[167922] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: NSA able to compromise Cisco, Juniper, Huawei switches

daemon@ATHENA.MIT.EDU (Florian Weimer)
Tue Dec 31 19:02:24 2013

From: Florian Weimer <fw@deneb.enyo.de>
To: Warren Bailey <wbailey@satelliteintelligencegroup.com>
Date: Wed, 01 Jan 2014 01:02:04 +0100
In-Reply-To: <CEE897AC.10824%wbailey@satelliteintelligencegroup.com> (Warren
 Bailey's message of "Tue, 31 Dec 2013 23:04:00 +0000")
Cc: "nanog@nanog.org list" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

* Warren Bailey:

> Explaining, not a denial written by their legal department. I find it
> insanely difficult to believe cisco systems has a backdoor into some of
> their product lines with no knowledge or participation.

As far as I understand it, these are firmware tweaks or implants
sitting on a privileged bus (think PCI with busmaster DMA).  Such
things can be added after the device has left the factory by a
sufficiently knowledgeable third party.


home help back first fref pref prev next nref lref last post