> > Why should I believe that a sufficiently determined
> > adversary couldn't somehow obtain a bootleg copy of
> > IOS source?
> 
> So tell me which of the following setups is the most secure:
> 
> a) The one that requires, in order to be hacked, to get a bootleg copy
> of the IOS source, all the tools needed to compile it, understand how it
> works, be able to modify the code...
> 
> b) The one that does not?

you don't have to have the source to IOS in order to figure out a way 
to get a router to tunnel the traffic to a compromised, programmable host 
of your choosing.  just build the attack into a mail virus.  then all
you need is one client inside the firewall running outlook express...

Keith
--------------------------------------------------------------------
IETF IPng Working Group Mailing List
IPng Home Page:                      http://playground.sun.com/ipng
FTP archive:                      ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]
--------------------------------------------------------------------

Reply via email to