On Fri, 18 Apr 2008 09:52:23 +1200, Nick FitzGerald said:
> That's overkill -- thorough-going implementation of the security bit:
>
>http://www.ietf.org/rfc/rfc3514.txt
You should have seen the look on Steve Bellovin's face when I got to tell
him that a friend of mine (who worked at Comcast
Why go up in layers when you can go down?
Layer -5 = the meme layer is my favorite.
-Original Message-
From: [EMAIL PROTECTED] on behalf of Les Bell
Sent: Thu 4/17/2008 4:25 PM
To: funsec
Subject: Re: [funsec] quick OT thought
RandallMan <[EMAIL PROTECTED]>wrote:
>>
RandallMan <[EMAIL PROTECTED]>wrote:
>>
Perhaps its time for another layer:
THE SECURE LAYER-LAYER 8.
<<
It will have to be layer 10, since layers 8 and 9 have already been
allocated: they're the finance layer and the politics layer, respectively.
(Good luck trying to secure layer 9!).
Best,
RandallMan wrote:
I think "OT for funsec" is almost an oxymoron...
> Have been refreshing myself on CEH and CISSP studies. Looking over the OSI
> model I noticed that all layers have been hacked! Perhaps its time for
> another layer:
> THE SECURE LAYER-LAYER 8. Perhaps this would fit true with a
[EMAIL PROTECTED] wrote:
Don't go getting all serious on us -- this is funsec...
> On the other hand, implementing security at Layer 8 almost guarantees that
> it's
> a "bolt on after the fact". ...
And you're implying there is something wrong with this?
Hell, we've been doing it for years an
On Thu, Apr 17, 2008 at 1:03 PM, <[EMAIL PROTECTED]> wrote:
> On Thu, 17 Apr 2008 12:39:01 CDT, RandallMan said:
>
> > Have been refreshing myself on CEH and CISSP studies. Looking over the
> OSI
> > model I noticed that all layers have been hacked! Perhaps its time for
> > another layer:
> > THE
On Thu, 17 Apr 2008 12:39:01 CDT, RandallMan said:
> Have been refreshing myself on CEH and CISSP studies. Looking over the OSI
> model I noticed that all layers have been hacked! Perhaps its time for
> another layer:
> THE SECURE LAYER-LAYER 8. Perhaps this would fit true with a "layered"
> appro
Have been refreshing myself on CEH and CISSP studies. Looking over the OSI
model I noticed that all layers have been hacked! Perhaps its time for
another layer:
THE SECURE LAYER-LAYER 8. Perhaps this would fit true with a "layered"
approach to security.
I know. I ramble.
--
RandallMan
--