[163726] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: huawei

daemon@ATHENA.MIT.EDU (Jimmy Hess)
Sat Jun 15 02:57:07 2013

In-Reply-To: <CAMrdfRxy0CYGHw_aH=oyLhm1xVwNRWtH+D=on+8-9xKdB14tMA@mail.gmail.com>
Date: Sat, 15 Jun 2013 01:56:34 -0500
From: Jimmy Hess <mysidia@gmail.com>
To: Scott Helms <khelms@zcorum.com>
Cc: NANOG <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On 6/14/13, Scott Helms <khelms@zcorum.com> wrote:
> Is it possible?  Yes, but it's not feasible because the data rate would be
> too low.  That's what I'm trying to get across.  There are lots things that
> can be done but many of those are not useful.
[snip]

I agree that the data rate will be low. I don't agree that it's not feasible.

There will be indeed be _plenty_ of ways that a low bit rate channel
can do everything the right adversary needs.

A few bits for second is plenty of data rate for  sending control
commands/rule changes to a router backdoor mechanism, stealing
passwords, or leaking cryptographic keys   required to decrypt the VPN
data stream intercepted from elsewhere on the network,   leaking
counters, snmp communities, or interface descriptions,   or
criteria-selected forwarded data samples, etc....


--
-JH


home help back first fref pref prev next nref lref last post