lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 27 Dec 2006 03:51:27 -0800
From: coderman <>
To: "Roland Dobbins" <>
Subject: Re: emergent security properties

On 12/26/06, Roland Dobbins <> wrote:
> ...
> Another example would be introducing antispoofing functionality into
> a network infrastructure by deploying uRPF, IP Source Verify, iACLs,
> et. al. [...] are also examples of increased complexity leading to
> better security.

uRPF, IP Source Verify, iACLs and friends work great at any scale
(linear more or less) thus lacking any notable emergent properties
despite being useful.  anti fraud measures and similar transaction
based anomaly detection in financial industries are a nice analogy
though (incidentally, this approach is working better for online
banking than N-factor authentication hacks being trialed and discarded
for marginal, if any effective benefit on compromised worm and malware
infested platforms...).

> As an aside, Slammer did not in fact take down 'much of the
> Internet'; some SP infrastructure was affected, but the vast majority
> of networks affected were enterprise networks.

right, a three minute ACL annoyance at worst for anyone who knows how
to manage a network.  slammer was a nice media blurb of passing
interest.  witty a vicious test case of more significant weight (the
theoretical favorite being a curious yellow / warhol worm vector).

Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -

Powered by blists - more mailing lists