[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
NSA able to compromise Cisco, Juniper, Huawei switches
On Mon, 30 Dec 2013 14:34:52 +0000, "Dobbins, Roland" said:
> My assumption is that this allegation about Cisco and Juniper is the result
> of non-specialists reading about lawful intercept for the first time, and
> failing to do their homework.
That does raise an interesting question. What percentage of Cisco gear
that supports a CALEA lawful intercept mode is installed in situations where
CALEA doesn't apply, and thus there's a high likelyhood that said support
is misconfigured and abusable without being noticed?
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 848 bytes
Desc: not available
URL: <http://mailman.nanog.org/pipermail/nanog/attachments/20131230/c8f7e7a7/attachment.bin>
- References:
- NSA able to compromise Cisco, Juniper, Huawei switches
- From: stenrulz at gmail.com (sten rulz)
- NSA able to compromise Cisco, Juniper, Huawei switches
- From: saku at ytti.fi (Saku Ytti)
- NSA able to compromise Cisco, Juniper, Huawei switches
- From: ag4ve.us at gmail.com (Shawn Wilson)
- NSA able to compromise Cisco, Juniper, Huawei switches
- From: saku at ytti.fi (Saku Ytti)
- NSA able to compromise Cisco, Juniper, Huawei switches
- From: rdobbins at arbor.net (Dobbins, Roland)
- NSA able to compromise Cisco, Juniper, Huawei switches
- From: rps at maine.edu (Ray Soucy)
- NSA able to compromise Cisco, Juniper, Huawei switches
- From: rdobbins at arbor.net (Dobbins, Roland)