K
Kerodo
Then, you agree with me that being concerned about losing stealth
status is not an issue.
Maybe I misunderstand the vulnerability in question. I was under the
impression that the fragmented packets do not "go through" but simply
a response is sent to the sender. Also, I don't see how an incoming
TCP connection would be established. Can you clarify this?
E.
No, the packets actually go thru the firewall. They're not logged or
blocked. If you send a UDP packet thru the firewall to a closed port,
you'll get an ICMP type 3 response also, which may or may not be blocked
outbound by the firewall.