On 01/05/2020 19:13, Eric Tykwinski wrote:
> how the hell are they going to get power up there for dependability.
> Solar power sure is a great option, but I was under the assumption
> that repairs will be hell to put it bluntly.
> Batteries in that cold of a climate is also a regular trip. which
d
>Cc: John Levine ; nanog@nanog.org
>Subject: Re: Huawei on Mount Everest
>
>Honestly, being an amateur rock climber, I’m in the same boat, but how
>the hell are they going to get power up there for dependability.
>Solar power sure is a great option, but I was under the assumption tha
https://telecoms.com/504051/huawei-and-china-mobile-stick-a-5g-base-station-on-mount-everest/
> >
> >Why dont we leave the Everest alone? OTOH, we can now have tiktok
> >videos and latest instagram posts from the summit.
>
> Given how dangerous the ascent is, I would think
On May 1, 2020, at 11:07 AM, Aaron Gould wrote:
> You made me curious...
>
> https://en.wikipedia.org/wiki/List_of_people_who_died_climbing_Mount_Everest
>
> wow, I guess it would be great to be able to use cell/gps technology to
> communicate with and track a lost/endangered climber
On Fri, May 1, 2020 at 11:01 AM John Levine wrote:
> Given how dangerous the ascent is, I would think it would be a good
> thing for climbers to be able to check in and say whether they are OK.
Hi John,
Climbers who care rent or buy satphones and beacons. They're mostly
based on low earth orbit
ne
> Sent: Friday, May 1, 2020 12:58 PM
> To: nanog@nanog.org
> Subject: Re: Huawei on Mount Everest
>
> In article
> you
> write:
>> -=-=-=-=-=-
>>
>> https://telecoms.com/504051/huawei-and-china-mobile-stick-a-5g-base-station-on-mount-everest/
>>
>&
=gvtc@nanog.org] On Behalf Of John
Levine
Sent: Friday, May 1, 2020 12:58 PM
To: nanog@nanog.org
Subject: Re: Huawei on Mount Everest
In article
you write:
>-=-=-=-=-=-
>
>https://telecoms.com/504051/huawei-and-china-mobile-stick-a-5g-base-station-on-mount-everest/
>
>Wh
In article
you write:
>-=-=-=-=-=-
>
>https://telecoms.com/504051/huawei-and-china-mobile-stick-a-5g-base-station-on-mount-everest/
>
>Why dont we leave the Everest alone? OTOH, we can now have tiktok
>videos and latest instagram posts from the summit.
Given how dangerous the
On Fri, May 1, 2020 at 7:20 AM Glen Kent wrote:
>
> https://telecoms.com/504051/huawei-and-china-mobile-stick-a-5g-base-station-on-mount-everest/
>
> Why dont we leave the Everest alone? OTOH, we can now have tiktok videos and
> latest instagram posts from the summit.
>
>
https://telecoms.com/504051/huawei-and-china-mobile-stick-a-5g-base-station-on-mount-everest/
Why dont we leave the Everest alone? OTOH, we can now have tiktok
videos and latest instagram posts from the summit.
Yippe. Just when you think things cant get worse, they sink deeper.
https://kb.juniper.net/InfoCenter/index?page=content=JSA10819
https://kb.juniper.net/InfoCenter/index?page=content=JSA10713
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-cpcp
https://www.theregister.co.uk/2018/04/26/hyperoptics_zte_routers/
yet another ZTE issue . :(
alan
On 24 April 2018 at 21:45, Naslund, Steve <snasl...@medline.com> wrote:
Hey,
> The US Government considers Huawei and ZTE to have "close ties" to the
> Chinese government according to the Director of National Intelligence along
> with the heads of CIA, FBI, and the N
>I'm sure all these companies have legal entities in all countries the operate
>in. So Huawei in US is US company and Huawei products bought in US from US
>Huawei are good,. but bad >when bought from Huawei China?
IANAL however I was a network engineer for the US Air Force for ov
Hey Aaron,
> Excuse my lack of knowledge... What does this mean? "Shareholders are people
> holding Vanguard/Blackrock."
Funds which are largest owners of Cisco shares.
--
++ytti
Excuse my lack of knowledge... What does this mean? "Shareholders are people
holding Vanguard/Blackrock."
Aaron
> On Apr 24, 2018, at 10:31 AM, Saku Ytti wrote:
>
> Shareholders are people holding Vanguard/Blackrock.
-Original Message-
>From: NANOG <nanog-boun...@nanog.org> On Behalf Of Saku Ytti
>Sent: Tuesday, April 24, 2018 11:59 AM
>To: Naslund, Steve <snasl...@medline.com>
>Cc: nanog@nanog.org
>Subject: Re: China Showdown Huawei vs ZTE
>On 24 April 2018 a
I think they might at least be held
> accountable (by their markets) when they get caught.
I'm sure all these companies have legal entities in all countries the
operate in. So Huawei in US is US company and Huawei products bought
in US from US Huawei are good,. but bad when bought from Huawei China?
--
++ytti
>
> > Yes looks like they are both under pressure. I feel bad for the USA based
> > employees. I know Huawei has quite a few in Plano, Texas.
>
> Feel sorry for US based consumers. Historically protectionism always
> hurts the local economy most. By creating artificial de
der pressure. I feel bad for the USA based
> > employees. I know Huawei has quite a few in Plano, Texas.
>
> Feel sorry for US based consumers. Historically protectionism always
> hurts the local economy most. By creating artificial demand on local
> products, over time local produ
On 20 April 2018 at 16:44, Colton Conor <colton.co...@gmail.com> wrote:
> Yes looks like they are both under pressure. I feel bad for the USA based
> employees. I know Huawei has quite a few in Plano, Texas.
Feel sorry for US based consumers. Historically protectionism always
hur
gt;
Cc: NANOG <nanog@nanog.org>
Subject: Re: China Showdown Huawei vs ZTE
Josh,
I like the whitebox route, but I can't find anything that will come close price
wise.
Example, Huawei S6720 with 24 10G ports, 2 40G ports, and full MPLS operating
system from Huawei is $3500 out the door wit
Yes looks like they are both under pressure. I feel bad for the USA based
employees. I know Huawei has quite a few in Plano, Texas.
With both ZTE and Huawei out of the picture for USA operators, who is the
low cost leader in this space then?
On Fri, Apr 20, 2018 at 7:56 AM, STARNES, CURTIS
Same for Huawei.
https://www.theverge.com/2018/3/26/17164226/fcc-proposal-huawei-zte-us-networks-national-security
https://www.forbes.com/sites/jeanbaptiste/2018/04/19/analyst-chinas-huawei-to-quit-u-s-market/#194f570211cb
https://www.nytimes.com/2018/04/17/technology/huawei-trade-war.html
I
Josh,
I like the whitebox route, but I can't find anything that will come close
price wise.
Example, Huawei S6720 with 24 10G ports, 2 40G ports, and full MPLS
operating system from Huawei is $3500 out the door with a lifetime
warranty. I can't even find a whitebox hardware, not even accounting
il.com> wrote:
Of the two large Chinese Vendors, which has the better network operating
system? Huawei is much larger that ZTE is my understanding, but larger does
not always mean better.
Both of these manufactures have switches and routers. I doubt we will use
their routing produ
Why not just go the whitebox route and pick your NOS of choice?
Far cheaper, and far more flexible.
On Fri, Apr 20, 2018, 7:28 AM Colton Conor <colton.co...@gmail.com> wrote:
> Of the two large Chinese Vendors, which has the better network operating
> system? Huawei is much lar
Of the two large Chinese Vendors, which has the better network operating
system? Huawei is much larger that ZTE is my understanding, but larger does
not always mean better.
Both of these manufactures have switches and routers. I doubt we will use
their routing products anytime soon
Hi Carlos
Thank you for the response. It's not working for me:
display version
Huawei Versatile Routing Platform Software
VRP (R) software, Version 5.160 (S6720 V200R008C00SPC500)
Copyright (C) 2000-2015 HUAWEI TECH CO., LTD
HUAWEI S6720-30C-EI-24S-AC Routing Switch uptime is 36 weeks, 6 days, 3
rl=http%3A%2F%2Fsupport.huawei.com%2Fenterprise%2Fbr%2Fdoc%2FDOC1000112303=948086=7608d90d5dd77e0c>
but dont work. Says "Error: Unrecognized command found at '^' position" in
ip address command.
Has anyone managed to configure sub-interface on the Huawei S6720 switch?
--
Att
Josivan Barbosa
Hi All,
Does anyone have any experiences with the Huawei NE platform in a service
provider environment they can share? Private message is fine. I am comparing
against Cisco ASR & Juniper MX.
Regards,
Mitchell T. Lewis
mle...@techcompute.net
|203-816-0371
PGP Fingerp
Hi all
I have a Huawei S6700 and each vlanif has a different mac. Is there any way
so that all vlanifs have the same mac address? In brocades switches, for
example, all ports have the same mac.
Thanks.
Josivan Barbosa
You could try cross posting to UKNOG since BT use Huawei in their DSLAMs.
http://lists.uknof.org.uk/cgi-bin/mailman/listinfo/uknof/
On 7 May 2015 21:18, ML m...@kenweb.org wrote:
On 5/7/2015 2:25 PM, Daniel Corbe wrote:
Colton Conor colton.co...@gmail.com writes:
The other thread about
The other thread about the Alcatel-Lucent routers has been pleasantly
delightful. Our organization used to believe that Juniper, Cisco, and
Brocade were the only true vendors for carrier grade routing, but now we
are going to throw Alcatel-Lucent into the mix.
ZTE and Huawei, the big chinese
into the mix.
ZTE and Huawei, the big chinese vendors, have also been mentioned to us. I
know there are large national security issues with using these vendors in
the US, but I know Level3 and other large American vendors use Huawei and
ZTE in their networks.
How do their products perform? How
we
are going to throw Alcatel-Lucent into the mix.
ZTE and Huawei, the big chinese vendors, have also been mentioned to us. I
know there are large national security issues with using these vendors in
the US, but I know Level3 and other large American vendors use Huawei and
ZTE in their networks
And a bunch of ban's around Oct 2013 from a wide variety of
countries...
you mean fear of implants as there are in cisco products?
Was more a statement of fact.
As if it was warranted. I do not know.
-
Alain Hebertaheb...@pubnix.net
PubNIX Inc.
50 boul. St-Charles
P.O. Box 26770 Beaconsfield, Quebec H9W 6G7
Tel: 514-990-5911 http://www.pubnix.netFax:
To be fair, they've fixed one of the big concerns that were raised
with them a couple of years ago: google for huawei + psirt now
actually returns usable results. No idea how well the interface with
them works when you're actually trying to report a vulnerability
(maybe someone can speak up
Has anyone seen/touched Huawei's Atom Router? It was announced at the Mobile
World Congress 2014.. haven't seen anything on the Interweb since. I'd be
interested in getting one or two units to play in my lab!
http://www.huawei.com/mwc2014/en/articles/hw-328011.htm
Eric
Well,
Wasn't the Huawei CEO that stated that they where not interested
into the US market.
( And by proxy ... the Canadian one )
http://www.theregister.co.uk/2013/04/23/huawei_not_interested_in_us/
And a bunch of ban's around Oct 2013 from a wide variety of countries
Huawei has sales personal in the US and does sell here. See
http://huawei.com/us/about-huawei/contact-us/index.htm
And for a more recent Huawei management statement, see
http://usa.chinadaily.com.cn/epaper/2014-04/28/content_17470474.htm
Huawei executive says it still seeks US sales
Thanks
Hello Everybody,
Does any body has experience about running DHCP Server on Huawei DSLAMs?
We wanna run TR069 on our network, We need a DHCP server to pass ACS
parameters.
Like ACS URL, ACS Username and Password.
Thanks
--
Regards,
Shahab Vahabzadeh, Network Engineer and System Administrator
On (2014-01-01 23:51 +0200), Eugeniu Patrascu wrote:
Is this legal? Can NSA walk in to US based company and legally coerce to
install such backdoor? If not, what is the incentive for private company to
cooperate?
As you might have seen from the beginning of time, people in power assume
On Thu, Jan 2, 2014 at 10:01 AM, Saku Ytti s...@ytti.fi wrote:
On (2014-01-01 23:51 +0200), Eugeniu Patrascu wrote:
Is this legal? Can NSA walk in to US based company and legally coerce
to
install such backdoor? If not, what is the incentive for private
company to
cooperate?
On (2013-12-31 23:04 +), Warren Bailey wrote:
that RSA had a check cut for their participation (sell outs..), would it
be out of the realm of possibility cisco knowingly placed this into their
product line? And would it be their mistake to come out with a “we had no
idea!” rather than
If legal, consider risk to NSA. Official product ran inside company to add
requested feature, hundred of people aware of it. Seems both expensive to
order such feature and almost guaranteed to be exposed by some of the
employees.
Alternative method is to presume all software is insecure,
Thank you Randy for pointing that out. However take into account the NANOG
list is moderated, and my comment was delayed for moderation. I was
commenting on posts about trivial things, before that nice post with nice
codenames.
A good year to all. May this be a smoother year to you all that have
huawei), and the TAO crew developing
serious attacks based on unintended product vulnerabilities.
Google has some deniability, as their networks were compromised
without their knowledge.
i doubt we will ever learn the extent of surprise vs culpability of
google, apple, twitter, msoft, ...
Saku
On Wed, 01 Jan 2014 11:55:37 +0200, Saku Ytti said:
Is this legal? Can NSA walk in to US based company and legally coerce to
install such backdoor?
Well, legal or not... we will probably never know exactly what was said, but
apparently the NSA was able to convince/coerce many of the 800 pound
On Wed, Jan 1, 2014 at 3:55 AM, Saku Ytti s...@ytti.fi wrote:
Is this legal? Can NSA walk in to US based company and legally coerce to
install such backdoor? If not, what is the incentive for private company to
cooperate?
As evidenced by Lavabit; apparently, one thing that they CAN do
is
On Wed, Jan 1, 2014 at 11:55 AM, Saku Ytti s...@ytti.fi wrote:
On (2013-12-31 23:04 +), Warren Bailey wrote:
that RSA had a check cut for their participation (sell outs..), would it
be out of the realm of possibility cisco knowingly placed this into their
product line? And would it be
On Tue, Dec 31, 2013 at 5:38 AM, Sabri Berisha sa...@cluecentral.netwrote:
Hi Roland.
I don't know much about Juniper
gear, but it appears that the Juniper boxes listed are similar in nature,
albeit running FreeBSD underneath (correction welcome).
With most Juniper gear, it is actually
I think there needs to be some clarification on how these tools get used,
how often they're used, and if they're ever cleaned up when no longer part
of an active operation. Of course we'll never get that.
The amount of apologists with the attitude this isn't a big deal, nothing
to see here, the
On Tue, Dec 31, 2013 at 8:05 AM, Ray Soucy r...@maine.edu wrote:
This whole backdoor business is a very, very, dangerous game.
While I agree with this (and the issues brought up with NSA's NIST
approved PRNG that RSA used). If I were in their shoes, I would have
been collecting every bit of
@nanog.org list nanog@nanog.org
Objet : Re: NSA able to compromise Cisco, Juniper, Huawei switches
I think there needs to be some clarification on how these tools get used,
how often they're used, and if they're ever cleaned up when no longer part
of an active operation. Of course we'll never get
I think there needs to be some clarification on how these tools get used,
how often they're used, and if they're ever cleaned up when no longer part
of an active operation. Of course we'll never get that.
Highly unlikely, I'd say.
The amount of apologists with the attitude this isn't a big
On (2013-12-31 14:45 +0100), sth...@nethelp.no wrote:
This whole backdoor business is a very, very, dangerous game.
It *is* a big deal. And if you want to get even more scared, listen to
Jacob Appelbaum's talk at the CCC here:
I'm going to wait calmly for some of the examples being
On Dec 31, 2013, at 8:32 AM, Saku Ytti s...@ytti.fi wrote:
I'm going to wait calmly for some of the examples being recovered from the
field, documented and analysed.
If I were Cisco/Juniper/et all I would have a team working on this right now.
It should be trivial for them to insert code into
Since some weeks all my cisco / juniper equipment was replaced with open
source solutions (sometimes with embedded devices) and that works fine.
Google as search engine and Facebook accounts are deleted and some more
things. Cloud solutions outside europe now are forbidden for me. Thank
you NSA
On (2013-12-31 09:03 -0600), Leo Bicknell wrote:
If I were Cisco/Juniper/et all I would have a team working on this right now.
It should be trivial for them to insert code into the routers that say,
hashes all sorts of things (code image, BIOS, any PROMS and EERPOMS and
such on the
On Dec 31, 2013, at 11:50 AM, Saku Ytti s...@ytti.fi wrote:
I asked earlier today JTAC (#2013-1231-0033) and JTAC asked SIRT for tool to
read BIOS and output SHA2 or SHA3 hash, and such tool does not exist yet. I'm
dubious, it might be possible even with existing tools. At least it's
On (2013-12-31 16:22 +0100), na...@mitteilung.com wrote:
Since some weeks all my cisco / juniper equipment was replaced with open
source solutions (sometimes with embedded devices) and that works fine.
Google as search engine and Facebook accounts are deleted and some more
things. Cloud
Hi,
some approaches were discussed in 2010, by Graeme Neilson from NZ here:
https://www.troopers.de/wp-content/uploads/2012/10/TROOPERS10_Netscreen_of_the_Dead_Graeme_Neilson.pdf
a later year, at the same conference, he gave a private session demonstrating
basically the same stuff for JunOS,
On Dec 31, 2013, at 12:49 PM, Enno Rey e...@ernw.de wrote:
Hi,
some approaches were discussed in 2010, by Graeme Neilson from NZ here:
https://www.troopers.de/wp-content/uploads/2012/10/TROOPERS10_Netscreen_of_the_Dead_Graeme_Neilson.pdf
a later year, at the same conference, he gave a
* Randy Bush:
Clay Kossmeyer here from the Cisco PSIRT.
shoveling kitty litter as fast as you can, eh?
http://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20131229-der-spiegel
The article does not discuss or disclose any Cisco product vulnerabilities.
this is
On (2013-12-31 18:49 +0100), Enno Rey wrote:
some approaches were discussed in 2010, by Graeme Neilson from NZ here:
https://www.troopers.de/wp-content/uploads/2012/10/TROOPERS10_Netscreen_of_the_Dead_Graeme_Neilson.pdf
a later year, at the same conference, he gave a private session
On Dec 31, 2013, at 7:05 AM, Ray Soucy wrote:
I think there needs to be some clarification on how these tools get used,
how often they're used, and if they're ever cleaned up when no longer part
of an active operation. Of course we'll never get that.
But that's exactly what we need.
Look
On Mon, 30 Dec 2013 19:38:12 -0800, Sabri Berisha said:
However, attempting any of the limited attacks that I can think of would
require expert-level knowledge of not just the overall architecture, but also
of the microcode that runs on the specific PFE that the attacker would target,
Already
There's a limit to what can reasonably be called a *product*
vulnerability.
right. if the product was wearing a low-cut blouse and a short skirt,
it's not.
it's weasel words (excuse the idiom). shoveling kitty litter over a big
steaming pile.
let me insert a second advert for jake's 30c3
infrastructures.
//warren
PS - I mentioned .cn specifically because of the Huawei aspect, in
addition to the fact that it has been widely publicized we are in a ³cyber
war² with them.
On 12/31/13, 12:07 PM, Randy Bush ra...@psg.com wrote:
There's a limit to what can reasonably be called a *product
On Jan 1, 2014, at 2:07 AM, Randy Bush ra...@psg.com wrote:
it's weasel words (excuse the idiom). shoveling kitty litter over a big
steaming pile.
Clayton is responding to the ability that he's allowed, and he's using words
very precisely.
Here's Cisco's official responses, so far.
some Œsplainin to do - we buy these
devices as ³security appliances², not NSA rootkit gateways. I hope the .cn
guys don¹t figure out what¹s going on here, I¹d imagine there are plenty
of ASA¹s in the .gov infrastructures.
//warren
PS - I mentioned .cn specifically because of the Huawei aspect
On Jan 1, 2014, at 2:16 AM, Warren Bailey
wbai...@satelliteintelligencegroup.com wrote:
Randy is right here.. Cisco has some Œsplainin to do - we buy these devices
as ³security appliances², not NSA rootkit gateways
* Randy Bush:
There's a limit to what can reasonably be called a *product*
vulnerability.
right. if the product was wearing a low-cut blouse and a short skirt,
it's not.
Uh-oh, is this an attempt at an argument based on a blame the victim
rape analogy?
On Jan 1, 2014, at 2:34 AM, Jonathan Greenwood II gwoo...@gmail.com wrote:
The best response I've seen to all this hype and I completely agree with
Scott:
Do ya think that you wouldn't also notice a drastic increase in outbound
traffic to begin with? It's fun to watch all the hype and
it's weasel words (excuse the idiom). shoveling kitty litter over a
big steaming pile.
Clayton is responding to the ability that he's allowed, and he's using
words very precisely.
qed
pgp7iFOpQgLqE.pgp
Description: PGP signature
The best response I've seen to all this hype and I completely agree with
Scott:
Do ya think that you wouldn't also notice a drastic increase in outbound
traffic to begin with? It's fun to watch all the hype and things like
that, but to truly sit down and think about what it would actually
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 12/31/2013 12:33 PM, sth...@nethelp.no wrote:
The best response I've seen to all this hype and I completely agree with
Scott:
Do ya think that you wouldn't also notice a drastic increase in
outbound traffic to begin with? It's fun to watch
Explaining, not a denial written by their legal department. I find it
insanely difficult to believe cisco systems has a backdoor into some of
their product lines with no knowledge or participation. Given the fact
that RSA had a check cut for their participation (sell outs..), would it
be out of
* Warren Bailey:
Explaining, not a denial written by their legal department. I find it
insanely difficult to believe cisco systems has a backdoor into some of
their product lines with no knowledge or participation.
As far as I understand it, these are firmware tweaks or implants
sitting on a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 12/31/2013 4:02 PM, Florian Weimer wrote:
* Warren Bailey:
Explaining, not a denial written by their legal department. I find it
insanely difficult to believe cisco systems has a backdoor into some of
their product lines with no knowledge or
China. ;) lol
Sent from my Mobile Device.
Original message
From: Paul Ferguson fergdawgs...@mykolab.com
Date: 12/31/2013 4:13 PM (GMT-08:00)
To: nanog@nanog.org
Subject: Re: NSA able to compromise Cisco, Juniper, Huawei switches
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Found some interesting news on one of the Australia news websites.
http://www.scmagazine.com.au/News/368527,nsa-able-to-compromise-cisco-juniper-huawei-switches.aspx
Regards,
Steven.
On (2013-12-30 20:30 +1100), sten rulz wrote:
Found some interesting news on one of the Australia news websites.
http://www.scmagazine.com.au/News/368527,nsa-able-to-compromise-cisco-juniper-huawei-switches.aspx
The quality of this data is too damn low.
Not as bad as this though, http
Saku Ytti s...@ytti.fi wrote:
On (2013-12-30 20:30 +1100), sten rulz wrote:
I really think we're doing disservice to an issue which might be at
scale of
human-rights issue, by spamming media with 0 data news. Where is this
backdoor? How does it work? How can I recreate on my devices?
I don't
On (2013-12-30 06:12 -0500), Shawn Wilson wrote:
I don't really want you to know how to recreate it until the companies have
had a chance to fix said issue. I'd hope, if such issues were disclosed,
those news outlets would go through proper channels of disclosure before
going to press with
On Dec 30, 2013, at 5:06 PM, Saku Ytti s...@ytti.fi wrote:
The quality of this data is too damn low.
