[61128] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Sobigf + BGP

daemon@ATHENA.MIT.EDU (Stephen J. Wilcox)
Sun Aug 24 06:52:30 2003

Date: Sun, 24 Aug 2003 11:51:48 +0100 (BST)
From: "Stephen J. Wilcox" <steve@telecomplete.co.uk>
To: guy <guy@602.org>
Cc: routesec@engineer.com, <nanog@nanog.org>
In-Reply-To: <Pine.BSO.4.44.0308231614430.31914-100000@602.org>
Errors-To: owner-nanog-outgoing@merit.edu


On Sat, 23 Aug 2003, guy wrote:

> 
> > 'vuln'dev', and besides I wouldn't think that any
> > one here would do something malicious with any idea
> > that actually worked for the worse.
> 
> Assuming that everyone subscribed to the list has the best of intentions,
> what about people that can scan the publicly accessible archives? Or even
> the search engines that have nanog archives indexed? There's nothing wrong
> with kicking ideas like this around with the intention of coming up with a
> strategy on how to combat them, but perhaps a more discreet forum would be
> appropriate?

There are a lot more people subscribed to the list than you actually see
posting, I'm sure many of them are representatives of the l33t h4x0r community..

My impression of most of these people is that they are very clever, and unless
you post something here that is really brilliant thinking the chances are these
guys can come up with most of the ideas themselves.

Steve


home help back first fref pref prev next nref lref last post