[194568] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: Please run windows update now

daemon@ATHENA.MIT.EDU (Keith Medcalf)
Sat May 13 01:21:56 2017

X-Original-To: nanog@nanog.org
Date: Fri, 12 May 2017 23:21:51 -0600
In-Reply-To: <CA+zb_vGHn2HZbEeduyk1Nw2Wu8s17UPEHWX3wn+O15UsW1=gzw@mail.gmail.com>
From: "Keith Medcalf" <kmedcalf@dessus.com>
To: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org


Not to mention of course that the version of Windows 10 that actually has a=
ll Microsoft's wonder-dunder-touted-all-and-fro security features is the on=
e that most mere  mortals cannot buy.

I wunder.  

When there are these wunderful fluffings of the security of Windows 10, sho=
uld one be suing Microsoft for not explicitly stating in the opening senten=
ce that the features touted do not apply to any version of Windows that can=
 be purchased at whim (ie, retail) and only applies to the "Enterprise" ver=
sion which is *only* available with a minimum purchase quantity and the sel=
ling of the first (and second) born to Microsoft, and at that only after en=
tering into a really nasty contract with Microsoft?  

Or should one be suing all the "security fools and newsfrothers" that promu=
lgate the story without specifying that the emperors "new secure clothing" =
is only available to "Enterprise" customers with special contracts to Micro=
soft and failing to warn that Microsoft has deliberately left everyone else=
 "naked and unprotected"?

Or should one simply sue them all and let God (or a judge) sort it out?
 
-- 
=CB=99u=CA=8Dop-=C7=9Dp=C4=B1sdn s=C4=B1 =C9=B9o=CA=87=C4=B1uo=C9=AF =C9=B9=
no=CA=8E 's=C4=B1=C9=A5=CA=87 p=C9=90=C7=9D=C9=B9 u=C9=90=C9=94 no=CA=8E =
=C9=9F=C4=B1


> -----Original Message-----
> From: Joe [mailto:jbfixurpc@gmail.com]
> Sent: Friday, 12 May, 2017 23:08
> To: Keith Medcalf
> Cc: nanog@nanog.org
> Subject: Re: Please run windows update now
> 
> One word. Linux.
> 
> After this we'll probably see (yet more) additional processes running on
> windows boxes safe guarding against issues like this, forcing windoze
> users to upgrade memory/processor/disk space. I, for one, am not looking
> at Windoze 10 S as it locks too many applications needed for work to the
> Windoze store.
> 
> 
> Getting kind of ridiculous if you ask me.
> 
> 
> -Joe
> 
> 
> On Fri, May 12, 2017 at 11:56 PM, Keith Medcalf <kmedcalf@dessus.com>
> wrote:
> 
> 
> 
> 	Well, this one was patched (or more accurately, undone).  Perhaps.
> Maybe.
> 
> 	How many other "paid defects" do you estimate there are in Microsoft
> Windows waiting to be exploited when discovered (or disclosed) by someone
> other than the "Security Agency" buying the defect?
> 
> 	Almost certainly more than just this one ... and almost certainly
> there is more than a single "payor agency" independently purchasing the
> deliberate introduction of code defects.
> 
> 	--
> 	=CB=99u=CA=8Dop-=C7=9Dp=C4=B1sdn s=C4=B1 =C9=B9o=CA=87=C4=B1uo=C9=AF =C9=
=B9no=CA=8E 's=C4=B1=C9=A5=CA=87 p=C9=90=C7=9D=C9=B9 u=C9=90=C9=94 no=CA=8E=
 =C9=9F=C4=B1
> 
> 
> 	> -----Original Message-----
> 	> From: Nathan Brookfield [mailto:Nathan.Brookfield@simtronic.com.au
> <mailto:Nathan.Brookfield@simtronic.com.au> ]
> 	> Sent: Friday, 12 May, 2017 22:48
> 	> To: Keith Medcalf
> 	> Cc: nanog@nanog.org
> 	> Subject: Re: Please run windows update now
> 	>
> 	> Well it was patched by Microsoft of March 14th, just clearly
> people
> 	> running large amounts of probably Windows XP have been owned.
> 	>
> 	> Largely in Russia.
> 	>
> 	> Nathan Brookfield
> 	> Chief Executive Officer
> 	>
> 	> Simtronic Technologies Pty Ltd
> 	> http://www.simtronic.com.au
> 	>
> 	> On 13 May 2017, at 14:47, Keith Medcalf <kmedcalf@dessus.com>
> wrote:
> 	>
> 	>
> 	> The SMBv1 issue was disclosed a year or two ago and never patched.
> 	> Anyone who was paying attention would already have disabled SMBv1.
> 	>
> 	> Thus is the danger and utter stupidity of "overloading" the
> function of
> 	> service listeners with unassociated road-apples.  Wait until the
> bad guys
> 	> figure out that you can access the same "services" via a
> connection to the
> 	> DNS port (UDP and TCP 53) on windows machines ...
> 	>
> 	> --
> 	> =CB=99u=CA=8Dop-=C7=9Dp=C4=B1sdn s=C4=B1 =C9=B9o=CA=87=C4=B1uo=C9=AF =
=C9=B9no=CA=8E 's=C4=B1=C9=A5=CA=87 p=C9=90=C7=9D=C9=B9 u=C9=90=C9=94 no=CA=
=8E =C9=9F=C4=B1
> 	>
> 	>
> 	> > -----Original Message-----
> 	> > From: NANOG [mailto:nanog-bounces+kmedcalf <mailto:nanog-
> bounces%2Bkmedcalf> =3Ddessus.com@nanog.org] On
> 	> Behalf
> 	> > Of Karl Auer
> 	> > Sent: Friday, 12 May, 2017 18:58
> 	> > To: nanog@nanog.org
> 	> > Subject: Re: Please run windows update now
> 	> >
> 	> >> On Fri, 2017-05-12 at 10:30 -0800, Royce Williams wrote:
> 	> >> - In parallel, consider investigating low-hanging fruit by OU
> 	> >> (workstations?) to disable SMBv1 entirely.
> 	> >
> 	> > Kaspersky reckons the exploit applies to SMBv2 as well:
> 	> >
> 	> > https://securelist.com/blog/incidents/78351/wannacry-ransomware-
> used-in <https://securelist.com/blog/incidents/78351/wannacry-ransomware-
> used-in>
> 	> > -widespread-attacks-all-over-the-world/
> 	> >
> 	> > I thought it was a typo in para 2 and the table, but they
> emailed back
> 	> > saying nope, SMBv2 is (was) also broken. However, they also say
> (same
> 	> > page) that the MS patch released in March this year fixes it.
> 	> >
> 	> > Assuming they are right, I wonder why Microsoft didn't mention
> SMBv2?
> 	> >
> 	> > Regards, K.
> 	> >
> 	> > --
> 	> >
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> 	> > Karl Auer (kauer@biplane.com.au)
> 	> > http://www.biplane.com.au/kauer
> <http://www.biplane.com.au/kauer>
> 	> > http://twitter.com/kauer389
> 	> >
> 	> > GPG fingerprint: A52E F6B9 708B 51C4 85E6 1634 0571 ADF9 3C1C
> 6A3A
> 	> > Old fingerprint: E00D 64ED 9C6A 8605 21E0 0ED0 EE64 2BEE CBCB
> C38B
> 	> >
> 	>
> 	>
> 	>
> 
> 
> 
> 
> 
> 





home help back first fref pref prev next nref lref last post