>From today's edition of BugTraq. I am forwarding this post as some of us
are still using kernel 2.0.x series, and this may interest them.

--Indra.

----------
From: Salvatore Sanfilippo -antirez- <[EMAIL PROTECTED]>
To: 
Subject: to prevert port scanning in linux 2.0.x
Date: Saturday, July 17, 1999 4:18 PM

Hi,

        It seems that some bugtraq readers still runs linux 2.0.3[67].
        In order to prevent SYN, FIN, Xmas, NULL tcp scan and
        maybe connect() scan (for exaple it's true with nmap,
        false with strobe) it's possible to apply this kernel patch.

        This stupid patch change the sequence
                SYN ---> closed port
                <--- RST
        to
                SYN ---> closed port
                <--- SYN|ACK
                ACK --->
                <--- RST

        and answers RST to FIN, Xmas and NULL tcp flags even
        if the port is open, like win*.

        If an attacker scans a patched host it gets all
        ports are open, so it gets nothing.

        The patch is tested on linux 2.0.36, maybe it's
        good even for 2.0.37.

bye,
antirez

--
Salvatore Sanfilippo - antirez -                  [EMAIL PROTECTED]
try hping: http://www.kyuzz.org/antirez           [EMAIL PROTECTED]

antiscan-patch

Reply via email to