Anyone see a game changer here?

Valdis.Kletnieks at vt.edu Valdis.Kletnieks at vt.edu
Fri Jan 22 07:24:05 CST 2010


On Fri, 22 Jan 2010 05:52:11 +0200, Gadi Evron said:

> 1. Did Google hack a Taiwanese server to investigate the breach? If so, 
> good for them.

No, *not* good.  If *you* had a server that got compromised, and used to launch
attacks on 500 sites, would you want to try to deal with  500 return strikes?

Especially if the initial strike happens at 5:47PM on a Friday, and by the time
you come in on Monday morning, you've been pwned by 197 different return
strikes? Then the fun *really* starts when you call your national CERT and
report you've been hit by an organized set of targeted attacks from 198
locations and hilarity ensues because your CERT can't contact 143 of them and
verify it was a return strike.

Definitely one of the sillier things I've heard Gadi say in a while...


-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 227 bytes
Desc: not available
URL: <http://mailman.nanog.org/pipermail/nanog/attachments/20100122/50b34237/attachment.bin>


More information about the NANOG mailing list