[193615] in North American Network Operators' Group
Re: IoT security
daemon@ATHENA.MIT.EDU (Michael Thomas)
Tue Feb 7 19:39:19 2017
X-Original-To: nanog@nanog.org
To: nanog@nanog.org
From: Michael Thomas <mike@mtcc.com>
Date: Tue, 7 Feb 2017 14:14:03 -0800
In-Reply-To: <CAP-guGVVWQkZNSgUFrgDXx0X3+tgJM9PSaRgiY-R+mRQJsp7NA@mail.gmail.com>
Errors-To: nanog-bounces@nanog.org
On 02/07/2017 02:05 PM, William Herrin wrote:
> On Tue, Feb 7, 2017 at 3:27 PM, Randy Bush <randy@psg.com> wrote:
>>> On Tue, Feb 07, 2017 at 06:56:40AM -0500, William Herrin wrote:
>>>> Immaterial. The point is to catch vulnerable devices before they're
>>>> hacked.
>> you have a 30 second window there, maybe five minutes if you are lucky.
> Hi Randy,
>
> I'd expect a tattler kill switch to take maybe a tenth of that from
> the anycast notification when the nic comes up to the ISPs response
> that it is known to be vulnerable and should disconnect.
assuming that it wasn't conveniently factory installed, cf usb sticks.
Mike