Re: Internet attack called broad and long lasting

2005-05-12 Thread Alexei Roudnev

 Alexei Roudnev wrote:
  O, my god. Primitive hack, primitive ssh exploit I watched it all 6
  years ago, bnothing changed since this.
 
  It is _minor_ incident, in reality.

 Primitive I can understand, but _minor_?

 First, I don't really see why an attack should be estimated by the tool
 used. If a 10 years old exploit would work, why should an attacker look
 for and use a 0day? It's silly allocation of resources.
I agree. But I saw, how hackers intruded into XXX agency (USA's, I mean) 6
years ago. Cisco sources never was a great secret
(a lot of people saw them; they are almost useless without Cisco's
infrastructure; they are interesting for competitors
 in some cases, because of very interesting technical ideas, but not for the
hackers). It is _MINOR_ in reality. Major can be,
for example, stealing 100,000 credit card numbers, because it make sence for
100, 000 people. Just Cisco sources... hmm, 100 total people in the world
will be affected, big deal...)

But I agree - it just showed old truth - good security is not technical
issue. Just simplerst _never use standard ports_ policy could prevent this
case. Better, _use One Time Passwords and single point signature_. Primitive
host based IDS (Osiris, for example). Any _real_ security policy, of course
(or better, ACCESS policy, because security is nothing - ACCESS mater! No
access required - no security issues...)

It is amazing. Cisco made  a lot of noice about IDS, IPS, etc etc while
no one in reality need these super expansive and
complex tools (except few dozens of companies under the DDOS risk); but
missed so simple thing as ssh exploit in their own nest. (It is not
harmless - we found ssh trojan on my previous job, just exactly the same
case - ssh opened to Internet, port #22! Since this, I never allow ssh on
port 22, Terminal Service on port 3389,  managemen t web on port 80 or 443,
and so on... /even when servcie is allowed, which is policy issue/...



 Burrowing from that, if the attack is successful, and the loss is
 significant, I think the way there - although cute, is irrelevant except
I mean _MINOR_ because lost was minor, in reality. No because it was ssh
exploit.


 for the defender.

 Gadi.



Re: Internet attack called broad and long lasting

2005-05-12 Thread Alexei Roudnev

  *Your* boxes may be hardened beyond all belief and plausibility, but
you're
  *STILL* screwed if some teenaged kid on another continent has more
effective
  control of the router at the other end of your OC-48 than the NOC monkey
you
  call when things get wonky
It is mostly fantasy. DNS security is much much more important and much more
real issue, vs this fictions.
If talking about Cisco, we have much more worries about chained bugs, vs
teens controlled OC-48 routers...

I mean - it is _real_, but it is far behind _much more realistic_ problems.



Re: Internet attack called broad and long lasting

2005-05-12 Thread Gadi Evron

 I agree. But I saw, how hackers intruded into XXX agency (USA's, I mean) 6
 years ago. Cisco sources never was a great secret

Then you shouldn't be talking about it.

 (a lot of people saw them; they are almost useless without Cisco's
 infrastructure; they are interesting for competitors
  in some cases, because of very interesting technical ideas, but not for the
 hackers). It is _MINOR_ in reality. Major can be,
 for example, stealing 100,000 credit card numbers, because it make sence for
 100, 000 people. Just Cisco sources... hmm, 100 total people in the world
 will be affected, big deal...)

Okay, so if it is a Good Thing for competitors and a Bad Thing for Cisco
which is a commercial company with a vested interest in not giving away
their secrets to competitors, how is this not a major loss? _EVEN_ if
only in reputation?

Sorry, but I really don't understand why you keep trying to under-play
this from different angles, and am just trying to understand your meaning.

 But I agree - it just showed old truth - good security is not technical
 issue. Just simplerst _never use standard ports_ policy could prevent this
 case. Better, _use One Time Passwords and single point signature_. Primitive
 host based IDS (Osiris, for example). Any _real_ security policy, of course
 (or better, ACCESS policy, because security is nothing - ACCESS mater! No
 access required - no security issues...)

It's not a technical issue, yet you just told me how to do security in
detail.

 It is amazing. Cisco made  a lot of noice about IDS, IPS, etc etc while
 no one in reality need these super expansive and
 complex tools (except few dozens of companies under the DDOS risk); but

IDS.. IPS.. etc.. etc... DDoS risk?

