Security Incidents mailing list archives
Re: RPAT - Realtime Proxy Abuse Triangulation
From: "Stephen J. Friedl" <steve () unixwiz net>
Date: Thu, 02 Jan 2003 13:14:48 -0800
For what it's worth in this "ethics" discussion, the machines that RPAT scanned were not open spam relays, but anonymous HTTP proxies that were being used to actively attack our site by brute-force password guessing. I don't believe that "getting lots of spam" really constitutes an "attack", but what prompted the development of RPAT very much did.
Steve -- Stephen J Friedl • Software Consultant • Tustin, CA • +1 714 544-6561 www.unixwiz.net • I speak for me only • KA8CMY • steve () unixwiz net ---------------------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service.For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
Current thread:
- Re: RPAT - Realtime Proxy Abuse Triangulation tcleary2 (Jan 02)
- Re: RPAT - Realtime Proxy Abuse Triangulation Stephen J. Friedl (Jan 02)
- <Possible follow-ups>
- Re: RPAT - Realtime Proxy Abuse Triangulation Stephen P. Berry (Jan 02)