[40008] in North American Network Operators' Group
Re: Code Red round two
daemon@ATHENA.MIT.EDU (Stephen J. Wilcox)
Tue Jul 31 09:57:23 2001
Date: Tue, 31 Jul 2001 14:55:47 +0100 (BST)
From: "Stephen J. Wilcox" <steve@opaltelecom.co.uk>
To: Jeff Ogden <jogden@merit.edu>
Cc: nanog@merit.edu
In-Reply-To: <v04210107b78c66f330ac@[198.108.90.150]>
Message-ID: <Pine.LNX.4.21.0107311453020.23776-100000@staff.opaltelecom.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Errors-To: owner-nanog-outgoing@merit.edu
as a non-iis user i will probably watch the graphs of infected hosts
whilst chuckling to myself
but i've already sent security bulletins to all customers when the worm
was disassembled and its potential known.. hasnt everyone??? (duh if not!)
Steve
PS Do people write vulnerabilities into servers in order to justify the
jobs of security people or are they just bad at what they do?
On Tue, 31 Jul 2001, Jeff Ogden wrote:
>
> So what, if anything, are people planning to do differently as 8 pm
> EDT today and the possibility of a new round of Code Red Worm
> activity approaches? Are there things that we as network operators
> can and should be doing beyond encouraging end users to patch their
> vulnerable systems?
>
> -Jeff
>