Hi,

so nbslave70 was used yesterday (7 June) in a reflection attack since
the rpcbind server is listening to the network ( see
http://blog.level3.com/security/a-new-ddos-reflection-attack-portmapper-an-early-warning-to-the-industry/
 ). 

I connected to it from rackspace and stopped rpcbind in a hurry after
being paged, but I would like to make sure that the netbsd builders are
a bit more hardened (even if they are already well hardened from what I
did see, even if there is no firewall), as it seems most of them are
also running rpcbind (and sockstat show they are not listening only on
localhost).

Emmanuel, would you be ok if we start to manage them with ansible like
we do for the Centos ones ? 

(I am also in Paris, so I can also come for a meeting if that can be
easier to discuss or me to show what we for the linux builders)

-- 
Michael Scherer
Sysadmin, Community Infrastructure and Platform, OSAS


Attachment: signature.asc
Description: This is a digitally signed message part

_______________________________________________
Gluster-infra mailing list
[email protected]
http://www.gluster.org/mailman/listinfo/gluster-infra

Reply via email to