Re: Counter DoS

2004-03-15 Thread Rachael Treu
Leaving directed-bcast open would accomplish this on these devices, as well as many others. A bigger problem here is that these irresponsible network polyps would offer an icmp-independent amplifier. They essentially open smurf amplification to any other protocol. Whereas a network might clob

Re: Counter DoS

2004-03-14 Thread Stephen J. Wilcox
On Sun, 14 Mar 2004, Petri Helenius wrote: > With the amount of clue present, it´s unlikely that the upstream bandwidth in > US or most of Europe will grow substantially over the next five years. Heh, thats the kind of quote that comes back to haunt you 5 years down the line :) Steve

Re: Counter DoS

2004-03-14 Thread Petri Helenius
Joel Jaeggli wrote: When pricing structures and deployment of broadband in the US approaches that of Korea and Japan, I think you'll find that that isn't the case in the US anymore. If you have two items, travelling at different speeds and the one ahead goes faster, they never approach ea

Re: Counter DoS

2004-03-13 Thread Petri Helenius
Sam Stickland wrote: Out of interest, do the people see much in the way of DDOS attacks from Japan? All that bandwidth and quite a sizable population (130 million) - but maybe the latency to US and European targets contrains it? Most attacks are unidirectional so the latency does not matter. P

Re: Counter DoS

2004-03-13 Thread Sam Stickland
Joel Jaeggli wrote: > On Thu, 11 Mar 2004, Petri Helenius wrote: > >> >> Gregory Taylor wrote: >> >>> >>> Oh yes, lets not forget the fact that if enough sites have this >>> 'firewall' and one of them gets attacked by other sites using this >>> firewall it'll create a nuclear fission sized chain r

Re: Counter DoS

2004-03-12 Thread Joel Jaeggli
On Thu, 11 Mar 2004, Petri Helenius wrote: > > Gregory Taylor wrote: > > > > > Oh yes, lets not forget the fact that if enough sites have this > > 'firewall' and one of them gets attacked by other sites using this > > firewall it'll create a nuclear fission sized chain reaction of > > loopin

Re: Counter DoS

2004-03-12 Thread Stephen J. Wilcox
> Fortunately people with less clue usually have less bandwidth. Obviously > there are exceptions. I would expect to see localized tragedies if > something like this would get deployed but predicting death of the > internet is clueless. Hmm thats little comfort if your sharing your cable modem

Re: New Solution: (was: Re: Counter DoS)

2004-03-11 Thread James
the thing is though, by allowing any /32's... what prevents /all/ customers from abusing it by curiosity of what would happen? :) the fact that you are allowing any /32's (up to 100 or whatever max prefix lim. you set) is like giving a can of worms to your

Re: New Solution: (was: Re: Counter DoS)

2004-03-11 Thread Barney Wolff
On Thu, Mar 11, 2004 at 05:17:35PM -0500, Deepak Jain wrote: > > Just like the blackhole community routes, certain /32's (only, nothing > shorter) can be exported from the customer to the backbone to be > blackholed at the edges. The twist, is that instead of limited the > customer announcemen

Re: Counter DoS

2004-03-11 Thread E.B. Dreger
VA> Date: Thu, 11 Mar 2004 08:12:04 -0500 VA> From: Vinny Abello VA> Plus imagine an attack originates behind one of these devices VA> for some reason attacking another device. It'll just create a VA> massive loop. :) That would be interesting. I wonder if it pays attention to the "evil bit"? ;

Re: Counter DoS

2004-03-11 Thread Eric Kuhnke
Get involved with your local high schools. Sponsor user groups at the high school. Offer to teach some mini courses. The teenage crowd needs our help learning best practices and ethics. The hacking problem is multi-faceted, of course, and this is just one facet of a partial solution, but still

RE: Counter DoS

2004-03-11 Thread Priscilla Oppenheimer
riginal Message- From: Etaoin Shrdlu [mailto:[EMAIL PROTECTED] Sent: 11 March 2004 14:58 To: Nanog Subject: Re: Counter DoS "Pendergrass, Greg" wrote: > > I can see now that it's only a matter of time before some nut writes "The > Art of War in the Internet".

