Re: short Botnet list and Cashing in on DoS

2004-10-22 Thread John Kristoff
On Wed, 20 Oct 2004 15:14:29 -0400 Hannigan, Martin [EMAIL PROTECTED] wrote: [..]we additionally request that they resolve the RR to 127.0.0.3 before they lock out and reload the zone. We picked 127/8 as the standard. RFC 1918 wasn't suitable for obvious reasons. [ I know you know this

Re: short Botnet list and Cashing in on DoS

2004-10-13 Thread David Barak
--- Andrew D Kirch [EMAIL PROTECTED] wrote: ... and anyone posting from yahoo/gmail/hotmail should have their posting rights immediately revoked because obviously they have no claim whatsoever to any critical Network Operations. You had me until then: has it not occurred to you that some

Re: short Botnet list and Cashing in on DoS

2004-10-13 Thread william(at)elan.net
On Wed, 13 Oct 2004, David Barak wrote: and anyone posting from yahoo/gmail/hotmail should have their posting rights immediately revoked because obviouslythey have no claim whatsoever to any critical Network Operations. You had me until then: has it not occurred to you that some of

Re: short Botnet list and Cashing in on DoS

2004-10-11 Thread Michael . Dillon
1. Do BCP38. http://rfc.net/bcp0038.html Have your CFO read SAC004. http://www.icann.org/committees/security/sac004.htm Implement source address validity checks. http://www.cisco.com/en/US/tech/tk828/tk363/technologies_tech_note09186a00800f67d5.shtml 2. Filter aggressively. Run a

Re: short Botnet list and Cashing in on DoS

2004-10-11 Thread Bill Stewart
On Sun, 10 Oct 2004 15:06:17 -0400, James Baldwin [EMAIL PROTECTED] wrote: Pardon for my possibly ill informed interjection. I was under the impression that the current wind was blowing towards filtering outbound port 25 traffic while allowing outbound authenticated port 587 traffic? The

Re: short Botnet list and Cashing in on DoS

2004-10-11 Thread Edward B. Dreger
BS Date: Mon, 11 Oct 2004 10:52:45 -0700 BS From: Bill Stewart BS [T]he normal definition of Internet service is to allow BS everything unless there's a good reason not to, as opposed to BS deny-most firewalls. Perhaps that's part of the problem. Has AOL's SMTP proxying and blocking driven it

Re: short Botnet list and Cashing in on DoS

2004-10-10 Thread Alexei Roudnev
Pardon for my possibly ill informed interjection. I was under the impression that the current wind was blowing towards filtering outbound It is not true, as I know; moreover, the day when I receive such proposal from my ISP will be my last day with this ISP, so it will be for many others.

Re: short Botnet list and Cashing in on DoS

2004-10-09 Thread alex
On Fri, 8 Oct 2004, J. Oquendo wrote: this since it bugs me) EV1, Everybody's Internet. Not only do they host some botnets, malware spewing servers, spam relays, terrorists related sites, their excuse is Well we don't know who we rent to They don't. When you have few thousands of dedicated

Re: Fixing stuff (was Re: short Botnet list and Cashing in on DoS)

2004-10-09 Thread Mikael Abrahamsson
On Sat, 9 Oct 2004, Stephen J. Wilcox wrote: They dont care in that for many people, providing the computer still works, There are plenty of people driving their cars even though they know that their catalytic converter doesn't work properly, or their ignition is off and they're putting

Re: Fixing stuff (was Re: short Botnet list and Cashing in on DoS)

2004-10-09 Thread Gadi Evron
But compared to the success rate of the bot writers, the anti-bot tools fall far behind. Some people estimate between 10 million and 30 million Actually, there are some fine Anti Trojan (AT) tools out there. Try out The Cleaner and BOClean. new bots have been created this year. That number is

Re: short Botnet list and Cashing in on DoS

2004-10-09 Thread Gadi Evron
Yea, verily. This is not an impossible problem for this community; it is only an impossible problem for any one of us acting totally independently. And while the solution isn't instant, the tide CAN be turned. Problem is, we are a fighting a war we already lost. It's put out a fire here and

