Re: [Operational] Internet Police

2010-12-11 Thread isabel dias
check the agreed maintenance windows as defined in the (SLA)section Maintenance Plans - etc   - Original Message From: Joel Jaeggli joe...@bogus.com To: valdis.kletni...@vt.edu Cc: nanog@nanog.org Sent: Fri, December 10, 2010 6:48:41 PM Subject: Re: [Operational] Internet Police

Re: [Operational] Internet Police

2010-12-10 Thread Jorge Amodio
On Thu, Dec 9, 2010 at 1:12 PM, Randy Bush ra...@psg.com wrote: And if I ever find the genius who came up with the we are not the internet police meme ... he died over a decade ago He also said The Internet works because a lot of people cooperate to do things together Remove the together and

Re: [Operational] Internet Police

2010-12-10 Thread Lamar Owen
On Thursday, December 09, 2010 01:26:30 pm Dobbins, Roland wrote: On Dec 10, 2010, at 1:19 AM, Michael Smith wrote: front lines of this cyberwar? Warfare isn't the correct metaphor. Espionage/covert action is the correct metaphor. In reality DoS threats/execution of those threats/ 'pwning'

Re: [Operational] Internet Police

2010-12-10 Thread J. Oquendo
On 12/10/2010 11:08 AM, Lamar Owen wrote: In reality DoS threats/execution of those threats/ 'pwning' / website vandalism are all forms of terrorism. An easily pronounceable version with a 'net-' 'e-' or even 'cyber-' prefix. is difficult. I thought e-* was so yesterday, wouldn't

Re: [Operational] Internet Police

2010-12-10 Thread William McCall
On Fri, Dec 10, 2010 at 10:08 AM, Lamar Owen lo...@pari.edu wrote: On Thursday, December 09, 2010 01:26:30 pm Dobbins, Roland wrote: On Dec 10, 2010, at 1:19 AM, Michael Smith wrote: front lines of this cyberwar? Warfare isn't the correct metaphor. Espionage/covert action is the correct

Re: [Operational] Internet Police

2010-12-10 Thread JC Dill
On 10/12/10 8:08 AM, Lamar Owen wrote: On Thursday, December 09, 2010 01:26:30 pm Dobbins, Roland wrote: On Dec 10, 2010, at 1:19 AM, Michael Smith wrote: front lines of this cyberwar? Warfare isn't the correct metaphor. Espionage/covert action is the correct metaphor. In reality DoS

Re: [Operational] Internet Police

2010-12-10 Thread Jack Bates
On 12/10/2010 10:44 AM, William McCall wrote: To the folks out there that presently work for an SP, if someone called you (or the relevant department) and gave you a list of end-user IPs that were DDoSing this person/entity, how long would you take to verify and stop the end user's stream of

Re: [Operational] Internet Police

2010-12-10 Thread Michael Smith
On Fri, Dec 10, 2010 at 11:46 AM, JC Dill jcdill.li...@gmail.com We *really* don't need Homeland Security and TSA deciding that cyber-vandalism falls into the realm of terrorism and thus comes under their purview to protect us against. Their security theater at the airport is too much

Re: [Operational] Internet Police

2010-12-10 Thread Valdis . Kletnieks
On Fri, 10 Dec 2010 11:08:00 EST, Lamar Owen said: In reality DoS threats/execution of those threats/ 'pwning' / website vandalism are all forms of terrorism. Let's not dilute the meaning of terrorism to the point where graffiti, cyber or otherwise, is classifed as terrorism. The USA Patriot

Re: [Operational] Internet Police

2010-12-10 Thread Lamar Owen
On Friday, December 10, 2010 11:46:43 am JC Dill wrote: On 10/12/10 8:08 AM, Lamar Owen wrote: In reality DoS threats/execution of those threats/ 'pwning' / website vandalism are all forms of terrorism. No one was terrorized because they couldn't reach MasterCard or because

Re: [Operational] Internet Police

2010-12-10 Thread Jack Bates
On 12/10/2010 11:06 AM, valdis.kletni...@vt.edu wrote: The USA Patriot act says: activities that (A) involve acts dangerous to human life that are a violation of the criminal laws of the U.S. or of any state, that (B) appear to be intended (i) to intimidate or coerce a civilian population,

Re: [Operational] Internet Police

2010-12-10 Thread Valdis . Kletnieks
On Fri, 10 Dec 2010 12:14:20 EST, Lamar Owen said: Identity theft can cause loss of life due to the stress of mopping up afterwards. Oh, give me a *break*. This is well off the end of the slippery slope. My car got totaled in a rear-end collision a few weeks ago. If I get so stressed dealing

RE: [Operational] Internet Police

2010-12-10 Thread George Bonser
From: William McCall Sent: Friday, December 10, 2010 8:45 AM To: Lamar Owen Cc: nanog@nanog.org Subject: Re: [Operational] Internet Police To the folks out there that presently work for an SP, if someone called you (or the relevant department) and gave you a list of end-user IPs

Re: [Operational] Internet Police

2010-12-10 Thread Jack Bates
On 12/10/2010 11:45 AM, George Bonser wrote: If an ISP were to actively disconnect clients who were infected with a bot (intentionally infected or not), the end users themselves might be a little more vigilant at keeping their systems free of them.*But* any ISP doing that would also have to be

Re: [Operational] Internet Police

2010-12-10 Thread Paul Graydon
On 12/10/2010 07:45 AM, George Bonser wrote: From: William McCall Sent: Friday, December 10, 2010 8:45 AM To: Lamar Owen Cc: nanog@nanog.org Subject: Re: [Operational] Internet Police To the folks out there that presently work for an SP, if someone called you (or the relevant department

RE: [Operational] Internet Police

2010-12-10 Thread George Bonser
Not to mention the risk of lost business for customers that just can't be bothered to fix broken machines. Paul That supposes that another ISP would accept their bot-infected machine. It would require some cooperation among the providers. And should some ISP get the reputation of being a

Re: [Operational] Internet Police

2010-12-10 Thread Paul Graydon
On 12/10/2010 07:59 AM, George Bonser wrote: Not to mention the risk of lost business for customers that just can't be bothered to fix broken machines. Paul That supposes that another ISP would accept their bot-infected machine. It would require some cooperation among the providers. And

Re: [Operational] Internet Police

2010-12-10 Thread Jack Bates
On 12/10/2010 12:07 PM, Paul Graydon wrote: Unless you can get every company to sign up to an agreement it will never work. Even then you'll still find unscrupulous companies that are far more interested in revenue than reputation. There are a number of hosting companies I'm sure most network

Re: [Operational] Internet Police

2010-12-10 Thread Joel Jaeggli
On 12/10/10 9:06 AM, valdis.kletni...@vt.edu wrote: On Fri, 10 Dec 2010 11:08:00 EST, Lamar Owen said: I believe the word you wanted was hooliganism. And we have a legal system that has about 3,000 years of experience in dealing with *that*, thank you very much. The code of hamurabi or

[Operational] Internet Police

2010-12-09 Thread Michael Smith
My question is what architectural recommendations will you make to your employer if/when the US Govt compels our employers to accept our role as the front lines of this cyberwar? I figure once someone with a relevant degree of influence in the govts realizes that the cyberwar is between

Re: [Operational] Internet Police

2010-12-09 Thread Jack Bates
On 12/9/2010 12:19 PM, Michael Smith wrote: So... if/when our employers are unable to resist the US Govt's demand that we join in the national defense, wouldn't this community be the ones asked to guard the border? CALEA done

Re: [Operational] Internet Police

2010-12-09 Thread Dobbins, Roland
On Dec 10, 2010, at 1:19 AM, Michael Smith wrote: front lines of this cyberwar? Warfare isn't the correct metaphor. Espionage/covert action is the correct metaphor. --- Roland Dobbins rdobb...@arbor.net //

Re: [Operational] Internet Police

2010-12-09 Thread Michael Smith
How is what to block identified? ...by content key words? ..traffic profiles / signatures? Deny all, unless flow (addresses/protocol/port) is pre-approved / registered? What does the technical solution look like? Any solutions to maintain some semblance of freedom? On Thu, Dec 9, 2010 at

Re: [Operational] Internet Police

2010-12-09 Thread Jack Bates
On 12/9/2010 12:31 PM, Michael Smith wrote: How is what to block identified? ...by content key words? ..traffic profiles / signatures? Deny all, unless flow (addresses/protocol/port) is pre-approved / registered? CALEA doesn't provide block. It provides full data dumps to the authorities.

