I'm getting a good amount of these DENY's in my logs, but I'm not sure exactly what they mean.
Oct 7 19:51:45 furby kernel: Packet log: output DENY eth0 PROTO=6 216.178.84.110:80 65.56.237.226:2002 L=48 S =0x00 I=17224 F=0x4000 T=64 (#2) Oct 7 19:51:48 furby kernel: Packet log: output DENY eth0 PROTO=6 216.178.84.110:80 65.56.237.226:2002 L=48 S =0x00 I=17805 F=0x4000 T=64 (#2) Oct 7 19:51:48 furby kernel: Packet log: output DENY eth0 PROTO=6 216.178.84.110:80 65.56.237.226:2002 L=48 S =0x00 I=17842 F=0x4000 T=64 (#2) 216.178.84.110 Is the address binded to my webserver. To me it looks like my webserver is trying to connect to 65.56.237.226 on port 2002 (the new linux worm) I could be wrong about this, but im not sure. I have these lines for IPChains so i dont know how or if im infected. Chain input (policy ACCEPT): target prot opt source destination ports DENY tcp ----l- anywhere anywhere any -> 2002 DENY udp ----l- anywhere anywhere any -> 2002 Chain output (policy ACCEPT): target prot opt source destination ports DENY udp ----l- anywhere anywhere any -> 2002 DENY tcp ----l- anywhere anywhere any -> 2002 I'm also up todate on Openssl. My question is, Is my webserver trying to make connections going out on these ports, or is my webserver being attacked on these ports. Chris S. www.jynx.net [EMAIL PROTECTED]