Twisted Documentation Release 21.7.0

Total Page:16

File Type:pdf, Size:1020Kb

Twisted Documentation Release 21.7.0 Twisted Documentation Release 21.7.0 Twisted Matrix Labs Jul 28, 2021 CONTENTS 1 Installing Twisted 3 1.1 Installing Optional Dependencies....................................3 2 Twisted Core 5 2.1 Developer Guides............................................5 2.2 Examples................................................. 320 2.3 Specifications............................................... 322 2.4 Development of Twisted......................................... 326 3 Twisted Conch (SSH and Telnet) 369 3.1 Developer Guides............................................ 369 3.2 Examples................................................. 377 4 Twisted Mail (SMTP, POP, and IMAP) 379 4.1 Examples................................................. 379 4.2 Developer Guides............................................ 379 4.3 Twisted Mail Tutorial: Building an SMTP Client from Scratch..................... 382 5 Twisted Names (DNS) 393 5.1 Developer Guides............................................ 393 5.2 Examples................................................. 403 6 Twisted Pair 405 6.1 Developer Guides............................................ 405 6.2 Examples................................................. 407 7 Twisted Web 409 7.1 Developer Guides............................................ 409 7.2 Examples................................................. 483 8 Twisted Words (IRC and XMPP) 485 8.1 Developer Guides............................................ 485 8.2 Examples................................................. 490 9 API Reference 491 10 Historical Documents 493 10.1 Twisted Core 14.0.2 (2014-09-18).................................... 493 10.2 Twisted Conch 14.0.2 (2014-09-18)................................... 493 10.3 Twisted Lore 14.0.2 (2014-09-18).................................... 493 10.4 Twisted Mail 14.0.2 (2014-09-18).................................... 493 i 10.5 Twisted Names 14.0.2 (2014-09-18)................................... 493 10.6 Twisted News 14.0.2 (2014-09-18)................................... 493 10.7 Twisted Pair 14.0.2 (2014-09-18).................................... 494 10.8 Twisted Runner 14.0.2 (2014-09-18).................................. 494 10.9 Twisted Web 14.0.2 (2014-09-18).................................... 494 10.10 Twisted Words 14.0.2 (2014-09-18)................................... 494 10.11 Twisted Core 14.0.1 (2014-09-17).................................... 494 10.12 Twisted Conch 14.0.1 (2014-09-17)................................... 494 10.13 Twisted Lore 14.0.1 (2014-09-17).................................... 494 10.14 Twisted Mail 14.0.1 (2014-09-17).................................... 494 10.15 Twisted Names 14.0.1 (2014-09-17)................................... 495 10.16 Twisted News 14.0.1 (2014-09-17)................................... 495 10.17 Twisted Pair 14.0.1 (2014-09-17).................................... 495 10.18 Twisted Runner 14.0.1 (2014-09-17).................................. 495 10.19 Twisted Web 14.0.1 (2014-09-17).................................... 495 10.20 Twisted Words 14.0.1 (2014-09-17)................................... 495 10.21 Twisted Core 14.0.0 (2014-05-08).................................... 495 10.22 Twisted Conch 14.0.0 (2014-05-08)................................... 497 10.23 Twisted Lore 14.0.0 (2014-05-08).................................... 498 10.24 Twisted Mail 14.0.0 (2014-05-08).................................... 498 10.25 Twisted Names 14.0.0 (2014-05-08)................................... 498 10.26 Twisted News 14.0.0 (2014-05-08)................................... 499 10.27 Twisted Pair 14.0.0 (2014-05-08).................................... 499 10.28 Twisted Runner 14.0.0 (2014-05-08).................................. 500 10.29 Twisted Web 14.0.0 (2014-05-08).................................... 500 10.30 Twisted Words 14.0.0 (2014-05-08)................................... 500 10.31 Twisted Core 13.2.0 (2013-10-29).................................... 501 10.32 Twisted Conch 13.2.0 (2013-10-29)................................... 502 10.33 Twisted Lore 13.2.0 (2013-10-29).................................... 502 10.34 Twisted Mail 13.2.0 (2013-10-29).................................... 503 10.35 Twisted Names 13.2.0 (2013-10-29)................................... 503 10.36 Twisted News 13.2.0 (2013-10-29)................................... 504 10.37 Twisted Pair 13.2.0 (2013-10-29).................................... 504 10.38 Twisted Runner 13.2.0 (2013-10-29).................................. 504 10.39 Twisted Web 13.2.0 (2013-10-29).................................... 504 10.40 Twisted Words 13.2.0 (2013-10-29)................................... 505 10.41 Twisted Core 13.1.0 (2013-06-23).................................... 505 10.42 Twisted Conch 13.1.0 (2013-06-23)................................... 506 10.43 Twisted Lore 13.1.0 (2013-06-23).................................... 507 10.44 Twisted Mail 13.1.0 (2013-06-23).................................... 507 10.45 Twisted Names 13.1.0 (2013-06-23)................................... 507 10.46 Twisted News 13.1.0 (2013-06-23)................................... 507 10.47 Twisted Pair 13.1.0 (2013-06-23).................................... 508 10.48 Twisted Runner 13.1.0 (2013-06-23).................................. 508 10.49 Twisted Web 13.1.0 (2013-06-23).................................... 508 10.50 Twisted Words 13.1.0 (2013-06-23)................................... 509 10.51 Twisted Core 13.0.0 (2013-03-19).................................... 509 10.52 Twisted Conch 13.0.0 (2013-03-19)................................... 510 10.53 Twisted Lore 13.0.0 (2013-03-19).................................... 510 10.54 Twisted Mail 13.0.0 (2013-03-19).................................... 511 10.55 Twisted Names 13.0.0 (2013-03-19)................................... 511 10.56 Twisted News 13.0.0 (2013-03-19)................................... 512 10.57 Twisted Pair 13.0.0 (2013-03-19).................................... 512 10.58 Twisted Runner 13.0.0 (2013-03-19).................................. 512 ii 10.59 Twisted Web 13.0.0 (2013-03-19).................................... 512 10.60 Twisted Words 13.0.0 (2013-03-19)................................... 512 10.61 Twisted Core 12.3.0 (2012-12-20).................................... 513 10.62 Twisted Conch 12.3.0 (2012-12-20)................................... 514 10.63 Twisted Lore 12.3.0 (2012-12-20).................................... 515 10.64 Twisted Mail 12.3.0 (2012-12-20).................................... 515 10.65 Twisted Names 12.3.0 (2012-12-20)................................... 515 10.66 Twisted News 12.3.0 (2012-12-20)................................... 516 10.67 Twisted Pair 12.3.0 (2012-12-20).................................... 516 10.68 Twisted Runner 12.3.0 (2012-12-20).................................. 516 10.69 Twisted Web 12.3.0 (2012-12-20).................................... 516 10.70 Twisted Words 12.3.0 (2012-12-20)................................... 517 10.71 Twisted Core 12.2.0 (2012-08-26).................................... 517 10.72 Twisted Conch 12.2.0 (2012-08-26)................................... 518 10.73 Twisted Lore 12.2.0 (2012-08-26).................................... 519 10.74 Twisted Mail 12.2.0 (2012-08-26).................................... 519 10.75 Twisted Names 12.2.0 (2012-08-26)................................... 519 10.76 Twisted News 12.2.0 (2012-08-26)................................... 519 10.77 Twisted Pair 12.2.0 (2012-08-26).................................... 520 10.78 Twisted Runner 12.2.0 (2012-08-26).................................. 520 10.79 Twisted Web 12.2.0 (2012-08-26).................................... 520 10.80 Twisted Words 12.2.0 (2012-08-26)................................... 520 10.81 Twisted Core 12.1.0 (2012-06-02).................................... 520 10.82 Twisted Conch 12.1.0 (2012-06-02)................................... 522 10.83 Twisted Lore 12.1.0 (2012-06-02).................................... 523 10.84 Twisted Mail 12.1.0 (2012-06-02).................................... 523 10.85 Twisted Names 12.1.0 (2012-06-02)................................... 523 10.86 Twisted News 12.1.0 (2012-06-02)................................... 524 10.87 Twisted Pair 12.1.0 (2012-06-02).................................... 524 10.88 Twisted Runner 12.1.0 (2012-06-02).................................. 524 10.89 Twisted Web 12.1.0 (2012-06-02).................................... 524 10.90 Twisted Words 12.1.0 (2012-06-02)................................... 525 10.91 Twisted Core 12.0.0 (2012-02-10).................................... 525 10.92 Twisted Conch 12.0.0 (2012-02-10)................................... 526 10.93 Twisted Lore 12.0.0 (2012-02-10).................................... 527 10.94 Twisted Mail 12.0.0 (2012-02-10).................................... 527 10.95 Twisted Names 12.0.0 (2012-02-10)................................... 527 10.96 Twisted News 12.0.0 (2012-02-10)................................... 527 10.97 Twisted Pair 12.0.0 (2012-02-10).................................... 527 10.98 Twisted Runner 12.0.0 (2012-02-10).................................. 527 10.99 Twisted Web 12.0.0 (2012-02-10).................................... 528 10.100Twisted Words 12.0.0 (2012-02-10)................................... 528 10.101Twisted Core 11.1.0 (2011-11-15).................................... 528 10.102Twisted Conch 11.1.0 (2011-11-15)..................................
