Re: Looking for Verizon-GNI network engineer

2008-02-16 Thread Henry Linneweh
It has been my experience that data center engineers doing NOC support at 
Verizon
do speak to paying customers about routing issues for premium data center 
services.

-Henry

- Original Message 
From: K. Scott Bethke [EMAIL PROTECTED]
To: nanog@merit.edu
Sent: Thursday, February 14, 2008 6:49:13 PM
Subject: Looking for Verizon-GNI network engineer


Sorry if this is off-topic frustration has set in.  I've got what  
looks like a routing loop or a wedge in your network and I cant get  
past tier2 saying it is an internet problem.  I asked to speak with  
an engineer directly was told Verizon engineers don't talk directly  
with customers.  Issue going on for 4 days.

$ traceroute www.tickerforum.org
traceroute to www.tickerforum.org (70.169.168.7), 64 hops max, 40 byte  
packets
  1  10.254.123.1 (10.254.123.1)  3.219 ms  1.085 ms  0.915 ms
  2  L301.VFTTP-02.CLPPVA.verizon-gni.net (71.171.93.1)  6.329 ms  
6.281 ms  5.036 ms
  3  P2-3.LCR-02.CLPPVA.verizon-gni.net (130.81.37.194)  4.885 ms  
4.091 ms  6.490 ms
  4  so-7-0-0-0.PEER-RTR1.ASH.verizon-gni.net (130.81.10.94)  4.731  
ms  8.248 ms  5.167 ms
  5  130.81.15.238 (130.81.15.238)  5.926 ms 130.81.15.190  
(130.81.15.190)  6.586 ms  9.158 ms
  6  * * *
  7  * * *
  8  *


$ traceroute www.google.com
traceroute: Warning: www.google.com has multiple addresses; using  
64.233.169.104
traceroute to www.l.google.com (64.233.169.104), 64 hops max, 40 byte  
packets
  1  10.254.123.1 (10.254.123.1)  1.774 ms  1.117 ms  0.909 ms
  2  L301.VFTTP-02.CLPPVA.verizon-gni.net (71.171.93.1)  5.820 ms  
4.029 ms  4.861 ms
  3  P2-3.LCR-01.CLPPVA.verizon-gni.net (130.81.37.192)  8.036 ms  
6.346 ms  7.671 ms
  4  so-6-3-1-0.BB-RTR2.RES.verizon-gni.net (130.81.29.82)  6.524 ms  
8.161 ms  8.408 ms
  5  * * *
  6  * * *

Ticket # is VAD01QVDW

-Scott

Re: Network Notifcation - SMS via Verizon

2008-02-14 Thread Henry Linneweh

I found this product of particular interest...
http://www.scomobile.com/hipcheck/

-Henry

- Original Message 
From: Bowman, Jonathan [EMAIL PROTECTED]
To: nanog@merit.edu
Sent: Tuesday, February 12, 2008 10:24:55 AM
Subject: RE: Network Notifcation - SMS via Verizon


I've used 10 digit number@vtext.com with my Verizon phone for several
years now without any issues or dropped SMS messages.  Obviously that's
an in-band solution, but it's simple to implement and fairly (in my
experience) reliable.

-Jonathan

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Gregory Boehnlein
Sent: Friday, February 08, 2008 7:03 PM
To: nanog@merit.edu
Subject: Network Notifcation - SMS via Verizon


Hello,
We have been discussing adding a wireless SMS based option to
our
TAP and SMTP delivery systems. We are running Nagios. In looking at the
list
archives, I found the following thread:

http://www.irbs.net/internet/nanog/0408/0039.html

Lots of great suggestions.. In looking at the options, it seems that
Gnokii
seems to be a well used solution to integrate a GSM or GPRS based
phone/modem for text messaging.

However, I am trying to determine if anyone is doing this with Verizon
right
now. Our existing Cell contract is w/ Verizon and so we want to avoid
the
potential of lost SMS messages in hopping from say T-mobile or Cingular
to
Verizon.

So.. anyone doing SMS notification to Verizon w/ a wireless GSM/GPRS or
Cell
Phone solution? If so, you want to share how you are doing it?

Thanks in advance..


Re: European ISP enables IPv6 for all?

2007-12-19 Thread Henry Linneweh

I was able to reach the japanse link which provided me with 
http://www.ipv6.org/howtos.html and
http://www.wide.ad.jp/

-Henry

- Original Message 
From: Steven Haigh [EMAIL PROTECTED]
To: Jeroen Massar [EMAIL PROTECTED]
Cc: Vassili Tchersky [EMAIL PROTECTED]; Alain Durand [EMAIL PROTECTED]; 
nanog@merit.edu
Sent: Tuesday, December 18, 2007 1:39:01 AM
Subject: Re: European ISP enables IPv6 for all?


On Tue, Dec 18, 2007 at 10:09:16AM +0100, Jeroen Massar wrote:
 Vassili Tchersky wrote:
 [..]
 
  XS4All (Netherlands) is providing the same service if I correctly remember.
 
 They used to have a product called PowerDSL, which did IPv6 over
 PPPv6, but apparently due to changes in the infra they had to drop this.
 XS4all does still, since about 2001 or so, provide a tunnelbroker to
 their own users. Every user can simply go to the service.xs4all.nl site,
 and view/modify their tunnel + subnet configuration there. Only static
 tunnels are supported though (at least this is afaik).

It's kind of interesting that from 2001ish to current day and there is still
only a handful of service providers worldwide that seem to offer *any* kind
of support for IPv6.

After all the propaganda, is there actually any other major deployments in
the IPv6 space?

From the ipv6.org web site, I see Most of today's internet uses IPv4, which
is now nearly twenty years old. - read as it works well!

 IPv4 has been remarkably resilient in spite of its age, but it is beginning
to have problems. - Really? Every network I know using IPv4 still works as
designed.

Most importantly, there is a growing shortage of IPv4 addresses, which are
needed by all new machines added to the Internet. - I'm sure there's a lot
more ways around this - and I'm sure the NANOG archives have a lot of thought
food there.

It also adds many improvements to IPv4 in areas such as routing and network
autoconfiguration. - I would really love to know what these are that DHCP etc
doesn't already do. I tried to check out the FAQ at http://faq.v6.wide.ad.jp/
but it wasn't reachable - maybe it needs IPv6 connectivity? As for routing
'improvements', doesn't more address space just give us more routes to handle?

IPv6 is expected to gradually replace IPv4, with the two coexisting for a
number of years during a transition period. - so this 'transition period' has
been, what, 7 years so far? I'm still predicting that it'll be at least another
10 years before IPv6 amounts to much...

On a side note, does anyone currently have issues getting new address space
where it's operationally required? I don't know anyone first hand who has yet
to come across this issue...

-- 
Steven Haigh

Email: [EMAIL PROTECTED]
Web: http://www.crc.id.au
Phone: (03) 9001 6090 - 0412 935 897

C:\WINDOWS C:\WINDOWS\GO C:\PC\CRAWL


Re: Is it my imagination or are countless operations impacted today with mysql meltdowns

2006-08-27 Thread Henry Linneweh

I think you are just a rude person and I have been on this list since about 
1995 and there is a real 
problem with the lastest cpanel upgrade with mysql and it took out 1 of my 
server configurations, that we host
peoples businesses on and I wanted to see how many other isp's were affected 
and what their solutions 
were in resolving the problem. That to me is operational impact, since it 
affects customers on multiple networks.
 
-Henry

- Original Message 
From: Jeb Bush [EMAIL PROTECTED]
To: nanog@merit.edu
Sent: Sunday, August 27, 2006 6:34:17 AM
Subject: Re: Is it my imagination or are countless operations impacted today 
with mysql meltdowns


On 8/27/06, Larry grunt Brower [EMAIL PROTECTED] wrote:
 Fergie: I happen to like the articles. I usualy dont have time to look for 
 them myself every day.
 Gadi: The botnet reports can be usefull

Botnet's is a very specific subject and Nanog hasn't got the time or
resources to fill it. If we say yes to all Botnet subject and
discussion the Nanog list would serve no other purpose and non Botnet
discussion wouldn't get a look in. There should be a Botnet dedicated
list to deal with Botnet issues.

As for Fergie no, he was also told to get off the list for posting
news articles.

There is no excuse for posting news articles, we all have access to
the same resources off list as he has in respect of news web sites and
RSS feeds, so it really serves no purpose to turn Nanog into a wash of
web links to news articles.

Can we just have people posting information to Nanog that cannot be
obtained elsewhere, which justifies a reason for posting.

-Jeb


Is it my imagination or are countless operations impacted today with mysql meltdowns

2006-08-26 Thread Henry Linneweh

Every where I go that uses MySql is hozed and I can not access the pages
 
-Henry


Eurid suspends more than 74,000 .eu domain names

2006-07-25 Thread Henry Linneweh

I think this operationally impact some people
http://www.computerworld.com/action/article.do?command=viewArticleBasicarticleId=9001972
 
-Henry


Re: NANOG Spam?

2006-07-06 Thread Henry Linneweh

I still comment here periodically when it is prudent to do so, I set this email 
account specifically for Nanog,
anticipating spam
 
-Henry

sage 
From: Dominic J. Eidson [EMAIL PROTECTED]
To: nanog@merit.edu
Sent: Thursday, July 6, 2006 8:14:58 AM
Subject: Re: NANOG Spam?


On Thu, 6 Jul 2006, Sabri Berisha wrote:

 On Wed, Jul 05, 2006 at 05:20:04PM -0400, Jim Popovitch wrote:

 Hi,

  Finally, we crawled the archives of the big lists and have come
  up with a list of subscribers who haven't posted in over 9 months, we
  plan to set the mod bit on them too very soon.

 So people who are 'real' but lurk a loti should reply to this message so
 they don't get moderated :)

The question would be - if you're hit by the moderation bit, and post a
message that makes it past whatever moderator's criteria.. Do you then
lose the moderation bit, since you how have posted within the last 9
months, and thusly have (unmoderated) access?

Or maybe this is just an exercise in let's-fly-by-the-seat-of-our-pants...


- d.

-- 
Dominic J. Eidson
Baruk Khazad! Khazad ai-menu! - Gimli
---
   http://www.the-infinite.org/


Re: DNS Based Load Balancers

2006-07-06 Thread Henry Linneweh

There is a new player on the block that I see more and more 
http://www.infoblox.com/company/
 
-Henry


- Original Message 
From: Paul Vixie [EMAIL PROTECTED]
To: nanog@merit.edu
Sent: Wednesday, July 5, 2006 11:16:39 AM
Subject: Re: DNS Based Load Balancers


 As someone who has also deployed GSLB's with hardware applicances I would
 also like to know real world problems and issues people are running into
 today on modern GSLB implementations and not theoretical ones, as far
 as I can tell our GSLB deployment was very straight forward and works
 flawlessly.

since works flawlessly could just mean that you don't have any reported
problems with the technology -- no complaints from your users, no bugs logged
with your vendor, etc, i have two bracketing questions.

first, have you measured the improvement you got -- in terms of
min/max/avg/stddev of TTFB/TTLB (time to first byte / last byte)
with the appliances turned on vs. turned off?

second, have you measured the dns damage your gslb might cause or
contribute to, due to things not responding to unhandled QTYPES
( comes to mind) or use of abnormally low DNS TTL?

i'm not as much interested in whether a technology causes no problems for its
operator as whether its cost:benefit is worthwhile to the internet community.
-- 
Paul Vixie


Re: Black Frog - the botnets keep coming

2006-05-25 Thread Henry Linneweh

Personally as a manager I want to know the problem and
then the workable solution. I just don't see that many
bot nets happening anymore. 

From my vantage point I do see students writing bot
nets more for programming skills than for malicious
attacks. 

With several hundred million people and computers on
the inter network, there will always be an aberration,
caused by some social or mental or emotional defect.

Workable technical solutions, not new laws or rants
will make these issues, less of an issue operationally
in the long run.

-Henry

--- Eric White hill [EMAIL PROTECTED] bay.net wrote:

 
 Gadi, one of the main issues that people take
 regarding this is that it
 seems as though whenever we turn around, you're
 starting another OMG! THE
 INTERNUT IS COMING TO AN ENDOMGNO!
 
 And you get some people jumping around, and some
 people get all in a
 frenzy over whatever the perceived issue is.  The
 rest of us just slap our
 heads, roll our eyes and go Oh, great, here goes
 Gadi on another rant...
 
 Many people in the internet security world, sorry to
 say, now have a hard
 time believing what you are saying, and believing
 whatever you believe.
 The credibility is just not there any more.  It's
 slipping away, because
 there are only so many times someone can cry FIRE!
 in a crowded theater
 before people stop believing you.  Unfortunetly,
 that _is_ starting to
 happen.
 
 It really seems as though every time we turn around,
 you're crying Wolf 
 again, and it's bascially getting old.
 
  Sometimes being quiet is not going to win the
 war.
 
  It would behoove you, however, to not cry wolf so
 often
 
  The fact that you believe that I cry wolf, shows
 just how sad the
  situation really is.
 I would say this is more of a sign of what is going
 on.  People are 
 starting to NOT believe you.  Perhaps it is you who
 should change what is 
 being said, and how you are saying it.
 
  How long before ecommerce becomes impracticle? :)
 Far from relevant to
  NANOG. Or is it?
 What makes you believe that e-commerce is becoming
 impractical?  Are there 
 that many attacks against those companies?  If so,
 then why has the press 
 not picked it up?  The DoS against SixApart hardly
 made the convential 
 (BBC, CNN, etc) news.
 
  DNS beind abused like there is no tomorrow on the
 operational level (not
  infrastructure level) and no one (almost) even
 noticing is obviously not
  operational.
   I run my own publically accessable DNS servers,
 and they aren't being 
 abused.  You're making it sound like all DNS servers
 everywhere are being 
 abused, and that we should all stop using DNS.
 
  We are all techs, but the decision if for example,
 block ports at ISP's to
  stop worms isn't going to be a tech decision, much
 like hypocritically,
  ISP's these days block streaming media or P2P for
 extra cash. It's a
  business decision that will eventually save or
 kill the Internet, and to
  be honest, I see nothing wrong with it.
 In other words, it seems as though you are for
 blocking of traffic, and 
 making the internet just another Government-mandated
 and Gov't-regulated 
 environment?  It seems as though that goes against
 Postel's ideals.
 
 From my perspective, you just want to create big
 huge firewall, where 
 nothing is allowed, and everything is scrutinized. 
 That's not what the 
 internet is all about.  That's not what it was
 created for.  It seems as 
 though we should perhaps no longer call it the Big
 Firewall of China, 
 but perhaps, the Big Firewall of Gadi.
 
  I just am happy there are some people who hold
 back the tide of the war we
  already lost, before governments catch up.
 Even though you are losing credibility amongst your
 colleagues around the 
 world?
 
 This isn't meant to be a personal attack against you
 Gadi, but a wake up 
 call to not change your tune, but to perhaps start
 singing a different 
 song...the song that actually gets things done. 
 Stop fighting with 
 network operators, and start working with them. 
 That tends to get things 
 done more quickly, and also does not burn your
 bridges (and credibility) 
 in the process.
 
 I think some of the ideas you have are very good,
 and others not so good. 
 Either way, you have a good start.
 
 Gadi, I'm not saying to stop doing what you are
 doing, but perhaps to 
 change around how you go about doing what you are
 doing, and to stop 
 alienating so many of your other colleagues. 
 Instead of working against 
 groups like nsp-sec and NANOG, start working with
 them.  If you can't get 
 vetted, then work towards getting vetted.  Work
 towards repairing the 
 bridges.  Quite a bit of what people see is
 perception, and right now the 
 perception is one of more of a panic monkey,
 rather than a calm, 
 logical, We should really do this, or else bad
 stuff like example 1, 2, 
 and 3, can happen, and here's the reasoning behind
 it. Being calm, 
 logical, and working with other network operators
 tends to get things 

Re: CALEA Watch: ISP's Get to Pick Up the Tab

2006-05-03 Thread Henry Linneweh

This is nothing but a back door tax to stick your
customers, who will have to pay for them being spied
on in the first place, NDA not withstanding

-Henry

--- Fergie [EMAIL PROTECTED] wrote:

 
 Just wanted to bring your attention to an FCC
 decsion today
 that will most likely touch your operational lives
 in a big way.
 
 [snip]
 
 Broadband providers and Internet phone companies
 will have to
 pick up the tab for the cost of building in
 mandatory wiretap
 access for police surveillance, federal regulators
 ruled Wednesday.
 
 [snip]
 
 More:
 http://news.com.com/2100-1028_3-6067971.html
 
 Now, back to your regularly scheduled programming.
 
 Cheers,
 
 - ferg
 
 
 --
 Fergie, a.k.a. Paul Ferguson
  Engineering Architecture for the Internet
  [EMAIL PROTECTED] or [EMAIL PROTECTED]
  ferg's tech blog: http://fergdawg.blogspot.com/
 
 



Re: Google AdSense Crash

2006-04-24 Thread Henry Linneweh

Maintenance windows are common on most network service
providers, have been for years...

-Henry

--- Joel Jaeggli [EMAIL PROTECTED] wrote:

 
 On Sun, 23 Apr 2006, Peter Dambier wrote:
 
  If I understand you correctly then it does not
 make sense reporting
  errors here as long as I dont have a clue.
 
 Reporting a google outage here will likely have no
 effect on the ETR. It 
 is entirely likely that other people on the list
 will not be able to 
 observe the same outage.
 
  People with a clue dont know I have a problem.
 
  There is no problem as long as I dont report it.
 
 It is in your interest and those of other who depend
 on a given service to 
 track the availablity of that service. Whether or
 not mail sent to the 
 nanog lists represents a meaningful sample of google
 adwords customers is 
 left as an exercise for the reader.
 
  That saves a lot of bandwidth urgently needed for
 ranting :)
 
 
  Have a nice weekend.
  Cheers
  Peter and Karin
 
 
 
 
 -- 

--
 Joel Jaeggli Unix Consulting
 [EMAIL PROTECTED]
 GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3
 C38B F000 35AB B67F 56B2
 
 



Re: Google AdSense Crash

2006-04-22 Thread Henry Linneweh

https://www.google.com/adsense/ is up and working on
my Silicon Valley end of the network

-Henry

--- John Palmer (NANOG Acct) [EMAIL PROTECTED] wrote:

 
 OK - more: Don't have an answer as to why, but the
 website comes up with:
 
 The Google AdSense website is temporarily
 unavailable. Please try back later. 
 We apologize for any inconvenience.
 
 This is a big deal and it is operational in nature.
 
 - Original Message - 
 From: Daniel Golding [EMAIL PROTECTED]
 To: 'william(at)elan.net' [EMAIL PROTECTED];
 'John Palmer (NANOG Acct)' [EMAIL PROTECTED]
 Cc: 'nanog' nanog@merit.edu
 Sent: Saturday, April 22, 2006 3:58 PM
 Subject: RE: Google AdSense Crash
 
 
  
  
  
   -Original Message-
   From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED] On Behalf Of
   william(at)elan.net 
   On Sat, 22 Apr 2006, John Palmer (NANOG Acct)
 wrote:
   
   
Google Adsense has been down for several hours
 now. This is the
   interface that partners use to manage
their advertising settings.
   
   And this is reported on nanog because...?
   
  
  Because this is the Internet's most profitable
 advertising service and ISP's
  will get complaints if their customers (esp.
 business customers) can't reach
  it, even on the weekend. Outage reports are
 operational, unlike many
  threads. More, please.
  
  Daniel Golding
  
  
  
 
 



RE: Anyone heard of INOC-DBA?

2006-02-04 Thread Henry Linneweh

The only reference I see to this, is this non profit
research org
www.pch.net/inoc-dba/ 
and a Nanog reference page to the same thing
http://www.nanog.org/mtg-0505/upadhaya.html

-Henry


--- Wayne Gustavus (nanog) [EMAIL PROTECTED]
wrote:

 
 To chime with my own experiences, the few times I
 have used the INOC-DBA
 system for an Inter-provider issue have been quite
 successful.  The
 results were much faster and much less frustrating
 that calling through
 the 'front door' of the provider's NOC.  
 
 And it is fair to say that the system only gains
 usefulness with wider
 implementation among network providers and
 appropriate deployment of the
 phones within the organization.  Within Verizon, I
 deployed the phones
 with our IP-NOC (yes, we have *many* NOCs, but only
 1 handles IP
 issues), with our IP escalation team (TAC), and on
 my desk (footnote: my
 desk recently moved and haven't gotten the inoc-dba
 phone back up on the
 new net infrastructure).  
 
 In light of recent purchases by VZ, if none of the
 above methods work,
 just call Chris Morrow.  Just kidding Chris! :-)
 
 - Wayne 
 
  -Original Message-
  From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED] On 
  Behalf Of Christopher L. Morrow
  Sent: Friday, February 03, 2006 4:31 PM
  To: Richard A Steenbergen
  Cc: Sean Donelan; nanog@merit.edu
  Subject: Re: Anyone heard of INOC-DBA?
  
  
  
  
  On Fri, 3 Feb 2006, Richard A Steenbergen wrote:
  
   And then of course there is that whole using
 the IP 
  network to contact
   someone about an IP network issue thing that
 doesn't seem 
  terribly well
   thought out... Admittedly I haven't looked at
 the INOC-DBA 
  stuff in a
   while, there could have been some massive
 advancement that 
  I'm not aware
   of, but I suspect that the situation is still
 more work 
  needed. Existing
   phone systems, call centers, and engineers with
 cellphones, 
  seems to be a
   much safer bet right now.
  
  there is no one solution... to anything except
 'life' 
  (solution == death).
  So, how about looking at it as a tool to use. You
 might have your
  provider's $Person_for_Problem in your cell phone,
 use that 
  if you can.
  Use their Customer Service number or use their
 INOC number putting
  down a project that does work because it's not the
 holy grail isn't
  productive.
  
  
 
 



Re: IP Prefixes are allocated ..

2005-11-28 Thread Henry Linneweh

I suggest this should be common across ripe, apnic and
lacnic, Routing Information Service
http://www.ripe.net/ris/riswhois.html

that should help the current situation with services
already in place

-Henry

--- Owen DeLong [EMAIL PROTECTED] wrote:

 IP prefixes are NOT allocated to AS numbers, they
 are allocated to 
 Organizations
 just like AS numbers.
 
 Perhaps this is part of why you can't find such a
 list.
 
 Owen
 
 
 --On November 28, 2005 11:45:58 AM +0530 Glen Kent
 [EMAIL PROTECTED] 
 wrote:
 
 
  to different Autonomous systems.
 
  Is there a central/distributed database somewhere
 that can tell me
  that this particular IP prefix (say x.y.z.w) has
 been given to foo AS
  number?
 
  I tried searching through all the WHOIS records
 for a domain name. I
  get the IP address but i dont get the AS number.
 
  Any clues on how i can get the AS number?
 
  Glen
 
 
 
 -- 
 If this message was not signed with gpg key
 0FE2AA3D, it's probably
 a forgery.
 



OT: Cisco Patches 'Black Hat' IOS Flaw

2005-11-03 Thread Henry Linneweh

http://www.eweek.com/article2/0,1895,1881303,00.asp

Apparently now all the bluster about people capable
of fixing problems with the internet without a
congressional mandate worked still.

-Henry


Re: Regulatory intervention

2005-10-07 Thread Henry Linneweh

Reading some of this is rather disturbing, like if we
live in some kind of control freak society, where
every
comment is we are trying to control terrorism so we
must eliminate everyones right of expression and
distort every means of communication including the
internet. 

I disagree that companies should be harmed because of
elements within a given state of these United States
should have any power to regulate what any corporation
like google does or does not do, just because they
lack any talent to compete at all and I support now
more than ever this effort...

Google lobbies Congress for a 'free' internet

http://www.vnunet.com/vnunet/news/2143440/google-beefs-lobbying-efforts

-Henry



--- [EMAIL PROTECTED] wrote:

 On Fri, 07 Oct 2005 13:26:54 EDT, Sean Donelan said:
  rankings of its search results, I assume a
 government regulatory agency
  will be able to issue orders and control how
 Google operates its
  bottleneck search infrastructure to provide fair,
 neutral and transparent,
  in the government agency's opinion, of google's
 operations?
 
 Go to Google.  Enter googlebombing.  Follow the
 first link.  Read what
 happened on June 2, 2005.
 
 Evaluate the chances of the government enforcing
 *actual* fair, neutral, and
 transparent operations.
 
 



Re: MCI refusing to turn up OC-3 due to katrina relief efforts?

2005-09-21 Thread Henry Linneweh

that would be very uncharacteristic of MCI to do that,
and they do have a katria team down in that area
working on restoring all services. 

Your client would know via his sales rep what the
implementation team is doing and pressures would be
brought to deal with that kind of problem, I think
someone is clowning you

-Henry

--- Drew Weaver [EMAIL PROTECTED] wrote:

 
 Howdy, has anyone heard of MCI putting orders on
 hold in order to help
 with the Katrina relief effort? We ordered an OC-3
 from them about 2
 months ago and they've missed the install deadline 4
 times now. The
 reseller we're working with said that they claim
 that they can't turn it
 up due to Katrina relief efforts. The local loop is
 installed and the
 port is connected, they just cant turn the order up.
 
 Has anyone else heard this or should I assume (as
 usual) the reseller is
 BS'ing me?
 
 -Drew
 



Re: IOS worm clarification

2005-09-19 Thread Henry Linneweh

Andre;
Thanks for your review and language skills in this
area, the article translated was even a mess
on babelfish and left more questions than answers

-Henry

--- J. Oquendo [EMAIL PROTECTED] wrote:

 
 
 /
 From: Andrei Mikhailovsky [EMAIL PROTECTED]
 Reply-To: [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Subject: Re: [Full-disclosure] Cisco IOS hacked?
 
 Hello,
 
 Being a co-author of the Hacking Exposed Cisco
 Networks book and one
 of the co-founders of Arhont Ltd an Information
 Security Company that is
 doing the research for the book on Cisco Devices I
 have to make the
 following comments about the article in
 SecurityLab.ru:
 
 The russian article
 (http://www.securitylab.ru/news/240415.php) has been
 badly paraphrased from the livejournal of one of the
 authors/researchers
 of the book. As a result of this outrageously
 inaccurate paraphrasing of
 the article many confusions and misunderstandings
 have been circling on
 the security related sources and mailing lists.
 
 
 Some of the issues addressed in the article are true
 and Arhont is
 currently preparing a formal advisory that will be
 sent to PSIRT.
 
 
 Among the discovered issues are multiple
 vulnerabilities in EIGRP
 implementation. Also, authors have addressed the
 _theoretical_ aspects
 of an algorithm for cross-platform worm that could
 spread in IOS based
 devices. The existence of the practical
 implementation of such warm is a
 complete lie. Let me assure that there has been no
 development nor the
 desire to develop such code by the authors of the
 book. The theoretical
 methodology and algorithms will be also discussed
 with PSIRT at the
 appropriate time.
 
 
 In addition, there has been some minor
 inconsistencies of the
 livejournal postings that will be soon addressed and
 edited.
 
 If you have any comments on this topic we would be
 glad to address them.
 
 --
 Andrei Mikhailovsky
 Arhont Ltd - Information Security
 /
 
 
 
 
 =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
 J. Oquendo
 GPG Key ID 0x97B43D89

http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x97B43D89
 
 Just one more time for the sake of sanity tell me
 why
  explain the gravity that drove you to this...
 Assemblage
 



Re: LA power outage?

2005-09-12 Thread Henry Linneweh

Utility Error Blamed for L.A. Blackout

http://news.yahoo.com/s/ap/20050912/ap_on_re_us/la_power_outage

-Henry

--- Kevin [EMAIL PROTECTED] wrote:

 
 I've been dealing with a data center outage due to
 this,
 and power just came back up a few minutes ago.
 
 Halon dumps are only fun from the outside.
 
 Kevin Kadow
 



Re: Any issue with www.cisco.com

2005-09-06 Thread Henry Linneweh

I am seeing no issues here other than the initial poll

Hop  IP Address   Host Name   
  Sent   Recv  RTT   Av RTT  Min RTT  Max RTT 
 % Loss

168.120.139.144  
adsl-68-120-139-144.dsl.snfc21.pacbell.net  1 
1  1875 ms  1875 ms  1875 ms  1875 ms   0.000%
268.120.139.254  
adsl-68-120-139-254.dsl.snfc21.pacbell.net  1 
163 ms63 ms63 ms63 ms   0.000%
3206.171.134.131  dist2-vlan50.snfc21.pbi.net 
 1  163 ms63 ms63 ms63 ms 
 0.000%
4216.102.176.226  bb2-10g2-0.snfcca.sbcglobal.net 
 1  163 ms63 ms63 ms63 ms 
 0.000%
5151.164.190.189  bb1-p4-0.snfcca.sbcglobal.net   
 1  163 ms63 ms63 ms63 ms 
 0.000%
6151.164.242.65   core1-p14-1.crsfca.sbcglobal.net
 1  178 ms78 ms78 ms78 ms 
 0.000%
7151.164.240.134  bb1-p1-0.crsfca.sbcglobal.net   
 1  178 ms78 ms78 ms78 ms 
 0.000%
8151.164.41.101   ex1-p3-0.eqsjca.sbcglobal.net   
 1  178 ms78 ms78 ms78 ms 
 0.000%
9151.164.250.57   ge-6-12.car4.SanJose1.Level3.net
 1  178 ms78 ms78 ms78 ms 
 0.000%
10   4.68.123.73 
ge-7-1.ipcolo1.SanJose1.Level3.net1  1   
78 ms78 ms78 ms78 ms   0.000%
11   4.0.26.14p1-0.cisco.bbnplanet.net
 1  178 ms78 ms78 ms78 ms 
 0.000%
12   128.107.239.53   sjce-dmzbb-gw1.cisco.com
 1  178 ms78 ms78 ms78 ms 
 0.000%
13   128.107.224.69   sjck-dmzdc-gw1.cisco.com
 1  178 ms78 ms78 ms78 ms 
 0.000%
14   198.133.219.25   www.cisco.com   
 1  178 ms78 ms78 ms78 ms 
 0.000%


--- Bruce Pinsky [EMAIL PROTECTED] wrote:

 
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 Chip Mefford wrote:
  Gerry Boudreaux wrote:
  
 mtr shows the packet loss in the last hop for me:
 
 14. sjck-dmzbb-gw1.cisco.com 
0.0%62   66.6  75.4  64.5
 293.7  37.1
 15. sjck-dmzdc-gw2.cisco.com 
0.0%62   62.5  65.4  59.2
 155.4  13.1
 16. www.cisco.com
   14.8%62   59.2  64.7  58.1
  88.4   7.2
  
  
  I'm seeing roughly ~25 percent packet loss, it
 varies.
  
 
 If you are relying on ping and traceroute tests to
 measure packet loss,
 then you are coming to false conclusions.
 
 ICMP responses are throttled by many, many devices
 including routers, load
 balancers, firewalls, IPS devices, etc, etc.
 
 - --
 =
 bep
 
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.0 (MingW32)
 

iD8DBQFDHdMFE1XcgMgrtyYRAsjzAKDniJ5MAj+PWxH6vgYaImbJc/9A9wCfdNCx
 aBMSXJIsAm4NaGvJTVUpIVg=
 =rKlr
 -END PGP SIGNATURE-
 



Off Topic: Suspected Zotob Worm Authors Arrested

2005-08-26 Thread Henry Linneweh

http://www.washingtonpost.com/wp-dyn/content/article/2005/08/26/AR2005082601201.html?sub=AR

That was fairly quick

-Henry


Re: KVM over IP Suggestions?

2005-08-24 Thread Henry Linneweh

Here is an article that addresses some of these very
issues, naturally there is always a costing factor,
because non of the sought for solutions are easy to
come by.

http://www.networkcomputing.com/showitem.jhtml?docid=1616f3

-Henry



--- Daniel Senie [EMAIL PROTECTED] wrote:

 
 At 12:41 PM 8/22/2005, Aaron Glenn wrote:
 
 On 8/22/05, Simon Hamilton-Wilkes
 [EMAIL PROTECTED] wrote:
  
   They support P/S2 / USB / Sun and serial -
 though are a very expensive
   way to do serial.
 
 And (last time I looked, at least) they required an
 expensive,
 proprietary, Windows-only authentication server
 (DSView) in addition
 to the client software licenses and hardware costs.
 
 Avocent makes several products in the KVM/IP space.
 Not all of them 
 are tied to Windows Server authentication. At the
 low end, they've 
 got a sub-$1000 single port box that works nicely
 for front-ending 
 existing KVM switches that have on-screen controls.
 
 We've used and tested 4 or 5 products in this
 single port space. 
 Results have been fair, bad and ugly. I would not
 consider any of 
 them to be acceptable or better.
 
 There are several issues. As someone else noted,
 these usually push a 
 viewer to you over either Java or Active-X. The
 little Avocent uses 
 Active-X, so I have to remember to load up IE before
 accessing it.
 
 Internal authentication is, in my experience,
 essential. After all, 
 if you're connecting in to deal with the server
 that's doing your 
 authentication, you're screwed, yes, there are
 likely expensive ways 
 to avoid that situation.
 
 Serial redirection and terminal servers are an
 option, but only if 
 all of your servers support that.
 
 VNC isn't an option, unless you like your terminal
 sessions going 
 over unencrypted pipes or set everything up to
 tunnel over SSH or VPN.
 
 Solutions that use VNC direct to the target server
 are insufficient. 
 If you can't talk to the BIOS of a server that's not
 feeling well, 
 what's the point? Once a server is actually up, SSH
 into the server 
 gets you all you need, or VNC over SSH if you must
 do some graphics.
 
