Re: Over a decade of DDOS--any progress yet?

2010-12-11 Thread Simon Leinen
Greg Whynott writes: > i found it funny how M$ started giving away virus/security software > for its OS. it can't fix the leaky roof, so it includes a roof patch > kit. (and puts about 10 companies out of business at the same time) I actually like the new arrangement better, where Microsoft prov

Re: BGP multihoming question.

2010-12-11 Thread Robert E. Seastrom
"George Bonser" writes: >> -Original Message- >> From: Bret Clark >> Sent: Friday, December 10, 2010 7:08 AM >> To: nanog@nanog.org >> Subject: Re: BGP multihoming question. >> >> On 12/10/2010 10:01 AM, Dylan Ebner wrote: >> > 3. You cannot trust the second isp to advertise the SWIP b

LOIC tool used in the "Anonymous" attacks

2010-12-11 Thread Marshall Eubanks
Interesting analysis of the 3 "LOIC" tool variants used in the "Anonymous" Operation Payback attacks on Mastercard, Paypal, etc. http://www.simpleweb.org/reports/loic-report.pdf LOIC makes no attempt to hide the IP addresses of the attackers, making it easy to trace them if they are using their

Re: LOIC tool used in the "Anonymous" attacks

2010-12-11 Thread Beavis
Interesting.. there's an ED about LOIC http://encyclopediadramatica.com/LOIC it even gives a instruction on how to deny the use of the tool: (funny) What if I get caught and V&d? You probably won't. It's recommended that attack with over 9000 other anons while attacking alone pretty much means

RE: LOIC tool used in the "Anonymous" attacks

2010-12-11 Thread Stefan Fouant
> -Original Message- > From: Marshall Eubanks [mailto:t...@multicasttech.com] > Sent: Saturday, December 11, 2010 10:20 AM > To: North American Network Operators Group > Subject: LOIC tool used in the "Anonymous" attacks > > Interesting analysis of the 3 "LOIC" tool variants used in the >

Re: LOIC tool used in the "Anonymous" attacks

2010-12-11 Thread andrew.wallace
I was reading about this- yeah really "anonymous". http://praetorianprefect.com/archives/2010/12/anonymous-releases-very-unanonymous-press-release/ Also: http://www.boingboing.net/2010/12/11/anonymous-isnt-loic.html Andrew From: Stefan Fouant To: 'Marshall Eubanks' ; 'North American Networ

Re: [Operational] Internet Police

2010-12-11 Thread isabel dias
check the agreed maintenance windows as defined in the (SLA)section Maintenance Plans - etc   - Original Message From: Joel Jaeggli To: valdis.kletni...@vt.edu Cc: nanog@nanog.org Sent: Fri, December 10, 2010 6:48:41 PM Subject: Re: [Operational] Internet Police On 12/10/10 9:06

Re: Global Crossing/GBLX tech needed - AS3549

2010-12-11 Thread isabel dias
location? - Original Message From: Matt Disuko To: NANOG Sent: Thu, December 9, 2010 3:02:59 PM Subject: Global Crossing/GBLX tech needed - AS3549 Can a Global Crossing IP engineer please contact me off-list? Thanks, Matt

Re: LOIC tool used in the "Anonymous" attacks

2010-12-11 Thread John Adams
It's hard to believe that it took eight people to run wireshark and write this simplistic paper about LOIC. The analysis is weak at best (it seems they only had a few days to study the problem), and never analyzes the source code which has been widely available at https://github.com/NewEraCracker/L

Re: LOIC tool used in the "Anonymous" attacks

2010-12-11 Thread Leo Bicknell
In a message written on Sat, Dec 11, 2010 at 10:19:32AM -0500, Marshall Eubanks wrote: > LOIC makes no attempt to hide the IP addresses of the attackers, making it > easy to trace them if they are using their own computers. Perhaps the authors of the tool would rather keep the finite law enforc

Re: Over a decade of DDOS--any progress yet?

