[182042] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Possible Sudden Uptick in ASA DOS?

daemon@ATHENA.MIT.EDU (Ricky Beam)
Thu Jul 9 17:35:43 2015

X-Original-To: nanog@nanog.org
To: "Jared Mauch" <jared@puck.nether.net>
Date: Thu, 09 Jul 2015 17:35:38 -0400
From: "Ricky Beam" <jfbeam@gmail.com>
In-Reply-To: <5BD9B971-CA92-43A0-B43E-D0BFB3FEC0D0@puck.nether.net>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

On Thu, 09 Jul 2015 07:27:16 -0400, Jared Mauch <jared@puck.nether.net>  
wrote:
> Really just people not patching their software after warnings more than  
> six months ago:

A lot goes into "updates". Not the least of which is *knowing* about the  
issue. Then getting the patched code, then lab testing, then regulatory  
approval(s), then maintenance window(s)...

> Cisco has released free software updates that address these  
> vulnerabilities. Workarounds that mitigate some of these vulnerabilities  
> are available.

"Free" if you have a support contract. (the clause 3 "contact TAC" method  
is all too often a serious pain in the ass.)

--Ricky

home help back first fref pref prev next nref lref last post