Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 3 May 1997 20:35:20 +1000 (EST)
From:      "Daniel O'Callaghan" <danny@panda.hilink.com.au>
To:        Adrian Chadd <adrian@obiwan.psinet.net.au>
Cc:        hackers@FreeBSD.ORG
Subject:   Re: SPAM target
Message-ID:  <Pine.BSF.3.91.970503203316.4479O-100000@panda.hilink.com.au>
In-Reply-To: <Pine.BSF.3.95q.970503165208.9426B-100000@obiwan.psinet.net.au>

next in thread | previous in thread | raw e-mail | index | archive | help


On Sat, 3 May 1997, Adrian Chadd wrote:

> 
> > A T1 line is capable of 192kbytes/sec, so 192 collaborators would be able 
> > to saturate a T1 line with essentially zero cost to themselves.  Because 
> > of the spoofed src addresses, the cost of receiving the RST packets is 
> > spread throughout the entire Internet.
> > 
> 
> Try making the src IP 127.0.0.1 .. I don't know how many people firewall
> packets at their routers with a source IP of that (which reminds me, I
> have to *grin*)

Many do.  That's why src host should be randomly "real".
 
> Problem is Linux DOES have some interesting (development) anti-DoS code 
> (someone have a look at the 2.0.30 kernel, or the ISS patches to 2.0.29).

Who cares about Linux?  Forget the host, just saturate their link, and 
stop people reading their web pages.

Another target is ispam.net.
 
Danny



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.91.970503203316.4479O-100000>