Re: ARIN Lawsuit - Comments anyone?

2006-11-17 Thread Hyunseog Ryu



My question is whether the number resource including IP address is 
trading item or not.
In my understanding, IP address is allocated from ARIN based on use 
right, not as an asset.
If one network is acquired by somebody else, IP address is transfer to 
new guy based on network engineering plan, not by the money itself.

So I think the court itself is not valid.
The court considered it as asset, but it is not.
It is same as the phone number.
If the phone number is assigned to A, and A has debt to B,
the court can not order B to have that number unless B has actual phone 
line AND follow the procedure for those transfer.

I think it applies same to IP address resource.

So I think ARIN should not deal with Mr. Kremen in private talk.
ARIN should go with upper court authority to make it annulled.

Otherwise, if people think and agree that IP address is asset, which can 
be traded, ARIN should sell it, and doesn't need to go through 
justification process.



Hyun
Senior Network Engineer/Apps Engineering
Norlight Telecommunications

* This is my private opinion, and doesn't represent my employer, 
Norlight official position.



Chris Jester wrote:


Im wondering how people feel about the response by Mr Ryan, ARIN's legal
arsenal.  I was forwarded this and would love to know how the networks out
there feel about it. Is a long read, but certainly a worthwile one
considering the outcome of the case may change IP's as we know them today.
 I am leaning
toward ARINS point of view on the matter, however there are always changes
I would hope they make to the way they do things. At the same time, I do
believe
there has to be an ARIN keeping things in order for the rest of us.  So my
vote is 60% with RYAN and ARIN.  Yours?  Vote please in the court of
public opinion.


--snip--

MR. RYAN: So why is your lawyer talking to you? Let me tell you that
there's been a development that we wanted to share with you. As we were
leaving Montreal at the last meeting, on the evening that we were flying
home, ARIN was sued in California, and we wanted to share some of the
information about that with you. This has been the first time literally
that we could do so in a meeting capacity; and so as part of our open and
transparent processes, we thought we'd let you know that we had been sued
in a major way. And let me talk briefly about what has occurred and what
we're doing about that. The story is actually a little bit convoluted. It
begins in 1998. There was a man named Richard Kremen who is a cyber
squatter who had squatted on a name called Sex.com, among other things
that he owned. His Sex.com domain name was stolen according to him by a
man named Cohen. Mr. Cohen hijacked that and disappeared to Israel and
other places in the world, and a lawsuit between these two gentlemen
ensued. Mr. Kremen was the person aggrieved. In 2001, unknown to ARIN and
without any notice to us, on a day in the course of this lawsuit, the
United States District Court in San Jose issued an order, ordering ARIN to
turn over certain IP resources that Cohen or people that Mr. Kremen and
the court believed were associated with Cohen had obtained from ARIN. No
one has ever said that ARIN acted improperly in issuing resources, but
what they were, in essence, saying in the court order is that Cohen used
money that had been Kremen's to obtain the resources, and in lieu of the
money, we were to transfer the resources to Mr. Kremen. So if you've got
that, Cohen is the bad guy, according to the court. The court issues an
order without ARIN being there. A court order tells you to do something.
Well, in 2003, in December of 2003, I had been General Counsel for you
about 30 days at that point. We received the order approximately two years
after it had been issued. It was provided to us in a formal way, and Mr.
Kremen asked us to obey the order. That is, to revoke the IP resources
that were held by Mr. Cohen and transfer them to Mr. Kremen. We agreed to
do so, so long as Mr. Kremen would do what all of you have done since ARIN
began in 1998, which is apply for the resources and sign the normal RSA.
Mr. Kremen refused to do that and has refused to the current date. His
theory is that he doesn't have to do that because he has a court order,
and our theory is that we have a certain set of rules and requirements,
and that you have to obey the rules and requirements of the community, and
we don't read the court order as giving Mr. Kremen a permanent pass from
the rules that all of you obey. We've tried to be very cordial with Mr.
Kremen. We believe that Mr. Kremen may have been badly treated by Mr.
Cohen, but he certainly has never been badly treated by us. During the
time that we've been negotiating with him, we agreed to what was called a
standstill order, that there would be no court activity while we
negotiated. We turned over thousands of pages of documents within ARIN's
control to help him find assets that Mr. Cohen might have had. We revoked
resources that were 

problem with BGP or I am an Idiot

2006-11-17 Thread Philip Lavine

To all,

Probabaly the the latter; however here is the situation. I am advertising a rte 
1.1.1.1 via BGP to the Internet via ISP_A via my location in NJ. At my other 
location in CA where I am advertising another rte 2.2.2.2 via BGP to the 
Internet via the same ISP_A. I am using the same AS for both routes. 

