On Wed, Jul 30, 2014 at 08:18:51AM +0100, Joe wrote:
<snip>
> Something else you might do now is to place temporary logging rules
> before your 'DROP' rules, to confirm whether it is indeed iptables
> which is blocking those packets. No logs, it's somebody or something
> else. And if you have anything other than just a bare modem between you
> and the outside world, which is not really best practice, then the first
> place to look is the Net router.

The temporary logging rules is a good idea, I'll do that.

> And as someone else asked, why are you worried about this 'stealth'? As
> long as the bad packets don't get in, what does it matter?

Why is there a DROP instruction in iptables as well as REJECT?

If a hacker gets no response he's less likely to dig further.

Thanks for your thoughts.
Mike
--
Who knows what evil lurks in the hearts of men?


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140730153335.GE14982@playground

Reply via email to