dark fiber
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I'm looking for pointers (forum) regarding purchasing dark fiber. At the same time can anyone point me in the right direction regarding purchasing dark fiber in Bombay, India. tia, - -- regards, /virendra -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.2.2 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFEHHiJpbZvCIJx1bcRAqlbAKCPxoGVYYgsMM/66bUjt4SOxpX5FACfaVVo syGCgjjbfM+zZBwpaYD/wbw= =+8U/ -END PGP SIGNATURE-
Re: Quarantine your infected users spreading malware
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Bill Nash wrote: On Tue, 21 Feb 2006, [EMAIL PROTECTED] wrote: Why not just bypass them and go direct to the unwashed masses of end users? Offer them a free windows infection blocker program that imposes the quarantine itself locally on the user's machine. This program Offering them free software won't work to the levels you want. At first, you'll get a response, because consumers always jump at free shiny things, until something happens that makes them not like it anymore, and then they'll dig in and never use it again. If you want to get this kind of filtering into your core, you have a need to get this to a compulsory level for access. I don't think there's any disagreement as to the roots of this problem: - Modern users are generally clueless. - Most don't have firewalls or even the most basic of protections. - Getting tools deployed where they need to be most is the hardest. With that said.. If you're talking about a compulsory software solution, why not, as an ISP, go back to authenticated activity? Distribute PPPOE clients mated with common anti-spyware/anti-viral tools. Pull down and update signatures *every time* the user logs in, and again periodically while the user is logged in (for those that never log out). Require these safeguards to be active before they can pass the smallest traffic. The change in traffic flow would necessitate some architecture kung fu, maybe even AOL style, but you'd have the option of selectively picking out reported malicious/infected users (*cough* ThreatNet *cough*) and routing them through packet inspection frameworks on a case by case basis. Quite possibly, you could even automate that and the users would never be the wiser. - - - From my past discussion at nanog sessions, it appears this sink-hole like process has been extremely helpful for AOL. Maybe Vijay from AOL could chime in and enlighten us or folks could look at the archives. regards, /virendra - billn -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFD+4sWpbZvCIJx1bcRAq2oAJ4z9xmrBYwppdTpYTtLkNow+N17ZQCeJsnE xr6y99lCbEAnO60SUEtv9Xk= =av1X -END PGP SIGNATURE-
Re: NANOG36-NOTES 2006.02.14 talk 2 Netflow Visualization Tools
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 thanks for taking notes. comments in-line: Matthew Petach wrote: 2006.02.14 talk 2 Netflow tools Bill Yurcik byurcik at ncsa.uiuc.edu NVisionIP and VisFlowConnect-IP probably a dozen tools out there, this is just two of them. Concenses is there's something to this. They're an edge network, comes into ISP domain, their tools are used by entities with many subnet blocks. Overview Project Motifivation Netflows for Security Two visualization tools NVisionIP VisFlowConnect-IP Summary Internet Security: N-Dimensional Work Space large--already lots of data to process complex--combinatorics explode quickly time dynamics--things can change quickly! Visualizations can help! in near-realtime overview-browse-details on demand People are wired to do near-realtime processing of visual information, so that's a good way to present information for humans. HCI says use overview-browse-details paradigm. Netflows for security can identify connection-oriented stats to see things like attacks, DoS, DDoS, etc. Most people don't use the data portion of the flow field, the first 64 bytes, they just look at header info or aggregated flow records. Can spot how many users are on your system at a given time, to schedule upgrades. Who are your top talkers? How long do my users surf? What are people using the network for? Where do users go? Where did they come from? Are users following the security policy? What are the top N destination ports? Is there traffic to vulnerable hosts? Can you identify and block scanners/bad guys? This doesn't replace other systems like syslog, etc.; it integrates and works alongside them. architecture slide for NCSA. Can't really do sampled view for security, so probably need distributed flow collector farm to get all the raw data safely. Two visualization tools: NVisionIP, VisFlowConnect-IP focus on quick overview of tools security.ncsa.uiuc.edu/ 3 level hierarchical tool; galaxy view (small multiple view) ((machine view)) Galaxy is overview of the whole network. color and shape of dots is each host in a network. settable parameters for each dot. Animated toolbar and clock show changes over time in the galaxy. Lets you get high-level content quickly and easily. Domain view lets you drill in a bit more; small multiple view looks at the traffic within the block. upper histogram is lower, well known ports; lower histogram is ports over 1024 You can click on a given multiple view entry to delve into one machine. Many graphs for each machine in the most detailed view. well known ports first, then rest of ports (sorted) then source and destination traffic broken out. Designed for class Bs. http://security.ncsa.uiuc.edu/distribution/VisFlowConnectDownload.html 3 vertical lines, comes from edge network perspective; middle line is edge network to manage. You set range of networks you care about. Outside lines are people sourcing or sinking traffic to you, from outside domains. There's a time axis, traffic only shown for the slice of time currently under consideration. Uses VCR-like controls to move time forward/backward Lets you see traffic/interactivity, drill into that domain, see host level connectivity flows. Shows MS Blaster virus traffic as an example. Example 2, a scan example. Just because it looks like one IP hitting many others doesn't mean it's really a security incident, though; could be a cluster getting traffic. web crawlers hitting NCSA web servers make for a very charateristic pattern over time. Summary Netflows analysis is non-trivial, NVisionIP VisFlowConnect-IP lots of references listed in very fine blue font. http://security.ncsa.uiuc.edu/distribution/NVisionIPDownload Avi Freedman, Akamai, Argus was mentioned a lot; it lets you grab symmetric netflows, but also does TCP analysis, shows some performance data as well. not sure if people are studying the impact of correlating argus data with flow data. Roland Douta? of Cisco; many people are using netflow to track security issues. They now have ingress and egress flow data on many of their platforms. In reading paper describing it, there's data conversion that needs to happen into an internal format that nVision can understand. It reads log files at the moment, takes about 5 minutes to process files. Lets them take different file data sources, make the tool for visualization independent of the input format. They can read large files, but there is a performance hit when doing it. Are they planning on doing further work on the tool to collect TCP flags, for frags, drop traffic, etc? They've looked at it, but they leave it to IDS tools for flag activity. Might be of interest to consider for future versions of the tools. Last question came up, echoed about argus. Question about
Re: IRS goes IPv6!
