I am sending it to their security/postmaster (Todd Herr) guru now. -Dennis
-----Original Message----- From: owner-nanog@merit.edu [mailto:owner-nanog@merit.edu] On Behalf Of Chris Horry Sent: Tuesday, June 20, 2006 9:20 AM To: nanog@nanog.org Subject: RoadRunner security
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
A general question to the list about RoadRunner security...
I've been receiving a DNS flood from either a malicious, or badly configured IP in Taiwan since last Thursday. I've contacted the ISP responsible, but if the owner of 140.116.23.19 would mind shutting the damn thing down I'd be really grateful. :)
I'm filtering it at my firewall but the router the RoadRunner controls is happily sending the packets to me still and causing slowdown. After 3 days of convincing them that it wasn't actually my network generatign the traffic, RoadRunner's front line loonies have told me basically, nothing we can do to filter that, sorry.
Does anyone have a contact at RoadRunner who has a clue?
Chris
- -- Chris Horry KG4TSM "A conservative is a man with two perfectly zerbey@wibble.co.uk good legs who, however, has never learned how http://www.wibble.co.uk to walk forward". -- Franklin D. Roosevelt -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2.2 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFEmAQOnAAeGCtMZU4RAnqJAKCOvS1JYnzwYA0v8kVparE4v37HygCgiEgi 5SSItbjyu2bfYXRBFILjy7w= =RCnB -----END PGP SIGNATURE-----