[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: What to do with attackers?



Hi,

Am Freitag, den 04.11.2005, 09:30 -0500 schrieb Gene Heskett:
> Rejecting the attackers packets just confirms
> that you are indeed there.  I'd much druther just be a black hole, a
> bottomless bit bucket per sei.

Please compare:

This host does not exist:
# ping 192.168.0.123

PING 192.168.0.123 (192.168.0.123) 56(84) bytes of data.
From 192.168.0.69 icmp_seq=1 Destination Host Unreachable
From 192.168.0.69 icmp_seq=2 Destination Host Unreachable
From 192.168.0.69 icmp_seq=3 Destination Host Unreachable
From 192.168.0.69 icmp_seq=4 Destination Host Unreachable
From 192.168.0.69 icmp_seq=5 Destination Host Unreachable
From 192.168.0.69 icmp_seq=6 Destination Host Unreachable

--- 192.168.0.123 ping statistics ---
7 packets transmitted, 0 received, +6 errors, 100% packet loss, time
6096ms, pipe 3



And this one drops packages:

# ping www.mopo.de
PING www.mopo.de (62.201.164.170) 56(84) bytes of data.

--- www.mopo.de ping statistics ---
37 packets transmitted, 0 received, 100% packet loss, time 36017ms




See the difference?

So, the best way is to tell the other machine: 
"I am there, but you will not get in. Go away."


Most attackers will anyway hammer your machine and not care about the
difference.

Bye, Ratti

Bye,
Ratti

-- 
 -o) fontlinge | Fontmanagement for Linux | Schriftenverwaltung in Linux
 /\\ http://freshmeat.net/projects/fontlinge/
_\_V http://www.gesindel.de https://sourceforge.net/projects/fontlinge/

Attachment: signature.asc
Description: This is a digitally signed message part


Reply to: