dark fiber

2006-03-18 Thread Vicky Røde

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

I'm looking for pointers (forum) regarding purchasing dark fiber. At the
same time can anyone point me in the right direction regarding
purchasing dark fiber in Bombay, India.


tia,


- --
regards,
/virendra
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2.2 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFEHHiJpbZvCIJx1bcRAqlbAKCPxoGVYYgsMM/66bUjt4SOxpX5FACfaVVo
syGCgjjbfM+zZBwpaYD/wbw=
=+8U/
-END PGP SIGNATURE-


Re: Quarantine your infected users spreading malware

2006-02-21 Thread Vicky Røde

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Bill Nash wrote:
 
 
 On Tue, 21 Feb 2006, [EMAIL PROTECTED] wrote:
 
 
Why not just bypass them and go direct to the unwashed
masses of end users? Offer them a free windows
infection blocker program that imposes the quarantine
itself locally on the user's machine. This program
 
 
 Offering them free software won't work to the levels you want. At first, 
 you'll get a response, because consumers always jump at free shiny things, 
 until something happens that makes them not like it anymore, and then 
 they'll dig in and never use it again. If you want to get this kind of 
 filtering into your core, you have a need to get this to a compulsory 
 level for access.
 
 I don't think there's any disagreement as to the roots of this problem:
 - Modern users are generally clueless.
 - Most don't have firewalls or even the most basic of protections.
 - Getting tools deployed where they need to be most is the hardest.
 
 With that said..
 
 If you're talking about a compulsory software solution, why not, as an 
 ISP, go back to authenticated activity? Distribute PPPOE clients mated 
 with common anti-spyware/anti-viral tools. Pull down and update signatures 
 *every time* the user logs in, and again periodically while the user is 
 logged in (for those that never log out). Require these safeguards to be 
 active before they can pass the smallest traffic.
 
 The change in traffic flow would necessitate some architecture kung fu, 
 maybe even AOL style, but you'd have the option of selectively picking out 
 reported malicious/infected users (*cough* ThreatNet *cough*) and routing 
 them through packet inspection frameworks on a case by case basis. Quite 
 possibly, you could even automate that and the users would never be the 
 wiser.
- -
- From my past discussion at nanog sessions, it appears this sink-hole
like process has been extremely helpful for AOL.

Maybe Vijay from AOL could chime in and enlighten us or folks could look
at the archives.



regards,
/virendra

 
 - billn
 
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFD+4sWpbZvCIJx1bcRAq2oAJ4z9xmrBYwppdTpYTtLkNow+N17ZQCeJsnE
xr6y99lCbEAnO60SUEtv9Xk=
=av1X
-END PGP SIGNATURE-


Re: NANOG36-NOTES 2006.02.14 talk 2 Netflow Visualization Tools

2006-02-14 Thread Vicky Røde

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

thanks for taking notes.

comments in-line:

Matthew Petach wrote:
 2006.02.14 talk 2 Netflow tools
 
 Bill Yurcik
 byurcik at ncsa.uiuc.edu
 
 NVisionIP and VisFlowConnect-IP
 
 probably a dozen tools out there, this is just
 two of them.  Concenses is there's something to
 this.
 
 They're an edge network, comes into ISP domain,
 their tools are used by entities with many
 subnet blocks.
 
 Overview
 Project Motifivation
 Netflows for Security
 Two visualization tools
  NVisionIP
  VisFlowConnect-IP
 Summary
 
 Internet Security:
 N-Dimensional Work Space
 
 large--already lots of data to process
 complex--combinatorics explode quickly
 time dynamics--things can change quickly!
 Visualizations can help!
  in near-realtime
  overview-browse-details on demand
 
 People are wired to do near-realtime processing
 of visual information, so that's a good way to
 present information for humans.
 HCI says use overview-browse-details paradigm.
 
 Netflows for security
 can identify connection-oriented stats to see
 things like attacks, DoS, DDoS, etc.
 Most people don't use the data portion of the
 flow field, the first 64 bytes, they just look
 at header info or aggregated flow records.
 
 Can spot how many users are on your system at
 a given time, to schedule upgrades.
 
 Who are your top talkers?
 
 How long do my users surf?  What are people using
 the network for?
 
 Where do users go?   Where did they come from?
 
 Are users following the security policy?
 
 What are the top N destination ports?
 Is there traffic to vulnerable hosts?
 
 Can you identify and block scanners/bad guys?
 
 This doesn't replace other systems like syslog, etc.;
 it integrates and works alongside them.
 
 architecture slide for NCSA.
 
 Can't really do sampled view for security, so probably
 need distributed flow collector farm to get all the
 raw data safely.
 
 Two visualization tools:
 NVisionIP, VisFlowConnect-IP
 
 focus on quick overview of tools
 security.ncsa.uiuc.edu/
 
 3 level hierarchical tool;
 galaxy view (small multiple view) ((machine view))
 
 Galaxy is overview of the whole network.
 color and shape of dots is each host in a network.
 settable parameters for each dot.
 
 Animated toolbar and clock show changes over time
 in the galaxy.
 Lets you get high-level content quickly and easily.
 
 Domain view lets you drill in a bit more; small
 multiple view looks at the traffic within the
 block.
 upper histogram is lower, well known ports; lower
 histogram is ports over 1024
 
 You can click on a given multiple view entry to
 delve into one machine.
 Many graphs for each machine in the most detailed
 view.
 
 well known ports first, then rest of ports (sorted)
 then source and destination traffic broken out.
 
 Designed for class Bs.
 
 http://security.ncsa.uiuc.edu/distribution/VisFlowConnectDownload.html
 
 3 vertical lines, comes from edge network perspective;
 middle line is edge network to manage.  You set range
 of networks you care about.  Outside lines are people
 sourcing or sinking traffic to you, from outside
 domains.
 
 There's a time axis, traffic only shown for the slice
 of time currently under consideration.
 Uses VCR-like controls to move time forward/backward
 
 Lets you see traffic/interactivity, drill into that
 domain, see host level connectivity flows.
 
 Shows MS Blaster virus traffic as an example.
 
 Example 2, a scan example.  Just because it looks
 like one IP hitting many others doesn't mean it's
 really a security incident, though; could be a
 cluster getting traffic.
 
 web crawlers hitting NCSA web servers make for
 a very charateristic pattern over time.
 
 Summary
 Netflows analysis is non-trivial,
 
 NVisionIP
 VisFlowConnect-IP
 
 lots of references listed in very fine blue font.
 
 http://security.ncsa.uiuc.edu/distribution/NVisionIPDownload
 
 Avi Freedman, Akamai, Argus was mentioned a lot; it
 lets you grab symmetric netflows, but also does TCP
 analysis, shows some performance data as well.  not
 sure if people are studying the impact of correlating
 argus data with flow data.
 
 Roland Douta? of Cisco; many people are using netflow
 to track security issues.  They now have ingress and
 egress flow data on many of their platforms.
 In reading paper describing it, there's data conversion
 that needs to happen into an internal format that
 nVision can understand.  It reads log files at the
 moment, takes about 5 minutes to process files.  Lets
 them take different file data sources, make the tool
 for visualization independent of the input format.
 They can read large files, but there is a performance
 hit when doing it.
 Are they planning on doing further work on the tool
 to collect TCP flags, for frags, drop traffic, etc?
 They've looked at it, but they leave it to IDS tools
 for flag activity.  Might be of interest to consider
 for future versions of the tools.
 
 Last question came up, echoed about argus.
 Question about 

Re: IRS goes IPv6!

2006-02-14 Thread Vicky Røde

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Christopher L. Morrow wrote:
 
 On Tue, 14 Feb 2006, Jeroen Massar wrote:
 
 
I Ar Es,

At least they have received the 2610:30::/32 allocation from ARIN.
Lets see if they how taxing they find IPv6 ;)
 
 
 so.. this is surprising why? the us-gov mandate for ipv6 uptake will mean
 lots of us-gov folks will be spinning up justifications that they are a
 'service provider' and need a /32... cause they won't accept PA space (or
 I don't think they will accept PA space as a long term solution) ...
 
 or I might be smoking crack :) who knows.
- --
resistance is futile, you will be assimilated :-)





regards,
/virendra

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFD8sY0pbZvCIJx1bcRAu6vAJ0dlSiJvkDWkXtZ1oHIRZQrNRHqdACgscec
2GCg+nM2inuo62oBau4KEh0=
=bK4r
-END PGP SIGNATURE-


Re: net-op: traffic loads as the result of patching

2006-01-06 Thread Vicky Røde

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

hmm..I thought (correct me if I wrong) wsus followed a mirror
(distributed) model say if a group of servers were pegged the update
process would provide remote clients access to the closet and min
latency host(s) in order to distribute the load prevent bandwidth
saturation.



regards,
/virendra


Elijah Savage wrote:
 Sean Donelan wrote:
 
So, maybe an operational question.

What are people seeing as far as network traffic loads due to WMF patching
activity, e.g. auto-update and manual downloads?  Microsoft has used
several CDNs in addition to its own servers to distribute the load
in the past.
 
