widyachacra wrote: > Dear List friends, > > When i scan my own domain from an out side host using 'nmap' tool it shows > following results. How do i block this kind of tracing using linux. Please > help me. > > nmap tracing result, > > PORT STATE SERVICE VERSION > 25/tcp open smtp netqmail smtpd 1.04 > 53/tcp open domain > 80/tcp open http Apache httpd 2.2.6 ((Gentoo)) > 110/tcp open pop3 Courier pop3d > 119/tcp open ssh OpenSSH 4.7 (protocol 2.0) > 209/tcp open tam? > 443/tcp open http Apache httpd 2.2.6 ((Gentoo)) > 628/tcp open tcpwrapped > 993/tcp open ssl/imap Courier Imapd (released 2005) > 995/tcp open ssl/pop3 Courier pop3d > > > Hi Widyachacra,
Great question and one that I have had in the past also. In a previous post to the gentoo mailing list, someone suggested that port knocking be used as a means of securing through obscurity. After looking at it (http://www.portknocking.org), I've found that it's a wonderful means to a personal server's security when exposed to the world wide web. All the best in your attempts to obfuscate your server's open ports! :) Chrelad -- [email protected] mailing list
