Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Reject | block What's the difference ?

    Scheduled Pinned Locked Moved Firewalling
    12 Posts 9 Posters 28.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • L
      LeCygne
      last edited by

      Thank you but it will be better if you want to explain that more.

      1 Reply Last reply Reply Quote 0
      • P
        phil.davis
        last edited by

        @gderf:

        With reject, a TCP RST or ICMP port unreachable for UDP is returned to the sender.

        With block, the packet is dropped silently.

        With reject, a reply is sent back to the sending program/system telling it that the "packet was dropped". That is the "friendly" version, but it means that the sending program/system knows that the packet got through to a firewall and was dropped. So that gives an outside attacker some knowledge that they have reached something. IMHO you don't want to use reject on WAN.

        With block, the packet is dropped and nothing is sent back to the sending program/system. So an attacker cannot know if they ever reached their destination or a firewall. It looks to the attacker as if the IP address has nothing there at all.

        As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
        If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

        1 Reply Last reply Reply Quote 0
        • L
          LeCygne
          last edited by

          @phil.davis:

          @gderf:

          With reject, a TCP RST or ICMP port unreachable for UDP is returned to the sender.

          With block, the packet is dropped silently.

          With reject, a reply is sent back to the sending program/system telling it that the "packet was dropped". That is the "friendly" version, but it means that the sending program/system knows that the packet got through to a firewall and was dropped. So that gives an outside attacker some knowledge that they have reached something. IMHO you don't want to use reject on WAN.

          With block, the packet is dropped and nothing is sent back to the sending program/system. So an attacker cannot know if they ever reached their destination or a firewall. It looks to the attacker as if the IP address has nothing there at all.

          Thank you…now it's clear .

          1 Reply Last reply Reply Quote 0
          • GentleJoeG
            GentleJoe
            last edited by

            For local blocking on the LAN is it best to use reject or block?

            Since reject sends a rejection message back to the sender, wouldn't that be better?

            I'm using the reject/drop to stop chromecasts and Vizio TVs from using the google DNS.

            1 Reply Last reply Reply Quote 0
            • M
              moelharrak
              last edited by

              In most cases Reject is more used when troubleshooting , to see what really happening , you can use Reject to troubleshoot your rule and to see what is happening and then you can replace it by block to minimize truffic on the Network .

              1 Reply Last reply Reply Quote 0
              • GrimsonG
                Grimson Banned
                last edited by

                For blocking on the LAN I prefer reject, so that local requests don't have to wait for timeouts.

                1 Reply Last reply Reply Quote 0
                • H
                  Harvy66
                  last edited by

                  Rejecting on the WAN can be used as a reflection attack.

                  1 Reply Last reply Reply Quote 0
                  • GentleJoeG
                    GentleJoe
                    last edited by

                    Thanks

                    I'll use block on WAN and reject on LAN.

                    1 Reply Last reply Reply Quote 0
                    • DerelictD
                      Derelict LAYER 8 Netgate
                      last edited by

                      Reject is a lot more user-friendly on "trusted" interfaces.

                      I am not sold that "stealth" provides any tangible security benefits from the outside either.

                      My edge responds to pings from any. I don't lose any sleep.

                      Chattanooga, Tennessee, USA
                      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                      Do Not Chat For Help! NO_WAN_EGRESS(TM)

                      1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator
                        last edited by

                        I am with Derelict on the whole "stealth" I don't buy it either… If you ping my wan it answers.. But I don't see the point in a reject on wan - no reason to tell the bot looking for ftp or rdp or ssh that hey not open ;)  Why would I double the noise by answering it with a sorry not open response?

                        But on a trusted interface - reject can speed something up vs the client having to wait for timeout and sending retrans on something that is never going to work because its blocked, etc.

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.