[26580] in North American Network Operators' Group
Re: Netgate.net.nz/ORBS spam colusion
daemon@ATHENA.MIT.EDU (Greg A. Woods)
Fri Jan 7 23:12:51 2000
Message-Id: <m126nAB-000g9rC@most.weird.com>
Date: Fri, 7 Jan 2000 23:07:39 -0500 (EST)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
From: woods@most.weird.com (Greg A. Woods)
To: nanog@merit.edu
In-Reply-To: <3.0.32.20000107215253.00e50bfc@odie.av8.com>
Reply-To: nanog@merit.edu (North America Network Operators Group)
Errors-To: owner-nanog-outgoing@merit.edu
[ On Friday, January 7, 2000 at 21:55:16 (-0500), Dean Anderson wrote: ]
> Subject: Netgate.net.nz/ORBS spam colusion
>
> So I'd like to propose the possibility that we should start probing New
> Zealand sites with SATAN, and publish site vulnerabilities on a web page,
> just like ORBS does. We would then deny responsibility for any resulting
> attacks on those sites by "script kiddies". Just like ORBS does.
Unless you can show how the supposed vulnerabilities of those sites are
directly affecting millions of users worldwide in the same way as UCE
forwarded through open relays is you will not be doing anything at all
like what ORBS does. Indeed the "script kiddies" are learning to emply
distributed attacks of sorts, but most used to date require lots of
bandwidth between the compromised systems and the victims, not
necessarily just an available set of vulnerable systems from which to
launch their attacks. I doubt New Zealand is an ideal site matching
their needs.
Meanwhile ORBS is winning the fight against open-relay spam, slowly but
surely.
Why don't you just hire somone capable of fixing your own open relays
and sign yourself off for six months vacation at some site of your
choosing where there's no internet access possible, and quit bugging
people who are genuinely interested in bettering the state of the
Internet.
--
Greg A. Woods
+1 416 218-0098 VE3TCP <gwoods@acm.org> <robohack!woods>
Planix, Inc. <woods@planix.com>; Secrets of the Weird <woods@weird.com>