From owner-freebsd-security Sat Aug 15 00:00:09 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id AAA28550 for freebsd-security-outgoing; Sat, 15 Aug 1998 00:00:09 -0700 (PDT) (envelope-from owner-freebsd-security@FreeBSD.ORG) Received: from crack.x509.com (crack.x509.com [199.175.150.1]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id AAA28543 for ; Sat, 15 Aug 1998 00:00:07 -0700 (PDT) (envelope-from tbaur@xcert.com) Received: from home-int.x509.com (home-int.x509.com [199.175.148.4]) by crack.x509.com (8.8.7/XCERT) with SMTP id XAA08656; Fri, 14 Aug 1998 23:59:08 -0700 (PDT) Date: Fri, 14 Aug 1998 23:59:45 -0700 (PDT) From: Tim Baur X-Sender: tbaur@home.x509.com To: Scott cc: Roger Marquis , security@FreeBSD.ORG Subject: Re: Scans to ports 1090 and 1080 In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Sat, 15 Aug 1998, Scott wrote: > This would be script kiddies looking for an open wingate to exploit. FYI. Or servers checking for open wingates etc. For example, DALnet ircd, checks for open socks on port 1080 on connection. So depending on the host, it might not be what you think it is. -- Tim Baur xcert software inc. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe security" in the body of the message