[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
NSA able to compromise Cisco, Juniper, Huawei switches
On Dec 30, 2013, at 10:44 PM, <Valdis.Kletnieks at vt.edu> <Valdis.Kletnieks at vt.edu> wrote:
> What percentage of Cisco gear that supports a CALEA lawful intercept mode is installed in situations where CALEA doesn't apply, and thus there's a high likelyhood that said support is misconfigured and abusable without being noticed?
AFAIK, it must be explicitly enabled in order to be functional. It isn't the sort of thing which is enabled by default, nor can it be enabled without making explicit configuration changes.
-----------------------------------------------------------------------
Roland Dobbins <rdobbins at arbor.net> // <http://www.arbornetworks.com>
Luck is the residue of opportunity and design.
-- John Milton
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 243 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://mailman.nanog.org/pipermail/nanog/attachments/20131230/14ddfbca/attachment.bin>
- References:
- NSA able to compromise Cisco, Juniper, Huawei switches
- From: stenrulz at gmail.com (sten rulz)
- NSA able to compromise Cisco, Juniper, Huawei switches
- From: saku at ytti.fi (Saku Ytti)
- NSA able to compromise Cisco, Juniper, Huawei switches
- From: ag4ve.us at gmail.com (Shawn Wilson)
- NSA able to compromise Cisco, Juniper, Huawei switches
- From: saku at ytti.fi (Saku Ytti)
- NSA able to compromise Cisco, Juniper, Huawei switches
- From: rdobbins at arbor.net (Dobbins, Roland)
- NSA able to compromise Cisco, Juniper, Huawei switches
- From: rps at maine.edu (Ray Soucy)
- NSA able to compromise Cisco, Juniper, Huawei switches
- From: rdobbins at arbor.net (Dobbins, Roland)
- NSA able to compromise Cisco, Juniper, Huawei switches
- From: Valdis.Kletnieks at vt.edu (Valdis.Kletnieks at vt.edu)