Anyone want to admit privately (I'll summarize to the list) if they actively
filter certain partitions of APNIC space?

We did a little experiment the past couple of days and saw at 85% of our
port 13[5-9] scans, Code Red/Nimda/formmail attempts, etc. go out the door
by blackholing those networks in .cn and .kr.

Thoughts?  Is it a valid thesis?  I've seen the discussions for spam
mitigation, etc via DNS, but this is actually null routing all their
traffic.

Eric



==========================================================================
  Eric Germann                                        CCTec
  [EMAIL PROTECTED]                                 Van Wert OH 45801
  http://www.cctec.com                                Ph:  419 968 2640
                                                      Fax: 603 825 5893

"The fact that there are actually ways of knowing and characterizing the
extent of one�s ignorance, while still remaining ignorant, may ultimately be
more interesting and useful to people than Yarkovsky"

  -- Jon Giorgini of NASA�s Jet Propulsion Laboratory
BEGIN:VCARD
VERSION:2.1
N:Germann;Eric
FN:Eric Germann
ORG:CCTec
TEL;WORK;VOICE:(419) 968-2640
TEL;WORK;FAX:(603) 825-5893
ADR;WORK:;;17780 Middle Point Road;Van Wert;OH;45891;United States of America
LABEL;WORK;ENCODING=QUOTED-PRINTABLE:17780 Middle Point Road=0D=0AVan Wert, OH 45891=0D=0AUnited States of Americ=
a
URL:
URL:http://www.cctec.com
EMAIL;PREF;INTERNET:[EMAIL PROTECTED]
REV:20010529T013421Z
END:VCARD

Reply via email to