On Thursday 22 February 2007, Michael Sullivan wrote:

>  Also, I've always heard that you shouldn't
> have any ports open on your machine unless you have some server bound
> to that port because hackers can get in through unbound open ports.
>  Is this true?  If so, how does it work?

That sounds like something out of Hollywod, perhaps that atrocious movie 
called Hackers with Angelina Jolie in it.....

I fail to see how, in this universe, you can open a port and not have 
something listen on it. Let's face it: a process, or the kernel itself, 
asks to be informed about packets arriving for port X. What is port X? 
It's a number in the TCP/UDP packet so the receiving kernel knows which 
process to send the data to. If that process is not listening, the 
packets go ... nowhere. They don't have magic Gandalfs inside them that 
suddenly sprout up and do l33t h4x0r sh1t to your machine.

Maybe there's some default behaviour the kernel applies to packets that 
are sent to hung/sleeping/absent processes. Maybe that default 
behaviour is such that there's a buffer overflow waiting to be 
exploited. Maybe... I think I wanna see the code and not some bullshit 
posted on an arb blog somewhere.

You should be much more worried about vulnerabilities  in known software 
that you don't really use that are running by default.

By far the most common attack vector is weak user names and passwords 
accessed via ssh. Solution is a sensbile password policy, or allow ssh 
access only via keys.

Then there's php, but I don't think you want to get me started on 
that...

alan

-- 
Optimists say the glass is half full,
Pessimists say the glass is half empty,
Developers say wtf is the glass twice as big as it needs to be?

Alan McKinnon
alan at linuxholdings dot co dot za
+27 82, double three seven, one nine three five
--
gentoo-user@gentoo.org mailing list

Reply via email to