Educause Security Discussion
mailing list archives
Re: Connectivity problems with the US Army
From: "Pace, Guy" <gpace () CIS CTC EDU>
Date: Fri, 19 Jan 2007 10:05:59 -0800
Maybe you did get a notification. Who monitors your abuse email alias?
Did you respond or was it handled with an auto-responder?
My own experience is that a lot of the abuse aliases are either not
monitored, use auto-responders, or they just seem like a black hole. Is
the information in the whois current? When was the last time you checked
your domain registration for current info?
The network and security admins in the .mil networks have just as much
time and resources, or less, than we do. If they get 29 of your IP's
hitting their perimeter, they'll block your domain. Investigation and
remediation--and notification--can follow when there is time ... If
there is time. From the .mil perspective, .edu networks are a vast
cespool of infected/bot'ed systems and that have been used against .mil
networks in the past. Blocking your domain isn't extreme, just simple
self-defense in times of limited personnel and other resources.
How many times have you sent notes with log extracts to ISP's or abuse
contacts about probes or attacks on your network only to get either an
auto-reply or nothing and watch the activity continue and continue, day
after day? Out of the last seven years, I can count on one hand the
number of actual responses I got from abuse contacts regarding serious
malicious traffic against one of my networks. One was from a Japanese
admin. One was from a sys admin at a .edu (an Oregon CC, BTW). The other
two were from .com/ISP's. That is out of more than a thousand.
I think we are way past the time when we can expect polite.
Guy L. Pace, CISSP
Center for Information Services (CIS)
3101 Northup Way, Suite 100
Bellevue, WA 98004
gpace () cis ctc edu
From: Brock, Anthony - NET [mailto:Anthony.Brock () OREGONSTATE EDU]
Sent: Friday, January 19, 2007 9:18 AM
To: SECURITY () LISTSERV EDUCAUSE EDU
Subject: Re: [SECURITY] Connectivity problems with the US Army
Maybe they meant 29 IPs were probing. We saw around 35 of your IPs
either scanning port 2967 or actively attempting to exploit the
Symantec vulnerability against systems here.
Very possible. However, this still seems a bit extreme for implementing
a "permanent block" of this scale. Also, there should be some method for
notifying the affected site and correcting the issue.
- Re: Connectivity problems with the US Army, (continued)