 Mouse control: all of the KVM/IP products we've
 tested have had 
 serious issues with mouse control. With Windows
 boxes, we generally 
 do our best to get boxes far enough up to use RDP,
 and switch to that 
 because it's much cleaner. With Linux machines we
 find this less of 
 an issue as we don't run consoles in graphics mode,
 thus bypassing 
 the mouse sync issue.
 
 For the original poster, if you want to have the
 ability to let 
 customers at the console of their server, but not
 others, you're 
 going to be stuck using expensive equipment, with
 the ability to 
 handle multiple simultaneous users, or go with
 servers that have 
 KVM/IP as an on-board option (Intel's is the one I'm
 personally 
 familiar with. Someone else mentioned Dell has such
 too).
 
 We made the move to KVM/IP and APC power
 cycling/control equipment a 
 few years back and have never regretted doing so.
 
 Dan 
 
 



RE: Outage queries and notices (was Re: GBLX congestion in Dallas area)

2005-06-08 Thread Henry Linneweh

I did notice A low number on the index at
http://www.internettrafficreport.com/namerica.htm


-Henry

--- Joel Perez [EMAIL PROTECTED] wrote:
 
 
 [ SNIP ]
 
 I think that these things are operational and
 belong here. Its'
 the level that ras is talking about and the
 content. Saying 
 MCI has a massive fiber cut impacting 230 Congress
 IX vs. 
 GBLX is not doing what I demand are very different
 types of
 outage posts.
 
 My original post to the list contained nothing about
 any services I
 expect with provider xxx. I asked if anybody else
 saw packet loss or
 congestion.
 
 My follow-up posts contained the reason as to why I
 was posting this to
 the list instead of to my provider, I then took it
 off-list with 2 other
 posters and managed to get more info out of them
 then out of GBLX. I try
 not to bash anybody because I know that doesn't
 really resolve anything
 most of the time.
 
 
 I'd like to see the higher level stuff we used to
 do and have some
 sort of information along with it vs. i see a
 packet drop in XYZ.
 A prefix or something. That usually makes people go
 look.
 
 I agree, it totally slipped my mind to provide that
 info. I just typed
 up a quick post and sent it out.
 
 Im my humble opinion I think this is Nanog content
 and that is why I
 posted it. Most posters opinion of what is and what
 isn't appropriate
 content varies. I love my delete key, if I don't
 think it's appropriate
 I delete it. No harm done to me. 
 
 To each his own I guess. 
 
 Thanks to those that responded.
 
 


Re: IBM to offer service to bounce unwanted e-mail back to the

2005-03-23 Thread Henry Linneweh

This software is free at
http://www.alphaworks.ibm.com/tech/fairuce

-henry




--- Anne P. Mitchell, Esq. [EMAIL PROTECTED]
wrote:
 
 
 On Mar 23, 2005, at 12:37 PM, RSK wrote:
 
  On Tue, Mar 22, 2005 at 10:24:37AM -0800, Andreas
 Ott wrote:
 
 http://money.cnn.com/2005/03/22/technology/ibm_spam/
 
  If this write-up is accurate,
 
 It's not. From the http://www.aunty-spam.com
 website:
 
 IBM Not Spamming Spammers! FairUCE is About Fair
 Use, Not Abuse!
 
 Did you hear? IBM is spamming spammers! It’s all
 over the Internet, and  
 tongues are a’wagging! Except, it ain’t so. IBM is
 not spamming  
 spammers.
 
 
   Whether you think that spamming spammers is right
 or wrong, IBM ain’t  
 doing it, and shame on CNN for getting it so wrong,
 and making IBM look  
 so irresponsible, and in league with the likes of
 Lycos’ “Make Love Not  
 Spam” DOSsing Screensaver program, and the notorious
 Mugu Maurauder  
 bandwidth sucking program.
 
 You can’t really blame the folks who read CNN’s
 horribly wrong piece  
 for spreading the rumour, after all it was quite
 sensationalist:
 
 “Spamming spammers?
 IBM to offer service to bounce unwanted e-mail back
 to the computers  
 that sent them.
   March 22, 2005: 12:22 PM EST
 
   NEW YORK (CNN/Money) - IBM unveiled a service
 Tuesday that sends  
 unwanted e-mails back to the spammers who sent them.
 
 The new IBM (Research) service, known as FairUCE,
 essentially uses a  
 giant database to identify computers that are
 sending spam. E-mails  
 coming from a computer on the spam database are sent
 directly back to  
 the computer, not just the e-mail account, that sent
 them.”
 
   Wrong, wrong, wrong.
 
 About the only thing which the article got right is
 that the program is  
 called “FairUCE. FairUCE, according to IBM’s own
 FairUCE website,  
 readily available for anyone to read (cough…CNN
 reporters..cough), is a  
 “spam filter that stops spam by verifying sender
 identity instead of  
 filtering content.
 
 Let’s say that again: FairUCE is a spam filter that
 stops spam by  
 verifying sender identity instead of filtering
 content.
 
 If FairUCE can’t verify sender identity, then it
 goes into  
 challenge-response mode, sending a challenge email
 to the sender, to  
 which the sender must reply, to demonstrate that it
 is not a spambot  
 sending the mail in question, but a real live
 person.
 
 Here is IBM’s explanation of how the FairUCE system
 works:
 
 “Technically, FairUCE tries to find a relationship
 between the envelope  
 sender’s domain and the IP address of the client
 delivering the mail,  
 using a series of cached DNS look-ups. For the vast
 majority of  
 legitimate mail, from AOL to mailing lists to vanity
 domains, this is a  
 snap. If such a relationship cannot be found,
 FairUCE attempts to find  
 one by sending a user-customizable
 challenge/response. This alone  
 catches 80% of UCE and very rarely challenges
 legitimate mail.”
 
   Now, being kind, it’s possible that the good folks
 at CNN mistook the  
 sending of the challenge for “spamming the
 spammer
 
 (Rest at  

http://www.aunty-spam.com/ibm-not-spamming-spammers-fairuce-is-about-
 
 fair-use-not-abuse/)
 
 Anne
 
 
 
 


Re: Cisco moves even more to china.

2004-09-25 Thread Henry Linneweh

The only event that is driving this, is Cisco wants to
dominate the Chinese market and the only way to sell
in China is to manufacture product there, using their
people to manufacture, that is how the game is played
there and for the chinese it makes sense, considering
the government there has has around 1.3 billion people
to care for.

The lack of understanding here is that Americans need
to be cared for to, with economy that providers us
with a sense of financial security.

The problem centers around jobs now being promoted for
poltical purposes as jobs, when you focus on these
jobs, you will discover they are not living wage jobs
and certainly not jobs that provide for intelligent
people staffing them.

The other issue that fits into this problem, is the
Bush administration gets $1.12 for every dollar earned
offshore from any product, so it basically doesn't
care, since it keeps the US government solvent, while
the rest of us get flushed down the tubes. Making
matter's worse is the fact, that executives that
support the Bush administration with outsourcing
offshore, are financial rewards and tax incentrives
that make it attractive to do so.

If you don't like the politics of what is happening to
you change it in November and work to turn our country
around and preserve our friendships globally in the
process. My 2 cents

-henry


Re: APNIC Privacy of customer assignment records - implementation update

2004-09-23 Thread Henry Linneweh

This proposal would be harmful in tracking hack
attacks, ddos attacks and other forms of annoyance,
spyware tracking and things that are beyond the
capability for any agency to handle because of largese

Technical fiefdoms were one of the worries of the 90's
now we are here and that is becoming the direction,
patenting rfc's and the like are harming the very
fabric of the internet and detering the ability to
keep it running.I am very disappointed

-Henry


--- william(at)elan.net [EMAIL PROTECTED] wrote:

 
 
 On Thu, 23 Sep 2004, Matt Ghali wrote:
 
  On Thu, 23 Sep 2004 16:19:19 +1000, George
 Michaelson [EMAIL PROTECTED] wrote:
  
   This is an important announcement on the
 implementation of APNIC
   approved proposal prop-007-v001 regarding
 privacy of customer assignment
   records. The proposal document, presentation,
 minutes, and discussion
   are available at:
   
   

http://www.apnic.net/docs/policy/proposals/prop-007-v001.html
  
  Does anyone else find this as offensive as I do?
 
 Yes. 
 
 And worst of all similar proposal is under
 discussion at ARIN, see
   http://www.arin.net/policy/2004_6.html 
 So if you don't want the same unaccountability
 problem for ARIN, join 
 ppml mail list and let argue against it.
 
 My own view is that this will make it a lot easier
 for spammers to get
 away with their works and easier for them to move
 from one isp to another.
 
 At the same time reassignment information is used by
 me and some others 
 for geographical mapping of ip space and this will
 make harm this 
 research activity as well. So if you're involved in
 something similar
 you may want to speak up about it as well.
 
 ---
 William Leibzon
 Elan Networks
 [EMAIL PROTECTED]
 
 



VeriSign's antitrust suit against ICANN dismissed

2004-08-27 Thread Henry Linneweh

http://news.com.com/VeriSign%27s+antitrust+suit+against+ICANN+dismissed/2100-1030_3-5326136.html?tag=nefd.top




Fwd: YOUR EMAIL WON THE LOTTERY - Here is another one

2004-08-19 Thread Henry Linneweh


--- Mrs Brigit Willem [EMAIL PROTECTED]
wrote:

 X-Apparently-To: [EMAIL PROTECTED] via
 66.218.79.74; Thu, 19 Aug 2004 08:28:12 -0700
 X-YahooFilteredBulk: 82.35.148.130
 X-Originating-IP: [82.35.148.130]
 Return-Path: [EMAIL PROTECTED]
 Received: from 82.35.148.130  (EHLO
 mailapps2-int.prodigy.net) (207.115.63.126)
   by mta829.mail.sc5.yahoo.com with SMTP; Thu, 19
 Aug 2004 08:28:12 -0700
 X-Header-Overseas:
 Mail.from.Overseas.source.82.35.148.130
 X-Originating-IP: [82.35.148.130]
 Received: from 24.203.20.91
 (82-35-148-130.cable.ubr04.enfi.blueyonder.co.uk
 [82.35.148.130])
   by mailapps2-int.prodigy.net (8.12.10 shim/8.12.10)
 with SMTP id i7JFS2pe127626
   for [EMAIL PROTECTED]; Thu, 19 Aug 2004
 11:28:11 -0400
 Message-Id:

[EMAIL PROTECTED]
 Received: from mail0.fatcow.com (mail0.fatcow.com
 [209.12.212.5]) by mx.wdl.net with ESMTP; Aug, 19
 2004 4:25:00 PM -0200
 From: Mrs Brigit Willem
 [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Subject: YOUR EMAIL WON THE LOTTERY
 Sender: Mrs Brigit Willem
 [EMAIL PROTECTED]
 Mime-Version: 1.0
 Content-Type: text/plain; charset=iso-8859-1
 Date: Thu, 19 Aug 2004 17:28:08 +0200
 X-Mailer: Microsoft Outlook Express 6.00.2462.
 Content-Length: 1510
 
 FROM: THE DESK OF THE LOTTO CHANCELLOR,
  INTERNATIONAL PROMOTIONS/PRIZE AWARD DEPARTMENT,
  REF: KIY/47560460037/02.
  BATCH: 24/23519/YHI
  
  ATTENTION: 
  
  RE/ AWARD NOTIFICATION; FINAL NOTICE We are pleased
 to
  inform you of the announcement today 15-8-2004 of
 winners of the REAL
 EXCHANGE LOTTO PROMO ,THE GLOBAL MEGA LOTTERY INT.,
 PROGRAMS AMSTERDAM held  
 on 26 June,2004 through computer ballot system  Your
 company/You email,is attached to ticket  number 
 023-5876-790-279, with serial number 3673-10  drew
 the lucky numbers 43-14-42-37-69-25, and  
 consequently won the lottery  in the first category
  
  You have therefore been approved for a lump sum pay
  out of US$800 000:00 in cash credited to file 
 REF:KIY /47560460037/02. This is from total prize
 money of US$90,000,000.00  shared among the 25 i 
 nternational winners in
  this category. All participants were selected
 through  a computer ballot system drawn form 30,000
 names 
 from  Australia, New Zealand, America, Europe, North
  America, Asia, and Africa as part of International
  Promotions Program, which is conducted annually.
  
  CONGRATULATIONS! Your fund is now deposited with a 
 Finance House insured in your name. Due to 
 the mix up  of some numbers and names, we ask that
 you keep this  award strictly from public notice
 until 
 your claim has
  been processed and your money remitted to your 
 account. This is part of our security protocol to 
 avoid 
 double claiming or unscrupulous acts by
  participants of this program. We hope with a part
 of  you prize, you will participate in our end of
 year  
 high stakes US$1.0 Billion Netherlands International
 Lottery. To begin   your  claim, please  contact our
 
 international claim agent:
  
  Mr Tony van More
  email:[EMAIL PROTECTED]
  Tel:+31-62-00-79-843
  INTERNATIONAL COORDINATOR,
  
  
  For due processing and remittance of your prize
 money  to a designated account of your choice. 
 Remember, all  prize money must be claimed not later
 than 30th  september, 2004. After this date, all 
 funds will be returned as unclaimed. NOTE: In order
 to avoid  unnecessary delays and complications, 
 please remember  to quote your reference and batch
 numbers in every one  of your correspondences 
 with your agent.Furthermore, should there be any
 change of your address, do inform  your claim's
 agent 
 as soon as possible.
  
 Congratulations again from all our staff and thank
 you  for being part of our promotions program.
  
  Sincerely,
  Mrs Brigit Willem
  
 THE PROMOTIONS MANAGER,GLOBAL MEGA LOTTERY
 INTERNATIONAL
 N.B. Any breach of confidentiality on the  part of
 the winners will result to disqualification.
  
 THANKS FOR WINNING.
 



Re: Phishing (Was Re: WashingtonPost computer security stories)

2004-08-16 Thread Henry Linneweh

How strange, I received that in my email too..

-Henry


--- Niels Bakker [EMAIL PROTECTED] wrote:

 
 Speaking of computers fubar'ed by spyware, I just
 found a particularly
 nice example of a phishing attempt.  SpamAssassin
 had tagged it with the
 astronomical score of 136.3 thanks to SARE.
 
 The mail originated from 68.77.56.130 (an
 ameritech.net DSL connection,
 right now not pingable) and loads some images from
 www.citibank.com.
 It links to http://61.128.198.51/Confirm/ - an IP
 address hosted by
 Chinanet (transit to there supplied by Savvis from
 my point of view).
 
 That page does something interesting: it meta
 refreshes itself to
 Citibank's corporate homepage but also pops up a
 window
 (/Confirm/pop.php) requesting the user's card#, PIN
 (twice) and a
 new PIN.  The main page being citibank probably
 lends some credibility
 to the scam.
 
 This attack won't work if your browser blocks
 popups, or if you remember
 that the padlock icon in the status bar is what
 tells you the status of
 a connection, not a 128-bit SSL or Verisign
 trust-e or whatever logo
 inside the webpage.
 
 It's disheartening to see that this website is still
 online after
 several days (I received the scam mail received
 Friday morning).
 
 I'm thinking that Citibank will cease to be a target
 if they give (ok,
 it's a bank - sell) their subscribers a hardware
 token that requires
 presence of the ATM card when the customer wants to
 use online banking
 facilities... as several banks here in the
 Netherlands do.
 
 
   -- Niels.
 



RE: BGP-based blackholing/hijacking patented in Australia?

2004-08-15 Thread Henry Linneweh

I do miss the old days of this list, technical growth
and global participation in events was exciting...

-her

--- Alex Bligh [EMAIL PROTECTED] wrote:

 
 
 
 --On 14 August 2004 22:23 +0300 Hank Nussbacher
 [EMAIL PROTECTED] 
 wrote:
 
  Predating this is Bellwether (June 2000):
 
 Indeed. In days of yore, when people developed at
 least marginally
 non-obvious operational techniques, people sent
 email to nanog about it,
 explaining the technique and their experience (hence
 the NOG bit);
 the reception wasn't always positive, but at least
 the criticism was
 technical. I wonder what the driving factor was for
 the change.
 
 Alex
 



Re: BGP-based blackholing/hijacking patented in Australia?

2004-08-13 Thread Henry Linneweh

One would have to conclude since it is the behavior of
the present. that it shall not subside anytime soon.

Ir was a wonderful time on the internet when we still
had trust and respect for each other's endeaver, now
we
will have to collaborate to get things done with legal
shields, we can all thank Washington for the mess they
have created and in particular RIAA which has brought
this kind of problem to everyone.

-Henry



--- Hank Nussbacher [EMAIL PROTECTED] wrote:

 
 At 01:41 PM 12-08-04 +0100, Stephen J. Wilcox wrote:
 
 On Thu, 12 Aug 2004, Petri Helenius wrote:
 
   We have had running code for this since early
 this year, so depending 
  on the
   date they filed, prior art exists well
 documented. (blueprints obviously
   predate running code)
 
 everyone has gone patent crazy, every time a new
 concept is developed some
 company applies for patent. is this the future or
 rfcs then?
 
