[4448] in North American Network Operators' Group
Re: New Denial of Service Attack on Panix
daemon@ATHENA.MIT.EDU (Perry E. Metzger)
Tue Sep 17 00:34:49 1996
To: Tim Bass <bass@cactus.silkroad.com>
cc: kwe@6sigmanets.com, nanog@merit.edu, iepg@iepg.org
In-reply-to: Your message of "Mon, 16 Sep 1996 23:39:26 EDT."
<199609170339.XAA02545@cactus.silkroad.com>
Reply-To: perry@piermont.com
Date: Tue, 17 Sep 1996 00:24:14 -0400
From: "Perry E. Metzger" <perry@piermont.com>
Tim Bass writes:
> (2) Using documented stochastic methods, look for the hidden
> pattern in the pseudo-random sequences.
I will point out that this is not possible in the general case.
> (3) Given it is possible to break the code, hack together some
> telnet 'update the router access-lists' based on the predictive
> algorithm. (another chapter, yet to be documented)
Let me get this straight.
You are being sprayed with over 200 packets a second in a random
sequence. You are to reload your Cisco's access lists 200 times a
second over a telnet based expect script or something similar?
This doesn't strike you as impractical?
> Admittedly, it is difficult
It is impossible using the stated methods.
Perry