[104512] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: [NANOG] IOS rootkits

daemon@ATHENA.MIT.EDU (Dragos Ruiu)
Fri May 16 23:29:37 2008

From: Dragos Ruiu <dr@kyx.net>
To: Gadi Evron <ge@linuxbox.org>
In-Reply-To: <Pine.LNX.4.62.0805161954500.23118@linuxbox.org>
Date: Fri, 16 May 2008 20:29:07 -0700
Cc: fx@recurity-labs.com, Sebastian Muniz <topo@coresecurity.com>,
	nanog@merit.edu, Ivan Arce <ivan.arce@coresecurity.com>
Errors-To: nanog-bounces@nanog.org

The question this presentation begs for me... is how many of the folks  
on this list do integrity checking on their routers?

You can no longer say this isn't necessary :-).

I know FX and a few others are working on toolsets for this...

I'll probably have other comments after I see the presentation.
This development has all sort of implications for binary signing  
requirements, etc...

cheers,
--dr

--
World Security Pros. Cutting Edge Training, Tools, and Techniques
London, U.K.   May 21/22 - 2008    http://cansecwest.com
pgpkey http://dragos.com/ kyxpgp



_______________________________________________
NANOG mailing list
NANOG@nanog.org
http://mailman.nanog.org/mailman/listinfo/nanog

home help back first fref pref prev next nref lref last post