hmfic,
Virtually all firewalls and routers allow you to specify the action taken on a WAN-side ping.
That said, I've also never seen one that didn't default to either 'ignore' or 'discard'.
Allan
hmfic,
Virtually all firewalls and routers allow you to specify the action taken on a WAN-side ping.
That said, I've also never seen one that didn't default to either 'ignore' or 'discard'.
Allan
Ernie,
Just haven't posted it, and wont. ;_)
Allan
Good. I haven't bothered to look it up. ;-)
If it is told to reject pings, a router or firewall is doing a it's 'job' when it rejects a ping. If it isn't told to do that then they are not doing a good job. No one says you can't accept pings. Are you afraid of getting pinged? Are you afraid you might get hacked by a ping?
Why would I care to do that? I don't give a shit if you accept pings or not.
You told the OP that, if they accepted pings, they didn't use a router or a firewall. Completely incorrect statement. Just because everyone may not set up their stuff to your standard doesn't make it wrong.
I know that.
Ernie said:
I was merely saying that Ernie's claim was wrong or, at least, not completely correct.
Isn't that essentially what I said?
Nope to both. I prefer to be invisible to the Internet though.
For educational purposes?
Okay, a router may default to accept pings and such. Mine does, I changed the setting during setup. I believe that most firewalls default to blocking pings. Ergo, Tamara probably isn't using a router or firewall.
There's no "right" or "wrong" to it. I prefer a fairly "tight" Internet connection, other people may not.
Not really. You said if they didn't block pings, that was wrong.
You think blocking pings does that?
I already know what it looks like when pings are blocked ;-)
An assumption. I have a router and I allow it to accept pings. Mind you, one has to take some other steps if you do that.
Point taken. I didn't mean to sound harsh.
See below about "right" and "wrong".
It helps.
Based on what Sam Spade tells me.
Yep, steps that I prefer not to mess with.
No problem.
Ernie B. hath wroth:
It's not working today for some reason. It's certainly doing a port scan on my router as indicated by my monitoring software. However, the final report is essentially blank, as you discovered. My router has so many open ports that it should have found at least one.
Here's some recommended and not so recommended security checkers:
I still prefer NMAP.
RDNS shows she's in San Jose CA and connected to PBI/SBC/at&t DSL via the SBC router in Pleasanton.
Good site. Bookmarked for further study, thanks.
She's hopefully reading this thread and learning things. I know I've added to my knowledge.
Surely that's down to local policy (and the consequent implementation)? I prefer my firewall to respond to ping, so it does.
Chris
My router (and I hadn't noticed until someone else posted the problem here) misunderstands the setting for anti-smurf and blocks hosts with addresses ending in .0. I think it was a yahoo or hotmail site that was the example given, but I found a few. At the time, I thought SMURF attacks were either considered ineffective, or just not used any more.
I allow ping responses. I have one server on my network returning the ping instead of the router, because returning ping from the router confuses some people when that server is down, since "it" appears to be responding to ping.
I see that Jeff goes out of his way to obfuscate his identity ;-)
Hard to say. Who are you? If you are not Tamara, don't have a hotmail address, and don't live in San Jose, CA, then you might have done a pretty good job.
snipped-for-privacy@63.usenet.us.com hath wroth:
I guess SMURF is still being used for DoS (denial of service) attacks. However, most new routers default to not allowing redirected ICMP packets, so it's probably ineffective.
I've had far too many arguements on whether IP's ending in .0 are valid. Methinks they're NOT valid. For example, Windoze instantly returns: C:\\>ping 192.168.1.0 Pinging 192.168.1.0 with 32 bytes of data: Destination specified is invalid. Destination specified is invalid. Destination specified is invalid. Destination specified is invalid.
My Unix box returns pings and dupes from most every device it sees in the ARP table. => ping 192.168.111.0 PING 192.168.111.0 (192.168.111.0): 56 data bytes 64 bytes from comix (192.168.111.1): icmp_seq=0 ttl=255 time=10 ms 64 bytes from router (192.168.111.33): icmp_seq=0 ttl=64 time=120 ms (DUP!)
Such weird results would imply that ending in .0 is NOT a valid IP address. That doesn't seem to stop some systems from using it. I've notice that I can never really ping such server directly. It usually shows up in a traceroute list, where I think it was intended to screw up any attempts to probe the inside LAN or routeing. Dunno.
Good idea. I usually just care if the router is accessible.
It's called hiding in plain sight.
Here's an example on 192.168.0.0/24:
# ping 192.168.0.0 Do you want to ping broadcast? Then -b
"Alan Spicer" hath wroth:
Sorta. The source IP is forged so that the ICMP ping return goes to the forged IP address instead of the originator.
The Cisco IOS fixes for Smurf attacks are: no ip directed-broadcast no ip redirects no ip unreachables no ip proxy-arp (not sure about this one) Actually, only the "no ip directed-broadcast" has any effect on Smurf attacks, but the other prevent attacks using similar redirection mechanisms (e.g. fraggle).
Hmmm... I've never tried .0 on a /23 network, but will do so at next opportunity. I don't see how a /23 network makes any difference. The active part of the address is all zero's in both /23 and /24.
Interesting. I didn't know that.
I know of 4 local ISP's that don't use .0 IP's as this is the network IP address. .255 is the broadcast IP address. Locally, Comcast/at&t uses /23 networks. I've never seen a .0 address on their networks, but I wasn't looking for it. I'll check on what they're doing later.
No -b option on vintage SCO Unix 3.2v4.2 or under Cygwin. It's there under Linux.
