[119870] in North American Network Operators' Group
RE: port scanning from spoofed addresses
daemon@ATHENA.MIT.EDU (Stefan Fouant)
Thu Dec 3 12:40:35 2009
From: "Stefan Fouant" <sfouant@shortestpathfirst.net>
To: "'Matthew Huff'" <mhuff@ox.com>,
<nanog@nanog.org>
In-Reply-To: <483E6B0272B0284BA86D7596C40D29F9D775E7EE24@PUR-EXCH07.ox.com>
Date: Thu, 3 Dec 2009 12:39:25 -0500
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
> -----Original Message-----
> From: Matthew Huff [mailto:mhuff@ox.com]
> Sent: Thursday, December 03, 2009 12:05 PM
>
> but the number and volume is a bit worrisome. Our upstream providers
> appear to be uninterested in tracing or blocking them. Is this the new
> normal?
Yes, it's the new norm... same as the old norm... I'm surprised they didn't
try to upsell you on some type of managed DDoS solution...
Stefan Fouant
www.shortestpathfirst.net
GPG Key ID: 0xB5E3803D