So if you want to launch a DoS attack against a specific IP address you spoof 
TCP3389 SYNs to networks single homed to XO and they will null it for you.

-- 
Leigh


On 8 Nov 2011, at 04:36, "Blake T. Pfankuch" <bl...@pfankuch.me> wrote:

> Oh yes!  Good lord I about went insane with this.  I was working with a 
> customer single homed to cBeyond.  I spent 3 hours on the phone with cBeyond 
> to figure out what was going on, it looks like a broken route.  Come to find 
> out it was an XO "security null".  The engineer on the phone from cBeyond 
> said to me "Well, I have learned 2 things today.  1, XO nulls for 'security 
> purposes' at random.  2, I am no longer shocked by any ridiculous policy I 
> will ever come across again."
> 
> In this case majority traffic was going from cBeyond to anywhere (via XO) and 
> being eaten, however it was VERY tough to diagnose as all parties involved 
> assumed this would not be occurring between source and destination without 
> good public documentation or at least any record of this happening to someone 
> else.  Also I guess we all assumed that major bandwidth players don't filter 
> anything.
> 
> I personally think its good on paper, but very bad real life until there is a 
> way to notify the end customer of the violation quickly.  This issue 
> literally took 3 full weeks to figure out what was going on.  Yes this works 
> great in a colo datacenter as you have the customer contact info (hopefully). 
>  But in the case where my customers provider was having the IP filtered by 
> their transit it was hell to diagnose.  In my case the customer had a single 
> infected machine that was making outbound connections on TCP3389 in the range 
> of about 100 connections every 5 minutes and because of this was entirely 
> being "security nulled".
> 
> Blake
> 
> -----Original Message-----
> From: clay...@haydel.org [mailto:clay...@haydel.org] 
> Sent: Monday, November 07, 2011 7:43 PM
> To: nanog@nanog.org
> Subject: XO blocking individual IP's
> 
> 
> I'm hoping someone has had the same experiences, and is further toward a 
> resolution on this than I am. About 6 months ago, we noticed that XO was 
> blackholing one specific IP out of a /24.  Traces to that IP stopped on XO's 
> network, traces to anything else out of the block went through fine.
> XO finally admitted that they had a new security system that identifies 
> suspicious traffic and automatically blocks the IP for 30 minutes.  We had to 
> get the IP in question "whitelisted" by their security guys.  The traffic was 
> all legit, it was just on a high port # that they considered suspicious.
> 
> There have several more cases like this, and XO has not been forthcoming with 
> information. We're either looking to be exempted from this filtering or at 
> least get a detailed description of how the system works.  I'm not sure how 
> they think this is acceptable from a major transit provider.
> Anybody else had similar problems?
> 
> 
> Clayton Haydel
> 
> 
> 
> 
> ______________________________________________________________________
> This email has been scanned by the MessageLabs Email Security System.
> For more information please visit http://www.messagelabs.com/email 
> ______________________________________________________________________

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________

Reply via email to