Open source hardware

Daniël W. Crompton daniel.crompton at
Fri Jan 3 10:05:30 UTC 2014

Good point Jimmy, there is a world of hurt involved, although it may be
slightly less painless when you realize that the alternative is: "*the NSA
[who] has modified the firmware of computers and network hardware—including
systems shipped by Cisco, Dell, Hewlett-Packard, Huawei, and Juniper
Networks—to give its operators both eyes and ears inside the offices the
agency has targeted.*"[1]

There's already a world of hurt involved when you can't trust your
equipment because they potentially have backdoors in them.



Oplerno is built upon empowering faculty and students We want you to found
(and fund) Oplerno with
[image: Support Us
Daniël W. Crompton <daniel.crompton at>




On 3 January 2014 06:01, Jimmy Hess <mysidia at> wrote:

> On Thu, Jan 2, 2014 at 8:53 PM, Andrew Duey <
> andrew.duey at> wrote:
> > I'm surprised nobody's mentioned or the new fork of VyOs.  We
> > are currently using the vyatta community edition and so far it's been
> good
> > to to us.  It depends on your hardware and how small of an ISP you are
> but
> > it might be a great open source fit for you.
> The orig. author has potentially set course for a world of hurt --  if the
> plan is to scrap robust packaged highly-validated gear having separate
> hardware forwarding planes and ASIC-driven filtering,  to stick cheap x86
> servers in the SP core and internet borders.
> Sure... anyone can install Vyatta on a x86 server,   but  assembly of all
> the pieces and full validation for a resilient platform comparable to
> carrier grade gear, for a mission critical network,  should be a bit more
> involved than that.
> Next up....   how to build your own  10-Gigabit  SFPs to avoid paying for
> expensive brand-name SFPs,  by putting together some chips,  wires,  fiber,
> and tying it all together with a piece of duck tape....
> just saying... :)
> > --Andrew Duey
> >
> --
> -JH

More information about the NANOG mailing list