Re: [mailop] Internet Research Project on Linode - Any Experience?

2022-05-09 Thread Grant Taylor via mailop

On 5/8/22 9:18 AM, Mary via mailop wrote:
Linode refused to remove them from their servers because they think 
they are doing "research"...


Aside:  What is research?  A la. why is fire hot?

Interestingly, while doing some "research" of my own, I probed them 
back and found out that they host their severs across a wide range 
of hosting companies, like AWS, DigitalOcean, Linode and Hetzner, 
across different geographical regions.


I have no idea if it is the case or not, but I can see some use in 
conducting research from multiple VPS providers /especially/ if the 
intent of the research is to identify different behaviors based on the 
source VPS.


However, as others have stated, this type of research should be quite 
easy to identify and understand.  As in a landing page on the same 
domain that has sufficient details within one click or full details 
within a few clicks.




--
Grant. . . .
unix || die



smime.p7s
Description: S/MIME Cryptographic Signature
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Internet Research Project on Linode - Any Experience?

2022-05-08 Thread Mary via mailop

I see the same scans on my servers from "internet-research-project.net" and 
from another scammer called "binaryedge.ninja"

Linode refused to remove them from their servers because they think they are 
doing "research"...

Interestingly, while doing some "research" of my own, I probed them back and 
found out that they host their severs across a wide range of hosting companies, 
like AWS, DigitalOcean, Linode and Hetzner, across different geographical 
regions.



On Fri, 6 May 2022 16:16:53 + (UTC) "L. Mark Stone via mailop" 
 wrote:

> So before I start blocking all of the Linode networks from which this traffic 
> originates, I thought I should ask here to see if anyone else has had 
> experience with this internet-research-project.net organization.
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Internet Research Project on Linode - Any Experience?

2022-05-07 Thread Alessandro Vesely via mailop

On Fri 06/May/2022 21:23:24 +0200 Grant Taylor via mailop wrote:

On 5/6/22 11:41 AM, L. Mark Stone via mailop wrote:

So I asked Linode nicely to please take a look; they said they felt it was 
legitimate traffic because it's just "research" and not "malicious", and then 
I asked them to stop because we felt it wasn't legal (or give us their IPs so 
we could stop it), and they said no.


I understand why Linode wouldn't share client's information.  I would expect 
such refusal without a warrant.



I don't.  A similar issue happened to me a couple of years ago.  I reported a 
PHP scan to Linode and they replied it was in the scope of a research project. 
 It was binaryedge.io.  They gave me a pointer to a list of 1240 scanners.  I 
chose to give them my much much smaller list of addresses for them to skip.


Non-malicious scanners become harmful only because of the traps we set up 
against the malicious ones.



Best
Ale
--



___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Internet Research Project on Linode - Any Experience?

2022-05-06 Thread Michael Rathbun via mailop
On Fri, 06 May 2022 15:31:12 -0700, Mike D via mailop 
wrote:

>I highly recommend using greynoise.io to help filter your logs. They do
>a pretty good job of determining what connections are benign scanners
>and which lead to subsequent attacks.

Benign scanners are the ones who transparently announce their intentions,
preferably before commencing their scans.  

ALL others are hostile, without exception.   Especially the ones who are
checking out login vulnerabilities on an SSH port that has been moved to port
2271.

mdr
-- 
  The world was almost won by such an ape!
The nations put him where his kind belong.
  But do not rejoice too soon at your escape.
The womb he crawled from is still going strong.
-- Bertold Brecht,"The Resistible Rise of Arturo UI"

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Internet Research Project on Linode - Any Experience?

2022-05-06 Thread Mike D via mailop

On 2022-05-06 09:16, L. Mark Stone via mailop wrote:

Good Morning,

Asking if anyone has had experience with internet-research-project.net
please?  They have no apparent web presence, so no straightforward way
to contact them.


They can be reached via email using concerns@


Linode hosts this allegedly legitimate security researcher, and my
mail systems logs are full of connections from a large number of IPs
like "cloud-scanner-17c84c24.internet-research-project.net"


I highly recommend using greynoise.io to help filter your logs. They do
a pretty good job of determining what connections are benign scanners
and which lead to subsequent attacks.

