On Tuesday 27 January 2004 20:39, Eric Dondelinger wrote:
Hi Serge,
On Tue, 27 Jan 2004, Serge Marelli wrote:
OK, so I'm paranoid...
Are you paranoid enough?
I checked my own computer with nmap and got the
following result:
Interesting ports on $MYHOST ($MYIPADDRESS):
(The 1641 ports scanned but not shown below are in state: closed)
Port State Service
22/tcp open ssh
111/tcp open sunrpc
6000/tcp open X11
Nmap run completed -- 1 IP address (1 host up) scanned in 0.612
seconds
Rather classical...
Now some more details; I was running nmap in user
mode, not as
root, I know the result would be different, for the time being I'll
work with this, I'll check more later.
It isn't that different, unless you use special options.
using -sU for udp could be good too, but, you doesn't need to be root, i
think.
I'm a bot
more worried about the other two. I don't see what I
might be doing with Sun's RPC and wish to disable this (any hint
welcome).
RPC -> portmap
Since my Gentoo runs fine without this service, I guess you won't
need it, unless you need NFS or somesuch.
one service that use rpc is fam, to monitor directory. kde can take
advantage of this, but it work fine without it.
The same is
true about X11; could anyone tell me why X11 is opening
a port on my machine, I don't intend to have anyone connect via X11
to my host.
Normally, X shouldn't allow connections from outside, unless you
explicitly authorize this via xhost + remote_host, or via xauth.
just start X with the -nolisten parameter.
you just need to modify the script or the configuration file.
and it depend on the system.
i know that msec ( a mdk utility to enforce security setting ) modify
gdm config ( /etc/X11/gdm/gdm.conf ), startx (/usr/X11R6/bin/startx )
and X server config ( /etc/X11/xdm/Xservers ).
So you may try to look for these file, and modify them.
but this is not a huge security risk, as Eric stated.
--
Mickaƫl Scherer