On Wed, 27 Dec 2000, Mark J. Roberts wrote:
> IP-banlists to block their scans. They will also be on really fat pipes
> that should be easy to identify. Scanning millions of IP addresses --
> EVERY port -- takes serious bandwidth.
For what it's worth, this kind of attack seems easy to distribute.
It does not seem difficult to pay others to do some of the portscanning
for Them. That might stop as soon as a few people are hit for portscanning
and their accounts pulled, but it could make it more difficult to keep a
ban-list.
Then again, They may not think of such things. and more devious ways of
distributing such a portscan would probably not be worth the bad publicity
when they are discovered.
> 3) They have ISPs, too. When a portscan is reported, send an email to
> the ISP in question reporting it and demanding action. Better, send a real
> letter. Send big boxes full of lead pipes. They'll go nuts. We could
> certainly organize something like this. They certainly can't hide.
Real letters would probably work. Lawsuits would work even better, given
can find some lawyers willing to take on the case. A case which goes
against these people could shut them down before they even begin,
even as the protocol evolves to make the attack less relevant.
-David
_______________________________________________
Freenet-chat mailing list
[EMAIL PROTECTED]
http://lists.sourceforge.net/mailman/listinfo/freenet-chat