Re: Cisco 7200 + NPE-G1 / 7301

2005-11-18 Thread Robert E . Seastrom


"Ben Butler" <[EMAIL PROTECTED]> writes:

> Anyone got any comments about how good or otherwise the Cisco 7200 +
> NPE-G1 or 7301, both with 1GB of RAM, is as a eBGP router + L2TP
> terminator for DSL subs, in terms of scalability for bandwidth through
> put & the number of VPDN sessions it can terminate before it dies.  Are
> the two solutions effectively the same box or are there more technical
> differences beyond the obvious number of slots.

Well, the number of vpdn sessions that you can put on a VXR or a 7301
is going to have a lot more to do with your average customer's
bandwidth use profile (ie, pps) than anything else.

Right now, I'm looking at a 7206VXR/NPE300 in the US/Eastern time zone
(so mid afternoon; all the gamer kids are home from school) that is
serving as an LNS.  1811 callers, 52.5 Mbit/sec (10.5kpps) down, 33
Mbit/sec (9600 Kpps) up.  79% CPU.  We offer an "unlimited" program,
so there are some pretty heavy users in there - the hockey stick is
pretty sharp.

We did a side by side bakeoff several months ago of the 7301 vs. the
7206VXR/NPE300, and discovered that as a rule of thumb, the Kpps/1%cpu
ratio was 3.8x as good as the VXR/NPE300.  The used market for the
7301 is practically nonexistant, and new prices are about 3.2x the
price of a used VXR loaded up with the interface complement we need.
The interfaces on the VXR are fast ethernet not gige, but then again
we weren't going to be able to saturate the faste anyway.

Anyway, the sweet spot in the price/performance curve seems to be the
7206VXR with NPE-G1, if you can shop around and get the NPE for a good
price.  Junipers are as a rule more pricey, bigger physically, and
more scaleable.  Assuming you can share the traffic around via
multiple tunnels, a farm of 7206VXRs with NPE300s offers box-level
redundancy at a reasonable price.  L2TPNS
(http://sourceforge.net/projects/l2tpns) to which I was directed some
time ago, shows promise but was lacking some critical features that we
needed, and I was left coordinating an office move rather than writing
software.  Such is life.  :(

Anyway, it turned out that in our case, having a lot of box-level
redundancy was more important than saving space, so we ended up
staying with the VXR platform even with the NPE-300.  The eval 7301
was in production use for several months and was completely
trouble-free, so I agree with Woody's assessment that these are nice
boxes.

Regardless of what your users' usage is like, you're going to have an
awfully tough time going over 2 users on one box because of the
IDB limit that Cisco imposes in their software for that platform.

---Rob



Call for Presentations - NANOG 36, Feb. 2006

2005-11-18 Thread Steve Feldman

The North American Network Operators' Group (NANOG) will hold its
36th meeting February 12-15, in Dallas, Texas. The meeting will be
hosted by Yahoo.

NANOG conferences provide a forum for information exchange among
network operators, engineers, and researchers. Meetings are held
three times each year, and include presentations, tutorial sessions,
and BOFs.

NANOG solicits presentations highlighting issues relating to
technology already deployed or soon to be deployed in the Internet.
Vendors are encouraged to work with operators to present deployment
experiences with the vendor's products and interoperability.

Suggested topics include:

* Network Operations
o Everyday life in the NOC
o Present-day operational case studies
o Exchange point technologies and implementation
o Peering/colocation coordination issues
o Content provider issues
o Security attacks/mitigation, tools, and analysis
o State of OAM tools for IP and MPLS networks 
o Network and data center redundancy
* Deployment Experience
o Alternative last-mile technologies (metro/rural, broadband,
  radio, optical, etc.)
o VoIP deployment, peering and interconnect
o Anycast
o IPTV
o Large-scale wireless
o Fiber and Wavelength use by enterprises 
* Research, Policy, and New Technology
o Approaches to securing the global routing system (e.g., s*BGP
  and/or other tools)
o Inter-provider MPLS/QoS/PCE
o RIR policy (e.g., implications of HD ratio)
o Currently active standards organizations and their topic areas
o IPv6 economics: why is deployment so slow?
o Approaches to IPv6 scalability, e.g., SHIM6 

If time permits, topics for short (10-20 minute) lightning talks
will be solicited on-site. "Technologies to Watch" topics will be
appropriate for this session.

