I can telnet to the box of the person who has been doing the UDP 513
scanning for 6 weeks now 
and (of course its a Red Hat box) I don't like their continuous scanning
but 
realize for now they don't present  a problem at this port. 
Kind of like someone driving by our house everyday for 6 weeks and just
looking. 
The UDP 161 is new and frequent so that made me curious.

The "Connect from host: cable-15-14-237-24.anchorageak.net/24.237.14.15
to UDP port: 7
External command run or host: 24.237.14.15 using command: "24.237.14.51"
(Doesn't look entirely innocuous to me? I guess its the "External
command" thingy)

Nov  4 03:26:09 home ipop3d[8471]: refused connect from
cable-15-14-237-24.anchorageak.net
(Is that considered a problem if it continues? Thats the same UDP 7 guy)

I did have a hack-attempt a couple years back with a Sendmail exploit in
RH 5.0 so it has made me cautious .

I have logcheck, Portsentry, ippl (boy does that give out some data but
I'll save that for another time:>)),
 and Tripwire running on my machine so its not like I am "unprepared"
mostly curious 
as this is a 24/7 machine which someday may contain sensitive material
but right now 
is mostly a "test bed" of my own Linux curiosity and incompetence. 

Our ISP is the Cable Provider and continues to pretend that 
#1)Linux is for Geeks or extemely knowledgable hackers, and 
#2)Any home user will of course be using M$ or the few lunitic fringe
MAC holdouts.

The suggestions re: keeping a eye out on the "higher level" intrusion
entry points are good ones 
and I will keep them in mind. And using 'nmap' to scan my own machine
seems appropriate.

Thanks again for the continued input both on the List and to me
directly. 
I can remember last year or so this List seemed to have hundreds of
"Port Scan" dialogs 
and it seems that it will always be a point of contention. I enjoy a
healthy constructive 'dialog'.

Thanks again

William Bouterse
Juneau, Alaska








Nov  4 03:26:09 home ipop3d[8471]: refused connect from
cable-15-14-237-24.anchorageak.net

Nov  3 22:21:34 home portsentry[873]: attackalert: Connect from host:
cable-15-14-237-24.anchorageak.net/24.237.14.15 to UDP port: 7
Nov  3 22:21:34 home portsentry[873]: attackalert: External command run
for host: 24.237.14.15 using command: "24.237.14.51"
Nov  3 22:21:34 home portsentry[873]: attackalert: Host 24.237.14.15 has
been blocked via wrappers with string: "ALL: 24.237.14.15"
Nov  3 22:21:34 home portsentry[873]: attackalert: Host 24.237.14.15 has
been blocked via dropped route using command: "/sbin/route add -host
24.237.14.15 gw 333.444.555.666"
Nov  3 22:21:34 home portsentry[873]: adminalert: ERROR: could not
accept incoming socket for UDP port: 7


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.

Reply via email to