[167798] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: NSA able to compromise Cisco, Juniper, Huawei switches

daemon@ATHENA.MIT.EDU (Dobbins, Roland)
Mon Dec 30 11:03:20 2013

From: "Dobbins, Roland" <rdobbins@arbor.net>
To: "nanog@nanog.org list" <nanog@nanog.org>
Date: Mon, 30 Dec 2013 16:03:07 +0000
In-Reply-To: <152239.1388418248@turing-police.cc.vt.edu>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

--Apple-Mail=_0563CA31-9460-46C7-A104-AC1E59BC54E5
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii


On Dec 30, 2013, at 10:44 PM, <Valdis.Kletnieks@vt.edu> =
<Valdis.Kletnieks@vt.edu> wrote:

> What percentage of Cisco gear that supports a CALEA lawful intercept =
mode is installed in situations where CALEA doesn't apply, and thus =
there's a high likelyhood that said support is misconfigured and =
abusable without being noticed?

AFAIK, it must be explicitly enabled in order to be functional.  It =
isn't the sort of thing which is enabled by default, nor can it be =
enabled without making explicit configuration changes.

-----------------------------------------------------------------------
Roland Dobbins <rdobbins@arbor.net> // <http://www.arbornetworks.com>

	  Luck is the residue of opportunity and design.

		       -- John Milton


--Apple-Mail=_0563CA31-9460-46C7-A104-AC1E59BC54E5
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="signature.asc"
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools - http://gpgtools.org

iEYEARECAAYFAlLBmSIACgkQqFo5ORybTB1W8wCfSacj5DaA4kg2JeaAZlUVjHVi
MYUAoJafvPnS6QgMgnQcZA5KUWbsicXh
=2UEX
-----END PGP SIGNATURE-----

--Apple-Mail=_0563CA31-9460-46C7-A104-AC1E59BC54E5--


home help back first fref pref prev next nref lref last post