[47813] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Arbor Networks DoS defense product

daemon@ATHENA.MIT.EDU (Dan Hollis)
Wed May 15 17:11:36 2002

Date: Wed, 15 May 2002 14:10:54 -0700 (PDT)
From: Dan Hollis <goemon@anime.net>
To: Rob Thomas <robt@cymru.com>
Cc: NANOG <nanog@merit.edu>
In-Reply-To: <ROTMAILER.0205151558110.17216-100000@dragon.sauron.net>
Message-ID: <Pine.LNX.4.44.0205151406080.31775-100000@sasami.anime.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Errors-To: owner-nanog-outgoing@merit.edu


On Wed, 15 May 2002, Rob Thomas wrote:
> ] scanning would quickly become self defeating as attackers would only
> ] manage to cut themselves off from the net.
> To some degree, yes.  Most of the miscreants are clueful enough not to
> scan from their home machines.

I disagree. They have to start somewhere. Most miscreants first attack 
offshore hosts, then use those to attack domestic victims.

> The end result is a lot of hacked hosts are black holed.

And this is a bad thing?

> On one hand you could say "serves 'em right for being hacked!"  On the 
> other hand, you could wonder why it is that the non-geek broadband users 
> must be system, network, and firewall administrators.

They don't. This is purely a response to rogue networks/blackhats and 
apathetic/irresponsible/toothless NOCs.

-Dan
-- 
[-] Omae no subete no kichi wa ore no mono da. [-]


home help back first fref pref prev next nref lref last post