EOF, Amsterdam, September - Call for Presentations
[apologies for duplicates, hint: they have the same message-id] Hi Network Operations Folk, the holiday period is starting! A good time to consider preparing a presentation at the European Operators Forum (EOF) to be held during the 46th RIPE meeting in Amsterdam on September 1st and 2nd. We would like to have as many practical, hands-on presentations as possible this time. Remember: They do not have to be long. We prefer an stand-up interesting 10 minute presentation over a well prepared 90 minutes explanation of something not so interesting to operators. Find some information about presenting below and think about all those experiences this year that might be interesting to other operators. For the EOF Coordination Group. Daniel Karrenberg -- The EOF The European Operators Forum (EOF) exists for the exchange of Internet operations experience. It has evolved from the information exchange part of the early RIPE meetings to provide an open forum outside of the work programme of the working groups and the RIPE plenary. The EOF aims to attract presentations relevant to network operators, practical hands-on reports, outlines of future developments and small tutorials. Product marketing presentations are not appropriate, user experience reports are. The EOF programme is assembled by an informal coordination group that is always looking for new people who are able to help by attracting interesting presentations and supporting presenters. Contact: Daniel Karrenberg [EMAIL PROTECTED] Presenting at the EOF The EOF wants to attract practical hands-on experience reports. We aim to make turning interesting experience into a presentation as easy as possible. Consider the following: - presentations do not have to be long Something interesting can be said in as little as 10 minutes. This limits the time spent to prepare material and often is a good way to start for first-timers. - support is available We will do our best to support you in preparing your presentation. If you want, we can help structuring your material, help to polish language and arrange for a test-run of your presentation. We can also try to arrange for someone from the same country or region to support you if that is helpful. We can also help you find someone else to present your material in case you cannot make it to the meeting. In short: If you have something intersting to say, we will help you do it! Contact Daniel Karrenberg [EMAIL PROTECTED] for more information. - no product marketing presentations The EOF is *not* an appropriate forum for product marketing presentations. User experience reports which are presented by users are definitely relevant. In-depth technical presentations or tutorials are also possible. We expect to finalise the program in early August. We will get back to you then with scheduling details. In the meantime please provide the information below. We place special emphasis on the abstract which should contain references to related material already available if possible. Please send this to eof-coord at-sign ripe.net. - Author(s) - Speaker - (Working) Title - Abstract - Draft Presentation (if available) - Relation to other known work and/or presentations if known - Time Requested It would be helpful if the abstract was written such that potential attenders will learn what to expect from the presentation, i.e. The presentation will describe our experiences with the Red Packet Washer (http://www.netdet.net/RPW/). We have been using the device for half a year now. It helps us deliver more hygienic datagrams to our customers and peers. We will discuss problems with packet discolouring as well as increased throughput to our upstreams due to decreased clogging by dirty micrograms. We will compare performance with the hand-scrubbing of packets which we used previously. Currently we are optimising device management and getting bugs resolved. We will strive to include the latest experiences in our report. is much better than The presentation will describe the Red Packet Washer made by Network Detergents. More information about the meeting can be found at http://www.ripe.net/ripe/meetings/ripe-46/index.html Should you have questions, please do not hesitate to contact me by e-mail at any time. During July and August my response time may be slightly longer than usual due to the holiday period. Thanks Daniel
Re: Backbone Infrastructure and Secrecy
[EMAIL PROTECTED] wrote: I think London is rather more paranoid. I work in London and just on Monday I was stopped by police at Tower Hill tube station and searched for explosive paraphernalia as part of their programme of random searches. When I told people about this in the office, several others had stories about friends who had been detained or searched within the city for one reason or another. Maybe I don't look like a tourist ;-) but this doesn't happen to me ... OK, so as a fat geek in shorts and a t-shirt I look mostly harmless. I don't believe that it would be as easy as you say for someone to open manholes, cut cables (very thick cables of glass and tough plastics), then run on to the next location. Certainly, in London, anything like this would be picked up on CCTV and the police would be rapidly dispatched to investigate. Hmm. I have direct evidence (of my own eyes) to the contrary. No one cares. Luckily, in this case, those who had the manhole covers up were 'borrowing' some ducting from one side of the road to the other. Does anyone from the Goodge St. area recall ? I know the one person at least is on the mailing list :) Yes, the single points of failure abound, but getting access to them for evil purposes is not as easy as it looks. Until it happens. Peter
