Re: Have Yahoo! gone pink?
On Wed, 29 Mar 2006 [EMAIL PROTECTED] wrote: Received: from EXCHG01-DUB.Europe.Search.Corpsys.P4pnet.net (cluster01-dub.europe.search.corpsys.p4pnet.net [172.30.132.19]) by mrout3.yahoo.com (8.13.4/8.13.4/y.out) with ESMTP id k2FIupeH049008; Wed, 15 Mar 2006 10:56:52 -0800 (PST) Hey, what do you know... if you trust both uksolutions.net and yahoo.com's Received: lines, it didn't originate at Yahoo - it came from p4pnet.net. ;) (A fine demonstration of the difference between being truthful and being helpful :) Only problem with that is 172.30.132.19 is part of NetRange: 172.16.0.0 - 172.31.255.255 CIDR: 172.16.0.0/12 NetName:IANA-BBLK-RESERVED So even if you did trust that Received line, it still had to come from inside yahoo.com (unless someone briefly announced some of 172.16.0.0/12 and yahoo both accepted the route and relayed for it). AFAIK, from other lists, Yahoo is aware of this screwup (disclaiming responsibility for 216.145.48.0/20) and is working on it. -- Jon Lewis | I route Senior Network Engineer | therefore you are Atlantic Net| _ http://www.lewis.org/~jlewis/pgp for PGP public key_
Re: Backbone Monitoring Tools
Wouldn't you be better served just walking the netToMedia tables for your devices? Parsing configs sucks. Even caching the contents of a simple snmpwalk would save you some pain. Shovel 'em into a db and call it a day. - billn On Wed, 29 Mar 2006, Ashe Canvar wrote: Well, True. But the idea is to have a full mesh of 'n' sensors each doing 'tests' to the remaining n-1 sensors. Finding asymmetric routes should be trivial as I plan to feed it my router configs from rancid, for detecting interfaces that belong to the same router. ( Of course, this can't be extended to the Internet in genral. ) From all the replies I have received, I don't think anything open source fits the bill. Going to the mines to write my own. Good bye cruel world... On 3/29/06, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote: On Tue, 28 Mar 2006 16:07:27 PST, Ashe Canvar said: 2. actively detect routing changes / failover to redundant paths using traceroutes i.e. alert if SFO->CHG->NYC changes to SFO->LXE->HOU->NYC ( link state protocols suck as far as testing backup paths go) Two words: "Asymmetric routes". Just be aware of the implications.
Re: Have Yahoo! gone pink?
On Wed, 29 Mar 2006 21:28:26 GMT, Peter Corlett said: > Yahoo claim "After investigation, we have determined that this email message > did not originate from the Yahoo! Mail system. Received: from EXCHG01-DUB.Europe.Search.Corpsys.P4pnet.net (cluster01-dub.europe.search.corpsys.p4pnet.net [172.30.132.19]) by mrout3.yahoo.com (8.13.4/8.13.4/y.out) with ESMTP id k2FIupeH049008; Wed, 15 Mar 2006 10:56:52 -0800 (PST) Hey, what do you know... if you trust both uksolutions.net and yahoo.com's Received: lines, it didn't originate at Yahoo - it came from p4pnet.net. ;) (A fine demonstration of the difference between being truthful and being helpful :) pgpfvwHKd2FXu.pgp Description: PGP signature
Re: Have Yahoo! gone pink?
On Wed, 29 Mar 2006, Peter Corlett wrote: Yahoo claim "After investigation, we have determined that this email message did not originate from the Yahoo! Mail system. It appears that the sender of this message forged the header information to give the impression that it came from the Yahoo! Mail system." It seems yahoo has fallen to the hotmail syndrome. -Dan
Re: Backbone Monitoring Tools
Well, True. But the idea is to have a full mesh of 'n' sensors each doing 'tests' to the remaining n-1 sensors. Finding asymmetric routes should be trivial as I plan to feed it my router configs from rancid, for detecting interfaces that belong to the same router. ( Of course, this can't be extended to the Internet in genral. ) >From all the replies I have received, I don't think anything open source fits the bill. Going to the mines to write my own. Good bye cruel world... On 3/29/06, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote: > On Tue, 28 Mar 2006 16:07:27 PST, Ashe Canvar said: > > > 2. actively detect routing changes / failover to redundant paths > > using traceroutes > > i.e. alert if SFO->CHG->NYC changes to SFO->LXE->HOU->NYC > > ( link state protocols suck as far as testing backup paths go) > > Two words: "Asymmetric routes". Just be aware of the implications. > > >
Have Yahoo! gone pink?
[I'm wearing my personal hat here.] I'm getting a *flood* of spam coming in from Yahoo! mailservers, both to my personal and work addresses. It seems that Yahoo! don't care. Here's the response to me piping a sample one through Spamcop: http://abuse.mooli.org.uk/yahoospam Yahoo claim "After investigation, we have determined that this email message did not originate from the Yahoo! Mail system. It appears that the sender of this message forged the header information to give the impression that it came from the Yahoo! Mail system." The spam headers claim otherwise: Received: from mrout3.yahoo.com ([216.145.54.173]) by relay-1.mail.uksolutions.net with esmtp (Exim 4.50) id 1FJbCW-0002Ag-IV for [EMAIL PROTECTED]; Wed, 15 Mar 2006 18:58:29 + As does DNS and whois: [EMAIL PROTECTED]:~$ host 216.145.54.173 173.54.145.216.in-addr.arpa domain name pointer mrout3.yahoo.com. [EMAIL PROTECTED]:~$ host mrout3.yahoo.com mrout3.yahoo.com has address 216.145.54.173 [EMAIL PROTECTED]:~$ whois 216.145.54.173 OrgName:Yahoo! Inc. OrgID: YAHOOI-2 Address:701 First Avenue City: Sunnyvale StateProv: CA PostalCode: 94089 Country:US [etc] Doing double-DNS lookups of the IP addresses on other spams also give yahoo.com hostnames, and they're typically in DNSBLs for being sources of spam and a useless abuse address. So, which IP blocks shall I null-route then? Or is there anybody here from Yahoo! with a clue? (OK, you can all stop laughing now.) -- PGP key ID E85DC776 - finger [EMAIL PROTECTED] for full key
Re: Mutual Redistribution
On Wed, 29 Mar 2006 06:33:08 -0500 Joe Maimon <[EMAIL PROTECTED]> wrote: > > > Mark Smith wrote: > > On Tue, 28 Mar 2006 16:37:48 -0500 > > > > > > Did it happen to be RIPv1 ? Only RIPv2 supports route tags. > > > Of course it was rip2 > > Rip1 is dead. Anyone using it should be shot. I don't know. If it solves the problem well enough, and you don't have any better alternatives, I think using it would be fine. -- "Sheep are slow and tasty, and therefore must remain constantly alert." - Bruce Schneier, "Beyond Fear"
Re: Yahoo-hosted phishing sites
:: > [EMAIL PROTECTED] has been fairly responsive lately. [EMAIL PROTECTED] is where all Yahoo related abuse issues should go to (and it will be read and acted upon). If you submit phishing reports through phishing related channels (ie http://www.castlecops.com/pirt) they might be acted upon faster (some trusted sources have an "express" escalation path). If abuse@ isn't working, please let me know, and I can see about geting it escalated. Thanks, -igor (this time speaking for my employer, Yahoo!)
