Re: rpc.statd hacking but firewalled

2001-03-12 Thread Ethan Benson
On Mon, Mar 12, 2001 at 11:27:46AM -0800, Marc Wilson wrote: > Try this in your firewall script: > > # anything NFS-like should not be accessible from outside > NFSPORTS=`rpcinfo -p | awk '/tcp/||/udp/ {print $4}' | sort | uniq` > for PORT_NUM in $NFSPORTS > do $IPCHAINS -A input -i $extint -

RE: rpc.statd hacking but firewalled

2001-03-12 Thread Marc Wilson
5:20 AM To: Debian-User List Subject: Re: rpc.statd hacking but firewalled << File: ATT00568.dat >> On Mon, Mar 12, 2001 at 01:38:53AM -0700, Curtis Hogg wrote: > i don't recall what port rpc.statd binds to, but what it is is a part of > the NFS system, so disabling rpc.st

Re: rpc.statd hacking but firewalled

2001-03-12 Thread Ethan Benson
On Mon, Mar 12, 2001 at 01:38:53AM -0700, Curtis Hogg wrote: > i don't recall what port rpc.statd binds to, but what it is is a part of > the NFS system, so disabling rpc.statd, i think, will also break NFS > mounting on your side. you can still mount remote systems i think. statd is bound to a ra

Re: rpc.statd hacking but firewalled

2001-03-12 Thread Curtis Hogg
i don't recall what port rpc.statd binds to, but what it is is a part of the NFS system, so disabling rpc.statd, i think, will also break NFS mounting on your side. you can still mount remote systems i think. And, yes, it is a hack attempt.. by some scriptkiddie trying to use a common buffer overf

rpc.statd hacking but firewalled

2001-03-11 Thread hanasaki
The following showed up in my syslog the other day Is this possbile hacking? What port is rpc.statd on? What does it do? What will break if it is turned off? and how to turn it off? Only a few, selected ports, are listened on. The last rule in my firewall script is ipchains -l -A input -i eth