Here we had to upgrade our JuniperĀ“s router because of these exploit. Juniper advertised all customers to update asap.
Gustavo Santos Analista de Redes CCNA , MTCNA , MTCRE, MTCINE, JUNCIA-ER 2013/2/7 Jeremy L. Gaddis <jer...@as54225.net> > * Matt Hoppes <mhop...@indigowireless.com> wrote: > > Did anyone else see an explosion on the Level3 network this morning? > > They've been up and down all morning since around 2:30 eastern time... > > just recovered recently. > > >From the e-mail notification I received from Level 3 (~13 hours before > the start of the maintenance window): > > "Emergency Maintenance Advisement - This maintenance is scheduled." > > ... and ... > > "Level 3 Communications will perform a mandatory network upgrade that > will be service impacting and will impact devices in multiple locations. > We are upgrading the code on portions of the global network to increase > stability for the overall network. During this maintenance activity > customers may be impacted for approximately 30 minutes." > > My own guess is that they wanted to quickly get their gear upgraded so > that they weren't caught with their pants down like the last time such a > vulnerability was announced. In that case, someone posted (previously > unknown) exploit details to the full-disclosure mailing list, forcing > many to to delay patching any longer: > > http://seclists.org/fulldisclosure/2010/Jan/136 > > On a side note: if you ever want to receive a ton of hate mail from > engineers at large companies and telcos, that's a good way to do it. > > -- > Jeremy L. Gaddis e: jer...@as54225.net > Network Engineer m: +1.812.865.0581 > > > _______________________________________________ > Wireless mailing list > Wireless@wispa.org > http://lists.wispa.org/mailman/listinfo/wireless >
_______________________________________________ Wireless mailing list Wireless@wispa.org http://lists.wispa.org/mailman/listinfo/wireless