On Mon, Mar 12, 2001 at 11:27:46AM -0800, Marc Wilson wrote:
> Try this in your firewall script:
>
> # anything NFS-like should not be accessible from outside
> NFSPORTS=`rpcinfo -p | awk '/tcp/||/udp/ {print $4}' | sort | uniq`
> for PORT_NUM in $NFSPORTS
> do $IPCHAINS -A input -i $extint -
5:20 AM
To: Debian-User List
Subject: Re: rpc.statd hacking but firewalled
<< File: ATT00568.dat >> On Mon, Mar 12, 2001 at 01:38:53AM -0700, Curtis
Hogg wrote:
> i don't recall what port rpc.statd binds to, but what it is is a part of
> the NFS system, so disabling rpc.st
On Mon, Mar 12, 2001 at 01:38:53AM -0700, Curtis Hogg wrote:
> i don't recall what port rpc.statd binds to, but what it is is a part of
> the NFS system, so disabling rpc.statd, i think, will also break NFS
> mounting on your side. you can still mount remote systems i think.
statd is bound to a ra
i don't recall what port rpc.statd binds to, but what it is is a part of
the NFS system, so disabling rpc.statd, i think, will also break NFS
mounting on your side. you can still mount remote systems i think.
And, yes, it is a hack attempt.. by some scriptkiddie trying to use a
common buffer overf
4 matches
Mail list logo