[52113] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Inter-ISP/Telco/X.25 security procedures?

daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Mon Sep 16 11:39:07 2002

To: Sean Donelan <sean@donelan.com>
Cc: nanog@merit.edu
In-Reply-To: Your message of "Mon, 16 Sep 2002 11:24:35 EDT."
             <Pine.GSO.4.40.0209161118410.7705-100000@clifden.donelan.com> 
From: Valdis.Kletnieks@vt.edu
Date: Mon, 16 Sep 2002 11:38:15 -0400
Errors-To: owner-nanog-outgoing@merit.edu


--==_Exmh_-1900364846P
Content-Type: text/plain; charset=us-ascii

On Mon, 16 Sep 2002 11:24:35 EDT, Sean Donelan <sean@donelan.com>  said:
> Please see Clifford Stoll's book The Cuckoo's Egg for a description
> of tracking an intruder across various PSTN, PSDN and Internet providers.
> 
> I haven't seen a better description of the process.

It's sad we've not gotten any better at it in the 15 years since then.
 


--==_Exmh_-1900364846P
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
Comment: Exmh version 2.5 07/13/2001

iD8DBQE9hfrncC3lWbTT17ARAlpMAJ9yvLED4M+MgpbWyG/MN67IC1PQqgCeO1Wr
4F1P75DHuHPlMBQ6eHTvazc=
=khDb
-----END PGP SIGNATURE-----

--==_Exmh_-1900364846P--

home help back first fref pref prev next nref lref last post