Re: Abovenet vs UUnet
Even if you decide you don't need to use a formal RFP process to make your purchasing decision from the dozens of Tier 1, Tier 2, and Tier 3 ISPs that can handle your locations, you might want to do a draft of an RFP to identify what requirements are important to you and what requirements are less important. That's especially true when you're talking about latency - latency from where to where, at what bandwidths? Some carriers publish "average" latencies, using statistical methods with dubious assumptions designed to make them look good (:-) (My employer's dubious numbers are about 10ms better than some other carriers' dubious numbers, but of course I'm not speaking for them and a lot of the difference is geographical concentration), but for the most part the dominant factors in latency are average distance (speed of light in fiber is about 1ms per 100 miles) and insertion delay on smaller access lines (1500 byte packet takes about 8ms on a T1 - insertion delay is negligible for T3 and above.) If there's a specific destination you're trying to get to, then sometimes peering locations make a difference - if you're in Denver trying to connect to another Denver location on some third-party DSL, are you going through a peering point in San Francisco or Seattle or Singapore? If you're crossing an ocean, does the carrier you're looking at route traffic across the North Pacific or the South Pacific or both? Or are you really more concerned about having an abuse desk that works, or about access line diversity, or is price 90% of the decision criteria, or are you trying to take advantage of different carriers' peering patterns, etc.?
Re: Backbone Monitoring Tools
On Tue, 28 Mar 2006 16:07:27 PST, Ashe Canvar said: > 2. actively detect routing changes / failover to redundant paths > using traceroutes > i.e. alert if SFO->CHG->NYC changes to SFO->LXE->HOU->NYC > ( link state protocols suck as far as testing backup paths go) Two words: "Asymmetric routes". Just be aware of the implications. pgpJjIr83qC1C.pgp Description: PGP signature
RE: Security control in DSL access network
On Tue, 28 Mar 2006, Mikael Abrahamsson wrote: >Let me counter with: >ROUTER - ip/ethernet - DSLAM - ip/ethernet/atm/dsl - CPE - ip/ethernet - COMPUTER >In some cases a modern dslam will do routing as well. ATM was close to death before DSL came along, please don't CPR it anymore. Let it R.I.P. Growth of POS != Death of ATM While major hardware vendors continue to crank out hardware and software support, and while large deployments continue, it might not be fair to assume it resting in peace or pieces..
Re: Backbone Monitoring Tools
Snmpstat was esigned for ISP in Russia, and is used actively by a few ISP. I modified it for enterprise here in USA and use for entyerprise monitoring as well. It if _fixed parameter system_ so it imonitors just routeres/switches/firewalls for a limited set of parameters (interfaes and ports) but do it very well and have very useful compactt view, tickets, sopund alerts for opertators, etc. It uses simple config file which can be easily generated or can be modified by the web. I use it (Poll.conf file) as a primary documentation (saving it into CVS on each change). We are using snmpstat in combination with cricket or mtg (which monitors parameters not covered by snmpstat), and combine it with CCR - cisco configuration repository (track cisco config changes), ProBIND2 (control all DNS'es around), acid (snort viewer), inventory database (shows hardware in the racks), alert aliasing system (just set of aliases + archive for alerts, warnings and so on), osiris (control server's changes), and few other tools (you can see short description on the snmpstat page). It is not (yes; I have it in TODO but did not had demand so it was not completed) packed as 'rpm' or well auto-configured (but the only problem we hais usually _fix small inconsistancy in include files of embeddded snmp package), but is very fast (we monitor 1,000 - 2,000 interfaces without any visible impact on our FreeBSD servers) and relatively simple. - Original Message - From: "Jim Trocki" <[EMAIL PROTECTED]> To: "Alexei Roudnev" <[EMAIL PROTECTED]> Cc: "Ray Burkholder" <[EMAIL PROTECTED]>; "'Ashe Canvar'" <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]> Sent: Wednesday, March 29, 2006 5:09 AM Subject: Re: Backbone Monitoring Tools > On Wed, 29 Mar 2006, Alexei Roudnev wrote: > > > > > I use snmpstatd - snmpstat.sf.net . > > > > Oooh, looks nice! > > >> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of > >> Ashe Canvar > > >> 2. actively detect routing changes / failover to redundant paths using > >> traceroutes > >> i.e. alert if SFO->CHG->NYC changes to SFO->LXE->HOU->NYC > >> ( link state protocols suck as far as testing backup paths go) > > Ashe, > > I've done this using "mon" (http://www.kernel.org/software/mon/). It comes with > two traceroute monitors which remember the past paths and alert when that path > changes. In fact, one of the monitors can even detect load-balanced alternate > paths, e.g. if there are multiple possible intermediate paths during normal > operation. > > You'll want to look at the latest 1.1 release from CVS: > > http://www.kernel.org/software/mon/development.html > > >> 3. actively transfer a fixed file > >>i.e. draw a datarate grid between every datacenter and every other > >> datacenter > > In fact, I belive people have done precisely this with mon before. > Try asking on the mailing list, I'm quite sure someone will respond. > > >> I am in a buy vs. build debate with my boss ;) > > Build! I think mon gets you at least 90% to where you want to go. >
Re: Yahoo-hosted phishing sites
Fergie wrote: > > Jon, > > [EMAIL PROTECTED] has been fairly responsive lately. > > Also: http://www.castlecops.com/pirt > > - ferg Hi Fergie, I have tried to send to [EMAIL PROTECTED] -- in fact, I usually send to both that and [EMAIL PROTECTED] -- but I still get the same lame response. Been behind on reading the phishing groups maillist, so I just saw the castlecops announcement this morning. Will start to use it. Jon -- Jon R. Kibler Chief Technical Officer A.S.E.T., Inc. Charleston, SC USA (843) 849-8214 == Filtered by: TRUSTEM.COM's Email Filtering Service http://www.trustem.com/ No Spam. No Viruses. Just Good Clean Email.
Re: Backbone Monitoring Tools
D'oh!! At first I thought he was asking for backHOE monitoring tools. Around here we simply bury a short length of fiber and wait a few minutes until the backhoes sniff it out and start digging sorta like the way they use pigs to search for truffles. David Leonard ShaysNet
Re: Yahoo-hosted phishing sites
MARLON BORBA wrote: > > Did you tried the form to report "Phishing Sites on Yahoo"? > > http://add.yahoo.com/fast/help/us/domains/cgi_phishing > Yeah, tried that too. Get back a message saying that they are not yahoo servers. For example, just yesterday had a couple of phish quarantined by ClamAV that were using http://rds.yahoo.com/{whatever} as the URL. (It may have been a redirect, but there was no other URL embedded into the message -- nor was there unicode or anything similar.) The hostname rds.yahoo.com is an alias for rds.yahoo7.akadns.net, and that appears to be why yahoo's automated response disclaims it. If you try to send to [EMAIL PROTECTED], their mail server rejects it saying that the mail is an illegal relay attempt. Jon -- Jon R. Kibler Chief Technical Officer A.S.E.T., Inc. Charleston, SC USA (843) 849-8214 == Filtered by: TRUSTEM.COM's Email Filtering Service http://www.trustem.com/ No Spam. No Viruses. Just Good Clean Email.
Rack Hardware to demise sections of existing cabinets
I've been searching the net for a solution to demise cabinets on 1/4, 1/2 or 1/3 boundaries. Since I'm in a facility that provides Chatsworth M-Series cabinets, and they won't allow me to put on the 'tri-door' kit (which doesn't demise the sections anyhow), has anyone seen workable door hardware to retrofit a cabinet? I found a few security screens that mount using existing mount-holes, but, those solutions don't allow removing the units inside without removing the unit. They provide front panel access, but, if a piece of equipment needs to be removed, the entire door assembly needs to be removed. This also doesn't demise the space to separate the individual tenants. Before I have a run of these things made by a machine shop, has anyone seen such a device? Replies off-list and I'll summarize. Thanks.
ebay contact with netops clue?
