On Thu, 25 Oct 2012, Chris Fitzpatrick wrote:

http://en.m.wikipedia.org/wiki/Sayre's_law


I'm guessing the other people participating in this thread have never had men with guns show up to take your server because of a 'security incident'.


Or block your server's IP address, and then make you jump through hoops for two weeks because they were unhappy with someone uploading an image to your trouble ticket system that accepted anonymous submissions ... with the explaination that if they managed to get a file on there, the whole system was compromised, and had to be blanked and the OS reinstalled. ... it didn't help that the image was text saying something to the effect of 'I've hacked your computer'. And they didn't realize at the time it actually had a JPEG exploit in it, so it was the people who downloaded it could've been compromised, but it wasn't even a valid exploit against the OS we were running.


Or have all of the sysadmins in your group stop work for a day while we have a comprehensive scan of all of our machines by the security group because someone on the security auditing group noticed that a machine on our network sent out a request to some random webserver in the middle of the night, and then there was a connection attempted back to that machine and another one on our network. ... but they failed to mention was that the connection back was from a completely different IP range, and they had selectively filtered what they were looking for, so the incoming connections were attempted against *all* machines on our network and not a sign that someone was being selective in their attempts and cause for concern ... and the 'middle of the night' just meant 'before we got in this morning', but we have folks who have to work earlier shifts depending on when we get assigned antenna time to talk to the spacecraft.


... it makes the people who e-mail convinced that NASA's hiding evidence of the existance of alien life seem reasonable by comparison.*

So I actually *do* have a stake in validating what we use as inputs. Other people might not, but I do my best to avoid a DOS from our security group.**

-Joe


* They don't like that we get highly compressed data for 'space weather'
  purposes, and we replace them with a higher-quality image once it's been
  downloaded through a higher bandwidth link.  They also seem convinced
  that a compression artifact must be at the same distance from us as the
  sun for their size and speed calculations, rather than highly energetic
  particles right at the telescope.

** I've got other stories, too ... but I thought I'd keep it to only the
   ones that actually affected me.

Reply via email to