List,

Below I have attached an excerpt of dmesg from the other night.  Of
particular interest is the messages from X about an illegal attempt to
access hardware.  

I left my machine with the desktop locked and was doing other things. I
returned and found a login screen.  I tried to log back in but was
immediately kicked out. I was able to login using an Alt+Fn screen and
tried to check things over. Eventuall I just rebooted and was able to
then login. It was a particularly stormy evening and I did note some
messages verifying that the ups was logging brief power outages
(lightening strikes?).  I am concerned since I noted in a recent thread
about seeing shorewall messages on my local terminals (alt+F1 etc).  So
I guess I'm asking did someone attempt illegal access to my machine or
perhaps my apcupsd software is buggy?

Thanks for reading,


Terry


Terry Golightly ... [EMAIL PROTECTED] ... Pittsburgh, Pa 
Mandrake Linux release 10.0 (Official) for i586 kernel
2.6.3-9mdk-i686-up-4GB 
13:59:45 up 2:38, 3 users, load average: 0.00, 0.03, 0.09 

Life is too short to be taken seriously. -- Oscar Wilde
mtrr: 0xe4000000,0x2000000 overlaps existing 0xe4000000,0x1000000
atkbd.c: Unknown key released (translated set 2, code 0x7a on isa0060/serio0).
atkbd.c: This is an XFree86 bug. It shouldn't access hardware directly.
Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=201.40.221.118 DST=151.201.32.59 LEN=837 
TOS=0x00 PREC=0x00 TTL=112 ID=53831 PROTO=UDP SPT=25121 DPT=1029 LEN=817 
Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=141.158.118.74 DST=151.201.32.59 LEN=48 
TOS=0x00 PREC=0x00 TTL=125 ID=27702 DF PROTO=TCP SPT=2691 DPT=5000 WINDOW=16384 
RES=0x00 SYN URGP=0 
Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.240.235 DST=151.201.32.59 LEN=48 
TOS=0x00 PREC=0x00 TTL=127 ID=51116 DF PROTO=TCP SPT=4510 DPT=2745 WINDOW=64800 
RES=0x00 SYN URGP=0 
Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.240.235 DST=151.201.32.59 LEN=48 
TOS=0x00 PREC=0x00 TTL=127 ID=51118 DF PROTO=TCP SPT=4545 DPT=1025 WINDOW=64800 
RES=0x00 SYN URGP=0 
Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.240.235 DST=151.201.32.59 LEN=48 
TOS=0x00 PREC=0x00 TTL=127 ID=51120 DF PROTO=TCP SPT=4580 DPT=3127 WINDOW=64800 
RES=0x00 SYN URGP=0 
Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.240.235 DST=151.201.32.59 LEN=48 
TOS=0x00 PREC=0x00 TTL=127 ID=51121 DF PROTO=TCP SPT=4611 DPT=6129 WINDOW=64800 
RES=0x00 SYN URGP=0 
Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.240.235 DST=151.201.32.59 LEN=48 
TOS=0x00 PREC=0x00 TTL=127 ID=51847 DF PROTO=TCP SPT=4510 DPT=2745 WINDOW=64800 
RES=0x00 SYN URGP=0 
Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.240.235 DST=151.201.32.59 LEN=48 
TOS=0x00 PREC=0x00 TTL=127 ID=51849 DF PROTO=TCP SPT=4545 DPT=1025 WINDOW=64800 
RES=0x00 SYN URGP=0 
Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.240.235 DST=151.201.32.59 LEN=48 
TOS=0x00 PREC=0x00 TTL=127 ID=53029 DF PROTO=TCP SPT=4611 DPT=6129 WINDOW=64800 
RES=0x00 SYN URGP=0 
Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.240.235 DST=151.201.32.59 LEN=48 
TOS=0x00 PREC=0x00 TTL=127 ID=53030 DF PROTO=TCP SPT=4580 DPT=3127 WINDOW=64800 
RES=0x00 SYN URGP=0 
Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.240.235 DST=151.201.32.59 LEN=48 
TOS=0x00 PREC=0x00 TTL=127 ID=53032 DF PROTO=TCP SPT=4545 DPT=1025 WINDOW=64800 
RES=0x00 SYN URGP=0 
Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.240.235 DST=151.201.32.59 LEN=48 
TOS=0x00 PREC=0x00 TTL=127 ID=53034 DF PROTO=TCP SPT=4510 DPT=2745 WINDOW=64800 
RES=0x00 SYN URGP=0 
Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.152.161 DST=151.201.32.59 LEN=48 
TOS=0x00 PREC=0x00 TTL=122 ID=49561 DF PROTO=TCP SPT=4286 DPT=2745 WINDOW=64800 
RES=0x00 SYN URGP=0 
Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.152.161 DST=151.201.32.59 LEN=48 
TOS=0x00 PREC=0x00 TTL=122 ID=49712 DF PROTO=TCP SPT=4286 DPT=2745 WINDOW=64800 
RES=0x00 SYN URGP=0 
Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.152.161 DST=151.201.32.59 LEN=48 
TOS=0x00 PREC=0x00 TTL=122 ID=49993 DF PROTO=TCP SPT=4286 DPT=2745 WINDOW=64800 
RES=0x00 SYN URGP=0 
Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=212.32.50.23 DST=151.201.32.59 LEN=758 
