Date: Sun, 23 May 1999 18:11:28 -0700 (PDT) From: David Babler <root@Rigel.orionsys.com> To: Michael Bryan <fbsd-security@ursine.com> Cc: freebsd-security@FreeBSD.ORG Subject: Re: Denial of service attack from "imagelock.com" Message-ID: <Pine.BSF.4.05.9905231805480.770-100000@Rigel.orionsys.com> In-Reply-To: <199905231424140440.0E81E3D5@quaggy.ursine.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sun, 23 May 1999, Michael Bryan wrote: > On 5/23/99 at 1:23 PM Brett Glass wrote: > >I don't know whether or not this would help. But complaining to their > >ISP probably would. > > Or to them directly... > > Some things I noted about their scans in our log files: > > 1) They -are- requesting a robots.txt file before every scan wave. > Whether or not they utilize this, I cannot tell, as we don't have > a robots.txt file in use at this time. They get it, and ignore it. They're just sucking up all files they see, since, as I said, I have webpoison installed. Webpoison is intended to befuddle brain-dead spam address harvesters by generating an infinite number of "interesting" pseudo-random web pages containing what look like more links (more webpoison pages) and email addresses (all bogus). The links on the page are invisible to humans and included in the robots.txt file, so legitimate robots never should go there. Our imagelock.com friends spent a LONG time there. -Dave To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.05.9905231805480.770-100000>