[167892] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: NSA able to compromise Cisco, Juniper, Huawei switches

daemon@ATHENA.MIT.EDU (Jared Mauch)
Tue Dec 31 13:21:13 2013

From: Jared Mauch <jared@puck.nether.net>
In-Reply-To: <20131231174911.GA33584@ernw.de>
Date: Tue, 31 Dec 2013 13:21:15 -0500
To: Enno Rey <erey@ernw.de>
Cc: North American Network Operators' Group <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org


On Dec 31, 2013, at 12:49 PM, Enno Rey <erey@ernw.de> wrote:

> Hi,
>=20
> some approaches were discussed in 2010, by Graeme Neilson from NZ =
here:
>=20
> =
https://www.troopers.de/wp-content/uploads/2012/10/TROOPERS10_Netscreen_of=
_the_Dead_Graeme_Neilson.pdf
>=20
> a later year, at the same conference, he gave a private session =
demonstrating basically the same stuff for JunOS, as ongoing (and, at =
the time, non-public) research.
>=20
> happy NYE to everybody

What I found mildly amusing this summer was most of the outlines of the =
summer "Snowden" stuff was covered in this book:

=
http://www.amazon.com/dp/B00DNL1AXE/ref=3Dnosim?tag=3Dpucknethernet-20&lin=
kCode=3Dsb1&camp=3D212353&creative=3D380549

If you have no plans for tomorrow and like this type of stuff, go ahead =
and take a quick read :)

Much of this stuff isn't new.  There have been industry groups working =
on these supply chain assurance and risk models for years.  If you are =
truly paranoid you will be working with these groups already.  Pointers =
available in private if you want them.

- Jared=


home help back first fref pref prev next nref lref last post