You could try using nmap with the -sA (ACK) scanning...this is good
for mapping firewall rulesets to see what is being let in. You could
also use -f (fragment) with -sS to send fragmented packets...this will
show open ports unless most of the time too. But -sA is better since
the firewall things its a legitimate request and not a port scan


On Mon, 14 Mar 2005 11:52:54 -0500, daniel quinn
<[EMAIL PROTECTED]> wrote:
> i've been experimenting with ipfw since moving some of my machines from linux
> to freebsd and i've run across an oddity wrt nmap and freebsd firewalls.  it
> doesn't seem to work and the activity isn't logged either.
> 
> the firewall is working though.  ssh goes through, while other ports are being
> blocked (and logged).  i've confirmed this with telnet.  but nmap still comes
> up empty.  i'd like to be able to do a proper portscan, but is this a feature
> with ipfw or a lack of feature in nmap?
> 
> for the purposes of this test, i've used a variation on the firewall supplied
> in the freebsd handbook:
> 
>  www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/firewalls-ipfw.html
> 
> --
> ...he who in dealing with the empire loves his subjects as one should love
> one's body is the best person to whom one can commit the empire.
>  - lau tzu, "tao te ching: chapter xiii"
> _______________________________________________
> freebsd-questions@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to "[EMAIL PROTECTED]"
> 


-- 
You've officially been Gmailed
_______________________________________________
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to