This can partially be countered (but not fully be solved) by using
portsentry.

Regards
Gustav

Robert Glover wrote:
> 
> > > localbox:1055 --> 1.2.3.4:80
> > >
> > >    The firewall sees this and for some
> > >    period of seconds or until the
> > >    connection is closed will allow
> > >    incomming packets on port 1055
> > >    only from IP address 1.2.3.4
> >
> > OK, but what, exactly, does that buy you that blocking SYN packets does
> > not?  If I use ipchains to refuse SYN packets on ports above 1024, then
> > nobody on the outside can connect to user applications that have ports
> > open (like GNOME apps), but I'm still free to use HTTP and PASV ftp, no?
> 
> Some wretched soul might send a non-SYN packet at one your open TCP ports as
> part of some kind of port scan.  The response from that port would tell them
> that something is there.  If those ports were blocked by the stateful
> inspection firewall, then there would be no response.

-- 
pgp = Pretty Good Privacy.

To get my public pgp key, send an e-mail to: [EMAIL PROTECTED]

Visit my web site at http://www.schaffter.com


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.

Reply via email to