BrainEater
[H]ard|Gawd
- Joined
- Jul 21, 2004
- Messages
- 1,100
I'm betting they are roll-your-own, but I am curious all the same.

Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature currently requires accessing the site using the built-in Safari browser.
I'm betting they are roll-your-own, but I am curious all the same.
![]()
Without using one being overtly illegal, I recommend this:What kind of question gets me in the most amount of trouble in the shortest amount of time?
openbsd-all-around![]()
What kind of question gets me in the most amount of trouble in the shortest amount of time?
I have an acquaintance that works for Juniper.
I left many choices off the list really.
-
![]()
What kind of question gets me in the most amount of trouble in the shortest amount of time?
In light of all cybersecurity issues between nation states, and being a network security professional, I think the question is perfectly acceptable. I want to know that our govt uses secure devices and in fact would like to see an audit report made public attesting to that fact. They don't have to print the vulnerabilities - but a report on the reliability and security levels would be nice - along with plans to upgrade/strengthen them.
In light of all cybersecurity issues between nation states, and being a network security professional, I think the question is perfectly acceptable. I want to know that our govt uses secure devices and in fact would like to see an audit report made public attesting to that fact. They don't have to print the vulnerabilities - but a report on the reliability and security levels would be nice - along with plans to upgrade/strengthen them.
Then that acquaintance should have already provided the answer for you.
Not always, a lot of times the vendor doesn't know that their device is being used and for these agencies they buy a large number of them for penetration testing and evaluation.
Umm, no, the vendor absolutely knows. In fact, these agencies hire Juniper employees directly for support, which is generally how Juniper likes to do business. The vendors are very much involved in the process of designing the solution, securing the devices, and supporting them. In fact, that is written in government contracts on purpose.
I am telling you for a fact they do not know what the devices that they purchase are being used for. Some specialized people may, but they are not allowed to send it upstream due to security clearance and need to know basis.
If the Cisco/NSA relationship was so close then WHY would the NSA do shipping intercepts on devices outbound to customers rather than just intercept it internal while at Cisco?
I am telling you for a fact that they do. There is no secret in what the government uses for routers, the only secrets is in the overall architecture of their network stacks. There are some devices in the stack that they might keep secret, but the routers and switches are not one of them. I don't know what "shipping intercepts" you are talking about, but most shipments go to a centralized location and then are transported from there to the actual site for internal tracking purposes. That way they can check the equipment into a central database and they know what sites have what equipment, and then they know when it is out of date, needs to be upgraded, and make it easier to swap things in and out from a central source. This isn't much different from how large corporations operate.
You are right for their COTS(Commercial Off The Shelf) stuff that isn't involved with the higher levels of security this is correct. But once you move past the office drones things change. You can bet your left nut that the NSA is using a lot of custom stuff, hell some of the bases around here do.
Shipping intercepts is where the NSA will find out that a target is ordering a switch/router or other piece of equipment the NSA will redirect that shipment covertly to one of their labs and install some "interesting" firmware/hardware and then make it reenter the shipping center covertly. You can bet your right nut that the vendor gives the NSA no support in either doing this or developing the vectors of how this is done or how the firmware/hardware is developed.
Cheers.
Without using one being overtly illegal, I recommend this:
"Ma'am, Are you pregnant or are you just fat?"
Try this pretty much anywhere. Guaranteed instant results.