From: Paul MacKenzie <pc.mackenzie@utoronto.ca> To: freebsd-security@FreeBSD.ORG Subject: Should I be worried, Message-ID: <4.1.19990406200132.00992430@mail.elehost.com>
next in thread | raw e-mail | index | archive | help
Quick message to allay a few fears. The other day I found this in the logs... Apr 3 06:43:44 server popper[20031]: @m-burg-01.rewiss.fu-berlin.de: -ERR POP EOF received Apr 3 06:43:45 server /kernel: ipfw: 13610 Accept TCP 160.45.166.130:22904 xxx.xxx.xxx.xxx:23 in via ed0 Apr 3 06:43:45 server /kernel: ipfw: 13610 Accept TCP 160.45.166.130:22904 xxx.xxx.xxx.xxx:23 out via ed1 (the xxx.xxx.xxx.xxx address being the same above in both cases) This person was obviously an outsider because I have no clients in this part of the world. Any thoughts on why Qpopper send this back assuming they have no access to any e-mail addresses? As well the above error was shown a number of times for different addresses (as though a scanner was run on a certain subnet mask). Should I be concerned? Thanks for any insight and discussion this opens up, Sincerely Paul To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4.1.19990406200132.00992430>