For some reason on my rtr advertising the 2.2.2.2 rte I am unable to see the 
1.1.1.1 rte % Network not in table. I know 1.1.1.1 rte is valid it shows up 
in looking glass and ISP_A has it on the peer 2.2.2.2 recevies full Internet 
rtes from. Further verification: I add a static rte on 2.2.2.2 rtr to 1.1.1.1 
and its routable???

How is this possible? I have the following filters but I removed them and it 
seems to not make a diff.
OUTBOUND - ip as-path access-list 1 permit ^$
 ip as-path access-list 1 deny .*
INBOUND - ip as-path access-list 2 permit .*


Philip
  



 

Sponsored Link

$420k for $1,399/mo. 
Think You Pay Too Much For Your Mortgage? 
Find Out! www.LowerMyBills.com/lre


Re: problem with BGP or I am an Idiot

2006-11-17 Thread Bruce Pinsky

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Philip Lavine wrote:
 To all,
 
 Probabaly the the latter; however here is the situation. I am advertising a 
 rte 1.1.1.1 via BGP to the Internet via ISP_A via my location in NJ. At my 
 other location in CA where I am advertising another rte 2.2.2.2 via BGP to 
 the Internet via the same ISP_A. I am using the same AS for both routes. 
 
 For some reason on my rtr advertising the 2.2.2.2 rte I am unable to see the 
 1.1.1.1 rte % Network not in table. I know 1.1.1.1 rte is valid it shows up 
 in looking glass and ISP_A has it on the peer 2.2.2.2 recevies full Internet 
 rtes from. Further verification: I add a static rte on 2.2.2.2 rtr to 1.1.1.1 
 and its routable???
 
 How is this possible? I have the following filters but I removed them and it 
 seems to not make a diff.
 OUTBOUND - ip as-path access-list 1 permit ^$
  ip as-path access-list 1 deny .*
 INBOUND - ip as-path access-list 2 permit .*
 

Loop protection.  Throw away any route I hear from someone else with my AS.

- --
=
bep

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.4 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFFXc3VE1XcgMgrtyYRAkUqAJ0WYsnAikAZnQc4tldqthD9f4TtBwCg8aUO
OE57J9SYPYPRwue7VCUPvec=
=3Cki
-END PGP SIGNATURE-


Re: problem with BGP or I am an Idiot

2006-11-17 Thread Patrick W. Gilmore


On Nov 17, 2006, at 9:57 AM, Bruce Pinsky wrote:

Probabaly the the latter; however here is the situation. I am  
advertising a rte 1.1.1.1 via BGP to the Internet via ISP_A via my  
location in NJ. At my other location in CA where I am advertising  
another rte 2.2.2.2 via BGP to the Internet via the same ISP_A. I  
am using the same AS for both routes.


For some reason on my rtr advertising the 2.2.2.2 rte I am unable  
to see the 1.1.1.1 rte % Network not in table. I know 1.1.1.1  
rte is valid it shows up in looking glass and ISP_A has it on the  
peer 2.2.2.2 recevies full Internet rtes from. Further  
verification: I add a static rte on 2.2.2.2 rtr to 1.1.1.1 and its  
routable???


How is this possible? I have the following filters but I removed  
them and it seems to not make a diff.

OUTBOUND - ip as-path access-list 1 permit ^$
 ip as-path access-list 1 deny .*
INBOUND - ip as-path access-list 2 permit .*


Loop protection.  Throw away any route I hear from someone else  
with my AS.


As long as you are hearing default your transit providers (you do  
have at least two, right? if you only have one, you don't need BGP  
and are just polluting the routing table), it won't matter if you can  
hear the prefix from your other location.


