[AusNOG] Shelf for NextDC Rack

2018-10-04 Thread Bradley Amm
Hey Guys

Does anyone have any suggestions for shelf's that fit the racks at NextDC.
Don't want to get one just in the off chance it wont fit.


-- 
Bradley Amm
0420 501 801
___
AusNOG mailing list
AusNOG@lists.ausnog.net
http://lists.ausnog.net/mailman/listinfo/ausnog


[AusNOG] supermicro stocks dive

2018-10-04 Thread Noel Butler
given when this broke a couple days ago 

https://www.securityweek.com/china-used-tiny-chips-us-computers-steal-secrets-report


overnight nasdaq supermicro stocks  down 41%

seems cant trust much coming out of China these days. though, you cant
trust anything coming out of the USA either. 

-- 
Kind Regards, 

Noel Butler 

This Email, including any attachments, may contain legally 
privileged
information, therefore remains confidential and subject to copyright
protected under international law. You may not disseminate, discuss, or
reveal, any part, to anyone, without the authors express written
authority to do so. If you are not the intended recipient, please notify
the sender then delete all copies of this message including attachments,
immediately. Confidentiality, copyright, and legal privilege are not
waived or lost by reason of the mistaken delivery of this message. Only
PDF [1] and ODF [2] documents accepted, please do not send proprietary
formatted documents 

 

Links:
--
[1] http://www.adobe.com/
[2] http://en.wikipedia.org/wiki/OpenDocument___
AusNOG mailing list
AusNOG@lists.ausnog.net
http://lists.ausnog.net/mailman/listinfo/ausnog


Re: [AusNOG] supermicro stocks dive

2018-10-04 Thread Rory Jones
Buy low, sell high, that’s my motto!

-Homer Simpson

But to actually contribute something to this thread.

They could be talking about Hengzhi chips. They’re basically Chinese TPMs, but 
worse; they don’t follow trusted computing group guidelines, and as a result of 
this, no one knows anything about them.

There’s been a few blowups about this over the years. Something related to this 
recently eviscerated ZTE, not that anything of value was lost there, and many 
moons ago Lenovo had controversy about their China-market laptops containing 
Hengzhi chips.

There have also been cases where de-capping and reversing various random chips 
has found there to be unknown, undocumented ICs contained within them.

This isn’t the first, or last, time this will happen.

Kind regards,
Rory

From: AusNOG  on behalf of Noel Butler 

Sent: Friday, October 5, 2018 9:59:51 AM
To: Ausnog
Subject: [AusNOG] supermicro stocks dive


given when this broke a couple days ago

https://www.securityweek.com/china-used-tiny-chips-us-computers-steal-secrets-report

overnight nasdaq supermicro stocks  down 41%

seems cant trust much coming out of China these days. though, you cant trust 
anything coming out of the USA either.


--

Kind Regards,

Noel Butler

This Email, including any attachments, may contain legally privileged 
information, therefore remains confidential and subject to copyright protected 
under international law. You may not disseminate, discuss, or reveal, any part, 
to anyone, without the authors express written authority to do so. If you are 
not the intended recipient, please notify the sender then delete all copies of 
this message including attachments, immediately. Confidentiality, copyright, 
and legal privilege are not waived or lost by reason of the mistaken delivery 
of this message. Only PDF and 
ODF documents accepted, please do 
not send proprietary formatted documents
___
AusNOG mailing list
AusNOG@lists.ausnog.net
http://lists.ausnog.net/mailman/listinfo/ausnog


Re: [AusNOG] supermicro stocks dive

2018-10-04 Thread Florian Valette
HI,

It seems to be a Fake News…?

Supermicro refutes :
https://www.supermicro.com/newsroom/pressreleases/2018/press181004_Bloomberg.cfm

Apple denied too :

“Over the course of the past year, Bloomberg has contacted us multiple times 
with claims, sometimes vague and sometimes elaborate, of an alleged security 
incident at Apple. Each time, we have conducted rigorous internal 
investigations based on their inquiries and each time we have found absolutely 
no evidence to support any of them. We have repeatedly and consistently offered 
factual responses, on the record, refuting virtually every aspect of 
Bloomberg’s story relating to Apple.
On this we can be very clear: Apple has never found malicious chips, “hardware 
manipulations” or vulnerabilities purposely planted in any server. Apple never 
had any contact with the FBI or any other agency about such an incident. We are 
not aware of any investigation by the FBI, nor are our contacts in law 
enforcement.
In response to Bloomberg’s latest version of the narrative, we present the 
following facts: Siri and Topsy never shared servers; Siri has never been 
deployed on servers sold to us by Super Micro; and Topsy data was limited to 
approximately 2,000 Super Micro servers, not 7,000. None of those servers has 
ever been found to hold malicious chips.
As a matter of practice, before servers are put into production at Apple they 
are inspected for security vulnerabilities and we update all firmware and 
software with the latest protections. We did not uncover any unusual 
vulnerabilities in the servers we purchased from Super Micro when we updated 
the firmware and software according to our standard procedures.
We are deeply disappointed that in their dealings with us, Bloomberg’s 
reporters have not been open to the possibility that they or their sources 
might be wrong or misinformed. Our best guess is that they are confusing their 
story with a previously-reported 2016 incident in which we discovered an 
infected driver on a single Super Micro server in one of our labs. That 
one-time event was determined to be accidental and not a targeted attack 
against Apple.
While there has been no claim that customer data was involved, we take these 
allegations seriously and we want users to know that we do everything possible 
to safeguard the personal information they entrust to us. We also want them to 
know that what Bloomberg is reporting about Apple is inaccurate.
Apple has always believed in being transparent about the ways we handle and 
protect data. If there were ever such an event as Bloomberg News has claimed, 
we would be forthcoming about it and we would work closely with law 
enforcement. Apple engineers conduct regular and rigorous security screenings 
to ensure that our systems are safe. We know that security is an endless race 
and that’s why we constantly fortify our systems against increasingly 
sophisticated hackers and cybercriminals who want to steal our data. »

AWS is saying this in untrue :
https://urldefense.proofpoint.com/v2/url?u=https-3A__aws.amazon.com_blogs_security_setting-2Dthe-2Drecord-2Dstraight-2Don-2Dbloomberg-2Dbusinessweeks-2Derroneous-2Darticle_&d=DwIFAg&c=4DxX-JX0i28X6V65hK0ftwVK1xnmwcYC0vo7GVya1JY&r=NGLqjlg8Gqjal0G8jzVjweKfIgMnEHJdMIgB0mMqqt8&m=4umDOyc_2f8DSiCtG_AvPlliL0yuDZKcJDPX23xkdcI&s=IVl33wh7j2kT9A8phJg8TmcO8aG-siRF8sV9TAnT4nk&e

