Home page logo

oss-sec logo oss-sec mailing list archives

Re: speaking of DoS, openssh and dropbear (CVE-2006-1206)
From: Kurt Seifried <kseifrie () redhat com>
Date: Mon, 02 Jan 2012 15:29:19 -0700

On 01/01/2012 09:41 PM, Eitan Adler wrote:
On Sun, Jan 1, 2012 at 10:54 PM, Kurt Seifried <kseifrie () redhat com> wrote:
Long term I'd like to see more work on hash cash type solutions, being able to
arbitrarily set or have a reactive system that requires increased work on the client
end to prove they are a legitimate client would help with this whole DoS/DDoS class > of problem to some degree.
But what if the attacker has a 10,000 node bot net? Wouldn't they just
abuse the victimized computers even further?

If you mean the compromised botnet machines by "victimized computers"
they're already lost and gone forever in most cases.

One possible second order effect is that the botnet machines need enough
CPU power to launch their attacks that they become so slow that users
actually take action to fix their computers, which would be a good thing.


-- Kurt Seifried / Red Hat Security Response Team

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]