 No.  This should be the future for patent hijacks:
 http://freepatentsonline.com/6293874.html
 
 -Hank
 
 
 Steve
 
 



RE: BGP-based blackholing/hijacking patented in Australia?

2004-08-13 Thread Henry Linneweh

Redirecting is nothing new and has been around for
years, it was never a real problem until washington
and the media stuck their face into something they
had no clue about, as usual. 

I am certain there are ways to prevent redirection and
those should be applied without a congressional
hearing..

-Henry



--- Michel Py [EMAIL PROTECTED]
wrote:

 
  Bevan Slattery wrote:
  Just to ease peoples concerns, the patent has
 nothing
  to do with blackholing.  A brief description of
 the
  way it works can be found here:
 
 I believe that I am not the only one that is
 concerned precisely because it is _not_ blackholing,
 it is hijacking, no matter how legitimate the
 reason.
 
 me puts the devil's advocate suit on
 
 To say it bluntly, it smells a lot like the
 illegitimate offspring of an RBL and Verisign's
 wildcard deal. The phishing con artists redirect the
 unsuspecting mark to a third-party site, and this
 stuff also redirects the unsuspecting mark to
 another page:
 
  Where is the user re-routed to? If an end user is
 a victim of a scam
  and is redirected via the ScamSlam system, then
 the page they are
  redirected to is specified by the agency entering
 the scam data.
 
 Déjà vu: redirect the user's mistakes/stupidity to
 one's own business.
 
 What tells me that the agency is not the back office
 of the phishing scheme in the first place? Same as
 spyware: there is anti-spyware out there that
 deletes all the spyware installed by their
 competitors and conveniently forgets to detect or
 fix their own.
 
 And I also do see good opportunity for joe-jobs
 here: get some el-cheapo hosting on the hosting
 server that you want to take down, setup a fake
 phishing web page, then send phishing email and/or
 report the dummy phishing to the agency. The IP gets
 blacklisted and takes down thousands of web sites
 along with the one that bozo paid $10 one-time for.
 Gee, it costs less than a movie and popcorn.
 
 /me puts the devil's advocate suit on
 
 
 Oh BTW, good luck trying to blacklist a large zombie
 pool that collectively hosts the phishing page and
 individually send their own address and listening
 port in the phishing email. Why phish on a single IP
 when one can phish distributed?
 
 Anyway, what's the difference with blackholing? The
 route-map sets the next-hop to a NAT box that
 dynamically binds the IP addresses contained in the
 BGP feed (instead of setting the next-hop to a
 blackhole)? BFD.
 
 Trying to patent the wheel is not good for
 credibility, nor is using the very same stinky
 methods as the scam artists.
 
 Michel.
 
 



Re: BGP-based blackholing/hijacking patented in Australia?

2004-08-12 Thread Henry Linneweh

Well if it will harm the community, would it be
possible to auto copyright rfc's, so that the authors
of a concept can prevent someone from sipping their
effort off? 

Ignorance at the top doesn't mean we can't be like
always leading the way..

-Henry



--- Stephen J. Wilcox [EMAIL PROTECTED]
wrote:

 
 On Thu, 12 Aug 2004, Petri Helenius wrote:
 
  We have had running code for this since early this
 year, so depending on the
  date they filed, prior art exists well documented.
 (blueprints obviously
  predate running code)
 
 everyone has gone patent crazy, every time a new
 concept is developed some 
 company applies for patent. is this the future or
 rfcs then?
 
 Steve
 
 



Re: BGP-based blackholing/hijacking patented in Australia?

2004-08-12 Thread Henry Linneweh

ok so then in the copyright let us see if can cover
all variations of the original concept as belonging to
the original author or author's as a test case for
adaption and modificaiton to copyright law. I strongly
believe in the protection of original idea's in
reference to rfc's 

-Henry




--- Stephen J. Wilcox [EMAIL PROTECTED]
wrote:

 one issue with that might be that the patents are
 taken out on variations of the 
 core idea, imho the variations are not new ideas but
 legally they seem to get 
 away with it
 
 Steve
 
 On Thu, 12 Aug 2004, Henry Linneweh wrote:
 
  Well if it will harm the community, would it be
 possible to auto copyright
  rfc's, so that the authors of a concept can
 prevent someone from sipping their
  effort off?
  
  Ignorance at the top doesn't mean we can't be like
 always leading the
  way..
  
  -Henry
  
  
  
  --- Stephen J. Wilcox [EMAIL PROTECTED]
  wrote:
  
   
   On Thu, 12 Aug 2004, Petri Helenius wrote:
   
We have had running code for this since early
 this
   year, so depending on the
date they filed, prior art exists well
 documented.
   (blueprints obviously
predate running code)
   
   everyone has gone patent crazy, every time a new
   concept is developed some 
   company applies for patent. is this the future
 or
   rfcs then?
   
   Steve
   
   
  
  
 
 



Re: ad.doubleclick.net missing from DNS?

2004-07-27 Thread Henry Linneweh

While I disagree with the method of the attacker, I
can understand the reasoning behind an attack on a 
company that is considered a spyware company,
doubleclick certainly has turned up more than once on
my version of spybot as a site to block.

-Henry

--- Sean Donelan [EMAIL PROTECTED] wrote:
 
 

http://www.washingtonpost.com/wp-dyn/articles/A18735-2004Jul27.html
   DoubleClick spokeswoman Jennifer Blum said the
 attack targeted the
   company's domain name servers (DNS) -- machines
 that help direct
   Internet traffic -- causing severe service
 disruptions for all 900 of
   its customers. Blum said the outage was caused by
 a distributed
   denial-of-service attack, in which hackers use the
 firepower of
   thousands of hijacked computers to flood a Web
 site with so many bogus
   Web page requests that it renders the site
 unavailable to legitimate
   users.
 [...]
   The FBI is not investigating the incident because
 DoubleClick has not
   filed a report, said bureau spokeswoman Megan
 Baroska.
 
 



RE: VeriSign's rapid DNS updates in .com/.net

2004-07-22 Thread Henry Linneweh

Before a big panic starts, they can restore it back to
the way it was if there is an event of such proportion
to totally hoze the entire network or any major
portion of it, until they fix any major issue with
these changes

-Henry

--- Sam Stickland [EMAIL PROTECTED] wrote:
 
 Well, a naive calculation, based on reducing the TTL
 to 15 mins from 24
 hours to match Verisign's new update times, would
 suggest that the number
 of queries would increase by (24 * 60) / 15 = 96
 times? (or twice that if 
 you factor in for the Nyquist interval).
 
 Any there any resources out there there that have
 information on global 
 DNS statistics? ie. the average TTL currently in
 use.
 
 But I guess it remains to be seen if this will have
 a knock on effect like 
 that described below. Verisign are only doing this
 for the nameserver 
 records at present time - it just depends on whether
 expection for such 
 rapid changes gets pushed on down.
 
 Sam
 
 On Thu, 22 Jul 2004, Ray Plzak wrote:
 
  
  Good point!  You can reduce TTLs to such a point
 that the servers will
  become preoccupied with doing something other than
 providing answers.
  
  Ray
  
   -Original Message-
   From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED] On Behalf Of
   Daniel Karrenberg
   Sent: Thursday, July 22, 2004 3:12 AM
   To: Matt Larson
   Cc: [EMAIL PROTECTED]
   Subject: Re: VeriSign's rapid DNS updates in
 .com/.net
   
   
   Matt, others,
   
   I am a quite concerned about these zone update
 speed improvements
   because they are likely to result in
 considerable pressure to reduce
   TTLs **throughout the DNS** for little to no
 good reason.
   
   It will not be long before the marketeers will
 discover that they do not
   deliver what they (implicitly) promise to
 customers in case of **changes
   and removals** rather than just additions to a
 zone.
   
   Reducing TTLs across the board will be the
 obvious *soloution*.
   
   Yet, the DNS architecture is built around
 effective caching!
   
   Are we sure that the DNS as a whole will remain
 operational when
   (not if) this happens in a significant way?
   
   Can we still mitigate that trend by education of
 marketeers and users?
   
   Daniel
  
 
 



Script Injection Makes Phishing Harder to Catch

2004-07-20 Thread Henry Linneweh

A new twise on phishing...

http://www.eweek.com/article2/0,1759,1624905,00.asp

-Henry


Re: China deploys Internet protocol version 9 network

2004-07-06 Thread Henry Linneweh

China's New Generation Of Ipv9 Network Technology
Ready
July 2, 2004

http://www.chinatechnews.com/index.php?action=showtype=newsid=1405

Interesting development

-Henry



--- [EMAIL PROTECTED] wrote:
 
 On Mon, Jul 05, 2004 at 11:15:06PM -0700, John Obi
 wrote:
  
  Hello,
  
  Have you heard of IPv9? or it was IPv8?
  
  China's Internet technology Ipv9,which being
  compatible with IPv4 and IPv6,has been formally
  adapted and popularized into the civil and
 commercial
  sector. 
  
 

http://news.xinhuanet.com/english/2004-07/05/content_1572719.htm
  
  Thanks,
  
  -J
 
   IPv9 is the TUBA protocol - RFC 10xx - from the
 last century. :)
   This is a modification that uses the 10digit
 telephone#.
   Tony Hain refered to this as e164-like. Others
 have less
   complementary things to say.
 
 --bill
 



Re: Sipura VoIP phone adapters and DoS against name servers

2004-07-05 Thread Henry Linneweh

Get in contact with manufacturing vender for a fix,
and then tell us what they did or what they intend
to do to remedy the problem.

-Henry


--- [EMAIL PROTECTED] wrote:
 
 Last night we configured our equipment to reject
 recursive DNS lookups
 from non-customers. This morning, soon after normal
 office hours began,
 we started receiving around 2500 DNS lookups per
 second more than normal
 to our recursive name servers.
 
 After analyzing the DNS lookups, we found that all
 of the extra traffic
 was generated from customers of a local VoIP
 provider which uses Sipura
 (SPA-2000) phone adapters. It seems that when these
 adapters don't
 receive answers to their DNS queries, they will
 retransmit the query
 once per second (until they receive an answer).
 Multiply by number of
 adapters, and you have the recipe for a nice DoS.
 
 Shades of Netgear NTP DoS
 (http://www.cs.wisc.edu/~plonka/netgear-sntp/)
 - don't vendors ever learn?
 
 Steinar Haug, Nethelp consulting, [EMAIL PROTECTED]
 



Appeals court deals setback to spammers

2004-06-30 Thread Henry Linneweh

One more feather in our cap :)

http://seattletimes.nwsource.com/html/businesstechnology/2001968539_spam30.html


EFF Publishes Patent Hit List

2004-06-30 Thread Henry Linneweh

This is a very serious list, because it addresses the
basic idea of being able to do business for everyone
without being heald hostage by patents who work
against
the best interests of keeping the interent open

http://www.wired.com/news/politics/0,1283,64038,00.html?tw=wn_tophead_2


Re: E-Mail Snooping Ruled Permissible

2004-06-30 Thread Henry Linneweh

Maybe Phil Zimmerman should come forth with new toys
for big boys that will be more valient an effort than
pgp with less a threat to his personal liberty. We
definately need some relief from constantly being
criminalized enmasse for actions from citizens of
other
nations and from control freaks who have for years
slandered us and criminalized us for actions we have
not participated in. 

-Henry


--- Steven M. Bellovin [EMAIL PROTECTED] wrote:
 
 In message [EMAIL PROTECTED], John
 Neiberger writes:
 
 http://wired.com/news/print/0,1294,64043,00.html 
 
 Yet another reason why we should develop a system
 where all Internet
 communications can be easily encrypted, whether
 it's email, VoIP, or
 whatever. It's not like it's horribly difficult now
 in some cases, but
 it does have its difficulties when it comes to
 implementation on a large
 scale.
 
 Yes -- especially if people rely on wiretap-enabled
 certificates from their 
 ISPs
 
   --Steve Bellovin, http://www.research.att.com/~smb
 
 
 



Re: Can a Customer take their IP's with them? (Court says yes!)

2004-06-29 Thread Henry Linneweh

Since all NSP's, ISP's, ALEC's, BLEC's and CLEC's
adhere to this accepted behavior and there are more
than 100 I blieve the court would be on the side of
the plaintiff under the 3rd amendment of the
constitution.

It is my understanding that doing otherwise will cause
an administrative nightmare and harm to the standard
numbering system across vast segments of the industry
and would create greater security risks than at
present. It would cause enconomic harm to software
writen specifically towards the current system and
force redistribution of software and or fixes that
could be disruptive for months on end.

Worse case scenario. I think this is a bad precedent,
and poor judgement on the part of the defendent ISP,
for the small number block they have. The long term
potential harm could result in small ISP's not being
able to get number blocks thus making it more
difficult
for small companies to gain better backbone access,
from their Tier 1 host counterparts and could trigger
a potentional shakeout in the industry.

Have A nice day...

-Henry




--- Stephen J. Wilcox [EMAIL PROTECTED]
wrote:
 
 Can we stop the analogies before they begin.
 
 This is not the PSTN, comparing it to the PSTN
 appears to be where the court is 
 going wrong. This is the Internet.
 
 It is internationally accepted policy that IP space
 is issued under a kind of 
 license that does not give ownership or
 transferability. It is also part of the 
 fundemental operation of the Internet that address
 space remains aggregated and 
 that customers borrow space from the provider and if
 they move they get given 
 new address space by the new provider. This is
 agreed by IANA, the RIRs, the 
 ISPs. 
 
 Steve
 
 On Tue, 29 Jun 2004, Johnny Eriksson wrote:
 
  
  Fergie (Paul Ferguson) [EMAIL PROTECTED]
 wrote:
  
   Regardless, this is not a telephony issue (Can
 I take my cell
   number with me?), as the courts as seem
 disposed to diagnose
   these days, but rather, a technical one insofar
 as the IP routing
   table efficiency.
  
  No, this is not about taking a phone number.  This
 is about a someone
  moving to a new apartment in a different part of
 town, and asking the
  court to force the owner of the old house to
 reassign the old street
  address to him.
  
  --Johnny
  
 
 



Re: BGP list of phishing sites? Website behind Net attack offline

2004-06-27 Thread Henry Linneweh

http://www.news.com.au/common/story_page/0,4057,9975753%255E1702,00.html

-Henry

--- Scott Call [EMAIL PROTECTED] wrote:
 
 Happy Sunday nanogers...
 
 I was doing some follow up reading on the
 js.scob.trojan, the latest 
 hole big enough to drive a truck through exploit
 for Internet Explorer.
 
 On the the things the article mentioned is that
 ISP/NSPs are shutting off 
 access to the web site in russia where the malware
 is being downloaded 
 from.
 
 Now we've done this in the past when a known target
 of a DDOS was upcoming 
 or a known website hosted part of a malware package,
 and it is fairly 
 effective in stopping the problems.
 
 So what I was curious about is would there be
 interest in a BGP feed (like 
 the DNSBLs used to be) to null route known malicious
 sites like that?
 
 Obviously, both operational guidelines, and trust of
 the operator would 
 have to be established, but I was thinking it might
 be useful for a few 
 purposes:
 
 1 IP addresses of well known sources of malicious
 code (like in the 
 example above)
 2 DDOS mitigation (ISP/NSP can request a null route
 of a prefix which 
 will save the Internet at large as well as the NSP
 from the traffic 
 flood
 3 etc
 
 Since the purpose of this list would be to identify
 and mitigate large 
 scale threats, things like spammers, etc would be
 outside of it's charter.
 
 If anyone things this is a good (or bad) idea,
 please let me know. 
 Obviously it's not fully cooked yet, but I wanted to
 throw it out there.
 
 Thanks
 -Scott
 



RE: Attn MCI/UUNet - Massive abuse from your network

2004-06-25 Thread Henry Linneweh

I think that is a bit irresponsible for the simple
reason that MCI has many co-lo clients and any of
their machines could be vulnerable, I think also that
needs to addressed so that blanket statements are
supported by fact and not the need to competitively
break a company down in hopes the you can steal away
it's customer base

-Henry

--- Tom (UnitedLayer) [EMAIL PROTECTED] wrote:
 
 On Fri, 25 Jun 2004, Ben Browning wrote:
  At 04:00 PM 6/24/2004, Hannigan, Martin wrote:
  [ Operations content: ] Do you know of any ISP's
 null routing AS701?
 
  ISPs? Not of the top of my head. I know several
 businesses who have, and a
  great many people who have blocked UUNet space
 from sending them email,
  either by using SPEWS, the SBL, or
 mci.blackholes.us .
 
 Do these people know how much legitimate email
 they're missing, for every
 spam message that's blocked?
 
 I noticed that from my personal mailbox (which I do
 filter with spam
 assassin), for every one legit mail that gets
 blocked/tagged by SPEWS,
 there's maybe 1-2 junkmails. Thats not a very
 impressive ratio...
 
