[154586] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Cisco Update

daemon@ATHENA.MIT.EDU (Jimmy Hess)
Fri Jul 6 00:12:27 2012

In-Reply-To: <201207060101.q6611bIB086234@aurora.sol.net>
Date: Thu, 5 Jul 2012 23:11:48 -0500
From: Jimmy Hess <mysidia@gmail.com>
To: Joe Greco <jgreco@ns.sol.net>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On 7/5/12, Joe Greco <jgreco@ns.sol.net> wrote:
> It'll get real interesting when Cisco's cloud database is breached and
> some weakness in the password encryption is discovered.
[snip]

Will the users' passwords even matter,  if a compromise of the
database allows an intruder to make a system-wide change to end users'
equipment, such as delivering a compromising configuration change,  or
a  "patched"  firmware update   that deactivates cloud service and
turns them all into botnet nodes  under exclusive control of the
compromiser ?

Hopefully Cisco thought that stuff out,  but   password encryption
weaknesses at least are easily addressed by forcing all users to reset
pw,  and requiring a proof of physical access to the unit.

--
-JH


home help back first fref pref prev next nref lref last post