Regards,

--
Florian Valette
[cid:image001.png@01D35ECD.DB11F490]
Innovation is freedom
Email: florian.vale...@corp.ovh.com
--
OVH Network "Chacha" Team
AS 16276 http://peering.ovh.net/

From: AusNOG  on behalf of Noel Butler 

Date: Friday, 5 October 2018 at 10:00 am
To: Ausnog 
Subject: [AusNOG] supermicro stocks dive


given when this broke a couple days ago

https://www.securityweek.com/china-used-tiny-chips-us-computers-steal-secrets-report

overnight nasdaq supermicro stocks  down 41%
seems cant trust much coming out of China these days. though, you cant trust 
anything coming out of the USA either.


--

Kind Regards,

Noel Butler
This Email, including any attachments, may contain legally privileged 
information, therefore remains confidential and subject to copyright protected 
under international law. You may not disseminate, discuss, or reveal, any part, 
to anyone, without the authors express written authority to do so. If you are 
not the intended recipient, please notify the sender then delete all copies of 
this message including attachments, immediately. Confidentiality, copyright, 
and legal privilege are not waived or lost by reason of the mistaken delivery 
of this message. Only PDF and 
ODF documents accepted, please do 
not send proprietary formatted documents


___
AusNOG mailing list
AusNOG@lists.ausnog.net
http://lists.ausnog.net/mailma

Re: [AusNOG] supermicro stocks dive

2018-10-04 Thread Jay Dixon
As our previous security manager at work put it in his thick Russian
accent...

"you know, you have 2 choices about who reads your email; KGB, or FBI"

On Fri, Oct 5, 2018 at 10:00 AM Noel Butler  wrote:

> given when this broke a couple days ago
>
>
> https://www.securityweek.com/china-used-tiny-chips-us-computers-steal-secrets-report
>
> overnight nasdaq supermicro stocks  down 41%
> seems cant trust much coming out of China these days. though, you cant
> trust anything coming out of the USA either.
>
>
> --
>
> Kind Regards,
>
> Noel Butler
> This Email, including any attachments, may contain legally privileged
> information, therefore remains confidential and subject to copyright
> protected under international law. You may not disseminate, discuss, or
> reveal, any part, to anyone, without the authors express written authority
> to do so. If you are not the intended recipient, please notify the sender
> then delete all copies of this message including attachments, immediately.
> Confidentiality, copyright, and legal privilege are not waived or lost by
> reason of the mistaken delivery of this message. Only PDF
>  and ODF
>  documents accepted, please do
> not send proprietary formatted documents
> ___
> AusNOG mailing list
> AusNOG@lists.ausnog.net
> http://lists.ausnog.net/mailman/listinfo/ausnog
>
___
AusNOG mailing list
AusNOG@lists.ausnog.net
http://lists.ausnog.net/mailman/listinfo/ausnog


Re: [AusNOG] supermicro stocks dive

2018-10-04 Thread Paul Wilkins
Negatory on the fake news.

https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies

On Fri, 5 Oct 2018 at 10:25, Jay Dixon  wrote:

> As our previous security manager at work put it in his thick Russian
> accent...
>
> "you know, you have 2 choices about who reads your email; KGB, or FBI"
>
> On Fri, Oct 5, 2018 at 10:00 AM Noel Butler 
> wrote:
>
>> given when this broke a couple days ago
>>
>>
>> https://www.securityweek.com/china-used-tiny-chips-us-computers-steal-secrets-report
>>
>> overnight nasdaq supermicro stocks  down 41%
>> seems cant trust much coming out of China these days. though, you cant
>> trust anything coming out of the USA either.
>>
>>
>> --
>>
>> Kind Regards,
>>
>> Noel Butler
>> This Email, including any attachments, may contain legally privileged
>> information, therefore remains confidential and subject to copyright
>> protected under international law. You may not disseminate, discuss, or
>> reveal, any part, to anyone, without the authors express written authority
>> to do so. If you are not the intended recipient, please notify the sender
>> then delete all copies of this message including attachments, immediately.
>> Confidentiality, copyright, and legal privilege are not waived or lost by
>> reason of the mistaken delivery of this message. Only PDF
>>  and ODF
>>  documents accepted, please
>> do not send proprietary formatted documents
>> ___
>> AusNOG mailing list
>> AusNOG@lists.ausnog.net
>> http://lists.ausnog.net/mailman/listinfo/ausnog
>>
> ___
> AusNOG mailing list
> AusNOG@lists.ausnog.net
> http://lists.ausnog.net/mailman/listinfo/ausnog
>
___
AusNOG mailing list
AusNOG@lists.ausnog.net
http://lists.ausnog.net/mailman/listinfo/ausnog


Re: [AusNOG] supermicro stocks dive

2018-10-04 Thread Scott Weeks



--- jayb...@gmail.com wrote:
From: Jay Dixon 

As our previous security manager at work put it 
in his thick Russian accent...

"you know, you have 2 choices about who reads 
your email; KGB, or FBI"



That would be the FSB (was KGB) or CIA and you 
don't have a choice.  They both have AIs that 
do.  Simultaneously.  Don't forget about MSS, 
CSIS, RGB, ISI, etc, etc. :)

scott









> AusNOG mailing list
> AusNOG@lists.ausnog.net
> http://lists.ausnog.net/mailman/listinfo/ausnog
>


___
AusNOG mailing list
AusNOG@lists.ausnog.net
http://lists.ausnog.net/mailman/listinfo/ausnog


___
AusNOG mailing list
AusNOG@lists.ausnog.net
http://lists.ausnog.net/mailman/listinfo/ausnog


Re: [AusNOG] supermicro stocks dive

2018-10-04 Thread Paul Wilkins
Posted on Bloomberg October 4, 2018 ergo, not fake news. The meta story
here is that Apple and Amazon are officially denying it.

Three senior insiders at Apple say that in the summer of 2015, it, too,
found malicious chips on Supermicro motherboards. Apple severed ties with
Supermicro the following year, for what it described as unrelated reasons.

