Is anyone actually USING IP QoS?

Brett_Watson at enron.net Brett_Watson at enron.net
Wed Jun 16 17:55:35 UTC 1999


On 06/16/99 10:31:03 AM Vadim Antonov  wrote:

>Brett_Watson at enron.net wrote:
>
>>i'll give you that.  however, caches tend to run under unix-like os's
which
>>are multi-user and multi-service machines.  they can be susceptible to
DoS
>>attacks, and can be running services listening on a port which can
>>potentially be "hacked".  my only point is that you are trading a set of
>>security issues in multicast for *different* security issues with a
cache.
>
>A Unix machine can be secured a lot better than any commercial router.

i don't believe that at all.  i say this from operational experience, not
just generalizing.

>For one, you can get a source code from it and see what the hell it is
>doing and fix discovered security holes ASAP.

in some cases, yes you can.  but the fact that i (someone who doesn't crack
systems) can get source code to some flavors of unix doesn't stop the
hackers from getting it either.  no *real* gain here.  and if you don't
think that some of the more elite hackers in the world don't have access to
proprietary source code, both systems and router vendors....  if you're not
scared, you don't understand.

>Second, just run SSH or Kerberos.  SSH on cisco, anyone?  Nyah.

maybe i just misunderstand you but you seem to portray these issues as
black and white.  they're not.  ssh has had known security problems, and
kerberos, while i like it myself, is damned easy to misconfigure which
opens all kinds of holes.

-brett






More information about the NANOG mailing list