SNaslund at medline.com
Fri Apr 10 00:13:44 UTC 2015
Sorry, I’m getting it now too. False alarm.
From: Josh Luthman [mailto:josh at imaginenetworksllc.com]
Sent: Thursday, April 09, 2015 6:56 PM
To: Naslund, Steve
Cc: NANOG list
Subject: RE: Cisco/Level3 takedown
Websites up for me.
1100 Wayne St
Troy, OH 45373
On Apr 9, 2015 7:55 PM, "Naslund, Steve" <SNaslund at medline.com<mailto:SNaslund at medline.com>> wrote:
Can anyone else get to http://blogs.cisco.com ? I can't seem to reach it and was wondering if there was a counterattack of some type. Traceroute takes me to Rackspace in Dallas but the web site is not up.
From: NANOG [mailto:nanog-bounces at nanog.org<mailto:nanog-bounces at nanog.org>] On Behalf Of Christopher Morrow
Sent: Thursday, April 09, 2015 10:48 AM
To: Sameer Khosla
Cc: nanog at nanog.org<mailto:nanog at nanog.org>
Subject: Re: Cisco/Level3 takedown
On Thu, Apr 9, 2015 at 11:31 AM, Sameer Khosla <skhosla at neutraldata.com<mailto:skhosla at neutraldata.com>> wrote:
> Was just reading http://blogs.cisco.com/security/talos/sshpsychos then checking my routing tables.
> Looks like the two /23's they mention are now being advertised as /24's, and I'm also not sure why cisco published the ssh attack dictionary.
> It seems to me that this is something that if they want to do, they should be working with entire service provider community, not just one provider.
are you sure they aren't engaged with a wider SP community?
(the dictionary seems relevant for: "Oh crap, my root account DOES have password123 as the password :(")
More information about the NANOG