[61916] in North American Network Operators' Group
Re: Microsoft distributes free CDs in Japan to patch Windows
daemon@ATHENA.MIT.EDU (Petri Helenius)
Tue Sep 9 14:52:47 2003
Date: Tue, 09 Sep 2003 21:51:41 +0300
From: Petri Helenius <pete@he.iki.fi>
To: Jack Bates <jbates@brightok.net>
Cc: Sean Donelan <sean@donelan.com>, Ray Wong <rayw@rayw.net>,
nanog@merit.edu
In-Reply-To: <3F5CD592.4020200@brightok.net>
Errors-To: owner-nanog-outgoing@merit.edu
Jack Bates wrote:
>
> At some point, patching and maintaining security needs to be handled
> at the connection. If the protocol is written, the ISP supports it,
> then those with connection software supporting the protocol will
> maintain security while those circumventing it with other connection
> methods will not. However, given that the consumer base in question
> usually utilizes a default M$ install, if M$ incorporated it into
> their DUN, dhcp, pppoe, then a large portion of the problem would be
> solved.
>
How long until the next worm/virus/trojan would first disable this
handshake and then attach
to the network? Or you expect to terminate customers within the 24 hours
new patches
are out if they donīt patch? or 72 hours?
Pete