[59683] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Cisco IOS Vulnerability

daemon@ATHENA.MIT.EDU (Jack Bates)
Thu Jul 17 14:45:33 2003

Date: Thu, 17 Jul 2003 13:48:19 -0500
From: Jack Bates <jbates@brightok.net>
To: Valdis.Kletnieks@vt.edu
Cc: Darrell Kristof <darrell.kristof@wholefoods.com>, nanog@merit.edu
In-Reply-To: <200307170707.h6H77imU016401@turing-police.cc.vt.edu>
Errors-To: owner-nanog-outgoing@merit.edu


Valdis.Kletnieks@vt.edu wrote:
> In other words - yeah, it's probably important to get this update deployed. But
> unless somebody has hard evidence to the contrary, I'm betting on it just being
> an attempt to not let things leak out till they're ready to ship across the
> board. That's a LOT of trains and rebuilds that all need to be ready at the
> same time, and Fred Brooks taught us all 30 years ago what happens when you try
> something like that. :)
> 

One of the 12.2 lines I have to use shows a post of June, 25. My guess 
is that they started rebuilding some of the later IOS versions and 
worked their way back. My 12.0S line didn't post until today.

-Jack


home help back first fref pref prev next nref lref last post