Researchers are invited to present short (10-minute) summaries of
their work for operator feedback. Topics include routing, network
performance, statistical measurement and analysis, and protocol
development and implementation. Studies presented may be works in
progress. Researchers from academia, government, and industry are
encouraged to present.

Proposals are also invited for tutorial sessions. Previous topics
have included:

* Troubleshooting BGP
* Best Practices for Determining Traffic Matrices
* Options for Blackhole and Discard Routing
* BGP/MPLS Layer 3 VPNs 

How to Present

Submit an abstract and draft slides for the presentation in email
to [EMAIL PROTECTED] See http://www.nanog.org/presentations.html
for submission guidelines.  We are also developing an online
submission system, and hope to have it available by early December.
Check the NANOG main page (http://www.nanog.org) for updates.

The deadline for proposals is December 15, 2005. While the majority
of speaking slots will be filled by December 15, a limited number
of slots may be available after that date for topics that are
exceptionally timely, important, or critical to the operations of
the Internet. Submissions will be reviewed by the NANOG Program
Committee, and presenters will be notified of acceptance by January 2.
Final drafts of presentation slides are due by February 1, and
final versions February 8.


Steve Feldman
Chair, NANOG Program Committee


RE: Cisco 7200 + NPE-G1 / 7301

2005-11-18 Thread Bill Woodcock

> The two platforms are similar but 7301 is relatively new. Anything 
> new from cisco I recommend to avoid for at least a year.

Yeah, I'd agree with the principle here, but the 7301 has been out for 
several years, I've got a bunch of them in the field, and they're the most 
stable router I've ever used.  They're essentially just a NPE-G1 with a 
fixed hardware configuration in a 1U box.  Can't get simpler than that.

-Bill



Re: westin, the serial

2005-11-18 Thread Randy Bush

Possibly, other than cisco users have serial laptops at the westin?

randy
___
sent from a handheld, so even more terse than usual :-)


Re: westin, the serial

2005-11-18 Thread David Ulevitch



On Nov 18, 2005, at 10:11 AM, Niels Bakker wrote:



Dear Randy:

* [EMAIL PROTECTED] (Randy Bush) [Fri 18 Nov 2005, 18:40 CET]:
anyone at seattle westin have something that talks serial so i can  
deal with a freaked 2511 oob through its console?


Don't you agree that this would be more appropriate on cisco-nsp@ ?


The Westin building being in Seattle, USA, North America is the  
relevant piece of info for Randy's request.


Not that it's a freaked 2511.

-david




Best regards,


-- Niels.

--
"Calling religion a drug is an insult to drugs everywhere. Religion  
is more like the placebo of the masses."

-- MeFi user boaz




Re: westin, the serial

2005-11-18 Thread Niels Bakker


Dear Randy:

* [EMAIL PROTECTED] (Randy Bush) [Fri 18 Nov 2005, 18:40 CET]:
anyone at seattle westin have something that talks serial so 
i can deal with a freaked 2511 oob through its console?


Don't you agree that this would be more appropriate on cisco-nsp@ ?

Best regards,


-- Niels.

--
"Calling religion a drug is an insult to drugs everywhere. 
Religion is more like the placebo of the masses."

-- MeFi user boaz


Weekly Routing Table Report

2005-11-18 Thread Routing Table Analysis

This is an automated weekly mailing describing the state of the Internet
Routing Table as seen from APNIC's router in Japan.
Daily listings are sent to [EMAIL PROTECTED]

If you have any comments please contact Philip Smith <[EMAIL PROTECTED]>.

Routing Table Report   04:00 +10GMT Sat 19 Nov, 2005

Analysis Summary


BGP routing table entries examined:  175261
Prefixes after maximum aggregation:   98860
Unique aggregates announced to Internet:  84806
Total ASes present in the Internet Routing Table: 20928
Origin-only ASes present in the Internet Routing Table:   18220
Origin ASes announcing only one prefix:8614
Transit ASes present in the Internet Routing Table:2708
Transit-only ASes present in the Internet Routing Table: 74
Average AS path length visible in the Internet Routing Table:   4.5
Max AS path length visible:  21
Prefixes from unregistered ASNs in the Routing Table: 2
Special use prefixes present in the Routing Table:0
Prefixes being announced from unallocated address space: 12
Number of addresses announced to Internet:   1462078080
Equivalent to 87 /8s, 37 /16s and 138 /24s
Percentage of available address space announced:   39.4
Percentage of allocated address space announced:   59.4
Percentage of available address space allocated:   66.4
Total number of prefixes smaller than registry allocations:   84115

