Computer Chess Club Archives


Search

Terms

Messages

Subject: Re: Vulnerability of Internet Chess Software

Author: Bob Durrett

Date: 06:43:35 02/12/03

Go up one level in this thread


On February 11, 2003 at 22:53:47, Robert Hyatt wrote:

>On February 11, 2003 at 17:42:53, Russell Reagan wrote:
>
>>On February 11, 2003 at 15:29:57, Robert Hyatt wrote:
>>
>>>The internet is a hostile place, but it will get better.  One long-overdue
>>>change is the elimination of _all_ anonymous activities, from anonymous
>>>remailers, to allowing someone to send a packet that doesn't have them as the
>>>return address, etc.
>>>
>>>It will eventually be fixed.  IPV6 is one approach that is picking up steam.
>>
>>So eventually are we going to have to register with the government if we want to
>>be on the net, or run a server, or play chess, etc.? Anyone can setup a mail
>>server and mail anonymously.
>
>
>
>No.  You are missing the point.  You can _still_ set up a server.  With
>a registered IP address.  And you can send as much email as you want, but
>it _will_ have your ip address as the return point.  And _any_ packet you
>send will have to have your ip address as the return address, not some
>bogus address as is used in most internet attacks.  This means that you can't
>send packets that you claim originate somewhere else.  Not that we could stop
>you from trying, but we simply turn on a simple check (in linux) to make sure
>that when you send me a packet, it has a return address that is "behind" you.
>
>You can still use a bogus login / user name.  But it will trace right back to
>your registered IP address, so you can't get away with any sort of spoofing,
>DOS, spamming, etc...
>
>
> >Anyone can do just about anything if they have a
>>connection.
>
>Not really.  For example, you connect a laptop inside my CIS network, and
>try to spoof, and the packets go into the toilet.  I do this in both
>directions.  Someone outside my network can't send me packets that claim to
>originate inside my network, and vice-versa.  When all internet relays do this,
>the problem goes away.
>
>
>
>>Seems like the only way to stop the rowdies is to monitor
>>everything, but then you get into people stealing other people's online
>>identities, and things quickly spiral out of control. We all know how computer
>>illiterate politicians really are, and they're going to pass some law like this
>>requiring everyone to have an identity, and then innocent people are going to
>>start going to jail, and before we know it, the world will come to an end! How's
>>that for being an alarmist? :)
>>
>>Anyway, there has to be some way to prevent such attacks. Whois servers usually
>>have some kind of rate that you must stay below to continuing doing queries. How
>>do they prevent one person from monopolizing their servers?
>
>Linux can do this.  But the problem is that the "spoofers" appear to be
>connecting from all over the world, not from one machine which would make it
>easy to block.  But with source-route checking, this won't be possible.  Many
>places are already doing it.  It will become the "norm" at some point.

Bob H., would you please elaborate on "source-route checking" and elaborate on
what it will and will not accomplish?

Bob D.



This page took 0 seconds to execute

Last modified: Thu, 15 Apr 21 08:11:13 -0700

Current Computer Chess Club Forums at Talkchess. This site by Sean Mintz.