Abstract
For the typical operation of a server, programs listen on certain specific ports. Firewalls are, among other things, used to block irrelevant traffic from a server to avoid bothering the server with traffic not relevant to an application. Firewalls that are programmed inconsistently with the application may mean that unintended (and uninteresting) traffic gets to the server and loads its kernel or that the relevant port is accidentally blocked and the application does not work. Techniques presented herein provide for the ability to program upstream (e.g., hardware) Access Control Lists (ACLs) in a dynamic manner by responding to the shifting use of the network stack by processes running on a host.
Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.
Recommended Citation
Wells, Ian and Mestery, Kyle, "REACTING TO KERNEL STATE OF LISTENING PORTS FOR FIREWALLING", Technical Disclosure Commons, (January 17, 2021)
https://www.tdcommons.org/dpubs_series/3972