[59749] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Patching for Cisco vulnerability

daemon@ATHENA.MIT.EDU (Daniel Roesen)
Fri Jul 18 15:22:03 2003

Date: Fri, 18 Jul 2003 21:21:28 +0200
From: Daniel Roesen <dr@cluenet.de>
To: nanog@merit.edu
Mail-Followup-To: nanog@merit.edu
In-Reply-To: <20030718190445.GC4861@puck.nether.net>; from jared@puck.Nether.net on Fri, Jul 18, 2003 at 03:04:45PM -0400
Errors-To: owner-nanog-outgoing@merit.edu


On Fri, Jul 18, 2003 at 03:04:45PM -0400, Jared Mauch wrote:
> 	most providers can easily go from (for example)
> 12.0(21)S3 to 12.0(21)S7 with less testing than from 12.0(21)S to 12.0(25)S

12.0(21)S* (at least S5 and above) have broken SNMP interface counters
and Cisco refuses to fix the bug in 12.0(21)S*, so people who don't
want to lose money (accounting) are forced to upgrade to 12.0(25)S*.
I guess they want to force all "conservative" ISPs to jump over
the 12.0(22)S "barrier".

Some things won't be forgotten (see also recent discussion about the
new non-"Cisco"-GBIC blocking). Voting with pockets takes place.


Regards,
Daniel

home help back first fref pref prev next nref lref last post