[118251] in Cypherpunks
Re: KISA Attack
daemon@ATHENA.MIT.EDU (Sean Roach)
Wed Sep 22 21:10:51 1999
Message-Id: <3.0.6.32.19990923074752.008226b0@mail.intplsrv.net>
Date: Thu, 23 Sep 1999 07:47:52 -0500
To: cypherpunks@algebra.com
From: Sean Roach <roach_s@mail.intplsrv.net>
In-Reply-To: <v04210111b40f0f819837@[204.167.100.159]>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Reply-To: Sean Roach <roach_s@mail.intplsrv.net>
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
At 06:59 PM 9/22/99 -0400, Robert Hettinga wrote: >
>
>At 3:22 PM -0700 on 9/22/99, Greg Broiles wrote: >>
>
>
>> 2. "Teergrube" (sp?) - I believe the word is German, and refers to
>> intentionally slowing something down.
>
>Right!
>
>Way back in the way back, like when Altavista started crawling the
>web, there was a post here about some folks at Sandia? Los Alamos?
>who had built just such a "spider trap".
>
Excuse me. This will undoubtedly show my ignorance, but.
What would that serve? If they are tying up your lines to prevent
your serving others, what advantage would holding the line open for
them serve? Unless the bottleneck is processor time or file access
time and not the network connection. What about honoring their
requests with a much smaller file? How about one which is truncated
in such a way that whatever would be recognized as the EOF doesn't
exist, then closing the connection from the server side? Packages 1
of 16 received, door closed without notice. Would this perhaps hang
the spider? By giving it only a fraction of what it expects and just
not sending the rest?
Just some uninformed opinions from someone who only BRIEFLY browsed
through a laymans explanation of various DOS hacks in a OS specific
magazine.
Sean Roach
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.5.1 for non-commercial use <http://www.pgp.com>
iQA/AwUBN+oheJHDoiHtqFDZEQJkowCghZMLT/h6PFaRKPddBZFVuR4D8ycAoJkU
Hd1FDwflRKW2MJ/7u4SOoAK+
=NPGW
-----END PGP SIGNATURE-----