[48753] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: OSI's final revenge

daemon@ATHENA.MIT.EDU (Jim Mercer)
Sat Jun 15 03:01:29 2002

Date: Sat, 15 Jun 2002 03:00:14 -0400
From: Jim Mercer <jim@reptiles.org>
To: Sean Donelan <sean@donelan.com>
Cc: nanog@merit.edu
In-Reply-To: <Pine.GSO.4.40.0206150054290.24064-100000@clifden.donelan.com>; from sean@donelan.com on Sat, Jun 15, 2002 at 02:15:47AM -0400
Errors-To: owner-nanog-outgoing@merit.edu


On Sat, Jun 15, 2002 at 02:15:47AM -0400, Sean Donelan wrote:
> On Fri, 14 Jun 2002, Robert Mathews wrote:
> > The National Infrastructure Protection Board's
> > Debbie Weierman notes that her agency has been collaborating with experts
> > from the NSA, the Federal Computer Incident Response Center, CERT, private
> > groups, and others since March to see how widespread the ASN.1 flaw is.
> 
> I'm certain the best people are working on this, but once again Steve
> Bellovin scooped them all nearly a decade ago.

"So severe are the potential ramifications of widespread ASN.1 security
 holes, that President Bush was personally briefed on the matter..."
  -- http://online.securityfocus.com/news/474

can you say "War on Open Standards?"

yikes! same article:

"Howard Schmidt, former Microsoft security chief and newly-appointed vice
 chairman of the President's Critical Infrastructure Protection Board..."

yep, the Critical Infrastructure needs to be overseen by the same people
who brought us the Outlook Virus Launch Platform, and the Internet Information
Server/Virus Incubator.

-- 
[ Jim Mercer        jim@reptiles.org         +1 416 410-5633 ]
[          I want to live forever, or die trying.            ]

home help back first fref pref prev next nref lref last post