[82699] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: Cisco IOS Exploit Cover Up

daemon@ATHENA.MIT.EDU (Neil J. McRae)
Thu Jul 28 03:29:54 2005

From: "Neil J. McRae" <neil@DOMINO.ORG>
To: "'Dan Hollis'" <goemon@anime.net>,
	"'Fergie (Paul Ferguson)'" <fergdawg@netzero.net>
Cc: <hannigan@verisign.com>, <nanog@merit.edu>
Date: Thu, 28 Jul 2005 08:29:22 +0100
In-Reply-To: <Pine.LNX.4.44.0507271338441.14889-100000@sasami.anime.net>
Errors-To: owner-nanog@merit.edu



> This is looking like a complete PR disaster for cisco. They 
> would have been better off allowing the talk to take place, 
> and actually fixing the holes rather than wasting money on a 
> small army of razorblade-equipped censors.

I couldn't disagree more. Cisco are trying to control the
situation as best they can so that they can deploy the needed
fixes before the $scriptkiddies start having their fun. Its
no different to how any other vendor handles a exploit and
I'm surprised to see network operators having such an attitude.

Regards.
Neil.


home help back first fref pref prev next nref lref last post