[c-nsp] [j-nsp] Meltdown and Spectre

Sebastian Becker sb at lab.dtag.de
Mon Jan 8 11:16:01 EST 2018


The password will not be seen on the box itself so no problem. The users are tacacs+ authorized/authenticated.
Most scenarios are much easier to accomplish by using the already granted rights on the boxes per user then using these kinds of attack vectors opened by Meltdown and Spectre.

Our boxes simply do not run other code than that what is delivered by the vendors.

— 
Sebastian Becker
sb at lab.dtag.de

> Am 08.01.2018 um 09:32 schrieb Thilo Bangert <thilo.bangert at gmail.com>:
> 
> Den 06-01-2018 kl. 19:49 skrev Sebastian Becker:
>> Same here. User that have access are implicit trusted.
> 
> You do have individual user accounts on the equipment, right?
> 
> The idea of having secure individual logins goes down the drain with Meltdown and Spectre. You want to be sure that a person logged into a box cannot snoop the password of a co-worker.
> 
> Meltdown and Spectre are relevant on all affected computing equipment.
> 
> > So no need for panic.
> 
> The usefulness of panic has been degrading the past couple of thousand years ;-)
> 
> _______________________________________________
> juniper-nsp mailing list juniper-nsp at puck.nether.net
> https://puck.nether.net/mailman/listinfo/juniper-nsp



More information about the cisco-nsp mailing list