North American Network Operators Group|
Date Prev | Date Next |
Date Index |
Thread Index |
Author Index |
RE: ABOVE.NET SECURITY TRUTHS?
- From: Roeland Meyer (E-mail)
- Date: Mon May 01 12:05:35 2000
This is a red-herring, see www.gnutella.org
There is no way anyone is going to even put a dent in distribution. Reference recent failed attemps vs MP3 distro, and reference the MPAA. One might alos see Napster issues.
> -----Original Message-----
> From: firstname.lastname@example.org [mailto:email@example.com]On Behalf Of
> John Kristoff
> Sent: Monday, May 01, 2000 8:27 AM
> To: firstname.lastname@example.org
> Subject: Re: ABOVE.NET SECURITY TRUTHS?
> "Henry R. Linneweh" wrote:
> > My fundamental question here is where is the directory where
> > all these new DDoS toyz and other forms of destruction
> > located at?
> Potentially millions of hosts.
> > How are they getting to these programs?
> > A solution is system wide scans for code segments in
> > programs that spawn attacks and remove them and the
> > users who have them without a valid reason.
> > Search records for ssh, stelnet, telnet connections to
> > boxes other than the primary account.
> Since the tools can exist on any individual host on the network, every
> single owner/user/admin of an IP address would need to scan their
> machine. While I agree its a host problem, it's extremely
> difficult to
> fix with host solutions alone. Even if you did, you still
> won't be able
> to stop the creation and dissemination of tools amongst the bad guys.
> > Tighten up on hosted domains TOS and force Domain registrars
> > to cancel domains involved in criminal activity.
> I agree, some form of shunning could help cause people to batten down
> the hatches. This assumes you know where the problem is originating