 WSUS servers are being pounded right now. Usually 5 to 7% CPU now 72%
 
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFDvqLlpbZvCIJx1bcRAoF4AJ9pi/xlNkX8mSMT4ogZcVccrJ9ijACg854X
JhwaWYg6bEmVf4yHVmY6mQI=
=3oZt
-END PGP SIGNATURE-


Re: New Rules On Internet Wiretapping Challenged

2005-11-03 Thread Vicky Rode

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

in-line:

Adam Chesnutt wrote:
 This whole thread is silly! It's not hard to trap and trace a suspect. 
 It doesn't require a Whole new generation of routers and switches
- --
That was exactly my understanding but I think it goes beyond that.

 
 Correct me if I'm wrong here, but it seems to me that it's a fairly 
 trivial task to mirror and upstream, and isolate the traffic required. 
 I've performed such taps before and usually find it to easily performed 
 with a single FreeBSD box, and a mirrored port on the router.
- ---
true enough.


 
 Or maybe I'm just missing the point of this thread.
- -
You might want to take a look at rfc 2804 for some background.


regards,
/virendra

 
 Flounder
 
 
 Vicky Rode wrote:
 
 
 comments in-line:
 
 
 Peter Dambier wrote:
  
 
 
Vicky Rode wrote:
 
 
 
 
...Raising my hand.
 
My question is on Terry Hartle's comments, maybe someone with more
insight into this could help clear my confusion.
 
Why would it require to replace every router and every switch when my
understanding is, FCC is looking to install *additional* gateway(s) to
monitor Internet-based phone calls and emails.
 
 
 
In a datacenter you have lines coming in and lines going out. And you
have internal equippment.
 
You have to eavesdrop on all of this because the supposed terrorist
might come in via ssh and use a local mail programme to send his email.
 
 
 
 --
 How do you differentiate between a hacker and a terrorist?
 
 For all you know this so called terrorist might be coming from a
 spoofed machine(s) behind anyone's desk.
 
 
  
 
 
So you have to eavesdrop on all incoming lines because you dont know
where he comes in. Via aDSL? via cable modem? Via a glass fiber?
 
And you have to monitor all internal switches because you dont know
which host he might have hacked.
 
Guess a cheap switch with 24 ports a 100 Mbit. That makes 2.4 Gig.
You have to watch all of these. They can all send at the same time.
Your switch might have 1 Gig uplink. But that uplink is already in
use for your uplink and it does not even support 2.4 Gig.
 
 
 
 -
 There are ways to address over-subscription issues.
 
 
  
 
 
How about switches used in datacenters with 48 ports, 128 ports, ...
Where do you get the capacity for multiple Gigs just for eavesdropping?
 
On the other hand - most switches have a port for debugging. But this
port can only listen on one port not on 24 or even 48 of them.
 
So you have to invent a new generation of switches.
 
 
 
 
 I don't believe this is the primary reason for replacing every router
 and every switch.
 
 I think (correct me if I'm wrong) it has to do with the way wiretap
 feature (lack of a better term) that .gov is wanting vendors to
 implement within their devices, may be at the network stack level.
 
 I guess it's time to revisit rfc 2804.
 
 
  
 
 
How about the routers? They are even more complicated than a switch.
 
As everybody should know by now - every router can be hacked. So
your monitoring must be outside the router.
 
The gouvernment will offer you an *additional* gateway.
I wonder what that beast will look like. It must be able to take
all input you get from a glass fiber. Or do they ask us to get
down with our speed so they have time to eavesdrop.
 
 
 
 -
 powered by dhs w/ made in china sticker :-)
 
 I'm not being smarty pants about this...it is actually happening. That's
 all I can say.
 
 
 
 regards,
 /virendra
 
  
 
 
 
 
 
I can see some sort of
network redesign happening in order to accodomate this but replacing
every router and every switch sounds too drastic, unless I
mis-understood it. Please, I'm not advocating this change but just
trying to understand the impact from an operation standpoint.
 
 
 
 
Yes, it is drastic. But if they want to eavesdrop that is the only
way to do it.
 
 
 
 
 
Any insight will be appreciated.
 
 
 
regards,
/virendra
 
 
 
 
Here in germany we accidently have found out why east germany had
to finally give up:
 
They installed equippement to eavesdrop and tape on every single
telefone line. They could not produce enough tapes to keep up
with this :)
 
Not to mention what happened when they recycled the tapes and
did not have the time to first erase them :)
 
 
Kind regards,
Peter and Karin
 
 
 
 
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFDakYzpbZvCIJx1bcRAv2XAKDxgQqfs+nZMrUCR7zyKATJjfEBbgCg9/lu
N7waCSlgruy6yecfnFwO17M=
=1vBJ
-END PGP SIGNATURE-


Re: L3 having issues on the west coast?

2005-11-03 Thread Vicky Rode

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

They could be possible rate-limiting it. That's why tools such as mtr
and others do not necessarily tell you the whole truth.


regards,
/virendra


Elijah Savage wrote:
 Jon Lewis wrote:
 
 
I was trying to get some IOS and compare a few images in FN, and found 
I cisco.com was being sluggish, and FN wouldn't load at all.

   Packets   Pings
Hostname%Loss  Rcv  Snt  Last Best  
Avg  Worst
...
 6. ge-6-2-0.mp1.Orlando1.Level3.net   0%   44   44 54   
13120
 7. ae-0-0.bbr1.SanJose1.Level3.net   14%   38   4475   74   
75 77
 8. ge-11-1.ipcolo1.SanJose1.Level3.net   23%   34   4475   75   
75 76
 9. p1-0.cisco.bbnplanet.net  10%   40   4475   75   
81160
10. sjce-dmzbb-gw1.cisco.com   0%   44   4477   75   
82292
11. sjck-dmzdc-gw2.cisco.com  25%   33   4476   76   
76 77
12. www.cisco.com 59%   18   4476   76   
77 78

That doesn't look right.  Anyone know what's going on out there?


 
 I am not sure what is going on there, but Cisco has been this way for a 
 month or more for me. I do not have problems bringing up their website 
 but I do notice that ICMP packet loss to them has been horrible the last 
 month or so.
 
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFDauHNpbZvCIJx1bcRAnUQAJ9g/6HFPLH5XeKk14iiYxfNE+dsVQCfd7LJ
3ecLHsu0tJ8iDvzJJ9pOCaQ=
=r4me
-END PGP SIGNATURE-


Re: New Rules On Internet Wiretapping Challenged

2005-11-02 Thread Vicky Rode

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

comments in-line:


Peter Dambier wrote:
 Vicky Rode wrote:
 
...Raising my hand.

My question is on Terry Hartle's comments, maybe someone with more
insight into this could help clear my confusion.

Why would it require to replace every router and every switch when my
understanding is, FCC is looking to install *additional* gateway(s) to
monitor Internet-based phone calls and emails.
 
 
 In a datacenter you have lines coming in and lines going out. And you
 have internal equippment.
 
 You have to eavesdrop on all of this because the supposed terrorist
 might come in via ssh and use a local mail programme to send his email.
- --
How do you differentiate between a hacker and a terrorist?

For all you know this so called terrorist might be coming from a
spoofed machine(s) behind anyone's desk.


 
 So you have to eavesdrop on all incoming lines because you dont know
 where he comes in. Via aDSL? via cable modem? Via a glass fiber?
 
 And you have to monitor all internal switches because you dont know
 which host he might have hacked.
 
 Guess a cheap switch with 24 ports a 100 Mbit. That makes 2.4 Gig.
 You have to watch all of these. They can all send at the same time.
 Your switch might have 1 Gig uplink. But that uplink is already in
 use for your uplink and it does not even support 2.4 Gig.
- -
There are ways to address over-subscription issues.


 
 How about switches used in datacenters with 48 ports, 128 ports, ...
 Where do you get the capacity for multiple Gigs just for eavesdropping?
 
 On the other hand - most switches have a port for debugging. But this
 port can only listen on one port not on 24 or even 48 of them.
 
 So you have to invent a new generation of switches.
- 
I don't believe this is the primary reason for replacing every router
and every switch.

I think (correct me if I'm wrong) it has to do with the way wiretap
feature (lack of a better term) that .gov is wanting vendors to
implement within their devices, may be at the network stack level.

I guess it's time to revisit rfc 2804.


 
 How about the routers? They are even more complicated than a switch.
 
 As everybody should know by now - every router can be hacked. So
 your monitoring must be outside the router.
 
 The gouvernment will offer you an *additional* gateway.
 I wonder what that beast will look like. It must be able to take
 all input you get from a glass fiber. Or do they ask us to get
 down with our speed so they have time to eavesdrop.
- -
powered by dhs w/ made in china sticker :-)

I'm not being smarty pants about this...it is actually happening. That's
all I can say.



regards,
/virendra

 
 
 
I can see some sort of
network redesign happening in order to accodomate this but replacing
every router and every switch sounds too drastic, unless I
mis-understood it. Please, I'm not advocating this change but just
trying to understand the impact from an operation standpoint.

 
 
 Yes, it is drastic. But if they want to eavesdrop that is the only
 way to do it.
 
