[119870] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: port scanning from spoofed addresses

daemon@ATHENA.MIT.EDU (Stefan Fouant)
Thu Dec 3 12:40:35 2009

From: "Stefan Fouant" <sfouant@shortestpathfirst.net>
To: "'Matthew Huff'" <mhuff@ox.com>,
	<nanog@nanog.org>
In-Reply-To: <483E6B0272B0284BA86D7596C40D29F9D775E7EE24@PUR-EXCH07.ox.com>
Date: Thu, 3 Dec 2009 12:39:25 -0500
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

> -----Original Message-----
> From: Matthew Huff [mailto:mhuff@ox.com]
> Sent: Thursday, December 03, 2009 12:05 PM
> 
> but the number and volume is a bit worrisome. Our upstream providers
> appear to be uninterested in tracing or blocking them. Is this the new
> normal?

Yes, it's the new norm... same as the old norm... I'm surprised they didn't
try to upsell you on some type of managed DDoS solution...

Stefan Fouant
www.shortestpathfirst.net
GPG Key ID: 0xB5E3803D



home help back first fref pref prev next nref lref last post