Merit Network
Can't find what you're looking for? Search the Mail Archives.
  About Merit   Services   Network   Resources & Support   Network Research   News   Events   Home

Discussion Communities: Merit Network Email List Archives

North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: Navy Marine Corps Internet hit

  • From: Sean Donelan
  • Date: Wed Aug 20 05:14:04 2003

On Tue, 19 Aug 2003, Scott Weeks wrote:
> on the .pif, .scr, etc. attachments...)  Maybe I was just lucky.  Most
> likely, though, they did not create "security zones" to keep problems
> contained within certain network segments and not let them out to destroy
> other networks.

Luck is very important.

Like most other people I have no knowledge about how the Navy Marine
Internet works, but that won't stop me from commenting.

It sounds like a "turnkey" operation, with EDS managing everything.  They
may have 100,000 users with identical configurations (software, patch
levels, etc) in one big flat network.  A large homogeneous population is
vulnerable to a common infection.  Nachia has a very effecient scanning
and infection process, particularly if your entire network uses RFC1918
address space internally.






Discussion Communities


About Merit | Services | Network | Resources & Support | Network Research
News | Events | Contact | Site Map | Merit Network Home


Merit Network, Inc.