Re: Backbone Infrastructure and Secrecy
Gil Levi wrote: While it is impossible to stop someone (a terrorist) from cutting fiber, it is possible to limit his ability to do damage. It is possible to create alternative routes to be used in such cases. Then while the primary route may be down, the alternate route will be used and no terrorist should be able to locate the alternative route since this is something known only to the telecom carrier and is definitely not public knowledge. While this is not new to anyone, what is new is I am sure you have direct experience of networks that work like this. I have direct experience of the opposite. I am sure there is a whole bell curve distribution from bad to good - and sadly the point the bell curve tries to make it that most occurances are in the middle... Peter
it's 1918 in bologna
laptop plugged into an internet shop's ether in bologna. i decided to trace to an address i had roam.psg.com:/etc# traceroute 139.7.30.125 traceroute to 139.7.30.125 (139.7.30.125), 64 hops max, 44 byte packets 1 192.168.10.1 (192.168.10.1) 0.256 ms 0.199 ms 0.137 ms 2 192.168.20.1 (192.168.20.1) 3.208 ms 0.929 ms 0.826 ms 3 37.255.104.1 (37.255.104.1) 4.618 ms 3.974 ms 3.799 ms 4 10.3.6.91 (10.3.6.91) 4.371 ms 3.890 ms 3.863 ms 5 10.3.7.9 (10.3.7.9) 3.904 ms 3.745 ms 3.790 ms 6 10.254.1.181 (10.254.1.181) 3.859 ms 3.925 ms 3.850 ms 7 213.140.31.133 (213.140.31.133) 8.148 ms 8.039 ms 8.150 ms 8 81.208.50.6 (81.208.50.6) 8.231 ms 8.073 ms 8.042 ms 9 mno-vcn-i1-geth3-0.telia.net (213.248.103.229) 8.155 ms 8.357 ms 8.234 ms ... note the 37. address. cute, eh? and i thought omphaloskepsis was greek! randy
Re: it's 1918 in bologna
On 10.07 12:19, Randy Bush wrote: ... note the 37. address. cute, eh? and i thought omphaloskepsis was greek! Someone is going to have fun when tat part of 37/8 gets assigned and used. Daniel From http://www.quinion.com/words/weirdwords/ww-omp1.htm : OMPHALOSKEPSISI pronunciation Contemplating one's navel as an aid to meditation. This word seems to be relatively new, at least the Merriam-Webster Word of the Day column claims it to have been invented only in the 1920s. It turns up in only a few dictionaries and seems to be a word that survives more for the chance to show off one's erudition than as a real aid to communication.
Re: it's 1918 in bologna
Looks like a Bologon to me :) -scotty - Original Message - From: Randy Bush [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Thursday, July 10, 2003 6:19 AM Subject: it's 1918 in bologna laptop plugged into an internet shop's ether in bologna. i decided to trace to an address i had roam.psg.com:/etc# traceroute 139.7.30.125 traceroute to 139.7.30.125 (139.7.30.125), 64 hops max, 44 byte packets 1 192.168.10.1 (192.168.10.1) 0.256 ms 0.199 ms 0.137 ms 2 192.168.20.1 (192.168.20.1) 3.208 ms 0.929 ms 0.826 ms 3 37.255.104.1 (37.255.104.1) 4.618 ms 3.974 ms 3.799 ms 4 10.3.6.91 (10.3.6.91) 4.371 ms 3.890 ms 3.863 ms 5 10.3.7.9 (10.3.7.9) 3.904 ms 3.745 ms 3.790 ms 6 10.254.1.181 (10.254.1.181) 3.859 ms 3.925 ms 3.850 ms 7 213.140.31.133 (213.140.31.133) 8.148 ms 8.039 ms 8.150 ms 8 81.208.50.6 (81.208.50.6) 8.231 ms 8.073 ms 8.042 ms 9 mno-vcn-i1-geth3-0.telia.net (213.248.103.229) 8.155 ms 8.357 ms 8.234 ms ... note the 37. address. cute, eh? and i thought omphaloskepsis was greek! randy
OT: Need to talk to mwinslow
Anyone know how I can reach Michael Winslow (WilTel) today ? Thanks, Dee
Re: Backbone Infrastructure and Secrecy
I stand corrected, last I saw any information on the bunker was well over a year ago. My opinion is that business continuity/disaster recovery customers can save money by using two separate commercial grade facilities in widely spaced cities (for example, London UK and Frankfurt DE), rather than going for a all the eggs in one basket approach. Whereas major commercial exchange points will have a large selection of carriers, government and military bunkers are usually far from any major city centre. Attack-trained guard dogs? Two ton doors? It's all very impressive when showing off to potential clients (or in novels such as Cryptonomicon), but also very useless in the real world. :-) At 12:31 PM 7/10/2003 +0100, you wrote: I'm not subscribed to the list, so I'm not sure if this will make it. But, anyway: it has come to my attention that Eric Kuhnke [EMAIL PROTECTED] made the following post to the nanog list: I recall reading, last year, about a Cyber Bunker outside London UK which is being offered as colo to major banks. The banks were raving praise about it. This facility is an ex-RAF centralized radar control site, buried dozens of feet underground w/ thick concrete and designed to withstand nuclear weapon overpressure. Blast doors, EMF shielding, dual-redundant air filtered generators, the works. The people who bought it and turned it into a colo neglected to mention one thing: It's in the middle of a farm field with a single homed fiber route to Telehouse Docklands. Anyone have a backhoe? *snip* DIVERSE ROUTES, people! Being the owners of what we believe to be the only ex-RAF