RE: [cacti-announce] Cacti 0.8.6j Released (fwd)

2007-02-07 Thread Ray Burkholder


> 
> > How about something like:
> > http://www.hdfgroup.org/whatishdf5.html
> 
> I don't think they support transactional updates, which makes 
> it hard to use for live data.  (A simple crash, and you need 
> to recover from
> backup.)

Going back to this thread, http://www.kx.com/ deals in financial transaction
databases where they store millions of ticks.  They appear to have a
transactional based language with a solution that appears to be robust and
fail resistant.

I'm sure it has a price tag that goes along with the capabilities.

Anyone encountered this before?


-- 
Scanned for viruses and dangerous content at 
http://www.oneunified.net and is believed to be clean.



NANOG39 - Toronto

2007-02-07 Thread Carol Wadsworth


Found in NANOG meeting rooms:

2 wireless headsets
1 power plug converter (white)




Anyone with SMTP clue at Verizon Wireless / Vtext?

2007-02-07 Thread Mike Lyon


Their gateway is blocking mail from my host. Of course, there is no
clueful contact info on their webpage...

Please hit me up offlist.

Thanks,
mike


Re: comcast spam policies

2007-02-07 Thread Suresh Ramasubramanian


On 2/8/07, Al Iverson <[EMAIL PROTECTED]> wrote:


Actually, http://www.comcast.net/help/faq/index.jsp?faq=SecurityMail_Policy18627
links you to
http://www.comcastsupport.com/rbl
aka
http://www.comcastsupport.com/sdcxuser/lachat/user/Blockedprovider.asp


What Al said, in spades.  That blacklist_comcastnet address IS the
right address to use and that form feeds to it.

--srs


Re: comcast spam policies

2007-02-07 Thread Jack Bates


Albert Meyer wrote:


Didn't we all figure out years ago that, when using a telephone or cable 
company for Internet service, you have to just use the pipe and get your 
services (mail, news, etc.) elsewhere? Bemoaning the poor quality of 
telco/cableco mail servers is kind of like wishing that the rain 
wouldn't be so damn wet.




I just know you meant to add "with the exception of those few telco mail servers 
that are run well".



-Jack


Re: comcast spam policies

2007-02-07 Thread Al Iverson


On 2/7/07, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:


As if that is not bad enough only comcast customers can complain. The link
given on the bounce email:

  http://www.comcast.net/help/faq/index.jsp?faq=SecurityMail_Policy18627

A pattern can apparently be discerned from a single email. The comcast guys at
better at pattern recognition than most of us. Unlike AOL there is no person
that can be mailed or contacted. Neither the link on the above page or
[EMAIL PROTECTED] will respond except to (they claim)
complains from individual customers.


Actually, http://www.comcast.net/help/faq/index.jsp?faq=SecurityMail_Policy18627
links you to
http://www.comcastsupport.com/rbl
aka
http://www.comcastsupport.com/sdcxuser/lachat/user/Blockedprovider.asp

That form does not indicate that only Comcast users may use it. Its
target is actually administrators of an IP address whose mail got
blocked.

I've used it before, and it has actually worked for me.

Regards,
Al Iverson
Who does not work for Comcast.


--
Al Iverson on Spam and Deliverabilty, see http://www.spamresource.com
Message copyright 2007 by Al Iverson. For posts to SPAM-L, permission
is granted only to this lists's owners to redistribute to their sub-
scribers and to archive this message on site(s) under their control.


Re: comcast spam policies

2007-02-07 Thread Albert Meyer


Didn't we all figure out years ago that, when using a telephone or cable company 
for Internet service, you have to just use the pipe and get your services (mail, 
news, etc.) elsewhere? Bemoaning the poor quality of telco/cableco mail servers 
is kind of like wishing that the rain wouldn't be so damn wet.


[EMAIL PROTECTED] wrote:

The current comcast policy  seems to be to backhole mail servers at random.


Re: Hackers hit key Internet traffic computers

2007-02-07 Thread virendra rode //

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Douglas Otis wrote:
> 
> 
> On Feb 7, 2007, at 6:27 AM, Jeff Kell wrote:
> 
>>
>> Alexander Harrowell wrote:
>>>
>>> It was clear from the highly reliable index I call the "Nanogdex"
>>> that nothing was seriously amiss.
>>
>> Yes, but it got so much bloody press that ambitious copycats can't be
>> too far behind.
> 
> When 2 of 13 root systems are affected (>90% loss), how many systems
> will withstand such an attack when targeted lower within the hierarchy? 
> FWIW, the attack rates did not seem that high.
> 
> -Doug
> 
- 
On the same note and this just an observation, I hear two thoughts, some
talk not using anycast and then there are others who stand their ground
about anycast deployment.

Looking at these attacks, F in particular, if my memory serves me
correct, there are 35 f-root anycast nodes deployed. Maybe this helped
in some respect.

