<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Port vulnerability in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/port-vulnerability/m-p/3170197#M570086</link>
    <description>I take the turn-off-everything approach for new systems. /etc/inetd.conf defines the services that will be listening to the LAN card, so I remove (comment out) every service except telnet and perhaps ftp. Then add services when needed. That way, you don't have to worry about turning off a service and wondering what breaks. The majority of services in /etc/inetd.conf can be disabled as they are legacy (time, daytime, chargen, discard, ntalk, uucp and so on) tools and not used by modern applications.</description>
    <pubDate>Wed, 21 Jan 2004 14:44:03 GMT</pubDate>
    <dc:creator>Bill Hassell</dc:creator>
    <dc:date>2004-01-21T14:44:03Z</dc:date>
    <item>
      <title>Port vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/port-vulnerability/m-p/3170192#M570081</link>
      <description>i have some questions about the ports configuring in the file /etc/services HPUX 11.0&lt;BR /&gt;&lt;BR /&gt;How can i know what ports is in use by my system ?&lt;BR /&gt;&lt;BR /&gt;Do you have a recommendation about removing ports in the services file?&lt;BR /&gt;&lt;BR /&gt;how can i identify the ports vulnerable to my system?&lt;BR /&gt;&lt;BR /&gt;thanks.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 21 Jan 2004 14:30:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/port-vulnerability/m-p/3170192#M570081</guid>
      <dc:creator>Javier Ortiz Guajardo</dc:creator>
      <dc:date>2004-01-21T14:30:34Z</dc:date>
    </item>
    <item>
      <title>Re: Port vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/port-vulnerability/m-p/3170193#M570082</link>
      <description>/etc/services is a reservation system.&lt;BR /&gt;&lt;BR /&gt;Thats a good start.&lt;BR /&gt;&lt;BR /&gt;Oracle doesn't bother using it &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;netstat -an | more&lt;BR /&gt;&lt;BR /&gt;will let you complile a more complete list.&lt;BR /&gt;&lt;BR /&gt;It will show the ports whether or not its reserved.&lt;BR /&gt;&lt;BR /&gt;You need to be careful with ports 1-1024 because thats root lannd and problems will have a large impact on your system.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Wed, 21 Jan 2004 14:34:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/port-vulnerability/m-p/3170193#M570082</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2004-01-21T14:34:09Z</dc:date>
    </item>
    <item>
      <title>Re: Port vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/port-vulnerability/m-p/3170194#M570083</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;You can look at all the opened ports on the system by using the command 'netstat -an |grep LISTEN'&lt;BR /&gt;&lt;BR /&gt;A good rule is not to disable everything and open only the ones that are required.&lt;BR /&gt;&lt;BR /&gt;It is not necessary that all the ports will be listed in /etc/services. You can write your own program that will listen at a port. &lt;BR /&gt;&lt;BR /&gt;-Sri&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 21 Jan 2004 14:35:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/port-vulnerability/m-p/3170194#M570083</guid>
      <dc:creator>Sridhar Bhaskarla</dc:creator>
      <dc:date>2004-01-21T14:35:03Z</dc:date>
    </item>
    <item>
      <title>Re: Port vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/port-vulnerability/m-p/3170195#M570084</link>
      <description>Hi Javier,&lt;BR /&gt;&lt;BR /&gt;1) Run netstat -an &amp;amp; all ports in use or in a listening state will be listed. Suggest you output to a file as this is usually a long list.&lt;BR /&gt;&lt;BR /&gt;2) No need to remove anything from the services file. This is merely a lookup file for the inetd daemon &amp;amp; is used to put a "name" on a port. It should be noted that one doesn't have to have an entry in the services file for the request to be serviced by inetd.&lt;BR /&gt;&lt;BR /&gt;3) A portscan tool can be used to determine just what ports the system will respond to. Services can be turned off/on by editing the /etc/inetd.conf file. Access can be granted/denied several ways - by using the /var/adm/inetd.sec file or through a program like tcp-swappers.&lt;BR /&gt;&lt;BR /&gt;HTH,&lt;BR /&gt;Jeff</description>
