[nsp-sec] IMPORTANT: DDoS-RS Reminders
SURFcert - Peter
p.g.m.peters at utwente.nl
Tue Dec 14 03:38:03 EST 2010
Tim Wilde wrote on 13-12-2010 20:10:
>
> As I mentioned in my reply earlier, our understanding is that these IRC
> servers have been set up specifically for the purpose of launching
> attacks, and any intended discussion is, at best, about those attacks,
> not about legitimate issues surrounding Wikileaks. The intended purpose
> and potential risk it causes, in our judgment, outweighs the fact that,
> yes, as with any IRC server, it's /possible/ to use this server for
> legitimate discussions. There are more than enough IRC servers and
> networks out there on which such legitimate discussions can take place,
> without a stated agenda and intent to launch attacks from those same
> networks. The stated intent of the operators of this particular network
> makes it very unusual from the norm of what we see, and is primarily
> what makes it fall into the firmly malicious and thus listable category.
Is there a difference between the IRC servers used? Because it appears
(at least) one server (91.121.72.103) has the service bit set. If that
is the case we could tell our constituency to use only that server for
discussions.
--
Peter Peters /------\ SURFnet bv
SURFcert | SURF | cert.surfnet.nl
cert at surfnet.nl \-----\ \-----\ Postbus 19035
PGP Key ID 0x5A52C966 | CERT | NL-3501 DA Utrecht
+31 30 2305 305 \------/ fax: +31 30 2305 329
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 543 bytes
Desc: OpenPGP digital signature
URL: <https://puck.nether.net/mailman/private/nsp-security/attachments/20101214/e4756dc8/attachment-0001.sig>
More information about the nsp-security
mailing list