List, Below I have attached an excerpt of dmesg from the other night. Of particular interest is the messages from X about an illegal attempt to access hardware.
I left my machine with the desktop locked and was doing other things. I returned and found a login screen. I tried to log back in but was immediately kicked out. I was able to login using an Alt+Fn screen and tried to check things over. Eventuall I just rebooted and was able to then login. It was a particularly stormy evening and I did note some messages verifying that the ups was logging brief power outages (lightening strikes?). I am concerned since I noted in a recent thread about seeing shorewall messages on my local terminals (alt+F1 etc). So I guess I'm asking did someone attempt illegal access to my machine or perhaps my apcupsd software is buggy? Thanks for reading, Terry Terry Golightly ... [EMAIL PROTECTED] ... Pittsburgh, Pa Mandrake Linux release 10.0 (Official) for i586 kernel 2.6.3-9mdk-i686-up-4GB 13:59:45 up 2:38, 3 users, load average: 0.00, 0.03, 0.09 Life is too short to be taken seriously. -- Oscar Wilde
mtrr: 0xe4000000,0x2000000 overlaps existing 0xe4000000,0x1000000 atkbd.c: Unknown key released (translated set 2, code 0x7a on isa0060/serio0). atkbd.c: This is an XFree86 bug. It shouldn't access hardware directly. Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=201.40.221.118 DST=151.201.32.59 LEN=837 TOS=0x00 PREC=0x00 TTL=112 ID=53831 PROTO=UDP SPT=25121 DPT=1029 LEN=817 Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=141.158.118.74 DST=151.201.32.59 LEN=48 TOS=0x00 PREC=0x00 TTL=125 ID=27702 DF PROTO=TCP SPT=2691 DPT=5000 WINDOW=16384 RES=0x00 SYN URGP=0 Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.240.235 DST=151.201.32.59 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=51116 DF PROTO=TCP SPT=4510 DPT=2745 WINDOW=64800 RES=0x00 SYN URGP=0 Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.240.235 DST=151.201.32.59 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=51118 DF PROTO=TCP SPT=4545 DPT=1025 WINDOW=64800 RES=0x00 SYN URGP=0 Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.240.235 DST=151.201.32.59 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=51120 DF PROTO=TCP SPT=4580 DPT=3127 WINDOW=64800 RES=0x00 SYN URGP=0 Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.240.235 DST=151.201.32.59 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=51121 DF PROTO=TCP SPT=4611 DPT=6129 WINDOW=64800 RES=0x00 SYN URGP=0 Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.240.235 DST=151.201.32.59 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=51847 DF PROTO=TCP SPT=4510 DPT=2745 WINDOW=64800 RES=0x00 SYN URGP=0 Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.240.235 DST=151.201.32.59 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=51849 DF PROTO=TCP SPT=4545 DPT=1025 WINDOW=64800 RES=0x00 SYN URGP=0 Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.240.235 DST=151.201.32.59 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=53029 DF PROTO=TCP SPT=4611 DPT=6129 WINDOW=64800 RES=0x00 SYN URGP=0 Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.240.235 DST=151.201.32.59 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=53030 DF PROTO=TCP SPT=4580 DPT=3127 WINDOW=64800 RES=0x00 SYN URGP=0 Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.240.235 DST=151.201.32.59 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=53032 DF PROTO=TCP SPT=4545 DPT=1025 WINDOW=64800 RES=0x00 SYN URGP=0 Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.240.235 DST=151.201.32.59 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=53034 DF PROTO=TCP SPT=4510 DPT=2745 WINDOW=64800 RES=0x00 SYN URGP=0 Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.152.161 DST=151.201.32.59 LEN=48 TOS=0x00 PREC=0x00 TTL=122 ID=49561 DF PROTO=TCP SPT=4286 DPT=2745 WINDOW=64800 RES=0x00 SYN URGP=0 Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.152.161 DST=151.201.32.59 LEN=48 TOS=0x00 PREC=0x00 TTL=122 ID=49712 DF PROTO=TCP SPT=4286 DPT=2745 WINDOW=64800 RES=0x00 SYN URGP=0 Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.152.161 DST=151.201.32.59 LEN=48 TOS=0x00 PREC=0x00 TTL=122 ID=49993 DF PROTO=TCP SPT=4286 DPT=2745 WINDOW=64800 RES=0x00 SYN URGP=0 Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=212.32.50.23 DST=151.201.32.59 LEN=758 TOS=0x00 PREC=0x00 