Re: Re: Defending againts simultanious attacks

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On Thu, February 15, 2007 1:15 pm, Scott Silva wrote:
> Drew Weaver spake the following on 2/15/2007 8:27 AM:
>> I find it kind of odd that noone has come up with a 'RBL' for bots...
>>
>> ISPs could easily receive routes via BGP from "some trusted source" that
>> has NULL routes for all of the 'infected' hosts which are attacking
>> people..
>>
>> A few dozen honeypots and you would quickly have a large list of
>> infected hosts in which to ignore entirely.
> ISP's are in the market to sell bandwidth. And bots use bandwidth.
> Even if an ISP would just police it's own address space it would help.
> At home I have roadrunner, and they have no problem blocking "incoming"
> port
> 25 and port 80 traffic, but have no problem letting a connection blast
> away at
> everybody outgoing.
> So I can't have a simple webserver, but I can have a spamming operation.
> Go
> figure!

Speakesy.net polices their network properly and allows servers in the TOS.
 One of the few left.  And they do police their network for open relays. 
They rule!

_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos

[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux