[lug] linux firewall, popup windows spam blocking
Mr Viggy
LittleViggy at alum.manhattan.edu
Sun Jun 22 15:45:26 MDT 2003
NetBEUI is, in fact, it's own protocol. You don't need TCP/IP installed
at all, to use NetBEUI. However, NetBEUI is not routable.
NBT, or "NetBIOS on TCP/IP" is prolly what your thinking of. This is
basically Microsoft's "answer" to allow NetBEUI to be routable.
Unfortunately, I don't know if you can filter it.
Viggy
D. Stimits wrote:
> Bear Giles wrote:
>
>> On a related note, how do you send Window Messager messages?
>
>
> There are apparently multiple routes in to do this. The UPS here uses
> it, but apparently broadcast of NetBEUI or UDP, or else direct port 135,
> 137, or 139 can do this as well. Can anyone tell me if NetBEUI is truly
> its own protocol, that ipchains would distinguish differently from tcp
> and udp?
>
>>
>> Not to spam... but I think it could be a Good Thing for many of us to
>> add Window Messager acks to our services. We shouldn't just quietly
>> block suspicious activities, we should honor these people for there
>> initiative!
>
>
> This would be ideal.
>
>>
>> This won't stop "pro" attackers, of course. But it's fun to imagine
>> some 14-year-old wannabe running his illicit program, then making a mess
>> as the screen is flooded with "I see you" messages.
>
>
> I've been told that the companies that sell spam lists are now selling
> spam software to use popups to directly trespass on machines. In this
> case, www.byebyeads.com is essentially doing a criminal trespass to
> directly invade the user's machine, and paste a note that says if y ou
> pay them their software fee (extortion money), that they will stop
> attacking the machine. I call it an attack because it has caused machine
> lockup and failure multiple times in the last day or two. I call it
> criminal because they are invading a private home, not a public web
> server, causing damage, and then asking for money to stop. I notified
> them to stop, yet they persist, which means they were warned (and they
> know it is trespassing, they just think there is nothing I can do about
> it). Unlike a typical open port, I told them to stop, and their attacks
> picked up.
>
>>
>> Besides the annoyance factor, this could even address those attackers
>> attempting to turn wiretap laws against their victims when the attempt
>> to take action - the message could contain some legal-sounding noise
>> about all communications being logged and shared with third parties,
>> including law enforcement, etc. Naturally at this point it would be a
>> good idea to log that the message was actually sent, and if it was
>> received (vs. blocked) if possible.
>
>
> Actually, I sent a letter to one of our Colorado senators a while back,
> and he apparently has worked on legislation related to spam
> (pro-kill-the-spam) before I even talked to him. I think I am going to
> name these people and their tactics directly to him, and ask that it
> become an official criminal trespass to invade a port on a machine after
> being specifically requested to stop doing so. Someone else pasted a URL
> of an interesting article earlier, which mentioned that they are now
> looking to turn some spam related offenses into $25,000/day fines and
> prison sentences (exceeding a year). In any case, I don't consider
> lobotomizing the computer to be a valid cure, prisons sound better.
>
> D. Stimits, stimits AT attbi DOT com
>
>>
>> _______________________________________________
>> Web Page: http://lug.boulder.co.us
>> Mailing List: http://lists.lug.boulder.co.us/mailman/listinfo/lug
>> Join us on IRC: lug.boulder.co.us port=6667 channel=#colug
>>
>
>
> _______________________________________________
> Web Page: http://lug.boulder.co.us
> Mailing List: http://lists.lug.boulder.co.us/mailman/listinfo/lug
> Join us on IRC: lug.boulder.co.us port=6667 channel=#colug
>
> .
>
More information about the LUG
mailing list