Date: 15 Jul 1999 11:26:11 -0500 From: Joel Ray Holveck <joelh@gnu.org> To: Matthew Dillon <dillon@apollo.backplane.com> Cc: Stephen Hocking-Senior Programmer PGS Tensor Perth <shocking@prth.pgs.com>, hackers@FreeBSD.ORG, shocking@bandicoot.prth.tensor.pgs.com Subject: Re: Setting up a firewall with dynamic IPs Message-ID: <86r9m9hobg.fsf@detlev.UUCP> In-Reply-To: Matthew Dillon's message of "Tue, 13 Jul 1999 19:06:40 -0700 (PDT)" References: <199907140116.JAA15266@ariadne.tensor.pgs.com> <199907140206.TAA85713@apollo.backplane.com>
next in thread | previous in thread | raw e-mail | index | archive | help
> Usually if a connection succeeds the firewall isn't stopping it > at all. How is nmap figuring out the service type? I assume by > making a connection and probing it. Nothing so elegant. It uses /etc/services. Most of its scans never finish opening the connection. (This is why it will normally mislabel RPC services; if in doubt, use rpcinfo.) joelh -- Joel Ray Holveck - joelh@gnu.org Fourth law of programming: Anything that can go wrong wi sendmail: segmentation violation - core dumped To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?86r9m9hobg.fsf>