port 389

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello , 
I asked for some frineds of mine to scan mly host , and they all find my 389 
port opened . here is the report , for those who understand french : 
http://www.tsenagasy.com/forum/viewtopic.php?p=33992#33992

i dont understand what's happening :

netstat | grep 389 
gives nothing , and
this is my set of rules .
would you help me to see , what is wrong ? or is the 389 just an "answer" 
port ?


iptables -P INPUT DROP
iptables -A INPUT -p tcp --syn -m limit --limit 1/s -j ACCEPT
iptables -A INPUT -p tcp --tcp-flags SYN,ACK,FIN,RST RST -m limit --limit 1/s 
-j ACCEPT
iptables -A INPUT -i ppp0 -m unclean -j LOG --log-level debug --log-prefix 
"unclean_: "
iptables -A INPUT -i ppp0 -m unclean -j DROP
iptables -A INPUT -i lo -j ACCEPT
iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
iptables -A INPUT -p tcp --dport 20 -j ACCEPT
iptables -A INPUT -p tcp --dport 21 -j ACCEPT
iptables -A INPUT -p tcp --dport 25 -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j ACCEPT
iptables -A INPUT -p tcp --dport 8090 -j ACCEPT
iptables -A INPUT -p tcp --dport 8080 -j ACCEPT
iptables -A INPUT -p tcp --dport 10080 -j ACCEPT
iptables -A INPUT -p tcp --dport 9000 -j ACCEPT
iptables -A INPUT -p icmp -j ACCEPT
iptables -A INPUT -p tcp --syn -m limit --limit 10/s -j LOG --log-level debug 
--log-prefix "syn_flood_attack_: "
iptables -A INPUT -p tcp --tcp-flags SYN,ACK,FIN,RST RST -m limit --limit 10/s 
-j LOG --log-level debug --log-prefix "port_scan_attack_: "
iptables -A INPUT -j LOG --log-level debug --log-prefix "dropped_input_: "

-- 
Rakotomandimby Mihamina Andrianifaharana
Tel : +33 2 38 76 43 65
http://stko.dyndns.info/site_principal/Members/mihamina



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux