[49630] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: DOS attack from PANAMSAT

daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Sun Jul 7 16:17:17 2002

To: Clayton Fiske <clay@bloomcounty.org>
Cc: NANOG <nanog@merit.edu>
In-Reply-To: Your message of "Sun, 07 Jul 2002 12:45:13 PDT."
             <20020707124512.D92656@bloomcounty.org> 
From: Valdis.Kletnieks@vt.edu
Date: Sun, 07 Jul 2002 16:16:12 -0400
Errors-To: owner-nanog-outgoing@merit.edu


--==_Exmh_-25808540P
Content-Type: text/plain; charset=us-ascii

On Sun, 07 Jul 2002 12:45:13 PDT, Clayton Fiske <clay@bloomcounty.org>  said:

> Don't forget 3) the machine compromised isn't capable of spoofing.
> In Win95/98/ME/NT, there is no raw socket functionality. I don't

The fact that there is no raw socket *API* doesn't mean it's that much
more difficult to convince the device driver to send a packet that isn't
strictly kosher.
-- 
				Valdis Kletnieks
				Computer Systems Senior Engineer
				Virginia Tech


--==_Exmh_-25808540P
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Exmh version 2.5 07/13/2001

iD8DBQE9KKGMcC3lWbTT17ARAglYAKDQE1M/CkjAKoOhpO1S4bigEkmcZACfaCu1
A8d5lpeLfyACSoL1WLwXf8k=
=/uTY
-----END PGP SIGNATURE-----

--==_Exmh_-25808540P--

home help back first fref pref prev next nref lref last post