[4448] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: New Denial of Service Attack on Panix

daemon@ATHENA.MIT.EDU (Perry E. Metzger)
Tue Sep 17 00:34:49 1996

To: Tim Bass <bass@cactus.silkroad.com>
cc: kwe@6sigmanets.com, nanog@merit.edu, iepg@iepg.org
In-reply-to: Your message of "Mon, 16 Sep 1996 23:39:26 EDT."
             <199609170339.XAA02545@cactus.silkroad.com> 
Reply-To: perry@piermont.com
Date: Tue, 17 Sep 1996 00:24:14 -0400
From: "Perry E. Metzger" <perry@piermont.com>


Tim Bass writes:
> (2) Using documented stochastic methods, look for the hidden
>     pattern in the pseudo-random sequences.

I will point out that this is not possible in the general case.

> (3) Given it is possible to break the code,  hack together some
>     telnet 'update the router access-lists' based on the predictive
>     algorithm.  (another chapter, yet to be documented)

Let me get this straight.

You are being sprayed with over 200 packets a second in a random
sequence. You are to reload your Cisco's access lists 200 times a
second over a telnet based expect script or something similar?

This doesn't strike you as impractical?

> Admittedly, it is difficult

It is impossible using the stated methods.

Perry

home help back first fref pref prev next nref lref last post