Date: Tue, 4 May 1999 11:24:32 -0700 (PDT) From: Matthew Dillon <dillon@apollo.backplane.com> To: "Raymond Wiker" <raymond@orion.no> Cc: <freebsd-stable@FreeBSD.ORG>, <security@FreeBSD.ORG> Subject: Re: FreeBSD 3.1 remote reboot exploit (fwd) Message-ID: <199905041824.LAA14835@apollo.backplane.com> References: <005401be9932$60574860$380051c2@greg.qmpgmc.ac.uk> <14126.49715.589157.172436@foobar.orion.no>
next in thread | previous in thread | raw e-mail | index | archive | help
:Greg Quinlan writes: : > This sounds so.. so very familiar!! : > : > I have been the target of exploits before...... : > : > The exact same thing I have been experiencing........but not for about 5 : > days now! : > : > I'm not convinced its a pure exploit.. (i.e. a program specifically written : > for the purpose) : : My first post to freebsd-stable (and security) - and it's a :me-too :-) : : I'm running 3.1-RELEASE on a 486 with 16 MB of RAM, and this :machine has been falling over regularly. Up until now I have suspected :the local electricity, but it had rebooted this morning, even though :it's now on a UPS. : : I have two other machines running 3.1-RELEASE in a slightly :less hostile environment (i.e, no direct connections outwards), and :they have been much more stable. I cannot rule out a hardware problem :on the 486; I'll know for sure as soon as I upgrade it. : : //Raymond. Setup a serial console and monitor it so you can see the panic message. Or, better, configure the kernel to drop into DDB when it panics so you can do a stack 'trace', and report the results. -Matt Matthew Dillon <dillon@backplane.com> To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199905041824.LAA14835>