[144933] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: What's a reasonable attack surface? (was: Re: wet-behind-the-ears

daemon@ATHENA.MIT.EDU (Keegan Holley)
Wed Sep 21 15:13:03 2011

In-Reply-To: <13512334.2529.1316567470873.JavaMail.root@benjamin.baylink.com>
From: Keegan Holley <keegan.holley@sungard.com>
Date: Wed, 21 Sep 2011 15:11:29 -0400
To: NANOG <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

I think people tend to go overboard in the planning phases for something
like this.  I remember rumors of a certain large ISP getting along fine for
several years installing routers with a password like "getsmein".  There are
plenty of groups that publish guidelines on ISP configuration as well as a
wealth of books on the subject.  You'll just have to start out with the
basics and learn as you go.  I'm not sure you can get a magic bullet from a
mailing list though.

2011/9/20 Jay Ashworth <jra@baylink.com>

> ----- Original Message -----
> > From: "Valdis Kletnieks" <Valdis.Kletnieks@vt.edu>
>
> > As long as there is *A* failure mode? Hmm. <invents a movie-plot failure
> mode
> > involving crazed ninjas with katanas loose in a switch room at one
> provider>.
> > Yep, it's unlikely crazed ninjas will attack the switch rooms at both
> > providers.
>
> I too am a Schneier fan.  But terrorists watch movies, too.
>
> Cheers,
> -- jr 'Once is happenstance...' a
> --
> Jay R. Ashworth                  Baylink
> jra@baylink.com
> Designer                     The Things I Think                       RFC
> 2100
> Ashworth & Associates     http://baylink.pitas.com         2000 Land Rover
> DII
> St Petersburg FL USA      http://photo.imageinc.us             +1 727 647
> 1274
>
>
>

home help back first fref pref prev next nref lref last post