Hi,
I ran good ole nmap against a container that has every port set to drop on my cluser, but it seems there is port 43 that rejects instead
if you look at the firewall default rules https://git.proxmox.com/?p=pve-fire...2161fca975cc93cd8ec2ce3a561161a4;hb=HEAD#l152
'PVEFW-Drop' => [
538 # same as shorewall 'Drop', which is equal to DROP,
539 # but REJECT/DROP some packages to reduce logging,
540 # and ACCEPT critical ICMP types
541 { action => 'PVEFW-reject', proto => 'tcp', dport => '43' }, # REJECT 'auth'
....
559 ],
560 'PVEFW-Reject' => [
561 # same as shorewall 'Reject', which is equal to Reject,
562 # but REJECT/DROP some packages to reduce logging,
563 # and ACCEPT critical ICMP types
564 { action => 'PVEFW-reject', proto => 'tcp', dport => '43' }, # REJECT 'auth'
It seems that even under PVEFW-Drop it Rejects port 43 and does not Drop. Is that intentional? What does it achieve?
I ran good ole nmap against a container that has every port set to drop on my cluser, but it seems there is port 43 that rejects instead
if you look at the firewall default rules https://git.proxmox.com/?p=pve-fire...2161fca975cc93cd8ec2ce3a561161a4;hb=HEAD#l152
'PVEFW-Drop' => [
538 # same as shorewall 'Drop', which is equal to DROP,
539 # but REJECT/DROP some packages to reduce logging,
540 # and ACCEPT critical ICMP types
541 { action => 'PVEFW-reject', proto => 'tcp', dport => '43' }, # REJECT 'auth'
....
559 ],
560 'PVEFW-Reject' => [
561 # same as shorewall 'Reject', which is equal to Reject,
562 # but REJECT/DROP some packages to reduce logging,
563 # and ACCEPT critical ICMP types
564 { action => 'PVEFW-reject', proto => 'tcp', dport => '43' }, # REJECT 'auth'
It seems that even under PVEFW-Drop it Rejects port 43 and does not Drop. Is that intentional? What does it achieve?