[67317] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Monumentous task of making a list of all DDoS Zombies.

daemon@ATHENA.MIT.EDU (Suresh Ramasubramanian)
Sat Feb 7 21:59:25 2004

Date: Sun, 08 Feb 2004 08:28:25 +0530
From: Suresh Ramasubramanian <suresh@outblaze.com>
To: "Wayne Gustavus (nanog)" <nanog@wgustavus.com>
Cc: "'Drew Weaver'" <drew.weaver@thenap.com>, nanog@merit.edu
In-Reply-To: <001201c3ed9b$54871ac0$6400000a@wglaptop>
Errors-To: owner-nanog-outgoing@merit.edu


Wayne Gustavus (nanog) wrote:
> This would essentially be impossible and not a good idea.  Large volumes 
> of hosts/zombies involved in such attacks originate from residential 
> cable/dsl subscribers.  This user base primarily uses dynamically 
> assigned IP space.  Hence, the IP of tonight's attacker could be the IP 
> of tomorrow's legitimate user.

1. It is arguable whether dynamic IPs are to be treated as legitimate 
mailhosts.  Your colleagues in VOL mailops might tell you something 
similar too.

2. An expiring list, where entries inserted are quickly expired, and 
stats used to add to other lists (such as MAPS DUL / SORBS DUHL) is a 
good idea, and moreover, it's already been done. http://cbl.abuseat.org

	srs

home help back first fref pref prev next nref lref last post