[104529] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: [NANOG] IOS rootkits

daemon@ATHENA.MIT.EDU (n3td3v)
Sat May 17 07:09:00 2008

Date: Sat, 17 May 2008 12:08:30 +0100
From: n3td3v <xploitable@gmail.com>
To: nanog@merit.edu
In-Reply-To: <bb0e440a0805170312t349574b0p2f7a685cd33e6a2@mail.gmail.com>
Errors-To: nanog-bounces@nanog.org

On Sat, May 17, 2008 at 11:12 AM, Suresh Ramasubramanian
<ops.lists@gmail.com> wrote:
> On Sat, May 17, 2008 at 12:47 PM, Matthew Moyle-Croft
> <mmc@internode.com.au> wrote:
>> If the way of running this isn't out in the wild and it's actually
>> dangerous then a pox on anyone who releases it, especially to gain
>> publicity at the expensive of network operators sleep and well being.
>> May you never find a reliable route ever again.
>
> This needs fixing. It doesnt need publicity at security conferences
> till after cisco gets presented this stuff first and asked to release
> an emergency patch.

Agreed,

You've got to remember though that a security conference is a
commercial venture, it makes business sense for this to be publically
announced at this security conference.

I think security conferences have become something that sucks as its
all become money making oriented and the people who run these things
don't really have security in mind, just the =A3 signs reflecting on
their eye balls.

> --srs
> --
> Suresh Ramasubramanian (ops.lists@gmail.com)
>

All the best,

n3td3v

_______________________________________________
NANOG mailing list
NANOG@nanog.org
http://mailman.nanog.org/mailman/listinfo/nanog

home help back first fref pref prev next nref lref last post