Joe a écrit : > > Something else you might do now is to place temporary logging rules > before your 'DROP' rules, to confirm whether it is indeed iptables > which is blocking those packets.
Or just run tcpdump while the port scan is running. > No logs, it's somebody or something > else. And if you have anything other than just a bare modem between you > and the outside world, which is not really best practice, then the first > place to look is the Net router. > > And as someone else asked, why are you worried about this 'stealth'? As > long as the bad packets don't get in, what does it matter? He may have believed the claim by GRC et al. that "not stealth=at risk". But that's just some kind of security by obscurity, isn't it ? -- To UNSUBSCRIBE, email to [email protected] with a subject of "unsubscribe". Trouble? Contact [email protected] Archive: https://lists.debian.org/[email protected]

