James wrote:
>> Daniel Iliev <danny <at> ilievnet.com> writes:
>>     
>
>
> My iptables based firewall seem to be working, However, I keep getting 
> triplets
> of this activity:
>
> curious.ip www.me.com tcp     2286 > netbios-ssn Seq=0 Len=0 MSS=1460
> www.me.com curious.ip tcp     netbios-ssn > 2286 [RST, ACK] Seq=0 Ack=1 
>  Win=0 Len=0
>
> similar problem (2469 > microsoft-ds)
>  Other problems are (info section is only difference) epmap > 3081
>
>
>
>   
>> "iptables -A INPUT -p tcp --dport microsoft-ds -j DROP" ( < the packets
>> have destination the FW itself)
>> "iptables -A FORWARD -d *target-PC* -p tcp --dport microsoft-ds -j DROP"
>> ( < the packets have destination the "target-PC". )
>>     
>
>
> Your advice is working, beautiful
>
> Much Thanks!
>
>
> James
>
>
>
>   
I'm not sure if get this message right, but if it is a question how to
deal with packets like these:

>curious.ip www.me.com tcp     2286 > netbios-ssn Seq=0 Len=0 MSS=1460
>www.me.com curious.ip tcp     netbios-ssn > 2286 [RST, ACK] Seq=0 Ack=1 

the answer is: Add the same rules, but replace "microsoft-ds" with 
"netbios-ssn" or the corresponding number from /etc/services. Those rules would 
look like:
"iptables -A INPUT -p tcp --dport netbios-ssn -j DROP"
 it's the same as:
"iptables -A INPUT -p tcp --dport 139 -j DROP"

And if the target is not the FW:
iptables -A FORWARD -d *target-PC* -p tcp --dport netbios-ssn -j DROP
or
iptables -A FORWARD -d *target-PC* -p tcp --dport 139 -j DROP


It seems that you want to stop the ms netbios activity. The ports used
for this service are 137,138,139 and 445 so the rule-set could be
something like this:

iptables -A FORWARD -d *target-PC* -p tcp --dport 445 -j DROP
iptables -A FORWARD -d *target-PC* -p tcp --dport 137:139 -j DROP

or 

iptables -A INPUT -p tcp --dport 445 -j DROP
iptables -A INPUT -p tcp --dport 137:139 -j DROP




-- 
Best regards,
Daniel


-- 
gentoo-user@gentoo.org mailing list

Reply via email to