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Christopher L. Morrow wrote: On Tue, 14 Feb 2006, Jeroen Massar wrote: I Ar Es, At least they have received the 2610:30::/32 allocation from ARIN. Lets see if they how taxing they find IPv6 ;) so.. this is surprising why? the us-gov mandate for ipv6 uptake will mean lots of us-gov folks will be spinning up justifications that they are a 'service provider' and need a /32... cause they won't accept PA space (or I don't think they will accept PA space as a long term solution) ... or I might be smoking crack :) who knows. - -- resistance is futile, you will be assimilated :-) regards, /virendra -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFD8sY0pbZvCIJx1bcRAu6vAJ0dlSiJvkDWkXtZ1oHIRZQrNRHqdACgscec 2GCg+nM2inuo62oBau4KEh0= =bK4r -END PGP SIGNATURE-
Re: net-op: traffic loads as the result of patching
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 hmm..I thought (correct me if I wrong) wsus followed a mirror (distributed) model say if a group of servers were pegged the update process would provide remote clients access to the closet and min latency host(s) in order to distribute the load prevent bandwidth saturation. regards, /virendra Elijah Savage wrote: Sean Donelan wrote: So, maybe an operational question. What are people seeing as far as network traffic loads due to WMF patching activity, e.g. auto-update and manual downloads? Microsoft has used several CDNs in addition to its own servers to distribute the load in the past. WSUS servers are being pounded right now. Usually 5 to 7% CPU now 72% -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFDvqLlpbZvCIJx1bcRAoF4AJ9pi/xlNkX8mSMT4ogZcVccrJ9ijACg854X JhwaWYg6bEmVf4yHVmY6mQI= =3oZt -END PGP SIGNATURE-
Re: New Rules On Internet Wiretapping Challenged
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 in-line: Adam Chesnutt wrote: This whole thread is silly! It's not hard to trap and trace a suspect. It doesn't require a Whole new generation of routers and switches - -- That was exactly my understanding but I think it goes beyond that. Correct me if I'm wrong here, but it seems to me that it's a fairly trivial task to mirror and upstream, and isolate the traffic required. I've performed such taps before and usually find it to easily performed with a single FreeBSD box, and a mirrored port on the router. - --- true enough. Or maybe I'm just missing the point of this thread. - - You might want to take a look at rfc 2804 for some background. regards, /virendra Flounder Vicky Rode wrote: comments in-line: Peter Dambier wrote: Vicky Rode wrote: ...Raising my hand. My question is on Terry Hartle's comments, maybe someone with more insight into this could help clear my confusion. Why would it require to replace every router and every switch when my understanding is, FCC is looking to install *additional* gateway(s) to monitor Internet-based phone calls and emails. In a datacenter you have lines coming in and lines going out. And you have internal equippment. You have to eavesdrop on all of this because the supposed terrorist might come in via ssh and use a local mail programme to send his email. -- How do you differentiate between a hacker and a terrorist? For all you know this so called terrorist might be coming from a spoofed machine(s) behind anyone's desk. So you have to eavesdrop on all incoming lines because you dont know where he comes in. Via aDSL? via cable modem? Via a glass fiber? And you have to monitor all internal switches because you dont know which host he might have hacked. Guess a cheap switch with 24 ports a 100 Mbit. That makes 2.4 Gig. You have to watch all of these. They can all send at the same time. Your switch might have 1 Gig uplink. But that uplink is already in use for your uplink and it does not even support 2.4 Gig. - There are ways to address over-subscription issues. How about switches used in datacenters with 48 ports, 128 ports, ... Where do you get the capacity for multiple Gigs just for eavesdropping? On the other hand - most switches have a port for debugging. But this port can only listen on one port not on 24 or even 48 of them. So you have to invent a new generation of switches. I don't believe this is the primary reason for replacing every router and every switch. I think (correct me if I'm wrong) it has to do with the way wiretap feature (lack of a better term) that .gov is wanting vendors to implement within their devices, may be at the network stack level. I guess it's time to revisit rfc 2804. How about the routers? They are even more complicated than a switch. As everybody should know by now - every router can be hacked. So your monitoring must be outside the router. The gouvernment will offer you an *additional* gateway. I wonder what that beast will look like. It must be able to take all input you get from a glass fiber. Or do they ask us to get down with our speed so they have time to eavesdrop. - powered by dhs w/ made in china sticker :-) I'm not being smarty pants about this...it is actually happening. That's all I can say. regards, /virendra I can see some sort of network redesign happening in order to accodomate this but replacing every router and every switch sounds too drastic, unless I mis-understood it. Please, I'm not advocating this change but just trying to understand the impact from an operation standpoint. Yes, it is drastic. But if they want to eavesdrop that is the only way to do it. Any insight will be appreciated. regards, /virendra Here in germany we accidently have found out why east germany had to finally give up: They installed equippement to eavesdrop and tape on every single telefone line. They could not produce enough tapes to keep up with this :) Not to mention what happened when they recycled the tapes and did not have the time to first erase them :) Kind regards, Peter and Karin -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFDakYzpbZvCIJx1bcRAv2XAKDxgQqfs+nZMrUCR7zyKATJjfEBbgCg9/lu N7waCSlgruy6yecfnFwO17M= =1vBJ -END PGP SIGNATURE-
Re: L3 having issues on the west coast?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 They could be possible rate-limiting it. That's why tools such as mtr and others do not necessarily tell you the whole truth. regards, /virendra Elijah Savage wrote: Jon Lewis wrote: I was trying to get some IOS and compare a few images in FN, and found I cisco.com was being sluggish, and FN wouldn't load at all. Packets Pings Hostname%Loss Rcv Snt Last Best Avg Worst ... 6. ge-6-2-0.mp1.Orlando1.Level3.net 0% 44 44 54 13120 7. ae-0-0.bbr1.SanJose1.Level3.net 14% 38 4475 74 75 77 8. ge-11-1.ipcolo1.SanJose1.Level3.net 23% 34 4475 75 75 76 9. p1-0.cisco.bbnplanet.net 10% 40 4475 75 81160 10. sjce-dmzbb-gw1.cisco.com 0% 44 4477 75 82292 11. sjck-dmzdc-gw2.cisco.com 25% 33 4476 76 76 77 12. www.cisco.com 59% 18 4476 76 77 78 That doesn't look right. Anyone know what's going on out there? I am not sure what is going on there, but Cisco has been this way for a month or more for me. I do not have problems bringing up their website but I do notice that ICMP packet loss to them has been horrible the last month or so. -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFDauHNpbZvCIJx1bcRAnUQAJ9g/6HFPLH5XeKk14iiYxfNE+dsVQCfd7LJ 3ecLHsu0tJ8iDvzJJ9pOCaQ= =r4me -END PGP SIGNATURE-
Re: New Rules On Internet Wiretapping Challenged
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 comments in-line: Peter Dambier wrote: Vicky Rode wrote: ...Raising my hand. My question is on Terry Hartle's comments, maybe someone with more insight into this could help clear my confusion. Why would it require to replace every router and every switch when my understanding is, FCC is looking to install *additional* gateway(s) to monitor Internet-based phone calls and emails. In a datacenter you have lines coming in and lines going out. And you have internal equippment. You have to eavesdrop on all of this because the supposed terrorist might come in via ssh and use a local mail programme to send his email. - -- How do you differentiate between a hacker and a terrorist? For all you know this so called terrorist might be coming from a spoofed machine(s) behind anyone's desk. So you have to eavesdrop on all incoming lines because you dont know where he comes in. Via aDSL? via cable modem? Via a glass fiber? And you have to monitor all internal switches because you dont know which host he might have hacked. Guess a cheap switch with 24 ports a 100 Mbit. That makes 2.4 Gig. You have to watch all of these. They can all send at the same time. Your switch might have 1 Gig uplink. But that uplink is already in use for your uplink and it does not even support 2.4 Gig. - - There are ways to address over-subscription issues. How about switches used in datacenters with 48 ports, 128 ports, ... Where do you get the capacity for multiple Gigs just for eavesdropping? On the other hand - most switches have a port for debugging. But this port can only listen on one port not on 24 or even 48 of them. So you have to invent a new generation of switches. - I don't believe this is the primary reason for replacing every router and every switch. I think (correct me if I'm wrong) it has to do with the way wiretap feature (lack of a better term) that .gov is wanting vendors to implement within their devices, may be at the network stack level. I guess it's time to revisit rfc 2804. How about the routers? They are even more complicated than a switch. As everybody should know by now - every router can be hacked. So your monitoring must be outside the router. The gouvernment will offer you an *additional* gateway. I wonder what that beast will look like. It must be able to take all input you get from a glass fiber. Or do they ask us to get down with our speed so they have time to eavesdrop. - - powered by dhs w/ made in china sticker :-) I'm not being smarty pants about this...it is actually happening. That's all I can say. regards, /virendra I can see some sort of network redesign happening in order to accodomate this but replacing every router and every switch sounds too drastic, unless I mis-understood it. Please, I'm not advocating this change but just trying to understand the impact from an operation standpoint. Yes, it is drastic. But if they want to eavesdrop that is the only way to do it. Any insight will be appreciated. regards, /virendra Here in germany we accidently have found out why east germany had to finally give up: They installed equippement to eavesdrop and tape on every single telefone line. They could not produce enough tapes to keep up with this :) Not to mention what happened when they recycled the tapes and did not have the time to first erase them :) Kind regards, Peter and Karin -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFDaSmqpbZvCIJx1bcRAhU9AJoC54jYhsUMs7aO6xQ/5kEX79gt9wCcDWkT L8hApJtW2gqfibjYfq7E7Z0= =3yz1 -END PGP SIGNATURE-
New Rules On Internet Wiretapping Challenged
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 http://www.washingtonpost.com/wp-dyn/content/article/2005/10/25/AR2005102501807.html or By Arshad Mohammed Washington Post Staff Writer Wednesday, October 26, 2005; Page D01 New federal wiretapping rules that would make it easier for law enforcement to monitor e-mails and Internet-based phone calls were challenged by privacy, high-tech and telecommunications groups in federal court yesterday. The groups argued that the rules would force broadband Internet service providers, including universities and libraries, to pay for redesigning their networks to make them more accessible to court-ordered wiretaps. The groups also said the Federal Communications Commission rules, scheduled to take effect in May 2007, could erode civil liberties and stifle Internet innovation by imposing technological demands on developers. It's simply a very bad idea for privacy and for free speech for the government to design any technology, much less the Internet, to be surveillance-friendly, said Lee Tien, a senior staff lawyer with the Electronic Frontier Foundation, a nonprofit privacy rights group. The government was trying to build tentacles of control throughout telecommunications networks, Tien said. The FCC rules make broadband Internet providers and voice over Internet protocol companies subject to a 1994 federal law that requires telecom companies to assist law enforcement agencies in carrying out court-ordered wiretaps. The Communications Assistance for Law Enforcement Act requires telecom carriers to design their networks so they can quickly intercept communications and deliver them to the government when presented with a court order. In adopting the rules, the FCC said it wanted to ensure the government could carry out wiretaps as more communications move from the traditional telephone system to the Internet. It is clearly not in the public interest to allow terrorists and criminals to avoid lawful surveillance by law enforcement agencies, the commission wrote in its order. Opponents argued the law was tailored for a simpler, earlier era of traditional telephone service and could cripple the evolution of the Internet by forcing engineers to design products so they can be easily monitored by the government. The 1994 law will have a devastating impact on the whole model of technical innovation on the Internet, said John Morris, staff counsel for the Center for Democracy and Technology in Washington, which filed an appeal of the rules with the U.S. Court of Appeals for the District of Columbia Circuit yesterday. The Internet evolves through many tens of thousands, or hundreds of thousands, of innovators coming up with brand new ideas, he said. That is exactly what will be squelched. Morris said his group did not dispute the idea that the government should be able to carry out court-ordered wiretaps, but rather argued that the 1994 law was a blunt instrument ill-suited for the Internet age. He said the matter should be referred to Congress, which can tailor the obligations to the Internet context as opposed to importing the very clumsy [telephone system] obligations and imposing them on the Internet. The American Council on Education, a higher-education trade group, separately asked the court Monday to review the rules. We fear that doing what they want will require every router and every switch in an IT system to be replaced, said Terry W. Hartle, the council's senior vice president. He estimated that the upgrades could cost colleges and universities $6 billion to $7 billion. Our quarrel with them is fairly specific, Hartle said. We are concerned about the cost, and the complexity, and the schedule on which they want this accomplished. Spokesmen for the FCC and the Justice Department declined comment on the court challenges. - --- end --- ...Raising my hand. My question is on Terry Hartle's comments, maybe someone with more insight into this could help clear my confusion. Why would it require to replace every router and every switch when my understanding is, FCC is looking to install *additional* gateway(s) to monitor Internet-based phone calls and emails. I can see some sort of network redesign happening in order to accodomate this but replacing every router and every switch sounds too drastic, unless I mis-understood it. Please, I'm not advocating this change but just trying to understand the impact from an operation standpoint. Any insight will be appreciated. regards, /virendra -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFDX/AApbZvCIJx1bcRAktgAKDzp+GaIDlpp5vdYT61jOWzEciClACfRkkW uQBPWQSzNpsw1M80tUQgWdI= =4t1U -END PGP SIGNATURE-
[Fwd: Re: FCC Outage Reports ..(.was Verizon outage in Southern California?)]