--
TTFN,
patrick



Re: problem with BGP or I am an Idiot

2006-11-17 Thread Stephen Wilcox

On Fri, Nov 17, 2006 at 06:44:11AM -0800, Philip Lavine wrote:
 
 To all,
 
 Probabaly the the latter; however here is the situation. I am advertising a 
 rte 1.1.1.1 via BGP to the Internet via ISP_A via my location in NJ. At my 
 other location in CA where I am advertising another rte 2.2.2.2 via BGP to 
 the Internet via the same ISP_A. I am using the same AS for both routes. 
 
 For some reason on my rtr advertising the 2.2.2.2 rte I am unable to see the 
 1.1.1.1 rte % Network not in table. I know 1.1.1.1 rte is valid it shows up 
 in looking glass and ISP_A has it on the peer 2.2.2.2 recevies full Internet 
 rtes from. Further verification: I add a static rte on 2.2.2.2 rtr to 1.1.1.1 
 and its routable???
 
 How is this possible? I have the following filters but I removed them and it 
 seems to not make a diff.
 OUTBOUND - ip as-path access-list 1 permit ^$
  ip as-path access-list 1 deny .*
 INBOUND - ip as-path access-list 2 permit .*

you will not accept a route with your AS in teh path

you can override it (on cisco) with allow-own-as 

Steve


Re: problem with BGP or I am an Idiot

2006-11-17 Thread Jay Hennigan


Philip Lavine wrote:

To all,

Probabaly the the latter; however here is the situation. I am advertising a rte 1.1.1.1 via BGP to the Internet via ISP_A via my location in NJ. At my other location in CA where I am advertising another rte 2.2.2.2 via BGP to the Internet via the same ISP_A. I am using the same AS for both routes. 


Don't do that then.


For some reason on my rtr advertising the 2.2.2.2 rte I am unable to see the 1.1.1.1 rte 
% Network not in table. I know 1.1.1.1 rte is valid it shows up in looking 
glass and ISP_A has it on the peer 2.2.2.2 recevies full Internet rtes from. Further 
verification: I add a static rte on 2.2.2.2 rtr to 1.1.1.1 and its routable???


The reason is that a BGP router won't accept a route containing its own 
AS from an external peer.


You can add a static route on both routers to the other network with the 
gateway of your ISP.  A floating static default may also work.  Or get a 
 different AS for the other end.


--
Jay Hennigan - CCIE #7880 - Network Engineering - [EMAIL PROTECTED]
Impulse Internet Service  -  http://www.impulse.net/
Your local telephone and internet company - 805 884-6323 - WB6RDV


Re: ARIN Lawsuit - Comments anyone?

2006-11-17 Thread Joseph S D Yao

So, what happened on 23 October, since you're putting this up for
examination?

-- 
Joe Yao
---
   This message is not an official statement of OSIS Center policies.


Weekly Routing Table Report

2006-11-17 Thread Routing Analysis Role Account

This is an automated weekly mailing describing the state of the Internet
Routing Table as seen from APNIC's router in Japan.
Daily listings are sent to [EMAIL PROTECTED]

For historical data, please see http://thyme.apnic.net.

If you have any comments please contact Philip Smith [EMAIL PROTECTED].

Routing Table Report   04:00 +10GMT Sat 18 Nov, 2006

Analysis Summary


BGP routing table entries examined:  203977
Prefixes after maximum aggregation:  110635
Unique aggregates announced to Internet:  99054
Total ASes present in the Internet Routing Table: 23714
Origin-only ASes present in the Internet Routing Table:   20668
Origin ASes announcing only one prefix:9968
Transit ASes present in the Internet Routing Table:3046
Transit-only ASes present in the Internet Routing Table: 82
Average AS path length visible in the Internet Routing Table:   3.6
Max AS path length visible:  29
Max AS path prepend of ASN (36728)   27
Prefixes from unregistered ASNs in the Routing Table: 1
Unregistered ASNs in the Routing Table:   3
Special use prefixes present in the Routing Table:1
Prefixes being announced from unallocated address space:  7
Number of addresses announced to Internet:   1636930476
Equivalent to 97 /8s, 145 /16s and 147 /24s
Percentage of available address space announced:   44.2
Percentage of allocated address space announced:   62.7
Percentage of available address space allocated:   70.5
Total number of prefixes smaller than registry allocations:  103463

