CP INTERNET contacts

2003-10-31 Thread Vachon, Scott

Hello,

If anyone on the list works for or has a reliable contact at CP Internet (Duluth, 
MN)then please contact me off-list ASAP. I have tried the NOC and ABUSE to no avail. 
Thanks.


Scott Vachon 
CNS-Salem Network Group
Paymentech L.P. 
  
Learn more about Paymentech's payment processing services at www.paymentech.com
THIS MESSAGE IS CONFIDENTIAL.  This e-mail message and any attachments are proprietary 
and confidential information intended only for the use of the recipient(s) named 
above.  If you are not the intended recipient, you may not print, distribute, or copy 
this message or any attachments.  If you have received this communication in error, 
please notify the sender by return e-mail and delete this message and any attachments 
from your computer.


RE: Tomatoes for Verisign at NANOG 29

2003-10-16 Thread Vachon, Scott

> all 
> those who approve 
> of the wildcards would put their token-of-choice in another pile.
> 
Might I suggest the "joker" out of a deck of playing cards ? ; )
  
Learn more about Paymentech's payment processing services at www.paymentech.com
THIS MESSAGE IS CONFIDENTIAL.  This e-mail message and any attachments are proprietary 
and confidential information intended only for the use of the recipient(s) named 
above.  If you are not the intended recipient, you may not print, distribute, or copy 
this message or any attachments.  If you have received this communication in error, 
please notify the sender by return e-mail and delete this message and any attachments 
from your computer.


RE: NTP, possible solutions, and best implementation

2003-10-02 Thread Vachon, Scott


>   [EMAIL PROTECTED] wrote:
>   > Beware the single point of failure. If all your clocks 
> come from GPS, then
>   > GPS is the SPOF.
> 
>   Can you describe what would be involved to cause this sort of single
>   point of failure to fail?
> 
>   Eliot
> 
just me wrote:

> - Antenna failure
> - Radio failure
> - Unforseen GPS protocol issues


Except that as I read it, "all your clocks" meant more than one NTP server at more 
than one location. I'd guess the probability of complete failure is much lower in that 
case. Further, Cisco at least, recommends using at least 3 NTP sources to help 
maintain sanity on the equipment using the NTP. The bug you reference by the way, is 
on a page dated from 1999. I'm not sure of the relevancy now. 
Does anyone on the NANOG list actually deploy standalone equipment ??? 

My two cents.

~S~
  
Learn more about Paymentech's payment processing services at www.paymentech.com
THIS MESSAGE IS CONFIDENTIAL.  This e-mail message and any attachments are proprietary 
and confidential information intended only for the use of the recipient(s) named 
above.  If you are not the intended recipient, you may not print, distribute, or copy 
this message or any attachments.  If you have received this communication in error, 
please notify the sender by return e-mail and delete this message and any attachments 
from your computer.


RE: SoBig volume way down

2003-09-10 Thread Vachon, Scott

>Did this thing
>expire (in which case, roughly 10% of all infected machines have
>misconfigured clocks, assuming the exp date was in UDT), or did something
>else happen?  Just curious...


According to sarc.com:

The worm de-activates on September 10, 2003. The last day on which the worm will 
spread is September 9, 2003. 


Disclaimer : My own 2 cents..any further tags auto generated...
  
Learn more about Paymentech's payment processing services at www.paymentech.com
THIS MESSAGE IS CONFIDENTIAL.  This e-mail message and any attachments are proprietary 
and confidential information intended only for the use of the recipient(s) named 
above.  If you are not the intended recipient, you may not print, distribute, or copy 
this message or any attachments.  If you have received this communication in error, 
please notify the sender by return e-mail and delete this message and any attachments 
from your computer.


RE: Sobig.f surprise attack today

2003-08-22 Thread Vachon, Scott

>OK... Maybe I'm smoking crack here, but, if they have the list of 20 
>machines,wouldn't it make more sense to replace them with honey-pots that download
>code to remove SOBIG instead of just disabling them?

Only if we make assumptions that what they state is 100% fact and the whole truth of 
the matter. They know of 20 but, who is to say a variant in the wild doesn't know of 
20 more ? Or 100 more ? Too late anyway. My other list subscriptions show it active 
now ...

~S~

Disclaimer: my own 2 cents.
  
Learn more about Paymentech's payment processing services at www.paymentech.com
THIS MESSAGE IS CONFIDENTIAL.  This e-mail message and any attachments are proprietary 
and confidential information intended only for the use of the recipient(s) named 
above.  If you are not the intended recipient, you may not print, distribute, or copy 
this message or any attachments.  If you have received this communication in error, 
please notify the sender by return e-mail and delete this message and any attachments 
from your computer.


