[122065] in North American Network Operators' Group
Re: lawful intercept/IOS at BlackHat DC, bypassing and recommendations
daemon@ATHENA.MIT.EDU (andrew.wallace)
Thu Feb 4 18:59:19 2010
Date: Thu, 4 Feb 2010 15:58:44 -0800 (PST)
From: "andrew.wallace" <andrew.wallace@rocketmail.com>
To: a.harrowell@gmail.com
In-Reply-To: <stB3CPY5tyGW.4SQSr5HM@smtp.gmail.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
On Thu, Feb 4, 2010 at 11:25 PM, <a.harrowell@gmail.com> wrote:=0A> -origi=
nal message-=0A> Subject: Re: lawful intercept/IOS at BlackHat DC, bypassin=
g and recommendations=0A> From: "andrew.wallace" <andrew.wallace@rocketmail=
.com>=0A> Date: 04/02/2010 11:09 pm=0A>=0A> On Thu, Feb 4, 2010 at 8:19 PM,=
Gadi Evron <ge@linuxbox.org> wrote:=0A>> "That peer-review is the basic pu=
rpose of my Blackhat talk and the=0A>> associated paper. I plan to review C=
isco=E2=80=99s architecture for lawful intercept=0A>> and explain the appro=
ach a bad guy would take to getting access without=0A>> authorization. I=E2=
=80=99ll identify several aspects of the design and=0A>> implementation of =
the Lawful Intercept (LI) and Simple Network Management=0A>> Protocol Versi=
on 3 (SNMPv3) protocols that can be exploited to gain access=0A>> to the in=
terface, and provide recommendations for mitigating those=0A>> vulnerabilit=
ies in design, implementation, and deployment."=0A>>=0A>> More here:=0A>> h=
ttp://blogs.iss.net/archive/blackhatlitalk.html=0A>>=0A>> Gadi.=0A>=
=0A> For the sake of clarity and transparency,=0A>=0A> Gadi Evron has absol=
utely no connection to this research whatsoever.=0A>=0A> He is famous in th=
e security community for piggybacking off other peoples research.=0A>=0A> W=
e are frustrated with him as much as we are annoyed.=0A>=0A> Andrew=0A>=0A>=
Security consultant=0A>=0A> CITATION NEEDED=0A>=0A=0A=0AYou can goto Full-=
disclosure mailing list =0Ahttp://www.grok.org.uk/full-disclosure/ and ask =
about "Gadi Evron".=0A=0AThere will be plenty folks there who will tell you=
he is involved in =0Aplagiarism.=0A=0AAndrew=0A=0ASecurity consultant=0A=
=0A=0A=0A