./security/portsentry, Detects and respond to port scans against a target host in real-time

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: pkgsrc-2015Q2, Version: 1.2, Package name: portsentry-1.2, Maintainer: pkgsrc-users

PortSentry is designed to detect and respond to port scans against a
target host in real-time. Some of the more useful features include:

+ Runs on TCP and UDP sockets to detect port scans against your
system. PortSentry is configurable to run on multiple sockets at the
same time so you only need to start one copy to cover dozens of
tripwired services.
+ PortSentry will react to a port scan attempt by blocking the host in
real-time. This is done through configured options of either dropping
the local route back to the attacker, using the Linux ipfwadm/ipchains
command, *BSD ipfw command, and/or dropping the attacker host IP into
a TCP Wrappers hosts.deny file automatically.
+ PortSentry has an internal state engine to remember hosts that
connected previously. This allows the setting of a trigger value to
prevent false alarms and detect "random" port probing.
+ PortSentry will report all violations to the local or remote syslog
daemons indicating the system name, time of attack, attacking host IP
and the TCP or UDP port a connection attempt was made to. When used
in conjunction with Logcheck it will provide an alert to
administrators through e-mail.
+ Once a scan is detected your system will turn into a blackhole and
disappear from the attacker. This feature stops most attacks cold.


Master sites:

SHA1: 091124db3f9ccc29afae08d6ab1fdd073b789d0a
RMD160: 8bf4bce18229a7ebff47e7fe50493738ae818085
Filesize: 46.928 KB

Version history: (Expand)