Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 9 Sep 2000 01:24:30 -0400
From:      "David Liu" <dliu@mindspring.com>
To:        <questions@freebsd.org>
Subject:   12345/tcp  open   NetBus
Message-ID:  <LMECIAEPHBBFPHLIOHMNAEAECAAA.dliu@mindspring.com>

next in thread | raw e-mail | index | archive | help
Hi,

The following is the output of ps and sockstat. I always reboot my system
after changing
the configuration files so the following is an accurate reflection of the
system. I don't remember where I found the section on shutting down the
inetd.conf file. Some of info I got was from reading the shell scripts and
determining what env. variables they were looking for.

The "specific shortcoming in the documentation" is not describing what each
env. variable used
in the shell scripts are. For example, to shutdown the portmap daemon, you
need to specify
portmap_enable="NO" in the "rc.conf" file.

To make FreeBSD secure out of the box, the portmap daemon should not be
started since most users do not need it and it presents a serious security
hole for servers connected to the Internet.

As a side note, several of the ports are out of date and do not install
properly (i.e. apache13-fp) without hacking them.

Thanks,

David


/*                      ps aux                      */
USER     PID %CPU %MEM   VSZ  RSS  TT  STAT STARTED      TIME COMMAND
root     548  0.0  0.4   420  244  p0  R+   12:46AM   0:00.00 ps aux
root       1  0.0  0.5   532  304  ??  ILs   6:03PM   0:00.01 /sbin/init --
root       2  0.0  0.0     0    0  ??  DL    6:03PM   0:00.01  (pagedaemon)
root       3  0.0  0.0     0    0  ??  DL    6:03PM   0:00.00  (vmdaemon)
root       4  0.0  0.0     0    0  ??  DL    6:03PM   0:00.01  (bufdaemon)
root       5  0.0  0.0     0    0  ??  DL    6:03PM   0:00.23  (syncer)
root      28  0.0  0.2   208   92  ??  Is    6:03PM   0:00.00 adjkerntz -i
root     108  0.0  0.6   536  368  ??  Is   10:03PM   0:00.00 /sbin/dhclient
xl0
root     246  0.0  0.6   524  372  ??  Ss   10:03PM   1:24.75 /sbin/natd -n
xl0
root     262  0.0  1.0   904  608  ??  Ss   10:03PM   0:00.09 syslogd -s
root     271  0.0  1.3  1096  808  ??  D    10:03PM   0:00.02 amd -p -a
/.amd_mnt -c 1800 -l syslog /host /
root     272  0.0  1.3  1096  808  ??  D    10:03PM   0:00.02 amd -p -a
/.amd_mnt -c 1800 -l syslog /host /
root     287  0.0  1.1   948  692  ??  Is   10:03PM   0:00.04 cron
root     303  0.0  0.8   876  488  ??  Is   10:03PM   0:00.02 moused -p
/dev/psm0 -t auto
root     337  0.0  2.8  2068 1708  ??  Ss   10:03PM   0:00.36
/usr/local/sbin/httpd -DMOD_FP
root     353  0.0  1.9  1776 1164  ??  Is   10:03PM   0:00.01
/usr/local/sbin/sshd (sshd2)
nobody   359  0.0  2.8  2092 1708  ??  I    10:03PM   0:00.00
/usr/local/sbin/httpd -DMOD_FP
nobody   360  0.0  2.8  2092 1708  ??  I    10:03PM   0:00.00
/usr/local/sbin/httpd -DMOD_FP
nobody   361  0.0  2.8  2092 1708  ??  I    10:03PM   0:00.00
/usr/local/sbin/httpd -DMOD_FP
nobody   362  0.0  2.8  2092 1708  ??  I    10:03PM   0:00.00
/usr/local/sbin/httpd -DMOD_FP
nobody   363  0.0  2.8  2092 1708  ??  I    10:03PM   0:00.00
/usr/local/sbin/httpd -DMOD_FP
root     365  0.0  3.2  2652 1976  ??  S    10:03PM   0:01.90
/usr/local/bin/python /usr/local/abacus/hosts
root     367  0.0  0.9   880  572  ??  Is   10:03PM   0:00.01
/usr/local/psionic/portsentry/portsentry -tcp
root     369  0.0  0.9   880  572  ??  Is   10:03PM   0:00.18
/usr/local/psionic/portsentry/portsentry -udp
root     381  0.0  1.2  1052  756  v0  Ss+  10:03PM   0:04.67
/usr/libexec/getty Pc ttyv0
root     382  0.0  1.0   920  624  v1  Is+  10:03PM   0:00.01
/usr/libexec/getty Pc ttyv1
root     383  0.0  1.0   920  624  v2  Is+  10:03PM   0:00.01
/usr/libexec/getty Pc ttyv2
root     384  0.0  1.0   920  624  v3  Is+  10:03PM   0:00.01
/usr/libexec/getty Pc ttyv3
root     385  0.0  1.0   920  624  v4  Is+  10:03PM   0:00.01
/usr/libexec/getty Pc ttyv4
root     386  0.0  1.0   920  624  v5  Is+  10:03PM   0:00.01
/usr/libexec/getty Pc ttyv5
root     387  0.0  1.0   920  624  v6  Is+  10:03PM   0:00.01
/usr/libexec/getty Pc ttyv6
root     388  0.0  1.0   920  624  v7  Is+  10:03PM   0:00.01
/usr/libexec/getty Pc ttyv7
root     522  0.0  2.4  1840 1472  ??  S    12:36AM   0:00.31
/usr/local/sbin/sshd (sshd2)
dliu     523  0.0  1.4  1016  868  p0  Is   12:37AM   0:00.02 -bash (bash)
root     524  0.0  1.5  1276  916  p0  I    12:37AM   0:00.04 _su (csh)
root     526  0.0  1.5  1032  884  p0  S    12:37AM   0:00.03 bash
root       0  0.0  0.0     0    0  ??  DLs   6:03PM   0:00.01  (swapper)

