Can anybody make any sense out of this? I got 8 of these while running a yum update on a FC 5 xen partition. And (not coincidentally I suspect) immediately afterward got a 3 day distributed dictionary email attack (DHA?) that forced me to loopback a domain. Any clue as to what rule 66.423.11.0/0 means would be appreciated. Is there a vulnerability in psSense I am not aware of?

Thanks

Nov 24 10:48:10 fw2 pf: 792458 rule 66.423.11.0/0(match): pass in on xl0: (tos 0x0, ttl 64, id 43958, offset 0, flags [DF], proto: TCP (6), length: 60) 192.168.0.##.48528 > 130.133.3.130.61856: S 1612288201:1612288201(0) win 5840 <mss 1460,sackOK,timestamp[|tcp]


---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to