[Nlnog] meer discussie!
Sabri Berisha
sabri at cluecentral.net
Tue Jun 22 09:44:38 UTC 2004
Hi,
Naar aanleiding van wat discussie in het IRC kanaal, bijgaand de
volgende 'voorwaarden' die ik vond over een soortgelijke mailinglijst
als nlnog. Mijn voorstel is om iets soortgelijks van toepassing te
verklaren op deze lijst. Met name het stukje over vertrouwelijkheid (als
ik op deze lijst zeg dat AS12859 netwerkpanne had wil ik dat niet morgen
op Webwereld teruglezen) staat mij wel aan. Uiteraard zou eea ook van
toepassing zijn op het irc kanaal.
Meningen?
"Cyber defenders, ever vigilant, ever responsive." -Marjorie Gilbert, 2003
Step one is to insure you meet the qualifications for NLNOG. Some common
questions to ask yourself are:
Do you work for some type of IP transit provider, huge multi-homed
content provider, or service provider?
Does your job include Operational Services?
Are you willing to offer free services, data, forensic, and other
monitoring data to the NOG community?
Do you have authorization to actively mitigate incidents in your network?
Do you actually log into a router and do something to mitigate an attack
or call someone to task them to do the work?
Do you have the time for a real-time NSP mitigation forum?
If yes, then you might fit the expectations to be on the NLNOG
Mitigation or Discussion Forums.
NLNOG PARTICIPATION EXPECTATIONS
NLNOG is a forum to get work done in the service of the community. As
such, realistic expectations are placed on the NLNOG membership. These
expectations are periodically reviewed by the NLNOG moderators to ensure
that an individuals community membership is relevant, productive, and adds
value to the mission of NLNOG. These expectations, which have evolved
through active membership feedback include:
All posts to NLNOG must have an organizational affiliation via either a
corporate email address that is identifable as an ISP/NSP, or via a
signature that includes your organizational affiliation or ASN.
Lurking and learning does not contribute to the community there are
other forums for that. Silence often indicates that people are not
handling the information provided by the NLNOG community or that the
information provided is of little relevence to the member.
Acknowledgements of action whether publicly on the mailing list or
privately to the people involved provides members of the community an
indication that contributions are being made. Recognizing specific
national laws, regulations, and/or corporate policies may prevent some
members from posting on the public NLNOG alias; these limitations do not
prevent private mitigation correspondence.
Taking information provided on the NLNOG forums and using it for
commercial gain is not allowed. It is a violation of trust to the
community.
NLNOG is built on trust. Therefore, reposting NLNOG communications to
individuals inside or outside your organization is a violation of that
trust. NLNOG members should have the span of control to take action on
the information from an NLNOG correspondence without widely posting the
information inside their organization. If forwarding inside the
organization is required, permission of the posters must be sought.
NLNOG postings must not be CCed or BCCed to any other forum. Internal
dialog must be re-crafted for internal use as mentioned in previous
guildelines.
NLNOG APPLICATION EXPECTATIONS
Membership in NLNOG is restricted to those actively involved in the
mitigation of NSP security incidents within organizations in the IP
transit, content, and service provider community. Therefore, it will be
limited to operators, vendors, researchers. That means no press and
(hopefully) none of the "bad guys." It also means that engineers who do
not directly work in the core transit/content provider network do not fit
the purview of NLNOG and should look for other forums
NLNOG is not a community for lurkers who wish to "learn more about NSP
security." Individuals who are part of the NSP attack mitigation community
at times create whitepapers, presentations, and training materials to
educate the larger community. Much of this material will be presented to
NANOG (http://www.nanog.org) and other NSP operations forums (RIPE,
APRICOT, and AFNOG, etc.). A set of links below offers help for those
looking to learn more about the tools, techniques, and training used by
the NLNOG community.