Recommended publications
  • Sofa, So Good Couchsurfing Ist Nicht Mehr Nur Etwas Für Nomaden Aus Dem Netz
    FRANKFURTER ALLGEMEINE SONNTAGSZEITUNG, 19. APRIL 2015, NR. 16 REISE V3 Sofa, so good Couchsurfing ist nicht mehr nur etwas für Nomaden aus dem Netz. Aber je größer die Gemeinschaft wird, desto schwieriger die Frage: Wem gehört sie eigentlich? Gegenstand der Diskussion: Findet auf dieser Couch kultureller Austausch statt? Oder ist sie nur ein kostenloser Schlafplatz? Fotos Göring enn es eng wird, lich gehört. Offiziell ist die Ant- der Plattform nicht: Er verglich beantwortete Fragen von Mitglie- weltweit. Andamanen, Feuerland, noch weitaus mehr Anhänger fin- sen auch, wo das Geld für ihre Ide- muss man eben zu- wort einfach: der Couchsurfing In- das junge Unternehmen mit der dern. Über 2500 Couchsurfer will Kamtschatka – es gibt tatsächlich den wird, und unterstützen andere en herkommen soll: aus der Com- sammenrücken. 50 ternational Inc. Das war aber nicht Datenkrake Facebook und nannte er in zehn Jahren in seiner Woh- kaum ein Fleckchen auf der Welt, Non-Profit-Projekte. Ein paar der munity, nicht von Investoren. „Die Menschen sitzen im immer so. Eine Firma ist die die neuen Geschäftsbedingungen nung nur wenige Kilometer von auf dem man nicht mit Couchsur- Gruppe haben schon bei Couchsur- Welt braucht dringend ein Sozia- KreuzbergerW Café „Mano“, kein Wohnbörse erst seit 2011, vorher „inakzeptabel und unzulässig“. Die der Golden Gate Bridge beher- fing Urlaub machen könnte. fing mitprogrammiert, dann beim les Netzwerk, das nicht auf Daten Platz ist mehr frei, an der Bar steht war sie sieben Jahre eine gemein- Community wehrte sich; auf Face- bergt haben – aber er hat keine Die Frage bleibt, ob viele Mit- Nachfolgeprojekt „BeWelcome“.
