Hi everyone,

I‘m running OpenBSD 6.5 (release) on a server with a public IP but very 
limiting pf rules. I ran a nmap -sn on the corresponding address from another 
host to verify that it isn‘t detectable with a simple ICMP scan (please don‘t 
start a discussion how important this is - I do not say this is a real security 
benefit, I just like it on top of other security considerations). 

However, nmap unexpectedly returned ‚Host is up‘. Debugging output shows that 
the server responded with a TCP RA flag. This stumped me, because IMHO ‚block 
all‘ (which I really tested in the end as single rule with a seperate 
pf.config) results in ‚block drop all‘ by default, confirmed via pfctl -s rules.

Can someone point out me what I misunderstood here? My assumption was pf would 
really silently drop, including the absence of a TCP response. 

Thanks,
Dominique

Reply via email to