[167899] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: NSA able to compromise Cisco, Juniper, Huawei switches

daemon@ATHENA.MIT.EDU (Randy Bush)
Tue Dec 31 14:07:28 2013

Date: Tue, 31 Dec 2013 09:07:05 -1000
From: Randy Bush <randy@psg.com>
To: Florian Weimer <fw@deneb.enyo.de>
In-Reply-To: <877gak27az.fsf@mid.deneb.enyo.de>
Cc: Clay Kossmeyer <ckossmey@cisco.com>,
 North American Network Operators' Group <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

--pgp-sign-Multipart_Tue_Dec_31_09:07:01_2013-1
Content-Type: text/plain; charset=US-ASCII

> There's a limit to what can reasonably be called a *product*
> vulnerability.

right.  if the product was wearing a low-cut blouse and a short skirt,
it's not.

it's weasel words (excuse the idiom).  shoveling kitty litter over a big
steaming pile.

let me insert a second advert for jake's 30c3 preso,
https://www.youtube.com/watch?v=b0w36GAyZIA

randy


--pgp-sign-Multipart_Tue_Dec_31_09:07:01_2013-1
Content-Type: application/pgp-signature
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (Darwin)
Comment: GPGTools - http://gpgtools.org

iQEcBAABCgAGBQJSwxXYAAoJEMzMBey4OgLtXfwH/0SpQGnTHWnUXqnseWcnjtcR
T7DFkEV7ENIuOJPxFzNbQO2K/LcZWzRzkdndIILKZWoCoweLoscQRrQSRmgx8d3K
vVZMhKbntultS7keq+YmuGyJ5WXCbECQlYI7iFtFIOEmuMlKmOanKFfggM+e129l
uGKQNQ15mDBVjbHW7nTZJINw55m3AvCBSnekxr2Wya7JcEs3i6pl7wQdeMEb4ymP
wvO1GNBXUgizWyci5D3gh+FC7SCTGQwkQlf34Wr1ovt9tMQ51ds0q0A7SGl5xXx2
DTQuvEfdNeNg5+JpE4jgSvwtVozHTmekSwi1EwGULlHflV2l3E6fiBKOp9okDYw=
=8M2x
-----END PGP SIGNATURE-----

--pgp-sign-Multipart_Tue_Dec_31_09:07:01_2013-1--


home help back first fref pref prev next nref lref last post