    [Show full text]
  • IT Acronyms.Docx
    List of computing and IT abbreviations /.—Slashdot 1GL—First-Generation Programming Language 1NF—First Normal Form 10B2—10BASE-2 10B5—10BASE-5 10B-F—10BASE-F 10B-FB—10BASE-FB 10B-FL—10BASE-FL 10B-FP—10BASE-FP 10B-T—10BASE-T 100B-FX—100BASE-FX 100B-T—100BASE-T 100B-TX—100BASE-TX 100BVG—100BASE-VG 286—Intel 80286 processor 2B1Q—2 Binary 1 Quaternary 2GL—Second-Generation Programming Language 2NF—Second Normal Form 3GL—Third-Generation Programming Language 3NF—Third Normal Form 386—Intel 80386 processor 1 486—Intel 80486 processor 4B5BLF—4 Byte 5 Byte Local Fiber 4GL—Fourth-Generation Programming Language 4NF—Fourth Normal Form 5GL—Fifth-Generation Programming Language 5NF—Fifth Normal Form 6NF—Sixth Normal Form 8B10BLF—8 Byte 10 Byte Local Fiber A AAT—Average Access Time AA—Anti-Aliasing AAA—Authentication Authorization, Accounting AABB—Axis Aligned Bounding Box AAC—Advanced Audio Coding AAL—ATM Adaptation Layer AALC—ATM Adaptation Layer Connection AARP—AppleTalk Address Resolution Protocol ABCL—Actor-Based Concurrent Language ABI—Application Binary Interface ABM—Asynchronous Balanced Mode ABR—Area Border Router ABR—Auto Baud-Rate detection ABR—Available Bitrate 2 ABR—Average Bitrate AC—Acoustic Coupler AC—Alternating Current ACD—Automatic Call Distributor ACE—Advanced Computing Environment ACF NCP—Advanced Communications Function—Network Control Program ACID—Atomicity Consistency Isolation Durability ACK—ACKnowledgement ACK—Amsterdam Compiler Kit ACL—Access Control List ACL—Active Current
    [Show full text]
  • Reference Information
    APPENDIX B Software Field Description Tables The window field description tables for the following are included in this section: • “Flow Record Match and Collect Field Descriptions” • “Configure Filter Window Fields” • “Configure Records Window Fields” • “Configure Collector Window Fields” • “Configure Exporter Window Fields” • “Configure Monitor Window Fields” • “Application ID Collect Field Information” Table B-1 lists the match and collect field descriptions for IPv4, IPv6, and Layer 2 flow records in the user interface, as well as the CLI. Table B-1 Flow Record Match and Collect Field Descriptions Match Fields (keys of the flow GUI and CLI record) IPv4 IPv6 Layer 2 CoS X X X Ethertype X X X Input SNMP Interface X X X IP Protocol X X IPv4 Destination Address X IPv4 Source Address X IPv4 TOS X IPv4 TTL X IPv6 Destination Address X IPv6 Hop Limit X IPv6 Source Address X IPv6 Traffic Class X Layer 4 Destination Port X X Layer 4 Source Port X X MAC Destination Address X X X Cisco NetFlow Generation Appliance User Guide B-1 Appendix B Software Field Description Tables Table B-1 Flow Record Match and Collect Field Descriptions (continued) Match Fields (keys of the flow GUI and CLI record) IPv4 IPv6 Layer 2 MAC Source Address X X X MPLS Label X X X Output SNMP Interface X X X VLAN ID X X X Collect Fields Application ID1 XXX Byte Count X X X First Timestamp X X X Flow Label X IPv4 ICMP Code X IPv4 ICMP Type X IPv6 ICMP Code X IPv6 ICMP Type X Last Timestamp X X X Network Encapsulation X X X Packet Count X X X TCP Header Flags X X X 1.
    [Show full text]
  • Troubleshooting TCP/IP
    4620-1 ch05.f.qc 10/28/99 12:00 PM Page 157 Chapter 5 Troubleshooting TCP/IP In This Chapter ᮣ Troubleshooting TCP/IP in Windows 2000 Server ᮣ TCP/IP troubleshooting steps ᮣ Defining which is the best TCP/IP troubleshooting tool to solve your problem ᮣ Mastering basic TCP/IP utilities roubleshooting is, it seems, an exercise in matrix mathematics. That is, Twe use a variety of approaches and influences to successfully solve our problems, almost in a mental columns-and-rows format. These approaches may include structured methodologies, inductive and deductive reasoning, common sense, experience, and luck. And this is what troubleshooting is made of. Troubleshooting TCP/IP problems is really no different from troubleshooting other Windows 2000 Server problems mentioned in this book, such as instal- lation failures described in Chapter 2. Needless to say, Windows 2000 Server offers several TCP/IP-related tools and utilities to assist us, but more on the specifics in a moment. TCP/IP Troubleshooting Basics The goal in TCP/IP troubleshooting is very simple: fix the problem. Too often, it is easy to become overly concerned about why something happened instead of just fixing the problem. And by fixing the problem, I mean cost effectively. 1. Be cost effective. Don’t forget that several hours’ worth of MCSE-level consulting could more than pay for the additional bandwidth that may easily solve your TCP/IP WAN-related problem. Don’t overlook such an easy fix when struggling to make a WAN connection between sites utilizing Windows 2000 Server. Too little bandwidth is typically the result of being penny wise and pound foolish.
