jekillen at prodigy.net
Fri Apr 21 23:20:43 UTC 2006
On Apr 20, 2006, at 7:50 PM, Kevin Kinsey wrote:
> jekillen wrote:
> Not without assistance, most likely ;-).
>> One link is to the inside network and the other is to static ip
>> that is assigned but as yet has not been configured on the router to
>> receive requests from outside.
>> I admit, I am learning at this point. I've been watching the router
>> security log and
>> have seen just in the last week (as long as it has had the static
>> ip's assigned)
>> several hundred broadcast amplification attempts blocked.
>> And I have been reading my root mail and am now interested in a
>> tutorial or
>> some published specifics about how to interpret these messages.
>> I'm running v6 release on AMD64. I'm setting up to host a web site.
>> thanks in advance.
>> PS in the mean time I will be going through what I have already.
> Generally, "promiscuous mode" is pretty much what you
> have guessed ... used in network analysis. Software such
> as bpf(4), and higher level apps such as netgraph, tcpdump,
> ethereal, etc. use "promiscuous mode" to grab network traffic.
> So, the first thing you ask yourself is, have I (or anyone allowed
> to be "root") used any of this type of software?
> There might be other explanations, but I'm not suitably
> prepared to address them.
> Kevin Kinsey
Actually I neglected to mention that I had used tcpdump on this machine
but not a 3 AM in the morning. But that is probably what it is all
> The idle mind knows not what it is it wants.
> -- Quintus Ennius
> freebsd-questions at freebsd.org mailing list
> To unsubscribe, send any mail to
> "freebsd-questions-unsubscribe at freebsd.org"
More information about the freebsd-questions