 



Re: Looking Glass Wiki

2004-06-25 Thread Henry Linneweh

I noticed that recently on Geektools also and that
needs to updated and or fixed

-Henry

--- Janet Sullivan [EMAIL PROTECTED] wrote:
 
 Thomas Kernen wrote:
 
 Since I've been hitting a lot of looking glass
 sites on traceroute.org
 lately that no longer worked, I decided to make my
 own list in wiki
 form.  
 
   FYI Traceroute.org is updated approx once a
 month, most of the input
   is based on user feedback these days since
 automated checking is
   usually rejected by a lot (most) webmasters in
 order to prevent
   automated querries so I get a lot of false
 positives. Also, since
   quite a few of these services are maintained by
 engineering teams they
   tend to go offline for hours/days/weeks/months
 but are valid URLs.
 
 First, let me say that traceroute.org is a wonderful
 site.  I have no 
 desire to pull all of it into wiki format.  All I am
 interested in are 
 the looking glasses and route servers.  Since there
 are only a few 
 hundred of these, I'll still be able to hand check
 them every few weeks.
 Also, being a wiki, users will be able to update the
 entries themselves.
 
 Thanks for all the hard work you to on
 traceroute.org.  I really 
 appreciate and use it a lot.
 



Re: Unplugging spamming PCs

2004-06-24 Thread Henry Linneweh

That sentence is A joke 15000 subscribers affected

Court Convicts Obscene Text Messager

http://www.reuters.com/newsArticle.jhtml;jsessionid=IPQ4NZVA4P24ACRBAELCFEY?type=technologyNewsstoryID=5504916

--- [EMAIL PROTECTED] wrote:
 
  And again, much of this comes down to enforcement.
 When was the last
  time you heard of a spammer's domain being pulled?
 How about the last
  time you saw a spammer be even remotely bothered
 by having their
  domain pulled? Do you think they'll really care
 less about losing a
  mail server when they've got another dozen lined
 up ready and waiting?
 
 Well, just a couple of days ago I read about a
 Russian court in
 Chelyabinsk that sentenced a spammer to two years in
 prison. It's
 the first conviction under a Russian law that
 forbids the use
 of malicious software and the court felt that the
 spamming scripts
 used by this guy were malicious software.
 
 What he did was to send text messages to mobile
 phone
 subscribers of a single company by means of a web
 gateway.
 I think the main reason he was put on trial was
 because the
 mobile operator whose customers were getting the
 spam and
 whose gateway was being misused, went to the police
 and
 complained. How many ISPs in the USA go to the
 police and 
 register official complaints about spammers? We have
 lots
 of smart people who can track down and identify
 spammers
 but it does no good unless the companies who suffer
 damage
 register an official police complaint.
 
 --Michael Dillon
 



Re: Homeland Security now wants to restrict outage notifications

2004-06-24 Thread Henry Linneweh

Consider the source of policy makers that make these
decisions, are clueless to networks and infrastructure
themselves. They fail to understand any costing
metrics
by adding another loop of useless people to he cycle
at
the expense of everyone, which will in the long run
be damaging to the economy of those companies who will
then move those centers offshore to remove the DHS
from
their loop, which causes job loss and skill base
destruction beyond what it already is in the US.

My vote on this proposal is no and contact my gov
rep and complain.

-Henry


--- Adam 'Starblazer' Romberg
[EMAIL PROTECTED] wrote:
 
  I think you (and possibly The Register) are
 overreacting.
 
 With the current state of the government and it's
 previous legislation, I
 would consider that not overreacting at all...  We
 as NANOG'ers need to
 make sure that we're in the clue.  The issue of
 non-information leads for
 longer troubleshooting, and more irate customers.
 
 To each his own, however..
 
 Thanks,
 
 Adam
 
 
 
 Adam 'Starblazer' Romberg Appleton: 920-738-9032
 System Administrator   Valley Fair: 920-968-7713
 ExtremePC LLC-=-  http://www.extremepcgaming.net
 



AOL Orders the Spam Special

2004-06-24 Thread Henry Linneweh

And just when things looked dismal this had to happen
to make it more so

http://www.washingtonpost.com/wp-dyn/articles/A1898-2004Jun24.html?referrer=email

-Henry


Re: S.2281 Hearing (was: Justice Dept: Wiretaps...)

2004-06-19 Thread Henry Linneweh

if the pro-ported bad guys are so swift why would they
use anything packaged anyway?

They have engineers and scientific minds in their
ranks that understand devices, boards and the likes
and could simply create their own data centers and
simply use new protocols to communicate over the
public
lines and not one person would know the difference,
all
the laws in the world would not stop them, since US
law
doesn't apply to anyone but US citizens and most other
nations could care less about what we imagine,
contrive and go into hysterics about.

-Henry

--- John Curran [EMAIL PROTECTED] wrote:
 
 At 12:06 AM -0400 6/20/04, Sean Donelan wrote:
 On Sat, 19 Jun 2004, John Curran wrote:
  S.2281 takes the middle of the road position in
 areas such as lawful
  intercept, universal service fund, and E911.   At
 a high-level, those
  VoIP services which offer PSTN interconnection
 (and thereby look like
  traditional phone service in terms of
 capabilities) under S.2281 pick up
  the same regulatory requirements.
 
 It sounds good, if you assume there will always be
 a PSTN.  But its
 like defining the Internet in terms of connecting
 to the ARPANET.
 
 Correct.  It's a workable interim measure to
 continue today's practice
 while the edge network is transitioning to VoIP.  It
 does not address
 the more colorful long-term situation that law
 enforcement will be in
 shortly with abundant, ad-hoc, encrypted p2p
 communications.
 
 What about Nextel's phone-to-phone talk feature
 which doesn't touch
 the PSTN?  What about carriers who offer Free
 on-net calling, which
 doesn't connect to the PSTN and off-net calling to
 customers on the
 PSTN or other carriers.
 
 Will the bad guys follow the law, and only conduct
 their criminal
 activities over services connected to the PSTN?
 
 Sean - what alternative position do you propose?
 /John
 



Re: Verisign vs. ICANN

2004-06-18 Thread Henry Linneweh

It is amazing that one psrson Paul Vixie could be so
intimidating that he must be intimidated and maligned
as a conspirator in order to eliminate him as a
potential threat because of his knowledge.

I find that pretty ironic that a billion dollar
corporation is that weak.

-Henry

--- Patrick W Gilmore [EMAIL PROTECTED] wrote:
 
 On Jun 18, 2004, at 2:25 PM, Wayne E. Bouchard
 wrote:
 
  verisign's official position throughout the
 sitefinder launch was 
  that users
  are free to disable it if they want to.  they
 did NOT want this 
  characterized
  as them shoving their sitefinder service down
 anybody's unwilling 
  throat.  so
  i don't expect any action to occur against folks
 who installed a BIND 
  patch.
 
  Um, unless I really missed something during this
 whole episode, that
  was the only way TO disable it.
 
 Have the roots recurse and put a wildcard in for
 anything that does not 
 resolve.
 
 Makes Paul a ... well, not a competitor, 'cause that
 would imply they 
 were in competition.  If the roots put in the wild
 card, the GTLDs 
 cannot compete.
 
 -- 
 TTFN,
 patrick
 
 



RE: Akamai DNS Issue?

2004-06-15 Thread Henry Linneweh

sbc/yahoo and them wee doing upgrades on their email
last night could be moving things around to accomodate

-Henry

--- Drew Weaver [EMAIL PROTECTED] wrote:
 
 Similar issues with Yahoo on and off since about
 8:30am (EST).
 
 -Drew
 
 -Original Message-
 From: Leo Bicknell [mailto:[EMAIL PROTECTED] 
 Sent: Tuesday, June 15, 2004 9:09 AM
 To: [EMAIL PROTECTED]
 Subject: Akamai DNS Issue?
 
 
 From here neither www.google.com, nor www.apple.com
 work.  Both
 seem to return CNAMES to akadns.net addresses (eg,
 www.google.akadns.net,
 www.apple.com.akadns.net), and from here all of the
 akadns.net
 servers listed in whois are failing to respond.
 
 Can someone confirm from another location?  Comments
 from Akamai?
 
 -- 
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
 PGP keys at http://www.ufp.org/~bicknell/
 Read TMBG List - [EMAIL PROTECTED],
 www.tmbg.org
 



Yahoo Raises Stakes in E-Mail War with Google

2004-06-15 Thread Henry Linneweh

This is what I was talking about...

http://www.reuters.com/newsArticle.jhtml;jsessionid=ROKTUY2SVUOBMCRBAELCFFA?type=internetNewsstoryID=5421215


Re: Points on your Internet driver's license (was RE: Even you can be

2004-06-14 Thread Henry Linneweh

Wow he has changed and toned down a lot from those
days

-Henry

--- [EMAIL PROTECTED] wrote:
 
  8 to 10 years ago the discussions were dominated
 by Karl D(1),
  where *everything* was defined as to whether is
 was actionable or not.
 
 Googling for Karl Denninger and actionable only
 gets 30 hits
 but, oh the nostalgia of it all...
 
 Check out http://www.denninger.net to see that he is
 still
 alive and kicking and protesting one thing or
 another.
 
 
 



Re: Even you can be hacked

2004-06-11 Thread Henry Linneweh

Here are a list of very active ports that attempt to
hack into peoples systesm from various parts of the
world China in particular. 

I think unassigned ports should be dropped from
routing
tables unless they are registered with the host and or
providers as to their legitimate use


smpnameres 901/tcp  SMPNAMERES
smpnameres 901/udp SMPNAMERES
blackjack  1025/tcpnetwork blackjack
blackjack  1025/udp   network blackjack
cap1026/tcp   Calender Access Protocol
cap1026/udp   Calender Access Protocol
exosee 1027/tcp   ExoSee
exosee 1027/udp   ExoSee
#  1124-1154  Unassigned
ssslic-mgr 1203/tcpLicense Validation
ssslic-mgr 1203/udp   License Validation
ms-sql-s   1433/tcp   Microsoft-SQL-Server 
ms-sql-s   1433/udp   Microsoft-SQL-Server 
ms-sql-m   1434/tcp   Microsoft-SQL-Monitor
ms-sql-m   1434/udp   Microsoft-SQL-Monitor
#  6851-6887  Unassigned
monkeycom  9898/tcp   MonkeyCom
monkeycom  9898/udp   MonkeyCom

And I need a list that shows who or what owns Dynamic
and/or Private Ports

-Henry

--- Laurence F. Sheldon, Jr. [EMAIL PROTECTED]
wrote:
 
 Andy Dills wrote:
 
  On Thu, 10 Jun 2004, Laurence F. Sheldon, Jr.
 wrote:
  
  
 Jeff Shultz wrote:
 
 
 
 But ultimately, _you_ are responsible for your
 own systems.
 
 Even if the water company is sending me 85%
 TriChlorEthane?
 
 Right.  Got it.  The victim is always responsible.
 
 There you have it folks.
  
  
  Change the word victim to negligent party and
 you're correct.
  
  Ignoring all of the analogies and metaphors, the
 bottom line is that ISPs
  are _not responsible_ for the negligence of their
 customers, and that ISPs
  are _not responsible_ for the _content_ of the
 packets we deliver. In
  fact, blocking the packets based on content would
 run counter to our sole
  responsibility: delivering the well-formed packets
 (ip verify unicast
  reverse-path) where they belong.
  
  Remember, we're service providers, not content
 providers. Unless your AUP
  or customer contract spells out security services
 provided (most actually
  go the other way and limit the liability of the
 service provider
  specifically in this event), then your customers
 have to pay you to secure
  their network (unless you feel like doing it for
 free), or they are
  responsible, period.
  
  As far as I'm concerned, that guy would have a
 better shot at suing
  Microsoft then challenging his bandwidth bill.
  
  Andy
  
  ---
  Andy Dills
  Xecunet, Inc.
  www.xecu.net
  301-682-9972
  ---
  
 
 
 How many more of these do I need, do you think?
 
 -- 
 Requiescas in pace o email
 
 Ex turpi causa non oritur actio
 
 http://members.cox.net/larrysheldon/
 
 



RE: Even you can be hacked

2004-06-11 Thread Henry Linneweh

I can agree with that and Randy pointed out when these
idea's were created and writen, security was not part
of the overall plan because there were trusted parties
on either end of the spectrum. 

I think that my intent was noble and I am glad I
started a controversy, because this is an issue that
needs to be addressed as we move forward with internet
development and secure application development.

Working for a telecomm/datacomm company gives me some
insight into the problem, I am looking into it deeper
from a hardware perspective, of designing a solution 
that goes on a board among other system's issues...

Yeah I brainstorm too, and also being an end user
client I think about the end result of no solution and
people overwhelemed with issues that lead to no
solution to people so overwhelmed they think
legislating law can fix broken code.

It does help when the architects give me insight to 
the issue and how immense it is and what to look at
when I am determining the end result of any of my 
efforts.

-henry


--- Alex Bligh [EMAIL PROTECTED] wrote:
 
 
 
 --On 11 June 2004 14:18 -0700 Randy Bush
 [EMAIL PROTECTED] wrote:
 
  the bottom line
 
o if you want the internet to continue to
 innovate, then
  the end-to-end model is critical.  it means
 that it
 
 If there is a lesson here, seems to me it's that
 those innovative protocols
 should be designed such that it is relatively easy
 to prevent or at least
 discourage bad traffic. Because that's in the long
 run easier (read
 cheaper for those of you of a free market bent) than
 educating users in an
 ever changing environment. It would be a bit rich to
 criticize SMTP
 (for instance) as misdesigned for not bearing this
 in mind given
 the difficulty of anticipating its success at the
 time, but there is a
 lesson here for other protocols. I can think of one
 rather obvious one
 which would seem to allow delivery of junk in many
 similar ways to SMTP;
 hadn't thought of this before but we should be
 learning from our
 mistakes^Wprevious valuable experience.
 
 Alex



Re: Points on your Internet driver's license (was RE: Even you can be hacked)

2004-06-11 Thread Henry Linneweh

Scalable bandwidth is not new and is charged for, what
is the issue about that?

If the network is compromised and it is on the client
end, that is what business insurance is for, so that
everyone gets their's (payments, otherwise other types
of arrangements need to be made, according to the
doctrine of reasonable man

-henry R Linneweh



--- Adi Linden [EMAIL PROTECTED] wrote:
 
  If your child borrows your credit card, and makes
 lots of unathorized
  charges, you may not have to pay more than $50;
 but the bank can go after
  your son or daughter for the money.  Most parents
 end up paying, even if
  they didn't authorize their children to use the
 credit card.
 
 So the credit card company calls you and asks about
 a bunch of suspicious 
 charges being placed on you card. Ok, just keep on
 charging. Now who's to 
 blame for these charges by your sons and daughters
 and the russian mafia?
 
 I sell a client a metered product (gas, water,
 electricity, telephone, 
 internet data, etc). I notice unusually high
 consumption. I inform the 
 client that the bill is accumulating rather quick
 and I suspect a problem. 
 I have done my job. The client either tells me to
 stop delivery until the 
 problem is diagnosed and resolved or tells me to
 continue service. Either 
 way, the ball in in the clients court. If the client
 chooses continuation 
 of service despite high consumption and subsequent
 huge bill he has an 
 obligation to pay, no matter WHY the usage was to
 high.
 
 Our society has a screwed up sense of
 responsibility. Everyone else is 
 supposed to look out for me and take care of me. If
 something happens to 
 me because I do something stupid or foolish someone
 failed to warn me, 
 didn't make the sign big enough, didn't sound the
 horn loud enough, didn't 
 lock me up so I couldn't hurt myself. This isn't
 true for everybody but 
 way too many
 
 Adi
 
 



Re: botnets world and the FBI

2004-06-01 Thread Henry Linneweh

E-crime = E-crap another media driven dribbled label.

There are many students, even housewives who in their
spare time write botnets and other software mechanisms
simply for the purpose of learning how to program, in
C and C++ or even learn how to script in Perl, Python
and tcl. To make a blanket statement is to condemn
innocent people who have nothing to do with a limited
group of people that do warez aka pirate software on
irc servers when law enforcement, already has been
there to make cases and arrests and prosecutions.

Seeing that a dalnet luser is crying wolf, if my
history has taught me correctly, that network got
ddos'd out of existence over warez and battles over
control over software piracy. Other networks were 
intelligent enough to get out of the way and make
sure such events do not destroy the client base.

-Nite


--- [EMAIL PROTECTED] wrote:
 On Tue, 01 Jun 2004 17:06:20 EDT, Jamie C.Pole
 said:
  Because academics know EVERYTHING.
 
 What's that got to do with anything?  (or are you
 making the rather rash and
 all-too-common generalization that everybody who
 posts from a .edu is an
 academic?  Surprise - at least some sites are clued
 enough to keep academics in
 the classroom and lab, and hire people who know
 something about production
 environments to run the network and the big
 servers)
 
  Let's not talk about the links between financial
 fraud, drugs, and 
  terrorism.  Of course they're related...
 
 Right... my point is that e-crime is a *symptom*
 of the others - you won't
 be able to do anything about e-crime until the
 *root* problem (fraud/drugs/terrorism)
 is dealt with.
 