I can agree with many on the complete uselessness of IDS for most
companies (I can't live without it!).. IPS systems are a different matter.

 missed so simple thing as ssh exploit in their own nest. (It is not
 harmless - we found ssh trojan on my previous job, just exactly the same

Let me Google you and find where you worked. :o)

 case - ssh opened to Internet, port #22! Since this, I never allow ssh on
 port 22, Terminal Service on port 3389,  managemen t web on port 80 or 443,
 and so on... /even when servcie is allowed, which is policy issue/...

And I'll port-scan you to find out what port you are running SSH on, as
it is open to the net.

Burrowing from that, if the attack is successful, and the loss is
significant, I think the way there - although cute, is irrelevant except
 
 I mean _MINOR_ because lost was minor, in reality. No because it was ssh
 exploit.

Okay, I still don't follow you. I don't mean to be annoying but I really
don't. Let's not move too much into the realm of security and stay in
net ops.

How is this not a loss and not a risk? If we can't reach an agreement I
suggest we take this off-list.

Gadi.


Re: Internet attack called broad and long lasting

2005-05-12 Thread Gadi Evron

Alexei Roudnev wrote:
*Your* boxes may be hardened beyond all belief and plausibility, but
 
 you're
 
*STILL* screwed if some teenaged kid on another continent has more
 
 effective
 
control of the router at the other end of your OC-48 than the NOC monkey
 
 you
 
call when things get wonky
 
 It is mostly fantasy. DNS security is much much more important and much more
 real issue, vs this fictions.
 If talking about Cisco, we have much more worries about chained bugs, vs
 teens controlled OC-48 routers...
 
 I mean - it is _real_, but it is far behind _much more realistic_ problems.

You should listen to Vladis, he knows what he is talking about.

There have always and will always (sigh) be bugs. However, as people
keep saying... guns don't kill people, people kill people.


Re: Internet attack called broad and long lasting

2005-05-12 Thread Valdis . Kletnieks
On Thu, 12 May 2005 01:30:36 PDT, Alexei Roudnev said:

 It is mostly fantasy. DNS security is much much more important and much more
 real issue, vs this fictions.

Very true, but

Sites that have their routers tied down right tend to get the DNS right too,
and sites that are lax with the routers tend towards botching the DNS too.

Remember - the single *biggest* chunk is that the people in charge have to make
a conscious decision that tying stuff down tight is important.  Once that
happens, routers and DNS and customer-tracking all usually fall into place. And
if they haven't decided that a large bucket full of security-kloo is needed,
you *WILL* end up calling them and saying Did your XYZ get hacked?.  Which
piece of gear is XYZ this week is mostly random chance and the phase of the
moon

(For a *LONG* time, the single *biggest* easy-to-check predictor of is this
machine a spam source? wasn't the various RBLSs, but whether they had a PTR
for the IP.  The same sort of sites that can't/don't get their PTRs in order
(even to the point of a generic 'a.b.c.d.in-addr.arpa PTR d.c.b.a.ISP.net')
are the same sort that can't check a new customer against ROKSO or find and
neutralize a spam-zombie PC. 



pgpuw9qod9vTT.pgp
Description: PGP signature


Re: Internet attack called broad and long lasting

2005-05-12 Thread Alexei Roudnev



  I agree. But I saw, how hackers intruded into XXX agency (USA's, I mean)
6
  years ago. Cisco sources never was a great secret

 Then you shouldn't be talking about it.

I mean - such things was common even 6 years ago. There was (always) some
level of rooted servers, some level of teen hackers, some level of
compromised passwords. Absolutely nothing new. If you (like Cisco) have a
wide cooperation, are big, and decided (reasonably) do not sacrify in
productivity because of paranoiic security - you have some risk of be
intruded. It just means _use simple, sometimes primitive, but effective
measures for additional protection_. Host based IDS-es on ALL (ALL) servers,
single time passwords for everything, non standard ports - at least one of
such list (teher are much more on the list).

 Okay, so if it is a Good Thing for competitors and a Bad Thing for Cisco
 which is a commercial company with a vested interest in not giving away
 their secrets to competitors, how is this not a major loss? _EVEN_ if
 only in reputation?
No, exclude reputation from my list - I did not estimated it. 100% agree
about reputation. But cisco's reputation is not major thing
for anyone outside of Cisco.

