North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

RoadRunner security

  • From: Chris Horry
  • Date: Tue Jun 20 10:17:02 2006

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

A general question to the list about RoadRunner security...

I've been receiving a DNS flood from either a malicious, or badly
configured IP in Taiwan since last Thursday.  I've contacted the ISP
responsible, but if the owner of 140.116.23.19 would mind shutting the
damn thing down I'd be really grateful. :)

I'm filtering it at my firewall but the router the RoadRunner controls
is happily sending the packets to me still and causing slowdown.  After
3 days of convincing them that it wasn't actually my network generatign
the traffic, RoadRunner's front line loonies have told me basically,
nothing we can do to filter that, sorry.

Does anyone have a contact at RoadRunner who has a clue?

Chris

- --
Chris Horry KG4TSM      "A conservative is a man with two perfectly
[email protected]      good legs who, however, has never learned how
http://www.wibble.co.uk  to walk forward".  -- Franklin D. Roosevelt
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFEmAQOnAAeGCtMZU4RAnqJAKCOvS1JYnzwYA0v8kVparE4v37HygCgiEgi
5SSItbjyu2bfYXRBFILjy7w=
=RCnB
-----END PGP SIGNATURE-----