Security through obscurity isn't security. Even this approach is popular on some places.

I don't thing there isn't valid *security* reason to fully block ICMP echo requests on NCC firewalls. This just makes diagnostics of network/connectivity incidents harder (and more unfriendly). In the fact, requests are processed and ICMP responses are sent by firewalls anyway (admin prohibited / packet filtered).

- Daniel

On 5/5/21 12:52 PM, Kurt Kayser wrote:
Gert,

you surely know that every enabled protocol/port is a potential threat.

.kurt


Am 05.05.21 um 12:32 schrieb Gert Doering:
Hi,

On Wed, May 05, 2021 at 12:30:01PM +0200, Kurt Kayser wrote:
I understand your point. But there is really no big effort to check if
Port 873 is working:

<host>nc -zvw100 rpki.ripe.net 873
Connection to rpki.ripe.net 873 port [tcp/rsync] succeeded!

Let's make a security comparison, if this is really a necessary feature?
So where exactly is the *security* drawback of permitting ICMP echo?

But yes, of course, we can all do tcpping instead - which is much
more likely to have an adverse effect on the actual service...

Gert Doering
         -- NetMaster


Reply via email to