Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 23 May 1999 18:11:28 -0700 (PDT)
From:      David Babler <root@Rigel.orionsys.com>
To:        Michael Bryan <fbsd-security@ursine.com>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: Denial of service attack from "imagelock.com"
Message-ID:  <Pine.BSF.4.05.9905231805480.770-100000@Rigel.orionsys.com>
In-Reply-To: <199905231424140440.0E81E3D5@quaggy.ursine.com>

next in thread | previous in thread | raw e-mail | index | archive | help


On Sun, 23 May 1999, Michael Bryan wrote:
> On 5/23/99 at 1:23 PM Brett Glass wrote:
> >I don't know whether or not this would help. But complaining to their
> >ISP probably would.
> 
> Or to them directly...
> 
> Some things I noted about their scans in our log files:
> 
> 1) They -are- requesting a robots.txt file before every scan wave.
> Whether or not they utilize this, I cannot tell, as we don't have
> a robots.txt file in use at this time.

They get it, and ignore it. They're just sucking up all files they see,
since, as I said, I have webpoison installed. Webpoison is intended to
befuddle brain-dead spam address harvesters by generating an infinite
number of "interesting" pseudo-random web pages containing what look like
more links (more webpoison pages) and email addresses (all bogus). The
links on the page are invisible to humans and included in the robots.txt
file, so legitimate robots never should go there. Our imagelock.com
friends spent a LONG time there.

-Dave



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.05.9905231805480.770-100000>