[149154] in North American Network Operators' Group
Re: US DOJ victim letter
daemon@ATHENA.MIT.EDU (Jack Bates)
Mon Jan 30 10:55:03 2012
Date: Mon, 30 Jan 2012 09:54:02 -0600
From: Jack Bates <jbates@brightok.net>
To: Jon Lewis <jlewis@lewis.org>
In-Reply-To: <Pine.LNX.4.61.1201271503160.24418@soloth.lewis.org>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
On 1/27/2012 2:23 PM, Jon Lewis wrote:
>
> It's definitely real, but seems like they're handling it as
> incompetently as possible. We got numerous copies to the same email
> address, the logins didn't work initially. The phone numbers given are
> of questionable utility. Virtually no useful information was provided.
> My attitude at this point is, ignore it until they provide some useful
> information.
>
We finally got the hard copy. No customer IP listed, just our recursive
resolvers, both for the customers as well as the ones that handle the MX
servers.
All that waiting and work for apparently nothing. I'm going to guess
that my bind servers aren't malware infected (outside of being bind
j/king).
Jack