MichealC4
Programmer
- Jun 26, 2003
- 457
Here's the command I'm trying to do:
route add 127.0.0.1 MASK 255.255.255.0 127.0.0.1 METRIC 1 IF 2
I'm getting the error:
The route addition failed: The specified mask parameter is invalid. (Destination & Mask) != Destination.
It's a long story, but I'm trying to keep any and all traffic from leaving the machine.
I tried that too, and it didn't work. Thanks for looking though.
route add 127.0.0.1 MASK 255.255.255.0 127.0.0.1 METRIC 1 IF 2
I'm getting the error:
The route addition failed: The specified mask parameter is invalid. (Destination & Mask) != Destination.
It's a long story, but I'm trying to keep any and all traffic from leaving the machine.
Never tried what you are doing, but I would try making the subnet mask, 255.255.255.255 so there is only the one available ip. Good luck.
I tried that too, and it didn't work. Thanks for looking though.
Have you tried something simple like loaind zone alarm lite? It's free and has worked for me for years. Good luck.
Well, let me explain what I am trying to do, maybe that will help.
After battling the various variants of Bagle, getting hit with slammer (don't ask me to splain that one ), I decided to dynamically quarantine a machine. Well, I would like to be able to do it at the switch level, but for various reasons, I can't. So, I got the crazy idea to toy with the IP stack. I'll setup a simple service that listens on a certain port, I can log in to it (or the backend can which will check the IPS, IDS, syslog, etc.), and run the command. That will (or supposed to) null route all traffic coming from the server/workstation so that the virus won't be able to spread itself. We will then get an alert (and/or the user calls us) and we will then work to correct it. I'm sorry, but I can't spend all day watching the overwhelming amount of logs. I barely get by as it is. So, that's my idea.
----------------------------
"Security is like an onion" - Unknown