[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: counteracting an attack?



Hi!

> I agree, countermeasures can have bad effects, both karmically, and legally.
> If script kiddies are running scripts to attack your machine, why not have your machine run scripts to attack attackers?

Define attackers. And define it well enough for a script to distinguish
attackers from ordinary people without errors. If you can perform this
miracle - yes, why not.

> [portscanning]

As in every program, a good algorithm has to perform in the expected way and
it has to terminate. So apart from legal and ethical questions, you cannot
simply answer a portscan on your machine with a protscan on their machine,
this would never end.
So now we have a script that remembers the machines it did a portscan on
within a reasonable amount of time. This is already complicated enough for
plenty of bugs plus it opens your machine to DoS-attacks. Is all this
trouble worth the gain and what gain do we get anyway?

> Isn't there an option in portsentry to forward packets, once an 'attack' is detected, instead of dropping them?  So once portsentry decides someone is being malicous, it then starts forwarding all packets off to disney.com or something?  I think that's rather funny, however this may be another 'attack'.  Only now you're indirectly directly involved!

So now disney, presumably a big company with good techs and even better
lawyers, receives the attack. But they are not on the same ethernet as you
and the attacker. The attacking packets have found their way from the
attacker to you through and then to disney. Alright. Two cases:
Case one: Disney's techs cannot figure out, what path the packets took. The
have to deal with the attacks and spend money on it. Good job! Better use M$
if you want to hear cheers but don't consider ethical questions.
Case two: Disney's techs can figure out what path the packets took. After a
bunch of attacks from different sources, all of them were untraceable when
taken alone, the techs were able to trace it back to you. So now the lawyers
will talk to you, find out that you were not the attacker and hand the job
back to the techs to find the original attackers? Unlikely.

Ergo:
Unless you are the NASA, secure your machine, log the attacks and smile. It
always hits those with bad firewalls and that is someone elses problem.

Jörn



Reply to: