From owner-freebsd-security Wed Aug 12 05:23:25 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id FAA21372 for freebsd-security-outgoing; Wed, 12 Aug 1998 05:23:25 -0700 (PDT) (envelope-from owner-freebsd-security@FreeBSD.ORG) Received: from proxy.atos-ods.com ([195.53.23.2]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id FAA21361 for ; Wed, 12 Aug 1998 05:23:21 -0700 (PDT) (envelope-from LSaiz@atos-ods.com) Received: from CALIXTO by proxy.atos-ods.com with SMTP (Microsoft Exchange Internet Mail Service Version 5.0.1458.49) id QWJ9R4SM; Wed, 12 Aug 1998 14:14:56 +0200 Received: from asoria87 by calixto.atos-ods.com with SMTP (Microsoft Exchange Internet Mail Service Version 5.0.1460.8) id Q3NLCY11; Wed, 12 Aug 1998 14:14:34 +0200 Message-ID: <35D188EB.A03975A4@atos-ods.com> Date: Wed, 12 Aug 1998 14:22:04 +0200 From: Luis Saiz Organization: Atos ODS X-Mailer: Mozilla 4.04 [en] (Win95; I) MIME-Version: 1.0 To: andrew@squiz.co.nz CC: Marius Bendiksen , freebsd-security@FreeBSD.ORG Subject: Re: UDP port 31337 References: Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Andrew McNaughton wrote: > On Wed, 12 Aug 1998, Marius Bendiksen wrote: > [...] > > > Fake network services are an interesting idea. They're not going to be > viable for most users, but how many of these systems need to be scattered > around the net and monitored to provide an effective deterrent to scan > based attacks? .... That's the idea Cheswick exposes in the clasical "Firewalls and Internet Security, Repelling the Wily Hacker". He created a "jail" simulating a real system "on the fly" after discovering an attack. [...] > Andrew > Luis Saiz To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe security" in the body of the message