[77809] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: IRC Bot list (cross posting)

daemon@ATHENA.MIT.EDU (william(at)elan.net)
Tue Feb 8 23:50:29 2005

Date: Tue, 8 Feb 2005 20:57:59 -0800 (PST)
From: "william(at)elan.net" <william@elan.net>
To: Bill Nash <billn@billn.net>
Cc: nanog@nanog.org
In-Reply-To: <Pine.LNX.4.61.0502082135340.2114@bacchus.billn.net>
Errors-To: owner-nanog-outgoing@merit.edu



On Tue, 8 Feb 2005, Bill Nash wrote:
> 
> You don't mass an army if you're not about to use it. 

3000 is no longer that large, maybe a brigade but not an "army"...

> This situation can  (very quickly) have operational relevance. 

If every botnet investigation is brought up at nanog, the list itself will 
loose relevence.

> Bringing  it to light to a wider  forum than special interest groups is 
> a good idea.

Appropriate people already saw the list and will take care. There are also
special tools available that will take list of ip addresses and notify 
appropriate networks, doing it manually and then letting all list know 
(epsecially nanog which has not only whitehats but number of blackhats)
is in itself a security issue as has already been pointed out.

---
William Leibzon
Elan Networks
william@elan.net


home help back first fref pref prev next nref lref last post