[47851] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Arbor Networks DoS defense product

daemon@ATHENA.MIT.EDU (Dan Hollis)
Fri May 17 03:51:18 2002

Date: Fri, 17 May 2002 00:50:40 -0700 (PDT)
From: Dan Hollis <goemon@anime.net>
To: Dragos Ruiu <dr@kyx.net>
Cc: "'nanog@merit.edu'" <nanog@merit.edu>
In-Reply-To: <200205162318.11885.dr@kyx.net>
Message-ID: <Pine.LNX.4.44.0205170048560.32145-100000@sasami.anime.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Errors-To: owner-nanog-outgoing@merit.edu


On Thu, 16 May 2002, Dragos Ruiu wrote:
> But that said.  Blackholing as a response for portscanning
> is stupid.
> If you are a small communications end-point it's dumb.
> Just run portsentry for a while with auto-firewall rules
> if you need convincing.
> If you are a communications service provider providing
> packet transit for others (even employees), it's hostile.

What if you are portscanned repeatedly by a network and that network 
refuses to shut down their scanners even after being asked many times
(eg, rogue chinese and korean networks)

I think that you should leave network policy up to the service provider to 
decide.

-Dan
-- 
[-] Omae no subete no kichi wa ore no mono da. [-]


home help back first fref pref prev next nref lref last post