[147725] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: what if...?

daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Tue Dec 20 12:33:11 2011

To: bmanning@vacation.karoshi.com
In-Reply-To: Your message of "Tue, 20 Dec 2011 17:16:06 GMT."
 <20111220171606.GA22143@vacation.karoshi.com>
From: Valdis.Kletnieks@vt.edu
Date: Tue, 20 Dec 2011 17:31:02 +0000
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

--==_Exmh_1324402262_2910P
Content-Type: text/plain; charset=us-ascii

On Tue, 20 Dec 2011 17:16:06 GMT, bmanning@vacation.karoshi.com said:

> 	the one difference is that ISC will be shipping RPZ enabled code v.
> 	the blackhat having to hack the machine and modify the configuration.

EIther way, the blackhat still has to hack the machine and modify the config.
The only difference is what config change they make.

--==_Exmh_1324402262_2910P
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Exmh version 2.5 07/13/2001

iD8DBQFO8MZWcC3lWbTT17ARAlMGAKDffrKC8GKcjHF071Ka9Z84n/flcgCfamb9
uzzenv0JaBJoFHjsvKV5JCo=
=XcTO
-----END PGP SIGNATURE-----

--==_Exmh_1324402262_2910P--



home help back first fref pref prev next nref lref last post