Re: [j-nsp] Meltdown and Spectre

2018-01-08 Thread Thilo Bangert

Hi,



Only if said person can execute *arbitrary* code.  Which you can't on my
routers, no matter what sort of account I'm giving you.



You mean like

$ start shell

Fine if you have that disabled. And of course, assuming there a no other 
bugs in the software stack.


Thilo
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] [c-nsp] Meltdown and Spectre

2018-01-08 Thread Thilo Bangert



Den 06-01-2018 kl. 19:49 skrev Sebastian Becker:

Same here. User that have access are implicit trusted.


You do have individual user accounts on the equipment, right?

The idea of having secure individual logins goes down the drain with 
Meltdown and Spectre. You want to be sure that a person logged into a 
box cannot snoop the password of a co-worker.


Meltdown and Spectre are relevant on all affected computing equipment.

> So no need for panic.

The usefulness of panic has been degrading the past couple of thousand 
years ;-)


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp