Re: an anternative to port-knoking using the OpenBSD pf only

From: gimeshell@web.de
Date: Fri Feb 17 2006 - 03:52:03 EST


On Mon, 23 Jan 2006 22:44:52 +0100
poplix <poplix@papuasia.org> wrote:
>
> OUT (tcp.flags='syn')
> set(
> tcp.win='8192',ip.ttl='128',ip.flags.df='0',
> tcp.options='mss=3884+noop+wss=0+noop+noop+ts=TS'
> );
>
> This rule tells tripp to rewrite all outgoing tcp packets with
> the SYN
> flag set only allowing my first handshake packet to match "poplix"
> fingerprint.

Does an attacker who wants to attack a server include aspect that
this maybe a system utilizing port knocking in this way?
Perhaps if he has focused at this system?

Am i right to say, your invented os fingerprint is random and unique
and because of unlimited IP option field's length there's no
chance left for attacker to brute force ports with different option
field values et cetera to get correct option field + window size + ttl +
flag?

regards

------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner:

Hackers are concentrating their efforts on attacking applications on your
website. Up to 75% of cyber attacks are launched on shopping carts, forms,
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are
futile against web application hacking. Check your website for vulnerabilities
to SQL injection, Cross site scripting and other web attacks before hackers do!
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:32 EDT