1997-05-08 - Re: Spam Update/Cyber Promo attacked

Header Data

From: Bill Frantz <frantz@netcom.com>
To: Robert Hettinga <cypherpunks@toad.com
Message Hash: e503228f1f0a8204df1ee0db1b7fa9a699cf829a395ab506f3aafb9593990e4d
Message ID: <v03007802af96f9a0519a@[]>
Reply To: <v03020902af966ed17bf4@[]>
UTC Datetime: 1997-05-08 04:34:18 UTC
Raw Date: Thu, 8 May 1997 12:34:18 +0800

Raw message

From: Bill Frantz <frantz@netcom.com>
Date: Thu, 8 May 1997 12:34:18 +0800
To: Robert Hettinga <cypherpunks@toad.com
Subject: Re: Spam Update/Cyber Promo attacked
In-Reply-To: <v03020902af966ed17bf4@[]>
Message-ID: <v03007802af96f9a0519a@[]>
MIME-Version: 1.0
Content-Type: text/plain

At 10:39 AM -0700 5/7/97, Robert Hettinga forwarded:
>The hackers have devised
>a system which sends millions of random "arp" requests to a router, which
>can disable the whole network for hours. This type of attack has never
>occurred before.

It is quite obvious to anyone who cares to give it even a moment's thought
that the currently installed Internet Protocols are still in the age of
cooperative communicators.  While some work, e.g. DNSSEC, has addressed
part of this problem, the bulk of it remains.

Now, if we could only go back 30 years and give C a reasonable string
model, we might be able to eliminate 50% of the known holes in Unix

Bill Frantz       | God could make the world   | Periwinkle -- Consulting
(408)356-8506     | in six days because he did | 16345 Englewood Ave.
frantz@netcom.com | not have an installed base.| Los Gatos, CA 95032, USA