yesterday looking on log of an host in my lan I saw some packets direct to this port 32785. after this I search for a program that run on this port and I find "snmpXdmid" with number of program "100249" this program on solaris run on this way:
rpcinfo -p | grep 100249 100249 1 udp 32785 100249 1 tcp 32786 Also: fuser -v -n tcp/udp:32785 no response = null and: lsof -i tcp/udp:32785 no response = null The problem it's that I haven't this program in my lan no machine hold this service and again i'm not use "solaris" also if think that linux can offer this service. Now this is the output : 14:40:28.888396 192.168.100.3.32785 > my.host.priv.ipp: P 3609975255:3609975286(31) ack 13877360 win 17376 <nop,nop,timestamp 76452 10640185> (DF) 14:40:28.888396 192.168.100.3.32785 > my.host.priv.ipp: P 3609975255:3609975286(31) ack 13877360 win 17376 <nop,nop,timestamp 76452 10640185> (DF) 14:40:28.888481 192.168.100.3.32785 > my.host.priv.ipp: P 31:52(21) ack 1 win 17376 <nop,nop,timestamp 76452 10640185> (DF) 14:40:28.921794 my.host.priv.ipp > 192.168.100.3.32785: . ack 52 win 63712 <nop,nop,timestamp 10641190 76452> (DF) 14:40:28.922278 192.168.100.3.32785 > my.host.priv.ipp: P 52:331(279) ack 1 win 17376 <nop,nop,timestamp 76455 10641190> (DF) 14:40:28.922316 my.host.priv.ipp > 192.168.100.3.32785: . ack 331 win 63712 <nop,nop,timestamp 10641190 76455> (DF) 14:40:28.922463 my.host.priv.ipp > 192.168.100.3.32785: P 1:18(17) ack 331 win 63712 <nop,nop,timestamp 10641190 76455> (DF) 14:40:28.922501 my.host.priv.ipp > 192.168.100.3.32785: P 18:55(37) ack 331 win 63712 <nop,nop,timestamp 10641190 76455> (DF) 14:40:28.922526 my.host.priv.ipp > 192.168.100.3.32785: P 55:73(18) ack 331 win 63712 <nop,nop,timestamp 10641190 76455> (DF) 14:40:28.922860 192.168.100.3.32785 > my.host.priv.ipp: . ack 18 win 17376 <nop,nop,timestamp 76455 10641190> (DF) 14:40:28.922880 my.host.priv.ipp > 192.168.100.3.32785: P 73:224(151) ack 331 win 63712 <nop,nop,timestamp 10641190 76455> (DF) ..................And much more output like this. how can you note the port in matter is always call. And so for much other packets. when this is finish no more packets of this type are was logged. My question is : I'am paranoid to think that this would be an attempt to scan my ports to the search of some exploit? "in this case "snmpXdmid" produce a buffer overflow, Or is Normal traffic?????? Thanks in Advance And sorry for my ugly English :) Bye. Goffredo Saffioti. __________________________________________________________________ TuttoTISCALI e' il tuo nuovo contratto di telefonia! Chiami in tutta Italia, giorno e notte, al prezzo di un'urbana Ti colleghi ad Internet e spendi meno di un'urbana http://point.tiscali.it/tuttotiscali/webmail.html - This is the TCPDUMP workers list. It is archived at http://www.tcpdump.org/lists/workers/index.html To unsubscribe use mailto:[EMAIL PROTECTED]?body=unsubscribe