> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> >> Using iptables:
> >> ...DROP all...
> >> iptables -I INPUT -p udp --dport 1024: --sport 1024: -i eth0 -m state \
> >> --state NEW -m ttl --ttl 1 -j ACCEPT
> > Thanks. I'll just use that but replace ACCEPT with REJECT
> > as Tim suggested. I couldn't get the ttl part working, but
> > I guess I just have to load some module to get it working.
> You probably couldn't get ttl working because it probably wasn't built into
> your kernel. It is now a standard part of the kernel so it is not
> considered experimental. What kernel version are you at right now?
I'm using kernel version 2.4.9. I have compiled all netfilter
options as modules, but there is no ipt_ttl module. Where do
I find this module? Does it exist in the 2.4.9 kernel?
Quote:> As for REJECT...it sounds odd, but REJECT and ACCEPT are the exactly the
> same in this situation. If you ACCEPT a UDP traceroute (ttl == 1) your
> machine will generate an ICMP port unreachable to the sender. If you REJECT
> it without any `reject-with' options your machine will generate an ICMP
> port unreachable to the sender :)
They will be the same as long as no process is listening on
the port. But if a process is listening on the port there
should be a difference. I use reject-with
Quote:> There is no reason I can think of that you would allow people on the net to
> diagnose and map your network. Tools like traceroute are a benefit to you
> the admin, but are not a needed part of external connectivity. I say DROP
> them.
This particular computer is a standalone connected directly
to the internet. It only has to protect itself, so there is
no internal network to map anyway. I have been considereing
how this could be done if there is an internal network. I
think the firewall could be configured to just send an
icmp-port-unreachable, perhaps with the source IP set to the
actual target. That way all traceroutes from outside will
stop at the firewall and will think they have reached their
destination.
In my case it makes no sense to try preventing traceroutes.
A traceroute will see the route until the last hop before
the computer, the only thing I could hide is the fact that
the computer is actually alive. But you could get that
information by using ssh instead.
Quote:> Of course if you have some tight filtering in your OUTPUT chain you are
> probably not letting it out wither way...which is a good thing.
I don't have any reasons to filter my OUTPUT chain, except
from protecting my cable modem which would otherwise let
any user change its configuration through a http server.
Quote:> -----BEGIN PGP SIGNATURE-----
> Comment: Keeping the world safe for geeks.
> iD8DBQE7wIewwBVKl/Nci0oRAsluAJ9LJAcBb3v8yF58nntvlZr2+vIq+ACguecy
> EYMbd26slvJDBOKw0mcqcVE=
> =s4F3
> -----END PGP SIGNATURE-----
--
Kasper Dupont