    [Show full text]
  • 09-Mobile Networking
    Mobile Networking Programming for Engineers Winter 2015 Andreas Zeller, Saarland University Today’s Topics • Mobile Networking • HTTP • HTML • Webserver! The aim of a computer network is Murray Leinster to have computers communicate “A Logic Named Joe” (1946) with each other The computer ... manages the spreading of ninety-four percent of all TV programs, conveys all information about weather, air trafc, special deals… and records every business conversation, every contract… Computers have changed the world. Computers are the civilisation. If we turn them of, we will fall back to a kind of civilisation, of which we have forgotten how it even works. Murray Leinster, 1896–1975 Partial map of the Internet based on the January 15, 2005 data The Internet found on opte.org. Each line is drawn between two nodes, representing two IP addresses. The length of the lines are indicative of the delay between those two nodes. This graph represents less than 30% of the Class C networks reachable by the data collection program in early 2005. Wireless Internet • WLAN = Wireless Local Area Network • Allows “local” computers to communicate The Arduino ESP8266 shield allows the Arduino to connect to Wireless Modem networks, and also to set up its own network The modem is controlled by so- Controlling a Modem called AT commands Modems receive • data to be sent • commands to control them View from above – connectors are Programming for Engineers WS15/16 Prof. Dr. Andreas Zeller saarland Software Engineering Chair Resp. Tutor: Curd Becker university at the bottom ConnectingSaarland University theAssignment Modem Sheet 6 computer science The connectors for the ESP8266 wireless module are shown in more detail here.
    [Show full text]
  • Hybrid Organising in the Sharing Economy: a Case Study of Couchsurfing.Com
    4th July 2021 Hybrid organising in the sharing economy: A case study of Couchsurfing.com Author: Feriel Bouricha Student number: 6668623 E-mail: [email protected] Degree: MSc Innovation Sciences Supervisor: Dr.Taneli Vaskelainen Second reader: Prof.Dr.Koen Frenken Abstract In the past few years there has been an increase in hybrid organisations. Hybrid organisations are characterised by their tendency to combine opposing organisational elements, such as corporate elements with a societal mission. Their inherent complexity results in internal conflicts between hybrid identities, and these conflicts affect the extent to which the opposing organisational goal are sustained over time. Sharing Economy (SE) organisations engage in hybrid organising as they often operate within contradicting logics. The extant literature has investigated the hybridity of SE organisations from an institutional logics perspective, yet little attention has been given on how hybridity manifests at an internal level. This thesis fills this knowledge gap by examining the impact of the identity conflicts that result from the hybridisation process of Couchsurfing (CS), a mission-oriented free accommodation sharing platform. For this, a qualitative analysis of archival data that spans the period between 2006 and 2020 and interviews with former CS volunteers are conducted to identify the identities that shaped tensions in the organisation of the platform’s hybridity. The main findings suggest that the identity at CS shifted over time from a uniform community identity, to three main identities. The identified identities: Community, Missionary and Corporate were found to conflict over time on three main dimensions these being a conflict over the source of authority of the platform, the role of growth of traffic on the platform, and the role of monetisation.
    [Show full text]
  • Dos Amplification Attacks – Protocol-Agnostic Detection Of
    DoS Amplification Attacks – Protocol-Agnostic Detection of Service Abuse in Amplifier Networks B Timm B¨ottger1( ), Lothar Braun1 , Oliver Gasser1, Felix von Eye2, Helmut Reiser2, and Georg Carle1 1 Technische Universit¨at M¨unchen, Munich, Germany {boettget,braun,gasser,carle}@net.in.tum.de 2 Leibniz Supercomputing Centre, Munich, Germany {voneye,reiser}@lrz.de Abstract. For many years Distributed Denial-of-Service attacks have been known to be a threat to Internet services. Recently a configura- tionflawinNTPdaemonsledtoattackswithtrafficratesofseveral hundred Gbit/s. For those attacks a third party, the amplifier, is used to significantly increase the volume of traffic reflected to the victim. Recent research revealed more UDP-based protocols that are vulnerable to amplification attacks. Detecting such attacks from an abused ampli- fier network’s point of view has only rarely been investigated. In this work we identify novel properties which characterize ampli- fication attacks and allow to identify the illegitimate use of arbitrary services. Their suitability for amplification attack detection is evaluated in large high-speed research networks. We prove that our approach is fully capa- ble of detecting attacks that were already seen in the wild as well as capable of detecting attacks we conducted ourselves exploiting newly discovered vulnerabilities. 1 Introduction Denial-of-Service attacks aim at making services unavailable to their intended users. Attackers can use different methods to consume bandwidth or deplete other resources of the victim. One method to exhaust bandwidth is called Dis- tributed Reflection Denial-of-Service (DRDoS) attack: an attacker sends forged requests to several servers with the victim’s spoofed source address.