 
Any insight will be appreciated.



regards,
/virendra

 
 
 Here in germany we accidently have found out why east germany had
 to finally give up:
 
 They installed equippement to eavesdrop and tape on every single
 telefone line. They could not produce enough tapes to keep up
 with this :)
 
 Not to mention what happened when they recycled the tapes and
 did not have the time to first erase them :)
 
 
 Kind regards,
 Peter and Karin
 
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFDaSmqpbZvCIJx1bcRAhU9AJoC54jYhsUMs7aO6xQ/5kEX79gt9wCcDWkT
L8hApJtW2gqfibjYfq7E7Z0=
=3yz1
-END PGP SIGNATURE-


New Rules On Internet Wiretapping Challenged

2005-10-26 Thread Vicky Rode

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

http://www.washingtonpost.com/wp-dyn/content/article/2005/10/25/AR2005102501807.html

or

By Arshad Mohammed
Washington Post Staff Writer
Wednesday, October 26, 2005; Page D01

New federal wiretapping rules that would make it easier for law
enforcement to monitor e-mails and Internet-based phone calls were
challenged by privacy, high-tech and telecommunications groups in
federal court yesterday.

The groups argued that the rules would force broadband Internet service
providers, including universities and libraries, to pay for redesigning
their networks to make them more accessible to court-ordered wiretaps.

The groups also said the Federal Communications Commission rules,
scheduled to take effect in May 2007, could erode civil liberties and
stifle Internet innovation by imposing technological demands on developers.

It's simply a very bad idea for privacy and for free speech for the
government to design any technology, much less the Internet, to be
surveillance-friendly, said Lee Tien, a senior staff lawyer with the
Electronic Frontier Foundation, a nonprofit privacy rights group.

The government was trying to build tentacles of control throughout
telecommunications networks, Tien said.

The FCC rules make broadband Internet providers and voice over Internet
protocol companies subject to a 1994 federal law that requires telecom
companies to assist law enforcement agencies in carrying out
court-ordered wiretaps. The Communications Assistance for Law
Enforcement Act requires telecom carriers to design their networks so
they can quickly intercept communications and deliver them to the
government when presented with a court order.

In adopting the rules, the FCC said it wanted to ensure the government
could carry out wiretaps as more communications move from the
traditional telephone system to the Internet.

It is clearly not in the public interest to allow terrorists and
criminals to avoid lawful surveillance by law enforcement agencies, the
commission wrote in its order.

Opponents argued the law was tailored for a simpler, earlier era of
traditional telephone service and could cripple the evolution of the
Internet by forcing engineers to design products so they can be easily
monitored by the government.

The 1994 law will have a devastating impact on the whole model of
technical innovation on the Internet, said John Morris, staff counsel
for the Center for Democracy and Technology in Washington, which filed
an appeal of the rules with the U.S. Court of Appeals for the District
of Columbia Circuit yesterday.

The Internet evolves through many tens of thousands, or hundreds of
thousands, of innovators coming up with brand new ideas, he said. That
is exactly what will be squelched.

Morris said his group did not dispute the idea that the government
should be able to carry out court-ordered wiretaps, but rather argued
that the 1994 law was a blunt instrument ill-suited for the Internet age.

He said the matter should be referred to Congress, which can tailor the
obligations to the Internet context as opposed to importing the very
clumsy [telephone system] obligations and imposing them on the Internet.

The American Council on Education, a higher-education trade group,
separately asked the court Monday to review the rules.

We fear that doing what they want will require every router and every
switch in an IT system to be replaced, said Terry W. Hartle, the
council's senior vice president. He estimated that the upgrades could
cost colleges and universities $6 billion to $7 billion.

Our quarrel with them is fairly specific, Hartle said. We are
concerned about the cost, and the complexity, and the schedule on which
they want this accomplished.

Spokesmen for the FCC and the Justice Department declined comment on the
court challenges.

- --- end ---


...Raising my hand.

My question is on Terry Hartle's comments, maybe someone with more
insight into this could help clear my confusion.

Why would it require to replace every router and every switch when my
understanding is, FCC is looking to install *additional* gateway(s) to
monitor Internet-based phone calls and emails. I can see some sort of
network redesign happening in order to accodomate this but replacing
every router and every switch sounds too drastic, unless I
mis-understood it. Please, I'm not advocating this change but just
trying to understand the impact from an operation standpoint.

Any insight will be appreciated.



regards,
/virendra

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFDX/AApbZvCIJx1bcRAktgAKDzp+GaIDlpp5vdYT61jOWzEciClACfRkkW
uQBPWQSzNpsw1M80tUQgWdI=
=4t1U
-END PGP SIGNATURE-


[Fwd: Re: FCC Outage Reports ..(.was Verizon outage in Southern California?)]

