From owner-freebsd-isp Wed Nov 29 17:23:51 2000 Delivered-To: freebsd-isp@freebsd.org Received: from alpha.simphost.com (alpha.simphost.com [216.253.163.10]) by hub.freebsd.org (Postfix) with ESMTP id B601E37B400; Wed, 29 Nov 2000 17:23:48 -0800 (PST) Received: by alpha.simphost.com (Postfix, from userid 1060) id 01A4D66B0A; Wed, 29 Nov 2000 18:23:54 -0700 (MST) Received: from localhost (localhost [127.0.0.1]) by alpha.simphost.com (Postfix) with ESMTP id EBCF662D03; Wed, 29 Nov 2000 18:23:54 -0700 (MST) Date: Wed, 29 Nov 2000 18:23:54 -0700 (MST) From: "Jonathan M. Slivko" To: freebsd-security@freebsd.org Cc: freebsd-isp@freebsd.org Subject: Danger Ports Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-isp@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Can someone tell me what are the "danger" ports on FreeBSD, ports that perhaps need to be blocked because they are insecure? I would like to know so in the future, I can prevent outside attacks and concentrate more on internal attacks, or "insider jobs" as they're called. ---- Jonathan M. Slivko Technical Support, CoreSync Corporation (http://www.coresync.net) Team Leader, SecureIRC Project (http://secureirc.sourceforge.net) Pager/Voicemail: (917) 388-5304 ---- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-isp" in the body of the message