Re: Cite on DNS-related traffic.

2000-05-30 Thread Valdis . Kletnieks

On Tue, 30 May 2000 23:33:13 EDT, Garreth Jeremiah said:
> Excuse me if this is answering the wron question here, but.
> This is just cycling through the clients "DNS Suffix search order", which is
> clearly set to: dept.other.edu

Yes.  However, it's unclear (to me, at least) whether either
of the following should be true by default:

a) That it should try 'other.edu' and 'edu', if suffixing with the
given suffix fails.

b) That it should do any rewriting at all if there's a '.' already
in the name.

Yes, I know that you need both of these to make 'foobar.chem'
resolve to 'foobar.chem.other.edu' if you're in a *.phys.other.edu
subnet...  But there's gotta be a way to avoid this behavior as
a default...

/Valdis (who thinks things would work a LOT better overall if everybody
just kept their machines configured right and installed recent patches
once a year or so ;)




Re: Cite on DNS-related traffic.

2000-05-30 Thread Garreth Jeremiah

Excuse me if this is answering the wron question here, but.
This is just cycling through the clients "DNS Suffix search order", which is
clearly set to: dept.other.edu

it may be additionally set up for the others also, as the implimentation of the
resolver is obviously client dependent.  After trying its "domain suffix's" it
will attempt to resolve the bare form of the host domain pair.

If I am totally off the mark here - sorry - it's late and the wife is
screaming for me to sleep as I have an early start tomorrow.

Garreth J Jeremiah
IT Specialist (Security)

 On Tue, 30 May 2000, [EMAIL PROTECTED]
wrote: > On Tue, 30 May 2000 16:56:21 PDT, Daryl Bunce <[EMAIL PROTECTED]> 
said: > > I've often wondered how much of the overload is due to 
> > browsers looking for XYZ.com, then looking for www.XYZ.com...
> > Just one of those things thought about in the wee hours.
> 
> I run an off-site secondary for another .edu's DNS.  I once got
> curious, and watched *WAY* too many lookups for (in quick sequence)
> 
> www.netscape.com.dept.other.edu
> www.netscape.com.other.edu
> www.netscape.com.edu
> www.netscape.com  
> 
> No, I don't know why I got the last one, as I'm only answering for
> 'other.edu'.  Perhaps the host doing the queries had a sudden fit
> of inspiration, saw my machine as an NS for its domain, and guessed.
> Or maybe just some funky info in a DHCP config file someplace...
> 
>   Valdis Kletnieks
>   Operating Systems Analyst
>   Virginia Tech




Re: Cite on DNS-related traffic.

2000-05-30 Thread Valdis . Kletnieks

On Tue, 30 May 2000 16:56:21 PDT, Daryl Bunce <[EMAIL PROTECTED]>  said:
> I've often wondered how much of the overload is due to 
> browsers looking for XYZ.com, then looking for www.XYZ.com...
> Just one of those things thought about in the wee hours.

I run an off-site secondary for another .edu's DNS.  I once got
curious, and watched *WAY* too many lookups for (in quick sequence)

www.netscape.com.dept.other.edu
www.netscape.com.other.edu
www.netscape.com.edu
www.netscape.com  

No, I don't know why I got the last one, as I'm only answering for
'other.edu'.  Perhaps the host doing the queries had a sudden fit
of inspiration, saw my machine as an NS for its domain, and guessed.
Or maybe just some funky info in a DHCP config file someplace...

Valdis Kletnieks
Operating Systems Analyst
Virginia Tech




RE: Cite on DNS-related traffic.

2000-05-30 Thread Daryl Bunce


I've often wondered how much of the overload is due to 
browsers looking for XYZ.com, then looking for www.XYZ.com...
Just one of those things thought about in the wee hours.




New OBAST mailing list

2000-05-30 Thread Randall Stewart

Dear all:
 
A mailing list has been formed to discuss a
Open Base Station Protocol (OBAST). This
mailing list is a pre-cursor to a possible upcoming
BOF. If you are interested in this discussion
please join the list by subscribing as follows:

 
Send the following command in email to:
  
  "[EMAIL PROTECTED]": 

and in the body of your message

 subscribe obast-list

or 

 subscribe obast-list myemail@address

other commands understood by majordomo are:

who obast-list
info obast-list
index obast-list
get obast-day-number-from-index 

Note: You must be a member of the list to run the
  above commands

Thanks

-- 
Randall R. Stewart
Member Technical Staff
Network Architecture and Technology (NAT)
847-632-7438 fax:847-632-6733




Subscription CRAP on the list

2000-05-30 Thread Steve Coya


Folks,

For those who don't know better, please ignore the message sent from
[EMAIL PROTECTED] to the IETF list.

It did not originate from the IETF or the Secretariat.


Steve







Your subscription list review password

2000-05-30 Thread SubscriptionBot

Your subscription profile is ready for review!  Please click on the link below
to enter your account:

http://review.postmasterdirect.com/l?[EMAIL PROTECTED]&p=6886

If the link above doesn't work for you, please visit

http://review.postmasterdirect.com/l.mhtml

and enter your email address and password.  Your password is: 6886


Thank you!





RE: Storage over Ethernet/IP

2000-05-30 Thread RJ Atkinson

At 18:02 29-05-00 , Dawson, Peter D wrote:
>is vulnerability and threat analysis part of the
>standardization process ??

YES (shouting intentional).

The "Security Considerations" section of every RFC ought to
contain vulnerability, threat analysis, risk mitigation,
and residual risk information.

Ran
[EMAIL PROTECTED]




Your subscription list review password

2000-05-30 Thread SubscriptionBot

Your subscription profile is ready for review!  Please click on the link below
to enter your account:

http://review.postmasterdirect.com/l?[EMAIL PROTECTED]&p=6886

If the link above doesn't work for you, please visit

http://review.postmasterdirect.com/l.mhtml

and enter your email address and password.  Your password is: 6886


Thank you!





Re: still no Outlook patch

2000-05-30 Thread Anthony Atkielski

From: "James Salsman" <[EMAIL PROTECTED]>
Sent: Monday, May 29, 2000 02:12
Subject: RE: still no Outlook patch


> The fact that they still have some people who
> have suggested it is not helping them avoid
> the "predatory" label.

Only among those with a poor understanding of the software issues, I
daresay.  I think, in this case (as in most), it is a question of poor or
questionable product design, not predation.

Microsoft, like just about every other microcomputer software publisher,
gives priority to feature bloat over security.  This is an economic
necessity, because the need to sell upgrades and versions to survive
requires that a software publisher find reasons to entice customers to
replace software that already does the job with new software that does the
same thing.  Customers may whine about security, but they won't pay for it,
and they find it a nuisance when they see it in the products they buy (even
mainframe customers tend to be this way, but microcomputer users are much,
much worse in this respect).  Build lots of new features of dubious utility
into a product and you'll be able to persuade at least some people to buy an
upgrade that they don't really need; build security into a product and a lot
of people will stick with the old version just to avoid the inconvenience of
the new security features.  Additionally, while it is difficult to prove
that a publisher has not lived up to its promise with respect to new and
often useless features, it is much easier to prove that a publisher has
messed something up if it promises security and fails to deliver--so it's
best not to promise security in the first place.

Anyway, I'm not sure what any of this has to do with the Internet, apart
from a loose connection to recent problems with viruses that have propagated
via e-mail sent (incidentally) over the Internet.  Even then, in these
specific, recent cases, the viruses spread because individual users were too
stupid to reflect before opening just any old attachment that they see (even
after repeated warnings); and so, if any fingers must be pointed, I suggest
that they be pointed at the end users, not at vendors, ISPs, the IETF, or
anyone else.  There's a limit to how completely any software can protect
against stupidity and still fulfill a useful purpose.

  -- Anthony




RE: 48th IETF meeting in Pittsburgh, PA

2000-05-30 Thread Morrisey Matthew J.

Not a lot there...
...yet.

Guess i'm planning to early?
Does anyone know who the sponsor is?



> -Original Message-
> From: Fred Baker [SMTP:[EMAIL PROTECTED]]
> Sent: Friday, May 26, 2000 7:47 PM
> To:   Morrisey Matthew J.
> Cc:   '[EMAIL PROTECTED]'
> Subject:  Re: 48th IETF meeting in Pittsburgh, PA
> 
> At 10:15 AM 5/25/00 -0400, Morrisey Matthew J. wrote:
> >Where can i find more info?
> 
> have you checked www.ietf.org?




Free eCommerce Store

2000-05-30 Thread contact

---
This mail is never sent unsolicited. This is a PostMasterDirect.com
mailing! You have subscribed to receive this information at Internet.com.
To unsubscribe forward this message to [EMAIL PROTECTED]
To mail to lists, go to http://www.PostMasterDirect.com/
---


Put your business online, instantly.  gTranz provides you with the tools to build, 
manage and grow your online business, including:

·   An easy-to-use store-builder
·   Site hosting
·   Real time credit card processing
·   Tax and shipping calculators
·   Unlimited categories and items
·   In-depth reporting functions
·   Merchant account services
·   Search Engine Submission
·   Domain Name Registration
·   Banner advertising
·   Procurement services

And much more.

Special Offer:
If you respond to this ad within the next 30 days, we will:

1.  Give you a 30 day FREE trial
2.  Transfer your existing site into our solution 
3.  Provide full telephone support


To take advantage of our special offer visit www.gtranz.com, sign-up, and start 
building your online store.  It’s that simple.   

Business Partners wanted:
Become a gTranz partner and earn revenue by providing gTranz’s e-commerce services to 
your customers.  For details about our various partnership and affiliate programs, 
please visit www.gtranz.com/partners.html.