ICANN ICANN Email List Archives

[gnso-ff-pdp-may08]


<<< Chronological Index >>>    <<< Thread Index >>>

[gnso-ff-pdp-may08] Comments on the report (2)

  • To: Fast Flux Workgroup <gnso-ff-pdp-May08@xxxxxxxxx>
  • Subject: [gnso-ff-pdp-may08] Comments on the report (2)
  • From: Dave Piscitello <dave.piscitello@xxxxxxxxx>
  • Date: Tue, 2 Sep 2008 11:21:10 -0700

Section 5.1, (Note)

Lines 286-287 currently read:

note that ³fast flux,² as defined above, is a technique which is beneficial
or harmful only to the extent that it is used to conduct beneficial or
harmful activities.


The definition above this section begins by stating that a fast flux network
is operated on one or more compromised host. I find it difficult to think of
no parties who benefits from fast flux other than attackers if we continue
to include this characteristic in the definition.

However, I believe that the presence of software that was installed on hosts
without notice or consent to the system operator/owner is a critically
important characteristic, one among several that distinguishes volatile
attack networks from volatile production networks. (my preceding comment
enumerates others)





<<< Chronological Index >>>    <<< Thread Index >>>

Privacy Policy | Terms of Service | Cookies Policy