[52116] in North American Network Operators' Group
Re: Inter-ISP/Telco/X.25 security procedures?
daemon@ATHENA.MIT.EDU (Rajesh Talpade)
Mon Sep 16 11:53:06 2002
From: Rajesh Talpade <rrt@research.telcordia.com>
To: mark@noc.mainstreet.net (Mark Kent)
Date: Mon, 16 Sep 2002 11:51:45 -0400 (EDT)
Cc: sean@donelan.com, nanog@merit.edu
In-Reply-To: <200209161541.g8GFfbWI037093@noc.mainstreet.net> from "Mark Kent" at Sep 16, 2002 08:41:37 AM
Errors-To: owner-nanog-outgoing@merit.edu
> >> Please see Clifford Stoll's book The Cuckoo's Egg for a description
> >> of tracking an intruder across various PSTN, PSDN and Internet providers.
> >> I haven't seen a better description of the process.
>
> And there were, what?, three US ISPs back then?
>
> And when Stanford was getting hacked, where was BBN...
> Answer: right on the Stanford campus, in Stanford buildings!
>
> We don't have the same Internet architecture as we had
> during The Cuckoo's Egg era.
>
I was sort of wondering how long it would take for someone to send this
kind of a response.
I suppose my question should have included the phrase "current solutions"
or equivalent.
Still hoping for some good answers....
Thanks.
Rajesh.