[110462] in North American Network Operators' Group
Re: Where there's a nanog thread there'll be a vendor solution .. Re:
daemon@ATHENA.MIT.EDU (Jeffrey Lyon)
Tue Jan 6 00:24:32 2009
Date: Tue, 6 Jan 2009 00:24:18 -0500
From: "Jeffrey Lyon" <jeffrey.lyon@blacklotus.net>
To: nanog@merit.edu
In-Reply-To: <bb0e440a0901051655ia6709eg8268d751438ef77c@mail.gmail.com>
Errors-To: nanog-bounces@nanog.org
This is new to you? Polymorphic anonymizers have been a way of life
for a while now.
Jeff
On Mon, Jan 5, 2009 at 7:55 PM, Suresh Ramasubramanian
<ops.lists@gmail.com> wrote:
> On Mon, Jan 5, 2009 at 10:24 PM, BATTLES, TIMOTHY A (TIM), ATTLABS
> <tmbattles@att.com> wrote:
>> There are some assumptions here. First are you considering volumetric
>> DDOS attacks? Second, if you plan on harvesting wild bots and using them
>> to serve your purpose then I don't see how this can be ethical unless
>> they are just clients from your own network making it less distributed.
>
> I cant believe this .. http://www.iprental.com
>
> Looks like anonymizer combined with what looks almost like a "rent a
> botnet", legit nodes (you sign up to download a client that makes you
> part of this botnet, etc)
>
> http://www.iprental.com/technical/
>
> Speaking of a "commercial botnet"", there was something similar
> earlier - but that was a "download this bulk mailer" type operation,
> guys called Atriks, who got tracked so extensively by spamhaus that
> they seem to have kind of disappeared now.
>
> --srs
>
--
Jeffrey Lyon, Leadership Team
jeffrey.lyon@blacklotus.net | http://www.blacklotus.net
Black Lotus Communications of The IRC Company, Inc.
Look for us at HostingCon 2009 in Washington, DC on August 10th - 12th
at Booth #401.