2010-12-11 Thread Michael Costello
On Fri, 10 Dec 2010 15:32:10 -0500 Drew Weaver wrote: > I should've "qualified" my question by saying "What valid application > which traverses the Internet and could be seen at the edge of a > network actually uses UDP 80?" I'll grant that my response was a bit pedantic: there is no legitimate

Re: LOIC tool used in the "Anonymous" attacks

2010-12-11 Thread Marshall Eubanks
On Dec 11, 2010, at 4:21 PM, Leo Bicknell wrote: > In a message written on Sat, Dec 11, 2010 at 10:19:32AM -0500, Marshall > Eubanks wrote: >> LOIC makes no attempt to hide the IP addresses of the attackers, making it >> easy to trace them if they are using their own computers. > > Perhaps th

Re: LOIC tool used in the "Anonymous" attacks

2010-12-11 Thread andrew.wallace
Like I said the other day on Cnet comments section, December 10, 2010 3:31 PM PST. "It is extremely easy to find out who everyone is, because the "anonymous" is decentralised and easy to infiltrate and manipulate." Andrew From: Leo Bicknell To: North American Network Operators Group Cc:

Re: Mastercard problems

2010-12-11 Thread Jeffrey Lyon
The USSS has jurisdiction over all DDoS (threats to critical infrastructure). Jeff On Wed, Dec 8, 2010 at 3:30 PM, andrew.wallace wrote: > I would say the attack falls under the jurisdiction of the US secret service > since this is an attack on the financial system. > > "Today the agency's prim

Re: Mastercard problems

2010-12-11 Thread TR Shaw
So then why is there a cyber command and a cyber group part of homeland security charged with protection of critical infrastructure if critical infrastructure is the responsibility of USSS? Looks like we have too many keystone cops (the AF advertises an operational Cyber Command with nothing r

Re: Mastercard problems

2010-12-11 Thread Jeffrey Lyon
http://www.secretservice.gov/ectf_newyork.shtml Each field office has their own page. Jeff On Sat, Dec 11, 2010 at 8:42 PM, TR Shaw wrote: > So then why is there a cyber command and a cyber group part of homeland > security charged with protection of critical infrastructure if critical > infr

Re: Over a decade of DDOS--any progress yet?

2010-12-11 Thread Christopher Morrow
On Fri, Dec 10, 2010 at 5:51 PM, Joel Jaeggli wrote: > On 12/10/10 12:33 PM, Drew Weaver wrote: >> Nobody has really driven the point home that yes you can purchase a >> system from Arbor, RioRey, make your own mitigation system; what-have >> you, but you still have to pay for the transit to diges

Re: Over a decade of DDOS--any progress yet?

2010-12-11 Thread Jeffrey Lyon
I'm certain there are thresholds to that. Carrier grade mitigation solutions will start low and ramp up to 5, 6, 7, etc. figures depending on the attack and amount of bandwidth to be filtered among other variables. Jeff On Sun, Dec 12, 2010 at 12:05 AM, Christopher Morrow wrote: > On Fri, Dec 1

Re: Over a decade of DDOS--any progress yet?

2010-12-11 Thread Christopher Morrow
On Sun, Dec 12, 2010 at 12:20 AM, Jeffrey Lyon wrote: > I'm certain there are thresholds to that. Carrier grade mitigation > solutions will start low and ramp up to 5, 6, 7, etc. figures > depending on the attack and amount of bandwidth to be filtered among > other variables. > nope, the pricing

Re: Over a decade of DDOS--any progress yet?

2010-12-11 Thread Aaron Glenn
On Sun, Dec 12, 2010 at 12:05 AM, Christopher Morrow wrote: > > verizon's ddos service was/is 3250/month flat... not extra if there > was some sort of incident, and completely self-service for the > customer(s). Is 3250/month a reasonable insurance against loss? > (40k/yr or there abouts) reasona

Re: Over a decade of DDOS--any progress yet?

2010-12-11 Thread Christopher Morrow
On Sun, Dec 12, 2010 at 12:42 AM, Aaron Glenn wrote: > On Sun, Dec 12, 2010 at 12:05 AM, Christopher Morrow > wrote: >> >> verizon's ddos service was/is 3250/month flat... not extra if there >> was some sort of incident, and completely self-service for the >> customer(s). Is 3250/month a reasonab