Re: Creating a crystal clear and pure Internet
On Tue, Nov 27, 2007 at 09:38:40AM -0500, Sean Donelan wrote: Some people have compared unwanted Internet traffic to water pollution, and proposed that ISPs should be required to be like water utilities and be responsible for keeping the Internet water crystal clear and pure. Several new projects have started around the world to achieve those goals. ITU anti-botnet initiative http://www.itu.int/ITU-D/cyb/cybersecurity/projects/botnet.html I'm not sure how to reconcile two things: 1) e2e principle -- if someone starts doing some new proto 66 thing, how do you make sure it's accessible? 2) protection from unwanted garbage. I don't really want all these 404 byte udp/1434 packets anymore but the networks that originate them don't seem to care or notice they're still infected. one persons unsolicated traffic is anothers debgging/research project. I was at a thanksgiving party and made the following postulation: Within the next 2 major software releases (Microsoft OS) they're going to by default require signed binaries. This will be the only viable solution to the malware threat. Other operating systems may follow. (This was a WAG, based on gut feeling). This has some interesting implications and would require Microsoft to be a bit more small-app friendly, and there'd be a knob to twiddle if you're a developer and don't want to check signatures, but it's one of the few ways to resolve the issues IMHO, and cut down on the infections. So what if I own you via your browser, unless the malware i push to your host is signed, it's not gonna run. Game [closer to] over. - Jared -- Jared Mauch | pgp key available via finger from [EMAIL PROTECTED] clue++; | http://puck.nether.net/~jared/ My statements are only mine.
Creating a crystal clear and pure Internet
Some people have compared unwanted Internet traffic to water pollution, and proposed that ISPs should be required to be like water utilities and be responsible for keeping the Internet water crystal clear and pure. Several new projects have started around the world to achieve those goals. ITU anti-botnet initiative http://www.itu.int/ITU-D/cyb/cybersecurity/projects/botnet.html France anti-piracy initiative http://www.culture.gouv.fr/culture/actualites/index-olivennes231107.htm
RE: Creating a crystal clear and pure Internet
No offense, but I think this is an overly political topic, and we just saw that politics are not supposed to be discussed. There is a huge political debate on what ISP's should and should not be doing to traffic that flows through their systems. There are other groups, like NNsquad, where these types of conversations are welcome, but even there on the forums, not the mailing list. But, if it's not viewed as political then... Your analogy is flawed, because the Internet is not a pipe system and ISP's are not your local water utility. And, there are many different ways that water utilities are handled in different parts of the world. In the US, most if not all water utilities are handled by the government, usually the county government where I'm from. ISP's are not government run, and can't be compared to a water utility for that simple reason. They don't have the same legal (again, an issue that is not supposed to be discussed, according to the AUP) requirements nor the legal protections available to governments (you can't sue most governments). And my personal opinion is that ISP's should not do anything to the traffic that passes through their network as far as filtering. The only discriminatory behavior that should be allowed is for QoS, to treat specific types or traffic in a different manner to give preferential treatment to specific classifications of traffic. My definition of QoS for the purposes of this discussion, if it is allowed to continue, would not include shaping or policing. If an ISP says you have a 5Mb downstream and a 512K upstream, you should actually be allowed to send 512K upstream all the time. However, that's not to say that an ISP should not be able to classify traffic as scavenger over a particular threshold, and preferentially drop that traffic at their overprescribed uplink if that is a bottleneck. The end user should also be allowed to specify their own QoS markings, and they should be honored as long as they don't go over specific thresholds as imposed, and documented, by the ISP. For example, the customer should be able to self-classify certain traffic as high priority (VoIP) and certain as low (P2P), but if the customer classified all traffic as high priority the ISP is free to remark anything over a set threshold (say 128K) as a lower priority, but NOT police it. If you want to use an analogy, ISP's are more like private road systems and owners, using public lands that have been given a right to use said public lands for private profits with specific restrictions. Some restrictions may be that you can't discriminate on the payload (and kind of identifying category for passengers, such as race, ethnicity, gender, etc, which in the network world would map to type of protocol or payload content, such as P2P traffic or email), but that you can create an HOV lane for high occupancy vehicles (QoS). Of course, ISP's are allowed to make sure the vehicles are in proper working condition (checking that various layer headers are in compliance). Much like with the self-marking of traffic with QoS tags, the customer should also be able to make their own decision and pack two other people in the car in order to get into that HOV lane. However, if the users of the road try and pack everything into the HOV lane, they can be reclassified (busses may have to pay a higher fee to use the road). However, in this world of religious warfare (another banned topic, I'm sure!) it is recognized that a certain level of profiling is acceptable. So, it may be O.K. for ISP's to profile and deny traffic depending on the payload only for specific types of traffic that have been shown to cause issues, and/or only be present for nefarious reasons. Examples may be known signatures for virus attacks, worms, or Trojans. Other examples may be identifying characteristics for SPAM (I'm reluctant to say excessive email traffic because I don't believe that is a proper identifying characteristic, I should be able to run my own SMTP server and send out as much legitimate email as I want). I realize that my views probably won't be shared by the vast majority of ISP's, and hence are overly political for this group. That's why I think any discussion is not necessarily on-topic. Thanks, Fred Reimer, CISSP, CCNP, CQS-VPN, CQS-ISS Senior Network Engineer Coleman Technologies, Inc. 954-298-1697 -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Sean Donelan Sent: Tuesday, November 27, 2007 9:39 AM To: nanog@merit.edu Subject: Creating a crystal clear and pure Internet Some people have compared unwanted Internet traffic to water pollution, and proposed that ISPs should be required to be like water utilities and be responsible for keeping the Internet water crystal clear and pure. Several new projects have started around the world to achieve those goals. ITU anti-botnet initiative http://www.itu.int/ITU-
Re: Creating a crystal clear and pure Internet
On Tue, 27 Nov 2007 09:38:40 EST, Sean Donelan said: Some people have compared unwanted Internet traffic to water pollution, and proposed that ISPs should be required to be like water utilities and be responsible for keeping the Internet water crystal clear and pure. What's the networking equivalent of remember to build your water intake *upstream* of your sewage plant? Or, more accurately - how do you get all those people with private wells^Wcomputers to *not* insist on building their leach fields uphill of their wells?. There's a limit to what an ISP can do to make it crustal clear and pure without an incredibly intrusive presence. The technically easy way is what many corporations do - Borg the boxes into an Active Directory domain, and impose fascist controls via Group Policy (for all of my anti-MS ranting, I'll grant the AD/GP stuff *is* pretty slick ideas for corporate PC lockdown). But how do you sell that idea to the consumer user? pgpwWapy2KQXO.pgp Description: PGP signature
Re: Creating a crystal clear and pure Internet
On Tue, 27 Nov 2007 10:03:55 EST, Jared Mauch said: Within the next 2 major software releases (Microsoft OS) they're going to by default require signed binaries. This will be the only viable solution to the malware threat. Other operating systems may follow. (This was a WAG, based on gut feeling). This has some interesting implications and would require Microsoft to be a bit more small-app friendly, and there'd be a knob to twiddle if you're a developer and don't want to check signatures, but it's one of the few ways to resolve the issues IMHO, and cut down on the infections. So what if I own you via your browser, unless the malware i push to your host is signed, it's not gonna run. Game [closer to] over. The problem with active content is that an exploit will quite happily run in the security context of the browser - and way too many sites insist on either/both Flash and Javascript. Ever notice that there's been far fewer pure Java based problems? That's because it started off with a semi-sane security model. Flash and Javascript didn't. And you can't allow the browser to create executables, obviously. Unfortunately, that *also* means that you can't allow the user to use the browser to download patches, updates, and new software (Well - it's at least theoretically *doable* in the right Trusted Computing type of scenario, but I doubt we're going to get users to buy into it...) pgplPEsvocSBV.pgp Description: PGP signature
Re: Creating a crystal clear and pure Internet
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Sean Donelan [EMAIL PROTECTED] wrote: Some people have compared unwanted Internet traffic to water pollution, and proposed that ISPs should be required to be like water utilities and be responsible for keeping the Internet water crystal clear and pure. Several new projects have started around the world to achieve those goals. ITU anti-botnet initiative http://www.itu.int/ITU-D/cyb/cybersecurity/projects/botnet.html France anti-piracy initiative http://www.culture.gouv.fr/culture/actualites/index-olivennes231107.htm Sean, Are you purposefully trolling the list? ;-) - - ferg -BEGIN PGP SIGNATURE- Version: PGP Desktop 9.6.3 (Build 3017) wj8DBQFHTD1Zq1pz9mNUZTMRAkhQAKD4Am49VJFPMQVIu3W1NvVbZ3a7fgCffC7d Fl1bTvyHzkiaVPGUAapjYeQ= =/xQQ -END PGP SIGNATURE- -- Fergie, a.k.a. Paul Ferguson Engineering Architecture for the Internet fergdawg(at)netzero.net ferg's tech blog: http://fergdawg.blogspot.com/
Re: Creating a crystal clear and pure Internet
On Tue, Nov 27, 2007 at 10:18:47AM -0500, Fred Reimer wrote: No offense, but I think this is an overly political topic, and we just saw that politics are not supposed to be discussed. There is a huge political debate on what ISP's should and should not be doing to traffic that flows through their systems. There are other groups, like NNsquad, where these types of conversations are welcome, but even there on the forums, not the mailing list. But, if it's not viewed as political then... [SNIP!] And my personal opinion is that ISP's should not do anything to the traffic that passes through their network as far as filtering. The only discriminatory behavior that should be allowed is for QoS, to treat specific types or traffic in a different manner to give preferential treatment to specific classifications of traffic. My definition of QoS for the [SNIP!] Welcome to the non-regulated world. I think this is a general call to engage in these activities. The last thing I think most of us want to have happen is to wake up be regulated like the Chemical sector became, eg: http://www.dhs.gov/xprevprot/laws/gc_1166796969417.shtm There is an operational part of this whole internet thing that does matter, and I have to say, we can't just ignore the activities at the recent Rio, ITU, or other things. Without clued engagement will the policy wonks make the right choices/decisions? This does impact network operations. Take for example the FCC stuff on the emergency alert system. (excerpt from federal register follows) -- register excerpt -- Contra Costa states just as the Internet Protocols enable various kinds of computers to work together, CAP can provide the basis for a secure ``warning internet'' that can leverage all our warning assets to achieve more than any single system can alone. -- register excerpt -- Perhaps you don't care about this stuff, but maybe you'll soon be required to have your EAS testpoint connected to the local PSAP for them to do reverse-911 or other activities to users with naked dsl, etc.. If you think this doesn't impact your operational network or have the potential to, you're sorely mistaken. If you're not engaged, you may become blindsided by costs that you're unable to recover from and cause your network to close due to bankruptcy. I could be insane in thinking this, but I think we're in that time of the lifecycle where we need to be on-guard. - Jared -- Jared Mauch | pgp key available via finger from [EMAIL PROTECTED] clue++; | http://puck.nether.net/~jared/ My statements are only mine.
RE: Creating a crystal clear and pure Internet
Rather than go after distilled water via reverse osmosis, I think a carbon filter would be a good place to start. Frank -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Sean Donelan Sent: Tuesday, November 27, 2007 8:39 AM To: nanog@merit.edu Subject: Creating a crystal clear and pure Internet Some people have compared unwanted Internet traffic to water pollution, and proposed that ISPs should be required to be like water utilities and be responsible for keeping the Internet water crystal clear and pure. Several new projects have started around the world to achieve those goals. ITU anti-botnet initiative http://www.itu.int/ITU-D/cyb/cybersecurity/projects/botnet.html France anti-piracy initiative http://www.culture.gouv.fr/culture/actualites/index-olivennes231107.htm
Re: Creating a crystal clear and pure Internet
On Nov 27, 2007, at 7:03 AM, Jared Mauch wrote: Other operating systems may follow. (This was a WAG, based on gut feeling). Nokia by default require app installed on the phones to be signed, though one can disable this functionality (and in fact must, in order to run many of the desirable applications). It's been stated in the press that Apple are doing this with the iPhone SDK, too. --- Roland Dobbins [EMAIL PROTECTED] // 408.527.6376 voice Culture eats strategy for breakfast. -- Ford Motor Company
Re: Creating a crystal clear and pure Internet
On Tue, Nov 27, 2007 at 09:38:40AM -0500, Sean Donelan wrote: Some people have compared unwanted Internet traffic to water pollution, and proposed that ISPs should be required to be like water utilities and be responsible for keeping the Internet water crystal clear and pure. Quoting Wu Ming: Take everybody's ideas of clear and pure and overlay them and pretty soon the only things allowed to be sent over the Internet will be Shakespeare and the Bible, and much of that's a grey area anyway.
