In message <[EMAIL PROTECTED]>, Paul Vixie writes:
>
>[EMAIL PROTECTED] ("Steven M. Bellovin") writes:
>
>> It might also be port 113 -- some sites try to query your tcp port 113, 
>> and wait for a timeout if the port is firewalled.  A better solution 
>> than blocking it is to send an immediate RST.
>
>people who depend on tcp/113 deserve everything stupid that happens to them.
>dropping SYN packets or returning a fixed string are both better than sending
>an immediate RST.  (false confidence being valued less than low confidence.)
>i was rather shocked to discover tcp/113 clientness enabled by default in
>postfix and sendmail.  but even widespread ignorance does not call for
>widespread coddling such as returning immediate RST's.

I'm not defending the practice, I'm defending myself against the 
practitioners.  My email, etc., was being delayed because the site I 
was sending to was trying to query my non-existent tcp/113 server, and 
I was dropping SYNs.  Now, I either send an immediate RST or use Erik 
Fair's identd, depending on my mood.

                --Steve Bellovin, http://www.research.att.com/~smb (me)
                http://www.wilyhacker.com (2nd edition of "Firewalls" book)


Reply via email to