Hi gary,
This is interesting as I have seen port scans on ports under 1024,
such as 23, 80, 111, 137 and 139. The one port 80 scan that I tracked
down was definitely not QWest - it was a porn server.
I have VDSL in Anthem.
Anyone care to probe port 80 on 130.13.163.229? I would appreciate
it.
George
Gary Nichols wrote:
>
> Let me clarify what Kevin just said:
>
> If you are a VDSL (TV) customer, your ports are already blocked. My
> machines that are located on my LAN at home haven't seen ONE instance of
> this (I have the 1MB up/ 1MB down service).
>
> If you are a DSL (Megabit) customer, your ports are not blocked. I
> think this is because they mix residential and business customers on the
> same IP space. If you are a residential customer, your TOS states that
> you aren't allowed to run services behind their IP space. Business
> customers OTOH are allowed to run services.
>
> The reason I know this is because when Qwest blocked ports to VDSL
> customers way back (http://www.garynichols.com/stories.php?story=47) I
> called and screamed foul. I really didn't expect to get anywhere, I
> just like yelling at Qwest. *grin*
>
> Cheers,
> Gary
>
> On 07 Aug 2001 06:37:36 -0700, Kevin Brown wrote:
> > Actually that's not true. Qwest/Cox could stop it from hitting their customers
> > by putting in an Access Control List (ACL) in the routers. According to my TOS
> > I'm not allowed to be running any services, so if they block incoming requests
> > to ports less than 1024, or just block the individual ports (21,22,23,80,
> > etc...) then this worm wouldn't be able to affect any of Qwest's/Cox's
> > non-business users. The problem is they have chosen not to do this.
> >
> > > > Just had a crazy thought about all this RC mess. How about writing an
> > > > anti-worm-worm (or vaccine) that uses the same infection method, but
> > > > removes all copies of the RC and RCII worm from the system, notifies the
> > > > system admin of each box it's run on and then kills itself after a
> > > > specified date? You could then write a script on your apache system that
> > > > logs the IP of the infected host, and then schedules an
> > > > anti-infection-infection to be run later. Whaddya think? Good, bad, ugly?
> > > > =op
> >
> > > What if this same program installed a batch file or AT command to launch the
> > > antivirus and or just go to windows update and get the patch for this worm.
> > > Better yet just formatted the HD. Because of it I have extremely low
> > > bandwidth, 60-100kbps on my cable modem which usually has downstream
> > > throughput of 2+mbps, my brother in-law has Qwest DSL and can't even get
> > > online because of this thing. The worst part is they (Cox/Qwest) can do
> > > nothing about it.
> > ________________________________________________
> > See http://PLUG.phoenix.az.us/navigator-mail.shtml if your mail doesn't post to the list quickly and you use Netscape to write mail.
> >
> > PLUG-discuss mailing list - PLUG-discuss@lists.PLUG.phoenix.az.us
> > http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss
> >
>
> ________________________________________________
> See http://PLUG.phoenix.az.us/navigator-mail.shtml if your mail doesn't post to the list quickly and you use Netscape to write mail.
>
> PLUG-discuss mailing list - PLUG-discuss@lists.PLUG.phoenix.az.us
> http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss