On Thu, 30 Oct 2014, Uma Chunduri wrote:

If this is real, this is kind of byzantine attack and can be far more damaging 
than what's being listed in this document.
Routing protocols security/Threat models generally discount this.

Is there any proof of detection of this kind of backdoors in operator networks?

http://www.infoworld.com/article/2608141/internet-privacy/snowden--the-nsa-planted-backdoors-in-cisco-products.html

This is a security question, I'm not sure the IETF is the best place to document these issues, even though it affects products that are used to implement IETF protocols. There is no doubt in my mind that there is a problem with all kinds of products being potentially backdoored, I have read enough papers on BIOS on motherboards, NICs etc being backdoored and end up running malicious software that is virtually impossible to detect and eradicate by an operator.

I don't know what to make of the document though, I think it depends on what its intended audience is. If it's supposed to make people aware of the potential problem, then it needs more facts and references to assure people that the problems described are real (because some will say it's not real until it's actually happened).

Another one where telecom functionality designed and implemented by government request was used in another fashion is <http://en.wikipedia.org/wiki/Greek_wiretapping_case_2004%E2%80%9305>. Here the LI function (which some government require to be invisible to the normal operator) was used to spy on some phones. You can probably get more detailed information internally from your colleagues about that one, compared to what is publically available.

--
Mikael Abrahamsson    email: [email protected]

_______________________________________________
rtgwg mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/rtgwg

Reply via email to