[52125] in North American Network Operators' Group
Re: Inter-ISP/Telco/X.25 security procedures?
daemon@ATHENA.MIT.EDU (Sean Donelan)
Mon Sep 16 13:25:12 2002
Date: Mon, 16 Sep 2002 13:24:38 -0400 (EDT)
From: Sean Donelan <sean@donelan.com>
To: Mark Kent <mark@noc.mainstreet.net>
Cc: nanog@merit.edu
In-Reply-To: <200209161541.g8GFfbWI037093@noc.mainstreet.net>
Errors-To: owner-nanog-outgoing@merit.edu
On Mon, 16 Sep 2002, Mark Kent wrote:
> >> Please see Clifford Stoll's book The Cuckoo's Egg for a description
> >> of tracking an intruder across various PSTN, PSDN and Internet providers.
> >> I haven't seen a better description of the process.
>
> And there were, what?, three US ISPs back then?
>
> And when Stanford was getting hacked, where was BBN...
> Answer: right on the Stanford campus, in Stanford buildings!
>
> We don't have the same Internet architecture as we had
> during The Cuckoo's Egg era.
I would love to become educated on today's process. Please share
how the inter-ISP security procedures have changed.