I'm running a name server with versions of everything so old I'm too
embarrassed to admit them, even to good friends like yourselves.
I'm seeing port scans of other machines on our network coming
from port 53 on the name server. The name server shows nothing
out of the ordinary in any logs or other information. It doesn't look
like anyone has gained entry to the machine, just that they're
bouncing port scans through it. afaik, port 53 is usually used for
redirected dns resolution.
Now I know the solution to this is to upgrade everything to the
latest versions (and I will, honest), but I'd like to know what exploit
is being used here and if there's a simple way to see where they're
coming from. Does this look familiar to anyone?
Maintained by the ILUG website team. The aim of Linux.ie is to
support and help commercial and private users of Linux in Ireland. You can
display ILUG news in your own webpages, read backend
information to find out how. Networking services kindly provided by HEAnet, server kindly donated by
Dell. Linux is a trademark of Linus Torvalds,
used with permission. No penguins were harmed in the production or maintenance
of this highly praised website. Looking for the
Indian Linux Users' Group? Try here. If you've read all this and aren't a lawyer: you should be!