lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 17 Aug 2010 16:48:43 -0400
From: Jeffrey Walton <noloader@...il.com>
To: Michael Holstein <michael.holstein@...ohio.edu>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: CCBILL.COM Internet billing service multiple
	vulnerabilities

On Tue, Aug 17, 2010 at 11:53 AM, Michael Holstein
<michael.holstein@...ohio.edu> wrote:
>
>>  "It is very easy to reach our Information Security team at
>> security@...ill.com <mailto:security@...ill.com>."
>>
>> Please show at least 1 page where this e-mail is written !
>
> http://www.faqs.org/rfcs/rfc2142.html
>
> (but I see your point .. Microsoft --for example-- refuses to read email
> sent to such addresses and requires you answer a convoluted webform to
> do most anything).
>>From what I have read in the past, Microsoft's security team responds
to secure@...rosoft.com. Howard and Lipner state such in The Security
Development Lifecycle, p. 30; and the MSRC webpage states it responds
to over 100,000 emails to the address annually
(http://www.microsoft.com/security/msrc/).

But I do see your point - RFC 2142 was an Internet Draft in early
1997, and the Microsoft Security Response Center was set up in 1998.
It appears the email address was never reconciled.

Jeff

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