OK, so I'm paranoid...
I checked my own computer with nmap and got the following result:
Interesting ports on $MYHOST ($MYIPADDRESS):
(The 1641 ports scanned but not shown below are in state: closed)
Port State Service
22/tcp open ssh
111/tcp open sunrpc
6000/tcp open X11
Nmap run completed -- 1 IP address (1 host up) scanned in 0.612 seconds
Now some more details; I was running nmap in user mode, not as root, I
know the result would be different, for the time being I'll work with
this, I'll check more later.
About the results :
I'm a bit surprised that ssh is opened, I don't remember setting up any
sshd daemon, however, I remember Brent doing something on my machine
during the Linuxdays, so it's not entirely impossible, I will disable it
for the time being.
I'm a bot more worried about the other two. I don't see what I might be
doing with Sun's RPC and wish to disable this (any hint welcome).
The same is true about X11; could anyone tell me why X11 is opening a
port on my machine, I don't intend to have anyone connect via X11 to my
host.
I expect I may have to toy with inetd and other startup scripts in order
to disable the nasty services/daemons. I hope I won't screw up my
system too much or too fast.
About ssh, is there a way how I can set up some identification so that
only specific remote users or users from specific hosts may connect to
my system through ssh? Would "anyone" be able to connect (assuming s/he
knows a username & password on my system)?
thanks
Serge
--
----------------------------------------------------------------------
'Software patents kill technical innovation"
----------------------------------------------------------------------
Serge Marelli,
E-mail : serge.marelli(a)linux.lu
----------------------------------------------------------------------
LiLux :
http://www.linux.lu/
Protecting Innovation against Patent Inflation
http://swpat.ffii.org/
over 200,000 votes & 2000 firms against software patents
http://noepatents.org/