Date: Wed, 3 May 2006 16:20:01 -0700 (PDT) From: Bigby Findrake <bigby@ephemeron.org> To: Robert Huff <roberthuff@rcn.com> Cc: questions@freebsd.org Subject: Re: Semi-OT: responding to attempted breakins Message-ID: <20060503160708.X55239@home.ephemeron.org> In-Reply-To: <17497.9228.336693.720080@jerusalem.litteratus.org> References: <17497.9228.336693.720080@jerusalem.litteratus.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 3 May 2006, Robert Huff wrote: > > As a result of installing new bits on my system, and paying > attention to old ones, I've noticed several attempted break-ins > which I currently believe have been unsucessful. > As I have the appropriate log files, I'd like to contact the > administrators and ISPs for the systems involved. Can someone > recommend a good response boilerplate - something that's concise, > informative, professional, friendly, and yet firm? I've been pretty religious about "responsible reporting" for about 6 months now, reporting all ssh (and recently FTP) attacks to the originating ISP. If I may, allow me to infer from your desire to be "firm" that you would like to cause the behaviour stop, and to give you a piece of advice. I believe that you will be very unhappy if you are reporting for that reason. The attacks, probes, tests, attempts - all of them - aren't going to stop, except by filtering those packets out through one mechanism (a firewall) or another (disconnecting your 'net connection). You will end up bailing water with a teaspoon. /-------------------------------------------------------------------------/ He's the kind of guy, that, well, if you were ever in a jam he'd be there ... with two slices of bread and some chunky peanut butter. finger://bigby@ephemeron.org http://www.ephemeron.org/~bigby/ irc://irc.ephemeron.org/#the_pub news://news.ephemeron.org/alt.lemurs /-------------------------------------------------------------------------/
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20060503160708.X55239>