Unless your netwrk is 'broken' and you are being used as a smurf amplifier
to DOS out someone with a smaller pipe?

Thanks,

Ron DuFresne

On Mon, 3 May 1999, batz wrote:

> On Mon, 3 May 1999, W.C. (Jay) Epperson wrote:
> 
> :For several days, we've seen SYN/ACK packets directed to unused addresses
> :within our address space.  TCP source port is often a well-known port like
> :Telnet, Http, etc.  Destination port is generally above 1024, and is mostly
> :either 1974 or 1829.  At first, the packets were all coming from a single
> :network.  We suspected that we were the spoofed side of a SYN flood attack
> :and notified the other network contact.  Later, the traffic from that
> :network stopped, and we now see the traffic coming in from a variety of
> :outside networks.
> :
> :The volume is too low to cause us DOS problems, but we're scratching our
> :heads as to what this is about.  Any clues?
> 
> Your guess about being a spoofed source is a good one as it's possible 
> that the perp is just scanning other networks now. 
> 
> There are some more esoteric possibilities, but that sounds about
> right. 
> 
> --
> batz
> Chief Reverse Engineer 
> Superficial Intelligence Research Division
> Defective Technologies
> 
> 
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
> 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
"Cutting the space budget really restores my faith in humanity.  It
eliminates dreams, goals, and ideals and lets us get straight to the
business of hate, debauchery, and self-annihilation." -- Johnny Hart
        ***testing, only testing, and damn good at it too!***

OK, so you're a Ph.D.  Just don't touch anything.

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to