 -Mike
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Internet Research Project on Linode - Any Experience?

2022-05-06 Thread Michael Rathbun via mailop
On 6 May 2022 14:53:35 -0400, John Levine via mailop 
wrote:

>They appear to fail on all three criteria.

As do a couple of parties operating out of several /24 or smaller blocks, none
of which are now allowed to connect here.

I cheerfully participate in research, both to my personal benefit and to that
of the others.  I moderate a support group for a particular neurological
condition, and we allow and encourage researchers to invite participants.

I note that none of the "research" efforts I have observed from the logs have
at any time invited participation.  Accordingly, I engage the functional
equivalent of the machete mentioned above.

mdr
-- 
 "There are no laws here, only agreements."  
-- Masahiko

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Internet Research Project on Linode - Any Experience?

2022-05-06 Thread Grant Taylor via mailop

On 5/6/22 12:20 PM, Bill Cole via mailop wrote:
If someone were to try opening my front door in the name of "research" 
there is a non-zero chance that they would have a very unpleasant 
experience involving a machete and were that to happen, the police would 
not arrest me. (See "castle doctrine")


And yet there are people that do exactly that, walk down the street 
trying to open car / home / office doors.  Many will subsequently go 
into a door that does open.  Some may close the door and make note of 
the door's location.


Scanners should expect hostile reactions. Not machete-to-the-face 
hostile, but hostile. The best of them are programmatic trespassers.


I completely agree.  Everyone should expect repercussions for their 
actions.  How (un)pleasant the repercussion is will be dependent on 
their actions.


Given the non-transparency I've seen with Linode, you can expect to 
encounter blockage as collateral damage. If you're domiciled by Linode 
in the vicinity of "researchers" who randomly wander the net trying 
random ports without clearly and openly documenting their "research" you 
can expect to be treated similarly to your neighbor, if your landlord 
doesn't make it very clear who is who.


I understand.  I agree with the logic.  But that doesn't mean that I 
/like/ the meaning therein.  It's one of the reasons that I keep an eye 
on things and wonder /when/, not /if/, I'll need to move.




--
Grant. . . .
unix || die



smime.p7s
Description: S/MIME Cryptographic Signature
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Internet Research Project on Linode - Any Experience?

2022-05-06 Thread Grant Taylor via mailop

On 5/6/22 11:41 AM, L. Mark Stone via mailop wrote:

Hi Grant,


Hi Mark,


Thanks for your reply.


You're welcome.

But IMHO, just opening up a connection on TCP port 25 repeatedly 
without actually trying to send an email inbound, or opening up a 
connection on TCP port 587 without trying to authenticate is not a 
legitimate nor legal use;


I largely agree.  My qualm is over the use of the word "legal".  I'm not 
aware of any laws that make repeatedly opening TCP connections to ports 
and not utilizing the ports for the protocols intended purpose.



it pretty much looks like an APT that's a prelude to a DDoS attack.


A agree that usage of the port atypical to how the protocol normally 
operates can be construed as an attack.


So I asked Linode nicely to please take a look; they said they 
felt it was legitimate traffic because it's just "research" and not 
"malicious", and then I asked them to stop because we felt it wasn't 
legal (or give us their IPs so we could stop it), and they said no.


I understand why Linode wouldn't share client's information.  I would 
expect such refusal without a warrant.


I think the definition / explanation of "legal" will come into play as 
defense of abuse conducted by a Linode customer.


If this behavior was coming from a single IP, or in sufficient volume, 
our protections would have already blocked the offending IPs.


ACK

Since I have no way to vet the legitimacy of this organization, 
I asked here if anyone else has experience with them.


Fair enough.



--
Grant. . . .
unix || die



smime.p7s
Description: S/MIME Cryptographic Signature
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Internet Research Project on Linode - Any Experience?

2022-05-06 Thread John Levine via mailop
It appears that L. Mark Stone via mailop  
said:
>Thanks Jarland for your reply.  We run a commercial multi-tenant email hosting 
>service so tightening the screws down as much as you suggest is not possible.
>
>To my original question though... Do you have any experience with 
>internet-research-project.net?

