[69801] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: TCP vulnerability

daemon@ATHENA.MIT.EDU (Joe Abley)
Tue Apr 20 14:15:15 2004

In-Reply-To: <200404201759.i3KHxqJ75425@merlot.juniper.net>
Cc: grant@tnarg.org, nanog@merit.edu
From: Joe Abley <jabley@isc.org>
Date: Tue, 20 Apr 2004 14:10:06 -0400
To: Aviva Garrett <aviva@juniper.net>
Errors-To: owner-nanog-outgoing@merit.edu



On 20 Apr 2004, at 13:59, Aviva Garrett wrote:

> In message <1386.64.235.224.55.1082482608.squirrel@mail.mzima.net>you 
> write:
>>
>> Since no one's mentioned it yet, apparently there was a change in 
>> plans.
>> It was just released a day early.
>
> This is because of the story at http://www.washingtonpost.com/, in the
> Technology section.

I suggest an extensive late-night BOF in San Francisco in the bar to 
discuss the mechanics of adding MD5 keys to all your sessions in 48 
hours. Evidence of RSI and eyesight failure will be mandatory, along 
with battle stories about rt2 mail-loops and rancid-scraping awk 
scripts gone mad.


Joe


home help back first fref pref prev next nref lref last post