[54065] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: HTTP proxies, was Re: Operational Issues with 69.0.0.0/8...

daemon@ATHENA.MIT.EDU (Michael Lamoureux)
Tue Dec 10 09:47:23 2002

To: Michael.Dillon@radianz.com
Cc: NANOG <nanog@merit.edu>
Reply-To: lamour@UU.NET
From: Michael Lamoureux <lamour@mail.argfrp.us.uu.net>
Date: 10 Dec 2002 09:45:39 -0500
In-Reply-To: Michael.Dillon@radianz.com's message of "Mon, 9 Dec 2002 10:17:24 +0000"
Errors-To: owner-nanog-outgoing@merit.edu


 "michael" == Michael Dillon <Michael.Dillon@radianz.com> writes:

>> How do we get software vendors (free, pay, virus) to distribute
>> software with appropriate defaults?

michael> Second step, publish a directory. I.e. detect the
michael> non-conforming devices and publish their IP addresses in an
michael> LDAP server.

Let me get this straight, you are suggesting that the way to fix the
problem that there are potentially millions of insecure machines
connected to the Internet is to *PUBLISH* the IP addresses of all of
them in an easy to parse format?  Cute.

Don't tell me...we'll be able to pull the vulnerability that got the
hosts in the list too, so we can verify that "our" machines are,
indeed, misconfigured?  ;-)


baffled,
Michael

home help back first fref pref prev next nref lref last post