TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Mike Nice
from: Geo.
date: 2002-10-27 10:08:28
subject: Re: Messenger SPAM

From: "Geo." 

Lets say I'm at 216.144.26.35, how are you going to stop me from spoofing
at 216.144.26.40 or .253? Are ISP's now supposed to add in filters to
customer routers or are we expected to have such large routers of our own
that we can have acl's with thousands of entries?

I absolutely refuse to block netbios traffic as I happen to USE netbios to
do things like remote backups etc..

The net send problem is a problem that end users have to deal with, it's no
different than a port 25 relay email.

If you don't like popup spams, then turn the messenger service off or
secure it just like you had to do with relay... It's really simple to
secure a W2K machine, just turn null sessions off and make sure the guest
account is disabled.

Geo.

"Mike Nice"  wrote in message
news:k0unru8dro6a67kllasafiuinffd17a35l{at}4ax.com...
> On Sat, 26 Oct 2002 17:35:40 -0400, "Geo."
 wrote:
>
> >Use a firewall, it will log where the connect attempts on ports 135, 137,
> >139, and 445 are coming from. They come from all over the net.
>
>    Since Net Send Spam uses UDP, the tools almost certainly forge the
source IP, making it useless.
> All the more reason for every border router to prohibit source network
spoofing.  AT&T is starting
> to do this for all their downstream connections now.

--- BBBS/NT v4.01 Flag-4
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45)
SEEN-BY: 3/2 10 106/1 120/544 123/500 379/1 633/260 267 270 285 774/0 605
SEEN-BY: 2432/200
@PATH: 379/1 106/1 123/500 774/605 633/260 285

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.