APNIC Region Analysis Summary
-

Prefixes being announced by APNIC Region ASes:45034
Total APNIC prefixes after maximum aggregation:   18334
Prefixes being announced from the APNIC address blocks:   42613
Unique aggregates announced from the APNIC address blocks:18655
APNIC Region origin ASes present in the Internet Routing Table:2761
APNIC Region origin ASes announcing only one prefix:779
APNIC Region transit ASes present in the Internet Routing Table:411
Average APNIC Region AS path length visible:3.5
Max APNIC Region AS path length visible: 16
Number of APNIC addresses announced to Internet:  269241056
Equivalent to 16 /8s, 12 /16s and 74 /24s
Percentage of available APNIC address space announced: 84.2

APNIC AS Blocks4608-4864, 7467-7722, 9216-10239, 17408-18431
(pre-ERX allocations)  23552-24575, 37888-38911
APNIC Address Blocks   58/7, 60/7, 121/8, 122/7, 124/7, 126/8, 202/7
   210/7, 218/7, 220/7 and 222/8

ARIN Region Analysis Summary


Prefixes being announced by ARIN Region ASes:101463
Total ARIN prefixes after maximum aggregation:59963
Prefixes being announced from the ARIN address blocks:74702
Unique aggregates announced from the ARIN address blocks: 28353
ARIN Region origin ASes present in the Internet Routing Table:11159
ARIN Region origin ASes announcing only one prefix:4256
ARIN Region transit ASes present in the Internet Routing Table:1032
Average ARIN Region AS path length visible: 3.3
Max ARIN Region AS path length visible:  29
Number of ARIN addresses announced to Internet:   31032
Equivalent to 18 /8s, 135 /16s and 201 /24s
Percentage of available ARIN address space announced:  68.6

ARIN AS Blocks 1-1876, 1902-2042, 2044-2046, 2048-2106
(pre-ERX allocations)  2138-2584, 2615-2772, 2823-2829, 2880-3153
   3354-4607, 4865-5119, 5632-6655, 6912-7466
   7723-8191, 10240-12287, 13312-15359, 16384-17407
   18432-20479, 21504-23551, 25600-26591,
   26624-27647, 29696-30719, 31744-33791
   35840-36863, 39936-40959
ARIN Address Blocks24/8, 63/8, 64/5, 72/6, 76/8, 96/6, 199/8, 204/6,
   208/7 and 216/8

RIPE Region Analysis Summary


Prefixes being announced by RIPE Region ASes: 41751
Total RIPE prefixes after maximum aggregation:27478
Prefixes being announced from the RIPE address blocks:38656
Unique aggregates announced from the RIPE address blocks: 25768
RIPE Region origin ASes present in the Internet Routing Table: 8794
RIPE Region origin ASes announcing only one prefix:4639
RIPE Region transit ASes present in 

ietf-bcp38bis mailing list [Was: RFC2827-bis comments solicitation]

2006-11-17 Thread Fergie

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

As a follow-up to my previous message re: RFC2827-bis
comments solicitation, we now have a dedicated mailing
list for discussion of bringing BCP38 up-to-date:

[snip]

ietf-bcp38bis mailing list

The ietf-bcp38bis mailing list is for discussing an update
to BCP 38, Network Ingress Filtering.

To subscribe to the mailing list, send a message to:

 [EMAIL PROTECTED]

...with the single word 'subscribe' in the body of the
message.

[snip]

The web site for this mailing list is sponsored by the VPN
Consortium. If you have any suggestions for additions or
corrections to this web page, please send them to
paul.hoffman(at)vpnc.org.

Many thanks to Paul Hoffman for hosting the list.

- - ferg


First, sorry for any duplicates, but we wanted to reach all
interested parties.

After several discussions with many different folks last week
at IETF 67 in San Diego, as well as various people over the
course of the past few months, Dan Senie and I have decided to
undertake an effort to update RFC2827/BCP38 [1].

I know that I'm not the only person who has heard various
discussions in the past couple of years that concluded that
(paraphrased), BCP38 needs to be updated.

Now is your chance to speak up. :-)

We would very much like to solicit comments  suggestions from the
community-at-large on areas where you feel BCP38 is lacking, or in
areas where you feel it does not properly address with regards to
prohibiting source-spoofed traffic from any given administrative
network boundary, given that some technical aspects of the Internet
may have changed since it's publication.

