[193617] in North American Network Operators' Group
Re: IoT security
daemon@ATHENA.MIT.EDU (William Herrin)
Tue Feb 7 20:34:19 2017
X-Original-To: nanog@nanog.org
X-Really-To: <nanog@nanog.org>
In-Reply-To: <m2lgthyce1.wl-randy@psg.com>
From: William Herrin <bill@herrin.us>
Date: Tue, 7 Feb 2017 17:05:21 -0500
To: Randy Bush <randy@psg.com>
Cc: "nanog@nanog.org" <nanog@nanog.org>, Rich Kulawiec <rsk@gsp.org>
Errors-To: nanog-bounces@nanog.org
On Tue, Feb 7, 2017 at 3:27 PM, Randy Bush <randy@psg.com> wrote:
>> On Tue, Feb 07, 2017 at 06:56:40AM -0500, William Herrin wrote:
>>> Immaterial. The point is to catch vulnerable devices before they're
>>> hacked.
>
> you have a 30 second window there, maybe five minutes if you are lucky.
Hi Randy,
I'd expect a tattler kill switch to take maybe a tenth of that from
the anycast notification when the nic comes up to the ISPs response
that it is known to be vulnerable and should disconnect.
Regards,
Bill Herrin
--
William Herrin ................ herrin@dirtside.com bill@herrin.us
Owner, Dirtside Systems ......... Web: <http://www.dirtside.com/>