[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1149371895.4990.49.camel@wssyg02.sygroup-int.ch>
Date: Sat Jun 3 22:58:27 2006
From: tonnerre.lombard at sygroup.ch (Tonnerre Lombard)
Subject: blocking tor is not the right way forward.
It may just be the right way backward.
Salut,
On Sat, 2006-06-03 at 16:15 -0400, John Sprocket wrote:
> i imagine a forensics person looks and sees a tor ip and thinks "okay.
> i just deadended. there's nothing i can do because this is a tor exit
> node." with a botnet, most bots can be traced back to their meeting
> point which is a little bit more useful.
The question is also whether one should actually waste one's time trying
to figure out who actually conducted the intrusion. When one of our
systems gets broken into, I spend my time figuring out what happened,
which data got corrupted, and then I fix the hole the intruder used and
rebuild the system.
There isn't much use in trying to find someone to punish for the fact
that one was running insecure software. The only legitimate thing to do
in this situation is to fix the hole and to carry on working.
If it was so easy to sue away all intruders, why would anyone ever hire
a pentester?
Anyway, I'm not sure whether this non-technical implication of a
specific technical product should really be discussed here. It's not
exactly a vulnerability after all, while of course the vulnerability the
attacker used to bite Jason surely was one.
Wrong end, people...
Tonnerre
--
SyGroup GmbH
Tonnerre Lombard
Loesungen mit System
Tel:+41 61 333 80 33 Roeschenzerstrasse 9
Fax:+41 61 383 14 67 4153 Reinach
Web:www.sygroup.ch tonnerre.lombard@...roup.ch
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 824 bytes
Desc: This is a digitally signed message part
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060603/0f624299/attachment.bin
Powered by blists - more mailing lists