funsec mailing list archives

Re: idea


From: RandallM <randallm () fidmail com>
Date: Thu, 1 Jan 2009 02:10:56 -0600

Ok, great stuff so far. Is akami the answer. How can that be done. How can
we use that and how can it be tested.



On Thu, Jan 1, 2009 at 12:11 AM, Matt Jonkman <jonkman () jonkmans com> wrote:

I had a similar idea a few years ago (I may have been drinking at the
time too).

Mine was more oriented to when we were taking a ddos every week as
security projects. I proposed all of us poor open source security
projects band together and do an akami type hosting. Everyone hosted
everyone that was part of the setup, and we used dns to spread the load.

But alas, ddos isn't the problem it used to be. Probably good we didn't
go through the effort to make it happen.

Matt

Paul Ferguson wrote:
It's called Akamai. :-)

- ferg

On Wed, Dec 31, 2008 at 7:58 PM, RandallM <randallm () fidmail com> wrote:

ok, I am drinking, after all it is the NYE celebration. But, I had this
idea pop in. Remember, it is a "first thought idea". That means I am in
need of input to brainstorm with me on it. Here is the initial thought:

When fixing infected computers I find that:
1. most people don't have programs installed for preventive much less
combative
2. depending on the infection one cannot download programs or go to
"helpful" sites to use.

malware sites often rotate IP or DNS in order to "hide".

Thought:
Why can't we using the same type of process provide access to programs
and or sites in the same manor so that the malware infections cannot
"block" because the sites are not permanant?

Symantec is and always will be "www.symantec.com", as with other sites.
they are blocked by malware infections (in various ways that I would
love
to
understand more). If there were "server" around the globe open with
online scanners and tools that rotated with DNS and or IP addressing the
malware could not block it.

Can this be done with a revolving network of servers from volunteers?

Make sense or have I already drank too much?

--
been great, thanks
Big R

_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.





--
--------------------------------------------
Matthew Jonkman
Emerging Threats
Phone 765-429-0398
Fax 312-264-0205
http://www.emergingthreats.net
--------------------------------------------

PGP: http://www.jonkmans.com/mattjonkman.asc





-- 
been great, thanks
Big R
_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

Current thread: