[Discussion] What are we making? -- CLIENT Side
David Glosser
david.glosser at gmail.com
Wed Oct 22 23:53:03 UTC 2008
I think listing all possible actions is a good exercise, then, after
brainstorming is over, deciding what is best.
For example, for granny, there's blocking/preventing at the browser level,
blocking/preventing at the OS, at her home router, via DNS, via IP, etc.
then there's blocking (or null routing, etc) at her ISP, bringing down the
host, contacting the hosting provider, etc...
On Wed, Oct 22, 2008 at 7:35 PM, Martin Holste <mcholste at gmail.com> wrote:
> I like the idea, but are there really that many different actions to be
> taken, and aren't they going to be org specific? If I know that an IP is
> spamming, I don't just want to block them from emailing, I want to block all
> access from that IP since it is untrustworthy. But I do think there is a
> lot of value in developing and distributing better language for describing
> why the given IP/host is now on the list and other descriptions. I'm more
> for giving orgs the most information that we can, and leaving it to them to
> implement the actual blocking decisions.
>
> --Martin
>
>
> On Wed, Oct 22, 2008 at 5:35 PM, Blake Hartstein <urule99 at gmail.com>wrote:
>
>> What if we focus on developing and distributing a better language for
>> communicating actionable events?
>> The idea is to make all intelligence more valuable and immediate. If I
>> see this input event, alert, network, ISP, javascript, URL, how does it
>> impact me, and what do I do about it? Instead of just collecting and
>> distributing, the goal is to direct the actions for (ISP takedown,
>> firewall, admin action, more). This enhances all of the prior research
>> we've already done.
>>
>>
>> Blake
>>
>>
>>
>> robert.jamison at bt.com wrote:
>> > It seems we're a split camp with:
>> >
>> > [Keynesian CAMP]
>> > Client Side Product/Service with ability to protect/detect compromise on
>> > grannyx home user
>> > *scope most thoroughly represented by Martin's " RFC: Proposal for
>> > Analysis Framework"
>> >
>> > [Supply Side CAMP]
>> > Focus on server side protection for net critical assets
>> > *Andre/Jack "What is absolutely horrible in its current state is
>> > IDS/IPS" / "Client side is simply not possible due to political and
>> > religious issues."
>> >
>> > Additional notes gathered (I've just caught up on my reading;-)
>> >
>> > (a) Consideration for re-write defanging capability as inline protection
>> > (b) Efficiency in stream storage--essentially normalize data inspection
>> > so it doesn't have to be redone by multiple engines
>> > (c) XML vs. Binary distribution of verbose alerts vs. instruction
>> > inferred datapoints
>> > (d) Consideration for extending existing project Bro
>> >
>> > Anything I'm missing?
>> >
>> > Rob
>>
>>
>
> _______________________________________________
> Discussion mailing list
> Discussion at openinfosecfoundation.org
> http://lists.openinfosecfoundation.org/mailman/listinfo/discussion
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openinfosecfoundation.org/pipermail/discussion/attachments/20081022/1b61b98f/attachment-0002.html>
More information about the Discussion
mailing list