Package: portsentry
Version: 1.2-9
Severity: normal

Portsentry says attack on udp port 162 and with ethereal I see port 513 and my
network administrator confirm this fact. Perhaps this is another aspect of bug
119307.

-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (900, 'testing')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.8-1-686-smp
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)

Versions of packages portsentry depends on:
ii  debconf [debconf-2.0]         1.4.58     Debian configuration management sy
ii  libc6                         2.3.5-6    GNU C Library: Shared libraries an
ii  net-tools                     1.60-15    The NET-3 networking toolkit
ii  perl-modules [libfile-temp-pe 5.8.7-6    Core Perl modules
ii  procps                        1:3.2.5-1  /proc file system utilities

Versions of packages portsentry recommends:
ii  tcpd                          7.6.dbs-8  Wietse Venema's TCP wrapper utilit

-- debconf information:
* portsentry/warn_no_block:
  portsentry/startup_conf_obsolete:


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to