[28332] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

More on Above.net

daemon@ATHENA.MIT.EDU (Chris Brenton)
Wed Apr 26 01:03:50 2000

Message-ID: <390678F8.618AB89@sover.net>
Date: Wed, 26 Apr 2000 01:04:56 -0400
From: Chris Brenton <cbrenton@sover.net>
Reply-To: cbrenton@sover.net
MIME-Version: 1.0
To: nanog@merit.edu, intrusion@sans.org
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Errors-To: owner-nanog-outgoing@merit.edu


Found this at:
http://www.zdnet.com/zdnn/stories/news/0,4586,2555422,00.html?chkpt=zdhpnews01

A couple of snippets taken out of context. Sounds like this can be fixed
through a config change:

The White Plains, N.Y.-based company is working with 
the FBI to investigate the attack, and declined to give 
more specific details. Vixie did say that tracking the 
attacker should not be as difficult as February's 
denial-of-service attacks had been. "Technically, there is 
cause for hope, where in the (denial of service) case their 
was no cause for hope," he said.

This attacker seemed a bit more skilled than the 
cybervandals who flooded eight major Web sites in 
February, Vixie added. "I would bet that this was 
someone with a little more experience than the last 
batch."

Vixie said that specific attack could not succeed again. 
"We plugged the hole that has allowed it to happen," he 
said.


home help back first fref pref prev next nref lref last post