Hi folks,

At least Cisco went public with the whole lawful-intercept thing though the 
actual functionality is not explained: 
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/lawful/intercept/book/65LIch1.html
http://www.cisco.com/c/en/us/td/docs/routers/asr9000/software/asr9k_r4-1/security/configuration/guide/b_syssec_cg41asr9k/b_syssec_cg41asr9k_chapter_011.html

It's a good think we can disable the functionality with "lawful-intercept 
disable", but oh wait we can't no more on the recent XR version. 
Since the lawful-intercept disable is now hidden/unavailable may I assume the 
necessary SNMP configs to public government IPs are hidden as well? 

 
adam
> -----Original Message-----
> From: rtgwg [mailto:[email protected]] On Behalf Of Songhaibin (A)
> Sent: Thursday, October 30, 2014 4:41 AM
> To: [email protected]
> Subject: Router backdoor threat model
> 
> Hi,
> 
> We have submitted a draft on router backdoor threat model. The main target is
> the threat model at the beginning. It is a little limited to the device level
> instead of the routing system level. Some threats are common to other devices
> as well. We would like to know if there are people interested in this work or
> can give some constructive comments or input. Any related discussion in the 
> list
> or with the authors is welcome : )
> 
> Here is the link for the draft.
> http://www.ietf.org/id/draft-song-router-backdoor-00.txt
> 
> Best Regards!
> -Haibin
> 
> 
> 
> _______________________________________________
> rtgwg mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/rtgwg

_______________________________________________
rtgwg mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/rtgwg

Reply via email to