[167934] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: NSA able to compromise Cisco, Juniper, Huawei switches

daemon@ATHENA.MIT.EDU (Warren Bailey)
Wed Jan 1 02:18:18 2014

From: Warren Bailey <wbailey@satelliteintelligencegroup.com>
To: "fergdawgster@mykolab.com" <fergdawgster@mykolab.com>, "nanog@nanog.org"
 <nanog@nanog.org>
Date: Wed, 1 Jan 2014 07:17:48 +0000
In-Reply-To: <52C35D05.7080303@mykolab.com>
Reply-To: Warren Bailey <wbailey@satelliteintelligencegroup.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

China. ;) lol


Sent from my Mobile Device.


-------- Original message --------
From: Paul Ferguson <fergdawgster@mykolab.com>
Date: 12/31/2013 4:13 PM (GMT-08:00)
To: nanog@nanog.org
Subject: Re: NSA able to compromise Cisco, Juniper, Huawei switches


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 12/31/2013 4:02 PM, Florian Weimer wrote:

 > * Warren Bailey:
 >
 >> Explaining, not a denial written by their legal department. I find it
 >> insanely difficult to believe cisco systems has a backdoor into some of
 >> their product lines with no knowledge or participation.
 >
 > As far as I understand it, these are firmware tweaks or implants
 > sitting on a privileged bus (think PCI with busmaster DMA).  Such
 > things can be added after the device has left the factory by a
 > sufficiently knowledgeable third party.
 >

That's really interesting. Where are these Cisco devices manufactured?

- - ferg

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 10.2.0 (Build 2317)
Charset: utf-8

wj8DBQFSw1z/q1pz9mNUZTMRAvbIAKCYZn3slg1wMak/nlc/hb3ZHkS29wCg3ucb
OJTl+SLgBtQDMGi+cTdDRtQ=3D
=3DVAdw
-----END PGP SIGNATURE-----



--
Paul Ferguson
PGP Public Key ID: 0x63546533



home help back first fref pref prev next nref lref last post