Re: 'Call Before You Dig' Article
Roy [EMAIL PROTECTED] writes: This issue went national in March 2005 with the addition of a new N11 number for One Call notification. http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-257293A1.pdf The new abbreviated number will be 811 and it looks like carriers are required to implement by April 2007--since it's been in the Federal Register for about a month now. http://www.access.gpo.gov/su_docs/fedreg/a050413c.html But is it applicable to VOIP carriers? Call-Before-You-Dig is not applicable to users of dig(1). Not being facilities-based, I don't believe VoIP carriers will be required to be participating utilities in One Call. Seriously, though, I can't imagine why VoIP providers would resist being involved in three-digit One Call programs any more than they resist implementing 611 or 411 calling. Sending to the CBUD service that serves the billling address of the VoIP phone should be close enough for government work and the liability issues involving misdirected e911 access and the need for super accurate physical location information (both existing because human lives are acutely at risk) simply aren't there in this application. Stated another way, if it were acceptable to shuffle an e911 caller around to four different agencies before they found the right one, require them to give the address where they were physically located manually, and then it was OK to take up to 48 hours to arrive, nobody would be resisting implementing e911 either. :) ---Rob
Re: 'Call Before You Dig' Article
Robert E.Seastrom wrote: Roy [EMAIL PROTECTED] writes: But is it applicable to VOIP carriers? Call-Before-You-Dig is not applicable to users of dig(1). Not being facilities-based, I don't believe VoIP carriers will be required to be participating utilities in One Call. Nahhh, just implement VoIP N11 services as anycast :-) Jeff
Reminder: PGP Key Signing at NANOG 34
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 People who plan to participate in key signing parties tomorrow should ideally submit their keys today some time. I'll be taking Monday's keyring snapshot (for the purposes of the paper fingerprint sheets) tomorrow morning. http://www.biglumber.com/x/web?keyring=2230 Tomorrow's parties will take place at: ~1045 (morning coffee break) ~1315 (end of lunch) ~1515 (afternoon coffee break) Feel very free to turn up early; you can usefully spend the time before the hexadecimal looking at photo id and introducing yourself to other PGP key signers. Begin forwarded message: From: Joe Abley [EMAIL PROTECTED] Date: 13 May 2005 11:25:56 EDT To: [EMAIL PROTECTED] Subject: PGP Key Signing at NANOG 34 In Seattle, we are going to try to replace the single/long/tedious PGP key-signing event on Monday evening (which invariably clashes with the NSP-SEC BOF, or with dinner, or with sleep, or with accidental loss of sobriety) with a series of small key-signing parties, held in the last 10-15 minutes of every break on Monday and Tuesday. The thinking behind this will be described in a brief presentation on Monday morning. More details can be found here: http://www.nanog.org/pgp.abley.html Briefly, if you would like to participate: 1. Paste your public key into the convenient form at http://www.biglumber.com/x/web?keyring=2230, and 2. Visit the terminal room during one of the meeting breaks, armed with a pen, photo ID and a trusted copy of your PGP key fingerprint. I'll be printing out one set of fingerprint sheets per day, so make sure your key is submitted the day before the key signing party you plan to attend. If you don't know much about PGP, and you'd like to participate, try to plan to attend a key signing party on Monday in order to get a feel for what is going on -- it should then be straightforward to hook up with someone who can help you install/configure PGP software, and you can then plan to attend one of the key-signing parties the following day. I will attend all the parties, and will sign every key I can verify, and will hence act as a trust-bridge between individual key signing parties. It would be excellent if one or two other people who have enthusiasm for useful PGP deployment could find the time to do the same. Drop me a note off-list if you're interested in helping out. Joe -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.1 (Darwin) iD8DBQFCh2y1/f+PWOTbRPIRAh5pAKDI0o1+FBQiuaSI6KPrPeH07KioVgCcCyaf A4YQq4REO+h6JIKD3TvS/dI= =NpmR -END PGP SIGNATURE-
[OT] Re: what will all you who work for private isp's be doing in a few years?
At 1:48 PM -0700 5/12/05, David Barak wrote: --- Matthew Crocker [EMAIL PROTECTED] wrote: On May 12, 2005, at 4:23 PM, Jeff Rosowski wrote: | So imagine a residential area all pulling digital video over wireless. | Sound familiar? Ironically close to TV! (yet so different) You mean like VoIP over dsl ? I'm looking to setup DSL over VoIP over DSL next. smirk I'm going for v.90 over VoIP over DSL. Hopefully I'll be able to get a 28.8k connection over my DSL line ;) One of the vendors from a previous NANOG (IIRC, it was Pluris, but don't quote me) had a shirt extolling the benefits of IP over MPLS over ATM over X.25 over Frame-Relay over MPLS over PPP over Ethernet over HDLC over SONET. everything old is new again :) What happened to the LLC/SNAP?
Re: NANOG 34 Streaming efforts...
On Fri, 13 May 2005, Susan Harris wrote: Thanks Joel. Actually we'll begin broadcasting at 7:30 p.m. Sunday, with the community meeting. The meetings on Tuesday afternoon and evening will also be webcast. There's more about the 'NANOG evolution' meetings here: http://www.nanog.org/evolution.html Since everything is already in place... The mp3 audio stream will also be avaiable during this meeting. from: http://videolab.uoregon.edu/events/nanog/nanog_34.html -- -- Joel Jaeggli Unix Consulting [EMAIL PROTECTED] GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2
Re: [OT] Re: what will all you who work for private isp's be doing in a few years?
On Sun, 15 May 2005 14:15:54 EDT, Howard C. Berkowitz said: At 1:48 PM -0700 5/12/05, David Barak wrote: One of the vendors from a previous NANOG (IIRC, it was Pluris, but don't quote me) had a shirt extolling the benefits of IP over MPLS over ATM over X.25 over Frame-Relay over MPLS over PPP over Ethernet over HDLC over SONET. everything old is new again :) What happened to the LLC/SNAP? There's a limit to how much alphabet soup you can put on one side of a T-shirt and still make it readable. ;) pgpiJGxd6n08j.pgp Description: PGP signature
IPSEC?
Title: Message Is there IPSec setup in for Nanog34 @ Seattle Westin? I can't connect to the L2TP VPN servervia the instructions on the NANOG site. . . . Jay Stewart -- In lounge watching Sonics and sipping a cold one. Zhonka Broadband
NANOG 34 - Found
Found: in BGP Analysis Tools BOF, an IBM power supply. NANOG Registration Desk
Re: Malicious DNS request?
Tunneling IP over DNS - Dan Kaminsky's ozymandns project. One source of really strange DNS packets I've seen is Dan Kaminsky's experiments with tunneling IP over DNS , which he presented at Codecon, Defcon, and other places. Dan has often done Really Twisted Things With Packets, and once you've already tunneled IP though HTTP, it's time to do something a bit more aggressive. His first implementations were relatively straightforward, good enough for using SSH and email from the DNS servers on random wireless access points without needing to log in, but they weren't really high performance. The work he demonstrated at Codecon 2005 was able to do high-performance streaming video over DNS, which required spreading the data stream over tens of thousands of DNS servers. It was quite impressive, in a this-is-seriously-wrong kind of way. Perhaps somebody's running something like that somewhere near you.