[167892] in North American Network Operators' Group
Re: NSA able to compromise Cisco, Juniper, Huawei switches
daemon@ATHENA.MIT.EDU (Jared Mauch)
Tue Dec 31 13:21:13 2013
From: Jared Mauch <jared@puck.nether.net>
In-Reply-To: <20131231174911.GA33584@ernw.de>
Date: Tue, 31 Dec 2013 13:21:15 -0500
To: Enno Rey <erey@ernw.de>
Cc: North American Network Operators' Group <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
On Dec 31, 2013, at 12:49 PM, Enno Rey <erey@ernw.de> wrote:
> Hi,
>=20
> some approaches were discussed in 2010, by Graeme Neilson from NZ =
here:
>=20
> =
https://www.troopers.de/wp-content/uploads/2012/10/TROOPERS10_Netscreen_of=
_the_Dead_Graeme_Neilson.pdf
>=20
> a later year, at the same conference, he gave a private session =
demonstrating basically the same stuff for JunOS, as ongoing (and, at =
the time, non-public) research.
>=20
> happy NYE to everybody
What I found mildly amusing this summer was most of the outlines of the =
summer "Snowden" stuff was covered in this book:
=
http://www.amazon.com/dp/B00DNL1AXE/ref=3Dnosim?tag=3Dpucknethernet-20&lin=
kCode=3Dsb1&camp=3D212353&creative=3D380549
If you have no plans for tomorrow and like this type of stuff, go ahead =
and take a quick read :)
Much of this stuff isn't new. There have been industry groups working =
on these supply chain assurance and risk models for years. If you are =
truly paranoid you will be working with these groups already. Pointers =
available in private if you want them.
- Jared=