Thanks for this Brian, On Thursday 09 May 2002 16:43, Brian W. Carver wrote:
Go to: https://grc.com/default.htm
and click on the link called "ShieldsUP!"
Then do both the "Test my shields!" and the "Probe my ports!" tests. (I know, I know, I'm not sure I want anyone "probing my ports" either, but...)
I went and did it and it gets right in to my Suse 7.2 gateway, though admits that all services which are penetrable are password protected. Still, I'd like to tell Suse 7.2's firewall to a) start and b) block all but SSH and close rather than stealth IDENT be " IDENT which reports it is "Closed". The author of the page explains in the FAQ:cause of your post: "Why isn't my Port 113 Stealthed? I'm using a firewall to stealth my entYou may recall, from my explanation of Stealthed ports, that attempting to connect to a stealthed port is both costly and painful for the contact initiator -- which is why it's so cool to stealth our machines. But the problem with simple stealthing of port 113 is that we don't want to hurt the servers we are trying to contact when they turn around and send us their IDENT query. If they get no response at all from their port 113 query, our connection to them (which initiated their query in the first place) will be delayed or perhaps completely abandoned. You may recall, from my explanation of Stealthed ports, that attempting to connect to a stealthed port is both costly and painful for the contact initiator -- which is why it's so cool to stealth our machines. But the problem with simple stealthing of port 113 is that we don't want to hurt the servers we are trying to contact when they turn around and send us their IDENT query. If they get no response at all from their port 113 query, our connection to them (which initiated their query in the first place) will be delayed or perhaps completely abandoned. Naturally, after getting through this lovely 8.0 firewall2 process, Id love to be able to apply this knowledge to my 7.2 machine. But I can't because the config files are ...... WHERE? Thanks in advance, Nick