if it is actually based from there... Mark -- Mark Segal Director, Data and Internet Planning Axxent Corp. Tel: (416)907-2858
-----Original Message----- From: Dan Hollis [mailto:goemon@anime.net] Sent: Monday, April 30, 2001 5:59 PM To: 'nanog@merit.edu' Subject: black hat .cn networks
http://wired.com/news/politics/0,1283,43437,00.html
Time to drop AS4134.
-Dan
Time to drop AS4134.
That might backfire. If they learn that the only way to get stuff through is for it to not come from AS4134, thye might try to make it appear to come from elsewhere. We might all learn just what sort of BGP filters AS4134's neighbors have applied ... -- Brett
On Mon, 30 Apr 2001, Segal, Mark wrote:
if it is actually based from there...
The ones being picked up by the distributed intrusion sensor projects indicate they are. Not suprisingly, they are also listed as "no response" (to attack reports) -Dan
On Mon, Apr 30, 2001 at 03:51:09PM -0700, Dan Hollis wrote: On Mon, 30 Apr 2001, Segal, Mark wrote:
if it is actually based from there...
The ones being picked up by the distributed intrusion sensor projects indicate they are. what distributed intrusion sensor projects are those? k
On Mon, 30 Apr 2001, k claffy wrote:
On Mon, Apr 30, 2001 at 03:51:09PM -0700, Dan Hollis wrote: On Mon, 30 Apr 2001, Segal, Mark wrote:
if it is actually based from there... The ones being picked up by the distributed intrusion sensor projects indicate they are. what distributed intrusion sensor projects are those?
dshield and mynetwatch chinanet shows up several times in the lists of 'top attack ip sources', along with "no response" (to emails reporting to them the attacks) -Dan
participants (4)
-
Brett Frankenberger
-
Dan Hollis
-
k claffy
-
Segal, Mark