The 'Security Digest' Archives (TM)

Archive: About | Browse | Search | Contributions | Feedback
Site: Help | Index | Search | Contact | Notices | Changes

ARCHIVE: 'Phage List' - Archives (1988 - 1989)
DOCUMENT: phage #242 [Phage Mailing list Coming Back] (1 message, 1212 bytes)
SOURCE: http://securitydigest.org/exec/display?f=phage/archive/242.txt&t=text/plain
NOTICE: securitydigest.org recognises the rights of all third-party works.

START OF DOCUMENT

From: Gene Spafford <spaf>
To: phage
Date: Sun 12:13:45 13/11/1988 EST
Subject: Phage Mailing list Coming Back
References: [Thread Prev: 240] [Thread Next: 244] [Message Prev: 248] [Message Next: 249]

As you will notice later today, the "phage" list is back.  I have split
the 160+ recipients into lists at four sites to help reduce the load on
our machines locally.  My thanks to everyone who volunteered the use of
their sites.  If the list continues to grow, I may take more of you up
on your offers!

We will be running the saved mail queue from last week, and posting some
articles submitted to the list since Thursday afternoon.  By tomorrow
morning (Monday), I hope to have the backlog cleared out.

Future messages to the list will be moderated (by me).  That is,
messages that are basically repeats of previous messages or that
contribute nothing germane to the list will be rejected.  I hope we can
improve the signal-to-noise ratio on the list.  Perhaps the faster
turnaround will also help.

I see the following topics as being some of the things this list is
appropriate for; other topics may also be suggested:

* How do we prevent future attacks like this?
* What is the best way to publicize seccurity problems and fixes?
* How can we communicate next time there is a problem that
  fragments the Internet?
* How has the media covered this event?  What can we do to make
  future coverage better?
* Can we coordinate some kind of security audit of network software?
  Should we?  Or should this be left just to Berkeley and vendors?

Although I am interested in the following topics, I think they are
not appropriate for this list:

* What punishment should the "wormer" get?
* What is the $$ amount of damages involved and how do we tell?
* What motivated RTM (allegedly) to do this?
* Was it a wrong thing to do this?  (I exclude this topic because
  I feel it is incredibly insulting to anyone who uses computers
  responsibly.  The majority of us feel it was wrong, and this
  list is not a place to debate matters of degree.)


Requests to join the list should be addressed to
"phage-request@cs.purdue.edu".  Submissions should be addressed to
"phage@cs.purdue.edu".

--spaf

END OF DOCUMENT