Date: Fri, 02 May 1997 20:02:56 +0100 From: Brian Somers <brian@awfulhak.org> To: jgrosch@sirius.com Cc: terry@lambert.org (Terry Lambert), hackers@freebsd.org Subject: Re: SPAM target Message-ID: <199705021902.UAA07402@awfulhak.demon.co.uk> In-Reply-To: Your message of "Fri, 02 May 1997 11:45:06 PDT." <199705021845.LAA06944@superior.mooseriver.com>
next in thread | previous in thread | raw e-mail | index | archive | help
> Terry Lambert said: > >> Temping as it might be, a Ping 'o' Death attack might bring us more truble > >> then we want. > > > >Of course, if someone wanted to build a little program to connect to > >their smtp server and send an "RSET\r\n" every <configurable interval> > >to keep the smtp server process alive and it's pages in core... > > > >And then if a certain mailing list of someone's friends were made aware > >of the URL to pick up their copy of the program... > > > >And then if it's realized that Linux is a memory overcommit architecture... > > > >It seems to me that this hypothetical person would play hell with their > >ability to start spam sending processes. > > > >It seems to me. > > > > > > Terry, that is a diabolically clever idea! This brings to mind my tcpchat program (http://www.awfulhak.org/tcpchat-1.2.tgz). That person could do something like tcpchat a.nasty.site snmp 220 RSET 250 quit 221 (expect send expect send expect). It seems to me. > Josef > > -- > Josef Grosch | Another day closer to a | FreeBSD 2.2.1 > jgrosch@sirius.com | Micro$oft free world | UNIX for the masses > -- Brian <brian@awfulhak.org>, <brian@freebsd.org> <http://www.awfulhak.org> Don't _EVER_ lose your sense of humour....
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199705021902.UAA07402>