[104527] in North American Network Operators' Group
Re: [NANOG] IOS rootkits
daemon@ATHENA.MIT.EDU (Suresh Ramasubramanian)
Sat May 17 06:12:56 2008
Date: Sat, 17 May 2008 15:42:02 +0530
From: "Suresh Ramasubramanian" <ops.lists@gmail.com>
To: "Matthew Moyle-Croft" <mmc@internode.com.au>
In-Reply-To: <482E866E.8000000@internode.com.au>
Cc: topo@coresecurity.com, ivan.arce@coresecurity.com, nanog@merit.edu,
fx@recurity-labs.com
Errors-To: nanog-bounces@nanog.org
On Sat, May 17, 2008 at 12:47 PM, Matthew Moyle-Croft
<mmc@internode.com.au> wrote:
> If the way of running this isn't out in the wild and it's actually
> dangerous then a pox on anyone who releases it, especially to gain
> publicity at the expensive of network operators sleep and well being.
> May you never find a reliable route ever again.
This needs fixing. It doesnt need publicity at security conferences
till after cisco gets presented this stuff first and asked to release
an emergency patch.
--srs
--
Suresh Ramasubramanian (ops.lists@gmail.com)
_______________________________________________
NANOG mailing list
NANOG@nanog.org
http://mailman.nanog.org/mailman/listinfo/nanog