Gene Lee <[EMAIL PROTECTED]> writes:
>Since source is released for BO2K, modifying things like packet
>characteristics, daemon port, mode of deployment should be trivial, so
>scanning for the like seems futile in the long run.

A couple of thoughts:
        Altering the way BO2K works or uses its packets will break
        compatibility. The current version of BO is all over the
        place, and one of the things script kiddies appear to do
        is blanket sweeps for systems that are infected with it.
        If you have your own customized version of BO, then you
        can talk to machines you've targetted but other script
        kiddies won't be able to have fun. It also means that
        unique versions of BO will "belong" to an individual,
        which might make it easier to track/identify the
        perpetrator of an attack.

        One big bummer about BO2K is that it can use good crypto.
        Which means that folks who develop tools that latch
        into the crypto are going to be under export controls.
        This is a monumental pain in the butt - it means that the
        good guys' hands are tied (as usual) but the bad guys'
        aren't (as usual) by the very laws that FBI et al says
        are there to tie the bad guys' hands.

mjr.
--
Marcus J. Ranum, CEO, Network Flight Recorder, Inc.
work - http://www.nfr.net
home - http://www.clark.net/pub/mjr
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to