[118252] in Cypherpunks
Re: KISA Attack (fwd)
daemon@ATHENA.MIT.EDU (Jim Choate)
Wed Sep 22 21:12:34 1999
From: Jim Choate <ravage@einstein.ssz.com>
Message-Id: <199909230059.TAA16764@einstein.ssz.com>
To: cypherpunks@einstein.ssz.com
Date: Wed, 22 Sep 1999 19:59:00 -0500 (CDT)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Reply-To: Jim Choate <ravage@einstein.ssz.com>
----- Forwarded message from Sean Roach -----
Date: Thu, 23 Sep 1999 07:47:52 -0500
From: Sean Roach <roach_s@mail.intplsrv.net>
Subject: CDR: Re: KISA Attack
time and not the network connection. What about honoring their
requests with a much smaller file? How about one which is truncated
in such a way that whatever would be recognized as the EOF doesn't
exist, then closing the connection from the server side? Packages 1
of 16 received, door closed without notice. Would this perhaps hang
the spider? By giving it only a fraction of what it expects and just
not sending the rest?
----- End of forwarded message from Sean Roach -----
Or even better vector them off to the FBI site...
____________________________________________________________________
Man is the best computer we can put aboard a spacecraft - and
the only one that can be mass produced with unskilled labor.
Werner von Braun
The Armadillo Group ,::////;::-. James Choate
Austin, Tx /:'///// ``::>/|/ ravage@ssz.com
www.ssz.com .', |||| `/( e\ 512-451-7087
-====~~mm-'`-```-mm --'-
--------------------------------------------------------------------