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Just taking a quick poll to see if nanog community would consider this a worthwhile effort to pursue? regards, /virendra - Original Message Subject: Re: FCC Outage Reports ..(.was Verizon outage in Southern California?) Date: Fri, 21 Oct 2005 21:26:51 +0300 (EEST) From: Juuso Lehtinen [EMAIL PROTECTED] To: nanog@merit.edu References: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] On Fri, 21 Oct 2005, Andre Oppermann wrote: Here we see again that the secrecy (to prevent terrorism) of this information costs more than having it in the open as the FCC did in the past. The whole terrorism sham was just a convenient excuse to prevent outsiders from assessing the quality of the carriers network. In the field of security engineering, this is something called security through obscurity. Terrorists are well funded, and they, no doubt, can get hold on those 'secret' fiber maps if they have interest in them. Do I feel better that neither me nor the terrorist know that my redundant fiber routes are in the same dig? Or in the same cable even? We all know how reliable the carriers bonus driven sales droid promises are... Only ones suffering are us... - -- juuso lehtinen -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFDWUsYpbZvCIJx1bcRAh2IAJsGJqCMtsuyMjYSDJFhCjzI07GBKwCfW7aG uPBNNwW0I75xGyKP1Tlg9iw= =l5Jg -END PGP SIGNATURE-
Re: Verizon outage in Southern California?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I wonder what ever happened to redundancy? I guess 5 9s (dunno what the going number is) got blown out of the water for them. regards, /virendra David Lesher wrote: Speaking on Deep Background, the Press Secretary whispered: I'm not completely familiar with the telco jargon. Does Tandem mean the same as a local central office, where POTS lines terminate at the switch? Long Beach has a population of 470,000. The C/Os I know of are: A Central Office switch talks to subscribers aka end-users. On its backside, it talks to other CO's and tandems. Time was, that was also VF copper pairs, but it's long since all DS1 and up. A tandem is a switch that talks not to subs, but only to CO's. In days of old, when a {dialup} call went to the other side of town, chances are it went you-yourCO-downtown tandem-joesCO-joe. {copper all the way...}. A tandem was always housed in large CO building, but might have been ATT's vice the operationg company, etc... But ESS's and classless switching and massive expansion of the plant really muddled the picture. An ESS could be both a CO switch [for multiple prefixes and even multiple NPA's..] AND act like a tandem.. And oh, the actual line cards can be remoted 100 miles away in a horz. phonebooth box alongside the road in Smallville with DS1's/OC coming back. My guess is a DACS, a cross-connect point that is an software-driven patch panel, lost its marbles. [engineering term of art.] A DACS could have dozen-MANY dozen DS1/DS3/OC-n going hither and yon. Some will be leased circuits. Others will be the CO trunks going from one switch to another. It may/may not have muxes internal, so that what arrives on a DS1 leaves in a OC96.. I note it went down at 2:20 AM. That SCREAMS software upgrade/cutover. What's to bet GEE, no...VZEEE, was doing just that and there was a major ohshit. Sean noted a long while back that somehow, DACS crashes always seem to take hours to recover. Maybe the backups are on Kansas City standard tapes, I donno.. but this sounds like that.. -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFDVoJXpbZvCIJx1bcRAstJAJ0dnrQL1P2QJyxNU3r0T/X8g9fukQCgnm/N yW5EvW7gI3gfjY7XSozyMds= =ocNd -END PGP SIGNATURE-
Re: FW: Verizon outage in Southern California?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Apparently there was a software glitch in the switch(s) which disrupted route calls. regards, /virendra Hannigan, Martin wrote: From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Matthew Black Sent: Tuesday, October 18, 2005 3:13 PM I'm not completely familiar with the telco jargon. Does Tandem mean the same as a local central office, where POTS lines terminate at the switch? Long Beach has a population of 470,000. The C/Os I know of are: A tandem office is a CO primarily used as an aggregated switch point between local CO's. Think interconnection of local CO's or long haul tandems. Alamitos at 7th Street and Termino, ZIP 90814 Clark near Clark Ave and Pacific Coast Highway, ZIP 90804 LongBeach at 6th Street and Elm Ave, ZIP 90802 Lakewood at Clark Ave and Connant St, ZIP 90808 LNBHCAXG at 3440 California Ave, ZIP 90807 (for my home) That's the building CLLI, the switch is LNBCHAXGDS0. This one is a 5ESS and serves 12 exchanges. 562-290 562-424 562-426 562-427 562-490 562-492 562-595 562-933 562-981 562-988 562-989 562-997 I see 7 5ESS and 1 Nortel SLC DMS 10, possibly a remote to a campus or something, in Long Beach. 507 E LEW is holding the most switching gear is likely a tandem. Um, I think this is the tandem code, PNTCMIMN50T, and it's servicing about 20 areas. I have no idea whether cell service was truly affected. The announcements we sent to our campus suggested people use their cell phones for 911 service which would be serviced by the CA Highway Patrol (Erik Estrada, etc.) or a campus telephone which is serviced by our local campus police (sworn state police). I was completely unaware of the outage until someone else mentioned it in my office. If you know of an NPA-NXX of a cell phone that was impacted, send it privately and I'll tell you what CO it terminates in. -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFDVYhLpbZvCIJx1bcRApL+AKDRikufgOgg032THSg/Ai4S/iKSVwCg0O8c HrvDIjtCgTVh5l+NFM8RG6I= =vFGk -END PGP SIGNATURE-
The exhaustion of IPv4 address space
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 well, if the existing discussion is not enough, cisco has an interesting article out...see /. for more information. http://www.cisco.com/en/US/about/ac123/ac147/archived_issues/ipj_8-3/ipv4.html wearing my flame suite :-) regards, /virendra -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFDU9cKpbZvCIJx1bcRAoNWAKC5UUyUqfPcAEKJ8GX5Iky2y1qbxwCeMdUM TkjJ1xoc4NK+y8Bv3YnZCjU= =kVtG -END PGP SIGNATURE-
Address Space ASN Allocation Process
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, Just trying to get some clarity and direction regarding obtaining address space/ASN for my client. Is there a minimum address space (?) an entity would need to justify to go directly to RIR (ARIN in this case) as opposed to the upstream provider? Is /20 the minimum allocation? Can my client approach RIR and request for a /23? If my client do procure a /23 how do they make make sure that this address space will be globally routable? Multihome will also be part of their network implementation, can they apply for an ASN number? Any insight will be appreciated. regards, /vicky -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFDOHZ1pbZvCIJx1bcRAihfAJwLF026eea0TxIt5nww7/jCr4YBxQCg57M/ zTUBKD1pkuE7S3NHnjqyqPU= =lWUk -END PGP SIGNATURE-
colo price matrix
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, Just wondering if anyone has any links and /or price matrix for colos? Any pointers will be appreciated. regards, /vicky -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFCwt+ypbZvCIJx1bcRAotTAJ0f17A0qfo+ysueR3GRpB4+yCXmXgCZAczY fRVgNFEOB3oUiP3KBt9p3hk= =AdGf -END PGP SIGNATURE-
Re: colo price matrix
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 this is a good start for me...i'll take it from here :-) regards, /vicky Paul Vixie wrote: | [EMAIL PROTECTED] (Vicky Rode) writes: | | |Just wondering if anyone has any links and /or price matrix for colos? | |Any pointers will be appreciated. | | | at the very low end, there's http://www.vix.com/personalcolo/. i've thus | far resisted several tempting requests to generalize this to the ixp, hosting, | on-net, and transit markets. -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFCwv9hpbZvCIJx1bcRAj9yAJ48B8jE0Dj0ZrA0SWSLAPU+alGyvACg+GNc axeob2iSVglMu3ADcMhltjo= =iBbi -END PGP SIGNATURE-
Re: Vulnerability Issue in Implementations of the DNS Protocol
