Just because they were presented with the information doesn't mean they understand.
It's our job as operators to get involved and help them understand as best as can be done, so that the proposals are as well informed as possible.
Just because they understand doesn't mean they execute based on that information.
No set of rules will ever be perfectly executed or implemented. Doesn't matter if it's a government regulation or internal company rule. You try to start from a good place, learn what works and what doesn't, and adjust accordingly. On Fri, May 17, 2024 at 11:11 AM Mike Hammett <nanog@ics-il.net> wrote:
Just because they were presented with the information doesn't mean they understand. Just because they understand doesn't mean they execute based on that information.
----- Mike Hammett Intelligent Computing Solutions http://www.ics-il.com
Midwest-IX http://www.midwest-ix.com
------------------------------ *From: *"Job Snijders via NANOG" <nanog@nanog.org> *To: *"Josh Luthman" <josh@imaginenetworksllc.com> *Cc: *"NANOG [nanog@nanog.org]" <nanog@nanog.org> *Sent: *Thursday, May 16, 2024 3:20:54 PM *Subject: *Re: Should FCC look at SS7 vulnerabilities or BGP vulnerabilities
On Thu, May 16, 2024 at 04:05:21PM -0400, Josh Luthman wrote:
Now do you think they're going to properly understand what an SS7 or vulnerability is?
The FCC organised several sessions (private and public) where they invited knowledgeable people from this community to help edifice them on what BGP is and what risks exist.
https://www.fcc.gov/news-events/events/2023/07/bgp-security-workshop
Watch https://www.youtube.com/watch?v=VQhoNX2Q0aM to see our very own Tony Tauber looking sharp in a nice suit! :-)
FCC staff attended NANOG & IETF meetings to further explore and discuss the problem space in the hallway track. If anything, I think the FCC made a proper effort to connect with various stakeholders and learn from them.
Kind regards,
Job