On Wed, Jul 8, 2009 at 11:38 AM, Norbert Preining <prein...@logic.at> wrote:

> On Mi, 08 Jul 2009, Leandro Minatel wrote:
> > Right you are!, but, don't forget that there are more than 65500 ports to
>
> ??? Are you talking about trying the exploit on every single port? Then
> they would really be stupid. Calling nmap makes that much faster.
>
> No the code must be fixed if there is a hole, nothing else helps but
> turing off ssh.
>
> Best wishes
>
> Norbert
>
>
> -------------------------------------------------------------------------------
> Dr. Norbert Preining <prein...@logic.at>        Vienna University of
> Technology
> Debian Developer <prein...@debian.org>                         Debian TeX
> Group
> gpg DSA: 0x09C5B094      fp: 14DF 2E6C 0307 BE6D AD76  A9C0 D2BF 4AA3 09C5
> B094
>
> -------------------------------------------------------------------------------
> LUSBY (n.)
> The fold of flesh pushing forward over the top of a bra which is too
> small for the lady inside it.
>                        --- Douglas Adams, The Meaning of Liff
>
>
> --
> To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
> with a subject of "unsubscribe". Trouble? Contact
> listmas...@lists.debian.org
>
>
No, of course not. Maybe I expressed myself  "not in a proper way", sorry,
english is not my natural language. AFAIK, nmap, by default, scan ports from
1 to 1024 and those listed in nmap-services. This allows me to "hide"
ssh-server for the majority of mortals.

BTW, I agree with you, the code must be fixed, no doubt at all.

Regards
Leandro

Reply via email to