Well, the majority of the cheap home routers preferred by alt.internet.wireless users are limited to /24 networks mostly thanks to limited ARP table memory space. The routers just can't handle larger networks. I think it fair to say that .0 is not a valid IP for such small routers. (Yeah, I know that assumptions are the mother of all screwups).
Subnet Mask Subnet Size Host Range Broadcast
192.168.0.0 255.255.254.0 510 192.168.0.1 to 192.168.1.254 192.168.1.255The all zeroes or network is on 192.168.0.0, the all ones or broadcast is on
192.168.1.255Inbetween lies 192.168.1.0, which in this context (a /23) isn't being looked at like a network address for the old class C (or now /24), but as a single IP Address. And it's quite valid to do this with even an RFC 1918 chunk... on someones "private" network. Although I doubt, as you do, that most on here or anywhere would do that. It's fun though ;-)
(This address is probably not "all ones" because actually you are using 9 bits for Host portion instead of just 8. The "1." or "1.0" has a 1 in it.
192 11000000168
101010001
000000010
0000000011000000.10101000.00000001.00000000 N---------------------------->H---------->)
"Alan Spicer" hath wroth:
I'm always right. Well... maybe usually right.
Looks like Smurf is alive and well:
Old exploits never die and just fade away.
Try the Smurf test probe. My DD-WRT SP3 v3 6/20/2007 box yielded: Your probe of 63.249.85.127/24 yielded the following results: Network: 63.249.85.0, Netmask: 255.255.255.0, Broadcast:
63.249.85.255, Responded: Yes (broadcast=1, network=1), Duplicates: 0 CONCLUSION: The network responded, but returned no dups. OK network.
It could flood the LAN if the ACL (access control list) did not block RFC1918 non-routeable IP's. If the packets source IP were to appear to be coming from the inside LAN, it would create a very effective DoS attack but for only trashing the inside LAN. There would be no return IP pointing to any outside IP's. Something like this, where the router bocks inbound traffic on IP's known to be on the inside LAN and are therefore subject to source IP spoofing: # access-list 101 deny ip host 0.0.0.0 any log # access-list 101 deny ip 10.0.0.0 0.255.255.255 any log # access-list 101 deny ip 172.16.0.0 0.15.255.255 any log # access-list 101 deny ip 192.168.0.0 0.0.255.255 any log # access-list 101 deny ip 127.0.0.0 0.255.255.255 any log # access-list 101 deny ip host 255.255.255.255 any log # access-list 101 deny ip 169.254.0.0 0.0.255.255 any log # access-list 101 deny ip 0.0.0.0 0.255.255.255 any log followed by a list of allows. I lifted this from the Cisco router FAQ on DSLReports.
Agreed. However, I'm not a router expert and am not sure it works this way. Incidentally, PC Flank router exploits test:
I can hang a few routers and firmware versions with some of these tests. Sorry, but no Smurf test:
Incidentally, a router that responds to broadcast address from outside ICMP redirects is called a "smurf amplifier". One packet in can yields 255 packets out per broadcast address.
OK, so far so good.
Looked at by what like a network address? When I apply a bit wise netmask to a address, everything that's a 1 in 255.255.254.0 gets converted to zeros. In this case, I have 23 binary zeros, followed by
9 valid bits. In the more common case of 255.255.255.0, I get 24 binary zeros, followed by 8 valid bits. However, in BOTH cases, all the bits are zero so there's no way for the PAD (packet assembler/dissembler) to distinguish between these two cases. I'm lost, but suspect I'm missing something obvious (or dumb) as I know that some systems are using .0 as a valid IP. I'll do some reading and playing with a netmask calculator, later.Also -b is not available in FreeBSD.
I usually use fping for MSDOS in order to get better timing resolution.
It uses -b for: -b : beep on every successful reply (- to beep on timeout) No options for broadcasts. Oh well.
At least it doesn't screw up like Windoze ping and Unix: C:\\>fping 192.168.111.0 Fast pinger version 2.16 (c) Wouter Dhondt
More than you ever needed (or wanted) to know about ping:
Many cheap wireless routers don't even have enough table space and scratch RAM to handle a minimal number of connections. For example, note the rather limited number of connections allowed by some bottom of the chart routers:
I confirmed some of the numbers with a home made simulator that will rapidly rotate through a list of MAC addresses, thus simulating multiple simultaneous connections.
Also, your answers to wireless questions are also quite good. I've been waiting for you to make a mistake, so I can pounce, but haven't found any yet.
"Alan Spicer" hath wroth:
No. I forgot to include the /32 and the tester defaulted to /24. With the proper /32 mask, I get: Your probe of 63.249.85.127/32 yielded the following results: Network: 63.249.85.127, Netmask: 255.255.255.255, Broadcast: 63.249.85.127, Responded: Yes (broadcast=1, network=1), Duplicates: 0 CONCLUSION: The network responded, but returned no dups. OK network. Sorry for the muddle.
Port scans and NMAP probes are so common these daze that unless it's being done continuously, nobody notices. I think I see about 3 of these per week, some lasting for hours.
It's as easy as learning to count binary on one finger.
I cross over all 4 pairs so that my crossover cable works with Gigabit ethernet. The only reason to leave two pairs straight through is if you're sharing the CAT5 with POTS lines. See 2nd chart at:
Free IP and netmask calculator.
I'm still lost|confused|bugged as to why .0 doesn't work with /24 but allegedly does with /23. If you remove the decimal points, and treat the IP address as a single 32 bit binary number, there's no obvious difference between /24 and /23 networks. /23 is just using more bits than /24. Otherwise, they're identical in form and function. The address is still ending in all zeros in both cases, just different lengths. I'm probably missing something basic or obvious here and need to hit the books and do some testing. Give me a few days.
Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.