[118252] in Cypherpunks

home help back first fref pref prev next nref lref last post

Re: KISA Attack (fwd)

daemon@ATHENA.MIT.EDU (Jim Choate)
Wed Sep 22 21:12:34 1999

From: Jim Choate <ravage@einstein.ssz.com>
Message-Id: <199909230059.TAA16764@einstein.ssz.com>
To: cypherpunks@einstein.ssz.com
Date: Wed, 22 Sep 1999 19:59:00 -0500 (CDT)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Reply-To: Jim Choate <ravage@einstein.ssz.com>


----- Forwarded message from Sean Roach -----

Date: Thu, 23 Sep 1999 07:47:52 -0500
From: Sean Roach <roach_s@mail.intplsrv.net>
Subject: CDR: Re: KISA Attack

time and not the network connection.  What about honoring their
requests with a much smaller file?  How about one which is truncated
in such a way that whatever would be recognized as the EOF doesn't
exist, then closing the connection from the server side?  Packages 1
of 16 received, door closed without notice.  Would this perhaps hang
the spider?  By giving it only a fraction of what it expects and just
not sending the rest?

----- End of forwarded message from Sean Roach -----

Or even better vector them off to the FBI site...

    ____________________________________________________________________
 
       Man is the best computer we can put aboard a spacecraft - and
       the only one that can be mass produced with unskilled labor.

                                            Werner von Braun


       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------


home help back first fref pref prev next nref lref last post