While we acknowledge that a uniform application of a source address
verification architecture/ingress filtering scheme will not mitigate
_all_ unwanted traffic [2] in the Internet, it will most certainly
address the issue of hosts which attempt to source-spoof traffic into
the Internet.

I have not set up a mailing list for this yet, but if there is
enough discussion/input, I will make an effort to do so (or perhaps
the SAVA mailing list [3] might be a good place for discussion). In
the interim, you can contact me or Dan directly:

 Paul Ferguson: fergdawg(at)netzero.net
 Dan Senie: dts(at)senie.com


Thanks,

fergie  dan

p.s. Also, for anyone who might be interesting in related work,
there is an effort to bring some additional work into the IETF
called SAVA, or Source Address Validation Architecture [4].


[1] http://www.rfc-editor.org/rfc/rfc2827.txt
[2] http://www.iab.org/about/workshops/unwantedtraffic/index.html
[3] http://www.nrc.tsinghua.edu.cn/mailman/listinfo/sava
[4]
http://www.nrc.tsinghua.edu.cn/pipermail/sava/2006-September/04.html  


-BEGIN PGP SIGNATURE-
Version: PGP Desktop 9.5.1 (Build 1557)

wj8DBQFFXgK9q1pz9mNUZTMRArqOAKDzeVk2VCfD/Ru0OtrgtNLyJ90MqACePChS
2dqaaWAbXonj185jAtwnZ8Q=
=jieX
-END PGP SIGNATURE-


--
Fergie, a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 fergdawg(at)netzero.net
 ferg's tech blog: http://fergdawg.blogspot.com/



RE: Cisco SLA data access via SNMP?

2006-11-17 Thread Ray Burkholder

  Ray,
 
Do you have an example of accessing the SLA data via SNMP? 
 I've just got interested in those things, I've found the OIDs 
 required, but its all a bit of a maze ... I could really use 
 some jitter information in a couple of places right about now ...
 
A number of people have asked for how I did the Cricket/SLA thing.  I have a
description of the configuration at:

http://www.oneunified.net/blog/OpenSource/Debian/Monitoring/Cricket/installa
ndconfig.article

On one of the systems I'm getting a cricket error of:
illegal attempt to update +using time 1163791808 when last update time is
1163791808 (minimum one second step) 

I'm not sure if it affects other systems.  I have to check.  Anyway, once I
get this thing fixed, I think everything should be good to go.

Let me know if you have similar problems.

Ray
http://www.oneunified.net/blog/




-- 
Scanned for viruses and dangerous content at 
http://www.oneunified.net and is believed to be clean.



Cogent and Sprint peering history?

2006-11-17 Thread nealr




I've not watched here closely for a number of years, but I now have a 
Sprint connected customer who is hating life and Cogent seems to be part 
of the equation. Can someone fill me in on the history of their 
relationship?





I never thought Sprint would ever renew its relationship with Sprint:

Tracing the route to portus.netsecdesign.com (66.6.208.6)
 
   1 sl-bb24-rly-9-0.sprintlink.net (144.232.14.122) 0 msec 0 msec 0

msec
   2 sl-st22-ash-6-0.sprintlink.net (144.232.20.189) 0 msec 4 msec 0
msec
   3 p15-2.core01.iad01.atlas.cogentco.com (154.54.13.61) [AS 174] 4
msec 4 msec 0 msec
   4 v3492-mpd01.iad01.atlas.cogentco.com (154.54.3.222) [AS 174] 16
msec 80 msec 196 msec
   5 v3497.mpd01.dca01.atlas.cogentco.com (154.54.5.65) [AS 174] 4 msec
4 msec 4 msec
   6 t9-3.mpd01.iah01.atlas.cogentco.com (154.54.2.222) [AS 174] 44 msec
44 msec 48 msec
   7 t2-3.mpd01.lax01.atlas.cogentco.com (154.54.3.186) [AS 174] 72 msec
72 msec 72 msec
   8 g2-0-0.core01.lax01.atlas.cogentco.com (154.54.2.101) [AS 174] 72
msec 72 msec 72 msec
   9 g49.ba01.b002698-1.lax01.atlas.cogentco.com (66.250.12.130) [AS
174] 72 msec 72 msec 72 msec
  10 PAJO-Networks.demarc.cogentco.com (38.112.9.190) [AS 174] 72 msec
76 msec 72 msec
  11 dcap04.pcap.lax01.tierzero.net (216.31.128.14) [AS 11509] 72 msec
76 msec 72 msec
  12 mmic-gw.dcap6.lax.us.tierzero.net (216.31.188.94) [AS 11509] 76
msec 80 msec 80 msec
  13 dazedandconfused.netsecdesign.com (66.6.208.4) [AS 11509] 84 msec
84 msec 88 msec
  14 portus.netsecdesign.com (66.6.208.6) [AS 11509] 84 msec 84 msec 88
msec


