I'm returning here to a previous security topic.

When a port scan locates an open inbound port, that does not in itself indicate 
a security problem. What it indicates is the need to audit the use of that 
port. There are two issues that need to be investigated:

 1. Is the use of the port controlled so that only authorized servers can use 
it?

 2. Are the servers using that port correctly configured?

As an example, it is okay to have an open port 25, but sendmail or whatever 
should be configured to require use of SMTPAUTH.


--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to