[182042] in North American Network Operators' Group
Re: Possible Sudden Uptick in ASA DOS?
daemon@ATHENA.MIT.EDU (Ricky Beam)
Thu Jul 9 17:35:43 2015
X-Original-To: nanog@nanog.org
To: "Jared Mauch" <jared@puck.nether.net>
Date: Thu, 09 Jul 2015 17:35:38 -0400
From: "Ricky Beam" <jfbeam@gmail.com>
In-Reply-To: <5BD9B971-CA92-43A0-B43E-D0BFB3FEC0D0@puck.nether.net>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org
On Thu, 09 Jul 2015 07:27:16 -0400, Jared Mauch <jared@puck.nether.net>
wrote:
> Really just people not patching their software after warnings more than
> six months ago:
A lot goes into "updates". Not the least of which is *knowing* about the
issue. Then getting the patched code, then lab testing, then regulatory
approval(s), then maintenance window(s)...
> Cisco has released free software updates that address these
> vulnerabilities. Workarounds that mitigate some of these vulnerabilities
> are available.
"Free" if you have a support contract. (the clause 3 "contact TAC" method
is all too often a serious pain in the ass.)
--Ricky