tycho
Guru (not...)
- Joined
- Aug 9, 2011
- Messages
- 652
- Reaction score
- 272
[Moved from that long I-PBX/Ubuntu 14.04 thread]
This relates to my Cloud-at-Cost install of:
Incredible PBX 12.7.1 for Ubuntu 14
Asterisk: UP Apache: UP MySQL: UP
SendMail: UP IPtables: UP SSH: UP
LAN eth0: UP Fail2Ban: UP Webmin: UP
RAM:35540 "Ubuntu 14.04.1 LTS" Disk: 59%
Asterisk 12.7.1 FreePBX 12.0.12
Private IP: 104.xxx.xxx.xxx
Public IP: 104.xxx.xxx.xxx
I just ran a scan on that instance from sipscanner.voipfraud.com. The scan reported the following:
The good:
Zero SIP services detected
Zero Extensions found
Zero Passwords cracked
"No Host Information"
("This is the information we were able to retrieve by scanning the given host. If the operating system hosting is too old and has known vulnerabilities, this can be exploited by attackers.")
What I didn't expect to see:
"Service Information"
("These are the open TCP ports that we found while scanning. While this doesn't necessarily indicate a problem, try to look for open ports/services that you don't expect.")
Port/Protocol--State--Service
113/tcp--closed--ident
1723/tcp--open--pptp
4445/tcp--closed--upnotifyp
Cause for concern? I don't fully understand the nooks and crannies of the whitelisting methodology implemented by I-PBX 12 for Ubuntu, but my beginner's understanding was that it would preclude the above open ports, and/or not respond to probes.
Are these a result of CoC's standard Ubuntu 14.04 LTS load? Do I need these ports? If not can I close them?