 We have had enough ill-defined 'War on
 Election-Year-Buzzwords' (terrorism,
 drugs, organized crime, illiteracy, poverty - the
 wars on Communism and
 Inflation seem to have evaporated.  I've probably
 missed a few...).  And we
 seem to do a very poor job of ever asking *why*
 people decide to blow us up, or
 do drugs, or be poor/homeless.  I don't see any
 reason why we'd do any better
 with e-crime.
 
 And even if E-crime *is* a separate war we need to
 declare, where will we get
 the resources from?  Our military has long had a
 policy regarding the troop
 strength we need, and bases it on a We can handle 3
 small conflicts, or 1
 large and one small, and we need to avoid being in 2
 major conflicts at once
 type of ruleset.  Take a look how many billions of
 dollars a month we're
 collectively hemorrhaging in Iraq, and ask what
 we'll trim to fight e-crime.
 
 
 

 ATTACHMENT part 2 application/pgp-signature 




Re: netlantis news

2004-05-27 Thread Henry Linneweh

Well between completewhois and netlantis my day is
made 

-henry

--- Pascal Gloor [EMAIL PROTECTED] wrote:
 
 Hello ppl,
 
 
 as you probably have noticed, netlantis is down
 since a while. Netlantis had
 critical performance problems and we decided to
 re-write some of the core
 scripts to improve the DB update. While doing this
 we had some new ideas
 about how to process the updates and much more has
 been re-written.
 
 There are no new features for the users, just the
 core-system works on a
 different way and all the BGP updates queuing
 problems will be gone.
 
 
 What's new then ?
 
 netlantis is running now since several weeks its own
 BGP daemon called
 (guess) nbgpd. So far it works well and has pretty
 nice performance (able to
 handle up to 500 full BGP sessions (tested up to
 100)). nbgpd is dumping
 updates into files (per peer, per timestamp) in its
 own (simple) binary
 format.
 The updates are then sent to ndb (netlantis DB
 manager) which is a fast
 routing table status file updater. This also runs
 since several weeks.
 the last difficulty is to convert this ndb format
 for the SQL database (to
 handle all the web/whois/telnet queries).
 So far we wrote the MySQL (MyISAM format) data file
 properly.
 
 
 So? why isnt it up yet 
 
 We still have a last part to finish, writing the
 MySQL (MyISAM format) index
 file. Once this step completed, netlantis will come
 back up!
 
 
 What's the difference for the lambda user??
 
 Reliable informations! Until now, global cisco bug
 upgrade worldwide in the
 world made netlantis to go booom due to the high
 load of bgp updates. This
 will no more happen. We expect to have a delay to
 real-time of about 10 to
 15 minutes, with few or many BGP updates, it wont
 matter!
 
 Well, I dont care about your internal stuff, when
 will it be back
 
 We expect to bring netlantis back during the next
 week. We will inform you
 then.
 
 
 
 
 Best Regards,
 Pascal Gloor
 
_  __   ___   _  
   / |/ / __/_  __/ /  / _ | / |/ /_  __/  _/ __/
  // _/  / / / /__/ __ |// / / _/ /_\ \
 /_/|_/___/ /_/ //_/ |_/_/|_/ /_/ /___/___/.org
   ... where all the routes meet
 



Buffalo Spammer sentenced to prison

2004-05-27 Thread Henry Linneweh

http://story.news.yahoo.com/news?tmpl=storycid=1093e=2u=/pcworld/20040527/tc_pcworld/116307


Re: Cisco HFR

2004-05-27 Thread Henry Linneweh

I'm curious here, don't photons cause a lot of
reflective jitter because of their large size ??

-henry

--- Mikael Abrahamsson [EMAIL PROTECTED] wrote:
 
 On Tue, 25 May 2004, Peter Lothberg wrote:
 
  You can run the same distance as you do with your
 10G system. 
  It;s mostly driven by dispersion, crosstalk and
 snr if you have many
  amps. Milage varies with span design, but is not
 much different than
  10G (as the symbol speed is till 10G).
 
 Ah, so it's actually 4 different wavelengths within
 the ITU-grid 
 alottment of one single 10G wave?
  
   Can 10G optical amplifiers be used?
  
  Yepp..
 
 How does the fact that you need to amplify four
 times the photons in the 
 same wavelength space affect things? Just needs to
 be taken into 
 consideration when calculating the amount/number of 
 amplification/amplifiers?
 
 Is this something in production or alpha/beta test
 with the DWDM 
 manufacturer?
 
 -- 
 Mikael Abrahamssonemail: [EMAIL PROTECTED]
 



RE: issues with AOL Time Warner

2004-05-21 Thread Henry Linneweh

Yeah I was connected to AIM and my connection dropped
like a rock and popup came up telling me I lost my
connection

-Henry


--- Owens, Loren [EMAIL PROTECTED] wrote:
 
  South East (Central Florida specifically) is seeing
 major problems as
 well.  Cfl.rr.com has stopped routing through ATDN
 all together and is
 now going out through bbnplanet and level3.
 
 Shane
 
 -Original Message-
 From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED] On Behalf Of
 Gabriel
 Sent: Friday, May 21, 2004 4:18 PM
 Cc: '[EMAIL PROTECTED]'
 Subject: Re: issues with AOL Time Warner
 
 
 Same here...   We saw all our AIM clients go down
 for about five
 minutes. 
 Traceroutes showed lots of apparent troubles in
 atdn.net, also coming
 from the west coast.
 
 Is anyone seeing issues with AOL CNN ?
 
 -- 
 Gabriel Cain  
 www.dialupusa.net 
 Senior Systems Administrator  
 [EMAIL PROTECTED]
 PGP fingerprint:   C0B4 C6BF 13F5 69D1 3E6B CD7C
 D4C8 2EA4 2B08 1C6D
 
   Technology for the sake of business.



Judge Dismisses Claim in VeriSign's ICANN Case

2004-05-18 Thread Henry Linneweh

http://www.eweek.com/article2/0,1759,1594815,00.asp


Re: CiSCO IOS 12.* source code stolen

2004-05-16 Thread Henry Linneweh

You do not have to steal the code, you can buy a cisco
router from an equipment reseller and have all the
access you want.


-Henry




--- Alexei Roudnev [EMAIL PROTECTED] wrote:
 
 Hmm, it's all interesting. EFnet IRC again...
 
 Does anyone have a full logs of EFnet IRC
 conversations? We used to
 participate in it 6 years ago (when fighting hackes
 in Russia),
 and it was very useful for following trends (of
 course, after you dump a
 heaps of junk).
 
 
 - Original Message - 
 From: Michel Py
 [EMAIL PROTECTED]
 To: John Kinsella [EMAIL PROTECTED];
 [EMAIL PROTECTED]
 Sent: Saturday, May 15, 2004 1:45 PM
 Subject: RE: CiSCO IOS 12.* source code stolen
 
 
 
 Rough translation of:
 http://www.securitylab.ru/45221.html
 
 May, 15 2004
 
 Leak of code CiSCO IOS source code?
 
 As it became known to SecurityLab, the source code
 of operating system
 CISCO IOS 12.3, 12.3t, which is used in the majority
 of Cisco network
 devices has been stolen on May 13, 2004. The total
 volume of the stolen
 information represents about 800MB in an archive
 file.
 
 According to the information available to us, the
 leak of fragments of
 the source code occurred because of a break-in into
 the corporate
 network of Cisco System.
 
 Representatives of Cisco System have not made any
 comments about the
 break-in so far.
 
 A person whose alias on [EMAIL PROTECTED] IRC is
 franz has given a small
 parts of the source code (about 2.5 Mb) as proof.
 
 Below are links to the first 100 first lines of
 source code of:
 
 ipv6_tcp.c:
 http://www.securitylab.ru/45222.html
 
 ipv6_discovery_test.c:
 http://www.securitylab.ru/45223.html
 
 



Re: FW: Worms versus Bots

2004-05-04 Thread Henry Linneweh

It is amazingly simply to pull an ethernet cable out
of the back of your box to update a box from a CD
especially in a suspect environment where you have
had many problems.

I have had the displeasure of having had to go from
box to box and clean each individually and while many
problems were stopped by Netscreen at the door, we
still had to run enterprise protection per machine as
a second line of defense and separate domains in the
company for greater protection between the groups.

-Henry


--- Eric Krichbaum [EMAIL PROTECTED] wrote:
 
 I see times more typically in the 5 - 10 second
 range to infection.  As
 a test, I unprotected a machine this morning on a
 single T1 to get a
 sample.  8 seconds.  If you can get in 20 minutes of
 downloads you're
 luckier than most.
 
 Eric
 
 
 -Original Message-
 From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED] On Behalf Of
 william(at)elan.net
 Sent: Monday, May 03, 2004 11:49 PM
 To: Sean Donelan
 Cc: Rob Thomas; NANOG
 Subject: Re: Worms versus Bots
 
 
 On Mon, 3 May 2004, Sean Donelan wrote:
 
  On Mon, 3 May 2004, Rob Thomas wrote:
   ] Just because a machine has a bot/worm/virus
 that didn't come with 
   a ] rootkit, doesn't mean that someone else
 hasn't had their way
 with it.
  
   Agreed.
  
  Won't help.  What's the first thing people do
 after re-installing the 
  operating system (still have all the original CDs
 and keys and product
 
  activation codes and and and)? Connect to the
 Internet to download the
 
  patches. Time to download patches 60+ minutes.
  Time to  infection 5 minutes. 
 
 Its possible its a problem on dialup, but in our ISP
 office I setup new
 win2000 servers and first thing I do is download all
 the patches. I've
 yet to see the server get infected in the 20-30
 minutes it takes to
 finish it
 (Note: I also disable IIS just in case until
 everything is patched..). 
 
 Similarly when settting up computers for several of
 my relatives (all
 have dsl) I've yet to see any infection before all
 updates are
 installed.
 
 Additional to that many users have dsl router or
 similar device and many
 such beasts will provide NATed ip block and act like
 a firewall not
 allowing outside servers to actually connect to your
 home computer.
 On this point it would be really interested to see
 what percentage of
 users actually have these routers and if decreasing
 speed of infections
 by new virus (is there real numbers to show it
 decreased?) have anything
 to do with this rather then people being more
 carefull and using
 antivirus.
 
 Another option if you're really afraid of infection
 is to setup proxy
 that only allows access to microsoft ip block that
 contains windows
 update servers
 
 And of course, there is an even BETTER OPTION then
 all the above - STOP
 USING WINDOWS and switch to Linux or Free(Mac)BSD !
 :)
 
  Patches are Microsoft's
  intellectual property and can not be distributed
 by anyone without 
  Microsoft's permission.
 I don't think this is quite true. Microsoft makes
 available all patches
 as indidual .exe files. There are quite many of
 these updates and its
 really a pain to actually get all of them and
 install updates manually.
 But I've never seen written anywhere that I can not
 download these .exe
 files and distribute it inside your company or to
 your friends as needed
 to fix the problems these patches are designed for. 
  
  The problem with Bots is they aren't always
 active.  That makes them 
  difficult to find until they do something.
 As opposed to what, viruses?
 Not at all! Many viruses have period wjhen they are
 active and
 afterwards they go into sleep mode and will not
 active until some
 other date!
 
 Additionally bot that does not immediatly become
 active is good thing
 because of you do weekly or monthly audits (any many
 do it like that)
 you may well find it this way and deal with it at
 your own time, rather
 then all over a sudden being awaken 3am and having
 to clean up infected
 system.
 
 --
 William Leibzon
 Elan Networks
 [EMAIL PROTECTED]
 



Netlantis tools when are they returning ???

2004-05-03 Thread Henry Linneweh

I miss this essential toolset now that I do not have
it

-Henry


RE: Lsass.exe causing shutdown in IE.

2004-05-01 Thread Henry Linneweh

W32.Sasser.Worm
http://www.symantec.com/avcenter/venc/data/w32.sasser.worm.html

Microsoft Windows LSASS Buffer Overrun Vulnerability
http://www.symantec.com/avcenter/security/Content/10108.html

Latest virus threats

[EMAIL PROTECTED]
Backdoor.Sdbot.Z
W32.Gaobot.AFW
W32.Gaobot.AFJ
W32.Gaobot.AFC


-Henry


--- Todd Mitchell - lists [EMAIL PROTECTED] wrote:
 
 | Behalf Of Ejay Hire
 | Sent: May 1, 2004 4:09 PM
 | 
 | We're starting to take calls from users about an
 LSASS.EXE 
 | error causing
 | XP to do the 60 seconds till forced reboot, and
 the normal blaster
 | mitigation and turning on the ICF isn't fixing it.
  I've been able to
 | reproduce it on one machine locally.  Is anyone
 else seeing it?
 
 This may be of interest to you:
 
 http://xforce.iss.net/xforce/alerts/id/172
 
 Todd
 
 --
 



U.S. Charges 4 Under New Anti-Spam Law

2004-04-29 Thread Henry Linneweh

Hopefully this case will have a positive outcome to
send and very clear message to providers and spammers

http://customwire.ap.org/dynamic/stories/I/INTERNET_SPAM?SITE=FLTAMSECTION=HOMETEMPLATE=DEFAULT


Cisco Rolls Major Patches to TCP Flaw

2004-04-21 Thread Henry Linneweh

http://www.internetnews.com/infra/article.php/3343561

For people still in a panic

-Henry


Re: Packet anonymity is the problem?

2004-04-11 Thread Henry Linneweh

There are network equipment manufactures who offer 
last mile protection at the chip level which forces
authentication or the packets get dropped, this has
been around for about 4 years now and people should
seriously look at that as a solution, fast changeable
FPGA designs can accommodate such issues and can be
changed on the fly long before someone has time to
effectively reverse engineer them to find out how they
work, they will always be behind by several years and
will not he having access to source code to be able to
hack anything

Forced Identification for people who purchase Cisco
reseller equipment and any other manufacturer of said
equipment will put a dent in some of this non sense
also. If there is to be security then you must look
at the entire issue well beyond the ability to hack
stuff. Anyway my 2 cents for the moment

-Henry




--- Yann Berthier [EMAIL PROTECTED] wrote:
 
 On Sun, 11 Apr 2004, Iljitsch van Beijnum wrote:
 
  Ok, then explain to me how removing bugs from the
 code I run prevents 
  me from being the victim of denial of service
 attacks.
 
It's the other way around in fact: if others were
 to run (more)
secure code, there would be far less boxen used
 as zombies to launch
ddos attacks against your infrastructure, to
 propagate worms, and to
be used as spam relays.
 
While it can sound a bit theorical (to hope that
 the others will
run secure code), as the vast majority of users
 run OSs from one
particular (major) vendor, an amelioration of
 said family of OSs
would certainly benefit to all. Just think about
 all the recent
network havocs caused by worms propagating on one
 OS platform ...
 
   - yann



New cisco exploit published in the media today

2004-03-29 Thread Henry Linneweh

Cisco warns of new hacking toolkit
http://www.infoworld.com/article/04/03/29/HNhackingtoolkit_1.html

exploit location
http://www.blackangels.it/

-Henry


are we streaming email or did we die

2004-03-24 Thread Henry Linneweh

Now I am curious

-Henry


Progress against spam

2004-03-20 Thread Henry Linneweh

AOL Blocks Spammers' Web Sites 
http://www.washingtonpost.com/wp-dyn/articles/A9449-2004Mar19.html
 
I think this is noteworthy and may help...
 
-Henry



Re: US Extradition rights (was Re: Spamhaus Exposed)

2004-03-18 Thread Henry Linneweh

This entire fiasco needs to migrate off line, please 

-HenryWilliam Warren [EMAIL PROTECTED] wrote:
could this be taken offlist please?Dave Howe wrote: Joshua Brady wrote: The "Child" you speak of caused destruction over a network, the sameapplied for the 2 hackers here who were sent over without evenquestioning the UK. If the US Government is Satan then I suppose I amgoing to hell, because I sure as hell support it.  Oh, so do I - I just think on general principles it really should require a judge in the serving country to rubberstamp it before the snatch and grab takes place - or more appropriately that the case be made to a UK judge, the child tried here and sentenced here. His actions were, after all, a criminal offence here too  -- My "Foundation" verse:Isa 54:17 No weapon that is formed against thee shall
 prosper; and every tongue that shall rise against thee in judgment thou shalt condemn. This is the heritage of the servants of the LORD, and their righteousness is of me, saith the LORD.

Re: Spamhaus Exposed

2004-03-17 Thread Henry Linneweh
I believe under USC18 there is a section that clearly states hacking a government computer can get you a maximum of 30 years in federal prison and a $250,000.00 fine
Please correct me if that postscription of law has been vacated.

-Henry
Dan Hollis [EMAIL PROTECTED] wrote:
On Wed, 17 Mar 2004, Steve Linford wrote: From Deep Throat, received 17/3/04, 21:10 + (GMT):  Disturbing information on one of the founders of Spamhaus.org  http://www.geocities.com/jackjack9872004/ Not just a load of BS, but posted to NANOG anonymously, through a  hijacked machine at 198.26.130.36 (The Pentagon) no less.federal interest site. thats automatic prison time, isnt it?i suspect the culprit could be prosecuted under PATRIOT, and sent away for quite a _long_ time...-Dan

Re: UPnP

2004-03-13 Thread Henry Linneweh
That reads more like a person who is customer centric with an acceptable idea...

