[Courses] New to this list, so, hi!

Elwing elwing at elwing.org
Wed Aug 27 10:06:57 EST 2003


If you're blocking those ports at the firewall (from remote machines),
then the only thing you have to worry about are people inside the
firewall.  If you have other machines that could potentially be
compromised, I still suggest blocking the X ports locally.

Laura


> Hi laura, in reply to another reply, *sigh* this is

> confusing, i ran 'nmap -sT Mirrus'
>
> tarting nmap V. 2.54BETA34 ( www.insecure.org/nmap/ )
> Interesting ports on localhost (127.0.0.1):
> (The 1550 ports scanned but not shown below are in
> state: closed)
> Port       State       Service
> 22/tcp     open        ssh
> 37/tcp     open        time
> 111/tcp    open        sunrpc
> 113/tcp    open        auth
> 515/tcp    open        printer
> 6000/tcp   open        X11
>
> Nmap run completed -- 1 IP address (1 host up) scanned
> in 0 seconds
>
> *but* i ran a port scan at another site, port's
> 6000-6255, came back "stealth" like closed but better!
> Is it really needed to shut down access to these
> port's in this case, i have a firewall in place,
> blocking all remote, accepting all connection's from
> my box.
> Joe. :)
> P.S. if you think i'm being a little *over* safe, i
> like it that way!
>
>
>
> __________________________________
> Do you Yahoo!?
> Yahoo! SiteBuilder - Free, easy-to-use web site design software
> http://sitebuilder.yahoo.com
> _______________________________________________
> Courses mailing list
> Courses at linuxchix.org
> http://mailman.linuxchix.org/mailman/listinfo/courses
>
>
>



More information about the Courses mailing list