nmap -sS -O localhost

Starting nmap V. 2.53 by fyodor@insecure.org ( www.insecure.org/nmap/ )
Interesting ports on localhost (127.0.0.1):
(The 1473 ports scanned but not shown below are in state: closed)
Port       State       Service
1/tcp      open        tcpmux
2/tcp      open        compressnet
3/tcp      open        compressnet
4/tcp      open        unknown
5/tcp      open        rje
7/tcp      open        echo
9/tcp      open        discard
11/tcp     open        systat
15/tcp     open        netstat
19/tcp     open        chargen
20/tcp     open        ftp-data
21/tcp     open        ftp
22/tcp     open        ssh
23/tcp     open        telnet
25/tcp     open        smtp
53/tcp     open        domain
70/tcp     open        gopher
79/tcp     open        finger
80/tcp     open        http
87/tcp     open        priv-term-l
109/tcp    open        pop-2
110/tcp    open        pop-3
111/tcp    open        sunrpc
119/tcp    open        nntp
138/tcp    open        netbios-dgm
139/tcp    open        netbios-ssn
143/tcp    open        imap2
144/tcp    open        news
512/tcp    open        exec
513/tcp    open        login
514/tcp    open        shell
515/tcp    open        printer
540/tcp    open        uucp
635/tcp    open        unknown
1023/tcp   open        unknown
1024/tcp   open        kdm
1080/tcp   open        socks
1524/tcp   open        ingreslock
2000/tcp   open        callbook
2001/tcp   open        dc
2049/tcp   open        nfs
6667/tcp   open        irc
8080/tcp   open        http-proxy
12345/tcp  open        NetBus
12346/tcp  open        NetBus
31337/tcp  open        Elite
32771/tcp  open        sometimes-rpc5
32772/tcp  open        sometimes-rpc7
32773/tcp  open        sometimes-rpc9
32774/tcp  open        sometimes-rpc11

TCP Sequence Prediction: Class=random positive increments
                         Difficulty=5406 (Worthy challenge)
Remote operating system guess: FreeBSD 2.2.1 - 4.0

