Re: NYT covers China cyberthreat

2013-02-21 Thread calin.chiorean
::This all seems to be noobie stuff. There's nothing technically cool ::to see here You mean the report or the activity? You seem upset that they are using M$ only(target and source). They steal data!!! From whom to steal? From a guru that spend minimum 8 hours a day in from of *nix? Why to

Re: NYT covers China cyberthreat

2013-02-21 Thread Kyle Creyts
The focus on platform here is ridiculous; can someone explain how platform of attacker or target is extremely relevant? Since when did people fail to see that we have plenty of inter-platform tools and services, and plenty of tools for either platform built with the express purpose of interaction

Re: NYT covers China cyberthreat

2013-02-21 Thread Stephen Sprunk
On 21-Feb-13 04:25, Kyle Creyts wrote: For another example of this, an acquaintance once told me about the process of getting internationally standardized technologies approved for deployment in China; the process that was described to me involved giving China the standards-based spec that

Re: NYT covers China cyberthreat

2013-02-21 Thread Miles Fidelman
Scott Weeks wrote: Be sure to read the source: intelreport.mandiant.com/Mandiant_APT1_Report.pdf Anybody happen to notice that the report sounds awfully like the scenario laid out in Tom Clancy's latest book, Threat Vector? -- In theory, there is no difference between theory and

Re: NYT covers China cyberthreat

2013-02-21 Thread Rich Kulawiec
On Thu, Feb 21, 2013 at 01:34:13AM +, Warren Bailey wrote: I can't help but wonder what would happen if US Corporations simply blocked all inbound Chinese traffic. Sure it would hurt their business, but imagine what the Chinese people would do in response. Would it hurt their business?

Re: Network security on multiple levels (was Re: NYT covers China cyberthreat)

2013-02-21 Thread Jack Bates
On 2/21/2013 12:03 AM, Scott Weeks wrote: I would sure be interested in hearing about hands-on operational experiences with encryptors. Recent experiences have left me with a sour taste in my mouth. blech! scott Agreed. I've generally skipped the line side and stuck with L3 side

Re: Network security on multiple levels (was Re: NYT covers China cyberthreat)

2013-02-21 Thread Christopher Morrow
On Thu, Feb 21, 2013 at 11:23 AM, Jack Bates jba...@brightok.net wrote: On 2/21/2013 12:03 AM, Scott Weeks wrote: I would sure be interested in hearing about hands-on operational experiences with encryptors. Recent experiences have left me with a sour taste in my mouth. blech! scott

Re: Network security on multiple levels (was Re: NYT covers China cyberthreat)

2013-02-21 Thread Warren Bailey
Not to mention, the KG units are dot government only.. For obvious reasons. From my Android phone on T-Mobile. The first nationwide 4G network. Original message From: Christopher Morrow morrowc.li...@gmail.com Date: 02/21/2013 8:37 AM (GMT-08:00) To: Jack Bates

RE: NYT covers China cyberthreat

2013-02-21 Thread Naslund, Steve
I can't help but wonder what would happen if US Corporations simply blocked all inbound Chinese traffic. Sure it would hurt their business, but imagine what the Chinese people would do in response First thing is the Chinese government would rejoice since they don't want their citizens on our

Re: NYT covers China cyberthreat

2013-02-21 Thread Scott Weeks
--- calin.chior...@secdisk.net wrote: From: calin.chiorean calin.chior...@secdisk.net :: This all seems to be noobie stuff. There's nothing technically cool :: to see here You mean the report or the activity? The activity. You seem upset that they are using M$ only(target and source).

Re: NYT covers China cyberthreat

2013-02-21 Thread Miles Fidelman
Scott Weeks wrote: --- calin.chior...@secdisk.net wrote: You seem upset that they are using M$ only(target and source). I'm not upset. I'm pointing out what Steven Bellovin said in just a few words: This strongly suggests that it's not their A-team... This is a technical mailing list where

Re: NYT covers China cyberthreat

2013-02-21 Thread Scott Weeks
--- kyle.cre...@gmail.com wrote: From: Kyle Creyts kyle.cre...@gmail.com The focus on platform here is ridiculous; can someone explain how platform of attacker or target is extremely relevant? Since when did -- It implies their skillset. Here's

Re: NYT covers China cyberthreat

2013-02-21 Thread Steven Bellovin
On Feb 20, 2013, at 9:07 PM, Steven Bellovin s...@cs.columbia.edu wrote: On Feb 20, 2013, at 1:33 PM, valdis.kletni...@vt.edu wrote: On Wed, 20 Feb 2013 15:39:42 +0900, Randy Bush said: boys and girls, all the cyber-capable countries are cyber-culpable. you can bet that they are all

Re: bgp for ipv6 question

2013-02-21 Thread Valdis . Kletnieks
On Thu, 14 Feb 2013 13:18:24 -0800, Owen DeLong said: On Feb 14, 2013, at 12:58 , Karl Auer ka...@biplane.com.au wrote: On Thu, 2013-02-14 at 08:08 -0500, Jared Mauch wrote: I recommend keeping your network as congruent between IPv4 and IPv6 as possible, with dual-stack. Why? For one

Re: NYT covers China cyberthreat

2013-02-21 Thread Jack Bates
On 2/21/2013 12:17 PM, Scott Weeks wrote: I'm not upset. I'm pointing out what Steven Bellovin said in just a few words: This strongly suggests that it's not their A-team... The A-team doesn't get caught and detailed. The purpose of the other teams is to detect easy targets, handle easy

Re: Anyone know of a good InfiniBand vendor in the US?

2013-02-21 Thread Peter Phaal
I wanted to bring attention to the following draft proposal from Mellanox to export traffic information from InfiniBand switches: http://sflow.org/draft_sflow_infiniband.txt If you are an InfiniBand user, this is a great opportunity to think about the types of metrics that you woud want from

bird rib dump

2013-02-21 Thread Randy Bush
a friend trying to see if bird will be better than quagga for bgp recording can not see how to get rib dumps, as opposed to just updates. what are we missing? randy

looking for terminology recommendations concerning non-rooted FQDNs

2013-02-21 Thread Brian Reichert
I'm trying to nail down some terminology for doc purposes. The issue: most resources on the net freely describe a fully-qualified domian name ('FQDN') as to exclude the root domain; i.e, they exclude the trailing dot as mandated by some RFCs such as RFC 1535:

Re: NYT covers China cyberthreat

2013-02-21 Thread Suresh Ramasubramanian
And so their bush league by itself was responsible for all the penetrations that mandiant says they did? Which shows that they don't have to be particularly smart, just a bit smarter than their average spear phish or other attack's victim. On Friday, February 22, 2013, Jack Bates wrote: On

Re: bird rib dump

2013-02-21 Thread Eiichiro Watanabe
bird supposedly doesn't support rib dumps at this time. Randy Bush wrote (2013/02/22 7:11): a friend trying to see if bird will be better than quagga for bgp recording can not see how to get rib dumps, as opposed to just updates. what are we missing? randy --

Re: NYT covers China cyberthreat

2013-02-21 Thread Christopher Morrow
On Thu, Feb 21, 2013 at 3:58 PM, Jack Bates jba...@brightok.net wrote: The A-team doesn't get caught and detailed no, the A-team has BA Baraccus... he pities the fool who gets caught and detailed... the last thing BA detailed was his black van.

Re: NYT covers China cyberthreat

2013-02-21 Thread Valdis . Kletnieks
On Fri, 22 Feb 2013 06:11:21 +0530, Suresh Ramasubramanian said: And so their bush league by itself was responsible for all the penetrations that mandiant says they did? Which shows that they don't have to be particularly smart, just a bit smarter than their average spear phish or other

Re: looking for terminology recommendations concerning non-rooted FQDNs

2013-02-21 Thread Mark Andrews
In message 20130221225540.ga99...@numachi.com, Brian Reichert writes: I'm trying to nail down some terminology for doc purposes. The issue: most resources on the net freely describe a fully-qualified domian name ('FQDN') as to exclude the root domain; i.e, they exclude the trailing dot as

Re: looking for terminology recommendations concerning non-rooted FQDNs

2013-02-21 Thread Karl Auer
On Fri, 2013-02-22 at 16:57 +1100, Mark Andrews wrote: RFC 952 as modified by RFC 1123 describe the legal syntax of a hostname. There is no trailing period. No - but a trailing period is a (common?) way to indicate that the name as given is complete, so in a lot of contexts a trailing period is