nanog mailing list archives

RE: FBI / NIPC released a DDoSD detection tool?


From: Ryan Tucker <rtucker () netacc net>
Date: Thu, 10 Feb 2000 13:26:36 -0500 (EST)


Especially considering it ended up sucking all of the memory on my machine
before dying with a bus error and taking half of the processes with it.

Oh, the irony ;-)  -rt

-- 
Ryan Tucker <rtucker () netacc net>                 Unix Systems Administrator
NetAccess, Inc.                                      Phone: +1 716 756-5596
3495 Winton Place, Building E, Suite 265, Rochester NY 14623 www.netacc.net


On Thu, 10 Feb 2000, Roeland M.J. Meyer wrote:


I don't care where it purports to be from, for this kind of code, I will not
trust something [to not be a trojan] that I can not compile myself. This
policy applies to SSH, SSL, and other security related code. I am sure that
I am not the only one with this policy.

-----Original Message-----
From: owner-nanog () merit edu [mailto:owner-nanog () merit edu]On Behalf Of
Rodney Caston
Sent: Thursday, February 10, 2000 8:45 AM
To: nanog () merit edu
Subject: FBI / NIPC released a DDoSD detection tool?



I'm not sure if this is news or not, but looking at
http://www.fbi.gov/nipc/trinoo.htm - it seems the NIPC has released
binaries, (no source code, the jerks), for tools to detect if a box has
trin00, tribal flood net, tfn2k and some other DDoSD's on it.

So far they have a sparc solaris, intel solaris, and x86 linux binary for
download. While I am shocked to see a government agency writing
potentially usefull code so quickly, I am dissappointed they didn't
release their source code so it can be ported to say.. FreeBSD? .. AIX ..
HP/UX ...  and so on...


Rodney Caston
Southwestern Bell
Internet Services









Current thread: