[78771] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: IBM to offer service to bounce unwanted e-mail back to the computers

daemon@ATHENA.MIT.EDU (Vicky Rode)
Tue Mar 22 14:55:03 2005

Date: Tue, 22 Mar 2005 11:52:24 -0800
From: Vicky Rode <vickyr@socal.rr.com>
Reply-To: vickyr@socal.rr.com
To: Colin Johnston <colinj@mx5.org.uk>
Cc: Florian Weimer <fw@deneb.enyo.de>,
	Andreas Ott <andreas@naund.org>, nanog@merit.edu
In-Reply-To: <BE662108.11B3D%colinj@mx5.org.uk>
Errors-To: owner-nanog@merit.edu


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Why even bother responding. Just imagine frontbridge (using them an
example, I have no affiliation with them) responding to each and every
spam they block..something like 7 terrabytes of data per week or so. I
guess this is one way to justify for more bandwidth :-)


regards,
/virendra

Colin Johnston wrote:
| The better idea would be fingerprint the spam to match the bot used to
match
| the exploit used to run the bot to then reverse exploit back to the
| exploited machine patching in the process.
| I managed to setup such a system a while ago with nimda traffic however I
| could not a find a software tool which exploited a nimda exploited machine
| which could then patch it and remove the virus
| (Ie a remote doctor without you knowing :)
|
| Colin Johnston
|
|
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFCQHd3pbZvCIJx1bcRAhPZAJsFJeNXkjKbtUkiMG5LKUH1C1ipPwCfYG1W
KHZwd5enWFB+mTp5kkJaEyw=
=ZtDG
-----END PGP SIGNATURE-----

home help back first fref pref prev next nref lref last post