/*             sockstat                         */
Nmap run completed -- 1 IP address (1 host up) scanned in 17 seconds
USER     COMMAND    PID   FD PROTO  LOCAL ADDRESS         FOREIGN ADDRESS
root     sshd2      522    6 tcp4   216.77.240.142.22     165.247.135.53.103
root     portsent   369    0 udp4   *.1035                *.*
root     portsent   369    1 udp4   *.1                   *.*
root     portsent   369    2 udp4   *.7                   *.*
root     portsent   369    3 udp4   *.9                   *.*
root     portsent   369    4 udp4   *.19                  *.*
root     portsent   369    5 udp4   *.66                  *.*
root     portsent   369    6 udp4   *.67                  *.*
root     portsent   369    7 udp4   *.69                  *.*
root     portsent   369    8 udp4   *.111                 *.*
root     portsent   369    9 udp4   *.137                 *.*
root     portsent   369   10 udp4   *.138                 *.*
root     portsent   369   11 udp4   *.161                 *.*
root     portsent   369   12 udp4   *.162                 *.*
root     portsent   369   13 udp4   *.177                 *.*
root     portsent   369   14 udp4   *.474                 *.*
root     portsent   369   15 udp4   *.513                 *.*
root     portsent   369   16 udp4   *.517                 *.*
root     portsent   369   17 udp4   *.518                 *.*
root     portsent   369   18 udp4   *.520                 *.*
root     portsent   369   19 udp4   *.635                 *.*
root     portsent   369   20 udp4   *.640                 *.*
root     portsent   369   21 udp4   *.641                 *.*
root     portsent   369   22 udp4   *.666                 *.*
root     portsent   369   23 udp4   *.700                 *.*
root     portsent   369   24 udp4   *.2049                *.*
root     portsent   369   25 udp4   *.28001               *.*
root     portsent   369   26 udp4   *.32770               *.*
root     portsent   369   27 udp4   *.32771               *.*
root     portsent   369   28 udp4   *.32772               *.*
root     portsent   369   29 udp4   *.32773               *.*
root     portsent   369   30 udp4   *.32774               *.*
root     portsent   369   31 udp4   *.31337               *.*
root     portsent   369   32 udp4   *.54321               *.*
root     portsent   367    0 tcp4   *.1024                *.*
root     portsent   367    1 tcp4   *.1                   *.*
root     portsent   367    2 tcp4   *.2                   *.*
root     portsent   367    3 tcp4   *.3                   *.*
root     portsent   367    4 tcp4   *.4                   *.*
root     portsent   367    5 tcp4   *.5                   *.*
root     portsent   367    6 tcp4   *.7                   *.*
root     portsent   367    7 tcp4   *.9                   *.*
root     portsent   367    8 tcp4   *.11                  *.*
root     portsent   367    9 tcp4   *.15                  *.*
root     portsent   367   10 tcp4   *.19                  *.*
root     portsent   367   11 tcp4   *.20                  *.*
root     portsent   367   12 tcp4   *.21                  *.*
root     portsent   367   13 tcp4   *.23                  *.*
root     portsent   367   14 tcp4   *.25                  *.*
root     portsent   367   15 tcp4   *.53                  *.*
root     portsent   367   16 tcp4   *.70                  *.*
root     portsent   367   17 tcp4   *.79                  *.*
root     portsent   367   18 tcp4   *.87                  *.*
root     portsent   367   19 tcp4   *.109                 *.*
root     portsent   367   20 tcp4   *.110                 *.*
root     portsent   367   21 tcp4   *.111                 *.*
root     portsent   367   22 tcp4   *.119                 *.*
root     portsent   367   23 tcp4   *.138                 *.*
root     portsent   367   24 tcp4   *.139                 *.*
root     portsent   367   25 tcp4   *.143                 *.*
root     portsent   367   26 tcp4   *.144                 *.*
root     portsent   367   27 tcp4   *.512                 *.*
root     portsent   367   28 tcp4   *.513                 *.*
root     portsent   367   29 tcp4   *.514                 *.*
root     portsent   367   30 tcp4   *.515                 *.*
root     portsent   367   31 tcp4   *.540                 *.*
root     portsent   367   32 tcp4   *.635                 *.*
root     portsent   367   33 tcp4   *.1080                *.*
root     portsent   367   34 tcp4   *.1114                *.*
root     portsent   367   35 tcp4   *.1524                *.*
root     portsent   367   36 tcp4   *.2000                *.*
root     portsent   367   37 tcp4   *.2001                *.*
root     portsent   367   38 tcp4   *.2049                *.*
root     portsent   367   39 tcp4   *.4000                *.*
root     portsent   367   40 tcp4   *.4001                *.*
root     portsent   367   41 tcp4   *.5742                *.*
root     portsent   367   42 tcp4   *.6667                *.*
root     portsent   367   43 tcp4   *.12345               *.*
root     portsent   367   44 tcp4   *.12346               *.*
root     portsent   367   45 tcp4   *.20034               *.*
root     portsent   367   46 tcp4   *.30303               *.*
root     portsent   367   47 tcp4   *.32771               *.*
root     portsent   367   48 tcp4   *.32772               *.*
root     portsent   367   49 tcp4   *.32773               *.*
root     portsent   367   50 tcp4   *.32774               *.*
root     portsent   367   51 tcp4   *.31337               *.*
root     portsent   367   52 tcp4   *.40421               *.*
root     portsent   367   53 tcp4   *.40425               *.*
root     portsent   367   54 tcp4   *.49724               *.*
root     portsent   367   55 tcp4   *.54320               *.*
nobody   httpd      363   16 tcp4   *.8080                *.*
nobody   httpd      363   17 tcp4   *.80                  *.*
nobody   httpd      362   16 tcp4   *.8080                *.*
nobody   httpd      362   17 tcp4   *.80                  *.*
nobody   httpd      361   16 tcp4   *.8080                *.*
nobody   httpd      361   17 tcp4   *.80                  *.*
nobody   httpd      360   16 tcp4   *.8080                *.*
nobody   httpd      360   17 tcp4   *.80                  *.*
nobody   httpd      359   16 tcp4   *.8080                *.*
nobody   httpd      359   17 tcp4   *.80                  *.*
root     sshd2      353    3 tcp4   *.22                  *.*
root     sshd2      353    4 udp4   *.22                  *.*
root     httpd      337   16 tcp4   *.8080                *.*
root     httpd      337   17 tcp4   *.80                  *.*
root     amd        272    4 udp4   *.1023                *.*
root     amd        272    5 tcp4   *.1023                *.*
root     amd        272    6 udp4   *.1022                *.*
root     amd        272    7 udp4   *.1021                *.*
root     amd        271    4 udp4   *.1023                *.*
root     amd        271    5 tcp4   *.1023                *.*
root     amd        271    6 udp4   *.1022                *.*
root     amd        271    7 udp4   *.1021                *.*
root     syslogd    262    4 udp4   *.514                 *.*
root     dhclient   108    3 udp4   *.*                   *.*
root     dhclient   108    6 udp4   *.68                  *.*