NLNOG will use a simple trust/peering relationship. This model is not as
"secure" as an encrypted conversation, yet it is better than a wide-open
public dialog. All applications must be accompanied by at least two
existing members who will vouch for the new applicant. We will establish
the trust by asking members of the list to vouch for new subscriber
requests. If the list administrators know the person, then they can vouch
for them.
No information presented in this list is allowed to be forwarded or shared
outside the NLNOG community without specific permission from the poster.
It is expected that members strictly adhere to this policy to ensure list
confidentiality.
NLNOG APPLICATION FOR MEMBERSHIP INSTRUCTIONS
Step one is to insure you meet the qualifications for NLNOG. Some common
questions to ask yourself are:
Do you work for some type of IP transit provider, content provider, or
service provider?
Does your job include Operational Security?
Are you willing to offer free services, data, forensic, and other
monitoring data to the NSP community?
Do you have authorization to actively mitigate incidents in your network?
Do you actually log into a router and do something to mitigate an attack
or call someone to task them to do the work?
Do you have the time for a real-time NSP mitigation forum?
If you'd like to be considered for membership, please provide the
following information via email to: bofh at nlnog.net
Name:
E-mail:
DayPhone:
24hrPhone:
iNOC Phone:
Company/Employer:
ASNs Responsible for:
JobDesc:
Internet security references (names & emails):
PGP Key Location:
For Job Description be as detailed and descriptive as possible. After
sending the above form via email go to the section below and issue a
"subscription" request via the form.
NEW MEMBERS
When a new member requests membership and provides his/her "bio" (as
above), once the moderators decide that the potential member has passed
their initial review, that person's bio will be sent to the full list. All
applications must be accompanied by at least two existing members who will
"vouch" for the new applicant (preferably not from the same organization).
Any existing member will have 48 hours to send reservations about that
potential member to the moderators. The moderators promise to review in
depth any facts that are raised in regards to any potential new member.
RESERVATIONS AND REBUTTAL
Any reservation about an existing or new member that is sent privately to
the -owner list will have all identifying aspects stripped out of the
email and forwarded to the potential rejectee for rebuttal. That person
will have 72 hours to send a rebuttal before a decision is taken. The
moderators of the NLNOG list will attempt to take all matters into
consideration before rendering a decision.
REMOVAL
A majority of the moderators will be required to remove an existing member
or to override a new potential members candidacy for the list.
NLNOG REVETTING
The NLNOG Moderators will periodically review the membership and select
some members for revetting. This is required to ensure that all members of
the list continue to fit the charter characteristics. Both employment and
the charter can change over time - this mechanism allows the list to
remain true to its charter.
The revetting process occurs in three steps:
1. The member selected for revetting will be asked to update their
information, and submit it to the NLNOG Administrators.
2. Should the member continue to meet the required characteristics for
NLNOG membership, the members information will be sent to the list for
revetting.
3. At least two members of the list must re-approve membership. At least
one of the approvers must be from a different company than the member who
is being revetted. In addition, other members selected for revetting
during the same cycle may not approve each other.
Note that not meeting the requirements of each step will result in removal
from the NSPSec mailing list. Those so removed may reapply through the
normal method, although the two-company approval requirements will
continue to apply.
NLNOG PHYSICAL MEETINGS
The IETF experience demonstrates that the most effective way to build a
community on the Internet is through a combination of virtual meetings
(e-mail forum) and physical meetings. NLNOG follows the same formula,
having small meetings and BOFs at the various operations and engineering
meetings around the world. Following is a list of the active NLNOG
meetings and the contacts for the chaperons/facilitators for these
meetings.
Please let the community know if you are interested in coordinating,
chaperoning, or facilitating meetings at other forums. Volunteerism in
service to the community is welcomed.
--
Sabri Berisha - SAB666-RIPE
BIT BV - http://www.bit.nl/
AS12859 and AS31064 - lg: http://noc.bit.nl/traceroute
More information about the NLNOG
mailing list