Hi,

I remember a discussion a while back about the portmapper
still running in the secure by default configuration. IIRC
somebody said it is protected by tcp wrapper rules and only
accessible from localhost per default to allow legacy service
the access.

On a freshly installed snv_65 this is not the case:

mybox:~ # nmap -A remotehost

Starting Nmap 4.20 ( http://insecure.org ) at 2007-06-08 18:38 CEST
Interesting ports on remotehost (192.168.110.20):
Not shown: 1695 closed ports
PORT    STATE SERVICE VERSION
22/tcp  open  ssh     SunSSH 1.1 (protocol 2.0)
111/tcp open  rpcbind  2-4 (rpc #100000)
MAC Address: 00:D0:59:B6:82:11 (Ambit Microsystems)
Device type: general purpose
Running: Sun Solaris 9|10
OS details: Sun Solaris 9 or 10
Uptime: 0.318 days (since Fri Jun  8 11:01:20 2007)
Network Distance: 1 hop

OS and Service detection performed. Please report any incorrect results at
http://insecure.org/nmap/submit/ .
Nmap finished: 1 IP address (1 host up) scanned in 53.233 seconds
myhost:~ # rpcinfo -p remotehost
   program vers proto   port
    100000    4   tcp    111  portmapper
    100000    3   tcp    111  portmapper
    100000    2   tcp    111  portmapper
    100000    4   udp    111  portmapper
    100000    3   udp    111  portmapper
    100000    2   udp    111  portmapper
myhost:~ #


Is this a regression or is my memory wrong?


Cheers,
        Dirk




-- 
Dr. Wetter IT Consulting                         http://drwetter.org
Beratung IT-Sicherheit + Open Source
Inhaber: Dr. Dirk Wetter
Key fingerprint = 80A2 742B 8195 969C 5FA6  6584 8B6E 59C1 E41B 9153
[electronic vcard attached contains contact info]



Reply via email to