Next I will see pigs flying :)  Wonder how long it will last based on
Cogent's past behavior as noted here.

Edward Ray

-
This mail was scanned by BitDefender
For more informations please visit http://www.bitdefender.com


-



  




Re: Cogent and Sprint peering history?

2006-11-17 Thread Todd Underwood

neal, all,

On Fri, Nov 17, 2006 at 05:46:43PM -0600, nealr wrote:

 I've not watched here closely for a number of years, but I now have a 
 Sprint connected customer who is hating life and Cogent seems to be part 
 of the equation. Can someone fill me in on the history of their 
 relationship?

they used not to peer and cogent reached sprint via ntt america
(verio).  now they are directly connected (at least in north america
for north american routes).

the routing situation is evolving and may have changed since last i
wrote about it at:

http://www.renesys.com/blog/2006/11/sprint_and_cogent_peer.shtml

(there's some path detail in that posting including stuff about when
the most recent change took place and what kind of prefixes are
carried on the adjacency.  there's nothing in there about the quality
of either network or the capacity of the interconnection).  

t.

-- 
_
todd underwood +1 603 643 9300 x101
renesys corporationchief of operations  security 
[EMAIL PROTECTED]   
http://www.renesys.com/blog/todd.shtml


Re: problem with BGP or I am an Idiot

2006-11-17 Thread Edward B. DREGER

SW Date: Fri, 17 Nov 2006 15:56:53 +
SW From: Stephen Wilcox

SW you can override it (on cisco) with allow-own-as 

s/allow-own-as/allowas-in/


Eddy
--
Everquick Internet - http://www.everquick.net/
A division of Brotsman  Dreger, Inc. - http://www.brotsman.com/
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 785 865 5885 Lawrence and [inter]national
Phone: +1 316 794 8922 Wichita

DO NOT send mail to the following addresses:
[EMAIL PROTECTED] -*- [EMAIL PROTECTED] -*- [EMAIL PROTECTED]
Sending mail to spambait addresses is a great way to get blocked.
Ditto for broken OOO autoresponders and foolish AV software backscatter.


Drone Armies CC Report - 17 Nov 2006

2006-11-17 Thread c2report



This is a periodic public report from the ISOTF's affiliated group 'DA'
(Drone Armies (botnets) research and mitigation mailing list / TISF
DA) with the ISOTF affiliated ASreport project (TISF / RatOut).

For this report it should be noted that we base our analysis on the data
we have accumulated from various sources, which may be incomplete.

Any responsible party that wishes to receive reports of botnet command
and control servers on their network(s) regularly and directly, feel
free to contact us.

For purposes of this report we use the following terms
openthe host completed the TCP handshake
closed  No activity detected
reset   issued a RST

This month's survey is of 4189 unique, domains (or IPs) with
port suspect CCs. This list is extracted from the BBL which
has a historical base of 13405 reported CCs. Of the suspect CCs
surveyed, 649 reported as Open, 947 reported as closed,
and 755 issued resets to the survey instrument. Of the CCs 
listed by domain name in the our CC database, 5847 are mitigated.

