lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 6 Oct 2008 13:09:38 -0700
From: "Buhrmaster, Gary" <gtb@...c.stanford.edu>
To: <Valdis.Kletnieks@...edu>, "n3td3v" <xploitable@...il.com>
Cc: n3td3v <n3td3v@...glegroups.com>, full-disclosure@...ts.grok.org.uk,
	nanog@...og.org
Subject: Re: Fwd: cnn.com - Homeland Security seeks cyber
	counterattack system(Einstein 3.0)

 
> Which is easier to shut down, an attack coming from a relatively small
> number of /16s that belong to the government, or one coming from the
> same number of source nodes scattered *all* over Comcast and Verizon
> and BT and a few other major providers?
> 
> Hint 1: Consider the number of entry points into your network 
> for the two cases, especially if you are heavily peered with one or more 
> of the source ISPs.  

The Federal Government (through its "Trusted Internet
Connection" initiative) is trying to limit the number
of entry points into the US Government networks.
(As I recall from 4000 interconnects to around 50,
where both numbers have a high percentage of politics
in the error bar.)

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