On Fri, 02 Jan 2004 17:47:43 +0000 Barry Porter <[EMAIL PROTECTED]> wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> On 02/01/2004 16:03,  Brad Koehn wrote:
> 
[...]
> > Yes, I'm paranoid, but the spammers have been going after sites using
> > increasingly sophisticated techniques (DDOS being a fairly nasty one).
> > It would be wise to get a step or two ahead of them. I'm not enough of
> > a perl jockey to know if code signing is supported by the runtime
> > (other runtimes do), but we really should start using something to
> > verify code.
> 
> An alternative that might be a more secure way of obtaining the file is
> if it were available by email response; send an email to a request
> address and it is returned to the requester.

Or use GPG signing and SHA/MD5 fingerprinting on the souce distribution
(AFAIK, perl doesn't support code signing), and distribute it via
Freenet, Entropy, and other mostly-anonymous P2P services. A DDoS is
only effective if the number of attackers substantially outnumbers the
number of defenders or the defender can be found and is immobile. If you
can distribute the code widely and automate trust-checking, you should
be safe for now.

-- Bob


-------------------------------------------------------
This SF.net email is sponsored by: IBM Linux Tutorials.
Become an expert in LINUX or just sharpen your skills.  Sign up for IBM's
Free Linux Tutorials.  Learn everything from the bash shell to sys admin.
Click now! http://ads.osdn.com/?ad_id=1278&alloc_id=3371&op=click
_______________________________________________
Spamassassin-talk mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/spamassassin-talk

Reply via email to