<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<meta content="text/html;charset=ISO-8859-1" http-equiv="Content-Type">
</head>
<body bgcolor="#ffffff" text="#000000">
<font size="-1">Hi Bernd,<br>
<br>
Do you mean something like <a class="moz-txt-link-freetext" href="http://www.securityfocus.com/infocus/1675">http://www.securityfocus.com/infocus/1675</a> ?<br>
<br>
"</font><a class="l" href="http://www.securityfocus.com/infocus/1675">Open
Source Honeypots, Part Two: Deploying Honeyd in the Wild</a><font
size="-1">Following that we see an attacker probe TCP 80 on our <b>Linux
honeypot</b>. This port is closed and the <b>honeypot</b> responds
with a RST."</font><br>
<font size="-1"><br>
Cheers<br>
</font><br>
Bernd Felsche wrote:
<blockquote cite="midodssk3x134.ln2@innovative.iinet.net.au" type="cite">
<pre wrap="">My firewall gets *lots* of hits to well-known ports and ports used
by bots/worms.
Instead of simply rejecting/dropping packets, I'm toying with the
idea of setting up a minefield and/or tarpit to make their lives a
misery.
Some stuff can be done with xinetd, but not a lot without spawning
custom applications to e.g. fake bot responses and to harvest their
locations.
Are there any tools to handle incoming nasty connections and to deal
with them based on a set of rules?
</pre>
</blockquote>
</body>
</html>