anyone have a useful ebay netops contact? so far their general support mechanism has failed to produce resultsand I've still got a wiltel connected /21 that can't pull ebay websites (but yes, we can ping/mtr spoon/bluepill/redpill.ebay.com, so obviously "the issue lies elsewhere") details offlist if anyone is up for it. thanks. ..david --- david raistrickhttp://www.netmeister.org/news/learn2quote.html [EMAIL PROTECTED] http://www.expita.com/nomime.html
Re: "Reporting to God"
Suresh Ramasubramanian wrote: > [snip] > > The Dave Maher memoirs are at > http://chilit.org/Papers%20by%20author/Maher%20--%20Reporting%20to%20God.htm thanks for the heads up, Suresh. I was amused to note Maher's first read of Wired was of the same issue I first read, 2.10 - I remember being especially tickled Quittner's tale [1] of mcdonalds.com and wondering why no-one else had noticed. Ah, innocent days. [1] http://www.wired.com/wired/archive/2.10/mcdonalds.html -- _ __/| William Anderson | Tim: Your cheese game is strong. \`O_o' neuro at well dot com | Zane: My cheese game. It's all about the =(_ _)= http://neuro.me.uk/ | cheese platter. U - Thhbt! GPG 0xFA5F1100 | -- Tim Westwood, Zane Lowe, R1, Dec 2005
Re: Yahoo-hosted phishing sites
On Wednesday 29 Mar 2006 15:56, you wrote: > > Anyone know to whom you can report yahoo-hosted phishing sites (or > redirects) and get someone who has half a clue? If you try to report the > sites to [EMAIL PROTECTED], or use the online abuse web form, you get a lame > message that says 'the email in question did not originate from a Yahoo! > mail server' -- or something to that effect. On the upside they do have a working abuse account, unlike some other big companies. Reported details of recent abuse of one of our servers to 4 companies via abuse addresses. Appears 2 of those big companies don't have, or won't respond to, "abuse@". Yahoo were one of those that responded. I got replies (I tried twice) asking me for the emails that were sent, when I reported it was being used as a drop box account for other peoples PayPal details. When I checked the email address is still accepting email . I was pondering writing an article on why this is making the Internet unusable.
Re: Yahoo-hosted phishing sites
Did you tried the form to report "Phishing Sites on Yahoo"? http://add.yahoo.com/fast/help/us/domains/cgi_phishing Abraços, Marlon Borba, CISSP. -- Se você acha que a criptografia pode resolver todos os seus problemas de segurança, então você não conhece os seus problemas e nem a criptografia. (Bruce Schneier) -- >>> "Jon R. Kibler" <[EMAIL PROTECTED]> 29/3/2006 11:56:43 >>> Hello, Anyone know to whom you can report yahoo-hosted phishing sites (or redirects) and get someone who has half a clue? If you try to report the sites to [EMAIL PROTECTED], or use the online abuse web form, you get a lame message that says 'the email in question did not originate from a Yahoo! mail server' -- or something to that effect. Yahoo has become a real problem because there seems to be no one to report these sites to. I have seen Yahoo-hosted sites up for a week or more because of that... Any ideas? THANKS! Jon Kibler -- Jon R. Kibler Chief Technical Officer A.S.E.T., Inc. Charleston, SC USA (843) 849-8214 == Filtered by: TRUSTEM.COM's Email Filtering Service http://www.trustem.com/ No Spam. No Viruses. Just Good Clean Email.
Re: Yahoo-hosted phishing sites
> Anyone know to whom you can report yahoo-hosted phishing sites (or > redirects) and get someone who has half a clue? It would be good if Yahoo would also stop selling ads to fraudulent companies. If you use their email service in Russian http://login.yahoo.com/config/mail?.intl=ru&.lg=ru then about 90% of the ads that they display are for companies offering to enter you in the U.S. Green Card immigration lottery. However, for the past several years people born in Russia are NOT eligible to enter this lottery which means that Yahoo is raking in the cash by supporting fraud. Given the prevalence of phishing operators in Eastern Europe, one wonders whether there is some connection here, i.e. Yahoo USA probably does not know this is going on because they trust their employees in Eastern Europe to do the right thing, but due to language barriers, management can't really monitor what they are doing. --Michael Dillon
Re: Yahoo-hosted phishing sites
Jon, [EMAIL PROTECTED] has been fairly responsive lately. Also: http://www.castlecops.com/pirt - ferg -- "Jon R. Kibler" <[EMAIL PROTECTED]> wrote: Hello, Anyone know to whom you can report yahoo-hosted phishing sites (or redirects) and get someone who has half a clue? If you try to report the sites to [EMAIL PROTECTED], or use the online abuse web form, you get a lame message that says 'the email in question did not originate from a Yahoo! mail server' -- or something to that effect. Yahoo has become a real problem because there seems to be no one to report these sites to. I have seen Yahoo-hosted sites up for a week or more because of that... Any ideas? THANKS! Jon Kibler -- Jon R. Kibler Chief Technical Officer A.S.E.T., Inc. Charleston, SC USA (843) 849-8214 -- "Fergie", a.k.a. Paul Ferguson Engineering Architecture for the Internet [EMAIL PROTECTED] or [EMAIL PROTECTED] ferg's tech blog: http://fergdawg.blogspot.com/
MPLScon
Title: MPLScon Nanog list members – if you are interested in attending MPLScon in NYC in May, please contact me for a discount code. Irwin -- Irwin Lazar, Conference Director, MPLScon http://www.mplscon.com [EMAIL PROTECTED]
Yahoo-hosted phishing sites
Hello, Anyone know to whom you can report yahoo-hosted phishing sites (or redirects) and get someone who has half a clue? If you try to report the sites to [EMAIL PROTECTED], or use the online abuse web form, you get a lame message that says 'the email in question did not originate from a Yahoo! mail server' -- or something to that effect. Yahoo has become a real problem because there seems to be no one to report these sites to. I have seen Yahoo-hosted sites up for a week or more because of that... Any ideas? THANKS! Jon Kibler -- Jon R. Kibler Chief Technical Officer A.S.E.T., Inc. Charleston, SC USA (843) 849-8214 == Filtered by: TRUSTEM.COM's Email Filtering Service http://www.trustem.com/ No Spam. No Viruses. Just Good Clean Email.
Re: Backbone Monitoring Tools
On Wed, 29 Mar 2006, Alexei Roudnev wrote: I use snmpstatd - snmpstat.sf.net . Oooh, looks nice! From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Ashe Canvar 2. actively detect routing changes / failover to redundant paths using traceroutes i.e. alert if SFO->CHG->NYC changes to SFO->LXE->HOU->NYC ( link state protocols suck as far as testing backup paths go) Ashe, I've done this using "mon" (http://www.kernel.org/software/mon/). It comes with two traceroute monitors which remember the past paths and alert when that path changes. In fact, one of the monitors can even detect load-balanced alternate paths, e.g. if there are multiple possible intermediate paths during normal operation. You'll want to look at the latest 1.1 release from CVS: http://www.kernel.org/software/mon/development.html 3. actively transfer a fixed file i.e. draw a datarate grid between every datacenter and every other datacenter In fact, I belive people have done precisely this with mon before. Try asking on the mailing list, I'm quite sure someone will respond. I am in a buy vs. build debate with my boss ;) Build! I think mon gets you at least 90% to where you want to go.
Re: Mutual Redistribution
Mark Smith wrote: On Tue, 28 Mar 2006 16:37:48 -0500 Did it happen to be RIPv1 ? Only RIPv2 supports route tags. Of course it was rip2 Rip1 is dead. Anyone using it should be shot.
