TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Geo
from: Rich
date: 2005-05-20 08:33:34
subject: Re: .NET is secure?

From: "Rich" 

This is a multi-part message in MIME format.

------=_NextPart_000_01D8_01C55D16.9CBE5470
Content-Type: text/plain;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

   I didn't say they don't matter.  Read what I wrote.

   Windows Update is not and has never been the only source for updates.

Rich

  "Geo"  wrote in message
news:428dbbca{at}w3.nls.net...
  Rich,

  If they don't matter then why did I have to download a 10mb patch and =
then a 1.5mb patch? Also don't misunderstand what I'm saying, I'm =
definitely NOT saying that the .NET framework is less secure than any =
other piece of software out there, it's about average imo. What I am =
saying is I didn't need it or the patches except to run this one program =
I wanted to try and my issue wasn't even that it's needed patches over =
it's lifetime but that the current version isn't patched and even the =
10mb patch wasn't patched.

  I do not like the whole idea of Windowsupdate as the ONLY patch method =
for one reason. Lets see you use it to patch NT4workstation, Win95, =
Win98, or anything else MS feels doesn't require support anymore.

  If when MS made that decision they put all the patches for these =
products on some website/ftpsite and did it in a nice organized way to =
take care of the remaining customers still running these products then I =
wouldn't have the issue but just go and try to reinstall NT4ws and patch =
it today and well you'll certainly understand my point then.

  If it were up to me, there would be a law that says when a software =
product is EOL'ed, the final act of the authors must be to make = available
a final release that contains everything up to that point and = that all
copy protection must be removed so when the copyright expires = the world
can enjoy the product they protected with that copyright for = so long.

  Geo.
    "Rich"  wrote in message news:428d849e{at}w3.nls.net...
       GDI+ had nothing to do with .NET.

       The DoS attacks were CPU usage due to large contrived complex =
cases.  The first and last were meaningful bugs.  Two in four years is =
not so bad.  All of these are server side issues that only are an issue =
if you explicitly make use of these.  None would affect you on the =
client.  None would affect you on the server either just by installing.

    Rich


      "Geo"  wrote in message =
news:428b17d7$1{at}w3.nls.net...
      "Peter Sawatzki"  wrote in message
      news:428a190e{at}w3.nls.net...

      > I don't see why you have a less secure system when installing =
.NET.
      > Installing a runtime that enables the system to run application =
built
      > in a more secure environment enhances your system.

      Well lets start with the fact that .NET is 23mb of stuff and the =
first patch
      I had to apply was over 10mb and the second patch was 1.5mb.

      If it doesn't make me less secure, why all the patches? Let's =
see..

       2005-02-08: Microsoft ASP.NET URI Canonicalization Unauthorized =
Web Access
      Vulnerability
       2005-01-18: Microsoft GDI+ Library JPEG Segment Length Integer =
Underflow
      Vulnerability
       2003-12-11: Multiple Vendor XML DTD Parameter Entity SOAP Server =
Denial Of
      Service Vulnerability
       2003-12-09: Multiple Vendor XML Parser SOAP Server Denial Of =
Service
      Vulnerability
       2002-06-08: Microsoft ASP.NET StateServer Cookie Handling Buffer =
Overflow
      Vulnerability

      Still think it's not a security issue?

      Geo.


------=_NextPart_000_01D8_01C55D16.9CBE5470
Content-Type: text/html;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable








   I didn't
say they don't =
matter. =20
Read what I wrote.
 
   Windows
Update is not and =
has never=20
been the only source for updates.
 
Rich
 
"Geo" <georger{at}nls.net>">mailto:georger{at}nls.net">georger{at}nls.net> wrote=20 in message news:428dbbca{at}w3.nls.net... Rich, If they don't matter then why did I = have to=20 download a 10mb patch and then a 1.5mb patch? Also don't misunderstand = what=20 I'm saying, I'm definitely NOT saying that the .NET framework is less = secure=20 than any other piece of software out there, it's about average imo. = What I am=20 saying is I didn't need it or the patches except to run this one = program I=20 wanted to try and my issue wasn't even that it's needed patches over = it's=20 lifetime but that the current version isn't patched and even the 10mb = patch=20 wasn't patched. I do not like the whole idea of = Windowsupdate as=20 the ONLY patch method for one reason. Lets see you use it to patch=20 NT4workstation, Win95, Win98, or anything else MS feels doesn't = require=20 support anymore. If when MS made that decision they = put all the=20 patches for these products on some website/ftpsite and did it in a = nice=20 organized way to take care of the remaining customers still running = these=20 products then I wouldn't have the issue but just go and try to = reinstall NT4ws=20 and patch it today and well you'll certainly understand my point=20 then. If it were up to me, there would be a = law that=20 says when a software product is EOL'ed, the final act of the authors = must be=20 to make available a final release that contains everything up to that = point=20 and that all copy protection must be removed so when the copyright = expires the=20 world can enjoy the product they protected with that copyright for so=20 long. Geo.
"Rich" <{at}> wrote in message news:428d849e{at}w3.nls.net... GDI+ had nothing to do = with=20 .NET. The DoS attacks were = CPU usage due=20 to large contrived complex cases. The first and last were = meaningful=20 bugs. Two in four years is not so bad. All of these are = server=20 side issues that only are an issue if you explicitly make use of=20 these. None would affect you on the client. None would = affect=20 you on the server either just by installing. Rich "Geo" <georger{at}nls.net>=20">mailto:georger{at}nls.net">georger{at}nls.net>=20 wrote in message news:428b17d7$1{at}w3.nls.net..."Peter=20 Sawatzki" <peter{at}sawatzki.de>=20">mailto:peter{at}sawatzki.de">peter{at}sawatzki.de>=20 wrote in messagenews:428a190e{at}w3.nls.net...= >=20 I don't see why you have a less secure system when installing=20 .NET.> Installing a runtime that enables the system to run=20 application built> in a more secure environment enhances = your=20 system.Well lets start with the fact that .NET is 23mb of = stuff=20 and the first patchI had to apply was over 10mb and the second = patch=20 was 1.5mb.If it doesn't make me less secure, why all the = patches?=20 Let's see.. 2005-02-08: Microsoft ASP.NET URI=20 Canonicalization Unauthorized Web=20 AccessVulnerability 2005-01-18: Microsoft GDI+ = Library JPEG=20 Segment Length Integer = UnderflowVulnerability 2003-12-11:=20 Multiple Vendor XML DTD Parameter Entity SOAP Server Denial = OfService=20 Vulnerability 2003-12-09: Multiple Vendor XML Parser SOAP = Server=20 Denial Of ServiceVulnerability 2002-06-08: Microsoft = ASP.NET=20 StateServer Cookie Handling Buffer = OverflowVulnerabilityStill=20 think it's not a security=20 issue?Geo.<= /HTML> ------=_NextPart_000_01D8_01C55D16.9CBE5470-- --- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270 5030/786
@PATH: 379/45 1 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.