<<<
Chronological Index
>>> <<<
Thread Index
>>>
Re: [gnso-ff-pdp-may08] Abuse in general
- To: George Kirikos <fastflux@xxxxxxxx>, Marc Perkel <marc@xxxxxxxxxx>
- Subject: Re: [gnso-ff-pdp-may08] Abuse in general
- From: Dave Piscitello <dave.piscitello@xxxxxxxxx>
- Date: Fri, 8 Aug 2008 06:36:37 -0700
Stop, please.
Please, George, review the emails where we have repeatedly discussed the
difference between a fast flux attack and a network application that uses short
TTLs.
Fast flux is not used for "high availability" or as you defined it in an
earlier email, "a technique used to create a highly resilient network". For
weeks we have been trying to carefully characterize fast flux so that we can
distinguish fast flux networks from, in your words, "high availability which is
something everyone wants".
If you say, "Short TTLs can be used to create a highly resilient network" I'm
on board.
The criminals may have adopted short TTLs but that's not the only marker.
Anyone who looks at a DNS configuration, sees a short TTL, and concludes "this
is a fast flux attack" is going to be wrong. And we have already agreed to this
point.
We seem to be recycling several topics and issues.
On 8/7/08 11:31 PM, "George Kirikos" <fastflux@xxxxxxxx> wrote:
Hello,
On Thu, Aug 7, 2008 at 11:17 PM, Marc Perkel <marc@xxxxxxxxxx> wrote:
> This is the "Fast Flux" group but Fast Flux by itself isn't the problem.
Exactly. As I was pointing out elsewhere (not sure if it got reposted
to this list or not), fast flux can be used for "high availability"
which is something EVERYONE wants. Just because criminals adopted
"best practices" doesn't mean that everyone else should be blocked
from using that technique, especially in the future.
> It's fast flux used by people who everyone can agree are criminals. (Chinese
> disidents trying to get the word out about oppression in Tibet - NO. Mafia
> pretending to be a bank to trick you out of your password and steal your
> money - YES)
Right, that's when it starts to get difficult to "automate", as not
everyone is going to agree that XYZ are criminals. Some "criminals"
(or "undesirables") will still slip through the cracks, but at some
point we'll have to leave a solution that's still vulnerable to that,
but that shifts the burden of going after those smaller numbers to
someone else using different tools.
> So - what is our mission officially? Is it stopping phishing?
You're not alone in wondering here.....
Sincerely,
George Kirikos
www.LEAP.com
<<<
Chronological Index
>>> <<<
Thread Index
>>>
|