Re: [Operational] Internet Police

2010-12-09 Thread Suresh Ramasubramanian
Let's put it this way. 1. If you host government agencies, provide connectivity to say a nuclear power plant or an army base, or a bank or .. .. - you'd certainly work with your customers to meet their security requirements. 2. If you are a service provider serving up DSL - why then, there are

Re: [Operational] Internet Police

2010-12-09 Thread Suresh Ramasubramanian
And if I ever find the genius who came up with the we are not the internet police meme ... On Fri, Dec 10, 2010 at 12:19 AM, Suresh Ramasubramanian ops.li...@gmail.com wrote: Let's put it this way. 1. If you host government agencies, provide connectivity to say a nuclear power plant or an

Re: [Operational] Internet Police

2010-12-09 Thread Michael Holstein
Obviously the environment is created by layers 8/9, but I'm interested in the layer 1-7 solutions that the community would consider/recommend. BGP blackhole communities is a good way to push the problem upstream, assuming your provider will agree to it. In theory, that could also work on

Re: [Operational] Internet Police

2010-12-09 Thread Randy Bush
And if I ever find the genius who came up with the we are not the internet police meme ... he died over a decade ago

Re: [Operational] Internet Police

2010-12-09 Thread Michael Smith
Was it the original IANA? - Original Message - From: Randy Bush ra...@psg.com To: Suresh Ramasubramanian ops.li...@gmail.com Cc: North American Network Operators Group nanog@nanog.org Sent: Thu Dec 09 14:12:41 2010 Subject: Re: [Operational] Internet Police And if I ever find

Re: [Operational] Internet Police

2010-12-09 Thread Fred Baker
On Dec 9, 2010, at 10:19 AM, Michael Smith wrote: My question is what architectural recommendations will you make to your employer if/when the US Govt compels our employers to accept our role as the front lines of this cyberwar? I figure once someone with a relevant degree of influence in

Re: [Operational] Internet Police

2010-12-09 Thread mikea
On Thu, Dec 09, 2010 at 06:26:30PM +, Dobbins, Roland wrote: On Dec 10, 2010, at 1:19 AM, Michael Smith wrote: front lines of this cyberwar? Warfare isn't the correct metaphor. Espionage/covert action is the correct metaphor. Low intensity conflict may be more correct. -- Mike

Re: [Operational] Internet Police

2010-12-09 Thread Chris Adams
Once upon a time, Fred Baker f...@cisco.com said: did you know that DSLRs are illegal in Kuwait unless one is a registered journalist? Did you know that they are not? http://thenextweb.com/me/2010/11/30/kuwait-dslr-ban-does-not-exist-after-all/ This is like the people attacking EasyDNS

Re: [Operational] Internet Police

2010-12-09 Thread David Conrad
On Dec 9, 2010, at 10:44 AM, Jack Bates wrote: [CALEA] is designed to track down and prosecute people, not stop malicious activity. Right. In order for the law to try and stop malicious activities (digital or real), it must place constraints on our freedoms. See TSA/Airport Security. Or,

Re: [Operational] Internet Police

2010-12-09 Thread Suresh Ramasubramanian
On Fri, Dec 10, 2010 at 12:42 AM, Randy Bush ra...@psg.com wrote: And if I ever find the genius who came up with the we are not the internet police meme ... he died over a decade ago All due respect to him, but I didnt want to kick his teeth in or anything, merely ask if he'd like to

Re: [Operational] Internet Police

2010-12-09 Thread Robert E. Seastrom
mikea mi...@mikea.ath.cx writes: On Thu, Dec 09, 2010 at 06:26:30PM +, Dobbins, Roland wrote: On Dec 10, 2010, at 1:19 AM, Michael Smith wrote: front lines of this cyberwar? Warfare isn't the correct metaphor. Espionage/covert action is the correct metaphor. Low intensity

Re: [Operational] Internet Police

2010-12-09 Thread Dobbins, Roland
On Dec 10, 2010, at 10:01 AM, Robert E. Seastrom wrote: cyber-intifada was the proper trope, but so far it has failed to grow legs. The problem is that non-ironic use of the appellation 'cyber-' is generally inversely proportional to actual clue, so it should be avoided at all costs. ;

Re: [Operational] Internet Police

2010-12-09 Thread Bill Woodcock
Butlerian Jihad. -Bill On Dec 9, 2010, at 19:02, Robert E. Seastrom r...@seastrom.com wrote: mikea mi...@mikea.ath.cx writes: On Thu, Dec 09, 2010 at 06:26:30PM +, Dobbins, Roland wrote: On Dec 10, 2010, at 1:19 AM, Michael Smith wrote: front lines of this