>port 135 is rpc (remote procedure call) related. used extensively with >active directory and other useless parts of windows > >Try this in IP Chains >-A input -s 0/0 -d 0/0 135 -p tcp -j -y DENY > >this will drop all packets destined to or from a source port 135 >
Jaymes,
H-m-m-m. That's a great idea! Would something like:
DENY_HOSTWISE_TCP="0/0>135<0/0"
Also work? (See the main options part of the script.)
Thanks,
Ben