I underplay it because it is overplayed by the media. If (IF!) cisco code
had not backdoors from developers (and I believe, it had not), then this
particular event is major for Cisco, but minor for the rest of the world
(even for competitors). You can not do much with this code, except if you
are Cisco or are contrafacting Cisco's as a clone - it (as any such code)
require the whole infrastructure around to be used. (It's as egg cell - we
need a whole women around to get use of it).

  It is amazing. Cisco made  a lot of noice about IDS, IPS, etc etc
while
  no one in reality need these super expansive and
  complex tools (except few dozens of companies under the DDOS risk); but

 IDS.. IPS.. etc.. etc... DDoS risk?

 I can agree with many on the complete uselessness of IDS for most
 companies (I can't live without it!).. IPS systems are a different matter.

  missed so simple thing as ssh exploit in their own nest. (It is not
  harmless - we found ssh trojan on my previous job, just exactly the same

 Let me Google you and find where you worked. :o)
Ok, but we do few simpler measures (sometimes on 0 cost) which dramatically
decrease a chance of intrusions, and other measures to prevent any chance of
intrusion into important areas. And we do not forget to patch 'ssh' and
'ssl'  (after all -:)).

IDS and IPS are good, if you have it on _EVERYTHING_ (which means, btw, that
they can not be very expensive because you will never be able to use
expensive tool on _everything_) and, most important, main IDS and IPS have
brand names _cluefull admin and cluefull manager_.

But we got aside.

My point for this forum was _do not overestimate real harm from this Cisco
sources leak_. It is almost harmless (except for repuation) vs consumer data
leaks, consumer password's leaks, consumer OS exploits, medical data leaks
and so on.
If someone get control on ISP xxx routers - trust me, it will happen because
he found admin passwords and because
clueless admin allowed in-band access from Internet, or because NOC's server
was compromised - but not because someone had Cisco sources.


 Burrowing from that, if the attack is successful, and the loss is
 significant, I think the way there - although cute, is irrelevant except
 
  I mean _MINOR_ because lost was minor, in reality. No because it was ssh
  exploit.

 Okay, I still don't follow you. I don't mean to be annoying but I really
 don't. Let's not move too much into the realm of security and stay in
 net ops.

 How is this not a loss and not a risk? If we can't reach an agreement I
 suggest we take this off-list.

Because it is useless for hackers, except if Cisco have a backdoors and
embedded trojans. And (most important) because it distract NOC's and
security guys from securing NOC's, access pathes to the routers, use
changable passwords and so on.

Simple question - do you control all changes on your routers and firewalls?
I mean - something like CCR system (which sends
daily change reports) or Cisco Works (as I know, do the same)? How often do
you change enable passwords? Is it enough for  intruder to set up sniffer in
the NOC, steal password, then loging and change config (and be unnoticed)?







 Gadi.



Re: Internet attack called broad and long lasting

2005-05-11 Thread Alexei Roudnev

O, my god. Primitive hack, primitive ssh exploit I watched it all 6
years ago, bnothing changed since this.

It is _minor_ incident, in reality.


- Original Message - 
From: Sean Donelan [EMAIL PROTECTED]
To: nanog@merit.edu
Sent: Monday, May 09, 2005 10:32 PM
Subject: NYT: Internet attack called broad and long lasting




 Internet Attack Called Broad and Long Lasting by Investigators
 By JOHN MARKOFF and LOWELL BERGMAN

 Published: May 10, 2005

 SAN FRANCISCO, May 9 - The incident seemed alarming enough: a breach of a
 Cisco Systems network in which an intruder seized programming instructions
 for many of the computers that control the flow of the Internet.

 [...]
 See the New York Times for the rest of the story.




Re: Internet attack called broad and long lasting

2005-05-11 Thread Gadi Evron
Alexei Roudnev wrote:
O, my god. Primitive hack, primitive ssh exploit I watched it all 6
years ago, bnothing changed since this.
It is _minor_ incident, in reality.
Primitive I can understand, but _minor_?
First, I don't really see why an attack should be estimated by the tool 
used. If a 10 years old exploit would work, why should an attacker look 
for and use a 0day? It's silly allocation of resources.

Burrowing from that, if the attack is successful, and the loss is 
significant, I think the way there - although cute, is irrelevant except 
for the defender.

	Gadi.