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Has anyone (a) experienced or noticed issues related to this vulnerability (b) what action(s) have you taken to address this, if any? What do folks at verisign and isc think about this? Any insight will be appreciated. regards, /vicky Fergie (Paul Ferguson) wrote: | | UNIRAS (UK Gov CERT)/NISCC: | http://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html | | [snip] | | | Summary | - --- | A vulnerability affecting the Domain Name System (DNS) | protocol was identified by Dr. Steve Beaty from the | Department of Mathematical and Computer Science of | Metropolitan State College of Denver. | | The Domain Name System (DNS) protocol is an Internet | service that translates domain names into Internet Protocol | (IP) addresses. Because domain names are alphabetic, | they're easier to remember, however the Internet is | really based on IP addresses; hence every time a domain | name is requested, a DNS service must translate the name | into the corresponding IP address. | | The vulnerability concerns the recursion process used by | some DNS implementations to decompress compressed DNS | messages. Under certain circumstances, it is possible to | cause the DNS server to terminate abnormally. | | All users of applications that support DNS are recommended | to take note of this advisory and carry out any remedial actions | suggested by their vendor(s). | | [snip] | | - ferg | | | -- | Fergie, a.k.a. Paul Ferguson | Engineering Architecture for the Internet | [EMAIL PROTECTED] or [EMAIL PROTECTED] | ferg's tech blog: http://fergdawg.blogspot.com/ | -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFCk2n/pbZvCIJx1bcRAldAAJ9dxlg30J3jMX/W3bwXvdFlwvCj7gCgxQ0/ fGUMug5/x1Wg6wsrZg/n/NE= =9iP/ -END PGP SIGNATURE-
Google Web Accelerator
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi there, Did anyone catch this? Has anyone experienced any issues and if so, what steps did you take to address this? http://google.blognewschannel.com/index.php/archives/2005/05/05/much-controversy-over-googles-accelerator/ http://consumingexperience.blogspot.com/2005/05/google-web-accelerator-gwa-panacea-or_08.html http://www.searchenginejournal.com/index.php?p=1676 According to Google Blogoscoped (see below), the download page has been shut down because they can't handle the load. http://blog.outer-court.com/archive/2005-05-08-n20.html regards, /vicky -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFCf6hJpbZvCIJx1bcRAsSiAKC1hRB4epeMef3FAxeC9/dSbfju9gCfSASO OUOZb1US1CLLZ8w/W5n1lnc= =v32F -END PGP SIGNATURE-
Re: Internet2
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, comments in-line: Dan Hollis wrote: | On Wed, 27 Apr 2005, Randy Bush wrote: | |to source is still the big gap. imiho, from the ops perspective, |only sally's ecn has made any useful approach. sadly, we may be |able to judge the actual demand for e2e qos by ecn's very slow |deployment. i think this is unfortunate, as ecn is pretty cool. - - yeah ecn make sense to us as well. We are currently looking at piece mealing this deployment at our end. fyi - I think kernel.org has also implemented ecn at their end. | | | The low demand is partially due to IWF[0] who unwittingly block it. Many | OSes deploy with ecn support but default it off due to the IWF problem. - --- True enough. Plus devices (by default) may not honor CE (congestion experienced) bits and hence could become non compliant end node which could result in an unnecessary packet drop in the network. | | And there are so many IWF that applying enough cluebats to clear the path | for ECN is going to take enormous effort. | | We could demonstrate how cool ECN is, if there werent so many IWF making | this impossible. Entities who try to deploy ECN are deluged with hey wtf | I cant reach site XYZ anymore, your shit is broken, fix it you ***! | | I have no idea if microsoft supports ECN yet, but if they dont then I | suspect that a sufficiently embarassing benchmark would prod them into | adding it. | | I wonder how many network operators on nanog block ECN. If you do, why? - In fact I raised similar point at NANOG33 in two separate sessions (How to Use Network Design Principles to Differentiate the Good, the Bad, and the Ugly AND IP Fast-Reroute: An Analysis of Applicability to a Core Network) about vendor experience/feedback in this area. Didn't get much feedback. regards, /vicky | | -Dan | | [0]Idiots With Firewalls. See http://urchin.earth.li/cgi-bin/ecn.pl | | -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFCctVxpbZvCIJx1bcRAgwcAKDvvBlpDBZBaXfUJysTJ0GUByLUIACgln1F HFQixDoE4zvsyPmdQy7Aa98= =R64s -END PGP SIGNATURE-
Internet2
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi there, Just wondering how's internet2 community/partners protecting themselves from lawsuits of illegal use of music/movie downloads. In general, how are they protecting themselves from malicious code infection spreading at internet2 speed? How are the devices coping up with filters in place, if any? Like to hear what nanog community and the people who are involved w/ internet2 connectivity think. Any insight and /or pointers to any papers will be appreciated. regards, /vicky -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFCbp19pbZvCIJx1bcRApbRAKCNWtZP/f+5TPwzB0gkU7tLmgpq9gCgiR+H bsR8d1Ai9zWFnUQeXPPB7fs= =ebza -END PGP SIGNATURE-
Re: Internet2
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I made that up :-) Basically I meant to say not congested as the current Internet is. regards, /vicky Mikael Abrahamsson wrote: | On Tue, 26 Apr 2005, Vicky Rode wrote: | | |In general, how are they protecting themselves from malicious code |infection spreading at internet2 speed? How are the devices coping up |with filters in place, if any? | | | What is internet2 speed? As far as I can see Internet2 is a 10G based | national network. What is so special about that in this day and age? | -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFCbq2DpbZvCIJx1bcRAgOjAKCuprmc0AVDET7d7qokD+3IlrScngCg22Pj vV0ZVZS8egBkpmIprN3h9f4= =9zJe -END PGP SIGNATURE-
Re: Internet2
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 since you deviated from my original post... http://www.icir.org/floyd/ccmeasure.html regards, /vicky Daniel Roesen wrote: | On Tue, Apr 26, 2005 at 02:07:15PM -0700, Vicky Rode wrote: | |Basically I meant to say not congested as the current Internet is. | | | It is? | | | Regards, | Daniel | -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFCbtTopbZvCIJx1bcRAhoYAKDbWlRfn24TrCf1qiL4onXZDZSoSwCgqkEN NxQzrae8KtOS60CQDPyJKEA= =g+6Y -END PGP SIGNATURE-
Re: DSCP ECN bits
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi Christian, The ECN capable transport (ECT) bit would need to be set by the data sender to indicate that the end-points of the transport protocol are ECN-capable. The intermediate routers will need to honor these bits as well. Fore more information, checkout, http://www.faqs.org/rfcs/rfc2481.html regards, /vicky [EMAIL PROTECTED] wrote: | Hi, | | Is anyone using the DSCP ECN bits to any great extent? Does it require | end-host support in the stack to actually work? | | Cheers, | Christian | | | | This message and any attachments (the message) is | intended solely for the addressees and is confidential. | If you receive this message in error, please delete it and | immediately notify the sender. Any use not in accord with | its purpose, any dissemination or disclosure, either whole | or partial, is prohibited except formal approval. The internet | can not guarantee the integrity of this message. | BNP PARIBAS (and its subsidiaries) shall (will) not | therefore be liable for the message if modified. | | ** | | BNP Paribas Private Bank London Branch is authorised | by CECEI AMF and is regulated by the Financial Services | Authority for the conduct of its investment business in the | United Kingdom. | | BNP Paribas Securities Services London Branch is authorised | by CECEI AMF and is regulated by the Financial Services | Authority for the conduct of its investment business in the | United Kingdom. | | BNP Paribas Fund Services UK Limited is authorised and | regulated by the Financial Services Authority. | | -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFCZCyZpbZvCIJx1bcRAnBdAKCIBOzBExnGSHKa3VvSN2gCbb/zUwCg6zJI AiguIwhvN6jIyu7/rri3s/c= =chxS -END PGP SIGNATURE-
djbdns: An alternative to BIND
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 http://software.newsforge.com/article.pl?sid=05/04/06/197203from=rss Just wondering how many have transitioned to djbdns from bind and if so any feedback. regards, /vicky -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFCVwvTpbZvCIJx1bcRAh5sAKCxu8Ab2BJUn7lH6GFQtWiRcfleEQCfbxvH mOmy510OhNffb8sSCWCckZ0= =tlMB -END PGP SIGNATURE-
Re: djbdns: An alternative to BIND
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 thanks for the insight to all who responded. regards, /vicky -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFCVyRKpbZvCIJx1bcRArkUAKCufhrpcR1KqZ1hGJ8NRWxcOs0yWQCcC802 qhn641Q/PIGw0GKEWmPbnGU= =u65M -END PGP SIGNATURE-
Re: Contact from ACM?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi Mark, You are not alone. I've had problems even as a member :-) I'll try and ping someone there and see what I can do. Feel free to contact me directly if need be. regards, /virendra Mark Newton wrote: | I need to talk to someone who can update the bogon filters on www.acm.org. | Attempts to reach technical contacts via the website have failed, which | is a bit surprising given the nature of the org. | | If anyone reading this is an ACM member who can pass this message along | to someone who cares I'd appreciate it. | | Thanks, | | - mark | | -- | Mark Newton Email: [EMAIL PROTECTED] (W) | Network Engineer Email: [EMAIL PROTECTED] (H) | Internode Systems Pty Ltd Desk: +61-8-82282999 | Network Man - Anagram of Mark Newton Mobile: +61-416-202-223 | -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFCS5e4pbZvCIJx1bcRAsAYAKCN6n2N+sKOzgHQetns9brTgW45ngCeIJk2 oGn49qTY90KMFdTaEdRe12M= =dg// -END PGP SIGNATURE-
