Dan Hollis wrote:
the operator hosting the hijacked PC is guilty if they are notified and
refuse to take action. which seems to be all too common these days with
universities and colocation companies.
In many cases they also are incompetent or incapable of taking action
since there is
Kai Schlichting wrote:
On 9/23/2003 at 5:16 PM, Mike Tancsa [EMAIL PROTECTED] wrote:
- BGP anycast, ideally suited for such forwarding proxies.
Anyone here feeling very adapt with BGP anycast (I don't) for
the purpose of running such a service? This is a solution that
has to be suggested
On Tue, 23 Sep 2003 16:32:55 -0500, Jack Bates wrote:
Question: Why is it not illegal for an ISP to allow a known vulnerable
host to stay connected and not even bother contacting the owner? There
are civil remedies that can be sought but no criminal.
Various theories of criminal liability
Geo. wrote:
Blacklists are just one kind of filter. If we could load software that
allowed us to forward spams caught by other filters into it and it
maintained a DNS blacklist we could have our servers use, we wouldn't need
big public rbl's, everyone doing any kind of mail volume could easily
The benefit of using a blacklist like monkeys or ordb is that there is
only one removal process for all the mail servers. The issue is that
when the webserver is dDOS'd, it is very hard for people to get removed.
There shouldn't be a need for any removal process. A server should be listed
for
Geo. wrote:
There shouldn't be a need for any removal process. A server should be listed
for as long as the spam continues to come from it. Once the spam stops the
blacklisting should stop as well. That is how a dynamic list SHOULD work.
Depends on the type of listing. Open proxies and open
Hi!
http://www.openrbl.org
is also offline due to a DDoS.
The official announcememt can be read here:
http://groups.google.com/groups?hl=enlr=ie=UTF-8oe=UTF-8newwindow=1safe=offselm=vn1lufn8h6r38%40corp.supernews.com
Bye,
Raymond.
On Tue, 23 Sep 2003, Raymond Dijkxhoorn wrote:
After Osirusoft was shut down most likely Infinite-Monkeys are doing down
also ??
Anyone SERIOUSLY interested in designing a new PTP RBL system 100% immune
to DDOS, please drop me a line.
By seriously, i mean those who actually want to solve
Raymond Dijkxhoorn wrote:
[Mimedefang] monkeys.dom UPL being DDOSed to death
Jon R. Kibler [EMAIL PROTECTED]
Tue Sep 23 14:15:01 2003
The computer security industry really needs to figure out how to get law
enforcement to take these attacks seriously. It would only take a few good
http://www.openrbl.org
is also offline due to a DDoS.
---Mike
At 05:04 PM 23/09/2003, Joe St Sauver wrote:
Hi,
#This goes beyond spam and the resources that many mail servers are
#using. These attacks are being directed at anti-spam organizations
#today. Where will they point
On Tue, 23 Sep 2003, Joe St Sauver wrote:
There are absolutely *no* consequences to their security inactivity, and
because of that, none of us should be surprised that the problem is
becoming a worsening one.
china seems hellbent on becoming a LAN. i see the same thing eventually
happening
On Tue, 23 Sep 2003, Jack Bates wrote:
This goes beyond spam and the resources that many mail servers are
using. These attacks are being directed at anti-spam organizations
today. Where will they point tomorrow? Many forms of breaking through
network security require that a system be DOS'd
On Tue, 23 Sep 2003 14:15:48 PDT, Dan Hollis said:
china seems hellbent on becoming a LAN. i see the same thing eventually
happening to networks which refuse to deal with their ddos sources.
Well.. that's all fine and good, except we first need one large player to
put their foot down and say
Joe St Sauver wrote:
Note that not all DNSBLs are being effectively hit. DNSBLs which run with
publicly available zone files are too distributed to be easily taken down,
particularly if periodic deltas are distributed via cryptographically
signed Usenet messages (or other push channels). You can
On Tuesday, Sep 23, 2003, at 17:32 Canada/Eastern,
[EMAIL PROTECTED] wrote:
On Tue, 23 Sep 2003 14:15:48 PDT, Dan Hollis said:
china seems hellbent on becoming a LAN. i see the same thing
eventually
happening to networks which refuse to deal with their ddos sources.
Well.. that's all fine
Dan Hollis wrote:
china seems hellbent on becoming a LAN. i see the same thing eventually
happening to networks which refuse to deal with their ddos sources.
This invites the question if the hijacked PC or the hijacker in the
sunshine state is more
guilty of the spam and ddos?
I would
On Tue, 23 Sep 2003, Joe Abley wrote:
If transit was uniformly denied to every operator who was not equipped
to deal with DDoS tracking in a timely manner, I think 90% of the
Internet would disappear immediately.
it gets worse. there are operators who *are* equipped, but refuse to deal
not
On Tue, 23 Sep 2003, Jason Slagle wrote:
It's somewhat funny. Quite some time ago, us IRC server operators warned
about this same thing, and were mostly just told to not run IRC servers.
A private IRC server with one user isn't much fun.
The anti-spammers will likely just get told to not
On 9/23/2003 at 5:16 PM, Mike Tancsa [EMAIL PROTECTED] wrote:
http://www.openrbl.org
is also offline due to a DDoS.
And the ignorance of front-end personnel in LE agencies, unless you are
the NY Times and claim $500,000 in purely fictious damages, can be a bit
frustrating.
Spamcop and
On Wed, 24 Sep 2003, Petri Helenius wrote:
Dan Hollis wrote:
china seems hellbent on becoming a LAN. i see the same thing eventually
happening to networks which refuse to deal with their ddos sources.
This invites the question if the hijacked PC or the hijacker in the
sunshine state is
--On Tuesday, September 23, 2003 6:11 PM -0400 Kai Schlichting
[EMAIL PROTECTED] wrote:
- BGP anycast, ideally suited for such forwarding proxies.
Anyone here feeling very adapt with BGP anycast (I don't) for
the purpose of running such a service? This is a solution that
has to be
On Tue, 23 Sep 2003, John Payne wrote:
--On Tuesday, September 23, 2003 6:11 PM -0400 Kai Schlichting
[EMAIL PROTECTED] wrote:
- BGP anycast, ideally suited for such forwarding proxies.
Anyone here feeling very adapt with BGP anycast (I don't) for
the purpose of running such a
--On Tuesday, September 23, 2003 4:56 PM -0700 Dan Hollis
[EMAIL PROTECTED] wrote:
On Tue, 23 Sep 2003, John Payne wrote:
--On Tuesday, September 23, 2003 6:11 PM -0400 Kai Schlichting
[EMAIL PROTECTED] wrote:
- BGP anycast, ideally suited for such forwarding proxies.
Anyone here feeling
Ron, good luck with it. You're stuck between a rock and a hard place. If
you down it the kiddies win again, and will feel they can bully the next
guy. If you don't your network is crippled. It's a no win situation.
If any of the dos'ed to death rbls really want's to get back at the
On Tue, 23 Sep 2003, Geo. wrote:
If any of the dos'ed to death rbls really want's to get back at the spammers
it's easy. Write software that allows any ISP or business to use their mail
servers and their customers/employees (via a foward to address) to maintain
their own highly dynamic
25 matches
Mail list logo