From 4b6c0e31385f5f27a151088c0a2b614495c4e589 Mon Sep 17 00:00:00 2001 From: Paul Duncan Date: Thu, 14 Oct 2021 12:47:50 -0400 Subject: initial commit, including theme --- .../posts/2004-01-12-tarpitting-in-iptables.html | 33 ++++++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 content/posts/2004-01-12-tarpitting-in-iptables.html (limited to 'content/posts/2004-01-12-tarpitting-in-iptables.html') diff --git a/content/posts/2004-01-12-tarpitting-in-iptables.html b/content/posts/2004-01-12-tarpitting-in-iptables.html new file mode 100644 index 0000000..5210868 --- /dev/null +++ b/content/posts/2004-01-12-tarpitting-in-iptables.html @@ -0,0 +1,33 @@ +--- +date: "2004-01-12T00:10:53Z" +title: tarpitting in iptables +--- + +

+The incredible lurking +Pablo strikes again! I saw this bit on IRC an hour ago: +

+ +
+23:09 <ljlane> wow, read some really evil tarpitting stuff
+23:10 <radsaq> really?
+23:11 <ljlane> yeah, http://www.securityfocus.com/infocus/1723
+23:11 <ljlane> tarpit just before your drop rule. tarpit all ports, tarpit 
+               unused nets, etc
+
+ +

+Interesting stuff. That said, I still prefer Stephen's (Snow-Man) more draconian +approach; hitting an invalid port tosses you in an ipt_recent +list, which drops all of your traffic for a few minutes. The +tarpitting approach, while effective at slowing down and confusing a +probe, still leaves you vulnerable. The ipt_recent +approach kills automated port scans almost completely, without using as +many resources on the firewall. +

+ -- cgit v1.2.3