On October 23, 2016 at 17:14 hanni...@gmail.com (Martin Hannigan) wrote: > > > >On Oct 23, 2016, at 16:26, b...@theworld.com wrote: > > > > I'm not sure who you mean when you say "people". My reference was to > manufacturers of IoT devices only. > > >The users are not going to be able to help. You're right, it's all about the >manufacturers. If you can remove or reduce profits enough where it matters, it >will help tremendously. > >I spent an hour looking through the IEEE standards RA pattern searching mac >addrs thinking about mitigation techniques and doing random lookups of the >registrants.
That's a good idea particularly in terms of not letting this stuff out. For example one could imagine a patch to DSL, cable, and similar last mile equipment to rate limit, perhaps flag etc, packets from known vulnerable MAC ID ranges if they can be identified. That'd be relatively cheap and easy. >These attacks are the canary in the coal mine in terms of what is probably >coming. Oh yeah...that code is out there. -- -Barry Shein Software Tool & Die | b...@theworld.com | http://www.TheWorld.com Purveyors to the Trade | Voice: +1 617-STD-WRLD | 800-THE-WRLD The World: Since 1989 | A Public Information Utility | *oo*