[31540] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: netscan.org update

daemon@ATHENA.MIT.EDU (Patrick W. Gilmore)
Wed Sep 27 15:39:22 2000

Message-Id: <5.0.0.25.2.20000927152924.08a1aea8@127.0.0.1>
Date: Wed, 27 Sep 2000 15:29:47 -0400
To: nanog@merit.edu
From: "Patrick W. Gilmore" <patrick@ianai.net>
In-Reply-To: <Pine.LNX.4.21.0009270029240.27042-100000@Overkill.EnterZon
 e.Net>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Errors-To: owner-nanog-outgoing@merit.edu


At 12:36 AM 9/27/2000 -0400, John Fraizer wrote:

 >I do understand where you may draw that conclusion however.  Testing
 >for the presence of gas (smurf amplifiers) with a sniffer (single ICMP
 >echo-request scan) is NOT the same as simply throwing a match at the gas
 >main (waiting for an attack).
 >
 >So, the simple answer to your question is no.

Especially since the source address is not spoofed.


 >John Fraizer

TTFN,
patrick



home help back first fref pref prev next nref lref last post