<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic suspect string in syslog.log in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/suspect-string-in-syslog-log/m-p/2663615#M48977</link>
    <description>hi guys, i found in the syslog this entry:&lt;BR /&gt;Feb 12 23:05:54 server1 remshd[15355]: Connection from 0.0.0.0 on illegal port&lt;BR /&gt;Feb 12 23:05:56 server1 remshd[15356]: Connection from 0.0.0.0 on illegal port&lt;BR /&gt;Feb 12 23:05:59 server1 remshd[15357]: Connection from 0.0.0.0 on illegal port&lt;BR /&gt;Feb 12 23:06:05 server1 remshd[15360]: Connection from 0.0.0.0 on illegal port&lt;BR /&gt;Feb 12 23:06:17 server1 remshd[15378]: Connection from 0.0.0.0 on illegal port&lt;BR /&gt;Feb 12 23:06:42 server1 remshd[15384]: Connection from 0.0.0.0 on illegal port&lt;BR /&gt;what this strings means?&lt;BR /&gt;thanks a lot for your aid.</description>
    <pubDate>Tue, 12 Feb 2002 23:29:28 GMT</pubDate>
    <dc:creator>Gabriele FACCHINI</dc:creator>
    <dc:date>2002-02-12T23:29:28Z</dc:date>
    <item>
      <title>suspect string in syslog.log</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/suspect-string-in-syslog-log/m-p/2663615#M48977</link>
      <description>hi guys, i found in the syslog this entry:&lt;BR /&gt;Feb 12 23:05:54 server1 remshd[15355]: Connection from 0.0.0.0 on illegal port&lt;BR /&gt;Feb 12 23:05:56 server1 remshd[15356]: Connection from 0.0.0.0 on illegal port&lt;BR /&gt;Feb 12 23:05:59 server1 remshd[15357]: Connection from 0.0.0.0 on illegal port&lt;BR /&gt;Feb 12 23:06:05 server1 remshd[15360]: Connection from 0.0.0.0 on illegal port&lt;BR /&gt;Feb 12 23:06:17 server1 remshd[15378]: Connection from 0.0.0.0 on illegal port&lt;BR /&gt;Feb 12 23:06:42 server1 remshd[15384]: Connection from 0.0.0.0 on illegal port&lt;BR /&gt;what this strings means?&lt;BR /&gt;thanks a lot for your aid.</description>
      <pubDate>Tue, 12 Feb 2002 23:29:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/suspect-string-in-syslog-log/m-p/2663615#M48977</guid>
      <dc:creator>Gabriele FACCHINI</dc:creator>
      <dc:date>2002-02-12T23:29:28Z</dc:date>
    </item>
    <item>
      <title>Re: suspect string in syslog.log</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/suspect-string-in-syslog-log/m-p/2663616#M48978</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;I am not 100% sure and don't want to&lt;BR /&gt;ring the alarm bells too loudly but it &lt;BR /&gt;looks as though there has been an &lt;BR /&gt;attempted hack into your machine using a &lt;BR /&gt;remote shell (remsh). The first thing I&lt;BR /&gt;would is (if you can) to close off any&lt;BR /&gt;unnecessary ports on your server. Start&lt;BR /&gt;with the inetd.conf file and comment out&lt;BR /&gt;items like these. Make sure you run &lt;BR /&gt;# inetd -c &lt;BR /&gt;after making any changes.&lt;BR /&gt;&lt;BR /&gt;login        stream tcp nowait root /usr/lbin/rlogind  rlogind&lt;BR /&gt;shell        stream tcp nowait root /usr/lbin/remshd   remshd&lt;BR /&gt;&lt;BR /&gt;Did this just start happening or have you &lt;BR /&gt;just noticed it?&lt;BR /&gt;&lt;BR /&gt;-Michael&lt;BR /&gt;</description>
      <pubDate>Wed, 13 Feb 2002 01:42:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/suspect-string-in-syslog-log/m-p/2663616#M48978</guid>
      <dc:creator>Michael Tully</dc:creator>
      <dc:date>2002-02-13T01:42:21Z</dc:date>
    </item>
    <item>
      <title>Re: suspect string in syslog.log</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/suspect-string-in-syslog-log/m-p/2663617#M48979</link>
      <description>Gabriele,&lt;BR /&gt;&lt;BR /&gt;As Michael said, shut down what you don't use:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://people.hp.se/stevesk/bastion.html" target="_blank"&gt;http://people.hp.se/stevesk/bastion.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Is this server on the internet or within your local network?&lt;BR /&gt;&lt;BR /&gt;live free or die&lt;BR /&gt;harry</description>
      <pubDate>Wed, 13 Feb 2002 02:36:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/suspect-string-in-syslog-log/m-p/2663617#M48979</guid>
      <dc:creator>harry d brown jr</dc:creator>
      <dc:date>2002-02-13T02:36:45Z</dc:date>
    </item>
    <item>
      <title>Re: suspect string in syslog.log</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/suspect-string-in-syslog-log/m-p/2663618#M48980</link>
      <description>hi guys thanks for your helps.&lt;BR /&gt;this server are in internet.&lt;BR /&gt;how can i be sure that i have had an attack?&lt;BR /&gt;thanks a lot.&lt;BR /&gt;gabriele</description>
      <pubDate>Wed, 13 Feb 2002 06:49:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/suspect-string-in-syslog-log/m-p/2663618#M48980</guid>
      <dc:creator>Gabriele FACCHINI</dc:creator>
      <dc:date>2002-02-13T06:49:41Z</dc:date>
    </item>
    <item>
      <title>Re: suspect string in syslog.log</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/suspect-string-in-syslog-log/m-p/2663619#M48981</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Seeing that you system is on the internet I suggest that you try to make it as robust as possible, by stopping ALL unnecessary services. Also have a look at the link below, it has some interesting information in regards&lt;BR /&gt;to hacking.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x71b779bffde7d4118fef0090279cd0f9,00.html" target="_blank"&gt;http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x71b779bffde7d4118fef0090279cd0f9,00.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;If you haven't already, have a good read of the document link posted by Harry. I have two systems on the net and both were built using this method. To date we haven't been hacked. (touch wood!)&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;-Michael</description>
      <pubDate>Wed, 13 Feb 2002 07:05:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/suspect-string-in-syslog-log/m-p/2663619#M48981</guid>
      <dc:creator>Michael Tully</dc:creator>
      <dc:date>2002-02-13T07:05:22Z</dc:date>
    </item>
    <item>
      <title>Re: suspect string in syslog.log</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/suspect-string-in-syslog-log/m-p/2663620#M48982</link>
      <description>thanks for your help.&lt;BR /&gt;A ports of remsh is closed by firewall, and this error was created by a failed control of a monitoring system.</description>
      <pubDate>Wed, 13 Feb 2002 07:52:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/suspect-string-in-syslog-log/m-p/2663620#M48982</guid>
      <dc:creator>Gabriele FACCHINI</dc:creator>
      <dc:date>2002-02-13T07:52:08Z</dc:date>
    </item>
  </channel>
</rss>

