06-14-2011
The ephemeral port range on Solaris is 32768 through 65535
This User Gave Thanks to fpmurphy For This Post:
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I have been looking for info on how to aggregate 2 ore 3 NIC's into into one big pipe. Any advice would be appreciated.
-Chuck (4 Replies)
Discussion started by: 98_1LE
4 Replies
2. UNIX for Dummies Questions & Answers
Is there a way to change a privileged TCP port (say 80) to a nonprivileged one.. (9 Replies)
Discussion started by: sssow
9 Replies
3. UNIX for Dummies Questions & Answers
Hello,
I have a number of Solaris 8 Sun servers that have open ports that I cannot identify. I see some with 1012-1020 (which are reserved ports according to the IANA. Lsof does not identify these. One server has all these on and one server just has 1017.
*.1023 ... (3 Replies)
Discussion started by: csross
3 Replies
4. Solaris
Hello,
I have a number of Solaris 8 Sun servers that have open ports that I cannot identify. I see some with 1013-1023 (which are reserved ports according to the IANA. Lsof does not identify these. I rebooted the server and they went off, but this morning I saw they were all back on again. Any... (1 Reply)
Discussion started by: csgonan
1 Replies
5. Solaris
please provide info. @ how to open ports in solaris?
and how to check that which port assigns with which process. (5 Replies)
Discussion started by: ajitkraj
5 Replies
6. Cybersecurity
Hi,
I am trying to close all possible ports on my solaris and linux servers.
I am stuck on the following ports on both Solaris 10 (local zone) and Linux (Suse) servers.
Here is nmap output :
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
1720/tcp open H.323/Q.931... (6 Replies)
Discussion started by: manifesto
6 Replies
7. Solaris
hi guys,
may i know the exact steps to open a port in solaris.i have some rough idea - which is adding the port number in /etc/services.
but i am not sure the correct conventions, steps or any other steps.
kindly advise.thanks guys ! (1 Reply)
Discussion started by: cromohawk
1 Replies
8. Solaris
Hi,
I want to block all outgoing connection ( the IMAP ) to my exchnage . I have to do it in my solaris server; from solaris host no outgoing connection can be made to the imap server.
Please help me to configure that.
I am new in solaris.
Kind regards,
Akhtar (2 Replies)
Discussion started by: akhtarbd
2 Replies
9. UNIX for Dummies Questions & Answers
Howdy Experts,
This is my first post here and I am posting because I have not been able to find an answer for this question.
How do you find out what process is listening on a given port? I do not have "lsof" available and how do we find this out without logging in as Root.
I know that this... (5 Replies)
Discussion started by: KingaKoopa
5 Replies
LEARN ABOUT NETBSD
rfc6056
RFC6056(7) BSD Miscellaneous Information Manual RFC6056(7)
NAME
rfc6056 -- port randomization algorithms
DESCRIPTION
The rfc6056 algorithms are used in order to randomize the port allocation of outgoing UDP packets, in order to provide protection from a
series of ``blind'' attacks based on the attacker's ability to guess the sequence of ephemeral ports associated with outgoing packets. For
more information consult RFC 6056.
The individual algorithms are described below:
The RFC 6056 algorithms
The following algorithms are available:
bsd This is the default NetBSD port selection algorithm, which starts from anonportmax and proceeds decreasingly through the avail-
able ephemeral ports.
random_start Select ports randomly from the available ephemeral ports. In case a collision with a local port is detected, the algorithm
proceeds decreasingly through the sequence of ephemeral ports until a free port is found. Note that the random port selection
algorithms are not guaranteed to find a free port.
random_pick Select ports randomly from the available ephemeral ports. In case a collision with a local port is detected the algorithm
tries selecting a new port randomly until a free port is found.
hash Select ports using a md5(3) hash of the local address, the foreign address, and the foreign port. Note that in the case of a
bind(2) call some of this information might be unavailable and the port selection is delayed until the time of a connect(2)
call, performed either explicitly or up calling sendto(2).
doublehash Select ports using a md5(3) hash of the local address, foreign address, and foreign port coupled with a md5(3) hash of the same
components obtained using a separate table that is associated with a subset of all outgoing connections. The same considera-
tions regarding late connection as in the case of hash apply.
randinc Use random increments in order to select the next port.
SYSCTL CONTROLS
The following sysctl controls are available for selecting the default port randomization algorithm:
sysctl name Type Changeable
net.inet.udp.rfc6056.available string no
net.inet.udp.rfc6056.selected string yes
net.inet6.udp6.rfc6056.available string no
net.inet6.udp6.rfc6056.selected string yes
SOCKET OPTIONS
The socket option UDP_RFC6056ALGO at the IPPROTO_UDP level can be used with a string argument specifying the algorithm's name in order to
select the port randomization algorithm for a specific socket. For more info see setsockopt(2).
SEE ALSO
setsockopt(2), sysctl(3), sysctl(7)
HISTORY
The rfc6056 algorithms first appeared in NetBSD 6.0.
BSD
August 25, 2011 BSD