huawei

Scott Helms khelms at zcorum.com
Fri Jun 14 02:11:37 UTC 2013


Targeted how without an active C&C system?
On Jun 13, 2013 10:01 PM, "Jimmy Hess" <mysidia at gmail.com> wrote:

> On 6/13/13, Patrick W. Gilmore <patrick at ianai.net> wrote:
> > It should be trivial to prove to yourself the box is, or is not, doing
> > something evil if you actually try.
>
> What if it's not doing anything evil  99% of the time... after all
> 90%+ of traffic may be of no interest to a potential adversary, but
> there is a backdoor mechanism that allows "targetted evilness"  to be
> enabled?
>
> Sniffing on a targetted IP address can be disguised as "legitimate"
> return traffic, to a connection actually initiated from the "backdoor
> data interaction point" to some other web server,  creating a ruse..
>
> A low-bandwidth fabricated  return flow  on top of the legitimate
> return flow once every few months, or every few days is extremely
> likely to go unnoticed,  on any  network that has a significantly
> large amount of normal production traffic.
>
>
> > --
> > TTFN,
> > patrick
> --
> -JH
>
>



More information about the NANOG mailing list