Date: Thu, 13 Aug 1998 16:40:52 -0600 (MDT) From: Wes Peters <wes@softweyr.com> To: regnauld@deepo.prosa.dk (Philippe Regnauld) Cc: freebsd-security@FreeBSD.ORG Subject: Re: UDP port 31337 Message-ID: <199808132240.QAA18545@obie.softweyr.com> In-Reply-To: <19980813121846.33945@deepo.prosa.dk> from Philippe Regnauld at "Aug 13, 98 12:18:46 pm"
next in thread | previous in thread | raw e-mail | index | archive | help
> Brett Glass writes: > > If no one was listening, it wouldn't be a problem. > > > > Only an attacker who INTENDED to invade your systems would be subject to > > crashes due to the response. And would deserve it. > > ... provided he hadn't spoofed his source address... > > i.e.: you might be retaliating against some poor guy who didn't ask > for it. (I could for example spoof a source address of 206.100.185.2). > > The rare occasions where I've taken down the host at the other > end, was in cases of _unmistakable_ spammers, as they were sending > their junk, from dialup Whinedoze machines. (And then again it > takes time to figure out who's the the real culprit). You (again) missed the obvous point: Brett's proprosal was to find and exploit a security hold in BackOrifice itself. If the user is spoofing address b.b.b.b, your coutner-attack would not take down b.b.b.b unless b.b.b.b happened to be running BackOrifice, in which case he deserves to get taken down anyhow. -- "Where am I, and what am I doing in this handbasket?" Wes Peters Softweyr LLC http://www.softweyr.com/~softweyr wes@softweyr.com To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199808132240.QAA18545>