If this is real, this is kind of byzantine attack and can be far more damaging 
than what's being listed in this document.
Routing protocols security/Threat models generally discount this. 

Is there any proof of detection of this kind of backdoors in operator networks?
--
Uma C.


-----Original Message-----
From: rtgwg [mailto:[email protected]] On Behalf Of Songhaibin (A)
Sent: Wednesday, October 29, 2014 8:41 PM
To: [email protected]
Subject: Router backdoor threat model

Hi,

We have submitted a draft on router backdoor threat model. The main target is 
the threat model at the beginning. It is a little limited to the device level 
instead of the routing system level. Some threats are common to other devices 
as well. We would like to know if there are people interested in this work or 
can give some constructive comments or input. Any related discussion in the 
list or with the authors is welcome : )

Here is the link for the draft.
http://www.ietf.org/id/draft-song-router-backdoor-00.txt

Best Regards!
-Haibin



_______________________________________________
rtgwg mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/rtgwg

_______________________________________________
rtgwg mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/rtgwg

Reply via email to