Package: portsentry Version: 1.2-9 Severity: normal
Portsentry says attack on udp port 162 and with ethereal I see port 513 and my network administrator confirm this fact. Perhaps this is another aspect of bug 119307. -- System Information: Debian Release: testing/unstable APT prefers testing APT policy: (900, 'testing') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.8-1-686-smp Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15) Versions of packages portsentry depends on: ii debconf [debconf-2.0] 1.4.58 Debian configuration management sy ii libc6 2.3.5-6 GNU C Library: Shared libraries an ii net-tools 1.60-15 The NET-3 networking toolkit ii perl-modules [libfile-temp-pe 5.8.7-6 Core Perl modules ii procps 1:3.2.5-1 /proc file system utilities Versions of packages portsentry recommends: ii tcpd 7.6.dbs-8 Wietse Venema's TCP wrapper utilit -- debconf information: * portsentry/warn_no_block: portsentry/startup_conf_obsolete: -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

