为了让linux主机少一些隐患,我们要尽可能把一些不需要的服务取消或者删掉。
我们可以先来看看目前有哪些端口是开着的
[root@localhost linsc]# nmap 127.0.0.1
Starting nmap 3.70 ( http://www.insecure.org/nmap/ ) at 2007-12-05 21:28 CST
Interesting ports on localhost.localdomain (127.0.0.1):
(The 1652 ports scanned but not shown below are in state: closed)
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
25/tcp open smtp
80/tcp open http
766/tcp open unknown
3306/tcp open mysql
8009/tcp open ajp13
8080/tcp open http-proxy
Nmap run completed -- 1 IP address (1 host up) scanned in 0.194 seconds
可以看到 766 端口是打开着的,一个 unknown 的服务正在运行,这是什么服务?这个时候我也不知道。
[root@localhost linsc]# netstat -lp
可以看到有下面一条内容,
tcp 0 0 *:766 *:* LISTEN 3128/rpc.statd
说明是 rpc.statd 正在运行。
就看766是什么命令执行的监听端口的另外一个办法
[root@localhost linsc]# lsof -i:766
COMMAND PID USER FD TYPE DEVICE SIZE NODE NAME
rpc.statd 3128 rpcuser 8u IPv4 6467 TCP *:766 (LISTEN)
查看rpc.statd这个命令是那个安装包的文档
[root@localhost linsc]# rpm -qf /sbin/rpc.statd
nfs-utils-1.0.6-80.EL4
查看nfs开头有那些东东
[root@localhost linsc]# ls /etc/init.d/nfs*
/etc/init.d/nfs /etc/init.d/nfslock
查看nfslock状态
[root@localhost linsc]# /etc/init.d/nfslock status
rpc.statd (pid 3128) 正在运行...
[root@localhost linsc]# vi /etc/services
找到里面的 nfs ,在前面加 # 注释掉,重启,
[root@localhost linsc]# nmap 127.0.0.1
Starting nmap 3.70 ( http://www.insecure.org/nmap/ ) at 2007-12-05 21:55 CST
Interesting ports on localhost.localdomain (127.0.0.1):
(The 1653 ports scanned but not shown below are in state: closed)
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
25/tcp open smtp
80/tcp open http
3306/tcp open mysql
8009/tcp open ajp13
8080/tcp open http-proxy
Nmap run completed -- 1 IP address (1 host up) scanned in 0.194 seconds