[193623] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: IoT security

daemon@ATHENA.MIT.EDU (valdis.kletnieks@vt.edu)
Thu Feb 9 03:29:19 2017

X-Original-To: nanog@nanog.org
From: valdis.kletnieks@vt.edu
X-Google-Original-From: Valdis.Kletnieks@vt.edu
To: clinton mielke <clinton.mielke@gmail.com>
In-Reply-To: <CANq0y_0ZOx4fY7OSme5_CGPTTMOdkKmWwzXBOwBeha4OL+4mFQ@mail.gmail.com>
Date: Thu, 09 Feb 2017 01:00:02 -0500
Cc: nanog@nanog.org
Errors-To: nanog-bounces@nanog.org

--==_Exmh_1486620001_2886P
Content-Type: text/plain; charset=us-ascii

On Wed, 08 Feb 2017 21:04:07 -0800, clinton mielke said:

> As an ISP, scan your customers netrange, and notify customers with known
> vulnerable devices. With regards to the current Mirai threat, theres only a
> handful of devices that are the most critical importance. IE, biggest
> fraction of the infected host pie.

Do enough of these poorly designed devices punch themselves a UPNP hole
in the CPE firewall and make themselves detectable, to make this a viable
approach?

--==_Exmh_1486620001_2886P
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Comment: Exmh version 2.5 07/13/2001

iQEVAwUBWJwFYY0DS38y7CIcAQKVPgf/SH0TENuTb1uoWOwofuA5uwHAnExeh1xc
2kaXJaQ5SKbLNQM5STGJo7wexPFOVSaESnx4yXtwzqAlDcIoW/PyxVXi1XuPvtRk
zHpyUwXM9ntE93pVpn0JgGQOZylNo6HE9luxIXDJ8WXNb1sUy53gu42QK36Jk6Sx
QMhnj5KyTrusskUDYURNnlWPIJF0aVpcg9d63GfyhsxWLgRwK2afNzB/sOt81LeW
maVV7ZQuxM85xDbgqEfD70dtbMcmAWXM8PSZ4KfK7pJhVhqx4oK4dOsMCp8GoZLB
iwehbqF6UQtouJe/ToENWoW465u2jgIX1t1VezuyrlVXQmLrkp4h2w==
=awmB
-----END PGP SIGNATURE-----

--==_Exmh_1486620001_2886P--

home help back first fref pref prev next nref lref last post