I can't access about 20% of all websites on the internet today.
Announcement
Collapse
No announcement yet.
Massive DDoS Attack to THE WORLD!!
Collapse
X
-
Massive DDoS Attack to THE WORLD!!
I can't access about 20% of all websites on the internet today.P4 Northwood 1.8GHz@2.7GHz 1.65V Albatron PX845PEV Pro
Running two Dell 2005FPW 20" Widescreen LCD
And of course, Matrox Parhelia | My Matrox histroy: Mill-I, Mill-II, Mystique, G400, ParheliaTags: None
-
Yes, and it's a bug in MS SQLs servers that had a patch released in <B>July</B>. Damn lazy admins.Gigabyte P35-DS3L with a Q6600, 2GB Kingston HyperX (after *3* bad pairs of Crucial Ballistix 1066), Galaxy 8800GT 512MB, SB X-Fi, some drives, and a Dell 2005fpw. Running WinXP.
-
Well, it may be that a patch that was offered way back in July, but sysadmins are generally quite leery of patches without validating them first...6 months sounds like a long time, but in the IT world you tend to take the long view.
If you've ever seen what happens when a bad patch hits 8,000-10,000 Servers, you'll know what I mean.
Most places test in the lab for about a week to a month, then issue the patch to a few machines in the real world for another month or two, then do a wider scale release (~100-500 units) for another few weeks before releasing it to production. That kind of validation takes time. And the paperwork involved is also noteworthy for change control and other whatnot.Hey, Donny! We got us a German who wants to die for his country... Oblige him. - Lt. Aldo Raine
Comment
-
-
So that explains quite a bit while so many systems are still not updated. I guess uptime still comes first.
And as you already said if the patch happens to be broken (the WinNT SP6 which broke quite a few systems, until 6a came out, comes to my mind) and will render machines useless it will become a FIASCO.Last edited by thop; 25 January 2003, 15:31.no matrox, no matroxusers.
Comment
-
Yes, but this is a security vulnerability patch. It should have been on every system after a month. Look at all the damage done. Look at all the damage done by Code Red and Nimda. Patches were available for a long time. Irresponsible admins cost the rest of the world a LOT of money.Gigabyte P35-DS3L with a Q6600, 2GB Kingston HyperX (after *3* bad pairs of Crucial Ballistix 1066), Galaxy 8800GT 512MB, SB X-Fi, some drives, and a Dell 2005fpw. Running WinXP.
Comment
-
Lazy is probably too strong a word to use: they were more than likely not able to validate in time. When Code Red was big a while back we knew we were vulnerable, and we got bit by it, bbecuase the testing for the fix wasn't yet finished. Any change that goes out to production must be validated, no matter how small. (I have seen a "non-impacting change" break hundreds of servers simply because of a botched install script.)
You must first validate, especially with mission-critical equipment.
Knowing of your vulnerability and know how to fix it if something bad happens is a much better alternative than blindly sending out a "fix" that behaves unexpectedly. We knew what to do to get our systems back online with minimum disruption. It was a pity we couldn't be more proactive, but we didn't lose any data nor did we have do it twice.
SecAdmin did get a bigger budget, tho...Last edited by MultimediaMan; 25 January 2003, 17:00.Hey, Donny! We got us a German who wants to die for his country... Oblige him. - Lt. Aldo Raine
Comment
-
To be honest, it is entirely sysadmins' fault.
RDBMS shouldn't be connected to the internet in the first place.
Because of this, I think most of the affected servers are not from big companies with well-defined change management. They are all small companies who don't have a dedicated db admin (I think).P4 Northwood 1.8GHz@2.7GHz 1.65V Albatron PX845PEV Pro
Running two Dell 2005FPW 20" Widescreen LCD
And of course, Matrox Parhelia | My Matrox histroy: Mill-I, Mill-II, Mystique, G400, Parhelia
Comment
-
Originally posted by WyWyWyWy
To be honest, it is entirely sysadmins' fault.
RDBMS shouldn't be connected to the internet in the first place.
Because of this, I think most of the affected servers are not from big companies with well-defined change management. They are all small companies who don't have a dedicated db admin (I think).
I can't believe the number of companies that put servers on the net without a firewall or anything. My policy is nothing Windows is Internet accessable either, but that's just me.
Comment
-
Hmm... wait.
Someone just told me that it is possible to use SOAP/XML or similar technology to attach a worm
Obviously they will pass through firewall... hmm... unblockable power?P4 Northwood 1.8GHz@2.7GHz 1.65V Albatron PX845PEV Pro
Running two Dell 2005FPW 20" Widescreen LCD
And of course, Matrox Parhelia | My Matrox histroy: Mill-I, Mill-II, Mystique, G400, Parhelia
Comment
Comment