      <pubDate>Wed, 21 Jan 2004 14:35:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/port-vulnerability/m-p/3170195#M570084</guid>
      <dc:creator>Jeff Schussele</dc:creator>
      <dc:date>2004-01-21T14:35:07Z</dc:date>
    </item>
    <item>
      <title>Re: Port vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/port-vulnerability/m-p/3170196#M570085</link>
      <description>Wow - that was a weird typo...he..he..he&lt;BR /&gt;&lt;BR /&gt;Should be tcp-wrappers of course&lt;BR /&gt;&lt;BR /&gt;LOL,&lt;BR /&gt;Jeff</description>
      <pubDate>Wed, 21 Jan 2004 14:37:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/port-vulnerability/m-p/3170196#M570085</guid>
      <dc:creator>Jeff Schussele</dc:creator>
      <dc:date>2004-01-21T14:37:30Z</dc:date>
    </item>
    <item>
      <title>Re: Port vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/port-vulnerability/m-p/3170197#M570086</link>
      <description>I take the turn-off-everything approach for new systems. /etc/inetd.conf defines the services that will be listening to the LAN card, so I remove (comment out) every service except telnet and perhaps ftp. Then add services when needed. That way, you don't have to worry about turning off a service and wondering what breaks. The majority of services in /etc/inetd.conf can be disabled as they are legacy (time, daytime, chargen, discard, ntalk, uucp and so on) tools and not used by modern applications.</description>
      <pubDate>Wed, 21 Jan 2004 14:44:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/port-vulnerability/m-p/3170197#M570086</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2004-01-21T14:44:03Z</dc:date>
    </item>
    <item>
      <title>Re: Port vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/port-vulnerability/m-p/3170198#M570087</link>
      <description>If you are examining ports on your system download "lsof" from the HP Porting Centre. Remember that not all ports/daemons are controlled by inetd.&lt;BR /&gt;&lt;BR /&gt;You should also read the man pages for "inetd.sec".&lt;BR /&gt;&lt;BR /&gt;Good luck,&lt;BR /&gt;Andrew&lt;BR /&gt;</description>
      <pubDate>Thu, 22 Jan 2004 03:45:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/port-vulnerability/m-p/3170198#M570087</guid>
      <dc:creator>Andrew Cowan</dc:creator>
      <dc:date>2004-01-22T03:45:53Z</dc:date>
    </item>
    <item>
      <title>Re: Port vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/port-vulnerability/m-p/3170199#M570088</link>
      <description>Also, i will suggest a great utility called nmap for port scanning. You can list both tcp and udp ports opened on a server using this utility. Let me give you one example:&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;bash-2.05# nmap 172.25.5.51&lt;BR /&gt;&lt;BR /&gt;Starting nmap V. 2.54BETA22 ( &lt;A href="http://www.insecure.org/nmap/" target="_blank"&gt;www.insecure.org/nmap/&lt;/A&gt; )&lt;BR /&gt;Interesting ports on tserver (172.25.5.51):&lt;BR /&gt;(The 1528 ports scanned but not shown below are in state: closed)&lt;BR /&gt;Port       State       Service&lt;BR /&gt;53/tcp     open        domain                  &lt;BR /&gt;88/tcp     open        kerberos-sec            &lt;BR /&gt;135/tcp    open        loc-srv                 &lt;BR /&gt;139/tcp    open        netbios-ssn             &lt;BR /&gt;389/tcp    open        ldap                    &lt;BR /&gt;445/tcp    open        microsoft-ds            &lt;BR /&gt;464/tcp    open        kpasswd5                &lt;BR /&gt;593/tcp    open        http-rpc-epmap          &lt;BR /&gt;636/tcp    open        ldapssl                 &lt;BR /&gt;1030/tcp   open        iad1                    &lt;BR /&gt;1031/tcp   open        iad2                    &lt;BR /&gt;1080/tcp   open        socks                   &lt;BR /&gt;1103/tcp   open        xaudio                  &lt;BR /&gt;8082/tcp   open        blackice-alerts         &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Nmap run completed -- 1 IP address (1 host up) scanned in 1 second&lt;BR /&gt;bash-2.05# &lt;BR /&gt;&lt;BR /&gt;Hope this helps&lt;BR /&gt;-Vijay</description>
      <pubDate>Thu, 22 Jan 2004 03:54:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/port-vulnerability/m-p/3170199#M570088</guid>
      <dc:creator>Vijaya Kumar_3</dc:creator>
      <dc:date>2004-01-22T03:54:57Z</dc:date>
    </item>
  </channel>
</rss>

