Sounds like something I can adapt into my *ipchains* rules.
But why use "!--syn -m state --state"? Anybody can explain?
Thank you,
Azman Salleh
----- Original Message -----
From: "Πλαστήρας Αθανάσιος"
Good Mornning...
To Drop Stealth Scan like nmap you can use the following rules in a simple firewall with iptables:
iptables -A INPUT -p tcp ! --syn -m state --state NEW -j LOG --log-prefix "Stealth scan" iptables -A INPUT -p tcp ! --syn -m state --state NEW -j DROP
Thanos...
Athanasios Plastiras Greece Athens
-- Check the headers for your unsubscription address For additional commands, e-mail: suse-security-help@suse.com Security-related bug reports go to security@suse.de, not here