[167934] in North American Network Operators' Group
Re: NSA able to compromise Cisco, Juniper, Huawei switches
daemon@ATHENA.MIT.EDU (Warren Bailey)
Wed Jan 1 02:18:18 2014
From: Warren Bailey <wbailey@satelliteintelligencegroup.com>
To: "fergdawgster@mykolab.com" <fergdawgster@mykolab.com>, "nanog@nanog.org"
<nanog@nanog.org>
Date: Wed, 1 Jan 2014 07:17:48 +0000
In-Reply-To: <52C35D05.7080303@mykolab.com>
Reply-To: Warren Bailey <wbailey@satelliteintelligencegroup.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
China. ;) lol
Sent from my Mobile Device.
-------- Original message --------
From: Paul Ferguson <fergdawgster@mykolab.com>
Date: 12/31/2013 4:13 PM (GMT-08:00)
To: nanog@nanog.org
Subject: Re: NSA able to compromise Cisco, Juniper, Huawei switches
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On 12/31/2013 4:02 PM, Florian Weimer wrote:
> * Warren Bailey:
>
>> Explaining, not a denial written by their legal department. I find it
>> insanely difficult to believe cisco systems has a backdoor into some of
>> their product lines with no knowledge or participation.
>
> As far as I understand it, these are firmware tweaks or implants
> sitting on a privileged bus (think PCI with busmaster DMA). Such
> things can be added after the device has left the factory by a
> sufficiently knowledgeable third party.
>
That's really interesting. Where are these Cisco devices manufactured?
- - ferg
-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 10.2.0 (Build 2317)
Charset: utf-8
wj8DBQFSw1z/q1pz9mNUZTMRAvbIAKCYZn3slg1wMak/nlc/hb3ZHkS29wCg3ucb
OJTl+SLgBtQDMGi+cTdDRtQ=3D
=3DVAdw
-----END PGP SIGNATURE-----
--
Paul Ferguson
PGP Public Key ID: 0x63546533