North American Network Operators Group|
Date Prev | Date Next |
Date Index |
Thread Index |
Author Index |
Re: Code Red on dial-in ppp
- From: Chris Adams
- Date: Sat Jul 21 14:12:55 2001
Once upon a time, Jason A. Mills <firstname.lastname@example.org> said:
> I'm not sure I see why a POTS PPP link, or some other slow(er) on demand
> link might stop CodeRed. The first-pass payload is under 4096 bytes
> including framing, not exactly something you need a lot of low-latency
> bandwidth to push through. :-/
I don't think the issue is bandwidth. The issue is that the reports
being sent out say such-and-such IP is infected without giving a time
stamp (I got one of the reports as well). Without the time of the
attack, the IP address is absolutely useless, as a hundred users may
have had that IP in the last couple of days.
In my case, out of two dozen hosts reported, all but two were dialup or
DSL IPs, making the report mostly worthless without times.
I don't mean to criticize, because obviously some folks put in a lot of
effort, and it is useful information (especially if you don't have
dialup hosts). Just in my case (at least), it wasn't much help.
Interesting to note that the one host from our IP space that hit one of
our servers was NOT in the report I received. We had over 21,000 hosts
try this on our (Unix/Apache) web servers. Is someone collecting logs
to generate reports?
Chris Adams <email@example.com>
Systems and Network Administrator - HiWAAY Internet Services
I don't speak for anybody but myself - that's enough trouble.