Christopher Dale wrote:
> widyachacra wrote:
>> Dear List friends,
>>
>> When i scan my own domain from an out side host using 'nmap' tool it shows
>> following results. How do i block this kind of tracing using linux. Please
>> help me.
>>
>> nmap tracing result,
>>
>> PORT    STATE SERVICE    VERSION
>> 25/tcp  open  smtp       netqmail smtpd 1.04
>> 53/tcp  open  domain
>> 80/tcp  open  http       Apache httpd 2.2.6 ((Gentoo))
>> 110/tcp open  pop3       Courier pop3d
>> 119/tcp open  ssh        OpenSSH 4.7 (protocol 2.0)
>> 209/tcp open  tam?
>> 443/tcp open  http       Apache httpd 2.2.6 ((Gentoo))
>> 628/tcp open  tcpwrapped
>> 993/tcp open  ssl/imap   Courier Imapd (released 2005)
>> 995/tcp open  ssl/pop3   Courier pop3d
>>
>>
>>   
> Hi Widyachacra,
> 
> Great question and one that I have had in the past also. In a previous
> post to the gentoo mailing list, someone suggested that port knocking be
> used as a means of securing through obscurity. After looking at it
> (http://www.portknocking.org), I've found that it's a wonderful means to
> a personal server's security when exposed to the world wide web.

Exposed to the what?
-- 
[email protected] mailing list

Reply via email to