TOS=0x00 PREC=0x00 TTL=115 ID=47821 PROTO=UDP SPT=20062 DPT=1026 LEN=738 
Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=69.93.32.202 DST=151.201.32.59 LEN=48 
TOS=0x00 PREC=0x00 TTL=109 ID=8914 DF PROTO=TCP SPT=3475 DPT=4899 WINDOW=65535 
RES=0x00 SYN URGP=0 
Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.123.157 DST=151.201.32.59 LEN=48 
TOS=0x00 PREC=0x00 TTL=127 ID=36031 DF PROTO=TCP SPT=3236 DPT=2745 WINDOW=16384 
RES=0x00 SYN URGP=0 
Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.123.157 DST=151.201.32.59 LEN=48 
TOS=0x00 PREC=0x00 TTL=127 ID=36033 DF PROTO=TCP SPT=3238 DPT=1025 WINDOW=16384 
RES=0x00 SYN URGP=0 
Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.123.157 DST=151.201.32.59 LEN=48 
TOS=0x00 PREC=0x00 TTL=127 ID=36035 DF PROTO=TCP SPT=3241 DPT=3127 WINDOW=16384 
RES=0x00 SYN URGP=0 
Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.123.157 DST=151.201.32.59 LEN=48 
TOS=0x00 PREC=0x00 TTL=127 ID=36036 DF PROTO=TCP SPT=3243 DPT=6129 WINDOW=16384 
RES=0x00 SYN URGP=0 
Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.123.157 DST=151.201.32.59 LEN=48 
TOS=0x00 PREC=0x00 TTL=127 ID=36390 DF PROTO=TCP SPT=3238 DPT=1025 WINDOW=16384 
RES=0x00 SYN URGP=0 
Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.123.157 DST=151.201.32.59 LEN=48 
TOS=0x00 PREC=0x00 TTL=127 ID=36406 DF PROTO=TCP SPT=3243 DPT=6129 WINDOW=16384 
RES=0x00 SYN URGP=0 
Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.123.157 DST=151.201.32.59 LEN=48 
TOS=0x00 PREC=0x00 TTL=127 ID=36407 DF PROTO=TCP SPT=3236 DPT=2745 WINDOW=16384 
RES=0x00 SYN URGP=0 
Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.123.157 DST=151.201.32.59 LEN=48 
TOS=0x00 PREC=0x00 TTL=127 ID=36408 DF PROTO=TCP SPT=3241 DPT=3127 WINDOW=16384 
RES=0x00 SYN URGP=0 
Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.123.157 DST=151.201.32.59 LEN=48 
TOS=0x00 PREC=0x00 TTL=127 ID=37157 DF PROTO=TCP SPT=3238 DPT=1025 WINDOW=16384 
RES=0x00 SYN URGP=0 
Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.123.157 DST=151.201.32.59 LEN=48 
TOS=0x00 PREC=0x00 TTL=127 ID=37169 DF PROTO=TCP SPT=3243 DPT=6129 WINDOW=16384 
RES=0x00 SYN URGP=0 
Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.123.157 DST=151.201.32.59 LEN=48 
TOS=0x00 PREC=0x00 TTL=127 ID=37171 DF PROTO=TCP SPT=3241 DPT=3127 WINDOW=16384 
RES=0x00 SYN URGP=0 
Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=151.201.123.157 DST=151.201.32.59 LEN=48 
TOS=0x00 PREC=0x00 TTL=127 ID=37172 DF PROTO=TCP SPT=3236 DPT=2745 WINDOW=16384 
RES=0x00 SYN URGP=0 
mtrr: 0xe4000000,0x2000000 overlaps existing 0xe4000000,0x1000000
atkbd.c: Unknown key released (translated set 2, code 0x7a on isa0060/serio0).
atkbd.c: This is an XFree86 bug. It shouldn't access hardware directly.
mtrr: 0xe4000000,0x2000000 overlaps existing 0xe4000000,0x1000000
atkbd.c: Unknown key released (translated set 2, code 0x7a on isa0060/serio0).
atkbd.c: This is an XFree86 bug. It shouldn't access hardware directly.
mtrr: 0xe4000000,0x2000000 overlaps existing 0xe4000000,0x1000000
atkbd.c: Unknown key released (translated set 2, code 0x7a on isa0060/serio0).
atkbd.c: This is an XFree86 bug. It shouldn't access hardware directly.
mtrr: 0xe4000000,0x2000000 overlaps existing 0xe4000000,0x1000000
atkbd.c: Unknown key released (translated set 2, code 0x7a on isa0060/serio0).
atkbd.c: This is an XFree86 bug. It shouldn't access hardware directly.
mtrr: 0xe4000000,0x2000000 overlaps existing 0xe4000000,0x1000000
atkbd.c: Unknown key released (translated set 2, code 0x7a on isa0060/serio0).
atkbd.c: This is an XFree86 bug. It shouldn't access hardware directly.
mtrr: 0xe4000000,0x2000000 overlaps existing 0xe4000000,0x1000000
atkbd.c: Unknown key released (translated set 2, code 0x7a on isa0060/serio0).
atkbd.c: This is an XFree86 bug. It shouldn't access hardware directly.
Shorewall:net2all:DROP:IN=ppp0 OUT= MAC= SRC=221.232.160.103 DST=151.201.32.59 LEN=325 
TOS=0x00 PREC=0x00 TTL=99 ID=0 DF PROTO=UDP SPT=777 DPT=1027 LEN=305 
____________________________________________________
Want to buy your Pack or Services from MandrakeSoft? 
Go to http://www.mandrakestore.com
Join the Club : http://www.mandrakeclub.com
____________________________________________________

Reply via email to