Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 22 Apr 2001 20:05:40 +0200 (MEST)
From:      =?ISO-8859-1?Q?P=E4r_Thoren?= <t98pth@student.bth.se>
To:        Dag-Erling Smorgrav <des@ofug.org>
Cc:        freebsd-security@freebsd.org
Subject:   Re: rpc.statd attack
Message-ID:  <Pine.GSO.4.21.0104222004300.393-100000@helios>
In-Reply-To: <xzpitjwkfai.fsf@flood.ping.uio.no>

next in thread | previous in thread | raw e-mail | index | archive | help

yes..I=B4ve added ipfw rules now. But the question was if rpc.statd logged
the ip of the attacker.=20
I use ipfw to log it now.

On 22 Apr 2001, Dag-Erling Smorgrav wrote:

> P=E4r Thoren <t98pth@student.bth.se> writes:
> > Ok when I get portscanned...but these guys tries to exploit my ass.
>=20
> Why is rpc.statd running?  If you really need it (for NFS on your LAN,
> I presume), why isn't portmap or rpcbind firewalled off so only local
> hosts can access it?
>=20
> DES
> --=20
> Dag-Erling Smorgrav - des@ofug.org
>=20


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.GSO.4.21.0104222004300.393-100000>