[193623] in North American Network Operators' Group
Re: IoT security
daemon@ATHENA.MIT.EDU (valdis.kletnieks@vt.edu)
Thu Feb 9 03:29:19 2017
X-Original-To: nanog@nanog.org
From: valdis.kletnieks@vt.edu
X-Google-Original-From: Valdis.Kletnieks@vt.edu
To: clinton mielke <clinton.mielke@gmail.com>
In-Reply-To: <CANq0y_0ZOx4fY7OSme5_CGPTTMOdkKmWwzXBOwBeha4OL+4mFQ@mail.gmail.com>
Date: Thu, 09 Feb 2017 01:00:02 -0500
Cc: nanog@nanog.org
Errors-To: nanog-bounces@nanog.org
--==_Exmh_1486620001_2886P
Content-Type: text/plain; charset=us-ascii
On Wed, 08 Feb 2017 21:04:07 -0800, clinton mielke said:
> As an ISP, scan your customers netrange, and notify customers with known
> vulnerable devices. With regards to the current Mirai threat, theres only a
> handful of devices that are the most critical importance. IE, biggest
> fraction of the infected host pie.
Do enough of these poorly designed devices punch themselves a UPNP hole
in the CPE firewall and make themselves detectable, to make this a viable
approach?
--==_Exmh_1486620001_2886P
Content-Type: application/pgp-signature
-----BEGIN PGP SIGNATURE-----
Comment: Exmh version 2.5 07/13/2001
iQEVAwUBWJwFYY0DS38y7CIcAQKVPgf/SH0TENuTb1uoWOwofuA5uwHAnExeh1xc
2kaXJaQ5SKbLNQM5STGJo7wexPFOVSaESnx4yXtwzqAlDcIoW/PyxVXi1XuPvtRk
zHpyUwXM9ntE93pVpn0JgGQOZylNo6HE9luxIXDJ8WXNb1sUy53gu42QK36Jk6Sx
QMhnj5KyTrusskUDYURNnlWPIJF0aVpcg9d63GfyhsxWLgRwK2afNzB/sOt81LeW
maVV7ZQuxM85xDbgqEfD70dtbMcmAWXM8PSZ4KfK7pJhVhqx4oK4dOsMCp8GoZLB
iwehbqF6UQtouJe/ToENWoW465u2jgIX1t1VezuyrlVXQmLrkp4h2w==
=awmB
-----END PGP SIGNATURE-----
--==_Exmh_1486620001_2886P--