[133359] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Mastercard problems

daemon@ATHENA.MIT.EDU (Philip Dorr)
Wed Dec 8 15:10:47 2010

In-Reply-To: <AANLkTimXRKb+5=Gxo0m20+7pdbo8XZ57SYyrS0etS_Sz@mail.gmail.com>
Date: Wed, 8 Dec 2010 14:06:06 -0600
From: Philip Dorr <tagno25@gmail.com>
To: Christopher Morrow <morrowc.lists@gmail.com>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Reply-To: tagno25@gmail.com
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

The problem is that they were also slashdotted.  The logs would also have a
large number of unrelated.
On Dec 8, 2010 12:49 PM, "Christopher Morrow" <morrowc.lists@gmail.com>
wrote:
> On Wed, Dec 8, 2010 at 12:34 PM, Jack Bates <jbates@brightok.net> wrote:
>>
>>
>> On 12/8/2010 11:28 AM, William McCall wrote:
>>
>>>
>>> Are you prepared for "informaton terrorism" laws?
>>>
>>
>>
>> DOS attacks are already illegal. I question the ability to track
responsible
>> parties down and have appropriate proof to actually prosecute.
>>
>> Let's be honest. Even in the 20th century, more people had been caught by
>> bragging in public than by backtracking.
>
> so... the loic tool uses the host's local address, the attacks are all
> HTTP based, or tcp/80 with malformed HTTP... someone with server logs
> could certainly get a list of the ips involved and hand that over to
> the FBI for proper action.
>
> I know that the folks involved on the MC side already have this data,
> and that the fbi is interested in it.
>
> -chris
>

home help back first fref pref prev next nref lref last post