I don't know about you but I have many "Hacker" intrusions from the 
"t-dialin.net" domain, so many that every time I receive a hack alert, not 
just popper, I add a filter to my firewall to drop their packets.

I have seen probes on just about every TCP and UDP port.

I think you will find that the intruder is trying to use popper to relay 
mail. (Maybe)

Wayne




At 10:30 AM 18-09-01 +0200, Ruggero Dell'Osso wrote:
>Hi,
>I am testing qpopper 4.0.3 on redhat 7.1 system and I am the only user of 
>the server. I have a sospicious connection to the pop port. Someone can 
>help me to understand what means? Qpopper is vulnerable to acker attack?
>These are the lines founded in /var/log/maillog
>
>Sep 16 00:41:16 s2 popper[7239]: (null) at pD95410DD.dip.t-dialin.net 
>(217.84.16.221): -ERR POP EOF or I/O Error [popper.c:794]
>Sep 16 00:41:16 s2 popper[7239]: I/O error flushing output to client  at 
>pD95410DD.dip.t-dialin.net [217.84.16.221]: Operation not permitted (1) 
>[pop_send.c:685]
>Sep 16 00:41:16 s2 popper[7239]: I/O error flushing output to client  at 
>pD95410DD.dip.t-dialin.net [217.84.16.221]: Operation not permitted (1) 
>[pop_send.c:685]
>Sep 16 00:41:16 s2 popper[7239]: (v4.0.3) Timing for 
>@pD95410DD.dip.t-dialin.net (error) auth=0 init=0 clean=0 [popper.c:375]
>Sep 16 00:41:16 s2 sendmail[7238]: NOQUEUE: pD95410DD.dip.t-dialin.net 
>[217.84.16.221] did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA
>
>tank you
>
>Ruggero
>


Reply via email to