Hi,

On 27.04.2015 16:40, Thibaut Pouzet wrote:
Hello Lukas,

I'm not sure disabling conntrack on the firewall is a good solution to
this problem... Or a good idea either.

It is , it´s the only solution to be able to scan in a useful time frame.
First you need to understand how TCP/IP works and how your network landscape looks like, then you will see ;-)

  Surely this is a solution that
works, but if I was willing to disable it, I would not have seeked help
here in the first place.

You have to understand how connection tracking is working, and why this will not provide you any benefit here. For every TCP-SYN your netfilter is allocating a connection, if you scan one host with all TCP you will allocate 65535 places in the table. If you next firewall is dropping that packet, you need to wait until the timout is cleaning the table.

That is why you need to understand how this is working. If you scann without filling up the table, you might miss many vulnerabilities.


We managed today to tune nmap through a scan-config to be less
aggressive, but this is only nmap, and another tool might still be too
aggressive. I was looking for a more global configuration, something
like the "low impact" scanning profile you can see in Qualys for instance.
Sure you can limit the amount of sessions, but this will limit the amount of results as well.
Let me have my cake and eat it, too will not work in this scenario.


Cheers,



--
Regards
    Lukas Grunwald
_______________________________________________
Openvas-discuss mailing list
[email protected]
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss

Reply via email to