TTL=115 ID=47821 PROTO=UDP SPT=20062 DPT=1026 LEN=738 Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=69.93.32.202 DST=151.201.32.59 LEN=48 TOS=0x00 PREC=0x00 TTL=109 ID=8914 DF PROTO=TCP SPT=3475 DPT=4899 WINDOW=65535 RES=0x00 SYN URGP=0 Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.123.157 DST=151.201.32.59 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=36031 DF PROTO=TCP SPT=3236 DPT=2745 WINDOW=16384 RES=0x00 SYN URGP=0 Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.123.157 DST=151.201.32.59 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=36033 DF PROTO=TCP SPT=3238 DPT=1025 WINDOW=16384 RES=0x00 SYN URGP=0 Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.123.157 DST=151.201.32.59 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=36035 DF PROTO=TCP SPT=3241 DPT=3127 WINDOW=16384 RES=0x00 SYN URGP=0 Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.123.157 DST=151.201.32.59 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=36036 DF PROTO=TCP SPT=3243 DPT=6129 WINDOW=16384 RES=0x00 SYN URGP=0 Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.123.157 DST=151.201.32.59 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=36390 DF PROTO=TCP SPT=3238 DPT=1025 WINDOW=16384 RES=0x00 SYN URGP=0 Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.123.157 DST=151.201.32.59 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=36406 DF PROTO=TCP SPT=3243 DPT=6129 WINDOW=16384 RES=0x00 SYN URGP=0 Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.123.157 DST=151.201.32.59 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=36407 DF PROTO=TCP SPT=3236 DPT=2745 WINDOW=16384 RES=0x00 SYN URGP=0 Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.123.157 DST=151.201.32.59 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=36408 DF PROTO=TCP SPT=3241 DPT=3127 WINDOW=16384 RES=0x00 SYN URGP=0 Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.123.157 DST=151.201.32.59 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=37157 DF PROTO=TCP SPT=3238 DPT=1025 WINDOW=16384 RES=0x00 SYN URGP=0 Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.123.157 DST=151.201.32.59 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=37169 DF PROTO=TCP SPT=3243 DPT=6129 WINDOW=16384 RES=0x00 SYN URGP=0 Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.123.157 DST=151.201.32.59 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=37171 DF PROTO=TCP SPT=3241 DPT=3127 WINDOW=16384 RES=0x00 SYN URGP=0 Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.123.157 DST=151.201.32.59 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=37172 DF PROTO=TCP SPT=3236 DPT=2745 WINDOW=16384 RES=0x00 SYN URGP=0 mtrr: 0xe4000000,0x2000000 overlaps existing 0xe4000000,0x1000000 atkbd.c: Unknown key released (translated set 2, code 0x7a on isa0060/serio0). atkbd.c: This is an XFree86 bug. It shouldn't access hardware directly. mtrr: 0xe4000000,0x2000000 overlaps existing 0xe4000000,0x1000000 atkbd.c: Unknown key released (translated set 2, code 0x7a on isa0060/serio0). atkbd.c: This is an XFree86 bug. It shouldn't access hardware directly. mtrr: 0xe4000000,0x2000000 overlaps existing 0xe4000000,0x1000000 atkbd.c: Unknown key released (translated set 2, code 0x7a on isa0060/serio0). atkbd.c: This is an XFree86 bug. It shouldn't access hardware directly. mtrr: 0xe4000000,0x2000000 overlaps existing 0xe4000000,0x1000000 atkbd.c: Unknown key released (translated set 2, code 0x7a on isa0060/serio0). atkbd.c: This is an XFree86 bug. It shouldn't access hardware directly. mtrr: 0xe4000000,0x2000000 overlaps existing 0xe4000000,0x1000000 atkbd.c: Unknown key released (translated set 2, code 0x7a on isa0060/serio0). atkbd.c: This is an XFree86 bug. It shouldn't access hardware directly. mtrr: 0xe4000000,0x2000000 overlaps existing 0xe4000000,0x1000000 atkbd.c: Unknown key released (translated set 2, code 0x7a on isa0060/serio0). atkbd.c: This is an XFree86 bug. It shouldn't access hardware directly. Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=221.232.160.103 DST=151.201.32.59 LEN=325 TOS=0x00 PREC=0x00 TTL=99 ID=0 DF PROTO=UDP SPT=777 DPT=1027 LEN=305
____________________________________________________ Want to buy your Pack or Services from MandrakeSoft? Go to http://www.mandrakestore.com Join the Club : http://www.mandrakeclub.com ____________________________________________________