Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAF6rxg=5PdGYmLFKrwHi9GTW6ZELgwfTYMrJerxD+iLPmihLTQ@mail.gmail.com>
Date: Sun, 1 Jan 2012 23:41:09 -0500
From: Eitan Adler <lists@...anadler.com>
To: oss-security@...ts.openwall.com
Cc: Solar Designer <solar@...nwall.com>
Subject: Re: speaking of DoS, openssh and dropbear (CVE-2006-1206)

On Sun, Jan 1, 2012 at 10:54 PM, Kurt Seifried <kseifrie@...hat.com> wrote:
> Long term I'd like to see more work on hash cash type solutions, being able to
> arbitrarily set or have a reactive system that requires increased work on the client
> end to prove they are a legitimate client would help with this whole DoS/DDoS class > of problem to some degree.

But what if the attacker has a 10,000 node bot net? Wouldn't they just
abuse the victimized computers even further?



-- 
Eitan Adler

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.