[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20150706.193456.1294570536559039749.davem@davemloft.net>
Date: Mon, 06 Jul 2015 19:34:56 -0700 (PDT)
From: David Miller <davem@...emloft.net>
To: matteo@...nwrt.org
Cc: Valdis.Kletnieks@...edu, nicolas.dichtel@...nd.com,
netdev@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH v2] add stealth mode
From: Matteo Croce <matteo@...nwrt.org>
Date: Mon, 6 Jul 2015 21:44:06 +0200
> 2015-07-06 12:49 GMT+02:00 <Valdis.Kletnieks@...edu>:
>> On Thu, 02 Jul 2015 10:56:01 +0200, Matteo Croce said:
>>> Add option to disable any reply not related to a listening socket,
>>> like RST/ACK for TCP and ICMP Port-Unreachable for UDP.
>>> Also disables ICMP replies to echo request and timestamp.
>>> The stealth mode can be enabled selectively for a single interface.
>>
>> A few notes.....
>>
>> 1) Do you have an actual use case where an iptables '-j DROP' isn't usable?
>
> If you mean using a default DROP policy and allowing only the traffic
> do you want,
> then the use case is where the port can change at runtime and you may not want
> to update the firewall every time
Dynamically updated firewalls are "a thing" and quite effective for
solving problems like this one.
With nftables such updates are even extremely efficient.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists