Christopher Dale wrote: > widyachacra wrote: >> Dear List friends, >> >> When i scan my own domain from an out side host using 'nmap' tool it shows >> following results. How do i block this kind of tracing using linux. Please >> help me. >> >> nmap tracing result, >> >> PORT STATE SERVICE VERSION >> 25/tcp open smtp netqmail smtpd 1.04 >> 53/tcp open domain >> 80/tcp open http Apache httpd 2.2.6 ((Gentoo)) >> 110/tcp open pop3 Courier pop3d >> 119/tcp open ssh OpenSSH 4.7 (protocol 2.0) >> 209/tcp open tam? >> 443/tcp open http Apache httpd 2.2.6 ((Gentoo)) >> 628/tcp open tcpwrapped >> 993/tcp open ssl/imap Courier Imapd (released 2005) >> 995/tcp open ssl/pop3 Courier pop3d >> >> >> > Hi Widyachacra, > > Great question and one that I have had in the past also. In a previous > post to the gentoo mailing list, someone suggested that port knocking be > used as a means of securing through obscurity. After looking at it > (http://www.portknocking.org), I've found that it's a wonderful means to > a personal server's security when exposed to the world wide web.
Exposed to the what? -- [email protected] mailing list