Re: Internet attack called broad and long lasting

2005-05-11 Thread Valdis . Kletnieks
On Wed, 11 May 2005 13:44:22 +0300, Gadi Evron said:

 First, I don't really see why an attack should be estimated by the tool 
 used. If a 10 years old exploit would work, why should an attacker look 
 for and use a 0day? It's silly allocation of resources.
 
 Burrowing from that, if the attack is successful, and the loss is 
 significant, I think the way there - although cute, is irrelevant except 
 for the defender.

Actually, it *is* relevant for the rest of us.

Given the number of boxen that got whacked, and the number of sites involved,
the defender *is* the rest of us, and we as an industry obviously need
to get our collective act in gear.  Remember -

*Your* boxes may be hardened beyond all belief and plausibility, but you're
*STILL* screwed if some teenaged kid on another continent has more effective
control of the router at the other end of your OC-48 than the NOC monkey you
call when things get wonky



pgp3Buvm8eZyB.pgp
Description: PGP signature


Re: Internet attack called broad and long lasting

2005-05-11 Thread Gadi Evron

[EMAIL PROTECTED] wrote:

[snip]

Hi Vladis!

 Actually, it *is* relevant for the rest of us.
 
 Given the number of boxen that got whacked, and the number of sites involved,
 the defender *is* the rest of us, and we as an industry obviously need
 to get our collective act in gear.  Remember -

Which is exactly my point...

People keep worrying about 0days, when I'd only start worrying about
them once I made sure that current (old) and known vulns can't get me.

Once they are inside, it doesn't matter how they got in until a later
time when you do forensics and try to make sure it doesn't happen again,
which is what I referred to as the defender side.

Fact is, the break in was serious because serious data was stolen.. so
why should the fact it was an old vuln distract us from that except for
perhaps reintroduce the facts that people simply don't do enough
security and/or best practices, which we already knew?

 *Your* boxes may be hardened beyond all belief and plausibility, but you're
 *STILL* screwed if some teenaged kid on another continent has more effective
 control of the router at the other end of your OC-48 than the NOC monkey you
 call when things get wonky

Well, I suppose it's not really a great idea to wait until things get
wonky to establish good and operational relations with your uplink.

Gadi.


Re: Internet attack called broad and long lasting

2005-05-11 Thread Valdis . Kletnieks
On Wed, 11 May 2005 16:59:56 +0400, Gadi Evron said:

 Well, I suppose it's not really a great idea to wait until things get
 wonky to establish good and operational relations with your uplink.

Fortunately for me, we've got such good operational relations with our
primary uplink that I don't even have to go outside to get to their NOC. ;)

The problem is that for most sites, good operational relations with the uplink
isn't 100% congruent to uplink has their security act together.  As a result,
you get to have the Hello, Uplink? You guys get hacked? Umm.. yeah phone
call... 


pgpCLP7RrGNqE.pgp
Description: PGP signature


Re: Internet Attack Called Broad and Long Lasting by Investigators

2005-05-10 Thread Scott Weeks



Eventhough this article wasn't specifically regarding network operations,
it does come down to the most fundamental of network operating practices.
Create policies and the procedures that enable those policies.  Then
enforce them VERY strictly.

   The crucial element in the password thefts that provided access at
   Cisco and elsewhere was the intruder's use of a corrupted version of a
   standard software program, SSH.

   The intruder probed computers for vulnerabilities that allowed the
   installation of the corrupted program, known as a Trojan horse

   In the Cisco case, the passwords to Cisco computers were sent from a
   compromised computer by a legitimate user unaware of the Trojan horse

Folks that handle sensitive info (proprietary code, personal info, HIPPA
FERPA, SOX, .mil, etc, etc) should be allowed to download software only
from company servers where all software has been cleared by folks that're
experts in evaluating software packages.  Not from the general internet.

scott




Re: Internet Attack Called Broad and Long Lasting by Investigators

2005-05-10 Thread Jim Popovitch

This part:

The crucial element in the password thefts that provided access
 at Cisco and elsewhere was the intruder's use of a corrupted
 version of a standard software program, SSH. The program is used
 in many computer research centers for a variety of tasks, 
 ranging from administration of remote computers to data transfer
 over the Internet.

reminds me of the SourceForge attack a few years back
http://www.apache.de/info/20010519-hack.html

-Jim P.

