Joe a écrit : > > Something else you might do now is to place temporary logging rules > before your 'DROP' rules, to confirm whether it is indeed iptables > which is blocking those packets.
Or just run tcpdump while the port scan is running. > No logs, it's somebody or something > else. And if you have anything other than just a bare modem between you > and the outside world, which is not really best practice, then the first > place to look is the Net router. > > And as someone else asked, why are you worried about this 'stealth'? As > long as the bad packets don't get in, what does it matter? He may have believed the claim by GRC et al. that "not stealth=at risk". But that's just some kind of security by obscurity, isn't it ? -- To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/53d948af.4090...@plouf.fr.eu.org