Re: We hit half-million: The Cidr Report

2014-05-01 Thread John Souter
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 30/04/14 17:30, valdis.kletni...@vt.edu wrote: > ... > Anybody got recommendations on how to make sure the company you engage > for the audit ends up sending you critters that actually have a clue? (Not > necessarily PCI, but in general) If more au

Re: Dealing with auditors (was Re: We hit half-million: The Cidr Report)

2014-05-01 Thread Alain Hebert
Well, Right now, 1/2 my day$ are spend doing PCI auditing, technical side, not as a QSA. There is not shortage of horror stories about my customers previous QSA... Best one to date... Firewalling the FC SANs from the pool of VMWares servers. Bill & Telnet... I hope

Re: Dealing with auditors (was Re: We hit half-million: The Cidr Report)

2014-05-01 Thread William Herrin
On Thu, May 1, 2014 at 6:29 AM, Alain Hebert wrote: > Bill & Telnet... > > I hope that QSA didn't let you keep that telnet facing any > public interface without any protection. Hi Alain, The point I made, successfully, was that it was outside the firewall hence out of scope for the a

Re: Dealing with auditors (was Re: We hit half-million: The Cidr Report)

2014-05-01 Thread TGLASSEY
Bill - anything that puts another routable network alongside of the card processing info is in scope. The real; issue is that the PCI-SSC decided to formally create a policy to hold the auditors harmless in their actions and that is about to change. Todd On 5/1/2014 8:52 AM, William Herrin w

Re: We hit half-million: The Cidr Report

2014-05-01 Thread Owen DeLong
On May 1, 2014, at 2:01 AM, John Souter wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > On 30/04/14 17:30, valdis.kletni...@vt.edu wrote: >> ... >> Anybody got recommendations on how to make sure the company you engage >> for the audit ends up sending you critters that actually hav

Re: We hit half-million: The Cidr Report

2014-05-01 Thread John Souter
On 01/05/14 17:41, Owen DeLong wrote: > The problem with this theory is that if auditors can be so easily put to the > street, you run into the risk of auditors altering behavior to increase > customer > satisfaction in ways that prevent them from providing the controls that are > the > reason au

Re: We hit half-million: The Cidr Report

2014-05-01 Thread Owen DeLong
On May 1, 2014, at 11:07 AM, John Souter wrote: > On 01/05/14 17:41, Owen DeLong wrote: >> The problem with this theory is that if auditors can be so easily put to the >> street, you run into the risk of auditors altering behavior to increase >> customer >> satisfaction in ways that prevent the

Re: We hit half-million: The Cidr Report

2014-05-01 Thread Alain Hebert
Hey, I worked for them (AA) in the early 90's =D - Alain Hebertaheb...@pubnix.net PubNIX Inc. 50 boul. St-Charles P.O. Box 26770 Beaconsfield, Quebec H9W 6G7 Tel: 514-990-5911 http://www.pubnix.netFax: 514-990-9443 On 05/01/14 1

YouTube contact? (IPv6 streaming broken)

2014-05-01 Thread Blair Trosper
Can someone from YouTube/Google give me a shout off list? The HTML5 player is getting a "204 No Content" error when it sends the stream request via IPv6...but works fine on IPv4. Confirmed from multiple locations in the US.

Re: YouTube contact? (IPv6 streaming broken)

2014-05-01 Thread Blair Trosper
Specifically: - 2001:4860:400b:c01::64 returns a 204 - 2607:f8b0:4002:10::8 is about 50/50 between a 204 and 200 On Thu, May 1, 2014 at 3:55 PM, Blair Trosper wrote: > Can someone from YouTube/Google give me a shout off list? The HTML5 > player is getting a "204 No Content" error when it sends

Re: We hit half-million: The Cidr Report

2014-05-01 Thread Robert Drake
On 4/29/2014 10:54 PM, Jeff Kell wrote: Yeah, just when we thought Slammer / Blaster / Nachi / Welchia / etc / etc had been eliminated by process of "can't get there from here"... we expose millions more endpoints... /me ducks too (but you know *I* had to say it) Slammer actually caused many

Re: We hit half-million: The Cidr Report

2014-05-01 Thread Owen DeLong
Care to comment on how you feel about the COI that developed between AA Consulting business at Enron and AA auditing Enron? Not asking you to disclose anything confidential, but if you have wisdom to impart about any sort of generic lessons learned, etc. that might be relevant to this discussio

Re: We hit half-million: The Cidr Report

2014-05-01 Thread Jean-Francois Mezei
On 14-05-01 14:34, Owen DeLong wrote: > Believe me, I cringe every time I hear “our auditors require NAT as a > security mechanism” Pardon my ignorance here. But in a carrier-grade NAT implementation that serves say 5000 users, when happens when someone from the outside tries to connect to port

Re: We hit half-million: The Cidr Report

2014-05-01 Thread Robert Drake
On 5/1/2014 7:10 PM, Jean-Francois Mezei wrote: Pardon my ignorance here. But in a carrier-grade NAT implementation that serves say 5000 users, when happens when someone from the outside tries to connect to port 80 of the shared routable IP ? you still need to have explicit port forwarding to

Re: We hit half-million: The Cidr Report

2014-05-01 Thread Fred Baker (fred)
On May 1, 2014, at 4:10 PM, Jean-Francois Mezei wrote: > Pardon my ignorance here. But in a carrier-grade NAT implementation that > serves say 5000 users, when happens when someone from the outside tries > to connect to port 80 of the shared routable IP ? More to the point, your trust boundar

Re: We hit half-million: The Cidr Report

2014-05-01 Thread Mark Foster
On Fri, May 2, 2014 11:57 am, Fred Baker (fred) wrote: > > On May 1, 2014, at 4:10 PM, Jean-Francois Mezei > wrote: > >> Pardon my ignorance here. But in a carrier-grade NAT implementation that >> serves say 5000 users, when happens when someone from the outside tries >> to connect to port 80 of t

Re: We hit half-million: The Cidr Report

2014-05-01 Thread Owen DeLong
On May 1, 2014, at 4:57 PM, Fred Baker (fred) wrote: > > On May 1, 2014, at 4:10 PM, Jean-Francois Mezei > wrote: > >> Pardon my ignorance here. But in a carrier-grade NAT implementation that >> serves say 5000 users, when happens when someone from the outside tries >> to connect to port 80