-HenrySean Donelan [EMAIL PROTECTED] wrote:
On Fri, 12 Mar 2004, James Edwards wrote: I see a lot of unicast UPnP traffic on my networks. UPnP seems like a train wreck waiting to happen, to me.Yep. Giving insecure PC's the power to change firewall settings. Doesn'tsound like the cleverest idea.I have a firewall, my computer can't be a zombie. Yes, I click on everyattachment I see and install every program any random web site offers me,but I have a firewall so my computer can't be a zombie :-(But it does demostrate that people really, really want to run theirapplications no matter how we try to stop them. Instead of blockingpeople from running their applications, can we figure out better waysfor them to run them safely?

thanks for the great response on wholesalebandwidth.com major abuser

2004-03-12 Thread Henry Linneweh
I want to thank everyone on this for the excellant response :)

-Henry"Sturgeon, Jon" [EMAIL PROTECTED] wrote:
william(at)elan.net wrote: Don't forget to add 69.6.64.0/20 to your access list - they recently got this addition and quickly moved quite some number of spam servers there.Much thanks, William, I hadn't picked up on that. That netblock is nowadded to by personal blacklist.Thanks again,Jon-- --FutureSoft, Inc.12012 Wickchester Lane, Suite 600Houston, TX 77079If you no longer want to receive commercial e-mail correspondencefrom FutureSoft, you may remove your address from our records by visiting www.futuresoft.com/emailremoval.asp--

wholesalebandwidth.com major sponsor of spammers refuses to accept email at abuse

2004-03-11 Thread Henry Linneweh
I have received almost 200 different spam messages from domains hosted by this
provider from russain domains attempting to sell pharmacueticals and other unsolicited
services that I do not want tekmailer.com and moosq.com are 2 of the primary 
abusers from this hosting company

-Henry



Message from yahoo.com.Unable to deliver message to the following address(es).[EMAIL PROTECTED]:69.6.21.60 does not like recipient.Remote host said: 550 5.7.1 [EMAIL PROTECTED]... Relaying deniedGiving up on 69.6.21.60.

Re: Source address validation (was Re: UUNet Offer New Protection Against DDoS)

2004-03-08 Thread Henry Linneweh
Here is some insight on this issue
What is Unicast Reverse Path Forwarding (uRPF)? Can a default route 0.0.0.0/0 be used to perform a uRPF check? 
http://www.cisco.com/warp/public/105/44.html#Q18
-Henry

Re: Possibly yet another MS mail worm

2004-03-01 Thread Henry Linneweh
-BEGIN PGP SIGNED MESSAGE-Hash: SHA1
Everyday there is a new, news article on this and every day everyonepanics and eeryday some one says tell the government to make a law, it is timeto realize that no law is going to do anything for anyone soon. In the past wejust took care of the problem and we can do the same now by sharing the solutions weshared then for FREE. 
There are incredibily talented people in this group who lurk, I would like to see your toughts on these issues in private if you do not feel comfortable talking publicly
New Netsky-D Worm Spreading Through E-Mailhttp://www.reuters.com/newsArticle.jhtml?type=technologyNewsstoryID=4469850section=news
-BEGIN PGP SIGNATURE-Version: PGP 8.0.2 
iQA/AwUBQEOCXMiimYc7OT3DEQJsJwCeNrz9cdP+nmzCzaR/cHJ5AlY7V50AnjIut1/Wyd4XaTrjv3YiuxJIvt0k=cf72-END PGP SIGNATURE-

Re: First Post! Annoying Debate at Work.

2004-03-01 Thread Henry Linneweh
Consumers are not interested in certificates, they want solutions that are 
packaged. Front end services when people sign up for accounts should include
allthe tools necessary for survive on any network you provider access to.

-Henry"Patrick W.Gilmore" [EMAIL PROTECTED] wrote:
On Mar 1, 2004, at 12:59 PM, Christopher Aldridge wrote: Please do not take this the wrong way, but I thought it was useful input. Perhaps not to you, but maybe to those who think that getting their MCSA will teach them all they need to know. One who thinks these exam topics cover (as you say" "all they need to know", should really investigate this certification.So we are in agreement. Some of the things you asked were extremely basic. What "things" were these?I guess I just consider things like "ethernet adaptors" and "ethernet converters" basic. Basic can be good. But it's still basic.Also, I probably attributed some of the replies to your original post in my memory. Or maybe I just misremembered your post completely. I hope you can accept my
 apology and end the flame war.In my defense, I did say that you should not take this personally. So I would not take this as an attack on you personally - lots of people answered took the time to answer your questions, asking not  even a favor in return as payment. The people who responded helpfully to my post, will receive any help  and assistance in the future from me as a fellow nanog'er; without the POINTLESS sarcasm and flaming.Got it. 'Cause the post to which I am responding is very pointFULL.And if you are implying that I will not be getting help and assistance from you (or at least not without sarcasm), well, somehow I'm just not too worried. I would take it as a note to people with certifications or going for certifications that a cert != clue. I agree here 100%. However you have also made it
 very clear that  no_cert != clue.Really? Glad we cleared that up, 'cause lots of people were probably assuming that if you have no certification you were automatically clued :)Unless, of course, you are implying I have no certifications. Which would be a bad assumption. I have gotten several certifications over the years, some of which I actually think are useful. I just do not have any of the ones you listed.Of course, then you would also be impling I have no clue. Many people might agree with you, but since the first part (no_cert) failed, then the second part is irrelevant. (Did any of those certs have labs, or just multiple-guess tests?) Google is your friend. http://www.microsoft.com/learning/mcp/mcsa/requirements.asp http://www.cisco.com/en/US/learning/le3/le2/le0/le9/  learning_certificati
 on_type_home.htmlThanx, but not worth the effort. I'm never going to get a CCNA (definitely) or an MCSA (probably). Was just curious and didn't want to wade through multiple web pages. A couple people told me off-list and I was happy.Thanx for the tip, though. I'll have to remember that "google" thing :)-- TTFN,patrick

RE: First Post! Annoying Debate at Work.

2004-03-01 Thread Henry Linneweh
You wanna know about USB read this and that doesn't take an MSCEhttp://www.usb.org/faq

Andy Dills [EMAIL PROTECTED] wrote:
On Mon, 1 Mar 2004, Christopher Aldridge wrote: know", should really investigate this certification. Some of the things you asked were extremely basic. What "things" were these?How about the question about whether or not a usb ethernet adapter was anethernet converter?You're the one who thinks Patrick is a nozzle for not searchinggoogle...when your question, the sole purpose of your posting, can beanswered merely by searching google.I'm sure when you look for the proper terms, such as "media converter",you'll have a lot more luck.Basically, in order for something to be an adapter, it _MUST_ be theinterface for a leaf node, such as an individual computer.In order for something to be a converter, there is an implied many-to-manyrelationship, not a one-to-many or one-to-one
 as with an adapter. The people who responded helpfully to my post, will receive any help and assistance in the future from me as a fellow nanog'er; without the POINTLESS sarcasm and flaming.You mean, the pointless sarcasm and flaming in response to a pointless andclueless post?  I would take it as a note to people with certifications or going for certifications that a cert != clue. I agree here 100%. However you have also made it very clear that no_cert != clue.Heh, yeah, check out the tiny clue on Patrick. I mean, you've been readingfor a whole year, surely you know who the people to respect are. How darePatrick be a pretender! ;) (Did any of those certs have labs, or just multiple-guess tests?) Google is your friend. http://www.microsoft.com/learning/mcp/mcsa/requirements.asp
 http://www.cisco.com/en/US/learning/le3/le2/le0/le9/learning_certificati on_type_home.htmlOh, so you DO know about google. Then why are you littering and loiteringon this list? P.S. I kinda expected as much from MS, but it's sad that a cisco cert doesn't mean much any more. :( Notice mostly everyone who provided useful feedback on this agreed with my opinion on this. Common sense has nothing to do with certs. Having both isn't a bad trait however.You're right, common sense has nothing to do with certs. Thank you forproviding a concrete example.Andy---Andy DillsXecunet, Inc.www.xecu.net301-682-9972---

Re: Open, anonymous services and dealing with abuse

2004-02-16 Thread Henry Linneweh
good while doing that add [EMAIL PROTECTED] to the list of spammers that bug 
people

-Henry
On Mon, 16 Feb 2004, Daniel Reed wrote: On 2004-02-15T17:33-0500, Sean Donelan wrote: ) The unfortunate fact is lots of people like to operate open, anonymous ) services and then expect other people to clean up after them. ) ) Why don't IRC operators require authentication of their users? ) Why don't SMTP operators require authentication of their users? Why don't HTTP operators require authentication of their users? If I'm researching testicular cancer on the web, that may involve web sites, IRC support channels, or mailing lists.If you have a read-write HTTP web site (i.e. send e-mail through web,write web blogs, etc), why don't you have authentication before permitingusers to write? This includes news web sites which let you "forward"stories by entering arbitrary addresses.
 mailfrom.cgi and friends is asmuch of a problem.If you want to tell everyone in the world about your new and improvedcure for testicular cancer available for the low low price of $119 bysending continious messages on unauthenticated IRC channels, mailinglists and web blogs why should the ISP pierce the veil of anonymitity theIRC operator, mailing list operator, web blog operator wanted?The operator of the anonymous service should deal with the consequencesof maintaining that anonymitity. ISPs authenticated their users. Butthat doesn't mean it is the ISP's responsibility to track down users ofanonymous services everytime there is a problem. This isn't the plot to next summer's killer Sci-Fi horror movie; this is what we are dealing with on the Internet today. In either case, the long- term public interest would probably be served more by funding agencies to track down and stop the spread of the
 pathogen.Restuarant operators are responsible for the safe preparation of the foodthey serve and the cleanliness of their resturants. It is not up to thehighway department to prevent sick people from visiting your restuarantor to monitor the trucks transporting food on the highway.If you want the ISP (highway department) to control it, expect them toset up inspection points on the roads they control and disrupt alltraffic. If you don't want ISPs doing this, don't ask them to enforcethings they shouldn't be doing.

Packet-based multi-service provisioning platforms [MSPP]

2004-01-02 Thread Henry Linneweh
I am interested in problems in this area and what nanog members are part of this
emerging market and are generating a profit.

-Henry

Re: Happy Holiday Wishes

2003-12-25 Thread Henry Linneweh
Merry Christmas All and Happy New Year

-Henry"Braun, Mike" [EMAIL PROTECTED] wrote:





To all on Nanog,

Have a happy holiday season and a great new year :-)

Mike Braun
"MMS firstam.com" made the followingannotations on 12/24/2003 11:22:29 AM--"THIS E-MAIL MESSAGE AND ANY FILES TRANSMITTED HEREWITH, ARE INTENDED SOLELY FOR THE USE OF THE INDIVIDUAL(S) ADDRESSED AND MAY CONTAIN CONFIDENTIAL, PROPRIETARY OR PRIVILEGED INFORMATION. IF YOU ARE NOT THE ADDRESSEE INDICATED IN THIS MESSAGE (OR RESPONSIBLE FOR DELIVERY OF THIS MESSAGE TO SUCH PERSON) YOU MAY NOT REVIEW, USE, DISCLOSE OR DISTRIBUTE THIS MESSAGE OR ANY FILES TRANSMITTED HEREWITH. IF YOU RECEIVE THIS MESSAGE IN ERROR, PLEASE CONTACT THE SENDER BY REPLY E-MAIL AND DELETE THIS MESSAGE AND ALL COPIES OF IT FROM YOUR SYSTEM."==

RE: nlayer.net Abuse and Security contact

2003-12-18 Thread Henry Linneweh
there are many irc networks you might say which one these are on.
on Efnet there is a channel #dmsetup that will handle infected users
andclean them if you point them in that direction...

-HenryMike Damm [EMAIL PROTECTED] wrote:
Some folks might want to jump on the IRC server in question and issue a/who. There appear to be some infected machines members of this list may beinterested in cleaning.Aside from the usual spew of cable/dsl I noticed:*.nyu.edu*.bu.edu*.northwestern.edu*.corp.yahoo.com*.tufts.edu*.uncwil.edu-Mike-Original Message-From: John Obi [mailto:[EMAIL PROTECTED] Sent: Thursday, December 18, 2003 9:10 AMTo: [EMAIL PROTECTED]Subject: nlayer.net Abuse and Security contactFolks,I have sent many emails to [EMAIL PROTECTED] and[EMAIL PROTECTED] reporting a security abuse by oneof their users but nothing done up to now.If there is real person from nlayer.net please contactme offline.Thanks,-J__Do you Yahoo!?New
 Yahoo! Photos - easier uploading and sharing.http://photos.yahoo.com/

Re: good cabling in real environments [Re: Request for submissions: messy cabling and other broken things]

2003-12-17 Thread Henry Linneweh
Any good software out there for cable documenting and even routing and for 
ECO when things are changed?

-Henry

Alex Yuriev [EMAIL PROTECTED] wrote:
 How do you do good cabling in dynamic, real environments? :-)It is not that difficult *if* the money is spent in a short term to makesure that no ugly and silly stuff is crated in a longer(long) term.Strategically pre-running certain parts of the facility with cat5/fiber tominimize the "dynamic" portion of interconnect is a really good way toreduce the mess.Alex

Re: Root Authority

2003-12-16 Thread Henry Linneweh

Trying to remember back that far is quite a task circa 1977 arpanet, the greatest authority of the time was Jon Postal since he had the uncanny ability to remember all of the things that made it work, so when he spoke it was like Moses coming down from the
mountain presenting the 10 commandments and everyone agreed it was good,
at that time corporate greed and scheming scamming little weasels were not part of the community, and everything was based on trust because you really were a professional and you could trust the guy on the other end of the connection to be the same as you.

By precedent over the years of use,the root home-servers established their own 
authority and everyone agreed it was the most stable approach, and is still the most
stable approach since it does not require and use of resource to point routers
and switches and router servers in any other direction which would impact business
globally and cause a plethora of other problems that I would want to imagine

-henry"Laurence F. Sheldon, Jr." [EMAIL PROTECTED] wrote:
Paul Vixie wrote:   An interesting question I've dealt with a few times:   From whom do the root name servers derive their authority?  we (i'm speaking for f-root here) have no "authority". nobody has to listen to us, we are the most powerless bunch of folks you'll ever meet.  now if you'd asked where we derive our *relevance*, i'd say the same as mr. bush and mr. kletnieks -- from all the root.cache files that point at us. and as long as we don't do anything stupid i guess (and hope) that this state of affairs will continue. (relevance trumps authority.)  that having been said, f-root got its start as NS.ISC.ORG and the man who said it was ok for us to be a root name server was jon postel. i'm not sure he had any "authority" either, but folks
 "pointed at" him and so what he said was relevant in spite of any authority he mightn've had.I think that testimony belongs in a collection of Jon Postelcharacterizations.I long for the days when people did things simply and only becausethey were the right thing to do.Thanks for the reminder, Mr. Vixie.

Re: Anyone from NeuLeve.bizl listening?

2003-12-11 Thread Henry Linneweh
Looks sane to me once I resolved the name

Dns resolved neulevel.biz to 209.173.53.163

[IPv4 whois information on 209.173.53.163 ][Query Origin: Main Whois Query ][whois.arin.net]
OrgName: NeuStar, Inc. OrgID: NEUSAddress: 45980 Center Oak PlazaAddress: Network Operations CenterCity: SterlingStateProv: VAPostalCode: 20166Country: US
NetRange: 209.173.48.0 - 209.173.63.255 CIDR: 209.173.48.0/20 NetName: NEUSTAR-BLK1NetHandle: NET-209-173-48-0-1Parent: NET-209-0-0-0-0NetType: Direct AllocationNameServer: OAK.NEUSTAR.COMNameServer: PINE.NEUSTAR.COMComment: RegDate: 2001-03-21Updated: 2001-09-06
TechHandle: MT635-ARINTechName: Thomas, Mark TechPhone: +1-312-928-4610TechEmail: [EMAIL PROTECTED] 
OrgTechHandle: NETWO336-ARINOrgTechName: Network Engineering OrgTechPhone: +1-866-638-6622OrgTechEmail: [EMAIL PROTECTED]
# ARIN WHOIS database, last updated 2003-12-11 19:15# Enter ? for additional hints on searching ARIN's WHOIS database."Stewart, William C (Bill), RTSLS" [EMAIL PROTECTED] wrote:
I can see a couple of obvious approaches for getting Neulevel's attention- Their web site lists two Registry Relationship Managers, one with popup contact infoIvor Sequeira - Senior Manager, European, African, and Middle Eastern Regions571-434-5776 [EMAIL PROTECTED](That appears to be +1-571-434-5776 ...)- Their whois entry for neulevel.biz lists+1.5714345757 as their phone number, fax +1.5714345758,and snailmail address list.http://www.whois.biz/whois.cgi?TLD=bizWHOIS_QUERY=neulevel.bizTYPE=DOMAINSearch=Submit+Query- They've got a snailmail address, you've got a lawyer and Fedex, they've got a Nasty Letter Since the requests to useyour DNS server were bogus, you could probably file a John Doe suitand do discovery on Neulevel, but a Nasty Letter is probably enough.- They've got an
 online trademark dispute process.It's got pointers to ICANN dispute resolution mechanisms,which are more likely to get their attention than random email.Their entry point is [EMAIL PROTECTED]Normally, if somebody registers that annoying-little-spammer.com has nameserver 1.2.3.4,you'd be using this to complain that you own the nameannoying-little-spammer.com, but you could try using itto complain that you own 1.2.3.4, and maybe even contend thatsince the registrant falsely listed you as the nameserver for the domain,that it's theft of service and you ought to be awarded ownership of the name.- You might also drop a note to ICANN about the lack of a phone numberon their web site and the lack of email responsiveness.- Personally I like the suggestion that someone had that youstart serving DNS for the fake names, either pointing to 127.0.0.3or to a CNAME pointing to
 Annoying-spammers-forged-their-DNS-again.com,which is some disposable address block on which you run a web site and stub email server explaining that it's not your fault.