On Fri, 5 Oct 2018 at 10:29, Shannon Pearce  wrote:

> Not sure how posting a link to the purported fake news article is proof
> said article is not fake?
>
> Shan.
>
> On 5 Oct 2018, at 10:27 am, Paul Wilkins  wrote:
>
> Negatory on the fake news.
>
>
> https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies
>
> On Fri, 5 Oct 2018 at 10:25, Jay Dixon  wrote:
>
>> As our previous security manager at work put it in his thick Russian
>> accent...
>>
>> "you know, you have 2 choices about who reads your email; KGB, or FBI"
>>
>> On Fri, Oct 5, 2018 at 10:00 AM Noel Butler 
>> wrote:
>>
>>> given when this broke a couple days ago
>>>
>>>
>>> https://www.securityweek.com/china-used-tiny-chips-us-computers-steal-secrets-report
>>>
>>> overnight nasdaq supermicro stocks  down 41%
>>> seems cant trust much coming out of China these days. though, you cant
>>> trust anything coming out of the USA either.
>>>
>>>
>>> --
>>>
>>> Kind Regards,
>>>
>>> Noel Butler
>>> This Email, including any attachments, may contain legally privileged
>>> information, therefore remains confidential and subject to copyright
>>> protected under international law. You may not disseminate, discuss, or
>>> reveal, any part, to anyone, without the authors express written authority
>>> to do so. If you are not the intended recipient, please notify the sender
>>> then delete all copies of this message including attachments, immediately.
>>> Confidentiality, copyright, and legal privilege are not waived or lost by
>>> reason of the mistaken delivery of this message. Only PDF
>>>  and ODF
>>>  documents accepted, please
>>> do not send proprietary formatted documents
>>> ___
>>> AusNOG mailing list
>>> AusNOG@lists.ausnog.net
>>> http://lists.ausnog.net/mailman/listinfo/ausnog
>>>
>> ___
>> AusNOG mailing list
>> AusNOG@lists.ausnog.net
>> http://lists.ausnog.net/mailman/listinfo/ausnog
>>
> ___
> AusNOG mailing list
> AusNOG@lists.ausnog.net
> http://lists.ausnog.net/mailman/listinfo/ausnog
>
>
>
___
AusNOG mailing list
AusNOG@lists.ausnog.net
http://lists.ausnog.net/mailman/listinfo/ausnog


Re: [AusNOG] High Latency to AS15169

2018-10-04 Thread Paul Gear
This seems to be re-breaking on a scheduled basis:

https://libertysys.com.au/imagebin/15387001474777_1538700147_1538438400.png

On 04/10/18 15:33, Jason Leschnik wrote:
> I'm seeing quad-8 hitting the larger delay, but google.com
>  is 8ms from a few locations.
> 
> On Thu, 4 Oct 2018 at 14:39, Ross Tsolakidis wrote:
> 
> 
> Thishappens often, we graph it for fun.
> (not default smokeping timers, very low impact).
> 
> image.png
>  
> Regards,
> Ross.
> 
> 
> On Thu, Oct 4, 2018 at 2:30 PM Nathan Brookfield
> wrote:
> 
> We never saw it come back.
> 
> Nathan Brookfield
> Chief Executive Officer
> 
> Simtronic Technologies Pty Ltd
> http://www.simtronic.com.au
> 
> On 4 Oct 2018, at 14:12, Tim Jackson wrote:
> 
> Gone offshore again?
> 
> 
> 
> On Wed, Oct 3, 2018 at 2:30 PM Jen Linkova wrote:
> 
> I believe the latency should be back to usual values now.
> 
> On Wed, Oct 3, 2018 at 1:55 PM Dave Browning wrote:
> 
> All,
> 
> Just to keep the list updated on this issue, Google have
> confirmed there is a wide spread problem and the
> appropriate Engineer's are on the case
> 
> Cheers,
> 
> Dave Browning | Senior Network Engineer
> P 1300 791 678 D 07 3708 0008
> Level 1, 12 Railway Tce, Milton QLD 4064


___
AusNOG mailing list
AusNOG@lists.ausnog.net
http://lists.ausnog.net/mailman/listinfo/ausnog


Re: [AusNOG] High Latency to AS15169

2018-10-04 Thread Saxton, Joseph (SYD-FED)
Been noticing this as well. Might be time to switch to cloudflare's 1.1.1.1 __

Server: 8.8.8.8
Address:8.8.8.8#53

Non-authoritative answer:
www.supermicro.com  canonical name = prospective.shared.global.fastly.net.
Name:   prospective.shared.global.fastly.net
Address: 151.101.2.107
Name:   prospective.shared.global.fastly.net
Address: 151.101.66.107
Name:   prospective.shared.global.fastly.net
Address: 151.101.130.107
Name:   prospective.shared.global.fastly.net
Address: 151.101.194.107


real0m0.210s
user0m0.006s
sys 0m0.026s

CloudFlare

Server: 1.1.1.1
Address:1.1.1.1#53

Non-authoritative answer:
www.supermicro.com  canonical name = prospective.shared.global.fastly.net.
Name:   prospective.shared.global.fastly.net
Address: 151.101.30.107


real0m0.018s
user0m0.004s
sys 0m0.007s

On 5/10/18, 10:46 am, "AusNOG on behalf of Paul Gear" 
 wrote:

This seems to be re-breaking on a scheduled basis:


https://urldefense.proofpoint.com/v2/url?u=https-3A__libertysys.com.au_imagebin_15387001474777-5F1538700147-5F1538438400.png&d=DwIGaQ&c=Ftw_YSVcGmqQBvrGwAZugGylNRkk-uER0-5bY94tjsc&r=srheiojgNn4Jg0keeQ9hj6cyp8zgHx0m-eTRLdD3nnw&m=51ezH6kfqUL4Txbm2H37IQAKdncM3og4KKaIcIghgV8&s=sHa98LlAHDYP7DL1KjORdC_SODCRrctJJRpte9maxY8&e=

