Re: Huawei on Mount Everest

2020-05-02 Thread Mark Rousell
On 01/05/2020 19:13, Eric Tykwinski wrote: > how the hell are they going to get power up there for dependability. > Solar power sure is a great option, but I was under the assumption > that repairs will be hell to put it bluntly. > Batteries in that cold of a climate is also a regular trip. which

RE: Huawei on Mount Everest

2020-05-02 Thread Keith Medcalf
d >Cc: John Levine ; nanog@nanog.org >Subject: Re: Huawei on Mount Everest > >Honestly, being an amateur rock climber, I’m in the same boat, but how >the hell are they going to get power up there for dependability. >Solar power sure is a great option, but I was under the assumption tha

Re: Huawei on Mount Everest

2020-05-01 Thread Wayne Bouchard
https://telecoms.com/504051/huawei-and-china-mobile-stick-a-5g-base-station-on-mount-everest/ > > > >Why dont we leave the Everest alone? OTOH, we can now have tiktok > >videos and latest instagram posts from the summit. > > Given how dangerous the ascent is, I would think

Re: Huawei on Mount Everest

2020-05-01 Thread David Conrad
On May 1, 2020, at 11:07 AM, Aaron Gould wrote: > You made me curious... > > https://en.wikipedia.org/wiki/List_of_people_who_died_climbing_Mount_Everest > > wow, I guess it would be great to be able to use cell/gps technology to > communicate with and track a lost/endangered climber

Re: Huawei on Mount Everest

2020-05-01 Thread William Herrin
On Fri, May 1, 2020 at 11:01 AM John Levine wrote: > Given how dangerous the ascent is, I would think it would be a good > thing for climbers to be able to check in and say whether they are OK. Hi John, Climbers who care rent or buy satphones and beacons. They're mostly based on low earth orbit

Re: Huawei on Mount Everest

2020-05-01 Thread Eric Tykwinski
ne > Sent: Friday, May 1, 2020 12:58 PM > To: nanog@nanog.org > Subject: Re: Huawei on Mount Everest > > In article > you > write: >> -=-=-=-=-=- >> >> https://telecoms.com/504051/huawei-and-china-mobile-stick-a-5g-base-station-on-mount-everest/ >> >&

RE: Huawei on Mount Everest

2020-05-01 Thread Aaron Gould
=gvtc@nanog.org] On Behalf Of John Levine Sent: Friday, May 1, 2020 12:58 PM To: nanog@nanog.org Subject: Re: Huawei on Mount Everest In article you write: >-=-=-=-=-=- > >https://telecoms.com/504051/huawei-and-china-mobile-stick-a-5g-base-station-on-mount-everest/ > >Wh

Re: Huawei on Mount Everest

2020-05-01 Thread John Levine
In article you write: >-=-=-=-=-=- > >https://telecoms.com/504051/huawei-and-china-mobile-stick-a-5g-base-station-on-mount-everest/ > >Why dont we leave the Everest alone? OTOH, we can now have tiktok >videos and latest instagram posts from the summit. Given how dangerous the

Re: Huawei on Mount Everest

2020-05-01 Thread Jeff Shultz
On Fri, May 1, 2020 at 7:20 AM Glen Kent wrote: > > https://telecoms.com/504051/huawei-and-china-mobile-stick-a-5g-base-station-on-mount-everest/ > > Why dont we leave the Everest alone? OTOH, we can now have tiktok videos and > latest instagram posts from the summit. > >

Huawei on Mount Everest

2020-05-01 Thread Glen Kent
https://telecoms.com/504051/huawei-and-china-mobile-stick-a-5g-base-station-on-mount-everest/ Why dont we leave the Everest alone? OTOH, we can now have tiktok videos and latest instagram posts from the summit. Yippe. Just when you think things cant get worse, they sink deeper.