Then again, I like to see what kind of analysis comes out from the
collected data.


regards,
/virendra

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2.2 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFFyjWbpbZvCIJx1bcRAipMAJ9gNkyYS0BTR4jVrBP8PiZ9CyILDACcC8Jx
MNiY9T6Wzi60KtgaK3qLqnM=
=kJk7
-END PGP SIGNATURE-


RE: comcast spam policies

2007-02-07 Thread David Hubbard

From: [EMAIL PROTECTED]
> 
 
> The current comcast policy  seems to be to backhole mail 
> servers at random.

This is true.  We do mostly ecommerce hosting and often our
customers have their own dedicated servers blacklisted from
sending email notifications of new orders to their home
comcast addresses.  We have to request unlisting regularly.

David


comcast spam policies

2007-02-07 Thread doug

I will not ask if anyone at Comcast has a clue, because I do not need any dvds.
If this not correct, I would appreciate hearing from anyone whose clue-ness
exceeds 15%. The rest is a description/rant about comcast's policy as described
to me by a couple of tech people reached by following voice mail from
1-800-comcast which really should be 1-800-328-7448.

The current comcast policy  seems to be to backhole mail servers at random.
Safeport's internal mail server which is the source of no spam (cause only we
guys can use it) was blackholed either at random, or because we sent one email
to a comcast customer.

As if that is not bad enough only comcast customers can complain. The link
given on the bounce email:

  http://www.comcast.net/help/faq/index.jsp?faq=SecurityMail_Policy18627

A pattern can apparently be discerned from a single email. The comcast guys at
better at pattern recognition than most of us. Unlike AOL there is no person
that can be mailed or contacted. Neither the link on the above page or
[EMAIL PROTECTED] will respond except to (they claim)
complains from individual customers.

I guess the message is you better use gmail if you are a comcast customer.

I really don't mean this to start an endless thread. On the off chance that
there is someone who can and will explain the logic behind this policy and or
perhaps do something about it, that would be useful.  Otherwise there is not
much point in berating idiots.

_
Douglas Denault
http://www.safeport.com
[EMAIL PROTECTED]
Voice: 301-469-8766
  Fax: 301-469-0601


Re: Hackers hit key Internet traffic computers

2007-02-07 Thread Douglas Otis



On Feb 7, 2007, at 6:27 AM, Jeff Kell wrote:



Alexander Harrowell wrote:


It was clear from the highly reliable index I call the "Nanogdex"  
that nothing was seriously amiss.


Yes, but it got so much bloody press that ambitious copycats can't  
be too far behind.


When 2 of 13 root systems are affected (>90% loss), how many systems  
will withstand such an attack when targeted lower within the  
hierarchy?  FWIW, the attack rates did not seem that high.


-Doug


Re: Hackers hit key Internet traffic computers

2007-02-07 Thread Hank Zannini


> But that aspect was wasted time, since they're putting Ma Bell back
> together again...

Speaking of putting Ma Bell Back together again - you have to
see this You Tube Video on AT&T - before they yank it. It does
accurately chronicle the AT&T divestiture and Assembly again.


http://www.youtube.com/watch?v=YtFtcp4mNzA

ENJOY.

Cheers,

Hank





Re: Hackers hit key Internet traffic computers

2007-02-07 Thread Steven M. Bellovin

On Wed, 7 Feb 2007 10:17:34 -0800
"Aaron Glenn" <[EMAIL PROTECTED]> wrote:

> 
> On 2/7/07, Alexander Harrowell <[EMAIL PROTECTED]> wrote:
> >
> > A caveat - Ndex 4 is usually "situation normal, members bored and
> > discussing the relative merits of the Chicago and Kansas City cable
> > tie knots."
> >
> 
> to be fair that was a pretty informative discussion for those of us
> who were still wearing diapers when ma bell was broken up.
> 
But that aspect was wasted time, since they're putting Ma Bell back
together again...


--Steve Bellovin, http://www.cs.columbia.edu/~smb


Re: Hackers hit key Internet traffic computers

2007-02-07 Thread Aaron Glenn


On 2/7/07, Alexander Harrowell <[EMAIL PROTECTED]> wrote:


A caveat - Ndex 4 is usually "situation normal, members bored and
discussing the relative merits of the Chicago and Kansas City cable
tie knots."



to be fair that was a pretty informative discussion for those of us
who were still wearing diapers when ma bell was broken up.


Re: Hackers hit key Internet traffic computers

2007-02-07 Thread Jeff Kell

Alexander Harrowell wrote:
>
> It was clear from the highly reliable index I call the "Nanogdex" that
> nothing was seriously amiss.

Yes, but it got so much bloody press that ambitious copycats can't be
too far behind.

Jeff



Re: Hackers hit key Internet traffic computers

2007-02-07 Thread Alexander Harrowell


It was clear from the highly reliable index I call the "Nanogdex" that
nothing was seriously amiss.

Ndex value of 0, i.e. no traffic on-list, means either "all systems
go!" or "outage so serious that Mitre is unreachable. Stockpile
ammunition"

Ndex value of 5, i.e. +/=100 mails/day, means "serious crisis"

A caveat - Ndex 4 is usually "situation normal, members bored and
discussing the relative merits of the Chicago and Kansas City cable
tie knots."