[149154] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: US DOJ victim letter

daemon@ATHENA.MIT.EDU (Jack Bates)
Mon Jan 30 10:55:03 2012

Date: Mon, 30 Jan 2012 09:54:02 -0600
From: Jack Bates <jbates@brightok.net>
To: Jon Lewis <jlewis@lewis.org>
In-Reply-To: <Pine.LNX.4.61.1201271503160.24418@soloth.lewis.org>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On 1/27/2012 2:23 PM, Jon Lewis wrote:
>
> It's definitely real, but seems like they're handling it as
> incompetently as possible. We got numerous copies to the same email
> address, the logins didn't work initially. The phone numbers given are
> of questionable utility. Virtually no useful information was provided.
> My attitude at this point is, ignore it until they provide some useful
> information.
>

We finally got the hard copy. No customer IP listed, just our recursive 
resolvers, both for the customers as well as the ones that handle the MX 
servers.

All that waiting and work for apparently nothing. I'm going to guess 
that my bind servers aren't malware infected (outside of being bind 
j/king).


Jack


home help back first fref pref prev next nref lref last post