nanog mailing list archives

Re: more Internic nightmare


From: "Jay R. Ashworth" <jra () scfn thpl lib fl us>
Date: Tue, 23 Mar 1999 20:46:04 -0500


On Tue, Mar 23, 1999 at 04:59:45PM -0800, Derek Balling wrote:
Unless you're planning on enforcing passwords for contacts then I don't
think it'd take all that much to SIMULATE a client, choosing random people
from the whois database, and blaming other people for your whois queries.
An even more intelligent system would use the tech contact for the LAST
result as the requestor for the current one so that there would be no
visible pattern.

The source code for the client is going to be out there, so people will
figure out how it works, reverse engineer a version that uses a forged,
but existing, tech contact, and go on with their day.

Can we say "PGP"?  C'mon, folks; the engineering solutions to these
problems are _trivial_.  What is _not_ trivial is working the political
process to bring pressure to bear on Netsol to make them _possible_.

Cheers,
-- jra
-- 
Jay R. Ashworth                                                jra () baylink com
Member of the Technical Staff     Buy copies of The New Hackers Dictionary.
The Suncoast Freenet            Give them to all your friends.
Tampa Bay, Florida     http://www.ccil.org/jargon/             +1 813 790 7592



Current thread: