Your router/switch may be less secure than you think
Robert Bonomi
bonomi at mail.r-bonomi.com
Wed Aug 3 14:30:56 UTC 2005
> From owner-nanog at merit.edu Wed Aug 3 09:07:20 2005
> To: Michael.Dillon at btradianz.com
> Cc: nanog at merit.edu
> Subject: Re: Your router/switch may be less secure than you think
> From: "Robert E.Seastrom" <rs at seastrom.com>
> Date: Wed, 03 Aug 2005 09:58:53 -0400
>
>
>
> Michael.Dillon at btradianz.com writes:
>
> > We should all be looking to the security auditing work done by
> > the OpenBSD team for an example of how systems can be
> > cleaned up, fixed, and locked down if there is a will to do so.
>
> Beer, unsupported assertions, and lack of rigorous audit methodology
> can be blended together to make one's code more secure?
That would seem to depend on the quality of the code _before_ the blending, no?
As well as getting the proportions in the blend "just right".
*grin*
Seriously, _any_ approach "can" result in better/more secure code. It all
depends on exactly _what_ is done. Some approaches for identifying and/or
eliminating "problems" are more efficient and/or more effective than are
alternative means. This does -not- mean that those are the "only" ways to
get things done.
Now, the _liklihood_ that any given approach "willresult in better/more secure
code -- *that* is an entirely different question. :)
More information about the NANOG
mailing list