Re: China Showdown Huawei vs ZTE

2018-04-26 Thread Saku Ytti
https://kb.juniper.net/InfoCenter/index?page=content=JSA10819 https://kb.juniper.net/InfoCenter/index?page=content=JSA10713 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-cpcp

Re: China Showdown Huawei vs ZTE

2018-04-26 Thread Alan Buxey
https://www.theregister.co.uk/2018/04/26/hyperoptics_zte_routers/ yet another ZTE issue . :( alan

Re: China Showdown Huawei vs ZTE

2018-04-24 Thread Saku Ytti
On 24 April 2018 at 21:45, Naslund, Steve <snasl...@medline.com> wrote: Hey, > The US Government considers Huawei and ZTE to have "close ties" to the > Chinese government according to the Director of National Intelligence along > with the heads of CIA, FBI, and the N

RE: China Showdown Huawei vs ZTE

2018-04-24 Thread Naslund, Steve
>I'm sure all these companies have legal entities in all countries the operate >in. So Huawei in US is US company and Huawei products bought in US from US >Huawei are good,. but bad >when bought from Huawei China? IANAL however I was a network engineer for the US Air Force for ov

Re: China Showdown Huawei vs ZTE

2018-04-24 Thread Saku Ytti
Hey Aaron, > Excuse my lack of knowledge... What does this mean? "Shareholders are people > holding Vanguard/Blackrock." Funds which are largest owners of Cisco shares. -- ++ytti

Re: China Showdown Huawei vs ZTE

2018-04-24 Thread Aaron Gould
Excuse my lack of knowledge... What does this mean? "Shareholders are people holding Vanguard/Blackrock." Aaron > On Apr 24, 2018, at 10:31 AM, Saku Ytti wrote: > > Shareholders are people holding Vanguard/Blackrock.

RE: China Showdown Huawei vs ZTE

2018-04-24 Thread STARNES, CURTIS via NANOG
-Original Message- >From: NANOG <nanog-boun...@nanog.org> On Behalf Of Saku Ytti >Sent: Tuesday, April 24, 2018 11:59 AM >To: Naslund, Steve <snasl...@medline.com> >Cc: nanog@nanog.org >Subject: Re: China Showdown Huawei vs ZTE >On 24 April 2018 a

Re: China Showdown Huawei vs ZTE

2018-04-24 Thread Saku Ytti
I think they might at least be held > accountable (by their markets) when they get caught. I'm sure all these companies have legal entities in all countries the operate in. So Huawei in US is US company and Huawei products bought in US from US Huawei are good,. but bad when bought from Huawei China? -- ++ytti

RE: China Showdown Huawei vs ZTE

2018-04-24 Thread Naslund, Steve
> > > Yes looks like they are both under pressure. I feel bad for the USA based > > employees. I know Huawei has quite a few in Plano, Texas. > > Feel sorry for US based consumers. Historically protectionism always > hurts the local economy most. By creating artificial de

Re: China Showdown Huawei vs ZTE

2018-04-24 Thread Colton Conor
der pressure. I feel bad for the USA based > > employees. I know Huawei has quite a few in Plano, Texas. > > Feel sorry for US based consumers. Historically protectionism always > hurts the local economy most. By creating artificial demand on local > products, over time local produ

Re: China Showdown Huawei vs ZTE

2018-04-24 Thread Saku Ytti
On 20 April 2018 at 16:44, Colton Conor <colton.co...@gmail.com> wrote: > Yes looks like they are both under pressure. I feel bad for the USA based > employees. I know Huawei has quite a few in Plano, Texas. Feel sorry for US based consumers. Historically protectionism always hur

RE: China Showdown Huawei vs ZTE

2018-04-24 Thread Colin Stanners (lists)
gt; Cc: NANOG <nanog@nanog.org> Subject: Re: China Showdown Huawei vs ZTE Josh, I like the whitebox route, but I can't find anything that will come close price wise. Example, Huawei S6720 with 24 10G ports, 2 40G ports, and full MPLS operating system from Huawei is $3500 out the door wit

Re: China Showdown Huawei vs ZTE

2018-04-20 Thread Colton Conor
Yes looks like they are both under pressure. I feel bad for the USA based employees. I know Huawei has quite a few in Plano, Texas. With both ZTE and Huawei out of the picture for USA operators, who is the low cost leader in this space then? On Fri, Apr 20, 2018 at 7:56 AM, STARNES, CURTIS

RE: China Showdown Huawei vs ZTE

2018-04-20 Thread STARNES, CURTIS via NANOG
Same for Huawei. https://www.theverge.com/2018/3/26/17164226/fcc-proposal-huawei-zte-us-networks-national-security https://www.forbes.com/sites/jeanbaptiste/2018/04/19/analyst-chinas-huawei-to-quit-u-s-market/#194f570211cb https://www.nytimes.com/2018/04/17/technology/huawei-trade-war.html I

Re: China Showdown Huawei vs ZTE

2018-04-20 Thread Colton Conor
Josh, I like the whitebox route, but I can't find anything that will come close price wise. Example, Huawei S6720 with 24 10G ports, 2 40G ports, and full MPLS operating system from Huawei is $3500 out the door with a lifetime warranty. I can't even find a whitebox hardware, not even accounting

Re: China Showdown Huawei vs ZTE

2018-04-20 Thread Suresh Ramasubramanian
il.com> wrote: Of the two large Chinese Vendors, which has the better network operating system? Huawei is much larger that ZTE is my understanding, but larger does not always mean better. Both of these manufactures have switches and routers. I doubt we will use their routing produ

Re: China Showdown Huawei vs ZTE

2018-04-20 Thread Josh Reynolds
Why not just go the whitebox route and pick your NOS of choice? Far cheaper, and far more flexible. On Fri, Apr 20, 2018, 7:28 AM Colton Conor <colton.co...@gmail.com> wrote: > Of the two large Chinese Vendors, which has the better network operating > system? Huawei is much lar

China Showdown Huawei vs ZTE

2018-04-20 Thread Colton Conor
Of the two large Chinese Vendors, which has the better network operating system? Huawei is much larger that ZTE is my understanding, but larger does not always mean better. Both of these manufactures have switches and routers. I doubt we will use their routing products anytime soon

Re: Unable to assign an IP address to the sub-interface in Huawei S6720

2017-05-19 Thread Josivan Barbosa
Hi Carlos Thank you for the response. It's not working for me: display version Huawei Versatile Routing Platform Software VRP (R) software, Version 5.160 (S6720 V200R008C00SPC500) Copyright (C) 2000-2015 HUAWEI TECH CO., LTD HUAWEI S6720-30C-EI-24S-AC Routing Switch uptime is 36 weeks, 6 days, 3

Unable to assign an IP address to the sub-interface in Huawei S6720

2017-05-19 Thread Josivan Barbosa
rl=http%3A%2F%2Fsupport.huawei.com%2Fenterprise%2Fbr%2Fdoc%2FDOC1000112303=948086=7608d90d5dd77e0c> but dont work. Says "Error: Unrecognized command found at '^' position" in ip address command. Has anyone managed to configure sub-interface on the Huawei S6720 switch? -- Att Josivan Barbosa

Huawei NE

2016-09-18 Thread Lewis,Mitchell T.
Hi All, Does anyone have any experiences with the Huawei NE platform in a service provider environment they can share? Private message is fine. I am comparing against Cisco ASR & Juniper MX. Regards, Mitchell T. Lewis mle...@techcompute.net |203-816-0371 PGP Fingerp

HUAWEI S6700 - VLANIF MAC ADDRESS

2016-09-06 Thread Josivan Barbosa
Hi all I have a Huawei S6700 and each vlanif has a different mac. Is there any way so that all vlanifs have the same mac address? In brocades switches, for example, all ports have the same mac. Thanks. Josivan Barbosa

Re: Huawei and ZTE Routers

2015-05-08 Thread Bacon Zombie
You could try cross posting to UKNOG since BT use Huawei in their DSLAMs. http://lists.uknof.org.uk/cgi-bin/mailman/listinfo/uknof/ On 7 May 2015 21:18, ML m...@kenweb.org wrote: On 5/7/2015 2:25 PM, Daniel Corbe wrote: Colton Conor colton.co...@gmail.com writes: The other thread about

Huawei and ZTE Routers

2015-05-07 Thread Colton Conor
The other thread about the Alcatel-Lucent routers has been pleasantly delightful. Our organization used to believe that Juniper, Cisco, and Brocade were the only true vendors for carrier grade routing, but now we are going to throw Alcatel-Lucent into the mix. ZTE and Huawei, the big chinese

Re: Huawei and ZTE Routers

2015-05-07 Thread Daniel Corbe
into the mix. ZTE and Huawei, the big chinese vendors, have also been mentioned to us. I know there are large national security issues with using these vendors in the US, but I know Level3 and other large American vendors use Huawei and ZTE in their networks. How do their products perform? How

Re: Huawei and ZTE Routers

2015-05-07 Thread ML
we are going to throw Alcatel-Lucent into the mix. ZTE and Huawei, the big chinese vendors, have also been mentioned to us. I know there are large national security issues with using these vendors in the US, but I know Level3 and other large American vendors use Huawei and ZTE in their networks

Re: Huawei Atom Router

2014-08-05 Thread Randy Bush
And a bunch of ban's around Oct 2013 from a wide variety of countries... you mean fear of implants as there are in cisco products?

Re: Huawei Atom Router

2014-08-05 Thread Alain Hebert
Was more a statement of fact. As if it was warranted. I do not know. - Alain Hebertaheb...@pubnix.net PubNIX Inc. 50 boul. St-Charles P.O. Box 26770 Beaconsfield, Quebec H9W 6G7 Tel: 514-990-5911 http://www.pubnix.netFax:

Re: Huawei Atom Router

2014-08-05 Thread Rob Seastrom
To be fair, they've fixed one of the big concerns that were raised with them a couple of years ago: google for huawei + psirt now actually returns usable results. No idea how well the interface with them works when you're actually trying to report a vulnerability (maybe someone can speak up

Huawei Atom Router

2014-08-04 Thread Eric Dugas
Has anyone seen/touched Huawei's Atom Router? It was announced at the Mobile World Congress 2014.. haven't seen anything on the Interweb since. I'd be interested in getting one or two units to play in my lab! http://www.huawei.com/mwc2014/en/articles/hw-328011.htm Eric

Re: Huawei Atom Router

2014-08-04 Thread Alain Hebert
Well, Wasn't the Huawei CEO that stated that they where not interested into the US market. ( And by proxy ... the Canadian one ) http://www.theregister.co.uk/2013/04/23/huawei_not_interested_in_us/ And a bunch of ban's around Oct 2013 from a wide variety of countries

Re: Huawei Atom Router

2014-08-04 Thread Donald Eastlake
Huawei has sales personal in the US and does sell here. See http://huawei.com/us/about-huawei/contact-us/index.htm And for a more recent Huawei management statement, see http://usa.chinadaily.com.cn/epaper/2014-04/28/content_17470474.htm Huawei executive says it still seeks US sales Thanks

DHCP Server ACS Parameters on Huawei 5300 and 5600 DSLAM

2014-07-10 Thread Shahab Vahabzadeh
Hello Everybody, Does any body has experience about running DHCP Server on Huawei DSLAMs? We wanna run TR069 on our network, We need a DHCP server to pass ACS parameters. Like ACS URL, ACS Username and Password. Thanks -- Regards, Shahab Vahabzadeh, Network Engineer and System Administrator

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2014-01-02 Thread Saku Ytti
On (2014-01-01 23:51 +0200), Eugeniu Patrascu wrote: Is this legal? Can NSA walk in to US based company and legally coerce to install such backdoor? If not, what is the incentive for private company to cooperate? As you might have seen from the beginning of time, people in power assume

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2014-01-02 Thread Eugeniu Patrascu
On Thu, Jan 2, 2014 at 10:01 AM, Saku Ytti s...@ytti.fi wrote: On (2014-01-01 23:51 +0200), Eugeniu Patrascu wrote: Is this legal? Can NSA walk in to US based company and legally coerce to install such backdoor? If not, what is the incentive for private company to cooperate?

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2014-01-01 Thread Saku Ytti
On (2013-12-31 23:04 +), Warren Bailey wrote: that RSA had a check cut for their participation (sell outs..), would it be out of the realm of possibility cisco knowingly placed this into their product line? And would it be their mistake to come out with a “we had no idea!” rather than

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2014-01-01 Thread Brandon Butterworth
If legal, consider risk to NSA. Official product ran inside company to add requested feature, hundred of people aware of it. Seems both expensive to order such feature and almost guaranteed to be exposed by some of the employees. Alternative method is to presume all software is insecure,

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2014-01-01 Thread Marco Teixeira
Thank you Randy for pointing that out. However take into account the NANOG list is moderated, and my comment was delayed for moderation. I was commenting on posts about trivial things, before that nice post with nice codenames. A good year to all. May this be a smoother year to you all that have

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2014-01-01 Thread Randy Bush
huawei), and the TAO crew developing serious attacks based on unintended product vulnerabilities. Google has some deniability, as their networks were compromised without their knowledge. i doubt we will ever learn the extent of surprise vs culpability of google, apple, twitter, msoft, ... Saku

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2014-01-01 Thread Valdis . Kletnieks
On Wed, 01 Jan 2014 11:55:37 +0200, Saku Ytti said: Is this legal? Can NSA walk in to US based company and legally coerce to install such backdoor? Well, legal or not... we will probably never know exactly what was said, but apparently the NSA was able to convince/coerce many of the 800 pound

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2014-01-01 Thread Jimmy Hess
On Wed, Jan 1, 2014 at 3:55 AM, Saku Ytti s...@ytti.fi wrote: Is this legal? Can NSA walk in to US based company and legally coerce to install such backdoor? If not, what is the incentive for private company to cooperate? As evidenced by Lavabit; apparently, one thing that they CAN do is

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2014-01-01 Thread Eugeniu Patrascu
On Wed, Jan 1, 2014 at 11:55 AM, Saku Ytti s...@ytti.fi wrote: On (2013-12-31 23:04 +), Warren Bailey wrote: that RSA had a check cut for their participation (sell outs..), would it be out of the realm of possibility cisco knowingly placed this into their product line? And would it be

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-31 Thread Eugeniu Patrascu
On Tue, Dec 31, 2013 at 5:38 AM, Sabri Berisha sa...@cluecentral.netwrote: Hi Roland. I don't know much about Juniper gear, but it appears that the Juniper boxes listed are similar in nature, albeit running FreeBSD underneath (correction welcome). With most Juniper gear, it is actually

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-31 Thread Ray Soucy
I think there needs to be some clarification on how these tools get used, how often they're used, and if they're ever cleaned up when no longer part of an active operation. Of course we'll never get that. The amount of apologists with the attitude this isn't a big deal, nothing to see here, the

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-31 Thread shawn wilson
On Tue, Dec 31, 2013 at 8:05 AM, Ray Soucy r...@maine.edu wrote: This whole backdoor business is a very, very, dangerous game. While I agree with this (and the issues brought up with NSA's NIST approved PRNG that RSA used). If I were in their shoes, I would have been collecting every bit of

RE : Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-31 Thread Michael Hallgren
@nanog.org list nanog@nanog.org Objet : Re: NSA able to compromise Cisco, Juniper, Huawei switches I think there needs to be some clarification on how these tools get used, how often they're used, and if they're ever cleaned up when no longer part of an active operation.  Of course we'll never get

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-31 Thread sthaug
I think there needs to be some clarification on how these tools get used, how often they're used, and if they're ever cleaned up when no longer part of an active operation. Of course we'll never get that. Highly unlikely, I'd say. The amount of apologists with the attitude this isn't a big

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-31 Thread Saku Ytti
On (2013-12-31 14:45 +0100), sth...@nethelp.no wrote: This whole backdoor business is a very, very, dangerous game. It *is* a big deal. And if you want to get even more scared, listen to Jacob Appelbaum's talk at the CCC here: I'm going to wait calmly for some of the examples being

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-31 Thread Leo Bicknell
On Dec 31, 2013, at 8:32 AM, Saku Ytti s...@ytti.fi wrote: I'm going to wait calmly for some of the examples being recovered from the field, documented and analysed. If I were Cisco/Juniper/et all I would have a team working on this right now. It should be trivial for them to insert code into

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-31 Thread na...@mitteilung.com
Since some weeks all my cisco / juniper equipment was replaced with open source solutions (sometimes with embedded devices) and that works fine. Google as search engine and Facebook accounts are deleted and some more things. Cloud solutions outside europe now are forbidden for me. Thank you NSA

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-31 Thread Saku Ytti
On (2013-12-31 09:03 -0600), Leo Bicknell wrote: If I were Cisco/Juniper/et all I would have a team working on this right now. It should be trivial for them to insert code into the routers that say, hashes all sorts of things (code image, BIOS, any PROMS and EERPOMS and such on the

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-31 Thread Jared Mauch
On Dec 31, 2013, at 11:50 AM, Saku Ytti s...@ytti.fi wrote: I asked earlier today JTAC (#2013-1231-0033) and JTAC asked SIRT for tool to read BIOS and output SHA2 or SHA3 hash, and such tool does not exist yet. I'm dubious, it might be possible even with existing tools. At least it's

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-31 Thread Saku Ytti
On (2013-12-31 16:22 +0100), na...@mitteilung.com wrote: Since some weeks all my cisco / juniper equipment was replaced with open source solutions (sometimes with embedded devices) and that works fine. Google as search engine and Facebook accounts are deleted and some more things. Cloud

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-31 Thread Enno Rey
Hi, some approaches were discussed in 2010, by Graeme Neilson from NZ here: https://www.troopers.de/wp-content/uploads/2012/10/TROOPERS10_Netscreen_of_the_Dead_Graeme_Neilson.pdf a later year, at the same conference, he gave a private session demonstrating basically the same stuff for JunOS,

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-31 Thread Jared Mauch
On Dec 31, 2013, at 12:49 PM, Enno Rey e...@ernw.de wrote: Hi, some approaches were discussed in 2010, by Graeme Neilson from NZ here: https://www.troopers.de/wp-content/uploads/2012/10/TROOPERS10_Netscreen_of_the_Dead_Graeme_Neilson.pdf a later year, at the same conference, he gave a

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-31 Thread Florian Weimer
* Randy Bush: Clay Kossmeyer here from the Cisco PSIRT. shoveling kitty litter as fast as you can, eh? http://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20131229-der-spiegel The article does not discuss or disclose any Cisco product vulnerabilities. this is

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-31 Thread Saku Ytti
On (2013-12-31 18:49 +0100), Enno Rey wrote: some approaches were discussed in 2010, by Graeme Neilson from NZ here: https://www.troopers.de/wp-content/uploads/2012/10/TROOPERS10_Netscreen_of_the_Dead_Graeme_Neilson.pdf a later year, at the same conference, he gave a private session

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-31 Thread Chris Boyd
On Dec 31, 2013, at 7:05 AM, Ray Soucy wrote: I think there needs to be some clarification on how these tools get used, how often they're used, and if they're ever cleaned up when no longer part of an active operation. Of course we'll never get that. But that's exactly what we need. Look

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-31 Thread Valdis . Kletnieks
On Mon, 30 Dec 2013 19:38:12 -0800, Sabri Berisha said: However, attempting any of the limited attacks that I can think of would require expert-level knowledge of not just the overall architecture, but also of the microcode that runs on the specific PFE that the attacker would target, Already

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-31 Thread Randy Bush
There's a limit to what can reasonably be called a *product* vulnerability. right. if the product was wearing a low-cut blouse and a short skirt, it's not. it's weasel words (excuse the idiom). shoveling kitty litter over a big steaming pile. let me insert a second advert for jake's 30c3

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-31 Thread Warren Bailey
infrastructures. //warren PS - I mentioned .cn specifically because of the Huawei aspect, in addition to the fact that it has been widely publicized we are in a ³cyber war² with them. On 12/31/13, 12:07 PM, Randy Bush ra...@psg.com wrote: There's a limit to what can reasonably be called a *product

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-31 Thread Dobbins, Roland
On Jan 1, 2014, at 2:07 AM, Randy Bush ra...@psg.com wrote: it's weasel words (excuse the idiom). shoveling kitty litter over a big steaming pile. Clayton is responding to the ability that he's allowed, and he's using words very precisely. Here's Cisco's official responses, so far.

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-31 Thread Jonathan Greenwood II
some Œsplainin to do - we buy these devices as ³security appliances², not NSA rootkit gateways. I hope the .cn guys don¹t figure out what¹s going on here, I¹d imagine there are plenty of ASA¹s in the .gov infrastructures. //warren PS - I mentioned .cn specifically because of the Huawei aspect

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-31 Thread Dobbins, Roland
On Jan 1, 2014, at 2:16 AM, Warren Bailey wbai...@satelliteintelligencegroup.com wrote: Randy is right here.. Cisco has some Œsplainin to do - we buy these devices as ³security appliances², not NSA rootkit gateways

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-31 Thread Florian Weimer
* Randy Bush: There's a limit to what can reasonably be called a *product* vulnerability. right. if the product was wearing a low-cut blouse and a short skirt, it's not. Uh-oh, is this an attempt at an argument based on a blame the victim rape analogy?

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-31 Thread Dobbins, Roland
On Jan 1, 2014, at 2:34 AM, Jonathan Greenwood II gwoo...@gmail.com wrote: The best response I've seen to all this hype and I completely agree with Scott: Do ya think that you wouldn't also notice a drastic increase in outbound traffic to begin with? It's fun to watch all the hype and

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-31 Thread Randy Bush
it's weasel words (excuse the idiom). shoveling kitty litter over a big steaming pile. Clayton is responding to the ability that he's allowed, and he's using words very precisely. qed pgp7iFOpQgLqE.pgp Description: PGP signature

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-31 Thread sthaug
The best response I've seen to all this hype and I completely agree with Scott: Do ya think that you wouldn't also notice a drastic increase in outbound traffic to begin with? It's fun to watch all the hype and things like that, but to truly sit down and think about what it would actually

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-31 Thread Paul Ferguson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 12/31/2013 12:33 PM, sth...@nethelp.no wrote: The best response I've seen to all this hype and I completely agree with Scott: Do ya think that you wouldn't also notice a drastic increase in outbound traffic to begin with? It's fun to watch

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-31 Thread Warren Bailey
Explaining, not a denial written by their legal department. I find it insanely difficult to believe cisco systems has a backdoor into some of their product lines with no knowledge or participation. Given the fact that RSA had a check cut for their participation (sell outs..), would it be out of

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-31 Thread Florian Weimer
* Warren Bailey: Explaining, not a denial written by their legal department. I find it insanely difficult to believe cisco systems has a backdoor into some of their product lines with no knowledge or participation. As far as I understand it, these are firmware tweaks or implants sitting on a

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-31 Thread Paul Ferguson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 12/31/2013 4:02 PM, Florian Weimer wrote: * Warren Bailey: Explaining, not a denial written by their legal department. I find it insanely difficult to believe cisco systems has a backdoor into some of their product lines with no knowledge or

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-31 Thread Warren Bailey
China. ;) lol Sent from my Mobile Device. Original message From: Paul Ferguson fergdawgs...@mykolab.com Date: 12/31/2013 4:13 PM (GMT-08:00) To: nanog@nanog.org Subject: Re: NSA able to compromise Cisco, Juniper, Huawei switches -BEGIN PGP SIGNED MESSAGE- Hash: SHA1

NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-30 Thread sten rulz
Found some interesting news on one of the Australia news websites. http://www.scmagazine.com.au/News/368527,nsa-able-to-compromise-cisco-juniper-huawei-switches.aspx Regards, Steven.

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-30 Thread Saku Ytti
On (2013-12-30 20:30 +1100), sten rulz wrote: Found some interesting news on one of the Australia news websites. http://www.scmagazine.com.au/News/368527,nsa-able-to-compromise-cisco-juniper-huawei-switches.aspx The quality of this data is too damn low. Not as bad as this though, http

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-30 Thread Shawn Wilson
Saku Ytti s...@ytti.fi wrote: On (2013-12-30 20:30 +1100), sten rulz wrote: I really think we're doing disservice to an issue which might be at scale of human-rights issue, by spamming media with 0 data news. Where is this backdoor? How does it work? How can I recreate on my devices? I don't

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-30 Thread Saku Ytti
On (2013-12-30 06:12 -0500), Shawn Wilson wrote: I don't really want you to know how to recreate it until the companies have had a chance to fix said issue. I'd hope, if such issues were disclosed, those news outlets would go through proper channels of disclosure before going to press with

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-30 Thread Dobbins, Roland
On Dec 30, 2013, at 5:06 PM, Saku Ytti s...@ytti.fi wrote: The quality of this data is too damn low. The #1 way that Cisco routers and switches are compromised is brute-forcing against an unsecured management plane, with username 'cisco' and password 'cisco. The #1 way that Juniper and

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-30 Thread Dobbins, Roland
On Dec 30, 2013, at 6:18 PM, Saku Ytti s...@ytti.fi wrote: I welcome the short-term havok and damage of such disclose if it would be anywhere near the magnitude implied, it would create pressure to change things. This is the type of change we're likely to see, IMHO:

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-30 Thread Ray Soucy
Even more outrageous than the domestic spying is the arrogance to think that they can protect the details on backdoors into critical infrastructure. They may have basically created the framework for an Internet-wide kill switch, that likely also affects every aspect of modern communication.

