Matthew Lenz wrote:

Just had a situation where a backend job was hanging because it couldn't
get to an ip.  the tcp connect just kinda hung and this particular
software module had a really long timeout set.  Is there a reason why
for example there is a global block in pfsense as opposed to a global
reject (which seems to fail attempts immediately)?  sorry I'm a fw
noob :)


block essentially leaves the firewall "invisible" on the Internet, so that's the default. With block and no open ports and no permitted traffic, your firewall's WAN IP looks no different from an unused IP on the Internet, sometimes referred to as "stealth". Granted it's far from fool proof, but that's the default stance any firewall should take, IMO. Reject sends an ICMP unreachable back to the requesting host, which would let an attacker know that there is actually a host there. Also OS fingerprinting can be done on how a machine rejects certain packets, so that's another good reason to block vs. reject. It's all obscurity, but obscurity when combined with other layers of protection is a good thing (never rely on it for anything, but it's never bad to have).
-cmb

so its safe to assume that internet -> WAN stuff should be blocked. but for internal access between my LAN/OPT interfaces and outbound WAN i can use reject and it wouldn't be considered bad form?

-Matt

Reply via email to