[52116] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Inter-ISP/Telco/X.25 security procedures?

daemon@ATHENA.MIT.EDU (Rajesh Talpade)
Mon Sep 16 11:53:06 2002

From: Rajesh Talpade <rrt@research.telcordia.com>
To: mark@noc.mainstreet.net (Mark Kent)
Date: Mon, 16 Sep 2002 11:51:45 -0400 (EDT)
Cc: sean@donelan.com, nanog@merit.edu
In-Reply-To: <200209161541.g8GFfbWI037093@noc.mainstreet.net> from "Mark Kent" at Sep 16, 2002 08:41:37 AM
Errors-To: owner-nanog-outgoing@merit.edu


> >> Please see Clifford Stoll's book The Cuckoo's Egg for a description
> >> of tracking an intruder across various PSTN, PSDN and Internet providers.
> >> I haven't seen a better description of the process.
> 
> And there were, what?, three US ISPs back then?
> 
> And when Stanford was getting hacked, where was BBN...
> Answer: right on the Stanford campus, in Stanford buildings!
> 
> We don't have the same Internet architecture as we had
> during The Cuckoo's Egg era.
> 


I was sort of wondering how long it would take for someone to send this
kind of a response.

I suppose my question should have included the phrase "current solutions" 
or equivalent.

Still hoping for some good answers....

Thanks.
Rajesh.



home help back first fref pref prev next nref lref last post