I think the point you were trying to make (and I could be WAY off here) is that all machines have some kind of netstat command that shows what ports are listening. "netstat -a" is very cross platform. It works on all versions of windows and unix that I've seen, (I have no idea if there's a mac equivalent, tho) and it'll give you a definitive list of all ports that are presently in use. Combine this with the services list for each OS, and you have a fairly good list of what ports to avoid.
---------------------------------------------------------------------- Matt Rose --- mattrose at folkwolf.net --- http://folkwolf.net Sufficiently advanced cluelessness is indistinguishable from malice ---------------------------------------------------------------------- On Tue, 29 Aug 2000, Marc Schneiders wrote: > On Mon, 28 Aug 2000, Signal 11 wrote: > > > > What is wrong with this: > > > > Well, for starters you're using *BSD, I believe. > > Indeed. And what is wrong with that?? Very good to start with in the > port quest as most other operating systems' (including M$(r) > Windows(tm)) networking stuff is based on that, they say. Seriously, > it is very standard unix. More people should try it. I won't say it is > better than Linux, for I cannot provide convincing evidence for that. > Well as far as networking standards and software goes, Apache runs > FreeBSD, ISC.org (that maintains BIND) runs BSD/OS (now merging with > FreeBSD). Many ISP's run FreeBSD (or BSD/OS), Yahoo does, Hotmail did > until very recently. > And if you really care for security, have a look at OpenBSD, which has > the additional advantage of completely lacking any corporate backing > :-) [To complete the picture: NetBSD runs on everything. I have it on > an old VAX here.] Anyway, it is not good to get very Linux centric, I > think. There is more Unix then Linux. There was Unix before Linus was. > > > > unclad:www {281} netstat -an |grep LISTEN > > > tcp4 0 0 212.238.105.241.53 *.* > > > tcp4 0 0 127.0.0.1.53 *.* > > > tcp4 0 0 10.0.0.10.53 *.* > > > > Looks like you forgot your bind entries in /etc/named.conf.. > > Why do you think that? I did not! However, I did ask netstat to give > me numbers in stead of names (-n option) or there would have been > "domain" for 53, "http" for 80 etc. (in addition to hostnames for > IP's, which you were expecting). > That would not be useful to find a free port easily. > > > second, you posted your IP addy to the list. > > Sure, if I changed nothing in the netstat output. > > > Third, this > > is obviously on your firewall. I believe demon internet > > is a new zealand-based dialup ISP. Given the DNS entry, > > I believe it is safe to assume you work there, as it is > > not part of their normal dialup blocks. > > Come on, you must be joking. 212.238.105.241 is the real IP of a > dialup. It resolves to demon.nl. I am with Demon NL. NL stands for The > Netherlands. I do not work with Demon. A firewall? This is the machine > I connect with over ISDN. Any other FreeBSD box with a normal install > would look the same, give or take one or two lines (like port 53 and > nfs related ports). > > > As a humorous aside, ns0.demon.nl is not properly rejecting > > requests for zone xfers. I wonder whether you setup those > > servers or not. =) > > No, I have set up just one (1) server [check headers to find it], > which is not on the Demon network, with which I have nothing to do, > apart from using them to connect from home. The server I set up does > refuse an AXFR from anyone but a few IP's. The funny side is that my > secondary nameserver (which is that from the company where I > collocate, so outside my control) does allow AXFR's to the world. I > don't mind that at all. There is so much I don't really need to hide > about my one-server-network. > > > > After eliminating the well-known ports in your list, > > we're left with: > > > > > tcp4 0 0 *.587 *.* > > > tcp4 0 0 *.1022 *.* > > > tcp4 0 0 *.2049 *.* > > > tcp4 0 0 *.1023 *.* > > > > Now, I know that 1023 is not a well-known service, > > but I often find that port open - the reason I > > disrecall, so let's drop that one from the list. > > Well, you might like it when people who run FreeBSD can also use > Freenet without additional hassle to get the right port. > 1022/1023 is nfs related (portmap, mountd can't remember). > > > This leaves: > > > > > tcp4 0 0 *.587 *.* > > > tcp4 0 0 *.1022 *.* > > > tcp4 0 0 *.2049 *.* > > > > I'm going to also drop 587 and 1022 because they are > > under the "1024" priveledged ports. I don't know for > > sure if Freenet runs as root, but I believe it is safe > > to assume the developers are trying to make sure that > > is not necessary. This leaves us with 2049, our freenet > > node. > > 2049 is not a Freenet node. There was no Freenet running on the box > (it is one of two dialups I use, so very transient, as here there is > no flat fee phone). > 2049 is, I presume, ... nfsd :-) > > > Do I get a prize? > > Yes! The URL for more information about FreeBSD (and lists where to > download it): http://www.freebsd.org/ > > -- > Marc Schneiders > > FreeBSD: Unleash the Daemon in your machine! > > _______________________________________________ > Freenet-dev mailing list > Freenet-dev at lists.sourceforge.net > http://lists.sourceforge.net/mailman/listinfo/freenet-dev > _______________________________________________ Freenet-dev mailing list Freenet-dev at lists.sourceforge.net http://lists.sourceforge.net/mailman/listinfo/freenet-dev