Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 1 Jan 2012 23:41:09 -0500
From: Eitan Adler <lists@...anadler.com>
To: oss-security@...ts.openwall.com
Cc: Solar Designer <solar@...nwall.com>
Subject: Re: speaking of DoS, openssh and dropbear (CVE-2006-1206)

On Sun, Jan 1, 2012 at 10:54 PM, Kurt Seifried <kseifrie@...hat.com> wrote:
> Long term I'd like to see more work on hash cash type solutions, being able to
> arbitrarily set or have a reactive system that requires increased work on the client
> end to prove they are a legitimate client would help with this whole DoS/DDoS class > of problem to some degree.

But what if the attacker has a 10,000 node bot net? Wouldn't they just
abuse the victimized computers even further?



-- 
Eitan Adler

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