LinuxQuestions.org

LinuxQuestions.org (/questions/)
-   Linux - Security (https://www.linuxquestions.org/questions/linux-security-4/)
-   -   TCP port 603 open (https://www.linuxquestions.org/questions/linux-security-4/tcp-port-603-open-170660/)

sharpie 04-15-2004 04:42 PM

TCP port 603 open
 
I ran a portscan on myself and it seems I have TCP port 603 open. I've tried finding out any services running on this port by checking /etc/services and searching the web, but I can't find anything. I don't think it was open before, do you think something's wrong?

Capt_Caveman 04-15-2004 06:02 PM

Hard to say without knowing more. Try using netstat -pantu or lsof -i to see what application/process is utilizing that port.

sharpie 04-15-2004 09:42 PM

Here is the line from netstat -pantu:

Code:

tcp        0      0 0.0.0.0:603            0.0.0.0:*              LISTEN
And lsof -i:

Code:

inetd    1699 root    4u  IPv4  1374      TCP *:603 (LISTEN)
I can't make out anything from it... Can you?

Capt_Caveman 04-15-2004 11:18 PM

The netstat output doesn't really tell us much, but lsof -i does. First, it tells us that the port is being opened by inetd. Inetd acts as kind of like a intermediate server, where a given service is run through the inetd server. So instead of having a individual daemon listening at that port for connections, inetd will do the listening and then when that specific service is required it will pass the connection off to the specific daemon (hence the nickname "Inetd superServer"). That way you don't need to have multiple daemons listening at the same time and wasting resources.

Now, go to the /etc/inted.conf file and look for any uncommented services that either specifically list port 603 or that aren't readily apparent as to what they do.

Also are you running any kind of intrusion detection software? TCP port 603 is reserved for IDXP or Intrusion Detection Exchange protocol, which is used by various IDS applications to communicate with each other or with something like a central logging server. However, just because a certain port number is normally used by a service or protocol doesn't guarantee that's what is actually running.

sharpie 04-21-2004 04:42 AM

I don't have any kind of IDS software running. I checked my inetd.conf file and found this line uncommented at the end:

Code:

sgi_fam/1-2 stream rpc/tcp wait root /usr/sbin/famd famd
I commented it and now the port is closed.

It's called the File Alteration Monitor. Here is the URL. On the site:

Quote:

What is FAM?

FAM, the File Alteration Monitor, provides an API that applications can use to be notified when specific files or directories are changed.

FAM comes in two parts: fam, the daemon that listens for requests and delivers notification, and libfam, a library that client applications can use to communicate with fam.
I'm guessing some program installed it, as I had previously commented out every line in my inetd.conf. Do you have any idea of what program might have put it there?

Capt_Caveman 04-21-2004 08:03 AM

The only things I can think of that use sgi_fam are some of the GUI file managers (like Nautilus) and NFS/RPC stuff. Normally I would say when you think something had been modified, immediately use the stat command to see if you can determine the last modification time/date. Since you've already modified it, that won't do much good now though.

SGI_FAM is a pretty common thing with most distros and is turned on by default in many of them. If you are paranoid about it, you can get an md5sum of the famd binary and compare that to a known good version.

sharpie 04-21-2004 09:48 PM

I recently installed dropline-gnome under Slackware, I have a feeling that installed it.

Thanks for all the help.


All times are GMT -5. The time now is 12:29 AM.