Re: short Botnet list and Cashing in on DoS

2004-10-09 Thread Petri Helenius
Gadi Evron wrote: Problem is, we are a fighting a war we already lost. It's put out a fire here and there, and break a wave while you're at it. How about seeing some simple measures such as blocking outgoing port 25? at ISP's? Not a perfect solution, but it's a partial solution for some of the

Re: short Botnet list and Cashing in on DoS

2004-10-09 Thread Gadi Evron
Blocking ports one by one and filling the Internet by application level proxies (SMTP gateways for port 25) is not a road worth travelling. Pete Blocking port 25 for dynamic ranges means they can't send email, so that drone are pretty useless for spammers on that account. Trojan horses would

Re: short Botnet list and Cashing in on DoS

2004-10-09 Thread Petri Helenius
Gadi Evron wrote: Blocking port 25 for dynamic ranges means they can't send email, so that drone are pretty useless for spammers on that account. Trojan horses would have to use local information for the user's own account (from Outlook or such). Next you'll block SIP if we start getting spam

Re: short Botnet list and Cashing in on DoS

2004-10-09 Thread Gadi Evron
Next you'll block SIP if we start getting spam calls? Or any other application that pops up and is used by the same people sending spam today? There is the issue of usability. Why does a Cable user on a dynamic range need SMTP open? You're fixing the symptom, not curing the cause. The

Re: short Botnet list and Cashing in on DoS

2004-10-09 Thread Stephen J. Wilcox
On Sat, 9 Oct 2004, Gadi Evron wrote: Blocking port 25 for dynamic ranges means they can't send email, so that drone are pretty useless for spammers on that account. Trojan horses would have to use local information for the user's own account (from Outlook or such). my users like being

Re: short Botnet list and Cashing in on DoS

2004-10-09 Thread Alexei Roudnev
: Paul Vixie [EMAIL PROTECTED]; [EMAIL PROTECTED] Sent: Saturday, October 09, 2004 11:13 AM Subject: Re: short Botnet list and Cashing in on DoS Gadi Evron wrote: Problem is, we are a fighting a war we already lost. It's put out a fire here and there, and break a wave while you're

Re: short Botnet list and Cashing in on DoS

2004-10-09 Thread Gadi Evron
there are many ways of sending spam that dont use port 25.. True, but reducing spam from millions to thousands seems like something good, no? individual rules are costly to implement and users wont use a service where you have to pay more for basic services Several big ISP's are blocking port

Re: short Botnet list and Cashing in on DoS

2004-10-09 Thread Stephen J. Wilcox
On Sat, 9 Oct 2004, Gadi Evron wrote: there are many ways of sending spam that dont use port 25.. True, but reducing spam from millions to thousands seems like something good, no? their market wont change tho, you will just force them to use another method.. at one time open relays

Re: short Botnet list and Cashing in on DoS

2004-10-09 Thread Paul Vixie
i was recently chastised for posting non-operational content to nanog, and so, while i am willing to beat the drum for source address validation, i'm very concerned about commenting further in what has to be the 40th or 50th version of this thread in the last ten years. with trepidation, then:

Re: short Botnet list and Cashing in on DoS

2004-10-09 Thread Gadi Evron
From a recent email I gather this is very off-topic, so I will try to be brief in my reply. (Geneva.CH.EU.*) since 3+ years. I can say from my experiences I couldn't make any kind of communication between botnets and spam. Most Trojan codes I have looked into doesn't have any command/action to

Re: short Botnet list and Cashing in on DoS

2004-10-09 Thread Paul Vixie
someone who wished to remain publically unnamed answered me by saying: I got chastized a little while ago, too, for a single post, and told that it was my THIRD warning (having not received any at all before). Feh. i can't think of anyone among all nanog posters since the beginning of time

Re: [nanog] Re: short Botnet list and Cashing in on DoS

2004-10-09 Thread Dan Mahoney, System Admin
On Sat, 9 Oct 2004, Alexei Roudnev wrote: Then get yourself a personal colo (http://www.vix.com/personalcolo/) A dynamic ip is no place for a server of any kind. And it IS the isp's concern. Most of them would consider running a mail server on a home-user grade cable connection to be in

