Re: icmp allowed by default
No, it isn't a bug.The behaviour can be configured as required. There are implications with blocking ICMP traffic though, it can cause issues with IPv6 traffic for example. If you truly want to drop ICMP packets, read on....
This Red Hat security guide offers some comprehensive information about configuring firewalld to manage ICMP traffic.
For example:
5.11.3. Blocking ICMP Requests without Providing any Information at All
Normally, if you block ICMP requests, clients know that you are blocking it. So, a potential attacker who is sniffing for live IP addresses is still able to see that your IP address is online. To hide this information completely, you have to drop all ICMP requests.
To block and drop all ICMP requests:
- Set the target of your zone to DROP:
~]# firewall-cmd --set-target=DROP - Make the new settings persistent:
~]# firewall-cmd --runtime-to-permanent
Now, all traffic, including ICMP requests, is dropped, except traffic which you have explicitly allowed.
Last edited by deano_ferrari; 17-Jul-2020 at 02:38.
openSUSE Leap 15.4; KDE Plasma 5