[110455] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Where there's a nanog thread there'll be a vendor solution .. Re:

daemon@ATHENA.MIT.EDU (Suresh Ramasubramanian)
Mon Jan 5 19:55:28 2009

Date: Tue, 6 Jan 2009 06:25:16 +0530
From: "Suresh Ramasubramanian" <ops.lists@gmail.com>
To: "BATTLES, TIMOTHY A (TIM), ATTLABS" <tmbattles@att.com>
Cc: Jeffrey Lyon <jeffrey.lyon@blacklotus.net>, nanog@merit.edu
Errors-To: nanog-bounces@nanog.org

On Mon, Jan 5, 2009 at 10:24 PM, BATTLES, TIMOTHY A (TIM), ATTLABS
<tmbattles@att.com> wrote:
>  There are some assumptions here. First are you considering volumetric
> DDOS attacks? Second, if you plan on harvesting wild bots and using them
> to serve your purpose then I don't see how this can be ethical unless
> they are just clients from your own network making it less distributed.

I cant believe this .. http://www.iprental.com

Looks like anonymizer combined with what looks almost like a "rent a
botnet", legit nodes (you sign up to download a client that makes you
part of this botnet, etc)

http://www.iprental.com/technical/

Speaking of a "commercial botnet"", there was something similar
earlier - but that was a "download this bulk mailer" type operation,
guys called Atriks, who got tracked so extensively by spamhaus that
they seem to have kind of disappeared now.

--srs


home help back first fref pref prev next nref lref last post