I was under the impression that you can configure portsentry to never
blacklist from certain hosts, no matter what they do.


On Wed, 2002-01-16 at 23:00, Bob Miller wrote:
> Jacob Meuser wrote:
> 
> > scrub in on $ext_if all
> > block in log quick on $ext_if inet proto tcp from any to any flags FUP/FUP
> > pass out on $ext_if inet proto tcp from { $my_ip(s) } to any modulate state
> > 
> > Does a pretty good job.
> 
> For those of you who are LINUX geeks, not OpenBSD geeks, that
> stuff Jacob wrote is pf rules.  pf is to OpenBSD as iptables
> is to Linux: it's the packet filter.
> 
> "scrub" means reassemble fragmented packets.  Many TCP and IP
> implementations get confused by strangely fragmented packets,
> and nmap uses those to identify stacks.
> 
> "block in ... FUP/FUP" means to drop any incoming TCP packets with
> the FIN, URG and PUSH bits all set.  nmap creates these (illegal)
> packets.
> 
> "pass out ... modulate state" means to allow all outgoing TCP
> connections, and to use a cryptographically strong improved random
> number for the sequence numbers.  Some TCP implementations use
> predictable sequence numbers, which allows TCP sessions to be
> hijacked.
> 
> Anyway, I agree with Jake and with the author of the Portsentry
> article.  Portsentry isn't worth much, and it's easily fooled into
> DOS'ing the machine it's running on.  Spoof a port scan from a useful
> host, and it'll blackhole the useful host.  Not helpful.
> 
> -- 
> Bob Miller                              K<bob>
> kbobsoft software consulting
> http://kbobsoft.com                     [EMAIL PROTECTED]
-- 
Christopher Maujean
IT Director, Premierelink Communications
[EMAIL PROTECTED]
http://www.premierelink.com/
541-344-8575x305

PGP:
---------------------------------------------------------------
http://www.keyserver.net/
      KeyID: EFAF4176
Fingerprint: 55E6 4DE1 D7D3 361E F265  C094 46F2 7B62 EFAF 4176
---------------------------------------------------------------

Reply via email to