Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 08 Apr 2001 10:48:38 +0100
From:      Lee Smallbone <lee@kechara.net>
To:        "Jacques A. Vidrine" <n@nectar.com>, John Howie <JHowie@msn.com>
Cc:        Crist Clark <crist.clark@globalstar.com>, freebsd-security@FreeBSD.ORG
Subject:   Re: Theory Question
Message-ID:  <200104081058.LAA20775@mailgate.kechara.net>

next in thread | raw e-mail | index | archive | help
Thanks to everyone who has replied thus far. It has been very enlightening!


07/04/2001 14:00:40, "Jacques A. Vidrine" <n@nectar.com> wrote:

<snip>


>If the  `key' to your security  is obscurity of your  internal network
>configuration, expect to be comprimised.  This information is not hard
>to obtain  by a  determined attacker, and  technology is  probably not
>even an issue.

 Of course, there is an element of StO that is beneficial. There are (on last estimation),
 1-4,000 blackhats and 200,000 script kiddies. The chances are that if you do not 
 posses anything vaguely interesting (such as credit cards transactions, medical records
 or whatever) blackhat attention will be somewhat lower (but non-zero). It is *far* more likely
 script kiddies will be the thorn in your foot, thus StO will probably ward of 40-60% of 
 kiddies, as they cannot easily obtain what they need. "Just enter a different subnet and
 try again..." Proactive security will nab a further 30%, leaving just 10% to be of concern.

 Just my two cents anyway.

--

Lee Smallbone
Kechara Internet

lee@kechara.net
www.kechara.net 

Tel: (01243) 869 969
Fax: (01243) 866 685



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200104081058.LAA20775>