From owner-freebsd-security Thu Dec 9 8:50:49 1999 Delivered-To: freebsd-security@freebsd.org Received: from server.computeralt.com (server.computeralt.com [207.41.29.10]) by hub.freebsd.org (Postfix) with ESMTP id B945C15653 for ; Thu, 9 Dec 1999 08:50:11 -0800 (PST) (envelope-from scott@computeralt.com) Received: from scott (scott.computeralt.com [207.41.29.100]) by server.computeralt.com (8.9.3/8.9.1) with ESMTP id LAA17873 for ; Thu, 9 Dec 1999 11:50:03 -0500 (EST) Message-Id: <4.2.2.19991209114532.00c075a0@mail.computeralt.com> X-Sender: scott@mail.computeralt.com X-Mailer: QUALCOMM Windows Eudora Pro Version 4.2.2 Date: Thu, 09 Dec 1999 11:50:03 -0500 To: freebsd-security@FreeBSD.ORG From: "Scott I. Remick" Subject: Port 3593 (was "What kind of attack is this?") In-Reply-To: <4.2.2.19991208173403.00be7790@mail.computeralt.com> References: <4.2.2.19991208162315.00b5f4e0@mail.computeralt.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Latest info: The attack has died down, but I'm still seeing the occasional incoming UDP packet destined for port 3593 from what appear to still be spoofed source IPs. Unlike before, these packets aren't triggering any sort of response from the system, so whatever it's looking for isn't there. I can't seem to find any info on services that would run on port 3593 except this one other guy asking the same question: Anyone know anything about this port? ----------------------- Scott I. Remick scott@computeralt.com Network and Information (802)388-7545 ext. 236 Systems Manager FAX:(802)388-3697 Computer Alternatives, Inc. http://www.computeralt.com To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message