[167923] in North American Network Operators' Group
Re: NSA able to compromise Cisco, Juniper, Huawei switches
daemon@ATHENA.MIT.EDU (Paul Ferguson)
Tue Dec 31 19:11:16 2013
Date: Tue, 31 Dec 2013 16:10:45 -0800
From: Paul Ferguson <fergdawgster@mykolab.com>
To: nanog@nanog.org
In-Reply-To: <871u0swow3.fsf@mid.deneb.enyo.de>
Reply-To: fergdawgster@mykolab.com
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On 12/31/2013 4:02 PM, Florian Weimer wrote:
> * Warren Bailey:
>
>> Explaining, not a denial written by their legal department. I find it
>> insanely difficult to believe cisco systems has a backdoor into some of
>> their product lines with no knowledge or participation.
>
> As far as I understand it, these are firmware tweaks or implants
> sitting on a privileged bus (think PCI with busmaster DMA). Such
> things can be added after the device has left the factory by a
> sufficiently knowledgeable third party.
>
That's really interesting. Where are these Cisco devices manufactured?
- - ferg
-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 10.2.0 (Build 2317)
Charset: utf-8
wj8DBQFSw1z/q1pz9mNUZTMRAvbIAKCYZn3slg1wMak/nlc/hb3ZHkS29wCg3ucb
OJTl+SLgBtQDMGi+cTdDRtQ=
=VAdw
-----END PGP SIGNATURE-----
--
Paul Ferguson
PGP Public Key ID: 0x63546533