[47966] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Re[6]: "portscans" (was Re: Arbor Networks DoS defense product)

daemon@ATHENA.MIT.EDU (Ralph Doncaster)
Sun May 19 12:12:57 2002

Date: Sun, 19 May 2002 12:13:35 -0400 (EDT)
From: Ralph Doncaster <ralph@istop.com>
To: Allan Liska <allan@allan.org>
Cc: "nanog@merit.edu" <nanog@merit.edu>
In-Reply-To: <6590637554.20020519115915@allan.org>
Message-ID: <Pine.LNX.4.21.0205191210070.1065-100000@cpu1693.adsl.bellglobal.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Errors-To: owner-nanog-outgoing@merit.edu


> RD> I think that's pretty stupid.  If I had my network admin investigate every
> RD> portscan, my staff costs would go up 10x and I'd quickly go bankrupt.
> RD> Instead we keep our servers very secure, and spend the time and effort
> RD> only when there is evidence of a break in.
> 
> I didn't say investigate every portscan, I said assume every portscan
> is hostile.  There is a big difference.

So you assume it's hostile and do what?  Automatically block the source
IP? If you do that then you open up a bigger DOS hole.  Then if someone
sends a bunch of SYN scans with the source address spoofed as your
upstream transit providers' BGP peering IP, poof! you're gone.



home help back first fref pref prev next nref lref last post