Microsoft distributes free CDs in Japan to patch Windows

Roland Perry nanog at internetpolicyagency.com
Mon Aug 25 15:50:10 UTC 2003


In article <1061823669.17113.3.camel at aiden.noc.adelphia.net>, Paul A.
Bradford <paul.bradford at adelphia.com> writes
>Hmm,
>  and how would you protect the remote controlled MS firewall software
>from:
>
>1. Vulnerabilities itself since MS is building it?
>2. the "remote control" being hijacked by someone besides MS?
>  2a. Hey I'd love to be able to shut folks that were killing my network
>off until they update, but is it my right?

It's not that different from (my perception of) the current technology
used for XP Activation. Presumably an unactivated XP ise prevented from
accessing the Internet (as well as being prevented from doing all the
other normal user things), but is still capable of accessing the
activation server. And is the mechanism of a hypothetical remote de-
activation very far from what I was suggesting (maybe as a sort of "ask
the activation server for permission" at regular intervals)?

Are there any "XP activation" exploits yet?
-- 
Roland Perry



More information about the NANOG mailing list