widyachacra wrote:
Dear List friends,

When i scan my own domain from an out side host using 'nmap' tool it shows following results. How do i block this kind of tracing using linux. Please help me.

You don't. There's no difference between a scanner connecting to a particular port to determine if something listening on it and a legitimate user connecting to that port in order to use that service. However, there are various ways to slow it down.

The "easiest" method is to just use -P DROP on your INPUT chain in iptables, which causes iptables to simply drop any incoming packets that aren't explicitly allowed, which means that the person on the other end has to wait for the TCP timeout for each packet sent instead of immediately getting a "there's nothing here" response.

Another way is with iptables's limit module. It allows you to only allow a certain number of new connection attempts (or any other kind of packet) from a certain host (or group of hosts) within a certain time period. This will have a similar effect to the previous method.

The only truly effective way (that I'm aware of) to prevent these port scans is to have no ports open to scan.

--
Andrew Gaffney                                 http://dev.gentoo.org/~agaffney/
Gentoo Linux Developer             Catalyst/Installer + x86 release coordinator
--
[email protected] mailing list

Reply via email to