|
Message-ID: <CAF6rxg=5PdGYmLFKrwHi9GTW6ZELgwfTYMrJerxD+iLPmihLTQ@mail.gmail.com> Date: Sun, 1 Jan 2012 23:41:09 -0500 From: Eitan Adler <lists@...anadler.com> To: oss-security@...ts.openwall.com Cc: Solar Designer <solar@...nwall.com> Subject: Re: speaking of DoS, openssh and dropbear (CVE-2006-1206) On Sun, Jan 1, 2012 at 10:54 PM, Kurt Seifried <kseifrie@...hat.com> wrote: > Long term I'd like to see more work on hash cash type solutions, being able to > arbitrarily set or have a reactive system that requires increased work on the client > end to prove they are a legitimate client would help with this whole DoS/DDoS class > of problem to some degree. But what if the attacker has a 10,000 node bot net? Wouldn't they just abuse the victimized computers even further? -- Eitan Adler
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.