Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Submission + - Ask Slashdot: How to deal with persistent and incessant port scanner

jetkins writes: What would you do if your firewall was being persistently targeted by port scans from a specific group of machines from one particular company?

I run a Sophos UTM9 software firewall appliance on my home network. Works great, and the free Home Use license provides a bunch of really nice features normally only found on commercial-grade gear. One of those is the ability to detect, block, and report port scans, and under normal circumstances I only get the occasional alert when some script kiddie comes a-knocking at my door.

But in recent months I have been getting flooded with alerts of scans from one particular company. I initially reported it to my own ISP's (RoadRunner's) abuse desk, on the assumption that if they're scanning me then they're probably scanning a bunch of my neighbors as well, and any responsible ISP would probably want to block this BS, but all I ever got back was an automated acknowledgement and zero action.

So I used DNS lookup and WHOIS to find their phone number, and spoke with someone there; it appears that they're a small outfit, and I was assured that they had a good idea where it was coming from and that they would make it stop. Indeed, it did stop a few days later but then it was back again, unabated, after another week or so. So last week I called them again, and was once again assured of a resolution. No dice, the scans continue to pour in.

I've already blocked their subnet at my firewall, but the UTM apparently does attack detection before filtering, so that didn't stop the alerts. And although I *could* disable port scan alerts, it's an all-or-nothing thing and I'm not prepared to turn them off completely.

This afternoon I forwarded the twenty-something alerts that I've received so far today, to their abuse@ address with an appeal for a Christmas Miracle, but frankly I'm not holding out much hope that it will have any effect.

So, Slashdotters, what should I do if this continues into the new year? Start automatically bouncing every report to their abuse address? Sic Anonymous on them? Start calling them every time? I'm open to suggestions.

Comment Meraki and dense deployments (Score 1) 178

Hey everyone. I'm a software engineer at Meraki (mentioned earlier in the thread by dotwaffle) and wanted to chime in and offer what I can. Our gear is commonly used at conferences, including the most recent LeWeb, a conference in Paris with about 2,000 attendees and VERY heavy WiFi use (social media types that are tweeting, blogging, posting photos and accessing WiFi from their cell phones and laptops). We covered a 12,000 square foot room and other areas without any downtime or customer complaints. This was a huge improvement over the 2008 conference, when poor WiFi topped the list of attendee complaints.

Dotwaffle posted a link to our blog post about LeWeb which is worth re-linking. That photo was taken when the speaker asked everyone to hold up their iPhone.

We used MR14 access points with channel spreading and band steering enabled. This allowed us to use the entire wireless spectrum and avoid congestion on a single frequency (both of these are 1-click options when configuring your network). I'm happy to answer any technical questions you might have, or you can visit our website to learn more.

The Internet

Are Amazon's Web Services Going Open Source? 42

ruphus13 writes "Amazon has been one of the early movers in the cloud computing space, with its AWS offerings, including S3 and EC2. Now, there is a lot of chatter around the imminent open sourcing of all its APIs and services and the impact that will have on the other 'clouds' out there — public or private. From the article, 'Amazon faces significant threats from open source cloud computing efforts if it pursues a purely proprietary path [...] Amazon can't ignore the cost advantages and diversity of product offerings that open source players are already offering in the cloud computing space. The company's best move is to open source its tools, which will end up diversifying them, play on a level field in terms of cost with the open source alternatives, and charge for services. Absent these moves, the company will lose potential customers to free, open source alternatives [...] Word is Amazon's legal team is currently 'investigating' open sourcing their various web services API's including EC2, S3, etc.', although these have not been confirmed by Amazon."

Mercury Contamination Vs. Energy-Efficient Lightbulbs 801

phyrebyrd writes "How much money does it take to screw in a compact fluorescent lightbulb? About US$4.28 for the bulb and labor — unless you break the bulb. Then you, like Brandy Bridges of Ellsworth, Maine, could be looking at a cost of about US$2,004.28, which doesn't include the costs of frayed nerves and risks to health."
The Internet

Hackers Invited To Crack Internet Voting 119

InternetVoting writes "The Philippine government and the International Foundation for Electoral System will be soliciting hackers to test the security of of their Internet voting system that will be tested in an upcoming pilot program." From the article,"Local and foreign computer hackers will be tapped to try and break into an Internet-based voting system that will be pilot tested by the country's Commission on Elections (Comelec) starting July 10."
Power

New Solar Panel Design Traps More Light 334

GoSun wrote in with an article about new solar panels that opens, "Sunlight has never really caught fire as a power source, mostly because generating electricity with solar cells is more expensive and less efficient than some conventional sources. But a new solar panel unveiled this month by the Georgia Tech Research Institute hopes to brighten the future of the energy source." The new panels are able to produce sixty times the current of traditional models.
Apple

US University Dumps Windows to go All Mac 368

MacKeyser passed us a link to a MacWorld article about a University doing things a little differently. Instead of sticking with their inefficient mix of Apple and PC systems, the college is doing a 'total technology refresh', and adopting an all-Mac policy on the campus. Previously, a class at Wilkes University would be outfitted with something like 20 Macs and 20 PCs, to allow for individual preferences in software and OS use. With Boot Camp students at the Pennsylvania liberal arts college will be able to switch between Windows and OSX, choosing which applications and OS to use at any given time. "[Scott Byers, vice president for finance and the head of campus IT said] 'We think it will save $150,000 directly, in buying fewer units - even though the Macs cost more per unit than PCs.' The school, which enrolls about 4,000 undergraduate and graduate students, will reduce its inventory from nearly 1,700 computers to around 1,450 after the change over. Other costs savings, however, will be harder to measure. 'By standardizing, the IT department should be more productive,' Byers said."
The Almighty Buck

Dow Jones Plunge Fueled by Overwhelmed Computers 215

cloudscout writes "The Dow Jones Industrial Average dropped over 400 points today. While there were various valid financial reasons for such a decline, some of the blame is being placed on computer systems that couldn't keep up with the abnormally high volume at the New York Stock Exchange and the resulting tremor as they switched over to a backup system."

Slashdot Top Deals

One can search the brain with a microscope and not find the mind, and can search the stars with a telescope and not find God. -- J. Gustav White

Working...