more Internic nightmare

Jay R. Ashworth jra at scfn.thpl.lib.fl.us
Wed Mar 24 01:46:04 UTC 1999


On Tue, Mar 23, 1999 at 04:59:45PM -0800, Derek Balling wrote:
> Unless you're planning on enforcing passwords for contacts then I don't
> think it'd take all that much to SIMULATE a client, choosing random people
> from the whois database, and blaming other people for your whois queries.
> An even more intelligent system would use the tech contact for the LAST
> result as the requestor for the current one so that there would be no
> visible pattern.
> 
> The source code for the client is going to be out there, so people will
> figure out how it works, reverse engineer a version that uses a forged,
> but existing, tech contact, and go on with their day.

Can we say "PGP"?  C'mon, folks; the engineering solutions to these
problems are _trivial_.  What is _not_ trivial is working the political
process to bring pressure to bear on Netsol to make them _possible_.

Cheers,
-- jra
-- 
Jay R. Ashworth                                                jra at baylink.com
Member of the Technical Staff     Buy copies of The New Hackers Dictionary.
The Suncoast Freenet            Give them to all your friends.
Tampa Bay, Florida     http://www.ccil.org/jargon/             +1 813 790 7592




More information about the NANOG mailing list