[181191] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: OPM Data Breach - Whitehouse Petition - Help Wanted

daemon@ATHENA.MIT.EDU (William Herrin)
Thu Jun 18 12:59:14 2015

X-Original-To: nanog@nanog.org
X-Really-To: <nanog@nanog.org>
In-Reply-To: <29116.1434588870@server1.tristatelogic.com>
From: William Herrin <bill@herrin.us>
Date: Thu, 18 Jun 2015 12:58:44 -0400
To: "Ronald F. Guilmette" <rfg@tristatelogic.com>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

On Wed, Jun 17, 2015 at 8:54 PM, Ronald F. Guilmette
<rfg@tristatelogic.com> wrote:
> My apologies in advance to any here who might feel that this is off
> topic... I don't personally believe that it is.  Frankly, I don't
> know of that many mailing lists where the subscribers are likely to
> care as much about network security (and/or the lack thereof) as the
> membership of this list does.
> By now, most of you will have read about the massive federal data breach
> at the U.S. Government's Office of Personnel Management (OPM), and also
> the fact that (by OPM's own preliminary estimates) this massive data breach
> affects at least four million federal government employees...

Hi Ronald,

I'm of the opinion that the whole thing is your fault. The security
inadequacies of your network are obviously what allowed the Chinese
Super Hackers to break in with their false BGP advertisements and
source address spoofing.

Well, maybe not, but just imagine if that was true: your post would be
on-topic for the mailing list!

Regards,
Bill Herrin


-- 
William Herrin ................ herrin@dirtside.com  bill@herrin.us
Owner, Dirtside Systems ......... Web: <http://www.dirtside.com/>

home help back first fref pref prev next nref lref last post