Re: Creating a crystal clear and pure Internet
On Tue, Nov 27, 2007 at 09:38:40AM -0500, Sean Donelan wrote: Some people have compared unwanted Internet traffic to water pollution, and proposed that ISPs should be required to be like water utilities and be responsible for keeping the Internet water crystal clear and pure. Yes -- well, not unwanted IMHO, but abusive. (Much traffic that's unwanted is not abusive. For example, in the view of some readers of this mailing list, some of the longer/more caustic/repetitive debates might very well be unwanted. But that traffic is clearly not abusive.) Several new projects have started around the world to achieve those goals. ITU anti-botnet initiative [snip France anti-piracy initiative Only the first one has anything to do with keeping the Internet clean; the second is a political cave-in to the copyright cartel. I see a (mostly) clear line between things that are abusive of the Internet, systems connected to it, and users of those systems and content that's unwanted, offensive, or claimed to be covered under someone's interpretation of IP law. The first category contains things like spam, phishing, spyware, spam/phishing/spyware support services (dns, web hosting, maildrops), DoS attacks, hijacked networks, etc. The second category contains things like porn, religion, politics, music, movies via whatever means are used to convey them (mail, web, p2p, etc.) all of which are certain to irritate someone, somewhere, and much of which could probably be construed (by a sufficiently creative legal practicioner) to infringe on somebody's IP. In my view, it's the responsibility of everyone on the net to do whatever they can to squelch the first. But they have no obligations at all when it comes to the second -- that way lies the slippery slope of content policing and censorship. ---Rsk
Re: Creating a crystal clear and pure Internet
Roland Dobbins wrote: On Nov 27, 2007, at 7:03 AM, Jared Mauch wrote: Other operating systems may follow. (This was a WAG, based on gut feeling). Nokia by default require app installed on the phones to be signed, though one can disable this functionality (and in fact must, in order to run many of the desirable applications). It's been stated in the press that Apple are doing this with the iPhone SDK, too. It is a nearly ubiquitous solution for mobile phones, though many of the actual implementations have been subverted at one time or other, and users actually updating the firmware of their mobile devices is actually a rather infrequent event. So while they utilize this approach it is not a panacea and they have a ways to go themselves. --- Roland Dobbins [EMAIL PROTECTED] // 408.527.6376 voice Culture eats strategy for breakfast. -- Ford Motor Company
RE: Creating a crystal clear and pure Internet
But, if it's not viewed as political then... Your analogy is flawed, because the Internet is not a pipe system and ISP's are not your local water utility. And the internet is not a big truck! It'sIt's a series of tubes! Sorry, I couldn't resist... with all these things clogging all the tubes. :-) -Jerry
[admin] RE: Creating a crystal clear and pure Internet
On Tue, 27 Nov 2007, Jerry Pasker wrote: But, if it's not viewed as political then... Your analogy is flawed, because the Internet is not a pipe system and ISP's are not your local water utility. And the internet is not a big truck! It'sIt's a series of tubes! Sorry, I couldn't resist... with all these things clogging all the tubes. :-) I'd like to draw attention to nanog AUP, particularly #6: Postings of political, philosophical, and legal nature are prohibited. While the regulation of internet by filtering bad traffic is clearly political and/or legal, I do think the *technical* implication of it are very much on-topic. After all, once this happens, we as network operators will be responsible for the filtering. Given that, I'd like to ask everyone to refrain off-hand comments about tubes and dump trucks - we all hear this joke every day. Discussion of morality of such filtering is also off-topic. Discussion of implementation of such filtering and effect of it on network operations at-large is clearly on-topic. Discussion of separating traffic (by network operators) into bad and good is also on-topic. The list is about technology and operations. This is not ITU. This is not C-SPAN. This is not 'general banter among network operators' list either. Before you post to the list, think - would you want to make a presentation at NANOG-conference based on your post? If it doesn't feel appropriate, the list post is similarly inappropriate. Also, this is another reminder that MLC *will* be giving formal warnings (which will eventually lead to removal from the list) to those who continue to post off-topic messages. As usual, should you wish to discuss this post, please do so on nanog-futures (reply-to has been set accordingly). Thanks! -alex [mlc chair]