APNIC Region Analysis Summary
-

Prefixes being announced by APNIC Region ASes:36623
Total APNIC prefixes after maximum aggregation:   15833
Prefixes being announced from the APNIC address blocks:   34396
Unique aggregates announced from the APNIC address blocks:16829
APNIC Region origin ASes present in the Internet Routing Table:2404
APNIC Region origin ASes announcing only one prefix:699
APNIC Region transit ASes present in the Internet Routing Table:366
Average APNIC Region AS path length visible:4.4
Max APNIC Region AS path length visible: 17
Number of APNIC addresses announced to Internet:  206407616
Equivalent to 12 /8s, 77 /16s and 135 /24s
Percentage of available APNIC address space announced: 76.6

APNIC AS Blocks4608-4864, 7467-7722, 9216-10239, 17408-18431
(pre-ERX allocations)  23552-24575, 37888-38911
APNIC Address Blocks   58/7, 60/7, 124/7, 126/8, 202/7, 210/7, 218/7,
   220/7 and 222/8

ARIN Region Analysis Summary


Prefixes being announced by ARIN Region ASes: 92846
Total ARIN prefixes after maximum aggregation:55846
Prefixes being announced from the ARIN address blocks:72314
Unique aggregates announced from the ARIN address blocks: 27466
ARIN Region origin ASes present in the Internet Routing Table:10355
ARIN Region origin ASes announcing only one prefix:3835
ARIN Region transit ASes present in the Internet Routing Table: 968
Average ARIN Region AS path length visible: 4.3
Max ARIN Region AS path length visible:  17
Number of ARIN addresses announced to Internet:   276171520
Equivalent to 16 /8s, 118 /16s and 11 /24s
Percentage of available ARIN address space announced:  68.6

ARIN AS Blocks 1-1876, 1902-2042, 2044-2046, 2048-2106
(pre-ERX allocations)  2138-2584, 2615-2772, 2823-2829, 2880-3153
   3354-4607, 4865-5119, 5632-6655, 6912-7466
   7723-8191, 10240-12287, 13312-15359, 16384-17407
   18432-20479, 21504-23551, 25600-26591,
   26624-27647, 29696-30719, 31744-33791
   35840-36863
ARIN Address Blocks24/8, 63/8, 64/6, 68/7, 70/6, 74/7, 76/8,
   198/7, 204/6, 208/7 and 216/8

RIPE Region Analysis Summary


Prefixes being announced by RIPE Region ASes: 34088
Total RIPE prefixes after maximum aggregation:23049
Prefixes being announced from the RIPE address blocks:31082
Unique aggregates announced from the RIPE address blocks: 20835
RIPE Region origin ASes present in the Internet Routing Table: 7304
RIPE Region origin ASes announcing only one prefix:3827
RIPE Region transit ASes present in the Internet Routing Table:1194
Average RIPE Region AS path length visible: 5.0
Max RIPE Region AS path length visible:  20
Number of RIPE addresses announced to Int

RE: Cisco 7200 + NPE-G1 / 7301

2005-11-18 Thread Joel Jaeggli


On Fri, 18 Nov 2005, Neil J. McRae wrote:



I'd stick with what you know unless you plan to terminate hundreds
of thousands of things in which case cisco isn't a great choice. They
two platforms are similar but 7301 is relatively new. Anything new from
cisco
I recommend to avoid for atleast a year so that you aren't an alpha
tester.


The npe-g1 is not exactly a new product, it was introduced in early 2003 
if I'm not mistaken. The 7301 was introduced later that year.



-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Ben Butler
Sent: 18 November 2005 17:20
To: [EMAIL PROTECTED]
Subject: Cisco 7200 + NPE-G1 / 7301


Hi,

Anyone got any comments about how good or otherwise the Cisco 7200 +
NPE-G1 or 7301, both with 1GB of RAM, is as a eBGP router +
L2TP terminator for DSL subs, in terms of scalability for
bandwidth through put & the number of VPDN sessions it can
terminate before it dies.  Are the two solutions effectively
the same box or are there more technical differences beyond
the obvious number of slots.

