My Last Email with W. Richard Stevens
2023-6-26 03:2:0 Author: taosecurity.blogspot.com(查看原文) 阅读量:4 收藏

My Last Email with W. Richard Stevens

In the fall of 1998 I joined the AFCERT. I became acquainted with the amazing book TCP/IP Illustrated, Volume 1: The Protocols by W. Richard Stevens. About a year later I exchanged emails with Mr. Stevens. Here is the last exchange, as forwarded from my AFCERT email address to my home email.

From "Capt Richard Bejtlich - Real Time Chief" Mon Sep  6 18:27:35 1999

X-Mozilla-Keys:                                                                                 

Received: from kinda.csap.af.mil (kinda.csap.af.mil [192.203.2.250])

          by mw4.texas.net (2.4/2.4) with SMTP

  id RAA22116 for <[email protected]>; Mon, 6 Sep 1999 17:27:38 -0500 (CDT)

Received: by kinda.csap.af.mil (Smail3.1.29.1 #7)

id m11O7Ee-000NcwC; Mon, 6 Sep 99 17:27 CDT

Received: from walt.ip.af.mil(192.168.1.142) by kinda via smap (V1.3)

id sma014865; Mon Sep  6 17:27:36 1999

Received: from kinda.csap.af.mil by walt.ip.af.mil with smtp

(Smail3.1.29.1 #6) id m11O7Ed-000VruC; Mon, 6 Sep 99 22:27 GMT

Sender: bejtlich

Date: Mon, 06 Sep 1999 22:27:35 +0000

From: Capt Richard Bejtlich - Real Time Chief 

Organization: AFCERT

X-Mailer: Mozilla 4.6 [en] (X11; U; SunOS 5.6 sun4u)

X-Accept-Language: en

MIME-Version: 1.0

Subject: [Fwd: Re: TCP/IP Illustrated Vol I 2nd ed?]

Content-Transfer-Encoding: 7bit

Content-Type: text/plain; charset=us-ascii

X-UIDL: 7b89a44b661b28334c3553b3b92998bd

-------- Original Message --------

Subject: Re: TCP/IP Illustrated Vol I 2nd ed?

To: Capt Richard Bejtlich - Real Time Chief

[In your message of Aug 18,  2:37pm you write:]

> Your books are excellent and everyone in my office relies upon them!  

Many thanks.

> Do you plan on writing a second edition of TCP/IP Illustrated Vol 1 (The

> Protocols)?  I see you have written second editions of UNIX Network

> Programming, and I'm wondering if the TCP/IP books are next.

Actually, I am first working on a revision of my APUE book, then it

will be time for TCP Vol. 1.  I am hesitant to start on TCP Vol. 1

too soon, given the "uncertain" status of IPv6 at the present.  I keep

hoping things will settle down with IPv6 and vendors will start shipping

real implementations.

Rich Stevens

Popular posts from this blog

Zeek in Action Videos

Image

This is a quick note to point blog readers to my Zeek in Action YouTube video series for the Zeek network security monitoring project .  Each video addresses a topic that I think might be of interest to people trying to understand their network using Zeek and adjacent tools and approaches, like Suricata, Wireshark, and so on.  I am especially pleased with Video 6 on monitoring wireless networks . It took me several weeks to research material for this video. I had to buy new hardware and experiment with a Linux distro that I had not used before -- Parrot .  Please like and subscribe, and let me know if there is a topic you think might make a good video.

MITRE ATT&CK Tactics Are Not Tactics

Image

Just what are "tactics"? Introduction MITRE ATT&CK  is a great resource, but something about it has bothered me since I first heard about it several years ago. It's a minor point, but I wanted to document it in case it confuses anyone else. The MITRE ATT&CK Design and Philosophy document from March 2020 says the following: At a high-level, ATT&CK is a behavioral model that consists of the following core components: • Tactics, denoting short-term, tactical adversary goals during an attack; • Techniques, describing the means by which adversaries achieve tactical goals; • Sub-techniques, describing more specific means by which adversaries achieve tactical goals at a lower level than techniques; and • Documented adversary usage of techniques, their procedures, and other metadata. My concern is with MITRE's definition of "tactics" as "short-term, tactical adversary goals during an attack," which is oddly recursive. The key word in the tacti

New Book! The Best of TaoSecurity Blog, Volume 4

Image

  I've completed the TaoSecurity Blog book series . The new book is  The Best of TaoSecurity Blog, Volume 4: Beyond the Blog with Articles, Testimony, and Scholarship .  It's available now for Kindle , and I'm working on the print edition.  I'm running a 50% off promo on Volumes 1-3 on Kindle through midnight 20 April. Take advantage before the prices go back up. I described the new title thus: Go beyond TaoSecurity Blog with this new volume from author Richard Bejtlich. In the first three volumes of the series, Mr. Bejtlich selected and republished the very best entries from 18 years of writing and over 18 million blog views, along with commentaries and additional material.  In this title, Mr. Bejtlich collects material that has not been published elsewhere, including articles that are no longer available or are stored in assorted digital or physical archives. Volume 4 offers early white papers that Mr. Bejtlich wrote as a network defender, either for technical or pol


文章来源: https://taosecurity.blogspot.com/2023/06/my-last-email-with-w-richard-stevens.html
如有侵权请联系:admin#unsafe.sh