rooted by some script kiddies,perhaps..
rpc.statd or bind exploited,some say its better to reinstall the
box,personally i like diggin' :-))
first,disconnect,kick out all aliens,or save them somewhere,quarantined to
check them out later,
then,get some new packages on cds,or floppies or from the
rooted by some script kiddies,perhaps..
rpc.statd or bind exploited,some say its better to reinstall the
box,personally i like diggin' :-))
first,disconnect,kick out all aliens,or save them somewhere,quarantined to
check them out later,
then,get some new packages on cds,or floppies or from the
Petre L. Daniel,System Administrator
Canad Systems Pitesti Romania,
http://www.cyber.ro, email:[EMAIL PROTECTED]
Tel:+4048220044, +4048206200
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Petre L. Daniel,System Administrator
Canad Systems Pitesti Romania,
http://www.cyber.ro, email:[EMAIL PROTECTED]
Tel:+4048220044, +4048206200
Well,i know Karsten's on my back and all,but i have not much time to
learn,and too many things to do at my firm,so i am asking if one of you has
any idea how can bind be protected against that DoS attack and if someone
has some good firewall for a dns server ( that resolves names for internal
thank you all very much.
you're right.if one doesn't have anything useful to say i'll recommand him
to let others help..
thx guys.
At 10:02 PM 12/30/01 +0100, jernej horvat wrote:
On Sunday 30 December 2001 18:46, P Prince wrote:
The eaisest and most failsafe way to secure bind is to install
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hmm,well,for what i know versions of openssh higher than 2.9.x aren't
vulnerable,so get your latest package and install it..:-))
good luck
Petre L. Daniel
Linux Administrator,Canad Systems Pitesti
http://www.cyber.ro email:[EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hmm,well,for what i know versions of openssh higher than 2.9.x aren't
vulnerable,so get your latest package and install it..:-))
good luck
Petre L. Daniel
Linux Administrator,Canad Systems Pitesti
http://www.cyber.ro email:[EMAIL PROTECTED]
Heya,i got those lines often lately..Can anyone explain me every
little part of it?
If you can drop an url link too,it would be great..
Thank you.
Nov 30 16:16:28 brutus-gw kernel: Packet log: input DENY eth1 PROTO=6
210.86.20.213:1621
194.102.92.21:6000 L=48 S=0x00 I=52039 F=0x4000 T=102 SYN
Heya,i got those lines often lately..Can anyone explain me every
little part of it?
If you can drop an url link too,it would be great..
Thank you.
Nov 30 16:16:28 brutus-gw kernel: Packet log: input DENY eth1 PROTO=6
210.86.20.213:1621
194.102.92.21:6000 L=48 S=0x00 I=52039 F=0x4000 T=102 SYN
is the dialup ips..like from 194.102.92.x to
217.156.43.x
--- Jeremy C. Reed [EMAIL PROTECTED] wrote:
On Tue, 20 Nov 2001, Petre Daniel wrote:
Well i am speaking for a mate that has a
small
isp but doesnt like internet so much :p
?
He changed the ip class of the dialapers from
Well i am speaking for a mate that has a small
isp but doesnt like internet so much :p
What did he do..
He changed the ip class of the dialapers from a
194.102.92.x to a 217.156.43.x and now it seems
that they cant access the mail anymore..
what is the problem? where exactly should he
look?
in
is the dialup ips..like from 194.102.92.x to
217.156.43.x
--- Jeremy C. Reed [EMAIL PROTECTED] wrote:
On Tue, 20 Nov 2001, Petre Daniel wrote:
Well i am speaking for a mate that has a
small
isp but doesnt like internet so much :p
?
He changed the ip class of the dialapers from
13 matches
Mail list logo