Re: [nanog] Re: short Botnet list and Cashing in on DoS

2004-10-09 Thread Randy Bush
Then get yourself a personal colo (http://www.vix.com/personalcolo/) A dynamic ip is no place for a server of any kind. right! to use the internet as an end host/customer i have to go get colo, transit there, ... cool! randy

Re: short Botnet list and Cashing in on DoS

2004-10-08 Thread Gadi Evron
Only when they do something about it. Trouble? When they have 40K extra users to pay for bandwidth (easily eats up a T1 or two), it's damage enough. Besides, would you like someone to launch cyber A-Bombs (phaa) from your network? 1. Worrying about personal privacy of their users, not wanting

Re: short Botnet list and Cashing in on DoS

2004-10-07 Thread Gadi Evron
Here's a link to a bugtraq post I made a couple of months ago, about what Trojan horses are used in drone armies today, it is not really up-to-date, but should give you a general idea: http://seclists.org/lists/bugtraq/2004/Jul/0106.html And now to your post... I've been slowly compiling a list

Re: short Botnet list and Cashing in on DoS

2004-10-07 Thread frank
Since we're posting articles this morning: North Korea Has Some 600 Computer Hackers, South Korea Says From MIT's Tech Review Newsletter: They don't need physical nukes to create problems ... They (the North Koreans) could just exploit our network vulnerabilities. It's completely doable.

Re: short Botnet list and Cashing in on DoS

2004-10-07 Thread Alistair Cockeram
On Thu, Oct 07, 2004 at 07:30:20AM -0500, [EMAIL PROTECTED] wrote: Since we're posting articles this morning: North Korea Has Some 600 Computer Hackers, South Korea Says That is rather interesting since North Korea appears to only have one transit link via china. Into a cybercafe owned by

Re: short Botnet list and Cashing in on DoS

2004-10-07 Thread Randy Bush
North Korea Has Some 600 Computer Hackers, South Korea Says and in some years, they may catch up to the us randy

RE: short Botnet list and Cashing in on DoS

2004-10-07 Thread Hannigan, Martin
-Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of J. Oquendo Sent: Thursday, October 07, 2004 1:11 AM To: [EMAIL PROTECTED] Subject: short Botnet list and Cashing in on DoS I've been slowly compiling a list of known botnets should anyone

Re: [nanog] RE: short Botnet list and Cashing in on DoS

2004-10-07 Thread Dan Mahoney, System Admin
On Thu, 7 Oct 2004, Hannigan, Martin wrote: -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of J. Oquendo Sent: Thursday, October 07, 2004 1:11 AM To: [EMAIL PROTECTED] Subject: short Botnet list and Cashing in on DoS I've been slowly compiling a list

Re: short Botnet list and Cashing in on DoS

2004-10-07 Thread Gadi Evron
Going after the bots is lesser effort. The controllers are a priority. That's not happening. AV companies are mostly interested in hyping the latest worm or semi-worm. Drone armies, hundreds of thousands large (no exaggeration) are just too much of an effort with 1000+ new Trojan horses coming

Re: short Botnet list and Cashing in on DoS

2004-10-07 Thread Paul Vixie
..., a-la spamhaus. Bothaus anyone? The problem with that is the list rapidly updates and must be maintained with some level of frequency and there's a level of trust involved in it as well. i consider www.cymru.com to be an excellent beginning toward that goalset. Going after the bots

Re: short Botnet list and Cashing in on DoS

2004-10-07 Thread Randy Bush
Going after the bots is lesser effort. The controllers are a priority. wide scale BCP38 conformity is the only way any of this will ever happen. considering that the bots are not spoofing, just how is this gonna help? randy

Re: short Botnet list and Cashing in on DoS

2004-10-07 Thread Mike Tancsa
At 01:10 AM 07/10/2004, J. Oquendo wrote: I've been slowly compiling a list of known botnets should A lot of the IP addresses you have listed seem like they would change with some frequency based on the host names. The problem with using such a list is that it can quickly become out of date

short Botnet list and Cashing in on DoS

2004-10-06 Thread J. Oquendo
I've been slowly compiling a list of known botnets should anyone care to filter, or check them in your netblocks if someone in your range is passing off garbage, etc. Information has been passed from others admins having to deal with these pest. Care to pass on a host that you're seeing I'll