Not directly, but in my experience, real research projects make it
easy to find out who they are, what they are doing, and how to tell
them to stop bothering you.

They appear to fail on all three criteria.

R's,
John
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Internet Research Project on Linode - Any Experience?

2022-05-06 Thread Bill Cole via mailop

On 2022-05-06 at 13:13:54 UTC-0400 (Fri, 6 May 2022 11:13:54 -0600)
Grant Taylor via mailop 
is rumored to have said:


On 5/6/22 10:33 AM, Jarland Donnell via mailop wrote:
Isn't that a bit of an overreaction? If you didn't want any 
undesirable traffic you'd whitelist IPs in your firewall or run it on 
LAN. It's a very standard expectation that other servers will hit 
yours without your consent on the public internet.


I too believe that having something connected to the Internet without 
a firewall (et al.) filtering the connections is implicit agreement 
for someone to connect to the port.


Nope.

If someone were to try opening my front door in the name of "research" 
there is a non-zero chance that they would have a very unpleasant 
experience involving a machete and were that to happen, the police would 
not arrest me. (See "castle doctrine")


Scanners should expect hostile reactions. Not machete-to-the-face 
hostile, but hostile. The best of them are programmatic trespassers.



If for nothing other than lack of steps to prevent them from doing so.

In my opinion, being on the Internet is very much akin to being in 
public.  You have exceedingly little, if any, expectation that someone 
won't try to connect to any port that they can communicate with.


As a Linode user, I would also prefer it if you didn't block Linode 
addresses carte blanch.


Given the non-transparency I've seen with Linode, you can expect to 
encounter blockage as collateral damage. If you're domiciled by Linode 
in the vicinity of "researchers" who randomly wander the net trying 
random ports without clearly and openly documenting their "research" you 
can expect to be treated similarly to your neighbor, if your landlord 
doesn't make it very clear who is who.



--
Bill Cole
b...@scconsult.com or billc...@apache.org
(AKA @grumpybozo and many *@billmail.scconsult.com addresses)
Not Currently Available For Hire
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Internet Research Project on Linode - Any Experience?

2022-05-06 Thread L. Mark Stone via mailop
Thanks Jarland for your reply.  We run a commercial multi-tenant email hosting 
service so tightening the screws down as much as you suggest is not possible.

To my original question though... Do you have any experience with 
internet-research-project.net?

All the best, 
Mark 
_ 
L. Mark Stone, Founder 
North America's Leading Zimbra VAR/BSP/Training Partner 
For Companies With Mission-Critical Email Needs

- Original Message -
From: "Jarland Donnell via mailop" 
To: "mailop" 
Sent: Friday, May 6, 2022 12:33:38 PM
Subject: Re: [mailop] Internet Research Project on Linode - Any Experience?

Isn't that a bit of an overreaction? If you didn't want any undesirable 
traffic you'd whitelist IPs in your firewall or run it on LAN. It's a 
very standard expectation that other servers will hit yours without your 
consent on the public internet.

On 2022-05-06 11:16, L. Mark Stone via mailop wrote:
> Good Morning,
> 
> Asking if anyone has had experience with internet-research-project.net
> please?  They have no apparent web presence, so no straightforward way
> to contact them.
> 
> Linode hosts this allegedly legitimate security researcher, and my
> mail systems logs are full of connections from a large number of IPs
> like "cloud-scanner-17c84c24.internet-research-project.net" where the
> server just drops the connection without attempting authentication.
> Looks like a port probe.
> 
> I opened up a support case with Linode; they said their Trust &
> Security team feels their customer is doing legitimate security
> research. I responded that I thought it was a violation of the
> Computer Fraud and Abuse Act of 1986 (as amended), as we have never
> authorized any third party to access our systems for anything other
> than sending legal email to our customers.
> 
> Linode said if I gave Linode all of my servers' IP addresses, they
> would pass them on to internet-reserach-project.net with a request
> that they not probe my IPs any longer (I declined).  I responded
> asking for all of the IPs internet-research-project.net uses so I can
> block them on my firewall (Linode declined).
> 
> So before I start blocking all of the Linode networks from which this
> traffic originates, I thought I should ask here to see if anyone else
> has had experience with this internet-research-project.net
> organization.
> 
> I used to host at Linode. I thought they were pretty good a few years
> ago, with great customer service and solid hosting at the time.
> 
> Any insights/suggestions/etc. are greatly appreciated.
> 
> Thanks in advance,
> Mark
> _
> L. Mark Stone, Founder
> Mission Critical Email LLC
> North America's Leading Zimbra VAR/BSP/Training Partner
> For Companies With Mission-Critical Email Needs
> ___
> mailop mailing list
> mailop@mailop.org
> https://list.mailop.org/listinfo/mailop
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Internet Research Project on Linode - Any Experience?

