1 |
Thats where the white list comes into play. |
2 |
On Thu, 2004-01-08 at 19:22, Alexander Schreiber wrote: |
3 |
> On Thu, Jan 08, 2004 at 06:57:28PM +0100, Daniel Privratsky wrote: |
4 |
> > Wrong. |
5 |
> > |
6 |
> > 1) If you don't receive "destination unreachable" packet, you know |
7 |
> > nothing about the target host yet. This is not perfect-network world. |
8 |
> > There can be other fw/router anywhere in the way, killing this type of |
9 |
> > icmp traffic. |
10 |
> > |
11 |
> > 2) It slows scans a lot. |
12 |
> |
13 |
> Only for people too stupid for doing port scans (a rare defect even |
14 |
> among script kiddies). |
15 |
> |
16 |
> > You can of course do scannig in parallel, but |
17 |
> > don't be surprised, when you find yourself killed with no mercy by IDS, |
18 |
> > after matching SYN threshold. 1000+ syns/sec form IP adress to monitored |
19 |
> > system is sure ban. |
20 |
> |
21 |
> Cool. Your IDS just banned the IPs of your customers mail-, web- and |
22 |
> proxy-servers. Spoofing IP adresses just to mess with such automatic |
23 |
> systems is easy. |
24 |
> |
25 |
> Regards, |
26 |
> Alex. |