On Mon, 2005-05-09 at 22:37 -0700, Steven M. Bellovin wrote:
 SAN FRANCISCO, May 9 - The incident seemed alarming enough: a breach
 of a Cisco Systems network in which an intruder seized programming
 instructions for many of the computers that control the flow of
 the Internet.
 
 Now federal officials and computer security investigators have
 acknowledged that the Cisco break-in last year was only part of a
 more extensive operation - involving a single intruder or a small
 band, apparently based in Europe - in which thousands of computer
 systems were similarly penetrated.
 
 
 
 
 http://www.nytimes.com/2005/05/10/technology/10cisco.html?hpex=1115784000en=eeb27da2e75ec022ei=5094partner=homepage
 
 
   --Prof. Steven M. Bellovin, http://www.cs.columbia.edu/~smb
 
 



Re: NYT: Internet attack called broad and long lasting

2005-05-10 Thread Fred Heutte

NYT:

  The crucial element in the password thefts that provided access
  at Cisco and elsewhere was the intruder's use of a corrupted
  version of a standard software program, SSH. The program is
  used in many computer research centers for a variety of tasks,
  ranging from administration of remote computers to data transfer
  over the Internet.

  The intruder probed computers for vulnerabilities that allowed
  the installation of the corrupted program, known as a Trojan
  horse, in place of the legitimate program.

Ouch.  Makes me wonder how long before someone cracks the
ssh that you can order for T-Mobile Sidekicks like mine.
(Before?  Already! . . . whatever)  It *is* handy in a pinch,
I last used it to check a server quickly while I was sitting in the
Rockpile (center field bleachers) at a Denver Rockies game last
month :)  It's some flavor of ssh2, guess I'll have to ask my
friend who works at Danger which one.  The notion of
launching a DDOS from a cellphone is intriguing in a novelistic
sense and worrisome in a real.world sense.

-- Fred



RE: Internet Attack Called Broad and Long Lasting by Investigators

2005-05-10 Thread Scott Morris

Closing people's systems down from any other software installations isn't
necessarily the solution.  It can delay progress in many cases, and not
everyone has IT staff that may be as up to speed as necessary.

The requirement should be more along the lines of software designed to scan
the system for things like that and alert/remove it.  That kind of
requirement at least gives flexibility and a good kick in the butt to
implement good assessment tools at the PC or network level.

All it takes is one user outside the norm to mess up LOTS of work and
policies trying to keep things right!

Scott 

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Scott Weeks
Sent: Tuesday, May 10, 2005 2:16 AM
To: [EMAIL PROTECTED]
Subject: Re: Internet Attack Called Broad and Long Lasting by Investigators




Eventhough this article wasn't specifically regarding network operations, it
does come down to the most fundamental of network operating practices.
Create policies and the procedures that enable those policies.  Then enforce
them VERY strictly.

   The crucial element in the password thefts that provided access at
   Cisco and elsewhere was the intruder's use of a corrupted version of a
   standard software program, SSH.

   The intruder probed computers for vulnerabilities that allowed the
   installation of the corrupted program, known as a Trojan horse

   In the Cisco case, the passwords to Cisco computers were sent from a
   compromised computer by a legitimate user unaware of the Trojan horse

Folks that handle sensitive info (proprietary code, personal info, HIPPA
FERPA, SOX, .mil, etc, etc) should be allowed to download software only from
company servers where all software has been cleared by folks that're experts
in evaluating software packages.  Not from the general internet.

scott




RE: Internet Attack Called Broad and Long Lasting by Investigators

2005-05-10 Thread Scott Weeks


: Eventhough this article wasn't specifically regarding network operations, it
: does come down to the most fundamental of network operating practices.
: Create policies and the procedures that enable those policies.  Then enforce
: them VERY strictly.

: Folks that handle sensitive info (proprietary code, personal info, HIPPA
: FERPA, SOX, .mil, etc, etc) should be allowed to download software only from
: company servers where all software has been cleared by folks that're experts
: in evaluating software packages.  Not from the general internet.



On Tue, 10 May 2005, Scott Morris wrote:

: Closing people's systems down from any other software installations isn't
: necessarily the solution.  It can delay progress in many cases, and not
: everyone has IT staff that may be as up to speed as necessary.

