not be
significant. If you're allowing and inbound traffic, though, any unpatched
flaws in the app servicing that inbound traffic could expose your system to
attack.

Also, by REJECTing rather than DROPping, you might be more vulnerable to DoS
attacks.
Consider using a default (LOG and) DROP policy instead. Michael Rash's site
(www.cipherdyne.org) has some good resources for learning about this and
implementing it.

Reply via email to