Merit Network
Can't find what you're looking for? Search the Mail Archives.
  About Merit   Services   Network   Resources & Support   Network Research   News   Events   Home

Discussion Communities: Merit Network Email List Archives

North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: Code Red on dial-in ppp

  • From: Chris Adams
  • Date: Sat Jul 21 14:12:55 2001

Once upon a time, Jason A. Mills <phyxis@rottweiler.org> said:
> I'm not sure I see why a POTS PPP link, or some other slow(er) on demand
> link might stop CodeRed. The first-pass payload is under 4096 bytes
> including framing, not exactly something you need a lot of low-latency
> bandwidth to push through. :-/

I don't think the issue is bandwidth.  The issue is that the reports
being sent out say such-and-such IP is infected without giving a time
stamp (I got one of the reports as well).  Without the time of the
attack, the IP address is absolutely useless, as a hundred users may
have had that IP in the last couple of days.

In my case, out of two dozen hosts reported, all but two were dialup or
DSL IPs, making the report mostly worthless without times.

I don't mean to criticize, because obviously some folks put in a lot of
effort, and it is useful information (especially if you don't have
dialup hosts).  Just in my case (at least), it wasn't much help.

Interesting to note that the one host from our IP space that hit one of
our servers was NOT in the report I received.  We had over 21,000 hosts
try this on our (Unix/Apache) web servers.  Is someone collecting logs
to generate reports?
-- 
Chris Adams <cmadams@hiwaay.net>
Systems and Network Administrator - HiWAAY Internet Services
I don't speak for anybody but myself - that's enough trouble.




Discussion Communities


About Merit | Services | Network | Resources & Support | Network Research
News | Events | Contact | Site Map | Merit Network Home


Merit Network, Inc.