[102422] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: IBM report reviews Internet crime

daemon@ATHENA.MIT.EDU (Tony Finch)
Wed Feb 13 07:11:12 2008

Date: Wed, 13 Feb 2008 12:10:13 +0000
From: Tony Finch <dot@dotat.at>
To: Owen DeLong <owen@delong.com>
cc: michael.dillon@bt.com, nanog@nanog.org
In-Reply-To: <7C2098E2-1A14-451D-8CC5-6C58D3C214F6@delong.com>
Errors-To: owner-nanog@merit.edu


> > * Of all the vulnerabilities disclosed in 2007, only 50 percent can be
> > corrected through vendor patches. [suggests that ISPs need to be
> > proactive about detecting and blocking compromised machines]
>
> I think this conclusion assumes a number of facts not in evidence.
>
> If the vulnerability cannot be corrected through a vendor patch, then,
> one has to wonder what, exactly the vulnerability is. If it is social
> engineering, then, I don't believe that ISP proactivity can really
> address the issue.

It can if the kind of proactivity they mean is taking down phishing web
sites. (Though I wouldn't describe a phishing site as a vulnerability.)

Tony.
-- 
f.a.n.finch  <dot@dotat.at>  http://dotat.at/
FISHER GERMAN BIGHT: NORTHWEST VEERING NORTHEAST 3 OR 4, BUT 5 OR 6 IN NORTH
FISHER. SLIGHT OR MODERATE, OCCASIONALLY ROUGH LATER IN FISHER. FOG PATCHES
THEN FAIR. MODERATE OR GOOD, OCCASIONALLY VERY POOR.

home help back first fref pref prev next nref lref last post