Re: Counter DoS

2004-03-11 Thread Brian Bruns
On Thursday, March 11, 2004 6:16 PM [EST], william(at)elan.net <[EMAIL PROTECTED]> wrote: >> >> Which RBL operators flood /24's or /16's? What do they flood them >> with? > > I think he meant that RBLs sometimes include entire /24 in RBL list when > only one or two ips are at fault and some woul

Re: Counter DoS

2004-03-11 Thread Laurence F. Sheldon, Jr.
william(at)elan.net wrote: On Thu, 11 Mar 2004, Laurence F. Sheldon, Jr. wrote: Petri Helenius wrote: Maybe there is a lesson to be learned from many RBL operators. To make sure, just send packets to the whole /24 or /16 you got an "attack" packet from. Which RBL operators flood /24's or /16'

New Solution: (was: Re: Counter DoS)

2004-03-11 Thread Deepak Jain
Here is a solution I would like to propose -- it is not as set-and-forget as network operators like, but we do know that some of our customers have a lot of expertise with this stuff, and taking advantage of that value helps. This is along the categories of collateral damage, scorched earth a

Re: Counter DoS

2004-03-11 Thread william(at)elan.net
On Thu, 11 Mar 2004, Laurence F. Sheldon, Jr. wrote: > Petri Helenius wrote: > > > Maybe there is a lesson to be learned from many RBL operators. To make > > sure, just send packets to the whole /24 or /16 you got an "attack" > > packet from. > > Which RBL operators flood /24's or /16's? What

Re: Counter DoS

2004-03-11 Thread Laurence F. Sheldon, Jr.
Petri Helenius wrote: Maybe there is a lesson to be learned from many RBL operators. To make sure, just send packets to the whole /24 or /16 you got an "attack" packet from. Which RBL operators flood /24's or /16's? What do they flood them with? -- Requiescas in pace o email

Re: Counter DoS

2004-03-11 Thread Petri Helenius
Deepak Jain wrote: If you wanted to do that, wouldn't the firewall just need directed-broadcast left open or emulate similar behavior, or even turning ip unreachables back on? Flooding pipes accidentally is easy enough. Now people are selling products to do it deliberately. Maybe there is a

Re: Counter DoS

2004-03-11 Thread Gregory Taylor
e: -Original Message- From: Gregory Taylor [mailto:[EMAIL PROTECTED] Sent: Thursday, March 11, 2004 3:55 PM To: Rachael Treu Cc: [EMAIL PROTECTED] Subject: Re: Counter DoS Yes, lets allow the kiddies who already get away with as little work as they can in order to produce the most de

Re: Counter DoS

2004-03-11 Thread Rachael Treu
On Thu, Mar 11, 2004 at 04:10:04PM -0500, Deepak Jain said something to the effect of: > > If you wanted to do that, wouldn't the firewall just need > directed-broadcast left open or emulate similar behavior, or even > turning ip unreachables back on? Exactly my point in using the word "amplif

Re: Counter DoS

2004-03-11 Thread Deepak Jain
If you wanted to do that, wouldn't the firewall just need directed-broadcast left open or emulate similar behavior, or even turning ip unreachables back on? Flooding pipes accidentally is easy enough. Now people are selling products to do it deliberately. Yeesh. I saw a license plate this w

RE: Counter DoS

2004-03-11 Thread Drew Weaver
-Original Message- From: Gregory Taylor [mailto:[EMAIL PROTECTED] Sent: Thursday, March 11, 2004 3:55 PM To: Rachael Treu Cc: [EMAIL PROTECTED] Subject: Re: Counter DoS Yes, lets allow the kiddies who already get away with as little work as they can in order to produce the most