Re: outage/maintenance window opinion
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 It depends. If your device(s) was part of the change management notification then that's correct. regards, //virendra// Luke Parrish wrote: | Trying to get clarification on an issue. | | Maintenance/outage window is 2:00AM to 5:00AM, during the window the router | we are working on fails and does not come back online until 8:00AM. | | From a outage reporting/documentation standpoint is the outage start time | 2:00AM or 5:01AM since 5:01AM is when the maintenance window and planned | outage was over... | | My take is that the outage starts when the planned maintenance/outage | window is over at 5:01AM. | | Luke | | Luke Parrish | Centurytel Internet Operations | 318-330-6661 | | -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFCSD8+pbZvCIJx1bcRAkB3AKCMIDKF4yMufSfmPtBpS9JQ+yRhfQCgumRE DxtoyAD6VvFrWENniiZiu90= =4R3G -END PGP SIGNATURE-
Re: IBM to offer service to bounce unwanted e-mail back to the computers that sent them
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Why even bother responding. Just imagine frontbridge (using them an example, I have no affiliation with them) responding to each and every spam they block..something like 7 terrabytes of data per week or so. I guess this is one way to justify for more bandwidth :-) regards, /virendra Colin Johnston wrote: | The better idea would be fingerprint the spam to match the bot used to match | the exploit used to run the bot to then reverse exploit back to the | exploited machine patching in the process. | I managed to setup such a system a while ago with nimda traffic however I | could not a find a software tool which exploited a nimda exploited machine | which could then patch it and remove the virus | (Ie a remote doctor without you knowing :) | | Colin Johnston | | -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFCQHd3pbZvCIJx1bcRAhPZAJsFJeNXkjKbtUkiMG5LKUH1C1ipPwCfYG1W KHZwd5enWFB+mTp5kkJaEyw= =ZtDG -END PGP SIGNATURE-
scanner-dns
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi there, Just wondering if there is any way I could use a scanner (I have a home grown script for this) that would go thru the DNS registries from some public source, scan for keywords in the domain name. Anything that is available only to ISP's and perhaps we can dovetail onto that if we cough up some $. Any pointers will be appreciated. regards, /virendra -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFCJzEJpbZvCIJx1bcRAoIRAKC0JxOAUVuD30jKzrbtElrqWCoYWwCfdXop b5J3TIDs4i2xILgtaYpApZI= =T5GG -END PGP SIGNATURE-
public accessible snmp devices?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi there, Just wondering if there are any pool of public accessible (read-only) snmp enabled devices that one can access for testing purposes (such as snmpwalk, polling devices via oid/mib, graphing chart..etc)? I'm looking for a pool of devices that I run my test on. Any pointers will be appreciated. regards, /virendra -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFCJzLfpbZvCIJx1bcRAqLcAJ95PzxXE4v51JgzTpeqfuEDZG6ibgCaAg20 WJxjcsJYroHriTPr635QOBE= =SV3b -END PGP SIGNATURE-
Re: broke Inktomi floods?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 in-line: Suresh Ramasubramanian wrote: | Vicky Rode [EMAIL PROTECTED] wrote: | | |not sure if spiders falls under spam or ddos bracket when they |repeatedly start hammering one's network. you could possible report to |spamcop (*grin*) to get a quicker response. spamcom hasn't been accurate |in some instances :-) | | | Er.. just what would you report to spamcop, and what would spamcop do with your | reports? - -- that's why i asked, this type of behavior falls under what abuse terms? | | |do you remember this incident, http://www.cs.wisc.edu/~plonka/netgear-sntp/ | | | Not very new .. broken apps which keep hammering on a resource for some reason | are a fairly regular feature of the internet. - - doesn't mean that it shouldn't be blocked/reported. regards, /vicky | | srs | -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFB8a1ipbZvCIJx1bcRAmOrAKCnCHmj72VsJIec/CsA0JBjkbGdCACgi9BB N20N5nuLVPFN5+bYVF3k7pY= =BwbD -END PGP SIGNATURE-
Re: Please Check Filters - BOGON Filtering IP Space 72.14.128.0/19
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 in-line: Jared Mauch wrote: | On Thu, Jan 20, 2005 at 06:26:15PM +0530, Suresh Ramasubramanian wrote: | |David Barak [EMAIL PROTECTED] wrote: | |While it says that bogon filters change, and provides |a URL to check it, what percentage of folks who would |use a feature like autosecure would ever update |their filters? | | |What do they do to update that bogon list anyway - push a new IOS image? | | | Actually, my assumption is anyone with autosecure gets | free software upgrades for life, as this is a flexible list that | will change over time. Each time a change is made they | need to release new software, and notify their installed | customer base. - --- i understand bogon filters and reasoning behind it and i'm all for it. but why does one think (maybe i missing something) this approach (autosecure) is scalable and acceptable to update your ios or even constantly updating your acls every time one has to update their bogon filters? yet another think to look out for? i like to see the network availability for aol, google, nasdaq, every time they update their bogons. why can't this somehow be dynamically updated and /or linked to a master file as opposed to upgrading the ios? like to hear more thoughts on it. regards, /vicky | | - jared | -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFB7+ugpbZvCIJx1bcRApL0AJ0T2xb1ZHkxDSg0Ne3UwXqQ8z7xogCaA4rc /An79+f9qmCKqfqkDsMH1wU= =Sv6E -END PGP SIGNATURE-
Re: broke Inktomi floods?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 not sure if spiders falls under spam or ddos bracket when they repeatedly start hammering one's network. you could possible report to spamcop (*grin*) to get a quicker response. spamcom hasn't been accurate in some instances :-) do you remember this incident, http://www.cs.wisc.edu/~plonka/netgear-sntp/ regards, /vicky Dan Hollis wrote: | On Thu, 20 Jan 2005, Suresh Ramasubramanian wrote: | |On Thu, 20 Jan 2005 14:30:04 +0200, Gadi Evron [EMAIL PROTECTED] wrote: | |Inktomi (now Yahoo!) sends it's spiders all over the Internet. Lately |some of our systems are reporting that they open many HTTP connections |to our web sites, without ever sending any data and immediately |disconnecting. This is getting to a level where it disturbs us. | |I have heard previous stories of inktomi ignoring robots.txt (not seen |this for myself though). And there are threads like this - |Quoting from http://www.webmasterworld.com/forum11/1968-1-15.htm | | | back in 1999 inktomi hammered our nameserver (which never has, and never | will run http. ever.) After _weeks_ of complaining to them and to their | upstream exodus (hah!) I finally got them to stop. Only to have them | start up again a month later. | | not suprising to see them up to their old antics again. | | time to nullroute i guess? | | -Dan | | | -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFB8DFOpbZvCIJx1bcRAu2FAJ4+a2SHF7XxWgaHKFZzi7hf46tJFwCfcU12 fbIMwtwkPhI33onPawlBKYE= =P+y0 -END PGP SIGNATURE-
Re: Measure overall network availability
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 in-line: Jim Popovitch wrote: | On Fri, 2005-01-07 at 12:09 +0530, Suresh Ramasubramanian wrote: | | |Maybe maintain a few 1U colo boxes (cheap!) in data centers on |selected networks around the world, from where you want to measure |reachablity .. run nothing except nagios or some other monitoring app |for measuring availablity of services like http, smtp, etc that you |want to know are available or not, | | | I've often wondered, as I work intimately with NMS software, just how | much cross network traffic is are you there? related. Would it have a | positive impact on overall net performance if everyone just turned off | all internetwork status polling? - - depends on the polling period. regards, /vicky | | ducking | | -Jim P. | | | | -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFB3pt6pbZvCIJx1bcRAhZFAKDony2dCnDUUcH9T7wntDfDNMA2kQCdGSmU gO++o+vIxzUAEaEUmFT5T3M= =KBqR -END PGP SIGNATURE-
Consortium sheds light on dark fiber's potential
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 http://www.eetimes.com/showArticle.jhtml?articleID=53700951 regards, /vicky -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFBpMpOpbZvCIJx1bcRAqFmAJ96505uhm2Ipg//JLYktUm59adqsQCgi1Hh mnOxyvTt188SnRmHtU5sBo8= =cdob -END PGP SIGNATURE-
Re: Public Interest Networks
