[124029] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: NSP-SEC

daemon@ATHENA.MIT.EDU (Hank Nussbacher)
Sat Mar 20 14:30:36 2010

Date: Sat, 20 Mar 2010 20:30:01 +0200 (IST)
From: Hank Nussbacher <hank@efes.iucc.ac.il>
To: William Pitcock <nenolod@systeminplace.net>
In-Reply-To: <1269006269.1220.135.camel@petrie>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Fri, 19 Mar 2010, William Pitcock wrote:

> On Fri, 2010-03-19 at 08:31 -0500, John Kristoff wrote:
>> An ongoing area of work is to build better closed,
>> trusted communities without leaks.
>
> Have you ever considered that public transparency might not be a bad
> thing?  This seems to be the plight of many security people, that they
> have to be 100% secretive in everything they do, which is total
> bullshit.
>
> Just saying.

How exactly would being transparent for the following help Internet 
security:

"I am seeing a new malware infection vector via port 91714 coming from the 
IP range of 32.0.0.0/8 that installs a rootkit after visiting the web page
http://www.trythisoutnow.com/.  In addition, it has credit card and pswd 
stealing capabilities and sends the details to a maildrop at 
trythisoutnow@gmail.com"

The only upside of being transparent is alerting the miscreant to change 
the vector and maildrop.

Regards,
Hank


home help back first fref pref prev next nref lref last post