I have got them on a 2.1.86 kernel, that has a current uptime of 5 days.
Feb 17 16:10:55 busconductor kernel: icmp packet outside the tcp window:
s:1 2862659631,2862659632,2862659632
Feb 17 16:12:10 busconductor kernel: icmp packet outside the tcp window:
s:1 2862659631,2862659632,2862659632
Feb 17 16:13:25 busconductor kernel: icmp packet outside the tcp window:
s:1 2862659631,2862659632,2862659632
Feb 17 16:14:40 busconductor kernel: icmp packet outside the tcp window:
s:1 2862659631,2862659632,2862659632
Feb 17 16:15:55 busconductor kernel: icmp packet outside the tcp window:
s:1 2862659631,2862659632,2862659632
Feb 17 16:17:10 busconductor kernel: icmp packet outside the tcp window:
s:1 2862659631,2862659632,2862659632
Feb 17 16:17:19 busconductor in.telnetd[7431]: connect from x.x.x.x
Feb 17 16:17:31 busconductor login[7432]: `tim' logged in on `ttyp4' from
`x.x.x.x'
Feb 17 16:18:25 busconductor kernel: icmp packet outside the tcp window:
s:1 2862659631,2862659632,2862659632
Feb 17 16:19:40 busconductor kernel: icmp packet outside the tcp window:
s:1 2862659631,2862659632,2862659632
Feb 17 16:20:55 busconductor kernel: icmp packet outside the tcp window:
s:1 2862659631,2862659632,2862659632
Some type of attack? I doubt it though.
Thanks,
Tim
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu