Umm, you type the password into the box, right?  The box stores that password 
in memory so that it can build a TACACS+ request packet to send to the server?  
Unless you are using SSH keys in lieu of passwords.

On Mon, Jan 08, 2018 at 05:16:01PM +0100, Sebastian Becker wrote:
> The password will not be seen on the box itself so no problem. The users are 
> tacacs+ authorized/authenticated.
> Most scenarios are much easier to accomplish by using the already granted 
> rights on the boxes per user then using these kinds of attack vectors opened 
> by Meltdown and Spectre.
> 
> Our boxes simply do not run other code than that what is delivered by the 
> vendors.
> 
> — 
> Sebastian Becker
> s...@lab.dtag.de
> 
> > Am 08.01.2018 um 09:32 schrieb Thilo Bangert <thilo.bang...@gmail.com>:
> > 
> > Den 06-01-2018 kl. 19:49 skrev Sebastian Becker:
> >> Same here. User that have access are implicit trusted.
> > 
> > You do have individual user accounts on the equipment, right?
> > 
> > The idea of having secure individual logins goes down the drain with 
> > Meltdown and Spectre. You want to be sure that a person logged into a box 
> > cannot snoop the password of a co-worker.
> > 
> > Meltdown and Spectre are relevant on all affected computing equipment.
> > 
> > > So no need for panic.
> > 
> > The usefulness of panic has been degrading the past couple of thousand 
> > years ;-)
_______________________________________________
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Reply via email to