[28332] in North American Network Operators' Group
More on Above.net
daemon@ATHENA.MIT.EDU (Chris Brenton)
Wed Apr 26 01:03:50 2000
Message-ID: <390678F8.618AB89@sover.net>
Date: Wed, 26 Apr 2000 01:04:56 -0400
From: Chris Brenton <cbrenton@sover.net>
Reply-To: cbrenton@sover.net
MIME-Version: 1.0
To: nanog@merit.edu, intrusion@sans.org
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Errors-To: owner-nanog-outgoing@merit.edu
Found this at:
http://www.zdnet.com/zdnn/stories/news/0,4586,2555422,00.html?chkpt=zdhpnews01
A couple of snippets taken out of context. Sounds like this can be fixed
through a config change:
The White Plains, N.Y.-based company is working with
the FBI to investigate the attack, and declined to give
more specific details. Vixie did say that tracking the
attacker should not be as difficult as February's
denial-of-service attacks had been. "Technically, there is
cause for hope, where in the (denial of service) case their
was no cause for hope," he said.
This attacker seemed a bit more skilled than the
cybervandals who flooded eight major Web sites in
February, Vixie added. "I would bet that this was
someone with a little more experience than the last
batch."
Vixie said that specific attack could not succeed again.
"We plugged the hole that has allowed it to happen," he
said.