[31540] in North American Network Operators' Group
Re: netscan.org update
daemon@ATHENA.MIT.EDU (Patrick W. Gilmore)
Wed Sep 27 15:39:22 2000
Message-Id: <5.0.0.25.2.20000927152924.08a1aea8@127.0.0.1>
Date: Wed, 27 Sep 2000 15:29:47 -0400
To: nanog@merit.edu
From: "Patrick W. Gilmore" <patrick@ianai.net>
In-Reply-To: <Pine.LNX.4.21.0009270029240.27042-100000@Overkill.EnterZon
e.Net>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Errors-To: owner-nanog-outgoing@merit.edu
At 12:36 AM 9/27/2000 -0400, John Fraizer wrote:
>I do understand where you may draw that conclusion however. Testing
>for the presence of gas (smurf amplifiers) with a sniffer (single ICMP
>echo-request scan) is NOT the same as simply throwing a match at the gas
>main (waiting for an attack).
>
>So, the simple answer to your question is no.
Especially since the source address is not spoofed.
>John Fraizer
TTFN,
patrick