Without wanting to start one of those sorts of threads is it
time to look at something else, i.e. Juniper, for cost /
performance, or should I stick with the heard and what I know
in Cisco.


Kind Regards

Ben Butler
++
C2 Internet Ltd
Globe House
The Gullet
Nantwich
Cheshire
CW5 5RL
W http://www.c2internet.net/
T +44-(0)845-658-0020
F +44-(0)845-658-0070

All quotes & services from C2 are bound by our standard terms
and conditions which are available on our website at:

http://www.c2internet.net/legal/main.htm#tandc



--
No virus found in this incoming message.
Checked by AVG Free Edition.
Version: 7.1.362 / Virus Database: 267.13.3/174 - Release
Date: 17/11/2005







--
--
Joel Jaeggli   Unix Consulting [EMAIL PROTECTED]
GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2



RE: Cisco 7200 + NPE-G1 / 7301

2005-11-18 Thread Neil J. McRae

> Anything new from cisco I recommend to avoid 
> for atleast a year so that you aren't an alpha tester. 

Or any vendor actually :-)

Neil.

-- 
No virus found in this outgoing message.
Checked by AVG Free Edition.
Version: 7.1.362 / Virus Database: 267.13.3/174 - Release Date: 17/11/2005
 



RE: Cisco 7200 + NPE-G1 / 7301

2005-11-18 Thread Neil J. McRae

I'd stick with what you know unless you plan to terminate hundreds
of thousands of things in which case cisco isn't a great choice. They
two platforms are similar but 7301 is relatively new. Anything new from
cisco
I recommend to avoid for atleast a year so that you aren't an alpha
tester. 

> -Original Message-
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On 
> Behalf Of Ben Butler
> Sent: 18 November 2005 17:20
> To: [EMAIL PROTECTED]
> Subject: Cisco 7200 + NPE-G1 / 7301
> 
> 
> Hi,
> 
> Anyone got any comments about how good or otherwise the Cisco 7200 +
> NPE-G1 or 7301, both with 1GB of RAM, is as a eBGP router + 
> L2TP terminator for DSL subs, in terms of scalability for 
> bandwidth through put & the number of VPDN sessions it can 
> terminate before it dies.  Are the two solutions effectively 
> the same box or are there more technical differences beyond 
> the obvious number of slots.
> 
> Without wanting to start one of those sorts of threads is it 
> time to look at something else, i.e. Juniper, for cost / 
> performance, or should I stick with the heard and what I know 
> in Cisco.
> 
> 
> Kind Regards
> 
> Ben Butler
> ++
> C2 Internet Ltd
> Globe House
> The Gullet
> Nantwich
> Cheshire
> CW5 5RL
> W http://www.c2internet.net/
> T +44-(0)845-658-0020
> F +44-(0)845-658-0070
> 
> All quotes & services from C2 are bound by our standard terms 
> and conditions which are available on our website at:
> 
> http://www.c2internet.net/legal/main.htm#tandc
> 
>  
> 
> --
> No virus found in this incoming message.
> Checked by AVG Free Edition.
> Version: 7.1.362 / Virus Database: 267.13.3/174 - Release 
> Date: 17/11/2005
>  
> 

-- 
No virus found in this outgoing message.
Checked by AVG Free Edition.
Version: 7.1.362 / Virus Database: 267.13.3/174 - Release Date: 17/11/2005
 



westin, the serial

2005-11-18 Thread Randy Bush

anyone at seattle westin have something that talks serial so
i can deal with a freaked 2511 oob through its console?

randy



Cisco 7200 + NPE-G1 / 7301

2005-11-18 Thread Ben Butler

Hi,

Anyone got any comments about how good or otherwise the Cisco 7200 +
NPE-G1 or 7301, both with 1GB of RAM, is as a eBGP router + L2TP
terminator for DSL subs, in terms of scalability for bandwidth through
put & the number of VPDN sessions it can terminate before it dies.  Are
the two solutions effectively the same box or are there more technical
differences beyond the obvious number of slots.

Without wanting to start one of those sorts of threads is it time to
look at something else, i.e. Juniper, for cost / performance, or should
I stick with the heard and what I know in Cisco.


