CZFree.Net Home Page Diskuzní Fóra CZFree.Net Archív Často Kladených Otázek Registrace Nových Členů Archív Odkazů Seznam Členů Fóra CZFree.Net Czech Node Map hosted @CZFree.net CZFree.Net WIKI
CZFree Network Portal vzkazy | ovládání | pokročilé hledání   
 

Odpovědět k Tématu 
CZFree.Net forum: Wireless community network CZFree.Net > Fórum > Síť > warspamming
12
Autor
Téma  < Předchozí Téma   Další Téma >
oook
Senior Member

Registrován: 28.06.2002
Příspěvků: 2325

Re: direct, indirect spamming & threats Příspěvek č. 17 

Old Post 26.09.2002 v 13:44
oook je offline   Click Here to See the Profile for oook   Find more posts by oook   Click here to Send oook a Private Message       Reference obchodniku Upravit/Smazat Příspěvek   Odpovědět s Citací  
oook
Senior Member

Registrován: 28.06.2002
Příspěvků: 2325

Re: Re: direct, indirect spamming & threats Příspěvek č. 18 

Old Post 26.09.2002 v 13:48
oook je offline   Click Here to See the Profile for oook   Find more posts by oook   Click here to Send oook a Private Message       Reference obchodniku Upravit/Smazat Příspěvek   Odpovědět s Citací  
lada
Team Leader

Registrován: 08.05.2002
Příspěvků: 2856

Team Member: MOD

restraining or not Příspěvek č. 19 

I agree with oook, ISPs should have their own rules to filter out spam - I suggest some cleverly chosen restraints are better than big brother style. It's better to make it not affordable to abuse internet gateways than to thread users and check their activities.

This is more general - I have had a little debate over network self monitoring and curing - what if some users start sending away floods of packets, for example remotely to local broadcast addresses? There should be some mechanism (default firewall rule) to filter it out. Most A class subnets on the internet have it. Think of a saboteur sending broadcast IP packets with another one's broadcast address (faked source address). Destination net (upto 254 in our case) receive datagram with some other subnet's broadcast address. All 254 stations react to it and send a icmp packet out (for example destination port unreachable etc). This creates flood of packets from here to there and back - initiated by only one faked packet.

Simple linux firewall rule filters out local broadcast IP datagrams sent from outside local network, thereby disallowing this type of poisonous flooding.

We have the same problems internet has. Not only smtp.

Regarding that guy with prepaid card, police can of course listen to his conversations, find out whom he calls, track his movement without court order in this country. Telephone conversations are being recorded and accessible for our police mafia for as long as a month - it costs a lot to keep it longer than this.

Freenet should be about freedom, not recording people's conversations, tracking their movement, their family. I suggested that all AP's have ipsec or some other form of encryption for its local users (that do not have an ipsec tcpip stack). Compression could work with it very well, unloading up to 50% of traffic. But it takes resources - Pentium II would be necessary.

The best would be of course end to end encryption, which (I hope) will be dealt with.



Old Post 26.09.2002 v 22:30
lada je offline   Click Here to See the Profile for lada   Find more posts by lada   Click here to Send lada a Private Message     Visit lada's homepage!   Reference obchodniku Upravit/Smazat Příspěvek   Odpovědět s Citací  
Veškerý čas je GMT. Aktuální čas: 18:38.  Předcházející Téma   Další Téma
Odpovědět k Tématu
12  
Zformátovat pro Tisk | Stáhnout Téma do Palma | Poslat Téma E-mailem | Odebírat tuto Diskuzi

Search this Thread:

 

CZFree.NET | Copyright ©MMII - MMXIV CZFree.NET | Kontaktujte Nás
Powered by: vBulletin - Copyright ©MM - MMII Jelsoft Enterprises Limited.
Founder: Deu / original scripting by: carlos (All High Seeds) / Node Monitor by: 8an
Additional Portal & Node Monitor Development by: oto, Zajsoft, Danny, Netdave
Hosted by: NFX.cz / FreeTel.cz