[87868] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Cisco, haven't we learned anything? (technician reset)y

daemon@ATHENA.MIT.EDU (Martin Hannigan)
Thu Jan 12 21:46:35 2006

From: Martin Hannigan <hannigan@world.std.com>
To: eric-list-nanog@catastrophe.net (eric)
Date: Thu, 12 Jan 2006 21:41:18 -0500 (EST)
Cc: smb@cs.columbia.edu (Steven M. Bellovin), nanog@merit.edu
In-Reply-To: <20060113023430.GI22251@catastrophe.net> from "eric" at Jan 12, 2006 08:34:30 PM
Errors-To: owner-nanog@merit.edu


> 
> 
> On Thu, 2006-01-12 at 21:05:52 -0500, Steven M. Bellovin proclaimed...
> 
> > 
> > How much entropy is there in a such a serial number?  Little enough 
> > that it can be brute-forced by someone who knows the pattern?  Using 
> > some function of the serial number and a vendor-known secret key is 
> > better -- until, of course, that "secret" leaks.  (Anyone remember how 
> > telephone credit card number verification worked before they could do 
> > full real-time validation?  The Phone Company took a 10-digit phone 
> > number and calculated four extra digits, based on that year's secret.  
> > Guess how well that secret was kept....)
> > 
> 
> Hi Steven,
> 
> I believe the Netscreen default password of a serial number can only be
> entered over the console (and possibly modem/aux) port(s).

Yes. Sorry, I left that out.

-M<

home help back first fref pref prev next nref lref last post