Hi,
I am testing qpopper 4.0.3 on redhat 7.1 system and I am the only user of 
the server. I have a sospicious connection to the pop port. Someone can 
help me to understand what means? Qpopper is vulnerable to acker attack?
These are the lines founded in /var/log/maillog

Sep 16 00:41:16 s2 popper[7239]: (null) at pD95410DD.dip.t-dialin.net 
(217.84.16.221): -ERR POP EOF or I/O Error [popper.c:794]
Sep 16 00:41:16 s2 popper[7239]: I/O error flushing output to client  at 
pD95410DD.dip.t-dialin.net [217.84.16.221]: Operation not permitted (1) 
[pop_send.c:685]
Sep 16 00:41:16 s2 popper[7239]: I/O error flushing output to client  at 
pD95410DD.dip.t-dialin.net [217.84.16.221]: Operation not permitted (1) 
[pop_send.c:685]
Sep 16 00:41:16 s2 popper[7239]: (v4.0.3) Timing for 
@pD95410DD.dip.t-dialin.net (error) auth=0 init=0 clean=0 [popper.c:375]
Sep 16 00:41:16 s2 sendmail[7238]: NOQUEUE: pD95410DD.dip.t-dialin.net 
[217.84.16.221] did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA

tank you

Ruggero

Reply via email to