Re: Authority

2003-12-10 Thread Henry Linneweh
This group didn't need anyones permission to form and share idea's and methods
that benefits the entire industry, and it was in the time of great need when these
things came to pass

I see the word's law and legislation and I see people without a clue making law
that only benefits those that pay them and harm the rest.

The solution is withinthe community of network people, not congress or any other
legislator, there are 40,000 gun laws yet people get shot every day and die.

There is good fortune sometimes for those that develop these systems and tools
that is a byproduct of effort, sometimes these turn into flourishing enterprises 
because there really is no-one that can provide support on an ongoing basis.

I support good original innovation that is beneficial in the near term and the long term
to the industry.

-Henry[EMAIL PROTECTED] wrote:
i am just curious... do you have any authority/commission from arin (oranyone else)? this is certainly not flame bait, but it is an honest question. you'revery self-righteous, and although you may have valid points (i witholdjudgement) i really want to know what gives you the right/authority to saythe things you say about others.Honest question, honest answer.You seem to be looking for a command and control hierarchy wherenone exists. This is more like a free market economy of ideasand projects. In other words, anyone can start up something andoffer it to the networking community. Projects succeed or failbased on whether they find market acceptance within the economyof ideas. Please note that this free market economy of ideas isnot the same thing as the free market economy of commerce; it
 justshares some of the same patterns.William is not alone here. Paul Vixie started MAPS in the same way,i.e. he had no authority to do it but just offered it to the economyof ideas. And Paul's entrepreneurial inclination have led him to doother projects in the commercial economy, some of which started lifein the economy of ideas. Rob Thomas's Cymru project is another exampleand the various route server and IRR projects are also examples. Nobodygave the IRR people the authority to manage BGP4 routes; they justthought it was a good idea and offered it in the economy of ideas.Many Internet exchange points started life in the same way and I believe there are still a lot of smaller ones that exist inthe economy of ideas, i.e. non-commercial.I may not agree with everything that William does or how he goesabout it, but I do think that his approach is worthwhile.It gives us a chance to see a prototype of something that
 couldbe either incorporated into ARIN or commercialized in the future.By the way, ARIN, and the IANA before it, both started life inthe economy of ideas. The only reason that ARIN is in the positionthat it now holds is that the networking community liked what theysaw and supported it. There really was no "authority" that createdARIN. There was a lot of initiative from members of the networkingcommunity who lobbied the various power brokers of the time todemonstrate that ISPs supported an address resgistry that was entirely independent from domain name registries. Once it becameclear that the only dissenters came from outside the industryand were confusing addressing and domain name issues, those groupswho felt that they had authority in the matter, blessed the plansto create ARIN, and we went ahead with it. Even here, there was nocommand and control that gave ARIN its commission. On the contrary,there was a lot of
 bottom-up pressure that finally coalesced andARIN was obviously the right thing to do.--Michael Dillon (one of the original members of the ARIN Advisory Council)

RE: new nasty email virus trick to bypass scanners

2003-12-04 Thread Henry Linneweh

It takes a good combination of both ISP and end user to fight spam, I have a tool
in this editor for reading msg that allows me to tag a spammer and block the '
[EMAIL PROTECTED] that gets by the isp scan tool.

Common sense, in these times shows you to not open emails from strangers
especially with *.zip files unless they are coming from a known party based on
some kind of dialog prior to it being sent and received.

-HenryPriyantha [EMAIL PROTECTED] wrote:
 At 09:53 PM 03/12/2003, Jamie Reid wrote:  The other thing that worries me is that those who rely on  their ISP to scan  for viruses, a false sense of security can come into play.  In the case of  these types of email viruses, the user might think the file  is OK because  it was scanned.The AVScanner should indicate that the file couldn't scan because it ispassword protected and hence opening the file may be risky.Priyantha

Re: Anit-Virus help for all of us??????

2003-11-24 Thread Henry Linneweh
The latest Zone Alarm Pro also invites subscribed users to participate in creating a 
more robust solution

-HenryNiels Bakker [EMAIL PROTECTED] wrote:
* [EMAIL PROTECTED] (Richard Cox) [Mon 24 Nov 2003, 20:30 CET]:  The latest version of Zone Alarm Pro does stop all applications from accessing the net outbound unless specifically authorised, and it does check the executable by checksum to make sure it hasn't been changed.Right up to the moment the end user, annoyed by the continuous popups,authorises mshtml.dll - which is used by several malicious-by-designworms (including Outlook).-- Niels.

RE: Copper 10 gigabit @ 15 metres

2003-11-05 Thread Henry Linneweh
While there are some smitherings about 10GigE, there are technical reasons and 
market reasons it is not really ready for prime yet, that is not to say it's not going
to happen, it is just not going happen now.

-HenryMikael Abrahamsson [EMAIL PROTECTED] wrote:
On Wed, 5 Nov 2003, Deepak Jain wrote: There are no highly dense 10GE platforms that I can think of right now, much less cost effective ones.I usually tell vendors that they need to hit the price point GE was in 2000, which we're not even near at this time.Although, 80km capable Xenpaks and STM64/OC192 WAN PHY Xenpaks will be available Q1-2004 so there is still hope that during 2004 we'll see 10GE become quite useful and at least more price effective than SDH/SONET.Question is when we'll be able to get 10km Xenpaks below $1000 and when we'll be able to get 8 port cards for major platforms with at least 40 gig full duplex bandwidth per slot at less than $10k per card, that's when 10GbE will really start to take off.The price point for GE over Copper is really silly now with the SOHO el cheapo gig
 switches are closing in on $10 per port, so lets hope the uplinks will start to catch up.-- Mikael Abrahamsson email: [EMAIL PROTECTED]

RE: Copper 10 gigabit @ 15 metres

2003-11-05 Thread Henry Linneweh
10GigE fiber will be the better choice in the long run

-HenryDeepak Jain [EMAIL PROTECTED] wrote:
 http://www.lightreading.com/document.asp?doc_id=42956site=lightreading http://grouper.ieee.org/groups/802/3/10GBCX4/ Regarding the first URL, I am curious how many networks will be interested in using a 15 metre 10GbE solution. Even for intra-MMR xconns, it seems like the cable length limit will very quickly become an obstacle. I guess it depends what price point copper 10Gb solutions enter the market at, compared to their optical counterparts.Until the distances become reasonable, it will probably be a connection ofopportunity. Instead of nxGE you can use 1x10GE for an MMR x-connect. Thequestion is will people be converting 10GE copper to fiber to bridge thedistances and then back?There are no highly dense 10GE platforms that I can think of right now, muchless
 cost effective ones.DJ

RE: Copper 10 gigabit @ 15 metres

2003-11-05 Thread Henry Linneweh
The backbone at the time of my original work that I participated in was 40Gits/in and 40Gbits/out unless that has changed 10GigE is not practical or cost effective if it is limited to local area's and provate connections. That doesn't mean from A design
perspective thatA cost effective solution has already been designed, the position
of the market and the cost per megabit for most companies is not there, most
companies now do 2.5Gbits bi-diectioonally for 5Gbits and barely use all of that.

-HenryDeepak Jain [EMAIL PROTECTED] wrote:
  While there are some smitherings about 10GigE, there are technical reasons and  market reasons it is not really ready for prime yet, that is not to say it's not going  to happen, it is just not going happen now.  Some people are using it in the MAN and WAN now though.Exactly. At the EQIX/ASH GPF Telia and AOL both said they were using 10GEcross-connects for private peering. So that means at least 3-4 majornetworks are using them in production in a LAN, MAN or WAN environment.When you are aggregating lots of a GEs, there isn't really a great,cost-effective way to move all of these bits cost-effectively. nxOC48 ispretty cheap, but a little ugly if you need the bandwidth unchoked. 10GE issupposed to get there, but at a 10xGE price, not a OC192 type price.The real
 advantage of Copper 10G is that eventually you can deploy it to allthe existing copper [inside] plants that people have currently deployed.Just like GE, it eventually just becomes tolerant enough to use existingwiring. I would be very happy if the first boxes that came out with theselong range xenpaks were muxes that would take 10xGE - 1x10GE -- this wouldsolve the uplink problem from smaller gear in a heartbeat.Deepak JainAiNET

RE: Copper 10 gigabit @ 15 metres

2003-11-05 Thread Henry Linneweh
Anyway before this becomes a bunch of different language, here is a page
to keep you posted on 10GigE development and some of the players
http://www.10gea.org/Deepak Jain [EMAIL PROTECTED] wrote:



At the risk of over simplifying this.

1) Deploying anything 4x faster than what you need is not cost-effective, ever. Even deploying GE where 2xFE would work is more expensive.

2a) If (again, thinking IXes here) you are offloading most of your locally sourced traffic to peers at an IX, you may be able to use OC48 connect speeds
without needing your backbone to actually pass 20+Gb/s. Everyone has a different network design, so it really depends. Guys who push can use 10GE sooner (IMO) than guys that pull because of the IX case here.

 b) Cable networks and networks where most of the traffic is internal or to afew large peers could benefit here too.


3a ) Anyone who doesn't have 5Gb/s of aggregate traffic probably doesn't have the peer density to send more than 2Gb/s to a single IX or peer anyway. (see #1).
 b) In the case where at a single point you need more than 1-2Gb/s per peer, you may want to deploy 10GE or something similar because you have sufficient capacity to handle another peering location to fail entirely for an extended period of time without (hopefully) affecting bandwidth to your peer. There are some assumptions here, so YMMV.

Fortunately, no one is requiring anyone to use this, yet...

Deepak Jain
AiNET


-Original Message-From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]On Behalf Of Henry LinnewehSent: Wednesday, November 05, 2003 7:03 PMTo: [EMAIL PROTECTED]; Neil J. McRaeCc: Mikael Abrahamsson; [EMAIL PROTECTED]Subject: RE: Copper 10 gigabit @ 15 metres
The backbone at the time of my original work that I participated in was 40Gits/in and 40Gbits/out unless that has changed 10GigE is not practical or cost effective if it is limited to local area's and provate connections. That doesn't mean from A design
perspective thatA cost effective solution has already been designed, the position
of the market and the cost per megabit for most companies is not there, most
companies now do 2.5Gbits bi-diectioonally for 5Gbits and barely use all of that.

-HenryDeepak Jain [EMAIL PROTECTED] wrote:
  While there are some smitherings about 10GigE, there are technical reasons and  market reasons it is not really ready for prime yet, that is not to say it's not going  to happen, it is just not going happen now.  Some people are using it in the MAN and WAN now though.Exactly. At the EQIX/ASH GPF Telia and AOL both said they were using 10GEcross-connects for private peering. So that means at least 3-4 majornetworks are using them in production in a LAN, MAN or WAN environment.When you are aggregating lots of a GEs, there isn't really a great,cost-effective way to move all of these bits cost-effectively. nxOC48 ispretty cheap, but a little ugly if you need the bandwidth unchoked. 10GE issupposed to get there, but at a 10xGE price, not a OC192 type price.The real
 advantage of Copper 10G is that eventually you can deploy it to allthe existing copper [inside] plants that people have currently deployed.Just like GE, it eventually just becomes tolerant enough to use existingwiring. I would be very happy if the first boxes that came out with theselong range xenpaks were muxes that would take 10xGE - 1x10GE -- this wouldsolve the uplink problem from smaller gear in a heartbeat.Deepak JainAiNET

Re: Sabotage investigation of fiber cuts in Northwest

2003-11-03 Thread Henry Linneweh
Not having seen the entire cut, I would have to imagin the entirebundle was 
cut and the poor splicers had their hands full.

-Henry"Vincent J. Bono" [EMAIL PROTECTED] wrote:
 The quesiton isn't so much how someone cut a fiber strand, but why the failure of a single fiber strand had such an impact on the telephone service in the region.I'd be willing to bet it wasn't a single "strand". More likely the press orwhoever got it wrong and it was an entire cable or maybe just a tube.-vb

RE: Sabotage investigation of fiber cuts in Northwest

2003-11-03 Thread Henry Linneweh
I tend to agree, fiber rings when built out correctly have subtending rings to handle 
redundancy with extremely low delay times 50ms at worse

-Henry"Douglas S. Peeples" [EMAIL PROTECTED] wrote:
What you describe is a folded ring and is indicative of either a temporarysolution or bad network design. As a rule, phone companies and capacitysuppliers build very robust systems. Douglas S. PeeplesTechnology Assurance Labs-Original Message-From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf OfBrian BrunsSent: Monday, November 03, 2003 7:39 AMTo: Henry Linneweh; Vincent J. Bono; [EMAIL PROTECTED]Cc: Sean DonelanSubject: Re: Sabotage investigation of fiber cuts in Northwest - Original Message - From: Henry LinnewehTo: Vincent J. Bono ; [EMAIL PROTECTED]Cc: Sean DonelanSent: Monday, November 03, 2003 6:02 AMSubject: Re: Sabotage investigation of fiber cuts in Northwest Not having seen the entire cut, I would have to imagin the entire
 bundlewas cut and the poor splicers had their hands full.From experience, I can say that its quite easy to sabatoge a fiber run.Theperfect example - a few years ago when I was a network admin, the whole NOCwhere the bulk of our T1s were went out suddenly one morning. We discoveredthat less then a block away a fiber seeking backhoe dug right through thefibers - both the primary *and* secondary fibers - because Verizon burriedthem both in the same trench rather then run them separate routes. So, thesupposed redundancy went right out the window.The phone companies really aren't helping the situation one bit by doingstuff like this.--Brian BrunsThe Summit Open Source Development GroupOpen Solutions For A Closed World / Anti-Spam Resourceshttp://www.sosdg.orgThe AHBL - http://www.ahbl.org

Re: IPv6 NAT

2003-11-01 Thread Henry Linneweh
After having read many of these posts I realized there are chips out there now, 
oboard that do last mile protection at the gate level which eliminates any of
this and the products can come preconfigured for this or not depends on what
you want to pay for.

-Henry[EMAIL PROTECTED] wrote:
This does not mean we should NAT everything, since I use some of those protocols. But if every Joe User had a DLink NAT box in front of his Winbloze box, the Internet would be a safer place. And you know it.You're forgetting Rob Thomas's peripatetic presentation in Chicago.Not to mention the guy whose SSH session was outed by a keylogger.Check http://www.safer-networking.org/ for more on spyware andtrojans. If this was the only way the black hats could wreak havocthen we would be seeing a lot more of it.I think that the only thing which will make the Internet a safer placeis time and hard work. We have to put in the effort to address *ALL* theweaknesses until we've raised the bar so high that only the toughestblack hats have the time, skills and energy to break the weakest link.--Michael Dillon

Re: AOL fixing Microsoft default settings

2003-10-28 Thread Henry Linneweh
I agree that changing one's computer is not the ISP or even the Corp IT departments
job, and could compromise valuable work and or personal information for the individual
user, depending on their setup, security software etc and other applications.

I also would preceive that as a real threat to individual privacy for any individual in
any country of the world who directly purchasedand owns their own computer.

For individuals who had their machines custom built to spec with software configured
to meet a certain criterion this would be an outrage and considered hacking and 
tampering.

-HenrySean Donelan [EMAIL PROTECTED] wrote:
On Tue, 28 Oct 2003, Fred Baker wrote: Personally, I don't ask my ISP or my IT department to randomly change the configuration of my computer. I am very happy for them to suggest changes, but *if* I agree, *I* want to install them when it is convenient for *me*, not when it is convenient for *them*.There is a difference. In most cases the corporate laptop is owned by thecorporation, not the employee. Shouldn't the corporate organization beable to change its own computers whenever it chooses, regardless of thedesire of its employees.On the other hand, the ISP does not own the customer's computer. Anddespite EULA which say it not sold only licensed to the customer, mostpeople view their computer as their property not the ISP's.

  1   2   >