Hi! ich hab' mir die Nessus Packages von Woody geholt.(sonst hab ich überall potato, ausser helix-gnome) Ein Scann meines System hat einige Sicherheitslücken an den Tag gebracht. Jetzt hätt ich da mal einige Fragen... (ich schicke die Ausgabe vom Scann als HTML mit!) Wozu brauche ich den "auth" Service?? Wie kann ich meinen X-Server mit xauth absichern und was muss ich beachten wenn ich xdm benutze??? Wozu brauche ich RPC? Wozu brauche ich daytime? Wozu brauche ich den nlockmgr RPC-Service?? Ich muss zugeben, dass ich mich mit dem Zeugs nich so gut auskenne... Gruß Thomas -- \\|||// Thomas Prätzlich | | @: thomas@praetzlich.de (.) (.) www: thomas.praetzlich.de =oOO==(_)==OOo==========================Title: Nessus Scan Report
Number of hosts which were alive during the test : 1 Number of security holes found : 3 Number of security warnings found : 6 Number of security notes found : 3
127.0.0.1 : List of open ports :
Warning found on port daytime (13/tcp)
The daytime service is running. Vulnerability found on port smtp (25/tcp) It was possible to crash the remote SMTP server by opening a great amount of sockets on it. This problem allows crackers to make your SMTP server crash, thus preventing you from sending or receiving e-mails, which will affect your work. Solution : If your SMTP server is contrained to a maximum number of processes, i.e. it's not running as root and as a ulimit 'max user processes' of 256, you may consider upping the limit with 'ulimit -u'. If your server has the ability to protect itself from SYN floods, you should turn on that features, i.e. Linux's CONFIG_SYN_COOKIES The best solution may be cisco's 'TCP intercept' feature. Risk factor : Serious CVE : CAN-1999-0846 Information found on port smtp (25/tcp)
Remote SMTP server banner : Information found on port www (80/tcp)
The remote web server type is : Warning found on port auth (113/tcp)
The 'ident' service provides sensitives informations Warning found on port unknown (3001/tcp) Nessus Daemon open on port TCP:3001, NessusD version: NTP/1.2 Warning found on port unknown (5865/tcp) a web server is running on this port Vulnerability found on port unknown (6000/tcp)
allows a cracker to connect to it and record any of your keystrokes Here is the server type : The XFree86 Project, Inc Solution : use xauth or MIT cookies to restrict the access to this server Risk factor : High CVE : CVE-1999-0526 Information found on port general/udp
For your information, here is the traceroute to 127.0.0.1 : Warning found on port unknown (772/udp)
Vulnerability found on port unknown (759/udp) The statd RPC service is running. This service has a long history of security holes, so you should really know what you are doing if you decide to let it run. * NO SECURITY HOLE REGARDING THIS PROGRAM HAVE BEEN TESTED, SO THIS MIGHT BE A FALSE POSITIVE * We suggest you to disable this service. Risk factor : High CVE : CVE-1999-0018 Warning found on port unknown (1024/udp)
This file was generated by Nessus, the open-sourced security scanner. |