lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
From: ACastigliola at unumprovident.com (Castigliola, Angelo)
Subject: WIndows XP SP2 "breaks" things

You should take a look into the new firewall feature that is turned on
by default with SP2. When I installed SP2 RC1 on my computer I notice
that my SMS Administrators Console was broken. I later tracked it down
to the fact that SMS sends a lot of information to your computer over
UDP and it was being blocked by SP2. This could be the root of a good
number of the problems you are experiencing. 

Angelo Castigliola III
Operations Technical Analyst I
UnumProvident IT Services
207.575.3820
 

-----Original Message-----
From: full-disclosure-admin@...ts.netsys.com
[mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of Gregory A.
Gilliss
Sent: Tuesday, August 10, 2004 6:22 PM
To: full-disclosure@...ts.netsys.com
Subject: [Full-Disclosure] WIndows XP SP2 "breaks" things

All,

Just FYI, my company is experiencing a high volume of calls from
customers
claiming that they have installed Windows SP2. Customers claim that SP2
is
"breaking" previously working network behavior. Initial testing
indicates
that the cause is the "Internet Firewall" settings on SP2 which have
been 
set to default closed! SO by FINALLY doing what ought to have been done 
ages ago (as often argued in posts to this and other lists), Microsoft
has
inadvertently "broken" several customer network installations that got
used
to having transparency to network protocols that, after the installation
of 
SP2, are no longer permitted.

Yay Microsoft, you finally got it right (sort of).

G


-- 
Gregory A. Gilliss, CISSP                              E-mail:
greg@...liss.com
Computer Security                             WWW:
http://www.gilliss.com/greg/
PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9 B4 14
0E 8C A3

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