James Carlson wrote:
> Norm Jacobs writes:
>   
>>    1. It doesn't send out a response to any queries on the network.
>>     
>
> Just being open is enough.  The fact that it's open is easily
> detectable, because the system won't send back an ICMP Destination
> Unreachable / Port Unreachable when a packet for that port is
> received.  Scanners use that feature to find the open and closed
> ports.
>
>   
>>    2. The port that is uses is not a well known port.  It's effectively
>>       random.
>>     
>
> Sure.  All open ports are interesting, though.
>
>   
>> The result is that you really can't scan for it.  Of course, this 
>> doesn't mean that someone can't write a little software to pretend to be 
>> a network attached printer and try and exploit it.  It's just more work 
>> to make the attempt.
>>     
>
> As far as security is concerned, I'd say that it's not much more work
All points well taken.  The discovery addon uses a HAL supplied 
drop_privileges() function to limit what the process can do should some 
form of attack find a compromise.

    -Norm

Reply via email to