2005-10-21 Thread Vicky Rode

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Just taking a quick poll to see if nanog community would consider this
a worthwhile effort to pursue?



regards,
/virendra


-  Original Message 
Subject: Re: FCC Outage Reports ..(.was Verizon outage in Southern
California?)
Date: Fri, 21 Oct 2005 21:26:51 +0300 (EEST)
From: Juuso Lehtinen [EMAIL PROTECTED]
To: nanog@merit.edu
References: [EMAIL PROTECTED]
[EMAIL PROTECTED] [EMAIL PROTECTED]


On Fri, 21 Oct 2005, Andre Oppermann wrote:
 Here we see again that the secrecy (to prevent terrorism) of this
 information costs more than having it in the open as the FCC did in
 the past.  The whole terrorism sham was just a convenient excuse to
 prevent outsiders from assessing the quality of the carriers network.

In the field of security engineering, this is something called security
through obscurity. Terrorists are well funded, and they, no doubt, can get
hold on those 'secret' fiber maps if they have interest in them.

 Do I feel better that neither me nor the terrorist know that my redundant
 fiber routes are in the same dig?  Or in the same cable even?  We all know
 how reliable the carriers bonus driven sales droid promises are...

Only ones suffering are us...

- --
juuso lehtinen

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFDWUsYpbZvCIJx1bcRAh2IAJsGJqCMtsuyMjYSDJFhCjzI07GBKwCfW7aG
uPBNNwW0I75xGyKP1Tlg9iw=
=l5Jg
-END PGP SIGNATURE-


Re: Verizon outage in Southern California?

2005-10-19 Thread Vicky Rode

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

I wonder what ever happened to redundancy? I guess 5 9s (dunno what the
going number is) got blown out of the water for them.



regards,
/virendra

David Lesher wrote:
 
 Speaking on Deep Background, the Press Secretary whispered:
 

I'm not completely familiar with the telco jargon.
Does Tandem mean the same as a local central office, where
POTS lines terminate at the switch? Long Beach has a population
of 470,000. The C/Os I know of are:
 
 
 
 A Central Office switch talks to subscribers aka end-users. 
 On its backside, it talks to other CO's and tandems. Time
 was, that was also VF copper pairs, but it's long since all 
 DS1 and up.
 
 A tandem is a switch that talks not to subs, but only to CO's. In
 days of old, when a {dialup} call went to the other side of town,
 chances are it went you-yourCO-downtown tandem-joesCO-joe. {copper
 all the way...}.
 
 A tandem was always housed in large CO building, but might have
 been ATT's vice the operationg company, etc...
 
 But ESS's and classless switching and massive expansion of the
 plant really muddled the picture. An ESS could be both a CO switch
 [for multiple prefixes and even multiple NPA's..] AND act like a
 tandem.. And oh, the actual line cards can be remoted 100 miles
 away in a horz. phonebooth box alongside the road in Smallville
 with DS1's/OC coming back. 
 
 My guess is a DACS, a cross-connect point that is an software-driven
 patch panel, lost its marbles. [engineering term of art.]
 A DACS could have dozen-MANY dozen DS1/DS3/OC-n going hither
 and yon. Some will be leased circuits. Others will be the CO trunks
 going from one switch to another. It may/may not have muxes internal,
 so that what arrives on a DS1 leaves in a OC96..
 
 I note it went down at 2:20 AM. That SCREAMS software
 upgrade/cutover. What's to bet GEE, no...VZEEE, was doing just
 that and there was a major ohshit.
 
 Sean noted a long while back that somehow, DACS crashes always
 seem to take hours to recover. Maybe the backups are on Kansas
 City standard tapes, I donno.. but this sounds like that..
 
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFDVoJXpbZvCIJx1bcRAstJAJ0dnrQL1P2QJyxNU3r0T/X8g9fukQCgnm/N
yW5EvW7gI3gfjY7XSozyMds=
=ocNd
-END PGP SIGNATURE-


Re: FW: Verizon outage in Southern California?

2005-10-18 Thread Vicky Rode

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Apparently there was a software glitch in the switch(s) which disrupted
 route calls.


regards,
/virendra

Hannigan, Martin wrote:
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On 
Behalf Of Matthew Black
Sent: Tuesday, October 18, 2005 3:13 PM

 
  
 
I'm not completely familiar with the telco jargon.
Does Tandem mean the same as a local central office, where
POTS lines terminate at the switch? Long Beach has a population
of 470,000. The C/Os I know of are:
 
 
 A tandem office is a CO primarily used as an aggregated switch point
 between local CO's. Think interconnection of local CO's or long haul
 tandems.
 
