[149389] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Verisign deep-hacked. For months.

daemon@ATHENA.MIT.EDU (Zaid Ali)
Thu Feb 2 19:43:23 2012

Date: Thu, 02 Feb 2012 16:42:27 -0800
From: Zaid Ali <zaid@zaidali.com>
To: Suresh Ramasubramanian <ops.lists@gmail.com>
In-Reply-To: <CAArzuou_GeCOQwsXHza_iykuKH-S44hQWutzVeSh9JSJ2AoKFw@mail.gmail.com>
Cc: NANOG <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

That part is ambiguous at the moment since Verisign has not released
details. Symantec has bought the SSL part of the business and claim that
the SSL acquired network is not compromised. Sounds like lots of
assumptions being drawn.

Zaid

On 2/2/12 4:26 PM, "Suresh Ramasubramanian" <ops.lists@gmail.com> wrote:

>So what part of VRSN got broken into?  They do a lot more than just DNS.
>
>On Fri, Feb 3, 2012 at 5:00 AM, Zaid Ali <zaid@zaidali.com> wrote:
>>
>> VeriSign said its executives "do not believe these attacks breached the
>> servers that support our Domain Name System network,"
>>
>> "Oh my God," said Stewart Baker, former assistant secretary of the
>> Department of Homeland Security and before that the top lawyer at the
>> National Security Agency. "That could allow people to imitate almost any
>> company on the Net."
>
>
>
>-- 
>Suresh Ramasubramanian (ops.lists@gmail.com)




home help back first fref pref prev next nref lref last post