[52113] in North American Network Operators' Group
Re: Inter-ISP/Telco/X.25 security procedures?
daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Mon Sep 16 11:39:07 2002
To: Sean Donelan <sean@donelan.com>
Cc: nanog@merit.edu
In-Reply-To: Your message of "Mon, 16 Sep 2002 11:24:35 EDT."
<Pine.GSO.4.40.0209161118410.7705-100000@clifden.donelan.com>
From: Valdis.Kletnieks@vt.edu
Date: Mon, 16 Sep 2002 11:38:15 -0400
Errors-To: owner-nanog-outgoing@merit.edu
--==_Exmh_-1900364846P
Content-Type: text/plain; charset=us-ascii
On Mon, 16 Sep 2002 11:24:35 EDT, Sean Donelan <sean@donelan.com> said:
> Please see Clifford Stoll's book The Cuckoo's Egg for a description
> of tracking an intruder across various PSTN, PSDN and Internet providers.
>
> I haven't seen a better description of the process.
It's sad we've not gotten any better at it in the 15 years since then.
--==_Exmh_-1900364846P
Content-Type: application/pgp-signature
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
Comment: Exmh version 2.5 07/13/2001
iD8DBQE9hfrncC3lWbTT17ARAlpMAJ9yvLED4M+MgpbWyG/MN67IC1PQqgCeO1Wr
4F1P75DHuHPlMBQ6eHTvazc=
=khDb
-----END PGP SIGNATURE-----
--==_Exmh_-1900364846P--