/*             rc.conf file               */
# This file now contains just the overrides from /etc/defaults/rc.conf
# please make all changes to this file.

# -- sysinstall generated deltas -- #
ifconfig_ed0="inet 192.168.0.1  netmask 255.255.255.0"
hostname="Finch"
linux_enable="NO"
moused_enable="YES"
gateway_enable="YES"
usbd_enable="NO"
ntpdate_flags="otc1.psu.edu"
ifconfig_xl0="DHCP"
hostname="finch.dyndns.com"
sendmail_enable="NO"
ipv6_enable="NO"
router_enable="NO"
ntpdate_enable="YES"
sshd_enable="NO"
firewall_enable="YES"
firewall_type="SIMPLE"
natd_enable="YES"
natd_interface="xl0"
inetd_enable="NO"
portmap_enable="NO"

# Later change to YES, prevents X-windows from running
kern_securelevel_enable="NO"

kern_securelevel="2"
amd_flags="-a /.amd_mnt -c 1800 -l syslog /host /etc/amd.map /net
/etc/amd.map"
amd_enable="YES"

-----Original Message-----
From: bobj@smtp.ufl.edu [mailto:bobj@smtp.ufl.edu]On Behalf Of Bob
Johnson
Sent: Friday, September 08, 2000 8:27 PM
To: David Liu
Cc: freebsd-doc@FreeBSD.ORG
Subject: Re: Documentation suggestion


David Liu wrote:
>
> Hi,
>
> I was trying to secure my Freebsd 4.1 server by following the handbook and
> disabled
> inetd.conf and as many of the services which I don't need. A nmap port
scan
> stiil show that
> many of my ports are still open. Please address this in your handbook. I
> need to know for example why port 12345 is open and how to shut it down.
>
> Thanks for your help and a great product,
>

The port scan doesn't match your config file.  If you didn't reboot
after editing the config file, then try rebooting and scanning again.

After you do that, if things aren't what you expect, post the scan and
the rc.conf, plus the result of "ps -ax", to questions@freebsd.org.

If, during this process, you can identify what specific shortcoming in
the documentation caused you difficulty, please post that information
to the doc list.  Actually, now that you mention it, I can't even find
instructions on disabling inetd.conf in the Handbook.  Were you reading
the Handbook, or a tutorial, or the FAQ, or The Complete FreeBSD?


Thanks,


-  Bob



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?LMECIAEPHBBFPHLIOHMNAEAECAAA.dliu>