Re: Counter DoS

2004-03-11 Thread Gregory Taylor
Yes, lets allow the kiddies who already get away with as little work as they can in order to produce the most destruction they can, the ability to use these 'Security Systems' as a new tool for DoS attacks against their enemies. Scenerio: Lets say my name is: l33th4x0r I want to attack joe

Re: Counter DoS

2004-03-11 Thread Rachael Treu
On Thu, Mar 11, 2004 at 03:21:29AM -0500, Brian Bruns said something to the effect of: > > On Thursday, March 11, 2004 3:05 AM [EST], Brian Bruns <[EMAIL PROTECTED]> > wrote: ..snip snip.. > > How the hell could a company put something like this out, and expect not to > > get themselves sued to t

Re: Counter DoS

2004-03-11 Thread Rachael Treu
On Thu, Mar 11, 2004 at 03:21:29AM -0500, Brian Bruns said something to the effect of: > > On Thursday, March 11, 2004 3:05 AM [EST], Brian Bruns <[EMAIL PROTECTED]> > wrote: ..snip snip.. > > How the hell could a company put something like this out, and expect not to > > get themselves sued to t

Re: Counter DoS

2004-03-11 Thread Rachael Treu
Two words (well...one hyphenated-reference): spoofed-source bah, --ra -- k. rachael treu, CISSP [EMAIL PROTECTED] ..quis costodiet ipsos custodes?.. On Wed, Mar 10, 2004 at 11:50:56PM -0800, Gregory Taylor said something to the effect of: > > Oh yes, lets not forget the fact that if

Re: Counter DoS

2004-03-11 Thread Rachael Treu
Mmm. A firewall that lands you immediately in hot water with your ISP and possibly in a courtroom, yourself. Hot. Legality aside... I don't imagine it would be too hard to filter these retaliatory packets, either. I expect that this would be more wad-blowing than cataclysm after the initial t

Re: Counter DoS

2004-03-11 Thread Laurence F. Sheldon, Jr.
Eric Gauthier wrote: Most Universities have a large clueless.. um, I mean, student population sitting on 10 or 100 meg switched ports and several hundred meg's to the Internet You mis-spelled "faculty, researcher, and staff populations". Today's students (as well as non-trivial portions of t

Re: Counter DoS

2004-03-11 Thread Eric Gauthier
> > Fortunately people with less clue usually have less bandwidth. > > Don't be so sure that people with no clue don't have bandwidth, large > companies with enourmouse resources sometimes end up with really clueless > people at the top and similarly clueless network techs. Most Universities

RE: Counter DoS

2004-03-11 Thread Pendergrass, Greg
a is bound to fail but also likely be a major irritation before it does. GP -Original Message- From: Etaoin Shrdlu [mailto:[EMAIL PROTECTED] Sent: 11 March 2004 14:58 To: Nanog Subject: Re: Counter DoS "Pendergrass, Greg" wrote: > > I can see now that it's only a matte

Re: Counter DoS

2004-03-11 Thread Etaoin Shrdlu
"Pendergrass, Greg" wrote: > > I can see now that it's only a matter of time before some nut writes "The > Art of War in the Internet". I read the whitepaper, it goes on a lot about > how defensive policies are ineffective but doesn't really say why active > response has never been tried: Ask, a

Re: Counter DoS

2004-03-11 Thread Valdis . Kletnieks
On Thu, 11 Mar 2004 03:21:29 EST, Brian Bruns <[EMAIL PROTECTED]> said: > So, and who thinks that this is a good idea? :) What's the going rate per megabyte for transit traffic? :) pgp0.pgp Description: PGP signature

Re: Counter DoS

2004-03-11 Thread Daniel Karrenberg
On 10.03 20:55, Steven M. Bellovin wrote: > > The phrase "seriously bad idea" comes to mind. Other phrases include > "illegal", "collateral damage", and "stupid". Those plus "escalation of agression" and "uncontrollable feedback loop". Daniel Karrenberg PS: I will spare you the re-run of a r