2022-05-06 Thread Michael Peddemors via mailop
Of course, most Internet probing systems SHOULD have full transparency, 
and of course not probe any IPs at abnormal or high rates without 
considering the destination.


My opinion, if they aren't transparent with their dealings, including 
PTR's, URLs', User Agents, HELO, and of course 'rwhois', then yes..


If I don't know who they are, and can't contact them to find out, then 
block them.  That does for any email 'validators', or probes of any 
type.  If Shodan wasn't transparent, I would block them too..


This is irrespective of what hosting company they are using.  (Just take 
a look at all of the anonymous ones coming from Azure and AWS)


But, if they aren' abusive, and they are transparent, then hey.. if it 
doesn't hurt, why worry..


On 2022-05-06 09:16, L. Mark Stone via mailop wrote:

Good Morning,

Asking if anyone has had experience with internet-research-project.net please?  
They have no apparent web presence, so no straightforward way to contact them.

Linode hosts this allegedly legitimate security researcher, and my mail systems logs are 
full of connections from a large number of IPs like 
"cloud-scanner-17c84c24.internet-research-project.net" where the server just 
drops the connection without attempting authentication.  Looks like a port probe.

I opened up a support case with Linode; they said their Trust & Security team 
feels their customer is doing legitimate security research. I responded that I 
thought it was a violation of the Computer Fraud and Abuse Act of 1986 (as 
amended), as we have never authorized any third party to access our systems for 
anything other than sending legal email to our customers.

Linode said if I gave Linode all of my servers' IP addresses, they would pass 
them on to internet-reserach-project.net with a request that they not probe my 
IPs any longer (I declined).  I responded asking for all of the IPs 
internet-research-project.net uses so I can block them on my firewall (Linode 
declined).

So before I start blocking all of the Linode networks from which this traffic 
originates, I thought I should ask here to see if anyone else has had 
experience with this internet-research-project.net organization.

I used to host at Linode. I thought they were pretty good a few years ago, with 
great customer service and solid hosting at the time.

Any insights/suggestions/etc. are greatly appreciated.

Thanks in advance,
Mark
_
L. Mark Stone, Founder
Mission Critical Email LLC
North America's Leading Zimbra VAR/BSP/Training Partner
For Companies With Mission-Critical Email Needs
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop




--
"Catch the Magic of Linux..."

Michael Peddemors, President/CEO LinuxMagic Inc.
Visit us at http://www.linuxmagic.com @linuxmagic
A Wizard IT Company - For More Info http://www.wizard.ca
"LinuxMagic" a Registered TradeMark of Wizard Tower TechnoServices Ltd.

604-682-0300 Beautiful British Columbia, Canada

This email and any electronic data contained are confidential and intended
solely for the use of the individual or entity to which they are addressed.
Please note that any views or opinions presented in this email are solely
those of the author and are not intended to represent those of the company.
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Internet Research Project on Linode - Any Experience?

2022-05-06 Thread L. Mark Stone via mailop
Hi Grant,

Thanks for your reply.  Sure, I expect all sorts of folks (including spammers) 
to try to send email to my customers, as well as bad actors who will try to 
brute-force accounts. We all have lots of protections in place for those 
circumstances.

But IMHO, just opening up a connection on TCP port 25 repeatedly without 
actually trying to send an email inbound, or opening up a connection on TCP 
port 587 without trying to authenticate is not a legitimate nor legal use; it 
pretty much looks like an APT that's a prelude to a DDoS attack.

