Joe Holden wrote:
[ ... ]
> I'm looking at creating an intrusion detection system, similiar to
> portsentry, however using bpf/tcpdump to monitor all traffic, without
> needing to listen on those ports, it will be run on a border router, and
> as such will need to check for incoming packets destine
From: Dmitry Morozovsky <[EMAIL PROTECTED]>
Subject: hosts.allow default behaviour: IPv6 on its own lines
Date: Thu, 16 Feb 2006 14:03:37 +0300 (MSK)
> Dear colleagues,
>
> at least rpcbind brokes on parsing hosts.allow file when built with NO_INET6:
>
> Feb 16 13:55:41 ... rpcbind: error: /etc/
Hello list!
Sorry for posting this to both, however I wasn't sure which it applied to.
I'm looking at creating an intrusion detection system, similiar to
portsentry, however using bpf/tcpdump to monitor all traffic, without
needing to listen on those ports, it will be run on a border router, a
Peter Holm's stress test gave me this on an SMP machine running fresh
7.0:
Fatal trap 12: page fault while in kernel mode
cpuid = 0; apic id = 00
fault virtual address = 0xdeadc0de
fault code = supervisor write, page not present
instruction pointer = 0x20:0xc0681633
stack pointe
Hi,
> On Thu, 16 Feb 2006 14:03:37 +0300 (MSK)
> Dmitry Morozovsky <[EMAIL PROTECTED]> said:
marck> at least rpcbind brokes on parsing hosts.allow file when built with
NO_INET6:
marck> Feb 16 13:55:41 ... rpcbind: error: /etc/hosts.allow, line 42: missing
option name
marck> Feb 16 13:5
Dear colleagues,
at least rpcbind brokes on parsing hosts.allow file when built with NO_INET6:
Feb 16 13:55:41 ... rpcbind: error: /etc/hosts.allow, line 42: missing option
name
Feb 16 13:55:41 ... rpcbind: connect from 127.0.0.1 to getport/addr(mountd):
request from unauthorized host
Maybe sp