Hurricane Electric's IPv6 Tunnel Broker Forums

Tunnelbroker.net Specific Topics => Questions & Answers => Topic started by: HQuest on June 02, 2022, 10:34:47 AM

Title: Active scan of my tunnel
Post by: HQuest on June 02, 2022, 10:34:47 AM
For the past 6 months (!!!), I noticed an IPv6 source scanning my /56 subnet and it is still going strong. While I do have this source blocked on my inbound firewall, I'm starting to think it would be better if I could ask my upstream provider if any actions could be taken from their end. Traffic is minor and only a few TCP SYNs every second or so. Minor for my inbound pipe but still an annoyance. I tried multiple times to reach out to the abuse address owner of that network. Nothing happened - maybe because the operator in question is from a "questionable" country...

Anything HE can (or is willing to) do in here?
Title: Re: Active scan of my tunnel
Post by: snarked on June 03, 2022, 09:32:18 AM
There are a lot of scanners out here.  It may help if you identify the one you're having issues with if you expect other forum participants to comment further.

I actually tcp tarpit anyone that attempts to scan any unused port on my system (as well as certain other misbehaviors), with certain sources exempted of course.
Title: Re: Active scan of my tunnel
Post by: NewtonNet on June 08, 2022, 02:29:30 AM
Quote from: HQuest on June 02, 2022, 10:34:47 AMMinor for my inbound pipe but still an annoyance.

I totally understand where you are coming from but if it is just an annoyance (i.e. the threats arising from the scans are not being realised) then it is entirely within your gift to deal with the annoyance aspect yourself and just learn to ignore them. It's the Wild West out there and you'll be fighting a never-ending battle if you try and manually deal with behaviours you don't like, and the number of IPv6-enabled 'bad guys' is only going to increase.

Configure your setup securely, use whatever tools you see fit to maintain active defence, filter your logs and get on with life. It's the same with attacks on SSH; you risk becoming very paranoid if you're not careful.