So I asked Linode nicely to please take a look; they said they felt it was 
legitimate traffic because it's just "research" and not "malicious", and then I 
asked them to stop because we felt it wasn't legal (or give us their IPs so we 
could stop it), and they said no.

If this behavior was coming from a single IP, or in sufficient volume, our 
protections would have already blocked the offending IPs. 

Since I have no way to vet the legitimacy of this organization, I asked here if 
anyone else has experience with them.

Thanks again, 
Mark 
_ 
L. Mark Stone, Founder 
North America's Leading Zimbra VAR/BSP/Training Partner 
For Companies With Mission-Critical Email Needs

- Original Message -
From: "Grant Taylor via mailop" 
To: "mailop" 
Sent: Friday, May 6, 2022 1:13:54 PM
Subject: Re: [mailop] Internet Research Project on Linode - Any Experience?

On 5/6/22 10:33 AM, Jarland Donnell via mailop wrote:
> Isn't that a bit of an overreaction? If you didn't want any undesirable 
> traffic you'd whitelist IPs in your firewall or run it on LAN. It's a 
> very standard expectation that other servers will hit yours without your 
> consent on the public internet.

I too believe that having something connected to the Internet without a 
firewall (et al.) filtering the connections is implicit agreement for 
someone to connect to the port.  If for nothing other than lack of steps 
to prevent them from doing so.

In my opinion, being on the Internet is very much akin to being in 
public.  You have exceedingly little, if any, expectation that someone 
won't try to connect to any port that they can communicate with.

As a Linode user, I would also prefer it if you didn't block Linode 
addresses carte blanch.



-- 
Grant. . . .
unix || die


___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Internet Research Project on Linode - Any Experience?

2022-05-06 Thread Grant Taylor via mailop

On 5/6/22 11:03 AM, Michael Butler via mailop wrote:
If you see an unknown person walk up to your car and try all the doors, 
the hood and the trunk, even if it's parked on a public street, you'd 
likely call the police.


Agreed.

I believe that contacting Linode's abuse desk is akin to calling the police.

Remember, just because you call the police / report the problem to 
Linode, that doesn't mean that the perpetrator will be identified / 
dealt with.


What annoys me more is that every two-bit organization is now doing this 
under the banner of "research" .. so now, instead of a single guy 
checking your car, we've got entire communities probing not only your 
car but also your house.


I would suggest parking your car in a non-public space / behind a 
firewall -- if at all possible.


How much "noise" should we tolerate before we decide it's a problem? 
Until it saturates our uplink(s)?


That's up to each recipient of such actions.

While I have automated mitigations in place, these do have limits that 
I'd rather not reach.


Responses once the limits of toleration are also up to recipients of 
such actions.


My opinion is that gone are the days where we can expect non-public 
ports to be left alone while still being accessible on the Internet.




--
Grant. . . .
unix || die



smime.p7s
Description: S/MIME Cryptographic Signature
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Internet Research Project on Linode - Any Experience?

2022-05-06 Thread Grant Taylor via mailop

On 5/6/22 10:33 AM, Jarland Donnell via mailop wrote:
Isn't that a bit of an overreaction? If you didn't want any undesirable 
traffic you'd whitelist IPs in your firewall or run it on LAN. It's a 
very standard expectation that other servers will hit yours without your 
consent on the public internet.


I too believe that having something connected to the Internet without a 
firewall (et al.) filtering the connections is implicit agreement for 
someone to connect to the port.  If for nothing other than lack of steps 
to prevent them from doing so.


In my opinion, being on the Internet is very much akin to being in 
public.  You have exceedingly little, if any, expectation that someone 
won't try to connect to any port that they can communicate with.


As a Linode user, I would also prefer it if you didn't block Linode 
addresses carte blanch.




--
Grant. . . .
unix || die



smime.p7s
Description: S/MIME Cryptographic Signature
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Internet Research Project on Linode - Any Experience?

