List,

Postfix has quit working and I suspect someone has broken in, but I
don't know where to begin looking on my system.  Below is an attempt to
start postfix:

[EMAIL PROTECTED] root]# postfix start
postfix: fatal: parameter inet_interfaces: no local interface found for
220.80.108.83

I have included a run of nampfe at the end.  In the meantime,
I was barely able to setup postfix to supply me with system emails, so
your basic help with how/where do I look to fix this problem is greatly appreciated.

Thanks, 

Terry

p.s. If I have been hacked by the ip above, what can I do (shorewall/other) to
keep them out.


Starting nmap 3.50 ( http://www.insecure.org/nmap/ ) at 2004-07-04 01:15 EDT
sendto in send_tcp_raw: sendto(3, packet, 60, 0, 220.80.108.83, 16) => Operation not 
permitted
sendto in send_tcp_raw: sendto(3, packet, 60, 0, 220.80.108.83, 16) => Operation not 
permitted
Interesting ports on 220.80.108.83:
(The 1646 ports scanned but not shown below are in state: closed)
PORT      STATE    SERVICE
21/tcp    open     ftp
22/tcp    open     ssh
53/tcp    open     domain
80/tcp    open     http
111/tcp   open     rpcbind
135/tcp   filtered msrpc
139/tcp   filtered netbios-ssn
445/tcp   filtered microsoft-ds
3306/tcp  open     mysql
4444/tcp  filtered krb524
5800/tcp  filtered vnc-http
5900/tcp  filtered vnc
17300/tcp filtered kuang2
Device type: general purpose
Running: Linux 2.4.X|2.5.X
OS details: Linux Kernel 2.4.0 - 2.5.20

Nmap run completed -- 1 IP address (1 host up) scanned in 49.309 seconds



Terry Golightly ... [EMAIL PROTECTED] ... Pittsburgh, Pa 
Mandrake Linux release 10.0 (Official) for i586 kernel
2.6.3-14mdk-i686-up-4GB 
01:22:18 up 12:26, 2 users, load average: 0.00, 0.05, 0.07 

Don't have good ideas if you aren't willing to be responsible for them.


____________________________________________________
Want to buy your Pack or Services from MandrakeSoft? 
Go to http://www.mandrakestore.com
Join the Club : http://www.mandrakeclub.com
____________________________________________________

Reply via email to