[wplug] howto advertise all ports as open
Bill
bhalpin at collaborativefusion.com
Thu Apr 3 16:19:31 EST 2003
Nick
I'm curious, how were you intending Alex use portsentry for
"advertising" open ports?
I never noticed anything in portsentry that would do that...
On Thu, 2003-04-03 at 15:59, Nick Iglehart wrote:
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Look into portsentry.
>
> Nick
>
> > -----Original Message-----
> > From: wplug-admin at wplug.org [mailto:wplug-admin at wplug.org] On
> > Behalf Of Alexandros Papadopoulos
> > Sent: Saturday, March 29, 2003 5:21 PM
> > To: Eric C. Cooper
> > Cc: wplug at wplug.org
> > Subject: Re: [wplug] howto advertise all ports as open
> >
> >
> > -----BEGIN PGP SIGNED MESSAGE-----
> > Hash: SHA1
> >
> > On Saturday 29 March 2003 16:21, Eric C. Cooper wrote:
> > > On Sat, Mar 29, 2003 at 04:02:36PM -0500, Alexandros Papadopoulos
> > > :
> > > > I've come across the idea of having a machine overwhelm
> > an attacker
> > > > by presenting *all* ports as listening/open.
> > >
> > > This is known as a honeypot.
> >
> > Honeypots are more elaborate than that, actually providing
> > the break-in
> > illusion, virtual hosts and services, forged header replies,
> > etc. This
> > is overkill for my purposes.
> >
> > >
> > > > Does anyone know of such a module?
> > >
> > > A quick google turned up honeyd
> > > (http://www.citi.umich.edu/u/provos/honeyd/) and Tiny Honeypot
> > > (http://www.alpinista.org/thp/), for starters.
> >
> > thp looks closer to what I was looking for (since it runs on a
> > single host/IP without the need to emulate virtual hosts), but
> > again, it gets
> > too complex. It needs to talk to xinetd (which I don't even want to
> > run), uses perl scripts to serve up bogus information, uses local
> > netfilter redirects, assumes that an IDS is running on the
> > machine... a
> > client box doesn't need all that.
> >
> > What I'm after is something that has the same effect as
> >
> > for $port in `cat /etc/services` do
> > if [ $port < 1024 ]; do
> > nc -l -p $port > /dev/null
> > else
> > # do nothing
> > fi
> > done
> >
> > (yeah, this is not legit bash syntax but you get the idea :-)
> >
> > ...and an accompanying ipfilter script in the fashion of:
> >
> > ## Drop all replies by default
> > /sbin/iptables -P OUTPUT DROP
> >
> > ## Now allow for legitimate traffic of my machine
> > ## Allow outgoing ssh
> > /sbin/iptables -A OUTPUT -p tcp --sport 1024: --dport 22 -j
> > ACCEPT ## Allow outgoing HTTP /sbin/iptables -A OUTPUT -p tcp
> > --sport 1024: --dport 80 -j ACCEPT ## Allow outgoing HTTPS
> > /sbin/iptables -A OUTPUT -p tcp --sport 1024: --dport 443 -j
> > ACCEPT ## Allow outgoing POP3 /sbin/iptables -A OUTPUT -p tcp
> > --sport 1024: --dport 110 -j ACCEPT
> >
> > ## etc...
> >
> > Something as simple as that might work, assuming that our
> > netcats would
> > all bind to <1024 ports (as any self-respecting vulnerable service
> > does, anyhow :-)
> >
> > Now, this raises concerns with SYN floods (I don't know to
> > what extent I
> > can trust SYNcookies), and is generally a very ugly way of
> > solving the
> > issue.
> >
> > Cheers
> >
> > - -A
> > - --
> > http://andrew.cmu.edu/~apapadop/pub_key.asc
> > 3DAD 8435 DB52 F17B 640F D78C 8260 0CC1 0B75 8265
> > -----BEGIN PGP SIGNATURE-----
> > Version: GnuPG v1.2.1 (GNU/Linux)
> >
> > iD8DBQE+hhxMgmAMwQt1gmURAuLaAJ9lEZGgBMw4xtbsh+kvMdFog9CibwCfQdi6
> > BttvG1IDnDTU8ofdHZrZIQk=
> > =5CBO
> > -----END PGP SIGNATURE-----
> >
> > _______________________________________________
> > wplug mailing list
> > wplug at wplug.org
> > http://www.wplug.org/mailman/listinfo/wplug
> >
> > ---
> > Incoming mail is certified Virus Free.
> > Checked by AVG anti-virus system (http://www.grisoft.com).
> > Version: 6.0.463 / Virus Database: 262 - Release Date: 3/17/2003
> >
> >
>
> -----BEGIN PGP SIGNATURE-----
> Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com>
>
> iQA/AwUBPoygpKq/UK5/FuEgEQKHNACeNyM7yOBDK7J7sPzpTUDzn1brGeEAoLF8
> oBcgON08wvffqBNzGcCdLLpH
> =pteN
> -----END PGP SIGNATURE-----
>
> ---
> Outgoing mail is certified Virus Free.
> Checked by AVG anti-virus system (http://www.grisoft.com).
> Version: 6.0.463 / Virus Database: 262 - Release Date: 3/17/2003
>
> _______________________________________________
> wplug mailing list
> wplug at wplug.org
> http://www.wplug.org/mailman/listinfo/wplug
More information about the wplug
mailing list