  
 
Alamitos at 7th Street and Termino, ZIP 90814

Clark near Clark Ave and Pacific Coast Highway, ZIP 90804

LongBeach at 6th Street and Elm Ave, ZIP 90802

Lakewood at Clark Ave and Connant St, ZIP 90808

LNBHCAXG at 3440 California Ave, ZIP 90807 (for my home)
 
 
 That's the building CLLI, the switch is LNBCHAXGDS0.
 
 This one is a 5ESS and serves 12 exchanges.
 
 562-290 562-424 562-426 562-427 562-490 
 562-492 562-595 562-933 562-981 562-988 
 562-989 562-997 
 
 I see 7 5ESS and 1 Nortel SLC DMS 10, possibly a remote to
 a campus or something, in Long Beach.
 
 507 E LEW is holding the most switching gear is likely
 a tandem. Um, I think this is the tandem code, PNTCMIMN50T,
 and it's servicing about 20 areas.
 
 
 
I have no idea whether cell service was truly affected. The
announcements we sent to our campus suggested people use their
cell phones for 911 service which would be serviced by the
CA Highway Patrol (Erik Estrada, etc.) or a campus telephone
which is serviced by our local campus police (sworn state police).
I was completely unaware of the outage until someone else
mentioned it in my office.
 
 
 If you know of an NPA-NXX of a cell phone that was impacted,
 send it privately and I'll tell you what CO it terminates in.
 
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFDVYhLpbZvCIJx1bcRApL+AKDRikufgOgg032THSg/Ai4S/iKSVwCg0O8c
HrvDIjtCgTVh5l+NFM8RG6I=
=vFGk
-END PGP SIGNATURE-


The exhaustion of IPv4 address space

2005-10-17 Thread Vicky Rode

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

well, if the existing discussion is not enough, cisco has an interesting
article out...see /. for more information.

http://www.cisco.com/en/US/about/ac123/ac147/archived_issues/ipj_8-3/ipv4.html


wearing my flame suite :-)

regards,
/virendra
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFDU9cKpbZvCIJx1bcRAoNWAKC5UUyUqfPcAEKJ8GX5Iky2y1qbxwCeMdUM
TkjJ1xoc4NK+y8Bv3YnZCjU=
=kVtG
-END PGP SIGNATURE-


Address Space ASN Allocation Process

2005-09-26 Thread Vicky Rode

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi,

Just trying to get some clarity and direction regarding obtaining
address space/ASN for my client.

Is there a minimum address space (?) an entity would need to justify to
go directly to RIR (ARIN in this case) as opposed to the upstream
provider? Is /20 the minimum allocation? Can my client approach RIR and
request for a /23?

If my client do procure a /23 how do they make make sure that this
address space will be globally routable?

Multihome will also be part of their network implementation, can they
apply for an ASN number?


Any insight will be appreciated.


regards,
/vicky

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFDOHZ1pbZvCIJx1bcRAihfAJwLF026eea0TxIt5nww7/jCr4YBxQCg57M/
zTUBKD1pkuE7S3NHnjqyqPU=
=lWUk
-END PGP SIGNATURE-


colo price matrix

2005-06-29 Thread Vicky Rode


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi,

Just wondering if anyone has any links and /or price matrix for colos?

Any pointers will be appreciated.



regards,
/vicky
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFCwt+ypbZvCIJx1bcRAotTAJ0f17A0qfo+ysueR3GRpB4+yCXmXgCZAczY
fRVgNFEOB3oUiP3KBt9p3hk=
=AdGf
-END PGP SIGNATURE-


Re: colo price matrix

2005-06-29 Thread Vicky Rode


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

this is a good start for me...i'll take it from here :-)



regards,
/vicky


Paul Vixie wrote:
| [EMAIL PROTECTED] (Vicky Rode) writes:
|
|
|Just wondering if anyone has any links and /or price matrix for colos?
|
|Any pointers will be appreciated.
|
|
| at the very low end, there's http://www.vix.com/personalcolo/.  i've
thus
| far resisted several tempting requests to generalize this to the ixp,
hosting,
| on-net, and transit markets.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFCwv9hpbZvCIJx1bcRAj9yAJ48B8jE0Dj0ZrA0SWSLAPU+alGyvACg+GNc
axeob2iSVglMu3ADcMhltjo=
=iBbi
-END PGP SIGNATURE-


Re: Vulnerability Issue in Implementations of the DNS Protocol

2005-05-24 Thread Vicky Rode


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Has anyone (a) experienced or noticed issues related to this
vulnerability (b) what action(s) have you taken to address this, if any?

