[35100] in North American Network Operators' Group
Re: Warning: Cisco RW community backdoor.
daemon@ATHENA.MIT.EDU (Shawn McMahon)
Mon Feb 26 23:25:41 2001
Date: Mon, 26 Feb 2001 23:03:54 -0500
From: Shawn McMahon <smcmahon@eiv.com>
To: nanog@merit.edu
Message-ID: <20010226230354.B31104@eiv.com>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-md5;
protocol="application/pgp-signature"; boundary="UHN/qo2QbUvPLonB"
Content-Disposition: inline
Errors-To: owner-nanog-outgoing@merit.edu
--UHN/qo2QbUvPLonB
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
There are some folks who think this only lets you change the contact
string.
This is false; it lets you change several strings. However, they appear
to all be informational in nature, not operational.
I think the information leakage point is a bigger deal than the information
change point, although you could confuse a sufficiently clueless=20
administrator by changing the location information.
--UHN/qo2QbUvPLonB
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.1 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iD8DBQE6mycqEcl9bQ0RMt0RAmYwAKD6uxaYVcWwjSprfZpl+7dKj4VJDgCcDwmI
dxr9j4SHnGZ2knhCFYtNSGY=
=8YLQ
-----END PGP SIGNATURE-----
--UHN/qo2QbUvPLonB--