lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 06 Jul 2015 19:34:56 -0700 (PDT) From: David Miller <davem@...emloft.net> To: matteo@...nwrt.org Cc: Valdis.Kletnieks@...edu, nicolas.dichtel@...nd.com, netdev@...r.kernel.org, linux-kernel@...r.kernel.org Subject: Re: [PATCH v2] add stealth mode From: Matteo Croce <matteo@...nwrt.org> Date: Mon, 6 Jul 2015 21:44:06 +0200 > 2015-07-06 12:49 GMT+02:00 <Valdis.Kletnieks@...edu>: >> On Thu, 02 Jul 2015 10:56:01 +0200, Matteo Croce said: >>> Add option to disable any reply not related to a listening socket, >>> like RST/ACK for TCP and ICMP Port-Unreachable for UDP. >>> Also disables ICMP replies to echo request and timestamp. >>> The stealth mode can be enabled selectively for a single interface. >> >> A few notes..... >> >> 1) Do you have an actual use case where an iptables '-j DROP' isn't usable? > > If you mean using a default DROP policy and allowing only the traffic > do you want, > then the use case is where the port can change at runtime and you may not want > to update the firewall every time Dynamically updated firewalls are "a thing" and quite effective for solving problems like this one. With nftables such updates are even extremely efficient. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists