Brian E Carpenter <[email protected]> wrote: > It's not quite that.
> We sell X's. We cannot control how the X's are used. But if they are
> used without calling home to our MASA, we cannot certify that they are
> genuine X's. They might be counterfeit X's.
Or, they might be genuine X's running trojaned's software.
The fact that between leaving seller A and buyer C, they were activated by
attacker M will be in the MASA's audit log, if buyer C looks.
{Can attacker M replace software via serial console without leaving a trace?
Not BRSKI's problem exactly, but it's certainly a concern}
> BRSKI is a way of proving that the X announcing its identity as X12345
> really is the one and only X12345.
> If you sell it to someone who doesn't care about that, they can use it
> anyway.
Depending upon the software in X, you may be able to hook up a craft/serial
console and just configure it the way you want, just like you do today.
Or it might be some new-fangled SDN switch that won't operate with a
controller attached, and it doesn't even have a serial console. Nothing I
can do will change that.
--
] Never tell me the odds! | ipv6 mesh networks [
] Michael Richardson, Sandelman Software Works | network architect [
] [email protected] http://www.sandelman.ca/ | ruby on rails [
signature.asc
Description: PGP signature
_______________________________________________ Anima mailing list [email protected] https://www.ietf.org/mailman/listinfo/anima