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi Deepak! you raise some interesting points from bw standpoint. what really got me scratching my head is the fact that throwing bw to conserve computing power. in this cat and mouse game, mouse always wins :-) The OptiPuter project aims at learning how to 'waste' bandwidth and storage in order to conserve 'scarce' computing in this new world of inverted values, said Smarr. i'm not even sure why even implement mpls where latency/congestion is not an issue specially in this case or even talking about I2 for that matter. regards, /vicky Deepak Jain wrote: | Vicky, I apologize if I am hijacking your thread. | | Is it just me or does all this talk of Research (and other Public | Interest) Networks and logical separation by layer 1/2 leave [everyone] | nonplussed? | | How is logical separation of a network [say via MPLS] much different | than using a lambda to do the same thing? It seems kind of dumb to me | that a network that is spending the money to buy capacity is selling a | 2.5G or 10G wave to universities as any kind of improvement... I'm not | even sure they could do it at a better price than a desperate telco that | is selling the underlying fiber in the first place. | | Engineering idea: All the constituent folks do the same network, but | build it as a single logical network, with say all 40x10G Lambdas on it. | Everyone is given a 2.5G or 10G MPLS tunnel with the ability to use all | unused bandwidth that is available on the network at that time... That | would at least have some legs and create some value for having more | membership. | | This smacks me as similar to Philadelphia wanting to deploy universal | WiFi and charging $20-$25/month for it -- a free network to the city | makes sense, afterall they pay taxes -- a psuedo-commercial service, | what's the point? Do these government (and other so-called Public | Interest) networks really make sense in the U.S. or is everyone still | stuck in a timewarp when/where the NSFnet made sense because no one | (commercially) could/would step up to perform the same function. | | Hopefully there is some operational content in there... If you don't see | an on-list response from me, you probably know why. | | Deepak Jain | AiNET | | Vicky wrote: | | |http://www.eetimes.com/showArticle.jhtml?articleID=53700951 | | | | -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFBpOqspbZvCIJx1bcRAtonAJsH2dJLmQo+OpB5q/bcl/iOsCQt1wCeM+rQ sM0+tPS3yN+nCrl5y0iA7KM= =R/vP -END PGP SIGNATURE-
Re: Diffserv service classes
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ietfreport is timing outhere's another url for this draft. http://www.ietf.org/internet-drafts/draft-baker-diffserv-basic-classes-04.txt interesting read at: http://qbone.internet2.edu/papers/non-architectural-problems.txt regards, /vicky Sean Donelan wrote: | In the continuing effort to make Diffserv useful on the Internet, | the Transport Area working group has the draft: | | http://ietfreport.isoc.org/idref/draft-baker-diffserv-basic-classes/ | | The draft has a little bit for everyone. Lots of rope/flexibility for | application developers. But have any network operators thought how they | could actually support the framework in any meaningful way? And assuming | the network actually supported it, what happens when you throw such fine | grain differentiated traffic at the network? | | -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFBn8EfpbZvCIJx1bcRAn4mAKCAjZu5k89IVIDXajJW9tp2MmO4+QCgrFmM ojED2CtlqNO92BqCcnWcG6Y= =5lJL -END PGP SIGNATURE-
Re: 3 Mb question
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ...also look into IMA (inverse multiplex atm). regards, /vicky Gerald wrote: | I've got what seems to me like an innocuous question for this list... | | Someone is requesting access to about 3 mb of traffic up/dn. I figure 2 | T1s will give them the 3 Mb I need, but I'm looking for suggestions on | either efficiently combining those 2 to get the most bandwidth for their | buck or else I have to look at getting them a ds3 and scaling back to | what they need. | | Is there an good low end suggestion for making effective use of 2 T1s to | give 3 Mb of bandwidth? In practice, I've seen 2 T1s load balanced with | CEF not do very well at giving a full 3 Mb. (This was without turning on | per-packet CEF) | | I'm not personally experienced with MLPPP or mux hardware if that helps, | but I could get it set up if that's the consensus as the best option. | The NRC of something that would effectively couple the 2 T1s would | easily beat the MRC of a DS3 which I think might be overkill for just 3 | Mb. | | Thanks for suggestions and tips. | | Gerald | -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.5 (MingW32) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFBbb0TpbZvCIJx1bcRAtrbAKDxZDh+ln530q9peNDO5spDq6Qh6ACcD9/P Jf/tXerUTYMWuqwvnhCIPkw= =fhaT -END PGP SIGNATURE-
[OT] Layer 2 Trace
Hi there, Just wondering if there's anyone who can recommend a layer 2 trace utility similar to l2trace on a cisco switch but one that runs on a linux box? Any help will be appreciated. regards, /vicky
design related question
Hi there, Just want to hear your thoughts (pros and cons) on placing qos appliance between the below choke points. (a) appliance sitting between internal lan-appliance-dmz-pix-edge router-wan cloud. or (b) appliance sitting between wan cloud-edge router-appliance-dmz-pix-internal lan Currently this appliance supports the following qos components w/ 45mbps support on eth0 and eth1: -- shaping -- buffering -- policing Any pointers to white papers, similar deployment, lesson learned or simply your feedback will be appreciated. regards, /vicky
tools for traffic engineering networks
Hi there, I'm curious to know what tools (in traffic engineering arena) people use in order to manage and verify their service assurance that they are providing and / or receiving they think they are. How do you know the policers are functioning correctly? How do you know whether your service provider and / or your internal traffic is not being over-book? Any recommendations, thoughts, white papers, pointers will be greatly appreciated. regards, /vicky
Re: best effort has economic problems
interesting reading http://mail.internet2.edu:8080/guest/archives/qbone-arch-dt/log200205/msg0.html regards, /vicky Edward B. Dreger wrote: GC Date: Sat, 29 May 2004 16:53:17 -0400 GC From: Gordon Cook GC The point I am making in my report is NOT that the best GC effort network has technology problems but rather that it has GC ECONOMIC PROBLEMS. That it might support 2 or 3 players not GC 2 or 3 HUNDRED. Best effort is cheaper to provide. Cheaper sells. Is there enough of a market to sustain premium services? IP-based VPNs haven't replaced FR and PtP WAN links, but FR and PtP haven't thwarted IP-based VPNs. GC That until companies begin to go chapter seven and vanish, GC the best effort net will be a black hole that burns up GC capital because, for many players, the OPERATIONAL expense is GC more than they get for bandwidth never mind cap-ex. Definitely true about opex and capex... but I'm not convinced that QoS is the magic bullet that will make the marketplace big enough and profitable enough. I don't see service offerings fixing the woes of screwball pricing. GC best effort won't go away. many best effort players will. If all best effort players provided QoS/guaranteed services, would the survival rate be significantly higher as a result? GC for the time being, best effort bandwidth prices as an GC absolute commodity cannot sustain networks over the long GC haul. A network that can deliver QoS the report hypothesizes GC may be able to attract enough revenue to become profitable. That's where I'm not convinced. Current IP delineates the lower reliability boundary and a benchmark price point. Premium services won't have a lower cost than best-effort, so they must sell for more. Would the incremental service improvements be high enough to draw customers away from cheap BE _and_ support sufficient margins? First class hasn't stopped the cycle of airline bankruptcies and government bailouts. I don't see first class data as much different. GC How to to this my group is still discussing. We don't GC pretend that QoS is easy or any kind of mature collection of GC technologies, but increasingly it looks as though the GC industry, if it is ever going to be self sustaining, really GC needs to look at QoS services and solutions. Perhaps, but only if the price is right. DSL sells better than Internet T1 lines, which sell better than end-to-end private lines and packet clouds. There's a reason for that. Eddy -- EverQuick Internet - http://www.everquick.net/ A division of Brotsman Dreger, Inc. - http://www.brotsman.com/ Bandwidth, consulting, e-commerce, hosting, and network building Phone: +1 785 865 5885 Lawrence and [inter]national Phone: +1 316 794 8922 Wichita _ DO NOT send mail to the following addresses : [EMAIL PROTECTED] -or- [EMAIL PROTECTED] -or- [EMAIL PROTECTED] Sending mail to spambait addresses is a great way to get blocked.