2022-05-06 Thread Michael Butler via mailop

On 5/6/22 12:33, Jarland Donnell via mailop wrote:
Isn't that a bit of an overreaction? If you didn't want any undesirable 
traffic you'd whitelist IPs in your firewall or run it on LAN. It's a 
very standard expectation that other servers will hit yours without your 
consent on the public internet.


If you see an unknown person walk up to your car and try all the doors, 
the hood and the trunk, even if it's parked on a public street, you'd 
likely call the police.


What annoys me more is that every two-bit organization is now doing this 
under the banner of "research" .. so now, instead of a single guy 
checking your car, we've got entire communities probing not only your 
car but also your house.


How much "noise" should we tolerate before we decide it's a problem? 
Until it saturates our uplink(s)?


While I have automated mitigations in place, these do have limits that 
I'd rather not reach.




On 2022-05-06 11:16, L. Mark Stone via mailop wrote:

Good Morning,

Asking if anyone has had experience with internet-research-project.net
please?  They have no apparent web presence, so no straightforward way
to contact them.

Linode hosts this allegedly legitimate security researcher, and my
mail systems logs are full of connections from a large number of IPs
like "cloud-scanner-17c84c24.internet-research-project.net" where the
server just drops the connection without attempting authentication.
Looks like a port probe.

I opened up a support case with Linode; they said their Trust &
Security team feels their customer is doing legitimate security
research. I responded that I thought it was a violation of the
Computer Fraud and Abuse Act of 1986 (as amended), as we have never
authorized any third party to access our systems for anything other
than sending legal email to our customers.

Linode said if I gave Linode all of my servers' IP addresses, they
would pass them on to internet-reserach-project.net with a request
that they not probe my IPs any longer (I declined).  I responded
asking for all of the IPs internet-research-project.net uses so I can
block them on my firewall (Linode declined).

So before I start blocking all of the Linode networks from which this
traffic originates, I thought I should ask here to see if anyone else
has had experience with this internet-research-project.net
organization.

I used to host at Linode. I thought they were pretty good a few years
ago, with great customer service and solid hosting at the time.

Any insights/suggestions/etc. are greatly appreciated.

Thanks in advance,
Mark
_
L. Mark Stone, Founder
Mission Critical Email LLC
North America's Leading Zimbra VAR/BSP/Training Partner
For Companies With Mission-Critical Email Needs
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop


Re: [mailop] Internet Research Project on Linode - Any Experience?

2022-05-06 Thread Jarland Donnell via mailop
Isn't that a bit of an overreaction? If you didn't want any undesirable 
traffic you'd whitelist IPs in your firewall or run it on LAN. It's a 
very standard expectation that other servers will hit yours without your 
consent on the public internet.


On 2022-05-06 11:16, L. Mark Stone via mailop wrote:

Good Morning,

Asking if anyone has had experience with internet-research-project.net
please?  They have no apparent web presence, so no straightforward way
to contact them.

Linode hosts this allegedly legitimate security researcher, and my
mail systems logs are full of connections from a large number of IPs
like "cloud-scanner-17c84c24.internet-research-project.net" where the
server just drops the connection without attempting authentication.
Looks like a port probe.

I opened up a support case with Linode; they said their Trust &
Security team feels their customer is doing legitimate security
research. I responded that I thought it was a violation of the
Computer Fraud and Abuse Act of 1986 (as amended), as we have never
authorized any third party to access our systems for anything other
than sending legal email to our customers.

Linode said if I gave Linode all of my servers' IP addresses, they
would pass them on to internet-reserach-project.net with a request
that they not probe my IPs any longer (I declined).  I responded
asking for all of the IPs internet-research-project.net uses so I can
block them on my firewall (Linode declined).

So before I start blocking all of the Linode networks from which this
traffic originates, I thought I should ask here to see if anyone else
has had experience with this internet-research-project.net
organization.

I used to host at Linode. I thought they were pretty good a few years
ago, with great customer service and solid hosting at the time.

Any insights/suggestions/etc. are greatly appreciated.

Thanks in advance,
Mark
_
L. Mark Stone, Founder
Mission Critical Email LLC
North America's Leading Zimbra VAR/BSP/Training Partner
For Companies With Mission-Critical Email Needs
___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

___
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop