[122058] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: lawful intercept/IOS at BlackHat DC, bypassing and recommendations

daemon@ATHENA.MIT.EDU (andrew.wallace)
Thu Feb 4 18:08:31 2010

Date: Thu, 4 Feb 2010 15:04:22 -0800 (PST)
From: "andrew.wallace" <andrew.wallace@rocketmail.com>
To: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Thu, Feb 4, 2010 at 8:19 PM, Gadi Evron <ge@linuxbox.org> wrote:=0A> "Th=
at peer-review is the basic purpose of my Blackhat talk and the=0A> associa=
ted paper. I plan to review Cisco=E2=80=99s architecture for lawful interce=
pt=0A> and explain the approach a bad guy would take to getting access with=
out=0A> authorization. I=E2=80=99ll identify several aspects of the design =
and=0A> implementation of the Lawful Intercept (LI) and Simple Network Mana=
gement=0A> Protocol Version 3 (SNMPv3) protocols that can be exploited to g=
ain access=0A> to the interface, and provide recommendations for mitigating=
 those=0A> vulnerabilities in design, implementation, and deployment."=0A>=
=0A> More here:=0A> http://blogs.iss.net/archive/blackhatlitalk.html=0A>=0A=
>        Gadi.=0A=0AFor the sake of clarity and transparency, =0A=0AGadi Ev=
ron has absolutely no connection to this research whatsoever. =0A=0AHe is f=
amous in the security community for piggybacking off other peoples research=
.=0A=0AWe are frustrated with him as much as we are annoyed.=0A=0AAndrew=0A=
=0ASecurity consultant=0A=0A=0A      


home help back first fref pref prev next nref lref last post