[72829] in North American Network Operators' Group
Re: ad.doubleclick.net missing from DNS?
daemon@ATHENA.MIT.EDU (John Palmer)
Tue Jul 27 18:40:16 2004
From: "John Palmer" <nanog@adns.net>
To: <nanog@merit.edu>
Date: Tue, 27 Jul 2004 17:21:26 -0500
Errors-To: owner-nanog-outgoing@merit.edu
Now the question is, can one easily block all of doubleclick.net by 127.0.0.1 in the hosts file
on a wincrash box? They appear to have ad, ad2, ad3, m2, m3.doubleclick.net. Anyone know
what hosts to list??? (ie: ad2, ad3 ... to ad<x>???)
----- Original Message -----
From: "Henry Linneweh" <hrlinneweh@sbcglobal.net>
To: "Sean Donelan" <sean@donelan.com>; <nanog@merit.edu>
Sent: Tuesday, July 27, 2004 17:10
Subject: Re: ad.doubleclick.net missing from DNS?
>
> While I disagree with the method of the attacker, I
> can understand the reasoning behind an attack on a
> company that is considered a spyware company,
> doubleclick certainly has turned up more than once on
> my version of spybot as a site to block.....
>
> -Henry
>
> --- Sean Donelan <sean@donelan.com> wrote:
> >
> >
> >
> http://www.washingtonpost.com/wp-dyn/articles/A18735-2004Jul27.html
> > DoubleClick spokeswoman Jennifer Blum said the
> > attack targeted the
> > company's domain name servers (DNS) -- machines
> > that help direct
> > Internet traffic -- causing "severe service
> > disruptions" for all 900 of
> > its customers. Blum said the outage was caused by
> > a distributed
> > denial-of-service attack, in which hackers use the
> > firepower of
> > thousands of hijacked computers to flood a Web
> > site with so many bogus
> > Web page requests that it renders the site
> > unavailable to legitimate
> > users.
> > [...]
> > The FBI is not investigating the incident because
> > DoubleClick has not
> > filed a report, said bureau spokeswoman Megan
> > Baroska.
> >
> >
>
>
>