Security Incidents mailing list archives

Re: ano () ano com ftpd dip.t-dialin.net


From: "Ralf G. R. Bergs" <rabe () RWTH-Aachen DE>
Date: Thu, 07 Nov 2002 08:54:47 +0100

On Wed, 06 Nov 2002 16:50:13 -0500, Owen McCusker wrote:

[...]
Has anyone else seen this type of activity from dip.t-dialin.net
or dipsters for short. ;-)?

Sure, I see it all day.

What they're trying to achieve is determine whether you have an "open" FTP 
server which allows them to store "warez" and download them again.

A simple countermeasure against this is to give files that are uploaded to your 
"incoming" directory permissions so that anonymous users can't access them 
anymore. You can even prohibit them from reading the directory's contents so 
that they don't even see which files are stored inside the directory.


-- 
   L I N U X       .~.
  The  Choice      /V\
   of a  GNU      /( )\
  Generation      ^^-^^



----------------------------------------------------------------------------
This list is provided by the SecurityFocus ARIS analyzer service.
For more information on this free incident handling, management 
and tracking system please see: http://aris.securityfocus.com


Current thread: