Date: Wed, 29 May 2002 22:06:13 -0500 From: George.Giles@mcmail.vanderbilt.edu To: freebsd-security@freebsd.org Subject: ipfw issue with nmap false alarms Message-ID: <OFB74AFA63.4553FCA4-ON86256BC9.0010C509@MC.VANDERBILT.EDU>
next in thread | raw e-mail | index | archive | help
nmap reports as expected when scanning the actual ip address, but when run against localhost various open ports show up. Any ideas ? Starting nmap V. 2.54BETA29 ( www.insecure.org/nmap/ ) Interesting ports on localhost (127.0.0.1): (The 1540 ports scanned but not shown below are in state: closed) Port State Service 21/tcp open ftp 22/tcp open ssh 53/tcp open domain 80/tcp open http 443/tcp open https 1669/tcp open netview-aix-9 Nmap run completed -- 1 IP address (1 host up) scanned in 9 seconds bash-2.05$ nmap localhost Starting nmap V. 2.54BETA29 ( www.insecure.org/nmap/ ) Interesting ports on localhost (127.0.0.1): (The 1540 ports scanned but not shown below are in state: closed) Port State Service 21/tcp open ftp 22/tcp open ssh 53/tcp open domain 80/tcp open http 443/tcp open https 2044/tcp open rimsl Nmap run completed -- 1 IP address (1 host up) scanned in 9 seconds bash-2.05$ nmap localhost Starting nmap V. 2.54BETA29 ( www.insecure.org/nmap/ ) Interesting ports on localhost (127.0.0.1): (The 1539 ports scanned but not shown below are in state: closed) Port State Service 21/tcp open ftp 22/tcp open ssh 53/tcp open domain 80/tcp open http 443/tcp open https 2003/tcp open cfingerd 3306/tcp open mysql To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?OFB74AFA63.4553FCA4-ON86256BC9.0010C509>