NSA able to compromise Cisco, Juniper, Huawei switches
saku at ytti.fi
Tue Dec 31 14:32:29 UTC 2013
On (2013-12-31 14:45 +0100), sthaug at nethelp.no wrote:
> > This whole backdoor business is a very, very, dangerous game.
> It *is* a big deal. And if you want to get even more scared, listen to
> Jacob Appelbaum's talk at the CCC here:
I'm going to wait calmly for some of the examples being recovered from the
field, documented and analysed.
I'd love to see for example the pwned Juniper code in action, how do they
manage from BIOS to inspect data from HW path, without relying on specific
version of FreeBSD, JunOS, control-plane, HW NPU/ASIC. What is it capable of
doing, what is it not capable of doing. How does it deliver the data.
As they are presented as pervasive and common, I'm sure it's just matter of
time when we'll have higher quality of data than screencapture of PDF.
++ytti, Commander, FUSAG
More information about the NANOG