The #1 way that Cisco routers and switches are compromised is brute-forcing
against an unsecured management plane, with username 'cisco' and password
'cisco.
The #1 way that Juniper and
On Dec 30, 2013, at 6:18 PM, Saku Ytti s...@ytti.fi wrote:
I welcome the short-term havok and damage of such disclose if it would be
anywhere near the magnitude implied, it would create pressure to change
things.
This is the type of change we're likely to see, IMHO:
Even more outrageous than the domestic spying is the arrogance to think
that they can protect the details on backdoors into critical
infrastructure.
They may have basically created the framework for an Internet-wide kill
switch, that likely also affects every aspect of modern communication.
On Mon, Dec 30, 2013 at 8:07 AM, Ray Soucy r...@maine.edu wrote:
I hope Cisco, Juniper, and others respond quickly with updated images for
all platforms affected before the details leak.
So, if this plays out nice (if true, it won't), the fix will come
months before the disclosure. Think, if
On Dec 30, 2013, at 8:07 PM, Ray Soucy r...@maine.edu wrote:
I hope Cisco, Juniper, and others respond quickly with updated images for all
platforms affected before the details leak.
During my time at Cisco, I was involved deeply enough with various platform
teams as well as PSIRT, etc., to
I'd love to know how they were getting in flight wifi.
Sent from my Mobile Device.
Original message
From: sten rulz stenr...@gmail.com
Date: 12/30/2013 12:32 AM (GMT-09:00)
To: nanog@nanog.org
Subject: NSA able to compromise Cisco, Juniper, Huawei switches
Found some
On Mon, 30 Dec 2013 14:34:52 +, Dobbins, Roland said:
My assumption is that this allegation about Cisco and Juniper is the result
of non-specialists reading about lawful intercept for the first time, and
failing to do their homework.
That does raise an interesting question. What
On Dec 30, 2013, at 10:44 PM, valdis.kletni...@vt.edu
valdis.kletni...@vt.edu wrote:
What percentage of Cisco gear that supports a CALEA lawful intercept mode is
installed in situations where CALEA doesn't apply, and thus there's a high
likelyhood that said support is misconfigured and
On Dec 30, 2013, at 11:03 PM, Dobbins, Roland rdobb...@arbor.net wrote:
AFAIK, it must be explicitly enabled in order to be functional. It isn't the
sort of thing which is enabled by default, nor can it be enabled without
making explicit configuration changes.
It's also possible they're
On 12/30/2013 08:03 AM, Dobbins, Roland wrote:
On Dec 30, 2013, at 10:44 PM, valdis.kletni...@vt.edu
valdis.kletni...@vt.edu wrote:
What percentage of Cisco gear that supports a CALEA lawful intercept mode is
installed in situations where CALEA doesn't apply, and thus there's a high
On Mon, Dec 30, 2013 at 04:03:07PM +, Dobbins, Roland wrote:
On Dec 30, 2013, at 10:44 PM, valdis.kletni...@vt.edu
valdis.kletni...@vt.edu wrote:
What percentage of Cisco gear that supports a CALEA lawful intercept mode
is installed in situations where CALEA doesn't apply, and thus
This might be an interesting example of it's (mis)use.
http://en.wikipedia.org/wiki/Greek_wiretapping_case_2004%E2%80%932005
Sam Moats
On 2013-12-30 11:16, Enno Rey wrote:
On Mon, Dec 30, 2013 at 04:03:07PM +, Dobbins, Roland wrote:
On Dec 30, 2013, at 10:44 PM, valdis.kletni...@vt.edu
, Juniper, Huawei switches
Found some interesting news on one of the Australia news websites.
http://www.scmagazine.com.au/News/368527,nsa-able-to-compromise-cisco-juniper-huawei-switches.aspx
Regards,
Steven.
Simple. Grab it from where it hits the base stations. One of the two
big in-flight
1 - 100 of 284 matches
Mail list logo