    [Show full text]
  • Vulnerability Report TLP: White
    Vulnerability Report TLP: White Contents 1 Introduction ..................................... 4 2 Overview of Scanning Projects ............... 5 2.1 SSL POODLE Scan ................................................ 6 2.2 HTTP Scan ........................................................ 7 2.3 FTP Scan .......................................................... 8 2.4 RDP ................................................................ 9 2.5 mDNS ............................................................ 10 2.6 SNMP ............................................................. 11 2.7 AFP ............................................................... 12 2.8 NTP .............................................................. 13 2.9 Telnet ........................................................... 14 2.10 SSL Freak ....................................................... 15 2.11 Port Mapper .................................................... 16 2.12 VNC .............................................................. 17 2.13 DNS............................................................... 18 2.14 Netbios .......................................................... 19 2.15 SSDP ............................................................. 20 2.16 ISAKMP .......................................................... 21 2.17 TFTP ............................................................. 22 2.18 RSYNC ........................................................... 23 2.19 SMB .............................................................. 24 2.20 CWMP
    [Show full text]
  • Amplification Hell: Revisiting Network Protocols for Ddos Abuse
    Amplification Hell: Revisiting Network Protocols for DDoS Abuse Christian Rossow VU University Amsterdam, The Netherlands Horst Gortz¨ Institute for IT-Security, Ruhr University Bochum, Germany firstname.lastname @rub.de { } Abstract—In distributed reflective denial-of-service (DRDoS) In distributed reflective denial-of-service (DRDoS) attacks, attacks, adversaries send requests to public servers (e.g., open an adversary aims to exhaust the victim’s bandwidth. He recursive DNS resolvers) and spoof the IP address of a victim. abuses the fact that public servers of UDP-based network These servers, in turn, flood the victim with valid responses protocols respond to requests without further validating the and – unknowingly – exhaust its bandwidth. Recently, attackers identity (i.e., the IP address) of the sender. DRDoS offers many launched DRDoS attacks with hundreds of Gb/s bandwidth of this desired attack features for an adversary: (i) He disguises his kind. While the attack technique is well-known for a few protocols such as DNS, it is unclear if further protocols are vulnerable to identity, as victims receive backscatter traffic from amplifiers, similar or worse attacks. i.e., systems that can be abused to send traffic to the victim on the attacker’s behalf; (ii) The simultaneous abuse of multiple In this paper, we revisit popular UDP-based protocols of amplifiers permits a highly-distributed DoS attack to be con- network services, online games, P2P filesharing networks and ducted from a single Internet uplink. (iii) The traffic reflected P2P botnets to assess their security against DRDoS abuse. We find that 14 protocols are susceptible to bandwidth amplification to the victim is significantly larger in bandwidth than the traffic and multiply the traffic up to a factor 4670.
