panix.com hijacked (VeriSign refuses to help)

William Allen Simpson wsimpson at greendragon.com
Sun Jan 16 08:38:35 UTC 2005


Since folks have been working on this for hours, and according to
posts on NANOG, both MelbourneIT and Verisign refuse to do anything
for days or weeks, would it be a good time to take drastic action?

Think of what we'd do about a larger ISP, or the Well, or really any
serious financial target.

Think of the damage from harvesting <>logins and mail passwords of
panix users.










===

Does somebody have a fast DNS server that can AXFR the records from
those 2 name servers, then fix the panix.com entries?

Are people willing to announce some replacement servers as /32 BGP?
Sort of an emergency anycast?

===

Alternatively, are people willing to block those name servers and/or
the entire blocks they are located in, to prevent the distribution of
the false panix.com addresses?

-- 
William Allen Simpson
    Key fingerprint =  17 40 5E 67 15 6F 31 26  DD 0D B9 9B 6A 15 2C 32




More information about the NANOG mailing list