* Peter ten Have wrote on Sun, Oct 15, 2000 at 10:54 +0200:
A portscan (nmap) however reveals that all the upd ports are open! Is this a risk or not and how are these closed with the help of the script?
You can check the firewall rules with ipchains -nvL|less (use a large xterm :)) Did you used nmap against localhost? It's not uncommon to open localhost and loopbackdevice. Of couse you have to scan from outside your network. oki, Steffen -- Dieses Schreiben wurde maschinell erstellt, es trägt daher weder Unterschrift noch Siegel. --------------------------------------------------------------------- To unsubscribe, e-mail: suse-security-unsubscribe@suse.com For additional commands, e-mail: suse-security-help@suse.com The scan was performed by someone from the outside: Port State Service 1/udp open tcpmux 2/udp open compressnet 3/udp open compressnet 4/udp open unknown 5/udp open rje 6/udp open unknown 7/udp open echo ............................. Strange thing is though that NO TCP ports show up, only the UDP. The complete scan shows 1-1025 UDP are open and also 3130 squid-ipc -Peter-