<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head><body dir="auto"><div><div style="direction: inherit;">The one takeaway i get from this seems to be that the bad guys are perfectly aware of just where they can find loose or poorly implemented security and abuse policies - who is incompetent, who is malicious, who to abuse, who not to abuse</div><div style="direction: inherit;"><br></div><div style="direction: inherit;">And action if any gets taken only after significant pressure is applied.</div><br>--srs</div><div><br>On 27-Aug-2016, at 2:39 PM, ox <<a href="mailto:andre@ox.co.za">andre@ox.co.za</a>> wrote:<br><br></div><blockquote type="cite"><div><span>On Sat, 27 Aug 2016 14:05:38 +0530</span><br><span>Suresh Ramasubramanian <<a href="mailto:ops.lists@gmail.com">ops.lists@gmail.com</a>> wrote:</span><br><span></span><br><blockquote type="cite"><span>Curious - what factors would these be that you identified?</span><br></blockquote><blockquote type="cite"><span></span><br></blockquote><span>But, at least two or more of the five factors are so very clear?</span><br><span></span><br><span>imho the most obvious is:</span><br><span>Effectively managing abuse depends on the interaction and relationship</span><br><span>between two main and different techs of the Internet</span><br><span></span><br><span>Those engineers that route and those that are system engineers</span><br><span></span><br><span>The second most obvious thing, in my opinion, may be that if you ask</span><br><span>ten of either of these what constitutes Internet abuse, you will</span><br><span>receive at least two and as much as five (or more), different answers.</span><br><span></span><br><span>and then there are so many other factors, what do you think the factors</span><br><span>are?</span><br><span></span><br><span></span><br><span>Andre</span><br><span></span><br><blockquote type="cite"><span></span><br></blockquote><blockquote type="cite"><blockquote type="cite"><span>On 27-Aug-2016, at 2:00 PM, ox <<a href="mailto:andre@ox.co.za">andre@ox.co.za</a>> wrote:</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>On Sat, 27 Aug 2016 13:41:28 +0530</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>Suresh Ramasubramanian <<a href="mailto:ops.lists@gmail.com">ops.lists@gmail.com</a>> wrote:</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><span>Worth a read </span><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><span><a href="http://krebsonsecurity.com/2016/08/inside-the-attack-that-almost-broke-the-internet/">http://krebsonsecurity.com/2016/08/inside-the-attack-that-almost-broke-the-internet/</a></span><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>Yes, the actual logs that Brian Krebs publishes, of the</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>conversations, underlines and serves as clear proof of those</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>factors which serves to obtuse anti abuse efforts. </span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>Until this is resolved, Internet abuse will continue to be</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>difficult to manage. This makes it difficult for anyone one the</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>Internet, including the Cyber Criminals themselves, to deal with</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>Internet abuse effectively anyway.</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>2c</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>Andre</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><span></span><br><span></span><br></div></blockquote></body></html>