On Sunday 22 July 2001 16:24, you wrote:
> Ok Loossee. Splain it to me. The part I don't get is: How does portsentry
> see any packets at all if my basic policy is DENY? I.e., the firewall (in
> this case done with ipchains via pmfirewall) soaks up all packets and
> silently discards them. So how does portsentry ever get to think that
> *anything* is ever trying to probe me?

My portsentry doesn't ever pick up anything for the same reason that you are 
describing - the packet filter (iptables) drops the packets upon receipt. 
However, if your firewall does let anything through, and portsentry can pick 
those packets up, then you will know about it. As someone on the list pointed 
out not that long ago, defense in depth is a good thing - if your firewall 
somehow lets things through, then you've got portsentry. Then run an IDS like 
snort to examine packet payload for people trying things like buffer 
overflows. If these three things let something through, then you should still 
have disabled everything you don't need. What you do run should (if feasible) 
be using TCP wrappers and other forms of access control. That's four or five 
different security strategies incoming packets have to beat in order to do 
damage - much more secure than one or two or three strategies, because you 
can't be burned by just one configuration error or a cracker being clever 
only once.

Jeff



_______________________________________________
Seawolf-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/seawolf-list

Reply via email to