Re: WAN accelerator recommendations
I'm interested in hearing people's view points on this as well. In general what do folks thing about implementing yet another appliance within their networks as opposed to implementing the same features (if supported by their gear vendor) within their choke points. regards, /vicky Matt Bazan wrote: Hello, I'm looking for advice and recommendations on WAN (T1 speeds) accelerator devices. I've seen the literature on the offerings from Peribit, NetCelera and Packeteer and am looking for some real-world feedback. Can anyone provide me with their experiences using these products or similar? Thanks, Matt
New QoS Mailing List [nsp-qos]
Mailing list for QoS discussions has been created. This is multi-vendor list accelerating the adoption of IP products and services that benefit from QoS capabilities. This list is intended to aid anyone deploying QoS solutions. Feel free to spread the word. Many thanks to Jared Mauch in setting this up. Subscribe: https://puck.nether.net/mailman/listinfo/nsp-qos regards, /vicky
Spamcop
Hi there, Just wondering why was my e-mail thread (Hierarchical Credit-based Queuing (HCQ): QoS) dated 5/9/2004 9:36 PM reported as a spam? Just trying to understand so that I don't repeat it. Below is a cut and paste of the reported incident. Please advice. regards, /vicky cut here -- Return-Path: [EMAIL PROTECTED] Received: from vamx01.mgw.rr.com ([24.28.193.148]) by acme-reston.va.rr.com (Post.Office MTA v3.5.3 release 223 ID# 0-59787U25L25S0V35) with SMTP id com for [EMAIL PROTECTED]; Mon, 10 May 2004 10:42:14 -0400 Received: from vmx2.spamcop.net (vmx2.spamcop.net [206.14.107.117]) by vamx01.mgw.rr.com (8.12.10/8.12.8) with ESMTP id i4AEkwhn017175 for [EMAIL PROTECTED]; Mon, 10 May 2004 10:47:01 -0400 (EDT) Received: from sc-app3.verio.ironport.com (HELO spamcop.net) (192.168.11.203) by vmx2.spamcop.net with SMTP; 10 May 2004 07:47:00 -0700 Received: from [68.13.211.63] by spamcop.net with HTTP; Mon, 10 May 2004 14:47:01 GMT From: [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: [SpamCop (24.30.181.126) id:988145978]Hierarchical Credit-based Queuing (HCQ): QoS Precedence: list Message-ID: [EMAIL PROTECTED] Date: Sun, 9 May 2004 21:36:30 -0700 (PDT) X-SpamCop-sourceip: 24.30.181.126 X-Mailer: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; .NET CLR 1.0.3705) via http://www.spamcop.net/ v1.3.4 X-Virus-Scanned: Symantec AntiVirus Scan Engine [ SpamCop V1.3.4 ] This message is brief for your comfort. Please use links below for details. Email from 24.30.181.126 / Sun, 9 May 2004 21:36:30 -0700 (PDT) http://www.spamcop.net/w3m?i=z988145978zab5cec781dcfa15ae459c11bd03b7bef z [ Offending message ] Return-path: owner-x Envelope-to: x Delivery-date: Mon, 10 May 2004 00:39:15 -0400 Received: from [198.108.1.26] (helo=trapdoor.merit.edu) by wilma.widomaker.com with esmtp (Exim 3.36 #1) id 1BN2ZP-000Jo6-00 for x; Mon, 10 May 2004 00:39:15 -0400 Received: by trapdoor.merit.edu (Postfix) id B68EC91206; Mon, 10 May 2004 00:36:37 -0400 (EDT) Delivered-To: x Received: by trapdoor.merit.edu (Postfix, from userid 56) id 8645591243; Mon, 10 May 2004 00:36:37 -0400 (EDT) Delivered-To: x Received: from segue.merit.edu (segue.merit.edu [198.108.1.41]) by trapdoor.merit.edu (Postfix) with ESMTP id 50AFD91206 for x; Mon, 10 May 2004 00:36:34 -0400 (EDT) Received: by segue.merit.edu (Postfix) id 3B3955914F; Mon, 10 May 2004 00:36:34 -0400 (EDT) Delivered-To: x Received: from ms-smtp-02-eri0.socal.rr.com (ms-smtp-02-qfe0.socal.rr.com [66.75.162.134]) by segue.merit.edu (Postfix) with ESMTP id EAB7358E5D for x; Mon, 10 May 2004 00:36:33 -0400 (EDT) Received: from [192.168.2.2] (cpe-24-30-181-126.socal.rr.com [24.30.181.126]) by ms-smtp-02-eri0.socal.rr.com (8.12.10/8.12.7) with ESMTP id i4A4aUce025659 for x; Sun, 9 May 2004 21:36:30 -0700 (PDT) Message-ID: [EMAIL PROTECTED] Date: Sun, 09 May 2004 21:36:41 -0700 From: Vicky Rode [EMAIL PROTECTED] Reply-To: [EMAIL PROTECTED] User-Agent: Mozilla Thunderbird 0.6 (Windows/20040502) X-Accept-Language: en-us, en MIME-Version: 1.0 To: x Subject: Hierarchical Credit-based Queuing (HCQ): QoS X-Enigmail-Version: 0.83.6.0 X-Enigmail-Supports: pgp-inline, pgp-mime Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit X-Virus-Scanned: Symantec AntiVirus Scan Engine Sender: owner-x Precedence: bulk Errors-To: [EMAIL PROTECTED] X-Loop: nanog Hi there, Just wondering if anyone out there has either implemented or looked into this queuing method for quality of service implementation. This solution is offered (hardware solution) and patented by foursticks.com. According to foursticks, HCQ achieves the efficiency and flexibility of first generation queuing systems, without the disadvantages. It compares HCQ (interesting reading) w/ Class-Based Queuing (CBQ), Random Early Discard (RED) and Weighted Random Early Discard (WRED),Weighted Fair Queuing (WFQ),Priority Queuing (PQ) Low Latency Queuing (LLQ). Also can anyone recommend a qos forum which I can ping as well. Any insight will be appreciated. regards, /vicky
Type of Service (TOS)
Hi there, Say if I had a qos appliance installed on networks between a lan and a wan box would the qos policies be carried across wan end points (point to point connection)? In other words, will the router retain the TOS bits across to the other side of the wan connection to provide QoS-style priority for the packets or will it clear the TOS bits? BTW, the other side of the wan connection also has the qos appliance sitting between a lan and a wan box. Just so that I'm clear, I'm not talking about an upstream neighbor being an ISP connection which I know they will likely ignore the TOS bits unless I pay them extra for the feature. The above scenario is a point to point connection to a remote site. Any insight will be appreciated. regards, /vicky
Re: Type of Service (TOS)
Hi, Do you know by default if the routers pass the TOS bits? regards, /vicky Scott McGrath wrote: The answer is it depends. routers _usually_ honor the TOS bits unless they are configured to clear or rewrite them. We use the TOS bits for designating traffic classes so in some cases we rewrite the TOS bits set by the host so in your case we would modify the TOS bits. Scott C. McGrath On Mon, 10 May 2004, Vicky Rode wrote: Hi there, Say if I had a qos appliance installed on networks between a lan and a wan box would the qos policies be carried across wan end points (point to point connection)? In other words, will the router retain the TOS bits across to the other side of the wan connection to provide QoS-style priority for the packets or will it clear the TOS bits? BTW, the other side of the wan connection also has the qos appliance sitting between a lan and a wan box. Just so that I'm clear, I'm not talking about an upstream neighbor being an ISP connection which I know they will likely ignore the TOS bits unless I pay them extra for the feature. The above scenario is a point to point connection to a remote site. Any insight will be appreciated. regards, /vicky
Hierarchical Credit-based Queuing (HCQ): QoS
Hi there, Just wondering if anyone out there has either implemented or looked into this queuing method for quality of service implementation. This solution is offered (hardware solution) and patented by foursticks.com. According to foursticks, HCQ achieves the efficiency and flexibility of first generation queuing systems, without the disadvantages. It compares HCQ (interesting reading) w/ Class-Based Queuing (CBQ), Random Early Discard (RED) and Weighted Random Early Discard (WRED),Weighted Fair Queuing (WFQ),Priority Queuing (PQ) Low Latency Queuing (LLQ). Also can anyone recommend a qos forum which I can ping as well. Any insight will be appreciated. regards, /vicky
RE: has anyone notice this ?
