[61916] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Microsoft distributes free CDs in Japan to patch Windows

daemon@ATHENA.MIT.EDU (Petri Helenius)
Tue Sep 9 14:52:47 2003

Date: Tue, 09 Sep 2003 21:51:41 +0300
From: Petri Helenius <pete@he.iki.fi>
To: Jack Bates <jbates@brightok.net>
Cc: Sean Donelan <sean@donelan.com>, Ray Wong <rayw@rayw.net>,
	nanog@merit.edu
In-Reply-To: <3F5CD592.4020200@brightok.net>
Errors-To: owner-nanog-outgoing@merit.edu


Jack Bates wrote:

>
> At some point, patching and maintaining security needs to be handled 
> at the connection. If the protocol is written, the ISP supports it, 
> then those with connection software supporting the protocol will 
> maintain security while those circumventing it with other connection 
> methods will not. However, given that the consumer base in question 
> usually utilizes a default M$ install, if M$ incorporated it into 
> their DUN, dhcp, pppoe, then a large portion of the problem would be 
> solved.
>
How long until the next worm/virus/trojan would first disable this 
handshake and then attach
to the network? Or you expect to terminate customers within the 24 hours 
new patches
are out if they donīt patch? or 72 hours?

Pete



home help back first fref pref prev next nref lref last post