I think the point Eric was trying to make is that while, indeed, the initial,
stated goal might be to be able to issue certificates to replace those expired
or expiring, there's just a jump/skip/hop to force installation of this root CA
certificate in all browsers, or for Russia to block downloa
NANOG mailing list subscribers:
Hi there. My name is Dario Ciccarone and I work as an Incident
Manager on the Cisco PSIRT. The Cisco Product Security Incident Response
Team (PSIRT) is responsible for responding to Cisco product security
incidents. The Cisco PSIRT is a dedicated, global team
NANOG members:
Hi there. This is Dario Ciccarone from the Cisco PSIRT - the Product
Security Incident Response Team. This is to acknowledge we're aware of
this issue, and we're working with all the appropriate parties.
Indeed, it seems the culprit is Cisco bug ID CSCul36176 -
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Rashed, NANOG members:
Hi there. My name is Dario Ciccarone and I work as an Incident
Manager on the Cisco PSIRT - the Product Security Incident Response Team.
We saw your email to the NANOG list, with the subject "Cisco Ro
Luca:
Check
http://www.cisco.com/en/US/docs/ios/sec_data_plane/configuration/guide/s
ec_acl_sel_drop_ps6350_TSD_Products_Configuration_Guide_Chapter.html#wp1
043334
Not the whole story, but :)
Hope it helps,
Dario
> -Original Message-
> From: Luca Tosol
5 matches
Mail list logo