On 04/10/18 15:33, Jason Leschnik wrote:
> I'm seeing quad-8 hitting the larger delay, but google.com
> 

 is 8ms from a few locations.
> 
> On Thu, 4 Oct 2018 at 14:39, Ross Tsolakidis wrote:
> 
> 
> Thishappens often, we graph it for fun.
> (not default smokeping timers, very low impact).
> 
> image.png
>  
> Regards,
> Ross.
> 
> 
> On Thu, Oct 4, 2018 at 2:30 PM Nathan Brookfield
> wrote:
> 
> We never saw it come back.
> 
> Nathan Brookfield
> Chief Executive Officer
> 
> Simtronic Technologies Pty Ltd
> 
https://urldefense.proofpoint.com/v2/url?u=http-3A__www.simtronic.com.au&d=DwIGaQ&c=Ftw_YSVcGmqQBvrGwAZugGylNRkk-uER0-5bY94tjsc&r=srheiojgNn4Jg0keeQ9hj6cyp8zgHx0m-eTRLdD3nnw&m=51ezH6kfqUL4Txbm2H37IQAKdncM3og4KKaIcIghgV8&s=7nQ8nJwbWNxeq_GTWZkgQPOVY2YvUHslU0G54FVRL-I&e=
> 
> On 4 Oct 2018, at 14:12, Tim Jackson wrote:
> 
> Gone offshore again?
> 
> 
> 
> On Wed, Oct 3, 2018 at 2:30 PM Jen Linkova wrote:
> 
> I believe the latency should be back to usual values now.
> 
> On Wed, Oct 3, 2018 at 1:55 PM Dave Browning wrote:
> 
> All,
> 
> Just to keep the list updated on this issue, Google have
> confirmed there is a wide spread problem and the
> appropriate Engineer's are on the case
> 
> Cheers,
> 
> Dave Browning | Senior Network Engineer
> P 1300 791 678 D 07 3708 0008
> Level 1, 12 Railway Tce, Milton QLD 4064


___
AusNOG mailing list
AusNOG@lists.ausnog.net

https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.ausnog.net_mailman_listinfo_ausnog&d=DwIGaQ&c=Ftw_YSVcGmqQBvrGwAZugGylNRkk-uER0-5bY94tjsc&r=srheiojgNn4Jg0keeQ9hj6cyp8zgHx0m-eTRLdD3nnw&m=51ezH6kfqUL4Txbm2H37IQAKdncM3og4KKaIcIghgV8&s=-pqvy3KucQpmDa1waXPuxsWJ7h5e6YDQA72LQ9ZGIFQ&e=



This message contains information which may be confidential and privileged. 
Unless you are the intended recipient (or authorized to receive this message 
for the intended recipient), you may not use, copy, disseminate or disclose to 
anyone the message or any information contained in the message.  If you have 
received the message in error, please advise the sender by reply e-mail, and 
delete the message.  Thank you very much.
___
AusNOG mailing list
AusNOG@lists.ausnog.net
http://lists.ausnog.net/mailman/listinfo/ausnog


Re: [AusNOG] supermicro stocks dive

2018-10-04 Thread Serge Burjak
This is the response from the players

https://www.bloomberg.com/news/articles/2018-10-04/the-big-hack-amazon-apple-supermicro-and-beijing-respond


On Fri, 5 Oct 2018 at 10:37, Paul Wilkins  wrote:

> Posted on Bloomberg October 4, 2018 ergo, not fake news. The meta story
> here is that Apple and Amazon are officially denying it.
>
> Three senior insiders at Apple say that in the summer of 2015, it, too,
> found malicious chips on Supermicro motherboards. Apple severed ties with
> Supermicro the following year, for what it described as unrelated reasons.
>
> On Fri, 5 Oct 2018 at 10:29, Shannon Pearce  wrote:
>
>> Not sure how posting a link to the purported fake news article is proof
>> said article is not fake?
>>
>> Shan.
>>
>> On 5 Oct 2018, at 10:27 am, Paul Wilkins 
>> wrote:
>>
>> Negatory on the fake news.
>>
>>
>> https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies
>>
>> On Fri, 5 Oct 2018 at 10:25, Jay Dixon  wrote:
>>
>>> As our previous security manager at work put it in his thick Russian
>>> accent...
>>>
>>> "you know, you have 2 choices about who reads your email; KGB, or FBI"
>>>
>>> On Fri, Oct 5, 2018 at 10:00 AM Noel Butler 
>>> wrote:
>>>
 given when this broke a couple days ago


 https://www.securityweek.com/china-used-tiny-chips-us-computers-steal-secrets-report

 overnight nasdaq supermicro stocks  down 41%
 seems cant trust much coming out of China these days. though, you cant
 trust anything coming out of the USA either.


 --

 Kind Regards,

 Noel Butler
 This Email, including any attachments, may contain legally privileged
 information, therefore remains confidential and subject to copyright
 protected under international law. You may not disseminate, discuss, or
 reveal, any part, to anyone, without the authors express written authority
 to do so. If you are not the intended recipient, please notify the sender
 then delete all copies of this message including attachments, immediately.
 Confidentiality, copyright, and legal privilege are not waived or lost by
 reason of the mistaken delivery of this message. Only PDF
  and ODF
  documents accepted, please
 do not send proprietary formatted documents
 ___
 AusNOG mailing list
 AusNOG@lists.ausnog.net
 http://lists.ausnog.net/mailman/listinfo/ausnog

>>> ___
>>> AusNOG mailing list
>>> AusNOG@lists.ausnog.net
>>> http://lists.ausnog.net/mailman/listinfo/ausnog
>>>
>> ___
>> AusNOG mailing list
>> AusNOG@lists.ausnog.net
>> http://lists.ausnog.net/mailman/listinfo/ausnog
>>
>>
>> ___
> AusNOG mailing list
> AusNOG@lists.ausnog.net
> http://lists.ausnog.net/mailman/listinfo/ausnog
>
___
AusNOG mailing list
AusNOG@lists.ausnog.net
http://lists.ausnog.net/mailman/listinfo/ausnog


Re: [AusNOG] supermicro stocks dive

2018-10-04 Thread Noel Butler
Hi, 

I've heard those denials too, but experience tells us there's no smoke
without fire... not that I use supermicro anyway so my data only goers
to NSA, not the MSS :) 

cheers 

On 05/10/2018 10:20, Florian Valette wrote:

> HI, 
> 
> It seems to be a Fake News...? 
> 
> Supermicro refutes : 
> 
> https://www.supermicro.com/newsroom/pressreleases/2018/press181004_Bloomberg.cfm
>  [1] 
> 
> Apple denied too : 
> 
> _"Over the course of the past year, Bloomberg has contacted us multiple times 
> with claims, sometimes vague and sometimes elaborate, of an alleged security 
> incident at Apple. Each time, we have conducted rigorous internal 
> investigations based on their inquiries and each time we have found 
> absolutely no evidence to support any of them. We have repeatedly and 
> consistently offered factual responses, on the record, refuting virtually 
> every aspect of Bloomberg's story relating to Apple._ 
> 
> _On this we can be very clear: Apple has never found malicious chips, 
> "hardware manipulations" or vulnerabilities purposely planted in any server. 
> Apple never had any contact with the FBI or any other agency about such an 
> incident. We are not aware of any investigation by the FBI, nor are our 
> contacts in law enforcement._ 
> 
> _In response to Bloomberg's latest version of the narrative, we present the 
> following facts: Siri and Topsy never shared servers; Siri has never been 
> deployed on servers sold to us by Super Micro; and Topsy data was limited to 
> approximately 2,000 Super Micro servers, not 7,000. None of those servers has 
> ever been found to hold malicious chips._ 
> 
> _As a matter of practice, before servers are put into production at Apple 
> they are inspected for security vulnerabilities and we update all firmware 
> and software with the latest protections. We did not uncover any unusual 
> vulnerabilities in the servers we purchased from Super Micro when we updated 
> the firmware and software according to our standard procedures._ 
> 
> _We are deeply disappointed that in their dealings with us, Bloomberg's 
> reporters have not been open to the possibility that they or their sources 
> might be wrong or misinformed. Our best guess is that they are confusing 
> their story with a previously-reported 2016 incident in which we discovered 
> an infected driver on a single Super Micro server in one of our labs. That 
> one-time event was determined to be accidental and not a targeted attack 
> against Apple._ 
> 
> _While there has been no claim that customer data was involved, we take these 
> allegations seriously and we want users to know that we do everything 
> possible to safeguard the personal information they entrust to us. We also 
> want them to know that what Bloomberg is reporting about Apple is 
> inaccurate._ 
> 
> _Apple has always believed in being transparent about the ways we handle and 
> protect data. If there were ever such an event as Bloomberg News has claimed, 
> we would be forthcoming about it and we would work closely with law 
> enforcement. Apple engineers conduct regular and rigorous security screenings 
> to ensure that our systems are safe. We know that security is an endless race 
> and that's why we constantly fortify our systems against increasingly 
> sophisticated hackers and cybercriminals who want to steal our data. »_ 
> 
> AWS is saying this in untrue : 
> 
> https://urldefense.proofpoint.com/v2/url?u=https-3A__aws.amazon.com_blogs_security_setting-2Dthe-2Drecord-2Dstraight-2Don-2Dbloomberg-2Dbusinessweeks-2Derroneous-2Darticle_&d=DwIFAg&c=4DxX-JX0i28X6V65hK0ftwVK1xnmwcYC0vo7GVya1JY&r=NGLqjlg8Gqjal0G8jzVjweKfIgMnEHJdMIgB0mMqqt8&m=4umDOyc_2f8DSiCtG_AvPlliL0yuDZKcJDPX23xkdcI&s=IVl33wh7j2kT9A8phJg8TmcO8aG-siRF8sV9TAnT4nk&e
>  [2] 
> 
> Regards, 
> 
> -- 
> 
> Florian Valette 
> 
> _Innovation is freedom_ 
> 
> Email: florian.vale...@corp.ovh.com 
> 
> -- 
> 
> OVH Network "Chacha" Team
> AS 16276 http://peering.ovh.net/ [3] 
> 
> FROM: AusNOG  on behalf of Noel Butler 
> 
> DATE: Friday, 5 October 2018 at 10:00 am
> TO: Ausnog 
> SUBJECT: [AusNOG] supermicro stocks dive 
> 
> given when this broke a couple days ago 
> 
> https://www.securityweek.com/china-used-tiny-chips-us-computers-steal-secrets-report
>  
> 
> overnight nasdaq supermicro stocks  down 41%
> 
> seems cant trust much coming out of China these days. though, you cant trust 
> anything coming out of the USA either. 
> 
> -- 
> 
> Kind Regards, 
> 
> Noel Butler 
> 
> This Email, including any attachments, may contain legally privileged 
> information, therefore remains confidential and subject to copyright 
> protected under international law. You may not disseminate, discuss, or 
> reveal, any part, to anyone, without the authors express written authority to 
> do so. If you are not the intended recipient, please notify the sender then 
> delete all copies of this message

Re: [AusNOG] supermicro stocks dive

2018-10-04 Thread Paul Jones
> -Original Message-
> From: AusNOG  On Behalf Of Scott
> Weeks
> Sent: Friday, 5 October 2018 10:34 AM
> To: ausnog@lists.ausnog.net
> Subject: Re: [AusNOG] supermicro stocks dive
> 
> That would be the FSB (was KGB) or CIA and you
> don't have a choice.  They both have AIs that
> do.  Simultaneously.  Don't forget about MSS,
> CSIS, RGB, ISI, etc, etc. :)
> 


Should be some great talks at Defcon about this in the years to come 😊 Since 
the Governments ban on Chinese companies supplying equipment for 5G networks 
(and NBN), and the relative silence from the opposition, I've always wondered 
what they know that we don't.


Paul.
___
AusNOG mailing list
AusNOG@lists.ausnog.net
http://lists.ausnog.net/mailman/listinfo/ausnog


Re: [AusNOG] supermicro stocks dive

2018-10-04 Thread Jim Woodward
Hi All,

 

Did anyone else read SuperMicro’s response as not a denial but an invitation or 
Governments to get in and share information in the interests of Cyber Security? 
I’m just making sure I am not alone in what I read into their response. 

 

 

 

Kind Regards,

Jim.

 

From: AusNOG  On Behalf Of Serge Burjak
Sent: Friday, 5 October 2018 11:09 AM
To: Paul Wilkins 
Cc: shannonpea...@me.com; aus...@ausnog.net 
Subject: Re: [AusNOG] supermicro stocks dive

 

This is the response from the players

 

 

 
https://www.bloomberg.com/news/articles/2018-10-04/the-big-hack-amazon-apple-supermicro-and-beijing-respond
 

 

On Fri, 5 Oct 2018 at 10:37, Paul Wilkins mailto:paulwilkins...@gmail.com> > wrote:

Posted on Bloomberg October 4, 2018 ergo, not fake news. The meta story here is 
that Apple and Amazon are officially denying it.

 

Three senior insiders at Apple say that in the summer of 2015, it, too, found 
malicious chips on Supermicro motherboards. Apple severed ties with Supermicro 
the following year, for what it described as unrelated reasons.

 

On Fri, 5 Oct 2018 at 10:29, Shannon Pearce mailto:shannonpea...@me.com> > wrote:

Not sure how posting a link to the purported fake news article is proof said 
article is not fake?

 

Shan. 





On 5 Oct 2018, at 10:27 am, Paul Wilkins mailto:paulwilkins...@gmail.com> > wrote:

 

Negatory on the fake news.

 

https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies

 

On Fri, 5 Oct 2018 at 10:25, Jay Dixon mailto:jayb...@gmail.com> > wrote:

As our previous security manager at work put it in his thick Russian accent...

 

"you know, you have 2 choices about who reads your email; KGB, or FBI"

 

On Fri, Oct 5, 2018 at 10:00 AM Noel Butler mailto:noel.but...@ausics.net> > wrote:

given when this broke a couple days ago

 

 
https://www.securityweek.com/china-used-tiny-chips-us-computers-steal-secrets-report

overnight nasdaq supermicro stocks  down 41%

seems cant trust much coming out of China these days. though, you cant trust 
anything coming out of the USA either.

 

 

-- 

Kind Regards,

Noel Butler


This Email, including any attachments, may contain legally privileged 
information, therefore remains confidential and subject to copyright protected 
under international law. You may not disseminate, discuss, or reveal, any part, 
to anyone, without the authors express written authority to do so. If you are 
not the intended recipient, please notify the sender then delete all copies of 
this message including attachments, immediately. Confidentiality, copyright, 
and legal privilege are not waived or lost by reason of the mistaken delivery 
of this message. Only   PDF and  
 ODF documents accepted, please do 
not send proprietary formatted documents 

___
AusNOG mailing list
AusNOG@lists.ausnog.net  
http://lists.ausnog.net/mailman/listinfo/ausnog

___
AusNOG mailing list
AusNOG@lists.ausnog.net  
http://lists.ausnog.net/mailman/listinfo/ausnog

___
AusNOG mailing list
AusNOG@lists.ausnog.net  
http://lists.ausnog.net/mailman/listinfo/ausnog

 

___
AusNOG mailing list
AusNOG@lists.ausnog.net  
http://lists.ausnog.net/mailman/listinfo/ausnog

___
AusNOG mailing list
AusNOG@lists.ausnog.net
http://lists.ausnog.net/mailman/listinfo/ausnog


Re: [AusNOG] High Latency to AS15169

2018-10-04 Thread Jen Linkova
Folks,

There is no guarantee that latency to particular service stays in any
pre-defined range (while, indeed, the goal is to keep it as low as
possible). There are numerous legitimate reasons for temporary latency
increase. It would come back to usual value eventually.

The corresponding team is well aware of the fact that currently AU
might experience higher than usual latency and  working on minimizing
the impact (and customers  unhappiness ;)) and making such latency
increases happening less often. However it's not always possible to
totally avoid them.

On Fri, Oct 5, 2018 at 10:46 AM Paul Gear  wrote:
>
> This seems to be re-breaking on a scheduled basis:
>
> https://libertysys.com.au/imagebin/15387001474777_1538700147_1538438400.png
>
> On 04/10/18 15:33, Jason Leschnik wrote:
> > I'm seeing quad-8 hitting the larger delay, but google.com
> >  is 8ms from a few locations.
> >
> > On Thu, 4 Oct 2018 at 14:39, Ross Tsolakidis wrote:
> >
> >
> > Thishappens often, we graph it for fun.
> > (not default smokeping timers, very low impact).
> >
> > image.png
> >
> > Regards,
> > Ross.
> >
> >
> > On Thu, Oct 4, 2018 at 2:30 PM Nathan Brookfield
> > wrote:
> >
> > We never saw it come back.
> >
> > Nathan Brookfield
> > Chief Executive Officer
> >
> > Simtronic Technologies Pty Ltd
> > http://www.simtronic.com.au
> >
> > On 4 Oct 2018, at 14:12, Tim Jackson wrote:
> >
> > Gone offshore again?
> >
> > 
> >
> > On Wed, Oct 3, 2018 at 2:30 PM Jen Linkova wrote:
> >
> > I believe the latency should be back to usual values now.
> >
> > On Wed, Oct 3, 2018 at 1:55 PM Dave Browning wrote:
> >
> > All,
> >
> > Just to keep the list updated on this issue, Google have
> > confirmed there is a wide spread problem and the
> > appropriate Engineer's are on the case
> >
> > Cheers,
> >
> > Dave Browning | Senior Network Engineer
> > P 1300 791 678 D 07 3708 0008
> > Level 1, 12 Railway Tce, Milton QLD 4064
>
>
> ___
> AusNOG mailing list
> AusNOG@lists.ausnog.net
> http://lists.ausnog.net/mailman/listinfo/ausnog



-- 
SY, Jen Linkova aka Furry
___
AusNOG mailing list
AusNOG@lists.ausnog.net
http://lists.ausnog.net/mailman/listinfo/ausnog


Re: [AusNOG] supermicro stocks dive

2018-10-04 Thread Matt Perkins
Seems a lot easer just to legislate that software company’s  are compelled to 
install malware that can be remotely activated by the government. 

Surely only an evil foreign power would do something so Orwellian. 


Matt



-- 
/* Matt Perkins
   Direct 1300 137 379 Spectrum Networks Ptd. Ltd.
   Office 1300 133 299 m...@spectrum.com.au
   Fax1300 133 255 Level 6, 350 George Street Sydney 2000
  SIP 1300137...@sip.spectrum.com.au
   Google Talk mattaperk...@gmail.com
   PGP/GNUPG Public Key can be found at  http://pgp.mit.edu
*/

> On 5 Oct 2018, at 9:59 am, Noel Butler  wrote:
> 
> given when this broke a couple days ago
> 
> https://www.securityweek.com/china-used-tiny-chips-us-computers-steal-secrets-report
> 
> overnight nasdaq supermicro stocks  down 41%
> 
> seems cant trust much coming out of China these days. though, you cant trust 
> anything coming out of the USA either.
>  
>  
> -- 
> Kind Regards,
> 
> Noel Butler
> 
> This Email, including any attachments, may contain legally privileged 
> information, therefore remains confidential and subject to copyright 
> protected under international law. You may not disseminate, discuss, or 
> reveal, any part, to anyone, without the authors express written authority to 
> do so. If you are not the intended recipient, please notify the sender then 
> delete all copies of this message including attachments, immediately. 
> Confidentiality, copyright, and legal privilege are not waived or lost by 
> reason of the mistaken delivery of this message. Only PDF and ODF documents 
> accepted, please do not send proprietary formatted documents
> ___
> AusNOG mailing list
> AusNOG@lists.ausnog.net
> http://lists.ausnog.net/mailman/listinfo/ausnog
___
AusNOG mailing list
AusNOG@lists.ausnog.net
http://lists.ausnog.net/mailman/listinfo/ausnog


Re: [AusNOG] supermicro stocks dive

2018-10-04 Thread Rob Thomas
I've been doing some research on my own, to see if ANYTHING corroborates
this, and I'm coming up empty handed. (This is the bonus of being
unemployed!)

Let's go through a few assertions in the original article.

1. It was an extremely small chip ('grain of rice'), disguised as a signal
coupler (which has, at most, 4 pins)
2. It was able to alter the OS running on the machine
3. It was tied into the BMC
4. It was able to connect to things, AND receive connections from things.

Unfortunately, those things just don't add up. The smallest standalone
computer that I can find is from IBM - https://bit.ly/2GLm0K6 - which is
1mm^2.

That does not include any external communications pins (apparently), as
it's all self contained.

You can't just wave a magic wand and say 'It was connected to the BMC, so
it could do all these things'. Especially if it only had 4 pins - 2 of
which would be power, and the other two would be 'rxd' and 'txd' - But what
does it connect to? How does it recieve connections? Does it tap into the
BMC and make it do stuff? This just doesn't add up.

So I don't know WHY Bloomberg is pushing this, especially with extremely
vocal and explicit denials from all the parties involved.  I'm calling this
'fake news' and my first hypothesis was that it's something do with with
the US Government being annoyed at China, but I try to avoid conspiracy
theories, and I think we'll probably find out it was 4chan trolling some
bloomberg reporter, for the lulz.

--Rob


On Fri, 5 Oct 2018 at 10:00, Noel Butler  wrote:

> given when this broke a couple days ago
>
>
> https://www.securityweek.com/china-used-tiny-chips-us-computers-steal-secrets-report
>
> overnight nasdaq supermicro stocks  down 41%
> seems cant trust much coming out of China these days. though, you cant
> trust anything coming out of the USA either.
>
>
> --
>
> Kind Regards,
>
> Noel Butler
> This Email, including any attachments, may contain legally privileged
> information, therefore remains confidential and subject to copyright
> protected under international law. You may not disseminate, discuss, or
> reveal, any part, to anyone, without the authors express written authority
> to do so. If you are not the intended recipient, please notify the sender
> then delete all copies of this message including attachments, immediately.
> Confidentiality, copyright, and legal privilege are not waived or lost by
> reason of the mistaken delivery of this message. Only PDF
>  and ODF
>  documents accepted, please do
> not send proprietary formatted documents
> ___
> AusNOG mailing list
> AusNOG@lists.ausnog.net
> http://lists.ausnog.net/mailman/listinfo/ausnog
>
___
AusNOG mailing list
AusNOG@lists.ausnog.net
http://lists.ausnog.net/mailman/listinfo/ausnog


Re: [AusNOG] supermicro stocks dive

2018-10-04 Thread Rob Thomas
I posed to /r/netsec if anyone cares to take the discussion there, and
expanded on my original post a bit. I'm even more certain that this is
fabricated, the more I think about it.

https://www.reddit.com/r/netsec/comments/9lj7mx/the_bloomberg_article_about_supermicro_is_bogus/
?

--Rob


On Fri, 5 Oct 2018 at 10:00, Noel Butler  wrote:

> given when this broke a couple days ago
>
>
> https://www.securityweek.com/china-used-tiny-chips-us-computers-steal-secrets-report
>
> overnight nasdaq supermicro stocks  down 41%
> seems cant trust much coming out of China these days. though, you cant
> trust anything coming out of the USA either.
>
>
> --
>
> Kind Regards,
>
> Noel Butler
> This Email, including any attachments, may contain legally privileged
> information, therefore remains confidential and subject to copyright
> protected under international law. You may not disseminate, discuss, or
> reveal, any part, to anyone, without the authors express written authority
> to do so. If you are not the intended recipient, please notify the sender
> then delete all copies of this message including attachments, immediately.
> Confidentiality, copyright, and legal privilege are not waived or lost by
> reason of the mistaken delivery of this message. Only PDF
>  and ODF
>  documents accepted, please do
> not send proprietary formatted documents
> ___
> AusNOG mailing list
> AusNOG@lists.ausnog.net
> http://lists.ausnog.net/mailman/listinfo/ausnog
>
___
AusNOG mailing list
AusNOG@lists.ausnog.net
http://lists.ausnog.net/mailman/listinfo/ausnog


Re: [AusNOG] supermicro stocks dive

2018-10-04 Thread Bill Woodcock


> On Oct 4, 2018, at 9:39 PM, Rob Thomas  wrote:
> 
> I posed to /r/netsec if anyone cares to take the discussion there

Posted seven minutes ago, and already removed?

-Bill



signature.asc
Description: Message signed with OpenPGP
___
AusNOG mailing list
AusNOG@lists.ausnog.net
http://lists.ausnog.net/mailman/listinfo/ausnog


Re: [AusNOG] supermicro stocks dive

2018-10-04 Thread Rob Thomas
Odd. I've messaged the mods, I had a bit.ly link in it, which may have
triggered the spamfilter.

I've pastebin'ed the text here -- https://pastebin.com/mVpqNa38

--Rob


On Fri, 5 Oct 2018 at 14:43, Bill Woodcock  wrote:

>
>
> > On Oct 4, 2018, at 9:39 PM, Rob Thomas  wrote:
> >
> > I posed to /r/netsec if anyone cares to take the discussion there
>
> Posted seven minutes ago, and already removed?
>
> -Bill
>
>
___
AusNOG mailing list
AusNOG@lists.ausnog.net
http://lists.ausnog.net/mailman/listinfo/ausnog


Re: [AusNOG] supermicro stocks dive

2018-10-04 Thread Matthew Moyle-Croft
Fairly robust rebuttal from the usually very silent Amazon.

https://aws.amazon.com/blogs/security/setting-the-record-straight-on-bloomberg-businessweeks-erroneous-article/

MMC

On Fri, Oct 5, 2018 at 2:18 PM Rob Thomas  wrote:

> Odd. I've messaged the mods, I had a bit.ly link in it, which may have
> triggered the spamfilter.
>
> I've pastebin'ed the text here -- https://pastebin.com/mVpqNa38
>
> --Rob
>
>
> On Fri, 5 Oct 2018 at 14:43, Bill Woodcock  wrote:
>
>>
>>
>> > On Oct 4, 2018, at 9:39 PM, Rob Thomas  wrote:
>> >
>> > I posed to /r/netsec if anyone cares to take the discussion there
>>
>> Posted seven minutes ago, and already removed?
>>
>> -Bill
>>
>> ___
> AusNOG mailing list
> AusNOG@lists.ausnog.net
> http://lists.ausnog.net/mailman/listinfo/ausnog
>
___
AusNOG mailing list
AusNOG@lists.ausnog.net
http://lists.ausnog.net/mailman/listinfo/ausnog


Re: [AusNOG] supermicro stocks dive

2018-10-04 Thread Paul Wilkins
1 - Denials by Apple & Amazon are qualified
2 - Bloomberg are a reputable news agency
3 - They quote multiple sources
4 - They quote 30 approx companies affected
5 - This is a feasible vector, which means it's a risk

Kind regards

Paul Wilkins


On Fri, 5 Oct 2018 at 15:05, Matthew Moyle-Croft  wrote:

> Fairly robust rebuttal from the usually very silent Amazon.
>
>
> https://aws.amazon.com/blogs/security/setting-the-record-straight-on-bloomberg-businessweeks-erroneous-article/
>
> MMC
>
> On Fri, Oct 5, 2018 at 2:18 PM Rob Thomas  wrote:
>
>> Odd. I've messaged the mods, I had a bit.ly link in it, which may have
>> triggered the spamfilter.
>>
>> I've pastebin'ed the text here -- https://pastebin.com/mVpqNa38
>>
>> --Rob
>>
>>
>> On Fri, 5 Oct 2018 at 14:43, Bill Woodcock  wrote:
>>
>>>
>>>
>>> > On Oct 4, 2018, at 9:39 PM, Rob Thomas  wrote:
>>> >
>>> > I posed to /r/netsec if anyone cares to take the discussion there
>>>
>>> Posted seven minutes ago, and already removed?
>>>
>>> -Bill
>>>
>>> ___
>> AusNOG mailing list
>> AusNOG@lists.ausnog.net
>> http://lists.ausnog.net/mailman/listinfo/ausnog
>>
> ___
> AusNOG mailing list
> AusNOG@lists.ausnog.net
> http://lists.ausnog.net/mailman/listinfo/ausnog
>
___
AusNOG mailing list
AusNOG@lists.ausnog.net
http://lists.ausnog.net/mailman/listinfo/ausnog


Re: [AusNOG] supermicro stocks dive

2018-10-04 Thread Rob Thomas
As it appears that my rebuttal is not going to be deleted in /r/security,
can I suggest we take this discussion there, rather than yet more noise
here?

https://www.reddit.com/r/security/comments/9ljcny/the_bloomberg_article_about_supermicro_is_bogus/

I will address your points there!


On Fri, 5 Oct 2018 at 15:22, Paul Wilkins  wrote:

> 1 - Denials by Apple & Amazon are qualified
> 2 - Bloomberg are a reputable news agency
> 3 - They quote multiple sources
> 4 - They quote 30 approx companies affected
> 5 - This is a feasible vector, which means it's a risk
>
> Kind regards
>
> Paul Wilkins
>
>
> On Fri, 5 Oct 2018 at 15:05, Matthew Moyle-Croft  wrote:
>
>> Fairly robust rebuttal from the usually very silent Amazon.
>>
>>
>> https://aws.amazon.com/blogs/security/setting-the-record-straight-on-bloomberg-businessweeks-erroneous-article/
>>
>> MMC
>>
>> On Fri, Oct 5, 2018 at 2:18 PM Rob Thomas  wrote:
>>
>>> Odd. I've messaged the mods, I had a bit.ly link in it, which may have
>>> triggered the spamfilter.
>>>
>>> I've pastebin'ed the text here -- https://pastebin.com/mVpqNa38
>>>
>>> --Rob
>>>
>>>
>>> On Fri, 5 Oct 2018 at 14:43, Bill Woodcock  wrote:
>>>


 > On Oct 4, 2018, at 9:39 PM, Rob Thomas  wrote:
 >
 > I posed to /r/netsec if anyone cares to take the discussion there

 Posted seven minutes ago, and already removed?

 -Bill

 ___
>>> AusNOG mailing list
>>> AusNOG@lists.ausnog.net
>>> http://lists.ausnog.net/mailman/listinfo/ausnog
>>>
>> ___
>> AusNOG mailing list
>> AusNOG@lists.ausnog.net
>> http://lists.ausnog.net/mailman/listinfo/ausnog
>>
> ___
> AusNOG mailing list
> AusNOG@lists.ausnog.net
> http://lists.ausnog.net/mailman/listinfo/ausnog
>
___
AusNOG mailing list
AusNOG@lists.ausnog.net
http://lists.ausnog.net/mailman/listinfo/ausnog


[AusNOG] VMWARE certified Engineer

2018-10-04 Thread Matthew Matters
Hey guys,

Sorry for the noise, just wondering if there is anyone on list or if anyone 
knows of a vmware specialist to resolve some issues we have.

Regards,

Matthew Matters  Managing Director / CEO of Aus Net Servers Australia Pty Ltd
Management Department  |  Small Business Hosting Sales & Services  |  Aus Net 
Servers Australia Pty Ltd
​P  03 5326 0050  |  M  0402 711 135  |  E  
mmatt...@ausnetservers.net.au
 |  W  www.ausnetservers.net.au​
​


[Follow us] [Facebook]    
[Twitter]    [Google+] 


The information transmitted in this e-mail is for the exclusive use of the 
intended addressee and may contain confidential and/or privileged material. Any 
review, re-transmission, dissemination or other use of it, or the taking of any 
action in reliance upon this information by persons and/or entities other than 
the intended recipient is prohibited. If you received this in error, please 
inform the sender and/or addressee immediately and delete the material. If you 
have been sent this email and it is not addressed to you please forward the 
email as is to hostmas...@ausnetservers.net.au and delete all local and 
inta-local copies including backups from your system. E-mails may not be 
secure, may contain computer viruses and may be corrupted in transmission. 
Please carefully check this e-mail (and any attachment) accordingly. No 
warranties are given and no liability is accepted for any loss or damage caused 
by such matters.

This email has been scanned before transmission with business grade antivirus 
and antispam software but as mentioned above no warranties can be given that 
the email has not been contaminated after transmission.

___
AusNOG mailing list
AusNOG@lists.ausnog.net
http://lists.ausnog.net/mailman/listinfo/ausnog