Ok, for smaller companies, yes.  You have to trade off productivity and
risk.  But in a smaller company you will likely know each individual and
their level of tech savvy.  Red flags should pop up if they have a low
level of understanding, have access to machines with sensitive or
proprietary info and have the permission level to install software.

Also, in this case we're talking Cisco, NASA, .mil networks and research
labs.  They have the ability to enforce policy and the need to be VERY
risk adverse WRT losing sensitive data.  In organizations that size, it's
the enforement that's hard to pull off.  It requires strict policy
definition and procedure adherence.  Don't give folks that have access to
machines that hold sensitive info the ability to download software unless
you know they're savvy enough to do so safely.  If you do allow the less
savvy folks whom have access to sensitive machines to install software,
force the packages to be downloaded from a company repository.


: The requirement should be more along the lines of software designed to scan
: the system for things like that and alert/remove it.  That kind of
: requirement at least gives flexibility and a good kick in the butt to
: implement good assessment tools at the PC or network level.

In the article, it was too late by that time.  The data was compromised.
They didn't trade off risk and productivity well, or didn't enforce policy
through procedure, or...


: All it takes is one user outside the norm to mess up LOTS of work and
: policies trying to keep things right!

Anyone with access to machines that hold sensitive material should be held
to a higher standard than the rest of the organization.  You risk losing
your treasure through these people.

scott





RE: Internet Attack Called Broad and Long Lasting by Investigators

2005-05-10 Thread Jim Popovitch

On Tue, 2005-05-10 at 10:24 -1000, Scott Weeks wrote:
 Don't give folks that have access to machines that hold sensitive 
 info the ability to download software unless you know they're savvy 
 enough to do so safely. 

I don't see that as root of the problem.  

To me the real problem is in the use and handling of usernames and
passwords.  Take your typical contractor or SE (i use to be one) they
have usernames and passwords for their corporate systems as well as
customer systems.  OK, so they may be careful who they share those
credentials with, but they aren't careful enough with how they use those
credentials themselves.  I wish I had a nickle for every time I've seen
a person assume everything was a-ok since they were using ssh, even
though they couldn't have told you who installed ssh (or the remote
sshd) on the systems.  So, the SE ssh's into *your* corporate systems
using ssh on their laptop (probably d/l'ed by googling for PuTTY or SSH
and pulling the first available URL) while on a service call to your
facility.  Or how about the SE who ssh's into *their* corporate network
from some rogue contractor box inside your network.  Then there are
those people who run bleeding edge O/Ses that constantly update from
god-only-knows-where servers all over the world... what version of ssh
is installed today?  And there are those co-workers who think they
know what they are doing but really don't.  Ever dropped a BSOD
screensaver on to a co-workers computer, dropping a bogus ssh executable
is even easier.  

Use LDAP?  Isn't it nice having one username and password for *all*
things?  The l33t [ch]4ck3rs love LDAP credentials.  Your SSH password
is the same as your IMAP/SMTP/POP3/HTTP/RDP password.

In short: people need to not only respect their login credentials, they
need to only use them from trusted systems and constantly be vigilant
about the level of trust they have for those systems.  DON'T mix
usernames and passwords between differing classifications of systems.

-Jim P. 






NYT: Internet attack called broad and long lasting

2005-05-09 Thread Sean Donelan


Internet Attack Called Broad and Long Lasting by Investigators
By JOHN MARKOFF and LOWELL BERGMAN

Published: May 10, 2005

SAN FRANCISCO, May 9 - The incident seemed alarming enough: a breach of a
Cisco Systems network in which an intruder seized programming instructions
for many of the computers that control the flow of the Internet.

[...]
See the New York Times for the rest of the story.



Internet Attack Called Broad and Long Lasting by Investigators

2005-05-09 Thread Steven M. Bellovin

SAN FRANCISCO, May 9 - The incident seemed alarming enough: a breach
of a Cisco Systems network in which an intruder seized programming
instructions for many of the computers that control the flow of
the Internet.

Now federal officials and computer security investigators have
acknowledged that the Cisco break-in last year was only part of a
more extensive operation - involving a single intruder or a small
band, apparently based in Europe - in which thousands of computer
systems were similarly penetrated.




http://www.nytimes.com/2005/05/10/technology/10cisco.html?hpex=1115784000en=eeb27da2e75ec022ei=5094partner=homepage


--Prof. Steven M. Bellovin, http://www.cs.columbia.edu/~smb