Chris Santerre wrote:

> Currently I block port 113 (ident) on the firewall. I block everything and
> pick and choose what to let in. Never got around to letting this in :)
> Anyway, I have about 6-7 in.identd processes running all the time from
> failed ident attempts.

Actually, this is probably because your in.identd is pidentd, which
automatically spawns a pool of child processes:

  543 ?        S      0:00 identd -e -o
  547 ?        S      0:00  \_ identd -e -o
  548 ?        S      0:00      \_ identd -e -o
  549 ?        S      0:00      \_ identd -e -o
  550 ?        S      0:00      \_ identd -e -o

> Nothing big really. System is working great. Logs get
> filled a little much with DENY messages. 

So don't log denied ident connections.

> So does evryone generally let these thru?

Yes. If I don't want to give out this information, I don't run identd.

If you block (DENY or REJECT) ident connections, the remote server
will often wait for the ident request to time out before processing
the client's request. If you allow the connection through, but don't
run identd, the server will receive a TCP RST and resume processing
the request.

A few servers (mostly IRC servers) insist upon a successful ident
lookup. If you want to use such servers, you have to allow the
connections and you have to process them. However, you don't have to
give out meaningful information. I normally have pidentd give out UIDs
rather than usernames; if someone reports a problem, the UID may help
me, but it's meaningless to anyone else.

> Any exploits?

Well, I'm still using the pidentd from the RedHat 6.2 CD; they haven't
felt the need to publish an update in that time (as opposed to 6
updates of OpenSSL and glibc, 5 for fetchmail, ...).

> is there a way to get rid of those in.identd processes if I leave it
> blocked?

Stop running it.

-- 
Glynn Clements <[EMAIL PROTECTED]>

Reply via email to