From owner-freebsd-questions Tue Oct 5 19:45:52 1999 Delivered-To: freebsd-questions@freebsd.org Received: from culverk.student.umd.edu (culverk.student.umd.edu [129.2.196.87]) by hub.freebsd.org (Postfix) with ESMTP id E106A14F47 for ; Tue, 5 Oct 1999 19:44:49 -0700 (PDT) (envelope-from culverk@culverk.student.umd.edu) Received: from localhost (culverk@localhost) by culverk.student.umd.edu (8.9.3/8.9.3) with ESMTP id WAA00408 for ; Tue, 5 Oct 1999 22:43:12 -0400 (EDT) (envelope-from culverk@culverk.student.umd.edu) Date: Tue, 5 Oct 1999 22:43:12 -0400 (EDT) From: Kenneth Culver To: freebsd-questions@freebsd.org Subject: nmap Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG I was just wondering, it seems that (at least nmap thinks so) that freebsd's security is not as good as linux. here is an nmap output from a linux box on the local LAN (using nmap -sF -O hostname): Starting nmap V. 2.3BETA6 by Fyodor (fyodor@dhp.com, www.insecure.org/nmap/) Interesting ports on luda.student.umd.edu (129.2.196.98): Port State Protocol Service 21 open tcp ftp 22 open tcp ssh 23 open tcp telnet 25 open tcp smtp 53 open tcp domain 79 open tcp finger 80 open tcp http 98 open tcp linuxconf 111 open tcp sunrpc 113 open tcp auth 119 open tcp nntp 139 open tcp netbios-ssn 513 open tcp login 514 open tcp shell 515 open tcp printer 602 open tcp unknown 623 open tcp unknown 628 open tcp qmqp 633 open tcp unknown 1024 open tcp unknown 1178 open tcp skkserv 6000 open tcp X11 TCP Sequence Prediction: Class=random positive increments Difficulty=1865858 (Good luck!) Remote operating system guess: Linux 2.1.122 - 2.2.12 Nmap run completed -- 1 IP address (1 host up) scanned in 38 seconds And this is my computer: Starting nmap V. 2.3BETA6 by Fyodor (fyodor@dhp.com, www.insecure.org/nmap/) Interesting ports on culverk.student.umd.edu (129.2.196.87): Port State Protocol Service 21 open tcp ftp 22 open tcp ssh 23 open tcp telnet 25 open tcp smtp 53 open tcp domain 79 open tcp finger 139 open tcp netbios-ssn 515 open tcp printer 1024 open tcp unknown 6000 open tcp X11 TCP Sequence Prediction: Class=random positive increments Difficulty=31411 (Worthy challenge) Remote operating system guess: FreeBSD 2.2.1 - 3.2 Nmap run completed -- 1 IP address (1 host up) scanned in 3 seconds anyone know? To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message