On Tue, 26 May 2009 09:40:01 +0000
Michael Shalayeff <mic...@lucifier.net> wrote:

> On Mon, May 25, 2009 at 10:51:01PM +0200, rembra...@jpberlin.de wrote:
> > > this does not add any security.
> > 
> > I think differently:
> > http://seclists.org/bugtraq/1996/Feb/0023.html
> > 
> > Also there is no loss during deactivating those services from my point of
> > view.
> 
> you can know what uid inetd(8) is running on by reading
> the sources that are available publicly.
> cu

You might miss the point Mickey. You can query the ID for any service.
Not just identd.

Even this scan technic was removed from the public sources long ago:
http://nmap.org/nmap_doc.html#ident

"TCP reverse ident scanning : As noted by Dave Goldsmith in a 1996
Bugtraq post, the ident protocol (rfc1413) allows for the disclosure of
the username of the owner of any process connected via TCP, even if
that process didn't initiate the connection. So you can, for example,
connect to the http port and then use identd to find out whether the
server is running as root. This can only be done with a full TCP
connection to the target port (i.e. the -t option). nmap's -i option
queries identd for the owner of all listen()ing ports."


Kind regards,
Rembrandt

Reply via email to