[104527] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: [NANOG] IOS rootkits

daemon@ATHENA.MIT.EDU (Suresh Ramasubramanian)
Sat May 17 06:12:56 2008

Date: Sat, 17 May 2008 15:42:02 +0530
From: "Suresh Ramasubramanian" <ops.lists@gmail.com>
To: "Matthew Moyle-Croft" <mmc@internode.com.au>
In-Reply-To: <482E866E.8000000@internode.com.au>
Cc: topo@coresecurity.com, ivan.arce@coresecurity.com, nanog@merit.edu,
	fx@recurity-labs.com
Errors-To: nanog-bounces@nanog.org

On Sat, May 17, 2008 at 12:47 PM, Matthew Moyle-Croft
<mmc@internode.com.au> wrote:
> If the way of running this isn't out in the wild and it's actually
> dangerous then a pox on anyone who releases it, especially to gain
> publicity at the expensive of network operators sleep and well being.
> May you never find a reliable route ever again.

This needs fixing. It doesnt need publicity at security conferences
till after cisco gets presented this stuff first and asked to release
an emergency patch.

--srs
-- 
Suresh Ramasubramanian (ops.lists@gmail.com)

_______________________________________________
NANOG mailing list
NANOG@nanog.org
http://mailman.nanog.org/mailman/listinfo/nanog

home help back first fref pref prev next nref lref last post