>> I've got something similar. Various offenses, most notably trying >> to speak NetBIOS to me, will usually get an IP blocked. The block >> lasts for only some 24 hours, but sending me *anything* while it is >> up will reset the timer. > NetBIOS is UDP-based, and therefore trivial to spoof. I wonder how > long it takes before someone tricks you into blackholing your DNS > server or default gateway?
See that "usually"? Among other things, certain addresses are immune to blocking. (Well, not strictly; this is actually implemented by immediate unblocking, not by failing to block, but it amounts to the same thing in practice.) Neither of your examples makes sense anyway, since my DNS server is on the house LAN and therefore already blocked anyway - incoming packets with source addresses on the house LAN are dropped by my border router as forgeries, independent of the dynamic blocking - and blocking my default gateway's address would affect nothing but traffic *from* the gateway machine; it wouldn't touch traffic *through* it. /~\ The ASCII der Mouse \ / Ribbon Campaign X Against HTML [EMAIL PROTECTED] / \ Email! 7D C8 61 52 5D E7 2D 39 4E F1 31 3E E8 B3 27 4B _______________________________________________ timekeepers mailing list [email protected] https://fortytwo.ch/mailman/cgi-bin/listinfo/timekeepers
