Skip site navigation (1)Skip section navigation (2)
Date:      15 Jul 1999 11:26:11 -0500
From:      Joel Ray Holveck <joelh@gnu.org>
To:        Matthew Dillon <dillon@apollo.backplane.com>
Cc:        Stephen Hocking-Senior Programmer PGS Tensor Perth <shocking@prth.pgs.com>, hackers@FreeBSD.ORG, shocking@bandicoot.prth.tensor.pgs.com
Subject:   Re: Setting up a firewall with dynamic IPs
Message-ID:  <86r9m9hobg.fsf@detlev.UUCP>
In-Reply-To: Matthew Dillon's message of "Tue, 13 Jul 1999 19:06:40 -0700 (PDT)"
References:  <199907140116.JAA15266@ariadne.tensor.pgs.com> <199907140206.TAA85713@apollo.backplane.com>

next in thread | previous in thread | raw e-mail | index | archive | help
> Usually if a connection succeeds the firewall isn't stopping it
> at all.  How is nmap figuring out the service type?  I assume by
> making a connection and probing it.

Nothing so elegant.  It uses /etc/services.  Most of its scans never
finish opening the connection.  (This is why it will normally mislabel
RPC services; if in doubt, use rpcinfo.)

joelh

-- 
Joel Ray Holveck - joelh@gnu.org
   Fourth law of programming:
   Anything that can go wrong wi
sendmail: segmentation violation - core dumped


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?86r9m9hobg.fsf>