Date: Sun, 22 Apr 2001 20:05:40 +0200 (MEST) From: =?ISO-8859-1?Q?P=E4r_Thoren?= <t98pth@student.bth.se> To: Dag-Erling Smorgrav <des@ofug.org> Cc: freebsd-security@freebsd.org Subject: Re: rpc.statd attack Message-ID: <Pine.GSO.4.21.0104222004300.393-100000@helios> In-Reply-To: <xzpitjwkfai.fsf@flood.ping.uio.no>
index | next in thread | previous in thread | raw e-mail
yes..I´ve added ipfw rules now. But the question was if rpc.statd logged the ip of the attacker. I use ipfw to log it now. On 22 Apr 2001, Dag-Erling Smorgrav wrote: > Pär Thoren <t98pth@student.bth.se> writes: > > Ok when I get portscanned...but these guys tries to exploit my ass. > > Why is rpc.statd running? If you really need it (for NFS on your LAN, > I presume), why isn't portmap or rpcbind firewalled off so only local > hosts can access it? > > DES > -- > Dag-Erling Smorgrav - des@ofug.org > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the messagehelp
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.GSO.4.21.0104222004300.393-100000>
