Hi folks, At least Cisco went public with the whole lawful-intercept thing though the actual functionality is not explained: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/lawful/intercept/book/65LIch1.html http://www.cisco.com/c/en/us/td/docs/routers/asr9000/software/asr9k_r4-1/security/configuration/guide/b_syssec_cg41asr9k/b_syssec_cg41asr9k_chapter_011.html
It's a good think we can disable the functionality with "lawful-intercept disable", but oh wait we can't no more on the recent XR version. Since the lawful-intercept disable is now hidden/unavailable may I assume the necessary SNMP configs to public government IPs are hidden as well? adam > -----Original Message----- > From: rtgwg [mailto:[email protected]] On Behalf Of Songhaibin (A) > Sent: Thursday, October 30, 2014 4:41 AM > To: [email protected] > Subject: Router backdoor threat model > > Hi, > > We have submitted a draft on router backdoor threat model. The main target is > the threat model at the beginning. It is a little limited to the device level > instead of the routing system level. Some threats are common to other devices > as well. We would like to know if there are people interested in this work or > can give some constructive comments or input. Any related discussion in the > list > or with the authors is welcome : ) > > Here is the link for the draft. > http://www.ietf.org/id/draft-song-router-backdoor-00.txt > > Best Regards! > -Haibin > > > > _______________________________________________ > rtgwg mailing list > [email protected] > https://www.ietf.org/mailman/listinfo/rtgwg _______________________________________________ rtgwg mailing list [email protected] https://www.ietf.org/mailman/listinfo/rtgwg
