[104521] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: [NANOG] IOS rootkits

daemon@ATHENA.MIT.EDU (Matthew Moyle-Croft)
Sat May 17 03:17:29 2008

Date: Sat, 17 May 2008 16:47:02 +0930
From: Matthew Moyle-Croft <mmc@internode.com.au>
To: Paul Wall <pauldotwall@gmail.com>
In-Reply-To: <620fd17c0805162357p5d4b62ebh1e2b557286ca3506@mail.gmail.com>
Cc: fx@recurity-labs.com, topo@coresecurity.com, ivan.arce@coresecurity.com,
	nanog@merit.edu
Errors-To: nanog-bounces@nanog.org

Paul Wall wrote:
> What if some good comes from this "root kit"?
>   
I'm sure it'll be good for a number of security providers to hawk their 
wares.

If the way of running this isn't out in the wild and it's actually 
dangerous then a pox on anyone who releases it, especially to gain 
publicity at the expensive of network operators sleep and well being.   
May you never find a reliable route ever again.

MMC

_______________________________________________
NANOG mailing list
NANOG@nanog.org
http://mailman.nanog.org/mailman/listinfo/nanog

home help back first fref pref prev next nref lref last post