Re: Creating a crystal clear and pure Internet
On November 27, 2007 at 09:38 [EMAIL PROTECTED] (Sean Donelan) wrote: Some people have compared unwanted Internet traffic to water pollution, and proposed that ISPs should be required to be like water utilities and be responsible for keeping the Internet water crystal clear and pure. Several new projects have started around the world to achieve those goals. On a related note: FCC Could Extend Reach To Cable TV Vote Scheduled for Today May Open Door to Regulation http://www.washingtonpost.com/wp-dyn/content/story/2007/11/26/ST2007112602204.html Basically the FCC is being broken out of their cage of broadcast spectrum and telephone monopolies only and being given the power to regulate cable TV content. No doubt internet content can't be far behind, the boundaries have just disappeared and all that's left is whatever seems to us to be in the interest of the public. The FCC is being turned into The Ministry of Censorship before your eyes. The pretext is consumer pricing (unbundling etc) but go look at sites like http://www.parentstv.org (Parents Televsion Council), they're already gunning for the FCC's new power over cable content to install their own agenda. If anyone doesn't think this is operational they're missing the point. Making the net as clean and wholesome as prime time TV is going to fall in the laps of operations. And that's where this is going, fast. ITU anti-botnet initiative http://www.itu.int/ITU-D/cyb/cybersecurity/projects/botnet.html France anti-piracy initiative http://www.culture.gouv.fr/culture/actualites/index-olivennes231107.htm -- -Barry Shein The World | [EMAIL PROTECTED] | http://www.TheWorld.com Purveyors to the Trade | Voice: 800-THE-WRLD| Login: Nationwide Software Tool Die| Public Access Internet | SINCE 1989 *oo*
Re: [admin] RE: Creating a crystal clear and pure Internet
personal opinion the position that politics, culture, and society have no place in internet operations is beyond even an ostrich. they bloody *drive* the car. while we're at it, why not eliminate finances too? sheesh! randy
Re: Creating a crystal clear and pure Internet
* Jared Mauch: Within the next 2 major software releases (Microsoft OS) they're going to by default require signed binaries. This will be the only viable solution to the malware threat. Other operating systems may follow. (This was a WAG, based on gut feeling). The code signing CAs have never been subject to serious attack. It's unlikely that they are sufficiently robust for this scheme to work on a large scale. There's also the issue that you can't reliably tell data (which, presumably, does not need to be signed) from code.
Re: Creating a crystal clear and pure Internet
On Nov 27, 2007, at 4:04 PM, Florian Weimer wrote: * Jared Mauch: Within the next 2 major software releases (Microsoft OS) they're going to by default require signed binaries. This will be the only viable solution to the malware threat. Other operating systems may follow. (This was a WAG, based on gut feeling). The code signing CAs have never been subject to serious attack. It's unlikely that they are sufficiently robust for this scheme to work on a large scale. One would hope that the CA's wouldn't be connected to an attack path... The revocation stuff should be distributable if it's not already.
RE: Creating a crystal clear and pure Internet
You're not familiar with that incident where VeriSign granted two certificates to a Microsoft Corporation to hackers? http://www.news.com/2100-1001-254586.html Fred Reimer, CISSP, CCNP, CQS-VPN, CQS-ISS Senior Network Engineer Coleman Technologies, Inc. 954-298-1697 -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of John Payne Sent: Tuesday, November 27, 2007 4:32 PM To: Florian Weimer Cc: Jared Mauch; Sean Donelan; nanog@merit.edu Subject: Re: Creating a crystal clear and pure Internet On Nov 27, 2007, at 4:04 PM, Florian Weimer wrote: One would hope that the CA's wouldn't be connected to an attack path... The revocation stuff should be distributable if it's not already. smime.p7s Description: S/MIME cryptographic signature
Re: Creating a crystal clear and pure Internet
On Tue, 27 Nov 2007 22:04:23 +0100, Florian Weimer said: There's also the issue that you can't reliably tell data (which, presumably, does not need to be signed) from code. And active content is what happens when you *intentionally* blur the data/ code distinction. Unfortunately, it's (a) wildly popular with users and (b) usually horribly done from a security standpoint. Unfortunately, Web 2.0 with its glue stuff together approach looks like it's just going to make things even worse, as clueless developers wedge stuff together with dangerous interactions and synergies pgpkvMD8FcvE4.pgp Description: PGP signature