RE: microsoft.com

2003-08-15 Thread Vachon, Scott


> Bryan Heitman wrote:
>
>> Several networks I have talked to are reporting they can't get to
>> www.microsoft.com
>>
>> Has the virus began?  anyone?
>
>
> Yep, remember it's already August 16th in some parts of the world. 
> Unable to get to www.microsoft.com at 0958 EDT.
>

Northeastern US. No problems reaching it here. ATT & Qwest are ISPs.
  
Learn more about Paymentech's payment processing services at www.paymentech.com
THIS MESSAGE IS CONFIDENTIAL.  This e-mail message and any attachments are proprietary 
and confidential information intended only for the use of the recipient(s) named 
above.  If you are not the intended recipient, you may not print, distribute, or copy 
this message or any attachments.  If you have received this communication in error, 
please notify the sender by return e-mail and delete this message and any attachments 
from your computer.


RE: RPC errors

2003-08-14 Thread Vachon, Scott

>Has anyone seen/heard of this virus propagating through email in any way?
>We appear to have been infected on a network that is very heavily
>firewalled from the outside, and are trying to track down possibly entry
>methods the worm might have had...

I know of a few associates who have been infected (on home networks) but according to 
them (I have yet to verify) not via e-mail. These folks are running Windows XP Pro 
with Norton AV & Personal firewall. Microsoft update is running as well. Systems 
continuously reboot by RPC with a one minute countdown, even when disconnected from 
the network. Again, I have yet to get hands-on to the systems to do more research. 
Hope that bit helps.

~S~

Disclaimer: My own two cents.
  
Learn more about Paymentech's payment processing services at www.paymentech.com
THIS MESSAGE IS CONFIDENTIAL.  This e-mail message and any attachments are proprietary 
and confidential information intended only for the use of the recipient(s) named 
above.  If you are not the intended recipient, you may not print, distribute, or copy 
this message or any attachments.  If you have received this communication in error, 
please notify the sender by return e-mail and delete this message and any attachments 
from your computer.


RE: [Microsoft to ship new versions with firewall enabled]

2003-08-14 Thread Vachon, Scott

> while i think many of us will welcome this, i am skeptical of what
> the firewall will be 'enabled' to block, and how easy it will be
> for the user to set-up rules (and hopefully there will be a sanity
> check included so that 'permit in any' is not a valid option, but
> then 'permit out any' should not be one either)
> but still, it is a step...

Perhaps the better idea would be to ship a stripped down, basic OS for about $25.00 a 
license. Then offer up all the bells and whistles on a pay per download option. I 
think this one simple step alone would aid in reducing security issues on the OS. I 
would hazard a guess that a majority of users will NEVER use (or need) all the built 
in functionality currently included with the OS. 

~S~

Disclaimer: My own two cents.
  
Learn more about Paymentech's payment processing services at www.paymentech.com
THIS MESSAGE IS CONFIDENTIAL.  This e-mail message and any attachments are proprietary 
and confidential information intended only for the use of the recipient(s) named 
above.  If you are not the intended recipient, you may not print, distribute, or copy 
this message or any attachments.  If you have received this communication in error, 
please notify the sender by return e-mail and delete this message and any attachments 
from your computer.


RE: RPC errors

2003-08-14 Thread Vachon, Scott

addendum: These are broadband cable users. All PCs.

-Original Message-
Sent: Tuesday, August 12, 2003 1:57 PM
To: NANOG
Subject: RE: RPC errors


>Has anyone seen/heard of this virus propagating through email in any way?
>We appear to have been infected on a network that is very heavily
>firewalled from the outside, and are trying to track down possibly entry
>methods the worm might have had...

I know of a few associates who have been infected (on home networks) but according to 
them (I have yet to verify) not via e-mail. These folks are running Windows XP Pro 
with Norton AV & Personal firewall. Microsoft update is running as well. Systems 
continuously reboot by RPC with a one minute countdown, even when disconnected from 
the network. Again, I have yet to get hands-on to the systems to do more research. 
Hope that bit helps.

~S~

Disclaimer: My own two cents.
  
Learn more about Paymentech's payment processing services at www.paymentech.com
THIS MESSAGE IS CONFIDENTIAL.  This e-mail message and any attachments are proprietary 
and confidential information intended only for the use of the recipient(s) named 
above.  If you are not the intended recipient, you may not print, distribute, or copy 
this message or any attachments.  If you have received this communication in error, 
please notify the sender by return e-mail and delete this message and any attachments 
from your computer.