[62980] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: Blacklisting: obvious P2P app

daemon@ATHENA.MIT.EDU (Vadim Antonov)
Wed Sep 24 17:44:20 2003

Date: Wed, 24 Sep 2003 14:43:18 -0700 (PDT)
From: Vadim Antonov <avg@kotovnik.com>
To: David Schwartz <davids@webmaster.com>
Cc: neal rauhauser <neal@lists.rauhauser.net>, nanog@merit.edu
In-Reply-To: <MDEHLPKNGKAHNMBLJOLKGEDKGOAA.davids@webmaster.com>
Errors-To: owner-nanog-outgoing@merit.edu


On Wed, 24 Sep 2003, David Schwartz wrote:

> 
> 
> >     Each mailserver could keep a cryptographically verified list, the
> > list is distributed via some P2P mechanism, and DoS directed at the
> > 'source' of the service only interrupts updates, and only does so until
> > the source slips an updated copy of the list to a few peers, and then
> > the update spreads. Spam is an economic activity and they won't DoS a
> > source if they know it won't help their situation.
> 
> 	If anyone who attempts to distribute such a list is DoSed to oblivion,
> people will stop being willing to distribute such a list. Yes, spam is an
> economic activity, but spammers may engage in long-term planning. You can't
> keep the list of distributors secret. I'd be very interested in techiques
> that overcome this problem. I've been looking into tricking existing
> widely-deployed infrastructures into acting a distributors, but this raises
> both ethical and technical questions.
> 
> 	DS
> 
> 


home help back first fref pref prev next nref lref last post