In some mail from [EMAIL PROTECTED], sie said:
>
> Actually, the logic is "This has been up for 300 days. It probably is not
> being maintained so it likely has that unpatched exploit avaialable".
I thought about this before I posted that email but decided against any
inclusion of it. Why ?
There are systems running around the world, today, that *need* to run
24x7 and security patches are no reason for a reboot. That aside, that
a system has been up, since its release, longer than it takes the time
information to wrap, do you *really* know how long it has been up ?
Upgrading of software running on a host has little or nothing to do with
how long it has been running - so long as you're not running M$ - if it's
not something like a library file. Last I checked, you didn't need to
reboot to patch up sendmail, named or apache :)
Good sysadmin practice should involve regular, scheduled, rebooting of
systems to ensure that over time the "tinkering" which happens on a day
to day basis never gets to a point where things that are meant to be in
the bootup process are left out. Well, that's my theory anyway :)
A large uptime of a machine may mean it is quite vulnerable, but does it
really tell you it is unmaintained ? Does a short uptime mean it is really
maintained or does it just tell you it was rebooted not long ago ?
Darren