[119869] in North American Network Operators' Group
Re: port scanning from spoofed addresses
daemon@ATHENA.MIT.EDU (Florian Weimer)
Thu Dec 3 12:36:11 2009
To: Matthew Huff <mhuff@ox.com>
From: Florian Weimer <fweimer@bfk.de>
Date: Thu, 03 Dec 2009 17:35:14 +0000
In-Reply-To: <483E6B0272B0284BA86D7596C40D29F9D775E7EE24@PUR-EXCH07.ox.com>
(Matthew Huff's message of "Thu\, 3 Dec 2009 12\:05\:09 -0500")
Cc: " \(nanog@nanog.org\)" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
* Matthew Huff:
> We are seeing a large number of tcp connection attempts to ports
> known to have security issues. The source addresses are spoofed from
> our address range. They are easy to block at our border router
> obviously, but the number and volume is a bit worrisome. Our
> upstream providers appear to be uninterested in tracing or blocking
> them. Is this the new normal? One of my concerns is that if others
> are seeing probe attempts, they will see them from these addresses
> and of course, contact us.
What's the distribution of the source addresses and source ports?
--=20
Florian Weimer <fweimer@bfk.de>
BFK edv-consulting GmbH http://www.bfk.de/
Kriegsstra=DFe 100 tel: +49-721-96201-1
D-76133 Karlsruhe fax: +49-721-96201-99