Full Disclosure mailing list archives

Re: emergent security properties


From: coderman <coderman () gmail com>
Date: Wed, 27 Dec 2006 03:51:27 -0800

On 12/26/06, Roland Dobbins <rdobbins () cisco com> wrote:
...
Another example would be introducing antispoofing functionality into
a network infrastructure by deploying uRPF, IP Source Verify, iACLs,
et. al. [...] are also examples of increased complexity leading to
better security.

uRPF, IP Source Verify, iACLs and friends work great at any scale
(linear more or less) thus lacking any notable emergent properties
despite being useful.  anti fraud measures and similar transaction
based anomaly detection in financial industries are a nice analogy
though (incidentally, this approach is working better for online
banking than N-factor authentication hacks being trialed and discarded
for marginal, if any effective benefit on compromised worm and malware
infested platforms...).


As an aside, Slammer did not in fact take down 'much of the
Internet'; some SP infrastructure was affected, but the vast majority
of networks affected were enterprise networks.

right, a three minute ACL annoyance at worst for anyone who knows how
to manage a network.  slammer was a nice media blurb of passing
interest.  witty a vicious test case of more significant weight (the
theoretical favorite being a curious yellow / warhol worm vector).

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Current thread: