禁traceroute:
/sbin/iptables -A FORWARD -p icmp --icmp-type 11 -j DROP
禁traceroute和ping:
/sbin/iptables -A FORWARD -p icmp -j DROP
3.ICMP timestamp请求响应漏洞解决方案:
shell> echo "1" >/proc/sys/net/ipv4/icmp_echo_ignore_all
shell> echo "echo "1" > /proc/sys/net/ipv4/icmp_echo_ignore_all">> /etc/rc.local
Windows Server 2008 参考:http://hi.baidu.com/%BA%D3%C4%CF%CD%F8%C2%B7/blog/item/91076a62831cdb4aebf8f807.html
Windows Server 2003参考: http://zhidao.baidu.com/question/41992099
6. rpc相关漏洞解决方案:
(和项目组确认没有使用NFS后再操作)
shell> /etc/init.d/portmap stop && chkconfig portmap off
shell> /etc/init.d/rpcidmapd stop && chkconfig rpcidmapd off
shell> /etc/init.d/nfslock stop && chkconfig nfslock off
linux服务器如何禁止traceroute
禁traceroute:
/sbin/iptables -A FORWARD -p icmp --icmp-type 11 -j DROP
禁traceroute和ping:
/sbin/iptables -A FORWARD -p icmp -j DROP
检测到远端RPCBIND/PORTMAP正在运行中
停用命令
service nfslock stop
chkconfig nfslock off
rpcbind服务停止命令
service portmap stop