[170362] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: why IPv6 isn't ready for prime time, SMTP edition

daemon@ATHENA.MIT.EDU (Lamar Owen)
Wed Mar 26 15:59:32 2014

Date: Wed, 26 Mar 2014 15:56:23 -0400
From: Lamar Owen <lowen@pari.edu>
To: NANOG list <nanog@nanog.org>
In-Reply-To: <9370.1395860387@turing-police.cc.vt.edu>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On 03/26/2014 02:59 PM, Valdis.Kletnieks@vt.edu wrote:
> You *do* realize that the OS vendor can't really do much about users 
> who click on stuff they shouldn't, or reply to phishing emails, or 
> most of the other ways people *actually* get pwned these days? Hint: 
> Microsoft *tried* to fix this with UAC. The users rioted. 
Yep, I do realize that and I do remember the UAC 'riots.'  But the OS 
vendor can make links that are clicked run in a sandbox and make said 
sandbox robust.  A user clicking on an e-mail link should not be able to 
pwn the system.  Period.

Most of the phishing e-mails I've sent don't have a valid reply-to, 
from, or return-path; replying to them is effectively impossible, and 
the linked/attached/inlined payload is the attack vector.


home help back first fref pref prev next nref lref last post