[104512] in North American Network Operators' Group
Re: [NANOG] IOS rootkits
daemon@ATHENA.MIT.EDU (Dragos Ruiu)
Fri May 16 23:29:37 2008
From: Dragos Ruiu <dr@kyx.net>
To: Gadi Evron <ge@linuxbox.org>
In-Reply-To: <Pine.LNX.4.62.0805161954500.23118@linuxbox.org>
Date: Fri, 16 May 2008 20:29:07 -0700
Cc: fx@recurity-labs.com, Sebastian Muniz <topo@coresecurity.com>,
nanog@merit.edu, Ivan Arce <ivan.arce@coresecurity.com>
Errors-To: nanog-bounces@nanog.org
The question this presentation begs for me... is how many of the folks
on this list do integrity checking on their routers?
You can no longer say this isn't necessary :-).
I know FX and a few others are working on toolsets for this...
I'll probably have other comments after I see the presentation.
This development has all sort of implications for binary signing
requirements, etc...
cheers,
--dr
--
World Security Pros. Cutting Edge Training, Tools, and Techniques
London, U.K. May 21/22 - 2008 http://cansecwest.com
pgpkey http://dragos.com/ kyxpgp
_______________________________________________
NANOG mailing list
NANOG@nanog.org
http://mailman.nanog.org/mailman/listinfo/nanog