Hi Todd, sorry about the late responseyes in fact i am using my own dns servers w/o any problems (knock on wood)time warner think its their cable modem box but i think its a caching issue on there end. regards, /vicky -Original Message- From: Todd Mitchell - lists [mailto:[EMAIL PROTECTED] Sent: Saturday, June 28, 2003 7:19 PM To: [EMAIL PROTECTED] Cc: 'David A. Ulevitch'; [EMAIL PROTECTED] Subject: RE: has anyone notice this ? Have you tried using DNS servers other than the ones supplied by your ISPs DHCP server? Todd -- | -Original Message- | From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of | Vicky Rode | Sent: Saturday, June 28, 2003 9:57 PM | To: David A. Ulevitch; [EMAIL PROTECTED] | Subject: RE: has anyone notice this ? | | | Hi David, | | i'm just couple feet away from my box. i'm currently using wireless and | even | tried wired with same results. the fact others are experiencing similar | problems makes me believe the problem could be on time warner end, | possible | caching issue. | | | | regards, | /vicky | | | | -Original Message- | From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of | David A. Ulevitch | Sent: Saturday, June 28, 2003 6:03 PM | To: [EMAIL PROTECTED] | Subject: RE: has anyone notice this ? | | | | | quote who=Vicky Rode | vickyr i'm a time warner end-user trying to access outside world | which could be anything. | | [SNIP] | | vickyr yes i have and they think it could be the cable modem box | and have issued a replacement. i sure hope they have a good stock | because i know whole bunch of people who are having similar problems. | maybe its time to buy some 3com stocks :) | | A twisted or crumpled up ethernet cable can sometimes impede the flow of | ones and zeros. Often looping up extra slack in your cat-5 can prove | catastrophic for the free flow of electrons down the pipe. | | Ahh...Saturday (PDT)... | | -davidu | | |David A. Ulevitch -- http://david.ulevitch.com | http://everydns.net -+- http://communitycolo.net | Campus Box 6957 + Washington University in St. Louis | | |
RE: has anyone notice this ?
Hi Jay, comments in-line: -Original Message- From: Jay Hennigan [mailto:[EMAIL PROTECTED] Sent: Saturday, June 28, 2003 10:22 PM To: Vicky Rode Cc: [EMAIL PROTECTED] Subject: RE: has anyone notice this ? On Sat, 28 Jun 2003, Vicky Rode wrote: It would be easier to troubleshoot if you used a browser that returned a meaningful error message. The page could not be found could be just about anything. DNS, routing, broken link, etc. --- vickyr i even tried the same thing under linux---mozilla and i get site name not found which i believe is less meaningful than ie :) No such domain is the Mozilla response. This points to a DNS issue, which is more useful than Page could not be displayed. What does dig give you for the domain? How about dig with a different name server specified? -- vickyr you might be correct but like i said in my case linux---mozilla states www.cnn.com could not be found. please check the name and try again. i finally gave up playing ping pong with time warner and started using my dns servers. Also, you don't indicate if you're a Time Warner customer trying to reach web sites elsewhere or a non-customer trying to reach sites on the Time Warner network. Your IP address or ISP's network and the URL of the site you're trying to reach, for example. - vickyr i'm a time warner end-user trying to access outside world which could be anything. Nag their tech support. --- vickyr i even tried talking to their level 2 support and they still think its my cable modem box even after presenting them the facts unless for some reason their box also runs a cache server. Have you queried the Time Warner support staff? --- vickyr yes i have and they think it could be the cable modem box and have issued a replacement. i sure hope they have a good stock because vickyr i know whole bunch of people who are having similar problems. It's those Warner Brothers Acme brand modems. Same outfit that makes all of Wile E.s stuff. It's probably also an Acme nameserver. Seriously, you should use some other tools such as name lookup to find the IP address of the site in question. If it fails with their default resolvers, try a different resolver. Then see if you can get to the site (or a default site on the same server) by IP address, use traceroute, etc. maybe its time to buy some 3com stocks :) If a whole bunch of people are having the same issue and they're all on Time Warner in your neck of the woods, it probably isn't the cable modem hardware. --- vickyr exactly my point. regards, /vicky -- Jay Hennigan - CCIE #7880 - Network Administration - [EMAIL PROTECTED] WestNet: Connecting you to the planet. 805 884-6323 WB6RDV NetLojix Communications, Inc. - http://www.netlojix.com/
has anyone notice this ?
howdy folks, just wondering has anyone noticed http access issue (the page cannot be displayed) on time warner network ? i literally have to try 5 to 6 times to get to the page. i believe this problem just started a week or so back. i've even talked to few other people on socal.rr.com network and they are experiencing similar problems. is this socal.rr.com related or other regions are expediting same problems too. time warner's network status page shows everything is okay. regards, /vicky
RE: has anyone notice this ?
Hi Jay, see comments in-line: -Original Message- From: Jay Hennigan [mailto:[EMAIL PROTECTED] Sent: Saturday, June 28, 2003 4:09 PM To: Vicky Rode Cc: [EMAIL PROTECTED] Subject: Re: has anyone notice this ? On Sat, 28 Jun 2003, Vicky Rode wrote: just wondering has anyone noticed http access issue (the page cannot be displayed) on time warner network ? i literally have to try 5 to 6 times to get to the page. i believe this problem just started a week or so back. It would be easier to troubleshoot if you used a browser that returned a meaningful error message. The page could not be found could be just about anything. DNS, routing, broken link, etc. --- vickyr i even tried the same thing under linux---mozilla and i get site name not found which i believe is less meaningful than ie :) Also, you don't indicate if you're a Time Warner customer trying to reach web sites elsewhere or a non-customer trying to reach sites on the Time Warner network. Your IP address or ISP's network and the URL of the site you're trying to reach, for example. - vickyr i'm a time warner end-user trying to access outside world which could be anything. i've even talked to few other people on socal.rr.com network and they are experiencing similar problems. is this socal.rr.com related or other regions are expediting same problems too. time warner's network status page shows everything is okay. It really depends on the nature of the failure. More information is needed. Have you queried the Time Warner support staff? --- vickyr yes i have and they think it could be the cable modem box and have issued a replacement. i sure hope they have a good stock because vickyr i know whole bunch of people who are having similar problems. maybe its time to buy some 3com stocks :) regards, /vicky -- Jay Hennigan - CCIE #7880 - Network Administration - [EMAIL PROTECTED] WestNet: Connecting you to the planet. 805 884-6323 WB6RDV NetLojix Communications, Inc. - http://www.netlojix.com/
RE: has anyone notice this ?
Hi David, i'm just couple feet away from my box. i'm currently using wireless and even tried wired with same results. the fact others are experiencing similar problems makes me believe the problem could be on time warner end, possible caching issue. regards, /vicky -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of David A. Ulevitch Sent: Saturday, June 28, 2003 6:03 PM To: [EMAIL PROTECTED] Subject: RE: has anyone notice this ? quote who=Vicky Rode vickyr i'm a time warner end-user trying to access outside world which could be anything. [SNIP] vickyr yes i have and they think it could be the cable modem box and have issued a replacement. i sure hope they have a good stock because i know whole bunch of people who are having similar problems. maybe its time to buy some 3com stocks :) A twisted or crumpled up ethernet cable can sometimes impede the flow of ones and zeros. Often looping up extra slack in your cat-5 can prove catastrophic for the free flow of electrons down the pipe. Ahh...Saturday (PDT)... -davidu David A. Ulevitch -- http://david.ulevitch.com http://everydns.net -+- http://communitycolo.net Campus Box 6957 + Washington University in St. Louis
69.0.0.0/8 - Please update your filters
-Original Message- From: Chan, KaLun Sent: Thursday, February 20, 2003 4:18 PM To: Chan, KaLun; DL NOC Managers; DL NOC-IP Services Cc: Eisenhart, William; Minter, Daniel; DL Neteng-core-ip Subject: RE: [ARIN-20030123.943] 69.3.0.0/Covad - who had this block before? All, It has recently come to our attention that many Internet routers are still filtering out IP addresses in the 69.0.0.0/8 range. If YOU are still filtering this block in your router, please modify your filters accordingly. Thank You IANA IPv4 Allocation List - http://www.iana.org/assignments/ipv4-address-space Bogon List - http://www.cymru.com/Documents/bogon-list.html Secure IOS Template - http://www.cymru.com/Documents/secure-ios-template.html Secure BGP Template - http://www.cymru.com/Documents/secure-bgp-template.html Secure BIND Template - http://www.cymru.com/Documents/secure-bind-template.html Sincerely, Ka Lun Chan (KC) Security Operation Center COVAD Communication SOC#: 866-722-2602 Dir #: 408-434-4919 Fax #: 408-434-2191 Easy to do Business with
Re: UUNET is not the Internet (and neither is AOL)
Hi there, What really confuses the heck out of me is that a company this size can't control/monitor their change management??. Then again not having all the facts has had everyone perplexed. later, vicky At 07:38 PM 10/5/2002 -0400, you wrote: On Sat, 5 Oct 2002, Tim Thorne wrote: After reading all the stories about what supposedly happened does anyone know what really happened? Did UUNet US really do an IOS upgrade on a sizable proportion of their border routers in one go? This seems like suicide to me. What possible reason could there be for a network-wide roll out of an untested IOS apart from being in the mire already? Corporate culture is the hardest thing to change in a company. You'll need to talk with your Worldcom account rep about what happened, and what Worldcom intends to do about it. In the past, Worldcom has not been very open or transparent when it has had network problems.