[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
NSA able to compromise Cisco, Juniper, Huawei switches
On Dec 30, 2013, at 11:03 PM, Dobbins, Roland <rdobbins at arbor.net> wrote:
> AFAIK, it must be explicitly enabled in order to be functional. It isn't the sort of thing which is enabled by default, nor can it be enabled without making explicit configuration changes.
It's also possible they're talking about something along these lines:
<http://ids.cs.columbia.edu/sites/default/files/paper.pdf>
-----------------------------------------------------------------------
Roland Dobbins <rdobbins at arbor.net> // <http://www.arbornetworks.com>
Luck is the residue of opportunity and design.
-- John Milton
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 243 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://mailman.nanog.org/pipermail/nanog/attachments/20131230/47dfe8f8/attachment.bin>
- References:
- NSA able to compromise Cisco, Juniper, Huawei switches
- From: stenrulz at gmail.com (sten rulz)
- NSA able to compromise Cisco, Juniper, Huawei switches
- From: saku at ytti.fi (Saku Ytti)
- NSA able to compromise Cisco, Juniper, Huawei switches
- From: ag4ve.us at gmail.com (Shawn Wilson)
- NSA able to compromise Cisco, Juniper, Huawei switches
- From: saku at ytti.fi (Saku Ytti)
- NSA able to compromise Cisco, Juniper, Huawei switches
- From: rdobbins at arbor.net (Dobbins, Roland)
- NSA able to compromise Cisco, Juniper, Huawei switches
- From: rps at maine.edu (Ray Soucy)
- NSA able to compromise Cisco, Juniper, Huawei switches
- From: rdobbins at arbor.net (Dobbins, Roland)
- NSA able to compromise Cisco, Juniper, Huawei switches
- From: Valdis.Kletnieks at vt.edu (Valdis.Kletnieks at vt.edu)
- NSA able to compromise Cisco, Juniper, Huawei switches
- From: rdobbins at arbor.net (Dobbins, Roland)