North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: Boing Boing: Michael Lynn's controversial Cisco security presentat ion

  • From: John C. A. Bambenek
  • Date: Fri Jul 29 12:58:10 2005
  • Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:reply-to:to:subject:cc:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; b=ARtFAwMt8CDNo6GbeiEPwp+VSJ03HT5um+HroSNREvtuAeVG9PSHH2XyVuK7Y4u86R3P8qObnzgV4zkp7hCh/7Wmbr8kURuAOR14W/98f4ED9n3dgg7LYyfnWoqx0GnqOC8Ld1pQ/dU/PCH/0CjbRwR1YexS008e1TJoQmHsOxg=

Remind me why I bother with information security when industry and the
government seems to want to ensure things can be pwn3d as easily as
possible...

On 7/29/05, Fergie (Paul Ferguson) <[email protected]> wrote:
> 
> 
> Now the FBI is investigating Lynn for criminal wrongdoing?
> 
> Kim Zetter writes in Wired News this morning that:
> 
> [snip]
> 
> The FBI is investigating a computer security researcher for criminal conduct after he revealed that critical systems supporting the internet and many networks have a serious software flaw that could allow someone to crash or take control of the routers.
> 
> [and]
> 
> The FBI declined to discuss the case.
> 
> [snip]
> 
> http://www.wired.com/news/politics/0,1283,68356,00.html
> 
> - ferg
> 
> 
> 
> 
> >
> > Over on Boing Boing:
> >
> > [snip]
> >
> > Here's a PDF that purports to be Michael Lynn's presentation
> > on Cisco's critical vulnerabilities ("The Holy Grail: Cisco
> > IOS Shellcode And Exploitation Techniques"), delivered at
> > last week's Black Hat conference. Lynn's employer, ISS,
> > wouldn't let him deliver the talk (they'd been leant on by
> > Cisco), so Lynn quit his job, walked onstage and delivered it
> > anyway. (See yesterday's post and Scheneier's take for more).
> > 1.9MB PDF Link
> >
> > [snip]
> >
> > http://www.boingboing.net/2005/07/29/michael_lynns_contro.html
> >
> 
> 


Thanks,
j