Kind Regards

Ben Butler
++
C2 Internet Ltd
Globe House
The Gullet
Nantwich
Cheshire
CW5 5RL
W http://www.c2internet.net/
T +44-(0)845-658-0020
F +44-(0)845-658-0070

All quotes & services from C2 are bound by our standard terms and
conditions which are available on our website at:

http://www.c2internet.net/legal/main.htm#tandc

 


Re: [Latest draft of Internet regulation bill]

2005-11-18 Thread Todd Vierling

On Thu, 17 Nov 2005, Stephen Sprunk wrote:

> I'm curious what would happen if an ISP tried blocking P2P apps under that
> section, however.  Sure, a lot of it's illegal, but not all of it.  Could
> "gross overuse of bandwidth" be considered a threat to the network's
> reliability, or would the statement of minimum capacity required in Sec
> 104(b)(1)(A) mean the ISP can't complain about how the customer uses their
> bandwidth?  The courts will have fun with that one.

Cable providers in particular will have a very big problem with that
interpretation.  While the asymmetry of cable downstream/upstream traffic
levels is good (insofar that the structure of radio channels more or less
requires it), cable providers have been massively overbooking their
downstream bandwidth lately.

$CableVendor in my market now pushes its "6Mb/s" service quite hard in
advertising.  I have written proof in hand from its "Abuse Department" that
it will not honor its downstream rate for any sustained amount of time --
though none of its ToU, AUP, nor this document states what its criteria are
for service interruption under this guise.  Funny, that:  $CableVendor is
deaf to spam and DDoS complaints, but it certainly sits up and listens
closely when someone has a reason to make use of its consumer offering at
full capacity.  (And I got this letter at a time when $CableVendor's maximum
downstream rate was a mere 1.5Mb/s.)

In any case, the letter I received would make an interesting litmus test to
your theory about guaranteed service speeds.

> Preempting state prohibitions on public carriers is interesting -- hopefully
> we'll see a lot of those emerge in states (like mine) that currently ban them.

This sort of preemption is becoming somewhat commonplace and is an attempt
by legislators to pacify telecom operators doing local business in multiple
states (as otherwise the Constitution's Amendment 10 would relegate near
total power back to the states -- where it should be IMHO ;).

There was a similar clause in [YOU-]CAN-SPAM, because the DMA wanted it.
But then, the DMA got a lot of wishes granted in that piece-of-cr^Wlaw.

-- 
-- Todd Vierling <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> <[EMAIL PROTECTED]>


Re: a record?

2005-11-18 Thread Eric Rescorla

Matthew Sullivan <[EMAIL PROTECTED]> writes:

> John Levine wrote:
>
Moving sshd from port 22 to port 137, 138 or 139. Nasty eh?

>>>don't do that! Lots of (access) isps around the world (esp here in
>>>Europe) block those ports
>>>
>>
>>If you're going to move sshd somewhere else, port 443 is a fine
>>choice.  Rarely blocked, rarely probed by ssh kiddies.  It's probed
>>all the time by malicious web spiders, but since you're not a web
>>server, you don't care.
>>
>
> Except if you're running a version of OpenSSL that has a
> vulnerability, you could be inviting trouble - particularly with
> kiddies scanning for Apache with vulnerable versions of OpenSSL
> attached by way of mod_ssl etc...

It's worth noting that while OpenSSH uses OpenSSL for crypto, most of
the recent vulnerabilities in OpenSSL do not extend to OpenSSH,
because they're in the SSL state machine, not the crypto.

-Ekr


SMS etc

2005-11-18 Thread Jim McBurnett

Hello all,
I apologize if this is deemed off topic, but I think there is enough
content to warrant the question.
Some time ago there was a lively discussion about SMS paging and the
providers for that in relation to emergency operations NMS paging etc.

Who can point me in the direction of the still serving providers and
maybe give some color commentary on the SMS to SMTP or other paging
methods many of you use to provide the paging of engineers?

Please reply off list and if there is any interest I will summerize back
to the list.

Thanks,
Jim


The Cidr Report

2005-11-18 Thread cidr-report

This report has been generated at Fri Nov 18 21:46:21 2005 AEST.
The report analyses the BGP Routing Table of an AS4637 (Reach) router
and generates a report on aggregation potential within the table.

Check http://www.cidr-report.org/as4637 for a current version of this report.