Top 20 ASNes by Total suspect domains mapping to a host in the ASN.
These numbers are determined by counting the number of domains which
resolve to a host in the ASN.  We do not remove duplicates and some of
the ASNs reported have many domains mapping to a single IP.  Note the
Percent_resolved figure is calculated using only the Total and Open
counts and does not represent a mitigation effectiveness metric.
Percent_
ASN Responsible Party   Total   OpenResolved
19318   NJIIX-AS-1 - NEW JERSEY INTERN117 27 77
13301   UNITEDCOLO-AS Autonomous System of102 30 71
16265   LEASEWEB AS55 38 31
23522   CIT-FOONET 46 33 28
 8560   SCHLUND-AS 40 25 38
30058   FDCSE FDCservers.net LLC   38 12 68
 4766   KIXS-AS-KR 33  5 85
15083   IIS-129 Infolink Information Servic31  0100
  174   Cogent Communications  30 25 17
33597   InfoRelay Online Systems, Inc. 29  0100
13213   UK2NET-AS UK-2 Ltd Autonomous Syste26  0100
 9318   HANARO-AS  25  7 72
12832   Lycos Europe   24  0100
 1659   ERX-TANET-ASN1 24  6 75
24611   AS24611 Datacenter Luxembourg S.A. 23  0100
 7132   SBC Internet Services  23  4 83
30083   Server4You Inc.22  8 64
 4314   IIS-64 I-55 INTERNET SERVICES  22  2 91
19166   Alpha Red, INC 19  5 74
30407   Velcom.com 19  3 84

Top 20 ASNes by number of active suspect CCs.  These counts are
determined by the number of suspect domains or IPs located within
the ASN completed a connection request.
Percent_
ASN Responsible Party   Total   OpenResolved
16265   LEASEWEB AS55 38 31
23522   CIT-FOONET 46 33 28
13301   UNITEDCOLO-AS Autonomous System of102 30 71
19318   NJIIX-AS-1 - NEW JERSEY INTERN117 27 77
 8560   SCHLUND-AS 40 25 38
  174   Cogent Communications  30 25 17
30058   FDCSE FDCservers.net LLC   38 12 68
30315   Everyones Internet 13  8 38
15516   DK-ARROWHEAD9  8 11
 9800   UNICOM 19  8 58
30083   Server4You Inc.22  8 64
12322   PROXAD AS for Proxad ISP   10  8 20
28753   NETDIRECT AS NETDIRECT Frankfurt   13  8 38
 3786   ERX-DACOMNET   14  8 43
36263   forona.11  7 36
 9318   HANARO-AS  25  7 72
 3462   HINET  13  7 46
34305   EUROACCESS Euroaccess   9  7 22
 6140   ImpSat  8  6 25
 1659   ERX-TANET-ASN1 24  6 75

A version of this report with addition rankings can be found
via the isotf.org home page. 


Randal Vaughn Gadi  Evron
Professor ge at linuxbox.org
Baylor University
Waco, TX
(254) 710 4756
randy_vaughn at baylor.edu



RE: Cisco SLA data access via SNMP?

2006-11-17 Thread Ray Burkholder

 
 
 On one of the systems I'm getting a cricket error of:
 illegal attempt to update +using time 1163791808 when last 
 update time is
 1163791808 (minimum one second step) 
 

There was a problem with a number of Tunnel interfaces not getting
processed.  Things are good now.  Cisco QoS and SLA's are indeed viewable
with Cricket.
 
 Ray
 http://www.oneunified.net/blog/


-- 
Scanned for viruses and dangerous content at 
http://www.oneunified.net and is believed to be clean.



Re: Cisco SLA data access via SNMP?

2006-11-17 Thread Jake Khuon

### On Sat, 18 Nov 2006 01:25:50 -0400, 
### Ray Burkholder [EMAIL PROTECTED] casually decided to expound upon
### nanog@merit.edu
### the following thoughts about RE: Cisco SLA data access via SNMP?:

RB  On one of the systems I'm getting a cricket error of:
RB  illegal attempt to update +using time 1163791808 when last 
RB  update time is
RB  1163791808 (minimum one second step) 
RB  
RB 
RB There was a problem with a number of Tunnel interfaces not getting
RB processed.  Things are good now.  Cisco QoS and SLA's are indeed viewable
RB with Cricket.


There are also a bunch of Cacti templates available as well...  I'm using
modified versions of these.

   http://forums.cacti.net/about4136-0-asc-0.html


--
/*===[ Jake Khuon [EMAIL PROTECTED] ]==+
 | Packet Plumber, Network Engineers /| / [~ [~ |) | | --- |
 | for Effective Bandwidth Utilisation  / |/  [_ [_ |) |_| N E T W O R K S |
 +=*/