Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
Kristian Erik Hermansen wrote: > On Dec 20, 2007 8:12 PM, Matthew Gillen <[hidden email]> wrote: >> Well when using nmap, supposing your firewall is off, if you get back >> "port closed", then your ISP is letting the SYN through. If you get >> "filtered", then you know the ISP is blocking. > > This is not necessarily true. It is possible for any upstream ISP to > inject RST packets at will, and this is potentially what Comcast does > for some services. If you get no response, then it usually means the > packet is being filtered or your peered host did not like you... This is exactly what I was talking about in the second half of the message (the part you didn't quote about the EFF's tool). Matt -- This message has been scanned for viruses and dangerous content by MailScanner, and is believed to be clean. _______________________________________________ Discuss mailing list [hidden email] http://lists.blu.org/mailman/listinfo/discuss
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |