North American Network Operators Group Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical RE: RoadRunner security
I am sending it to their security/postmaster (Todd Herr) guru now. -Dennis > -----Original Message----- > From: [email protected] [mailto:[email protected]] On > Behalf Of Chris Horry > Sent: Tuesday, June 20, 2006 9:20 AM > To: [email protected] > Subject: RoadRunner security > > > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > A general question to the list about RoadRunner security... > > I've been receiving a DNS flood from either a malicious, or > badly configured IP in Taiwan since last Thursday. I've > contacted the ISP responsible, but if the owner of > 140.116.23.19 would mind shutting the damn thing down I'd be > really grateful. :) > > I'm filtering it at my firewall but the router the RoadRunner > controls is happily sending the packets to me still and > causing slowdown. After > 3 days of convincing them that it wasn't actually my network > generatign the traffic, RoadRunner's front line loonies have > told me basically, nothing we can do to filter that, sorry. > > Does anyone have a contact at RoadRunner who has a clue? > > Chris > > - -- > Chris Horry KG4TSM "A conservative is a man with two perfectly > [email protected] good legs who, however, has never learned how > http://www.wibble.co.uk to walk forward". -- Franklin D. > Roosevelt -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.4.2.2 (MingW32) > Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org > > iD8DBQFEmAQOnAAeGCtMZU4RAnqJAKCOvS1JYnzwYA0v8kVparE4v37HygCgiEgi > 5SSItbjyu2bfYXRBFILjy7w= > =RCnB > -----END PGP SIGNATURE----- >
|