Re: Backbone Monitoring Tools
I use snmpstatd - snmpstat.sf.net . - Original Message - From: "Ray Burkholder" <[EMAIL PROTECTED]> To: "'Ashe Canvar'" <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]> Sent: Tuesday, March 28, 2006 4:47 PM Subject: RE: Backbone Monitoring Tools > > A few more comments. > > I found a link to snmp management for ospf in an archive message: > http://www.cisco.com/en/US/tech/tk869/tk769/technologies_white_paper09186a00 > 801177ff.shtml. That may yield you the info you need for monitoring links > and/or routes. > > >From my other message, if you collect 1) and 3) with cricket, you can > extract RTR and bandwidth data with perl from cricket's config file. I took > a bit of code reverse engineering, but I managed to get some mod_perl code > going to do such a thing, so it can be done. If you pull out the > appropriate interface stats, you'd be able to generate your grid for 1) and > 3). > > -Original Message- > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Ashe > Canvar > Sent: Tuesday, March 28, 2006 20:07 > To: [EMAIL PROTECTED] > Subject: Re: Backbone Monitoring Tools > > > Thanks for the quick responses. Perhaps I should have been more explicit. > > I already use "remstats" > (http://remstats.sourceforge.net/release/index.html) for interface b/w > monitoring. I have worked with nagios and openview int he past. > > I have an ospf based network. The specific monitoring problem I am trying to > solve is : > > 1. actively test the currently active path for packet loss and transfer > i.e. draw a latency grid between every datacenter and every other > datacenter > > 2. actively detect routing changes / failover to redundant paths using > traceroutes > i.e. alert if SFO->CHG->NYC changes to SFO->LXE->HOU->NYC > ( link state protocols suck as far as testing backup paths go) > > 3. actively transfer a fixed file >i.e. draw a datarate grid between every datacenter and every other > datacenter > > > So, I am not looking for a generic graphing/alerting NMS. Does anyone use a > specific tool that is capable of doing this ? > > I am in a buy vs. build debate with my boss ;) > > Regards, > Ashe. > > > > > > > On 3/28/06, Josh Cheney <[EMAIL PROTECTED]> wrote: > > > > I have had a decent amount of success with Nagios. It is not trivial > > to setup, but once it is up and running, it has always handled our > > dependencies and such very well. Additionally, because it calls > > external programs to do the checks, it is pretty simple to write a > > script that measures whatever value you would like to monitor. As I > > said before, it is a pain to set up initially, but after getting it > > set up, I couldn't be happier with it. > > > > Ashe Canvar wrote: > > > Hi All, > > > > > > I want a simple backbone monitor for my 5 datacenters. My "backbone" > > > consists of redundant IPSEC/GRE tunnnels. > > > > > > At the very least I want to ping, traceroute and transfer a small > > > file every few minutes over all IPSEC links. I am sure there are > > > products that do this already, but I am having a hard time finding any. > > > > > > The display format should be noc-friendly. A basic grid with > > > green/red status indicators at the least. Geographical maps a plus. > > > > > > Do most of you use a home grown tool for this monitoring and alerting ? > > > > > > Regards, > > > Ashe > > > > > > . > > > > > > > -- > > Josh Cheney > > [EMAIL PROTECTED] > > http://www.joshcheney.com > > > > -- > Scanned for viruses and dangerous content at http://www.oneunified.net and > is believed to be clean. > > > > -- > Scanned for viruses and dangerous content at > http://www.oneunified.net and is believed to be clean. >
Re: Mutual Redistribution
On Tue, 28 Mar 2006 16:37:48 -0500 Joe Maimon <[EMAIL PROTECTED]> wrote: > > > Mark Smith wrote: > > > One better > > solution is to take advantage of route tags or labels. When a route is > > redistributed you tag it, and then when mutual redistribution occurs in > > the other direction, you exclude routes that have that tag. You'd need > > to do this in both redistribution directions, with different tags to > > prevent loops in either direction. This method doesn't rely on the > > behaviour of always increase metrics, so it would be more robust. > > > > HTH, > > Mark. > > > I dont believe popular vendors implementations of rip propogate tags. > > At least the last time I tried loop prevention with that, it didnt work. Did it happen to be RIPv1 ? Only RIPv2 supports route tags. -- "Sheep are slow and tasty, and therefore must remain constantly alert." - Bruce Schneier, "Beyond Fear"