Date: Sun, 22 Apr 2001 20:05:40 +0200 (MEST) From: =?ISO-8859-1?Q?P=E4r_Thoren?= <t98pth@student.bth.se> To: Dag-Erling Smorgrav <des@ofug.org> Cc: freebsd-security@freebsd.org Subject: Re: rpc.statd attack Message-ID: <Pine.GSO.4.21.0104222004300.393-100000@helios> In-Reply-To: <xzpitjwkfai.fsf@flood.ping.uio.no>
next in thread | previous in thread | raw e-mail | index | archive | help
yes..I=B4ve added ipfw rules now. But the question was if rpc.statd logged the ip of the attacker.=20 I use ipfw to log it now. On 22 Apr 2001, Dag-Erling Smorgrav wrote: > P=E4r Thoren <t98pth@student.bth.se> writes: > > Ok when I get portscanned...but these guys tries to exploit my ass. >=20 > Why is rpc.statd running? If you really need it (for NFS on your LAN, > I presume), why isn't portmap or rpcbind firewalled off so only local > hosts can access it? >=20 > DES > --=20 > Dag-Erling Smorgrav - des@ofug.org >=20 To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.GSO.4.21.0104222004300.393-100000>