    [Show full text]
  • Ddos Beasts and How to Fight Them
    DDoS Beasts and How to Fight Them Artyom Gavrichenkov <[email protected]> Timeline of ancient history • First attacks: 1999-2000 • 2005: STRIDE model by Microsoft • Spoofing Identity • Tampering with Data • Repudiation • Information Disclosure • Denial of Service • Elevation of Privileges [D?]DoS The difference between “a distributed attack” and an, err, not distributed one is vague. Traditional meaning: a distributed attack comes from multiple sources. • What is a source? Is it an IP address or a machine? • If it is a machine, does a virtual instance count? Or a few instances under the same physical hypervisor? What if they often migrate between physical machines? If I’m a victim, how do I tell a single-sourced from a multiple-sourced? • If it is an IP, then how do we treat spoofed traffic? [D?]DoS Hence, a different sort of thinking applies: • DoS (as implied in STRIDE): a vulnerability in a software (e.g. NULL pointer dereference, like Ping of Death) • DDoS: computational resource exhaustion Risk management The basic idea behind STRIDE and other approaches is risk assessment, modelling and management. Probability/Impact Matrix Trivial Minor Moderate Significant Severe Rare Unlikely Moderate Likely Very Likely Probability/Impact Matrix Trivial Minor Moderate Significant Severe DDoS attack, Rare 2018 Unlikely • Impact: Moderate Likely Severe Very Likely • Probability: ? Motivation of an attacker • Fun! • Blackmail • Self-promotion • Political statement • Revenge • Market competition • Diverting attention (e.g. in case of theft) • Preventing access to a compromising information Motivation of an attacker • Fun! • Blackmail Rather hard to evaluate and control • Self-promotion • Political statement • Revenge • Market competition • Diverting attention More or less predictable! (e.g.
    [Show full text]
  • Threat Landscape and Good Practice Guide for Internet Infrastructure
    Threat Landscape and Good Practice Guide for Internet Infrastructure January 2015 European Union Agency for Network and Information Security www.enisa.europa.eu Threat Landscape and Good Practice Guide for Internet Infrastructure January 2015 About ENISA The European Union Agency for Network and Information Security (ENISA) is a centre of network and information security expertise for the EU, its member states, the private sector and Europe’s citizens. ENISA works with these groups to develop advice and recommendations on good practice in information security. It assists EU member states in implementing relevant EU legislation and works to improve the resilience of Europe’s critical information infrastructure and networks. ENISA seeks to enhance existing expertise in EU member states by supporting the development of cross-border communities committed to improving network and information security throughout the EU. More information about ENISA and its work can be found at www.enisa.europa.eu. Authors Dr. Cédric Lévy-Bencheton (ENISA), Dr. Louis Marinos (ENISA), Rossella Mattioli (ENISA), Dr. Thomas King (DE-CIX Management GmbH), Christoph Dietzel (DE-CIX Management GmbH), Jan Stumpf (DE-CIX Management GmbH) Contact For contacting the authors please use [email protected] For media enquires about this paper, please use [email protected] Acknowledgements For the completion of this study, ENISA has worked closely with: • The “Internet infrastructure security and resilience” reference group. • Individual experts that reviewed the results and provided valuable feedback: Randy Bush (Internet Initiative Japan), Patrick Fältström (Netnod), Peter Koch (DENIC), Benno Overeinder (NLnetLabs), Andrei Robachevsky (Internet Society). We are grateful for their valuable input and comments.
    [Show full text]
  • History of Be Volunteer
    History of Be Volunteer From Hospitality Club to HCvol (2000 - 2006) The history of BeVolunteer is a long and winding road through the wonderful world of hospitality exchange. Started by a group of volunteers from Hospitality Club, the organisation later takes on members of Couchsurfing and Servas, as well as other volunteers for whom BeWelcome is their first hospitality exchange network. July 2000 Together with his brother Kjell, Veit Kuehne, inspired by other hospitality exchange networks such as SERVAS and SIGHT founds the Hospitality Club (HC). 2002 till 2005 The later founders of the future "HCvol"/"BeVolunteer" start volunteering for HC, covering all areas of HC volunteering from programming, spam checking, accepting members, geo adjustment, forum moderation, translation to support for HC members. 2005 Several core volunteers from HC start to question the owner of HC about processes and systems. Important issues raised by volunteers include: the absence of any legal status of HC the absence of any democratic system for decision making the absence of any transparency in the management of finances the lack of transparency of HC policies for users of the website volunteers feeling manipulated These shortcomings seem particularly problematic to the founders of HCvol, because HC is not a start-up anymore but a real project that is growing rapidly. Concerned volunteers feel a responsibility to work on these issues so that HC can evolve and, with some time and effort, be implemented in HC over time to create a more democratic foundation for further growth. The concerned volunteers feel that work is needed on these issues, so as to address the problems that HC is beginning to face.
    [Show full text]