OpenBCM V1.07b12 (Linux)

Packet Radio Mailbox

SR1BSZ

[Szczecin_PL JO73GK]

 Login: GUEST





  
G4APL  > JNOS     09.12.20 10:34z 42 Lines 1171 Bytes #999 (0) @ WW
BID : 48112G4APL
Read: GUEST
Subj: Re: new release DOS ATTACK
Path: SR1BSZ<SP7YDD<SR8BBS<OK0NBR<F3KT<CX2SA<W0ARP<AL0Y<GB7YEW<GB7BEX<
      GB7CIP<GB7CIP<GB7CIP
Sent: 201209/1016Z @:GB7CIP.#32.GBR.EURO $:48112G4APL

T:From: Paul Lewis <g4apl@gb7cip.ampr.org>
T:Newsgroups: ampr.ip.jnos
T:Message-Id: <rqq75c$4ds$1@gb7cip.ampr.org>

i0ojj%i0ojj.ita.eu@gb7cip.ampr.org wrote:
>>From i0ojj%i0ojj.ita.eu@n2nov.ampr.org Sat Dec  5 15:33:39 2020
> Received: from n2nov.ampr.org by n2nov.ampr.org (JNOS2.0m.5D) with SMTP
>        id AA179843 ; Sat, 05 Dec 2020 15:33:39 EST
> Message-Id: <2YTQ_I0OJJ@VE3CGR.bbs>

GB7CIP over the past 36 hours is 'being attacked'
with a Denial Of Service attack to it's
protocol 93 axip Interface
Seen from the following system 8 December
VE4KLM
VK7AX
N2NOX

that have direct Internet links to gb7cip.ampr.org

These links will be dropped
Currently just seeing VE4KLM  9 December still hammering away..!!

as getting hundreds of connections per minute and
not connecting
as seen by the real time network monitoring.
Other systems linking over the same interface
are performing correctly

Suggest these systems monitor your outgoing interfaces..
when you update your software.


73 de Paul G4APL Network Security officer gb7cip


 

-- 
amprnet g4apl@gb7cip.ampr.org ax25 g4apl@gb7cip.#32.gbr.euro
amprnet http://gb7cip.ampr.org Inet http://www.theskywaves.net



Read previous mail | Read next mail


 29.04.2024 04:48:18zGo back Go up