Re: Counter DoS

2004-03-11 Thread william(at)elan.net
On Thu, 11 Mar 2004, Petri Helenius wrote: > Gregory Taylor wrote: > > Oh yes, lets not forget the fact that if enough sites have this > > 'firewall' and one of them gets attacked by other sites using this > > firewall it'll create a nuclear fission sized chain reaction of > > looping Denial o

Re: Counter DoS

2004-03-11 Thread Petri Helenius
Gregory Taylor wrote: Oh yes, lets not forget the fact that if enough sites have this 'firewall' and one of them gets attacked by other sites using this firewall it'll create a nuclear fission sized chain reaction of looping Denial of Service Attacks that would probably bring most major backbo

Re: Counter DoS

2004-03-11 Thread Vinny Abello
At 02:25 AM 3/11/2004, Gregory Taylor wrote: After reading that article, if this product really is capable of 'counter striking DDoS attacks', my assumption is that it will fire packets back at the nodes attacking it. Doing such an attack would not be neither feasible or legal. You would only

RE: Counter DoS

2004-03-11 Thread Michael . Dillon
>I wonder, are they planning to launch these DDoS attacks from >compromised hosts belonging to unwitting accomplices like the >bad guys do? Could they be the people behind NetSky? We know now that Bagle and MyDoom come from spammer gangs but I haven't heard if anyone has identified a motive behin

RE: Counter DoS

2004-03-11 Thread Pendergrass, Greg
GP -Original Message- From: Joshua Brady [mailto:[EMAIL PROTECTED] Sent: 11 March 2004 01:27 To: [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] Subject: Counter DoS http://news.zdnet.co.uk/internet/security/0,39020375,39148215,00.htm Comments? Vodafone Global Content Services Lim

Re: Counter DoS

2004-03-11 Thread Hank Nussbacher
At 09:43 AM 11-03-04 +, Brandon Butterworth wrote: > The Symbiot whitepaper on their service describes a process with a > little more imagination Like hooking it up to DARPA Grand Challenge winners? http://abcnews.go.com/sections/SciTech/WorldNewsTonight/robot_race_darpa_040310-1.html They re

Re: Counter DoS

2004-03-11 Thread Brandon Butterworth
> The Symbiot whitepaper on their service describes a process with a > little more imagination Like hooking it up to DARPA Grand Challenge winners? http://abcnews.go.com/sections/SciTech/WorldNewsTonight/robot_race_darpa_040310-1.html > I applaud the idea of a outsourced department that will ma

Re: Counter DoS

2004-03-11 Thread Sean Donelan
On Thu, 11 Mar 2004, Baldwin, James wrote: > I applaud the idea of a outsourced department that will manage the > denial of service, and "hordes of script kiddie" (nod to Ranum) problems > that plague modern networks. Anything that keeps me from being > distracted from more interesting lines of th

Re: Counter DoS

2004-03-11 Thread Baldwin, James
http://www.symbiot.com/media/iwROE.pdf The Symbiot whitepaper on their service describes a process with a little more imagination and use than simply flooding attacking nodes with packets. It describes a process which appears to require human intervention through an Operations Center to aid in tr

Re: Counter DoS

2004-03-11 Thread Gregory Taylor
My mom likes the idea, she thinks it'll help her get her hotmail faster. (shrugs) Brian Bruns wrote: On Thursday, March 11, 2004 3:05 AM [EST], Brian Bruns <[EMAIL PROTECTED]> wrote: Sounds like efnet channel wars on a much more interesting scale. Like I've said in previous posts - do we rea

Re: Counter DoS

2004-03-11 Thread Brian Bruns
On Thursday, March 11, 2004 3:05 AM [EST], Brian Bruns <[EMAIL PROTECTED]> wrote: > > Sounds like efnet channel wars on a much more interesting scale. > > Like I've said in previous posts - do we really want these people having > tools like this? Doesn't this make them the equivelant of 'script