need help with global ipv6 topology measurement
if you have ipv6 connectivity and are willing to volunteer some (low bandwidth) v6 traceroute data to a good cause (== a topology map of observed ipv6 connectivity), please help us out for a few ( estimated 15) min with: http://www.caida.org/data/how-to/scamper/ipv6-collection-2007/ please share w all your ipv6friends, k
Re: Creating a crystal clear and pure Internet
[EMAIL PROTECTED] wrote: On Tue, 27 Nov 2007 09:38:40 EST, Sean Donelan said: Some people have compared unwanted Internet traffic to water pollution, and proposed that ISPs should be required to be like water utilities and be responsible for keeping the Internet water crystal clear and pure. What's the networking equivalent of remember to build your water intake *upstream* of your sewage plant? Or, more accurately - how do you get all those people with private wells^Wcomputers to *not* insist on building their leach fields uphill of their wells?. There's a limit to what an ISP can do to make it crustal clear and pure without an incredibly intrusive presence. The technically easy way is what many corporations do - Borg the boxes into an Active Directory domain, and impose fascist controls via Group Policy (for all of my anti-MS ranting, I'll grant the AD/GP stuff *is* pretty slick ideas for corporate PC lockdown). But how do you sell that idea to the consumer user? I think we'd have to standardize on what our networking equivalent of water is. Are we talking about just port 80 traffic? Just email? A water utility is not an open network, nor is it bidirectional. If I want to start transporting Koolaid, I need to take the water from the utility, and create my own distribution network outside of the water utility; I can't lease capacity from the water utility. If all we were carrying were unidirectional traffic, crystal clean would be very easy. If all we were carrying was port 80 traffic, pure would be easy. A better analogy would be make sure all the roads and vehicles on it were crystal clean and pure/efficient -- hell, I'd settle for insured. IMO, an intrusive Internet (ignoring the political talk about MSFT or not) would not be the Internet, but just a proprietary network [pick your flavor]. But rather than debate technology, I think regulators/operators/etc would need to settle on an unambiguous definition of what is carried and what isn't to be carried, at what quality level for a given level of service. Deepak Jain AiNET
Re: NeXT Default Network
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Could someone please tell me what 192.42.172.0/24 is or why it should be handled as a special prefix? ftp://ftp-eng.cisco.com/cons/isp/security/Ingress-Prefix-Filter- Templates/T-ip-prefix-filter-ingress-strict-check-v18.txt You might review the notes I list below, and specifically RFC 3330. They mention the prefix neither by name or by value... I would expect that this had something to do with a company called NeXT and an operating system called NextStep. It sounds like they came up with a variety of site-local address pre-RFC1918 and pre- RFC3927 that did something similar to RFC 3927 addresses. This is mentioned in passing in RFCs 1117 and 1166. The big question is - are there any NextStep systems still in use (I last used one in 1990), and whether they have been configured with other addresses (seems likely, especially in a DHCP world). http://www.ietf.org/rfc/rfc3330.txt 3330 Special-Use IPv4 Addresses. IANA. September 2002. (Format: TXT=16200 bytes) (Status: INFORMATIONAL) http://www.ietf.org/rfc/rfc3789.txt 3789 Introduction to the Survey of IPv4 Addresses in Currently Deployed IETF Standards Track and Experimental Documents. P. Nesser, II, A. Bergstrom, Ed.. June 2004. (Format: TXT=22842 bytes) (Status: INFORMATIONAL) http://www.ietf.org/rfc/rfc3790.txt 3790 Survey of IPv4 Addresses in Currently Deployed IETF Internet Area Standards Track and Experimental Documents. C. Mickles, Ed., P. Nesser, II. June 2004. (Format: TXT=102694 bytes) (Status: INFORMATIONAL) http://www.ietf.org/rfc/rfc3791.txt 3791 Survey of IPv4 Addresses in Currently Deployed IETF Routing Area Standards Track and Experimental Documents. C. Olvera, P. Nesser, II. June 2004. (Format: TXT=27567 bytes) (Status: INFORMATIONAL) http://www.ietf.org/rfc/rfc3792.txt 3792 Survey of IPv4 Addresses in Currently Deployed IETF Security Area Standards Track and Experimental Documents. P. Nesser, II, A. Bergstrom, Ed.. June 2004. (Format: TXT=46398 bytes) (Status: INFORMATIONAL) http://www.ietf.org/rfc/rfc3793.txt 3793 Survey of IPv4 Addresses in Currently Deployed IETF Sub-IP Area Standards Track and Experimental