Dynamic IP log retention = 0?

Joe Greco jgreco at ns.sol.net
Fri Mar 13 00:52:45 UTC 2009


> 	Well most port scanning is from compromised boxes.  Once a
> 	box is compromised it can be used for *any* sort of attack.
> 	If you really care about security you take reports of ports
> 	scans seriously.

Yeahbut, the real problem is that port scanning is typically used as
part of a process to infect _other_ boxes.  If you allow this sort of
illness to spread, the patient (that is, the Internet) doesn't get 
better.

... JG
-- 
Joe Greco - sol.net Network Services - Milwaukee, WI - http://www.sol.net
"We call it the 'one bite at the apple' rule. Give me one chance [and] then I
won't contact you again." - Direct Marketing Ass'n position on e-mail spam(CNN)
With 24 million small businesses in the US alone, that's way too many apples.




More information about the NANOG mailing list