Re: Counter DoS

2004-03-11 Thread Brian Bruns
On Thursday, March 11, 2004 2:43 AM [EST], Jay Hennigan <[EMAIL PROTECTED]> wrote: > > On the other hand, they could become immensely popular, reaching the > critical mass when one of them detects what is interpreted as an attack > from a network protected by another. Grab the popcorn and watch

Re: Counter DoS

2004-03-10 Thread Gregory Taylor
Oh yes, lets not forget the fact that if enough sites have this 'firewall' and one of them gets attacked by other sites using this firewall it'll create a nuclear fission sized chain reaction of looping Denial of Service Attacks that would probably bring most major backbone providers to their k

Re: Counter DoS

2004-03-10 Thread Jay Hennigan
On Wed, 10 Mar 2004, Gregory Taylor wrote: > After reading that article, if this product really is capable of > 'counter striking DDoS attacks', my assumption is that it will fire > packets back at the nodes attacking it. Doing such an attack would not > be neither feasible or legal. You would

Re: Counter DoS

2004-03-10 Thread Gregory Taylor
After reading that article, if this product really is capable of 'counter striking DDoS attacks', my assumption is that it will fire packets back at the nodes attacking it. Doing such an attack would not be neither feasible or legal. You would only double the affect that the initial attack ca

Re: Counter DoS

2004-03-10 Thread Gregory Taylor
I remember the sidewinder. They had a huge marketing campaign aimed at convincing the customer that their firewalls were inpenetrable. Their firewalls didn't sell all that well, and those that did sell, proved to be a colossal failure. I still have a deck of 'sidewinder' playing cards from C

Re: Counter DoS

2004-03-10 Thread Sean Donelan
On Wed, 10 Mar 2004, Steven M. Bellovin wrote: > In message <[EMAIL PROTECTED]>, "Joshua Brady" writes: > > > >http://news.zdnet.co.uk/internet/security/0,39020375,39148215,00.htm > > > >Comments? > > The phrase "seriously bad idea" comes to mind. Other phrases include > "illegal", "collateral da

RE: Counter DoS

2004-03-10 Thread Christopher L. Morrow
On Wed, 10 Mar 2004, Mark Borchers wrote: > > > The company said it bases its theory on the military doctrine of > > "necessity and proportionality", which means the response to > > an attack is > > proportionate to the attack's ferocity. According to the > > company, a response could range from

RE: Counter DoS

2004-03-10 Thread Mark Borchers
> The company said it bases its theory on the military doctrine of > "necessity and proportionality", which means the response to > an attack is > proportionate to the attack's ferocity. According to the > company, a response could range from "profiling and > blacklisting upstream providers"

Re: Counter DoS

2004-03-10 Thread Travis Dawson
I actually thought that this was some kind of April Fools day joke a few weeks early. Anyone who buys this should be shot on principleWait...First I have a bridge to sell them. At 05:55 PM 3/10/2004, Steven M. Bellovin wrote: In message <[EMAIL PROTECTED]>, "Joshua Brady" writes: > >http://

Re: Counter DoS

2004-03-10 Thread william(at)elan.net
On Wed, 10 Mar 2004, Joshua Brady wrote: > > http://news.zdnet.co.uk/internet/security/0,39020375,39148215,00.htm > Comments? This is not really a comment about this article. But I really think it would have been better if people don't just put the link and then say "comments" but actually p

Re: Counter DoS

2004-03-10 Thread Steven M. Bellovin
In message <[EMAIL PROTECTED]>, "Joshua Brady" writes: > >http://news.zdnet.co.uk/internet/security/0,39020375,39148215,00.htm > >Comments? The phrase "seriously bad idea" comes to mind. Other phrases include "illegal", "collateral damage", and "stupid". --Steve Bellovin, http

Counter DoS

2004-03-10 Thread Joshua Brady
http://news.zdnet.co.uk/internet/security/0,39020375,39148215,00.htm Comments?