[64754] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: OT: Midco.net

daemon@ATHENA.MIT.EDU (David A. Ulevitch)
Sat Nov 1 01:25:24 2003

Date: Sat, 01 Nov 2003 00:24:38 -0600
From: "David A. Ulevitch" <davidu@everydns.net>
To: nanog@merit.edu
In-Reply-To: <200311010318.hA13Ijj20828@Rocknyou.com>
Errors-To: owner-nanog-outgoing@merit.edu


joej@Rocknyou.com wrote:

>Sorry for the off topic post, but has anyone dealt with Midco.net? 
>I recently reported a Scan from a node belonging there and have met with
>nothing but side steps. Please contact me off list if you have any contacts there. Would like to get this resolved. 
>http://www.rocknyou.com/midco.html
>  
>
On your site you say your server functions to:
"resolve names for Rocknyou.com, log scans
and evil-do-ers attempting to breakin, and sometimes for fun I run
nmap <http://www.insecure.org/nmap/index.html> back at those bad nodes."
(http://www.rocknyou.com/aboutme.html)

So since tonight is Halloween (GMT -6), would you prefer to be "Pot" or 
"Kettle?" :)

There are perfectly valid reasons to get scanned, especially by a well 
known white-hat tool like Nessus.  Script-kiddies and spammers have much 
more robust/directed tools than a general purpose (slow) tool like Nessus.

And from the link you sent about Midco, it looks like they did a fine 
job responding to your request; probably better than most *SP's would do.

-davidu



home help back first fref pref prev next nref lref last post