Recent Table History
Date  PrefixesCIDR Agg
11-11-05175515  114822
12-11-05172203  114836
13-11-05172290  114870
14-11-05172345  114990
15-11-05172408  114745
16-11-05172231  114790
17-11-05172458  114872
18-11-05172374  115063


AS Summary
 20851  Number of ASes in routing system
  8654  Number of ASes announcing only one prefix
  1464  Largest number of prefixes announced by an AS
AS7018 : ATT-INTERNET4 - AT&T WorldNet Services
  91322624  Largest address span announced by an AS (/32s)
AS721  : DLA-ASNBLOCK-AS - DoD Network Information Center


Aggregation Summary
The algorithm used in this report proposes aggregation only
when there is a precise match using the AS path, so as 
to preserve traffic transit policies. Aggregation is also
proposed across non-advertised address space ('holes').

 --- 18Nov05 ---
ASnumNetsNow NetsAggr  NetGain   % Gain   Description

Table 172494   1149955749933.3%   All ASes

AS4323  1187  236  95180.1%   TWTC - Time Warner Telecom
AS18566  877   11  86698.7%   COVAD - Covad Communications
AS721   1071  313  75870.8%   DLA-ASNBLOCK-AS - DoD Network
   Information Center
AS4134  1021  275  74673.1%   CHINANET-BACKBONE
   No.31,Jin-rong Street
AS22773  557   26  53195.3%   CCINET-2 - Cox Communications
   Inc.
AS7018  1464  954  51034.8%   ATT-INTERNET4 - AT&T WorldNet
   Services
AS19916  563   65  49888.5%   ASTRUM-0001 - OLM LLC
AS855558   65  49388.4%   CANET-ASN-4 - Canadian
   Research Network
AS3602   542  104  43880.8%   SPRINT-CA-AS - Sprint Canada
   Inc.
AS6197   960  561  39941.6%   BATI-ATL - BellSouth Network
   Solutions, Inc
AS17676  470  101  36978.5%   JPNIC-JP-ASN-BLOCK Japan
   Network Information Center
AS11492  604  249  35558.8%   CABLEONE - CABLE ONE
AS812367   30  33791.8%   ROGERS-CABLE - Rogers Cable
   Inc.
AS6467   389   56  33385.6%   ESPIRECOMM - e.spire
   Communications, Inc.
AS4755   607  275  33254.7%   VSNL-AS Videsh Sanchar Nigam
   Ltd. Autonomous System
AS4766   610  287  32353.0%   KIXS-AS-KR Korea Telecom
AS15270  338   25  31392.6%   AS-PAETEC-NET - PaeTec.net -a
   division of
   PaeTecCommunications, Inc.
AS9583   827  520  30737.1%   SIFY-AS-IN Sify Limited
AS14654  2926  28697.9%   WAYPORT - Wayport
AS17488  366   83  28377.3%   HATHWAY-NET-AP Hathway IP Over
   Cable Internet
AS9498   395  117  27870.4%   BBIL-AP BHARTI BT INTERNET
   LTD.
AS5668   476  211  26555.7%   AS-5668 - CenturyTel Internet
   Holdings, Inc.
AS9929   315   53  26283.2%   CNCNET-CN China Netcom Corp.
AS6167   324   63  26180.6%   CELLCO-PART - Cellco
   Partnership
AS1239   845  600  24529.0%   SPRINTLINK - Sprint
AS18101  268   23  24591.4%   RIL-IDC Reliance Infocom Ltd
   Internet Data Centre,
AS2386   926  694  23225.1%   INS-AS - AT&T Data
   Communications Services
AS6140   423  192  23154.6%   IMPSAT-USA - ImpSat
AS19115  258   27  23189.5%   CHARTER-LEBANON - Charter
   Communications
AS16852  278   50  22882.0%   FOCAL-CHICAGO - Focal Data
   Communications of Illinois

Total  18178 62721190665.5%   Top 30 total


Possible Bogus Routes

24.246.0

Re: a record?

2005-11-18 Thread Matthew Sullivan


John Levine wrote:


Moving sshd from port 22 to port 137, 138 or 139. Nasty eh?
 


don't do that! Lots of (access) isps around the world (esp here in
Europe) block those ports
   



If you're going to move sshd somewhere else, port 443 is a fine
choice.  Rarely blocked, rarely probed by ssh kiddies.  It's probed
all the time by malicious web spiders, but since you're not a web
server, you don't care.
 



Except if you're running a version of OpenSSL that has a vulnerability, 
you could be inviting trouble - particularly with kiddies scanning for 
Apache with vulnerable versions of OpenSSL attached by way of mod_ssl etc...


Regards,

Mat