HP3000-L Archives

February 2002, Week 1

HP3000-L@RAVEN.UTC.EDU

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Reply To:
Date:
Wed, 6 Feb 2002 16:30:22 +0100
Content-Type:
text/plain
Parts/Attachments:
text/plain (158 lines)
Not so far.
   A port known to exist is a good candidate to be
opened/closed/restricted; most trojan horses rely on high numbered ports
known only to the attacker. If know a port's existence, you can protect it.

   A port scanner is some mean of brute force. I suggest you to have a look
at nmap/nessus. You'll be scared of what you can get.

   A password is not obscurity. Is a key to open a door. If you use public
keys, obscurity is reduced.

   Please note these comments are my personal opinions, not my employer's

   Best regards,

    -- Andres j. Ogayar
    -- I.T. Department
    -- Raytheon Microelectronics Espaņa (Malaga, Spain)
    -- +34.95.224.92.27






                                                                                                  
                    Gibson Nichols                                                                
                    <gnichol3@FORD        Para:   [log in to unmask]                          
                    .COM>                 cc:                                                     
                    Enviado por:          Asunto:      Re: List of ports used by MPE              
                    HP-3000                                                                       
                    Systems                                                                       
                    Discussion                                                                    
                    <HP3000-L@RAVE                                                                
                    N.UTC.EDU>                                                                    
                                                                                                  
                                                                                                  
                    06/02/2002                                                                    
                    16:02                                                                         
                    Por favor,                                                                    
                    responda a                                                                    
                    Gibson Nichols                                                                
                                                                                                  
                                                                                                  




   Well, no.  I don't know that the only way to protect a port/service is
knowing its existence.

I suspect that many hackers try brute force methods to find ports instead
of
a using a port scanner.

How does knowing a port/service protect it?  I thought the idea was you
find
the port/services
you use then you allow them.

Obscurity is a common way of protecting data.  A password is a form of
obscurity isn't it?

I recall a telecommunication technician working on our network.  He
connected a device
which showed him some passwords (we no longer use that communication
method).
I guess, someone with a port scanner is more dangerous than someone who
doesn't have
one.  Better tools will result in better results regardless of intent.


<[log in to unmask]> wrote in message
news:a3qrdt02g1j@enews4.newsguy.com...
> Protection through obscurity?
>    Haven't you heard about port scanners?
>
>    Don't you know the only mean to protect a port/service is knowing its
> existence?
>
>    Regards,
>
>     -- Andres j. Ogayar
>     -- I.T. Department
>     -- Raytheon Microelectronics Espaņa (Malaga, Spain)
>     -- +34.95.224.92.27
>
>
>
>
>
>
>
>                     Gibson Nichols
>                     <gnichol3@FORD        Para:   [log in to unmask]
>                     .COM>                 cc:
>                     Enviado por:          Asunto:      Re: List of ports
used by MPE
>                     HP-3000
>                     Systems
>                     Discussion
>                     <HP3000-L@RAVE
>                     N.UTC.EDU>
>
>
>                     05/02/2002
>                     20:47
>                     Por favor,
>                     responda a
>                     Gibson Nichols
>
>
>
>
>
>
>    Thanks to all who helped.  I'll refrain from posting a list of the
ports
> since someone may be
> able to obtain this information for bad uses.
>
> "Gibson Nichols" <[log in to unmask]> wrote in message
> news:a3mpah$fj69@eccws12.dearborn.ford.com...
> >
> > I need to have a list of the ports (network) used by the HP e3000.
> >
> > Does NS/VT use TCP/IP and a port?  Is the system using TCP/IP with all
> > the other traffic sitting up higher in the tcp/ip stack?
> >
> > We are look at moving one of our systems outside our firewall and we
> > will be tunneling so the security guy wants to know what he should
allow.
> >
> >
>
> * To join/leave the list, search archives, change list settings, *
> * etc., please visit http://raven.utc.edu/archives/hp3000-l.html *
>
>
>
>
>
>
> * To join/leave the list, search archives, change list settings, *
> * etc., please visit http://raven.utc.edu/archives/hp3000-l.html *
>

* To join/leave the list, search archives, change list settings, *
* etc., please visit http://raven.utc.edu/archives/hp3000-l.html *






* To join/leave the list, search archives, change list settings, *
* etc., please visit http://raven.utc.edu/archives/hp3000-l.html *

ATOM RSS1 RSS2