[124029] in North American Network Operators' Group
Re: NSP-SEC
daemon@ATHENA.MIT.EDU (Hank Nussbacher)
Sat Mar 20 14:30:36 2010
Date: Sat, 20 Mar 2010 20:30:01 +0200 (IST)
From: Hank Nussbacher <hank@efes.iucc.ac.il>
To: William Pitcock <nenolod@systeminplace.net>
In-Reply-To: <1269006269.1220.135.camel@petrie>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
On Fri, 19 Mar 2010, William Pitcock wrote:
> On Fri, 2010-03-19 at 08:31 -0500, John Kristoff wrote:
>> An ongoing area of work is to build better closed,
>> trusted communities without leaks.
>
> Have you ever considered that public transparency might not be a bad
> thing? This seems to be the plight of many security people, that they
> have to be 100% secretive in everything they do, which is total
> bullshit.
>
> Just saying.
How exactly would being transparent for the following help Internet
security:
"I am seeing a new malware infection vector via port 91714 coming from the
IP range of 32.0.0.0/8 that installs a rootkit after visiting the web page
http://www.trythisoutnow.com/. In addition, it has credit card and pswd
stealing capabilities and sends the details to a maildrop at
trythisoutnow@gmail.com"
The only upside of being transparent is alerting the miscreant to change
the vector and maildrop.
Regards,
Hank