lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Sat Jun  3 17:56:43 2006
From: stevenrakick at yahoo.com (Steven Rakick)
Subject: Tool Release - Tor Blocker

Here's an idea. Remove those lame ass fucking acronyms
from your signature you clueless fucking dork. 

Oh, and learn how to code you before you start posting
like you're all that. 



From: full-disclosure-bounces@...ts.grok.org.uk
[mailto:full-disclosure-bounces@...ts.grok.org.uk] On
Behalf Of Jason Areff
Sent: Saturday, June 03, 2006 10:32 AM
To: Valdis.Kletnieks@...edu
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: [Full-disclosure] Tool Release - Tor
Blocker

It is really unfortunate that most people that replied
to this feel the need to be haughty in their
responses. I was simply trying to create a tool to
give back to the community. Our servers were
comprimised by a tor user and I saw the need to do my
best to blacklist such users. If this is not your
need, then please respond to me personally with any
suggestions you may have, but do not start a public
flame war like you are attempting. 


Jason Areff
CISSP, A+, MCSE, Security+


----------
security through obscurity isnt security
----------


On 6/3/06, Valdis.Kletnieks@...edu
<Valdis.Kletnieks@...edu > wrote:
On Fri, 02 Jun 2006 23:47:38 CDT, str0ke said:
> Umm what about the new ip addresses that are added
to the tor network? 
>
>
http://serifos.eecs.harvard.edu/cgi-bin/exit.pl?sortbw=1&addr=1&textonly=1

Ahh.. there we go.  Now a wget of that every once in a
while, and a little 
bit of Perl kung-foo to build an 'addrs.h' file that
gets #include'ed and
then rebuild the module, and we're getting closer. ;)

(And don't forget to throw out any alleged exit
addresses in your own
address space, and any other addresses you really
don't want to block. 
It's embarassing when a clever hacker uses your own
security routines to
DoS you ;)




__________________________________________________
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