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-30 Thread shawn wilson
On Mon, Dec 30, 2013 at 8:07 AM, Ray Soucy r...@maine.edu wrote: I hope Cisco, Juniper, and others respond quickly with updated images for all platforms affected before the details leak. So, if this plays out nice (if true, it won't), the fix will come months before the disclosure. Think, if

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-30 Thread Dobbins, Roland
On Dec 30, 2013, at 8:07 PM, Ray Soucy r...@maine.edu wrote: I hope Cisco, Juniper, and others respond quickly with updated images for all platforms affected before the details leak. During my time at Cisco, I was involved deeply enough with various platform teams as well as PSIRT, etc., to

RE: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-30 Thread Warren Bailey
I'd love to know how they were getting in flight wifi. Sent from my Mobile Device. Original message From: sten rulz stenr...@gmail.com Date: 12/30/2013 12:32 AM (GMT-09:00) To: nanog@nanog.org Subject: NSA able to compromise Cisco, Juniper, Huawei switches Found some

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-30 Thread Valdis . Kletnieks
On Mon, 30 Dec 2013 14:34:52 +, Dobbins, Roland said: My assumption is that this allegation about Cisco and Juniper is the result of non-specialists reading about lawful intercept for the first time, and failing to do their homework. That does raise an interesting question. What

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-30 Thread Dobbins, Roland
On Dec 30, 2013, at 10:44 PM, valdis.kletni...@vt.edu valdis.kletni...@vt.edu wrote: What percentage of Cisco gear that supports a CALEA lawful intercept mode is installed in situations where CALEA doesn't apply, and thus there's a high likelyhood that said support is misconfigured and

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-30 Thread Dobbins, Roland
On Dec 30, 2013, at 11:03 PM, Dobbins, Roland rdobb...@arbor.net wrote: AFAIK, it must be explicitly enabled in order to be functional. It isn't the sort of thing which is enabled by default, nor can it be enabled without making explicit configuration changes. It's also possible they're

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-30 Thread Michael Thomas
On 12/30/2013 08:03 AM, Dobbins, Roland wrote: On Dec 30, 2013, at 10:44 PM, valdis.kletni...@vt.edu valdis.kletni...@vt.edu wrote: What percentage of Cisco gear that supports a CALEA lawful intercept mode is installed in situations where CALEA doesn't apply, and thus there's a high

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-30 Thread Enno Rey
On Mon, Dec 30, 2013 at 04:03:07PM +, Dobbins, Roland wrote: On Dec 30, 2013, at 10:44 PM, valdis.kletni...@vt.edu valdis.kletni...@vt.edu wrote: What percentage of Cisco gear that supports a CALEA lawful intercept mode is installed in situations where CALEA doesn't apply, and thus

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-30 Thread Sam Moats
This might be an interesting example of it's (mis)use. http://en.wikipedia.org/wiki/Greek_wiretapping_case_2004%E2%80%932005 Sam Moats On 2013-12-30 11:16, Enno Rey wrote: On Mon, Dec 30, 2013 at 04:03:07PM +, Dobbins, Roland wrote: On Dec 30, 2013, at 10:44 PM, valdis.kletni...@vt.edu

Re: NSA able to compromise Cisco, Juniper, Huawei switches

2013-12-30 Thread Jeremy Bresley
, Juniper, Huawei switches Found some interesting news on one of the Australia news websites. http://www.scmagazine.com.au/News/368527,nsa-able-to-compromise-cisco-juniper-huawei-switches.aspx Regards, Steven. Simple. Grab it from where it hits the base stations. One of the two big in-flight

  1   2   3   >