lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <3587D6FDF44881459313970A8DE75A81015FF651@exchange.quadrasis.com> From: David.Cushing at hitachisoftware.com (Cushing, David) Subject: Comcast using IPS to protect the Internet from their home user clients? > > Anyhow, I noticed that certain vulnerability scans, for > example scans > > using Nikto and similar tools, when run from a Comcast > address show a > > different behavior than when they are run from a clear, uncontrolled > > Internet connection (i.e. corporate T-3). In fact, it appears like > > Comcast has an Inline-IDS (some call it an IPS ;) sitting > on its wires, > > filtering out certain signatures and blocking subsequent > access for a > > short period of time. For example, scan progresses, then hangs > > inexplicably, then resumes, trips a sig, and hangs again. Adelphia (cable modem) has also been fishy lately. Something new in the past couple of months.
Powered by blists - more mailing lists