Cisco/Level3 takedown

Naslund, Steve SNaslund at
Fri Apr 10 00:13:44 UTC 2015

Sorry, I’m getting it now too.  False alarm.


From: Josh Luthman [mailto:josh at]
Sent: Thursday, April 09, 2015 6:56 PM
To: Naslund, Steve
Cc: NANOG list
Subject: RE: Cisco/Level3 takedown

Websites up for me.

Josh Luthman
Office: 937-552-2340
Direct: 937-552-2343
1100 Wayne St
Suite 1337
Troy, OH 45373
On Apr 9, 2015 7:55 PM, "Naslund, Steve" <SNaslund at<mailto:SNaslund at>> wrote:
Can anyone else get to  ?  I can't seem to reach it and was wondering if there was a counterattack of some type.  Traceroute takes me to Rackspace in Dallas but the web site is not up.

Steven Naslund
Chicago IL

-----Original Message-----
From: NANOG [mailto:nanog-bounces at<mailto:nanog-bounces at>] On Behalf Of Christopher Morrow
Sent: Thursday, April 09, 2015 10:48 AM
To: Sameer Khosla
Cc: nanog at<mailto:nanog at>
Subject: Re: Cisco/Level3 takedown

On Thu, Apr 9, 2015 at 11:31 AM, Sameer Khosla <skhosla at<mailto:skhosla at>> wrote:
> Was just reading then checking my routing tables.
> Looks like the two /23's they mention are now being advertised as /24's, and I'm also not sure why cisco published the ssh attack dictionary.
> It seems to me that this is something that if they want to do, they should be working with entire service provider community, not just one provider.

are you sure they aren't engaged with a wider SP community?
(the dictionary seems relevant for: "Oh crap, my root account DOES have password123 as the password :(")

More information about the NANOG mailing list