Not the original poster - BUT, thank you very much for such positive post
Mike.

... more or these please ... and Knipex tools too!

On Nov 20, 2017 7:58 PM, "Mke C&gt;" <mconno...@gmail.com> wrote:



On 11/20/2017 05:54 PM, plug-requ...@pdxlinux.org wrote:

>     With the mail/phone issues I've had recently I want to check that I'm
>> doing things correctly. Two instances of not reaching web pages.
>>
>>     I can load (and ping)www.opendkim.org, but cannot load (or ping)
>>
>> lists.opendkim.org. This means their mail list page is off-line. Yes?
>>
>> No, not necessarily.
>
>     Yesterday and today I try to accesswww.verizonwireless.com  but the
>
> page
>> won't load. Neither can I ping that server. This means that their web site
>> is down. Yes?
>>
>> Again, not necessarily.
>
> More and more IT / Security groups are going to dropping the ICMP (ping)
> packets for "security" reasons, and this affects several tools that have
> long been used by the layperson and professional alike.
>
> When the firewall receives an ICMP packet, ping and traceroute both will
> show failure and/or lack of "up: state. If the attacker knows the device is
> there by DNS resolution or IP address, they have a known target, and the
> dropping of packets (IMO) is just obscuring things a little bit.
>
This is more of an ol' skool mentality that reflects a serious lack of a
deeper understanding of networking and of being a good & useful netizen. In
reality, we should actually see less and less of this over time as the ICMP
protocol suite is very useful and blocking it doesn't amount to very much
that's good and/or useful.

Other tools that you can try are telnet to the port for the service in
> question, nmap to check for all open ports (potential for looking like an
> attacker), and netcat (nc) to test for specific, or scan for all open,
> ports.
>
> A deeper way to search if things are connecting at all is the use of
> netstat, Wireshark, or tcpdump in some cases.
>
I've been a network engineer for over a decade and I've learned to use the
simplest tool possible for a task. In this case tcping is a very good
simple and easy to use tool for anyone who's just wanting to test
connectivity to network host. Most implementations allow for a port number
to  be specified. If you're unsure of the port number from the Linux cli
you can cat the /etc/services file to get a listing of udp & tcp ports w.
description that's updated by IANA.

e.g.
~$ cat /etc/services
# Network services, Internet style
#
# Note that it is presently the policy of IANA to assign a single
well-known port number for both TCP and UDP; hence, officially ports have
two entries
# even if the protocol doesn't support UDP operations.
#
# Updated from http://www.iana.org/assignments/port-numbers and other
sources like http://www.freebsd.org/cgi/cvsweb.cgi/src/etc/services .
# New ports will be added on request if they have been officially assigned
by IANA and used in the real-world or are needed by a debian package.
# If you need a huge list of used numbers please install the nmap package.

tcpmux        1/tcp                # TCP port service multiplexer
echo        7/tcp
echo        7/udp
discard        9/tcp        sink null
discard        9/udp        sink null
systat        11/tcp        users

This particular implementation, https://www.elifulkerson.com/p
rojects/tcping.php , provides a lot of HTTP mode options as well setting
wait interval for a response, calculating jitter (variance in delay) and
prefer ipv4 or ipv6.

Network connectivity is going to likely become more problematic, and our
> means of testing things will likely become more restricted as time passes.
> Just my guess, but it's a trend I have been noticing.
>
I don't follow nor subscribe to this logic at all. I expect network
connectivity and ways to test to it to only get better as everyone and
their grandparents demand well performing, highly reliable internet
connectivity from all of their devices, everywhere. 5 years ago while
working at an ISP in downtown Portland I had to work on networking problems
from end-users of our ISP business partners who where complaining about
high ping times in their favorite online game. And I'm talking about sub
150 ms round-trip ping times which is used as the measuring stick for toll
quality VoIP.

Also, consider that IPv6 provides improved QOS functionality, better
security and faster routing on an end to end connection basis. As
infrastructure gets re-designed and changed  out I only expect network
connectivity to get less problematic with greater visibility into problems
provided by better tools and information.

_______________________________________________
PLUG mailing list
PLUG@pdxlinux.org
http://lists.pdxlinux.org/mailman/listinfo/plug
_______________________________________________
PLUG mailing list
PLUG@pdxlinux.org
http://lists.pdxlinux.org/mailman/listinfo/plug

Reply via email to