Originally posted by: oldman420
so its like a battleship floating through a bunch of inflatable boats armed with paintball guns.
that works for me sir thanks
Originally posted by: Corey0808
Are you familiar with IPTables? If so and it's installed on your machine (and if your machine is not a gateway to other machines try this:
EXTIF = eth0 # Interface reaching the internet
IPT=/usr/bin/iptables # Location of the executable
$IPT -A INPUT -i $EXTIF --dport auth -m state --state new -j DROP
If your machine is a gateway add the following line
$IPT -A FORWARD -i $EXTIF --dport auth -m state --state new -j DROP
Hope this helps. Post if you have any questions.
::EDIT:: I also wanted to add my two cents to this. n0cmonkey says that stealth doesn't mean anything useful and dont' worry about it. I disagree here. If you have your computer configured to not respond to ping, yet they run a port scan and this shows up as closed and not stealthed the attacker now knows that there is a machine there. Yet, if it is stealthed there is a better chance an attacker won't realize there is a machine at that location. I hope I've helped.
If there is absolutely no response they also know a machine there.
Originally posted by: Corey0808
If there is absolutely no response they also know a machine there.
Could you elaborate on this a little please? I'm interested.
Originally posted by: n0cmonkey
Originally posted by: Corey0808
If there is absolutely no response they also know a machine there.
Could you elaborate on this a little please? I'm interested.
The lack of ICMP host/network unreachables gives you away.
Originally posted by: oldman420
ok so how do I stop my machine from responding tp ping?
that does worry me.
So basically security by obscurity? Even if an attacker couldn't tell the difference between stealthed ports and no machine, stealthing does no good. Assuming 113 is closed, there are two possible outcomes of a portscan: 1) every port is closed (or stealthed) or 2) some other port is open.Originally posted by: Corey0808
::EDIT:: I also wanted to add my two cents to this. n0cmonkey says that stealth doesn't mean anything useful and dont' worry about it. I disagree here. If you have your computer configured to not respond to ping, yet they run a port scan and this shows up as closed and not stealthed the attacker now knows that there is a machine there. Yet, if it is stealthed there is a better chance an attacker won't realize there is a machine at that location. I hope I've helped.
Originally posted by: kamper
So basically security by obscurity?
Originally posted by: oldman420
sad to say but I got used to being stealthed by zone alarm.
I am sure that it is better to be invisible vs closed and visable.
I will try the tricks listed here as I am getting a better grip on linux as the days go by.
Why, because it makes you feel better for having spent more time configuring them? It doesn't offer you any security.Originally posted by: Corey0808
Originally posted by: kamper
So basically security by obscurity?
That's the name of the game. Those network configurations are typical of firewalls out in the real world.
Care to point out exactly where he said that?I didn't come up with this stuff. It's just common practice, as nweaver said.
Originally posted by: Corey0808
Originally posted by: n0cmonkey
Originally posted by: Corey0808
If there is absolutely no response they also know a machine there.
Could you elaborate on this a little please? I'm interested.
The lack of ICMP host/network unreachables gives you away.
I indeed fund that file and here it is
# Disable response to broadcasts.
# You don't want yourself becoming a Smurf amplifier.
net.ipv4.icmp_echo_ignore_broadcasts = 1
# enable route verification on all interfaces
net.ipv4.conf.all.rp_filter = 1
# enable ipV6 forwarding
#net.ipv6.conf.all.forwarding = 1
what is a smurf amplifier?
That's what I figured. Thanks.
oldman420 ---
There is a couple ways you could go about making your machine not respond to a ping. I'm not that familiar with Suse 10 so I'm just shooting from the hip here. Try looking for a file called /etc/sysctl.conf. In that file there is a line that looks like the following:
net.ipv4.icmp_echo_ignore_broadcasts = 1
Make sure it is uncommented and set to 1. Making changes to this file will be saved upon reboot so it's the optimum place to make the change. There are also some other variables in that file that should be changed to. They are:
net.ipv4.conf.all.rp_filter = 1
net.ipv4.conf.default.rp_filter = 1
net.ipv4.tcp_syncookies = 1
net.ipv4.conf.all.accept_source_route = 0
net.ipv4.conf.default.accept_source_route = 0
I hope this helps!
::EDIT:: Just a quick note. Sysctl support has to be enabled in the kernel for this file to exist.
I went to grc.com and did a port scan and failed the stealth test.
There is a couple ways you could go about making your machine not respond to a ping. I'm not that familiar with Suse 10 so I'm just shooting from the hip here. Try looking for a file called /etc/sysctl.conf. In that file there is a line that looks like the following:
net.ipv4.icmp_echo_ignore_broadcasts = 1
sad to say but I got used to being stealthed by zone alarm.
I am sure that it is better to be invisible vs closed and visable.