[69011] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Compromised Hosts?

daemon@ATHENA.MIT.EDU (Mike Tancsa)
Sun Mar 21 22:07:30 2004

Date: Sun, 21 Mar 2004 22:07:56 -0500
To: nanog@merit.edu
From: Mike Tancsa <mike@sentex.net>
In-Reply-To: <405E32B0.7050604@ai.net>
Errors-To: owner-nanog-outgoing@merit.edu


At 07:26 PM 21/03/2004, Deepak Jain wrote:
>Nanogers -
>
>         Would any broadband providers that received automated, detailed 
> (time/date stamp, IP information) with hosts that are being used to 
> attack (say as part of a DDOS attack) actually do anything about it?

 From my experiences, some are much better than others.  The main thing I 
think is to make it as clear and as easy to for the provider to act on the 
issue. So include things like, source IP,port, dest IP,port,  time stamps 
in GMT.  Note that the time is actually accurate--i.e. your clocks are NTP 
sync'd and make that clear in the report.


>         Would the letter have to include information like "x.x.x.x/32 has 
> been blackholed until further notice or contact with you" to be effective?

No.

         ---Mike 


home help back first fref pref prev next nref lref last post