[141320] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: ipv6 day DDoS threat?

daemon@ATHENA.MIT.EDU (Nathan Eisenberg)
Tue Jun 7 15:10:59 2011

From: Nathan Eisenberg <nathan@atlasnetworks.us>
To: "nanog@nanog.org" <nanog@nanog.org>
Date: Tue, 7 Jun 2011 19:04:54 +0000
In-Reply-To: <4DEE7120.8000406@jolokianetworks.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

We got the same call.  I think they just trolled on through the IPv6Day par=
ticipants list.  They indicated that we were likely to be 'specifically tar=
geted' as a result of 'putting ourselves out there'.  I suspect it's merely=
 a misprogrammed sales drone spewing fear-infused garbage.

The caller claimed to represent Verisign (though we took no steps to verify=
 that claim).  If anyone from Verisign is on the list, you may want to look=
 into this, especially if this is actually coming from one of your employee=
s.

Nathan

> -----Original Message-----
> From: Mark Pace [mailto:pace@jolokianetworks.com]
> Sent: Tuesday, June 07, 2011 11:43 AM
> To: nanog@nanog.org
> Subject: ipv6 day DDoS threat?
>=20
> I got an interesting contact from a large company that I will leave un-na=
med
> for the moment.  They said that they heard specific "chatter"
> about DDoS of IPv6 day participant sites and even more specifically about=
 our
> website.  Of course they have also offered to assist us in preventing thi=
s from
> affecting our site.  I'm very skeptical about even calling said company a=
t this
> point.  I'm really feeling like this is a shakedown and was wondering if =
anyone
> else had been approached in a similar fashion?
>=20
>=20
> Mark Pace
>=20
>=20




home help back first fref pref prev next nref lref last post