Can anybody make any sense out of this? I got 8 of these while running a
yum update on a FC 5 xen partition. And (not coincidentally I suspect)
immediately afterward got a 3 day distributed dictionary email attack
(DHA?) that forced me to loopback a domain. Any clue as to what rule
66.423.11.0/0 means would be appreciated. Is there a vulnerability in
psSense I am not aware of?
Thanks
Nov 24 10:48:10 fw2 pf: 792458 rule 66.423.11.0/0(match): pass in on
xl0: (tos 0x0, ttl 64, id 43958, offset 0, flags [DF], proto: TCP (6),
length: 60) 192.168.0.##.48528 > 130.133.3.130.61856: S
1612288201:1612288201(0) win 5840 <mss 1460,sackOK,timestamp[|tcp]
---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]