Wake Up! (was: spamspamspam)
Jared Mauch
jared at wolverine.hq.cic.net
Tue Nov 12 16:48:59 UTC 1996
I don't advocate or tolorate this either.
It was meant as a joke.
We now return you to the non-flaming, nanog list... :-)
- Jared
David Stoddard graced my mailbox with this long sought knowledge:
> Jared Mauch writes:
> > gcc sources aren't as bloated as emacs sources.
> >
> > What you need to do is find a way to send the mimed sources to
> > someones text pager. Either that, or uuencoded to their pager. Then
> > build a compiler on the pager and put emacs on it.
> >
> > - Jared
>
> So, as a "responsible" ISP, you advocate denial of service attacks?
> You are either incredibly naive or intensely stupid to advocate
> that position. Is that how you want people to deal with you when
> your customers violate your AUP? I really want to hear your
> justification for mail bombing ... maybe you have one for SYN attacks
> too?
>
> Frankly, there is NO valid reason for ANYONE to retaliate in this
> manner. As an ISP, if you have a customer that spams someone, you
> get flooded with hate mail -- this mail continues long after you
> have wiped the abuser out of your system. But in the event someone
> decides to mail the source to Linux 1000 times to your server,
> copying abuse, root, postmaster, and support, they kill off your
> entire site, denying thousands of innocent users Internet access.
> The number of hours I have wasted over the past four years chasing
> down hackers and mail bombers has been a real pain. I have ZERO
> tolerance for this behavior.
>
> If someone mail bombs my site, I will do everything in my power to
> track them down and have them put in jail. Mail bombers are criminals.
> If you are mail bombed and have the mail logs, here is a good place
> to start in your efforts to prosecute the bastards: The FBI Computer
> Crime Squad in Washington, DC -- 202-324-9164 -- ask for Rich Ress.
> If the mail bombing is continuous, you can get a court order to
> have the FBI seize their equipment in a few hours. You may want to
> to to the federal prosecutor in your jurisdiction too.
>
> If you provide access to military bases, you are in an even better
> position to nail these folks. And be sure to file civil suit against
> them too. If they respond to the suit, you can get them to spend
> thousands of dollars in their civil defense (not to mention their
> criminal defense). If they don't respond, you can file liens on
> everything they own. I also find it useful to dispatch a press
> release in the home town of the hackers, identifying them and the
> details of the crime and its investigation. Call the TV stations
> in their area too -- the local news loves to report on high-tech
> crime.
>
> In the event the hackers are international, you can filter their
> IP addresses and notify their upstream providers that the filters
> will remain in effect until they can provide assuarance that the
> threat has been eliminated.
>
> As a community, we need to slam hackers as hard as we possibly
> can. As individual companies, we have very little to fight them
> outside of the means listed above. But collectively, we could
> black list rogue sites using IP filtering. I think that hackers
> would consider things twice if they knew they were about to lose
> connectivity to half the world because of their actions. I am
> interested in what the other folks think about this too. The
> time for complacency on this issue is over.
>
> Dave Stoddard
> US Net Incorporated
> 301-572-5926
> dgs at us.net
>
More information about the NANOG
mailing list