Documents. P. Nesser, II, A. Bergstrom, Ed.. June 2004. (Format: TXT=11624 bytes) (Status: INFORMATIONAL) http://www.ietf.org/rfc/rfc3794.txt 3794 Survey of IPv4 Addresses in Currently Deployed IETF Transport Area Standards Track and Experimental Documents. P. Nesser, II, A. Bergstrom, Ed.. June 2004. (Format: TXT=60001 bytes) (Status: INFORMATIONAL) http://www.ietf.org/rfc/rfc3795.txt 3795 Survey of IPv4 Addresses in Currently Deployed IETF Application Area Standards Track and Experimental Documents. R. Sofia, P. Nesser, II. June 2004. (Format: TXT=92584 bytes) (Status: INFORMATIONAL) http://www.ietf.org/rfc/rfc3796.txt 3796 Survey of IPv4 Addresses in Currently Deployed IETF Operations Management Area Standards Track and Experimental Documents. P. Nesser, II, A. Bergstrom, Ed.. June 2004. (Format: TXT=78400 bytes) (Status: INFORMATIONAL) -BEGIN PGP SIGNATURE- iD8DBQFHTLSMbjEdbHIsm0MRAssIAKDxNy0f4IjveLjyfrxGTkGuslSZ9QCgroID E53IZ9u0/CnSmbKfWn9j7wI= =n0CU -END PGP SIGNATURE-
Re: NeXT Default Network
Fred, Brandon, Spiro, Thanks for all your answers. operating system called NextStep. It sounds like they came up with a variety of site-local address pre-RFC1918 and pre-RFC3927 that did something similar to RFC 3927 addresses. That's it. 192.42.172.0/24 is often used in examples, but I also found in the Automatic Host Addition chapter of http://www.levenez.com/NeXTSTEP/netinfo_user_guide.pdf the following: The second property, configuration_ipaddr, is required and specifies the address that must not be allocated by nibootpd. This address is in fact the address that NeXT uses to identify a new workstation temporarily during the boot process. It should always be set to 192.42.172.253 explicitly. It looks like this /24 is (was) a must for their Automatic Host Addition process. So now I see how this prefix got into Barry's list. Andras
Running Application when Network Connection Detected
Hey, Fairly certain this isn't the place for this but I've exhausted my googling and I'm sure someone here may know. I was looking for an application that will detect when you connect to a specific wireless network that when connected automatically run a specified application. Any ideas? Thanks! -Ray
RE: Running Application when Network Connection Detected
Are you talking about Wi-Fi? I believe IBM's connection manager can do that. Frank -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Raymond L. Corbin Sent: Tuesday, November 27, 2007 9:12 PM To: nanog Subject: Running Application when Network Connection Detected Hey, Fairly certain this isn't the place for this but I've exhausted my googling and I'm sure someone here may know. I was looking for an application that will detect when you connect to a specific wireless network that when connected automatically run a specified application. Any ideas? Thanks! -Ray
RE: Running Application when Network Connection Detected
Ah. Sorry, guess that would be important. Win XP Thanks, -Ray -Original Message- From: Paul Fleming [mailto:[EMAIL PROTECTED] Sent: Tuesday, November 27, 2007 10:28 PM To: Raymond L. Corbin Cc: nanog Subject: Re: Running Application when Network Connection Detected -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 What OS? Raymond L. Corbin wrote: Hey, Fairly certain this isn't the place for this but I've exhausted my googling and I'm sure someone here may know. I was looking for an application that will detect when you connect to a specific wireless network that when connected automatically run a specified application. Any ideas? Thanks! -Ray - -- Paul Fleming Network Operations Hostdime.com Inc Cell:407.468.4646 -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.3 (MingW32) iD8DBQFHTOA5wlPOUqXUp3MRAh4cAKCL5opxZehwnZ07nv+JcljjlvV+nACfavPk ja8Y+SKxJDN78EyffHk94q4= =KXXf -END PGP SIGNATURE-
RE: Running Application when Network Connection Detected
Ah. Sorry, guess that would be important. Win XP If you are willing to do some (dot net) scripting, look at the information at: http://msdn2.microsoft.com/en-us/library/ms700657.aspx Receiving notifications when things change Gary
RE: Running Application when Network Connection Detected
I have done this in troubleshooting an OSPF issue where we needed to immediately grab logs from a buffer that had only limited size when the adjacency reset due to a dead timer. If you have WildPackets OmniPeek analzyer its easy if you understand the protocol operations you need to filter on. I simply created a filter for the specific packet (in this case OSPF Master Bit). Whenever the analyzer would see the specific packet it would launch an executable file. I used SecureCRT's scripting language to have it log into the router and save off whatever show commands I needed. You can also have it syslog, snmp-trap, or send an email.