centralized radar control site that offers colo in the UK (http://www.thebunker.net/), we're a little puzzled. Our bunker _does_ have diverse fibre which we believe is also armoured to a higher standard than usual[1], and certainly buried deeper (since it enters the frame room a _long_ way underground). We also have multiple providers routed across the diverse fibre, not all terminating in Telehouse. In short, about as far as you can get from a a single homed fiber route to Telehouse Docklands. If indeed you are talking about our bunker, we'd be very interested to know where your information comes from, so we can correct it. If you aren't, we'd love to hear which bunker you are talking about. Cheers, Ben (Technical Director, ALD) [1] Funnily enough, the military weren't exactly forthcoming about details like this. -- http://www.apache-ssl.org/ben.html http://www.thebunker.net/ There is no limit to what a man can do or how far he can go if he doesn't mind who gets the credit. - Robert Woodruff
Re: Backbone Infrastructure and Secrecy
PG Date: Wed, 9 Jul 2003 17:30:27 +0100 PG From: Peter Galbavy PG Protecting the switching centres (IP or voice) looks great, PG but walk a few hundred feet and all senblence of physical But those biometric handscanners are so cool! They look like something from a movie! High tech! Perhaps some security measures have a different purpose -- as you say, LOOKS great (emphasis added). Eddy -- Brotsman Dreger, Inc. - EverQuick Internet Division Bandwidth, consulting, e-commerce, hosting, and network building Phone: +1 (785) 865-5885 Lawrence and [inter]national Phone: +1 (316) 794-8922 Wichita _ DO NOT send mail to the following addresses : [EMAIL PROTECTED] -or- [EMAIL PROTECTED] -or- [EMAIL PROTECTED] Sending mail to spambait addresses is a great way to get blocked.
Re: Backbone Infrastructure and Secrecy
E.B. Dreger wrote: Perhaps some security measures have a different purpose -- as you say, LOOKS great (emphasis added). Just like 99% of all recent airport security measures... reassure the sheep, then they might stop bleating and march to order instead. Baauy McDonalds, Bauy Gas, Bauy SUV. This is OT. Obviously. Peter
Re: it's 1918 in bologna
note the 37. address. cute, eh? and i thought omphaloskepsis was greek! Someone is going to have fun when tat part of 37/8 gets assigned and used. as the us military is blocking overseas access to more and more address space, i guess non-american isps can use that space with impunity. randy
Student dissertation or company press releases
A gradute student writes a dissertation, and people are talking about locking it up before they leave the building. On the other hand, government contractors are issuing press releases about Internet web portals connecting emergency first responders in the Washington DC area. While some people think any information sharing is potentially dangerous, I'm pleased to see both Sean Gorman's dissertation and the Pentagon Force Protection Agency cybercop multi-agency web portal. ARLINGTON, Va., July 10 /PRNewswire/ -- The Pentagon Force Protection Agency (PFPA), established by the Department of Defense after the attack on the Pentagon on September 11, 2001, coordinates security for the Pentagon and DoD interests and disseminates threat prevention, education and preparedness information within the Region. To assist in managing sensitive information among the many groups protecting the Pentagon, PFPA has deployed a secure, Internet based portal operated by The ESP Group, LLC. The portal provides secure collaboration support for sensitive but unclassified information including secure messaging, file sharing, threaded discussions, task tracking, calendar / scheduling, meeting coordination, security alerts and private web pages. The PFPA Cybercop Portal links together law enforcement, first responders, military and homeland security related officials in the National Capital Region. The Cybercop Portal bridges the system stovepipes at participating agencies by providing a separate means to collaborate using the security controls necessary to handle sensitive but unclassified law enforcement information. Users can access the portal from any web browser that supports high encryption. They share information on a wide range of Pentagon related issues including terrorism issues, protests and suspicious activity in the area, or area traffic flow and parking problems. The ESP Group, LLC is a secure applications service provider that specializes in operating highly secure collaboration systems for a variety of Government and commercial clients. It has been selected for numerous Homeland Security projects including support of the Office for Domestic Preparedness during the nationally recognized TOPOFF 2 exercise; providing secure collaboration for the Department of Homeland Security's Senior Advisory Committees; participation in the Domestic Emergency Response Information Service, funded by the Office of the Secretary of Defense; as well as providing a Cybercop Portal for 4000+ law enforcement and first responders from all 50 states and 18 countries. The portals are provided on a turn-key basis which includes hosting, monitoring, customization, training and a full-service help desk. The ESP Group, LLC also employs a highly skilled software development team that specializes in building customized applications to client specifications.