-----BEGIN PGP SIGNATURE-----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=p+MP
-----END PGP SIGNATURE-----
> 30. mai 2020 kl. 11:54 skrev Walter Alejandro Iglesias <wai@roquesor.com>:
>
> The problem is most system administrators out there do very little. If
> you were getting spam or attacks from some IP, even if you report the
> issue to the respective whois abuse@ address, chances are attacks from
> that IP won't stop next week, nor even next month.
>
> So, in general terms, I would refrain as much as possible from hurry to
> expiring addresses. Just my opinion.
Yes, there are a lot of systems out there that seem to be not really maintained at all. After years of advocating 24 hour expiry some time back I went to four weeks on the ssh brutes blacklist. Even then it seems that some of them turn up again pretty much instantly after expiry.
All the best,
—
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
No comments:
Post a Comment