On Mon, Dec 30, 2013 at 04:03:07PM +0000, Dobbins, Roland wrote:
> 
> On Dec 30, 2013, at 10:44 PM, <[email protected]> 
> <[email protected]> wrote:
> 
> > What percentage of Cisco gear that supports a CALEA lawful intercept mode 
> > is installed in situations where CALEA doesn't apply, and thus there's a 
> > high likelyhood that said support is misconfigured and abusable without 
> > being noticed?
> 
> AFAIK, it must be explicitly enabled in order to be functional.  It isn't the 
> sort of thing which is enabled by default, nor can it be enabled without 
> making explicit configuration changes.

at least back in 2007 it could be enabled/configured by SNMP RW access [see 
slide 43 of the presentation referenced in this post 
http://www.insinuator.net/2013/07/snmp-reflected-amplification-ddos-attacks/] 
so knowing the term "private" m
ight be enough to perform the task remotely.

have a good one

Enno




> 
> -----------------------------------------------------------------------
> Roland Dobbins <[email protected]> // <http://www.arbornetworks.com>
> 
>         Luck is the residue of opportunity and design.
> 
>                      -- John Milton
> 



-- 
Enno Rey

ERNW GmbH - Carl-Bosch-Str. 4 - 69115 Heidelberg - www.ernw.de
Tel. +49 6221 480390 - Fax 6221 419008 - Cell +49 173 6745902 

Handelsregister Mannheim: HRB 337135
Geschaeftsfuehrer: Enno Rey

=======================================================
Blog: www.insinuator.net || Conference: www.troopers.de
=======================================================

Reply via email to