From: Martijn Lievaart <m@rtij.nl>
To: Asfand Yar Qazi <ayqazi@gmail.com>
Cc: netfilter@lists.netfilter.org
Subject: Re: Adaptive stealthing/unstealthing of port 113
Date: Sun, 23 Apr 2006 14:13:26 +0200 [thread overview]
Message-ID: <444B6F66.1020404@rtij.nl> (raw)
In-Reply-To: <79328ea80604230451w61a266f3w59da83ef8dce2540@mail.gmail.com>
Asfand Yar Qazi wrote:
>Hi,
>
>On Steve Gibson's site, I had a few interesting things to read about
>the ZoneAlarm firewall:
>
>(quote)
>Even after many years, the (free) ZoneAlarm personal firewall from
>Zone Labs is the only personal firewall to "adaptively" stealth port
>113. Unlike any other firewall or NAT router (any of which could also
>do the same) this allows port 113 to be stealthed to any passing
>Internet scanners or probes, but "unstealthed" for any valid IDENT
>connection attempts originating from remote servers with which the
>user's computer is attempting to connect. (Since this could easily be
>done by any personal firewall or even NAT routers, I am hopeful that
>this feature might yet appear in other products.)
>
>"Adaptive Stealthing" means that when a TCP SYN packet arrives to
>request a connection to your machine's port 113, ZoneAlarm checks, on
>the fly, to see whether your machine currently has any sort of
>"relationship" with the remote machine (such as a pending outgoing
>connection attempt). If so, the remote machine is considered to be
>"friendly" and its IDENT request packet is allowed to pass through
>ZoneAlarm's firewall. But if the IDENT originating machine is not
>known to ZoneAlarm as a "friendly" machine, the connection requesting
>packet is dropped and discarded, rendering port 113 stealth to all
>unknown port scanners. It's very slick.
>(end quote)
>
>I wanna do it on my ADSL firewall!
>
>How can I do this? I realise I could just write a custom module in C,
>but you guys probably know of a way to do it with the existing tools.
>
>
>
I use the recent module for this.
-A FORWARD -i ppp0 -p tcp -m tcp --dport 113 -j AUTHHACK
-A FORWARD -o ppp0 -p tcp -m tcp ! --dport 113 -j TCPOUT
-A AUTHHACK -j ULOG --ulog-prefix "Checking auth/recent : "
-A AUTHHACK -m recent --rcheck --seconds 100 --name tcpout --rsource -j
RJAUTH
-A RJ -p tcp -j REJECT --reject-with tcp-reset
-A RJ -j REJECT --reject-with icmp-port-unreachable
-A RJAUTH -j ULOG --ulog-prefix "Reject auth: "
-A RJAUTH -j RJ
-A TCPOUT -j ULOG --ulog-prefix "Add to tcpout: "
-A TCPOUT -m recent --set --name tcpout --rdest
Note that many (ftp) servers with multiple ip addresses (common on
webservers that offer ftp for uploading content) send the ident request
from a different ip that the ftp session is going out to, so it does not
work as often as you would like.
(Also note that the RJ chain above is generic, we know in this case it
is tcp so we could have rejected directly with a tcp-reset).
M4
next prev parent reply other threads:[~2006-04-23 12:13 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2006-04-23 11:51 Adaptive stealthing/unstealthing of port 113 Asfand Yar Qazi
2006-04-23 12:13 ` Martijn Lievaart [this message]
2006-04-23 15:19 ` Chris Brenton
2006-04-23 18:11 ` Robby Workman
2006-04-24 0:54 ` Carl-Daniel Hailfinger
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=444B6F66.1020404@rtij.nl \
--to=m@rtij.nl \
--cc=ayqazi@gmail.com \
--cc=netfilter@lists.netfilter.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.