IPv4 squatters on the move again?

Christopher Morrow morrowc.lists at gmail.com
Tue Sep 7 11:14:12 CDT 2010


On Tue, Sep 7, 2010 at 10:35 AM, Jon Lewis <jlewis at lewis.org> wrote:
> On Tue, 7 Sep 2010, Christopher Morrow wrote:
>> I used to have some quick/dirty instructions for how to verify that
>> the traffic was in fact proxy traffic, something like:
>> 1) log traffic from the soon-to-be-ex-customer (acl logs are fine)
>> 2) pick an external 'top talker'
>> 3) route that /32 to a host you control
>> 4) run NC on the port that /32 is being contacted on
>> 5) rejoice (and shut now ex-customer interface) when you see: "CONNECT
>> smtp.xxxxx:25"
>
> Seems like a lot of work when you could just setup a monitor session on
> their port and capture a few minutes of actual spam traffic as evidence just
> before shutting their port.

sorry, can't do monitor on a ptp oc-12 link :(




More information about the NANOG mailing list