summaryrefslogtreecommitdiffstats
path: root/share/man/man4/blackhole.4
diff options
context:
space:
mode:
authorcsgr <csgr@FreeBSD.org>1999-08-20 05:47:05 +0000
committercsgr <csgr@FreeBSD.org>1999-08-20 05:47:05 +0000
commit585c7788a3ee3e1b80f7dc32244ac53d38ce78df (patch)
tree4acbe9670f913e9c914f26121c9b06cabb1fb208 /share/man/man4/blackhole.4
parente6adc2c52ec8788c8eb3ad672e6ced99a9b58607 (diff)
downloadFreeBSD-src-585c7788a3ee3e1b80f7dc32244ac53d38ce78df.zip
FreeBSD-src-585c7788a3ee3e1b80f7dc32244ac53d38ce78df.tar.gz
Update blackhole(4)
Diffstat (limited to 'share/man/man4/blackhole.4')
-rw-r--r--share/man/man4/blackhole.413
1 files changed, 8 insertions, 5 deletions
diff --git a/share/man/man4/blackhole.4 b/share/man/man4/blackhole.4
index 91e2224..741603d 100644
--- a/share/man/man4/blackhole.4
+++ b/share/man/man4/blackhole.4
@@ -11,7 +11,7 @@
.\" documentation and/or other materials provided with the distribution.
.\"
.\"
-.\" $Id: lptcontrol.8,v 1.9 1999/05/28 02:09:46 ghelmer Exp $
+.\" $Id: blackhole.4,v 1.1 1999/08/17 13:46:38 csgr Exp $
.Dd August 17, 1999
.Dt BLACKHOLE 4
.Os FreeBSD
@@ -25,8 +25,8 @@ attempts.
.Nm \&sysctl net.inet.tcp.blackhole
.Nm \&sysctl net.inet.udp.blackhole
.Pp
-.Nm \&sysctl -w net.inet.tcp.blackhole=[1 | 0]
-.Nm \&sysctl -w net.inet.udp.blackhole=[1 | 0]
+.Nm \&sysctl -w net.inet.tcp.blackhole=[0 | 1 | 2]
+.Nm \&sysctl -w net.inet.udp.blackhole=[0 | 1]
.Sh DESCRIPTION
The
.Nm
@@ -38,8 +38,11 @@ Normal behaviour, when a TCP SYN segment is received on a port where
there is no socket accepting connections, is for the system to return
a RST segment, and drop the connection. The connecting system will
see this as a "Connection reset by peer". By turning the TCP black
-hole MIB on, the incoming SYN segment is merely dropped, and no
-RST is sent, making the system appear as a blackhole.
+hole MIB on to a numeric value of one, the incoming SYN segment
+is merely dropped, and no RST is sent, making the system appear
+as a blackhole. By setting the MIB value to two, any segment arriving
+on a closed port is dropped without returning a RST. This provides
+some degree of protection against stealth port scans.
.Pp
In the UDP instance, enabling blackhole behaviour turns off the sending
of an ICMP port unreachable message in response to a UDP datagram which
OpenPOWER on IntegriCloud