Howdy folks,
For any of you setting up rules in your input_wan table and considering testing access by using the "Shields Up!" port probing utility at grc.com, note that their SYN probe tests are broken by the following entry in the default base case INPUT chain.
iptables -A INPUT -p tcp --tcp-flags SYN SYN --tcp-option \! 2 -j DROP
When viewed with iptables -L, the rule appears as follows:
DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp option=!2 flags:0x02/0x02
Any connection tests from this website will show the ports as "Stealth" because the rule will silently drop these packets from the "Shields Up!" application.
Note that normal connection attempts work fine, as do most other port probing sites. It's just grc.com which is mis-reporting due to the lack of the MSS TCP option they use in their SYN packets.
(Last edited by kaldek on 31 Mar 2008, 12:30)