What do folks at verisign and isc think about this?


Any insight will be appreciated.


regards,
/vicky

Fergie (Paul Ferguson) wrote:
|
| UNIRAS (UK Gov CERT)/NISCC:
| http://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html
|
| [snip]
|
|
| Summary
| - ---
| A vulnerability affecting the Domain Name System (DNS)
| protocol was identified by Dr. Steve Beaty from the
| Department of Mathematical and Computer Science of
| Metropolitan State College of Denver.
|
| The Domain Name System (DNS) protocol is an Internet
| service that translates domain names into Internet Protocol
| (IP) addresses. Because domain names are alphabetic,
| they're easier to remember, however the Internet is
| really based on IP addresses; hence every time a domain
| name is requested, a DNS service must translate the name
| into the corresponding IP address.
|
| The vulnerability concerns the recursion process used by
| some DNS implementations to decompress compressed DNS
| messages. Under certain circumstances, it is possible to
| cause the DNS server to terminate abnormally.
|
| All users of applications that support DNS are recommended
| to take note of this advisory and carry out any remedial actions
| suggested by their vendor(s).
|
| [snip]
|
| - ferg
|
|
| --
| Fergie, a.k.a. Paul Ferguson
|  Engineering Architecture for the Internet
|  [EMAIL PROTECTED] or [EMAIL PROTECTED]
|  ferg's tech blog: http://fergdawg.blogspot.com/
|
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFCk2n/pbZvCIJx1bcRAldAAJ9dxlg30J3jMX/W3bwXvdFlwvCj7gCgxQ0/
fGUMug5/x1Wg6wsrZg/n/NE=
=9iP/
-END PGP SIGNATURE-


Google Web Accelerator

2005-05-09 Thread Vicky Rode
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi there,
Did anyone catch this? Has anyone experienced any issues and if so, what
steps did you take to address this?
http://google.blognewschannel.com/index.php/archives/2005/05/05/much-controversy-over-googles-accelerator/
http://consumingexperience.blogspot.com/2005/05/google-web-accelerator-gwa-panacea-or_08.html
http://www.searchenginejournal.com/index.php?p=1676
According to Google Blogoscoped (see below), the download page has been
shut down because they can't handle the load.
http://blog.outer-court.com/archive/2005-05-08-n20.html

regards,
/vicky
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFCf6hJpbZvCIJx1bcRAsSiAKC1hRB4epeMef3FAxeC9/dSbfju9gCfSASO
OUOZb1US1CLLZ8w/W5n1lnc=
=v32F
-END PGP SIGNATURE-


Re: Internet2

2005-04-29 Thread Vicky Rode
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
comments in-line:
Dan Hollis wrote:
| On Wed, 27 Apr 2005, Randy Bush wrote:
|
|to source is still the big gap.  imiho, from the ops perspective,
|only sally's ecn has made any useful approach.  sadly, we may be
|able to judge the actual demand for e2e qos by ecn's very slow
|deployment.  i think this is unfortunate, as ecn is pretty cool.
- -
yeah ecn make sense to us as well. We are currently looking at piece
mealing this deployment at our end.
fyi - I think kernel.org has also implemented ecn at their end.
|
|
| The low demand is partially due to IWF[0] who unwittingly block it. Many
| OSes deploy with ecn support but default it off due to the IWF problem.
- ---
True enough. Plus devices (by default) may not honor CE (congestion
experienced) bits and hence could become non compliant end node which
could result in an unnecessary packet drop in the network.
|
| And there are so many IWF that applying enough cluebats to clear the path
| for ECN is going to take enormous effort.
|
| We could demonstrate how cool ECN is, if there werent so many IWF making
| this impossible. Entities who try to deploy ECN are deluged with hey wtf
| I cant reach site XYZ anymore, your shit is broken, fix it you ***!
|
| I have no idea if microsoft supports ECN yet, but if they dont then I
| suspect that a sufficiently embarassing benchmark would prod them into
| adding it.
|
| I wonder how many network operators on nanog block ECN. If you do, why?
- 
In fact I raised similar point at NANOG33 in two separate sessions (How
to Use Network Design Principles to Differentiate the Good, the Bad, and
the Ugly AND IP Fast-Reroute: An Analysis of Applicability to a Core
Network) about vendor experience/feedback in this area. Didn't get much
feedback.

regards,
/vicky
|
| -Dan
|
| [0]Idiots With Firewalls. See http://urchin.earth.li/cgi-bin/ecn.pl
|
|
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFCctVxpbZvCIJx1bcRAgwcAKDvvBlpDBZBaXfUJysTJ0GUByLUIACgln1F
HFQixDoE4zvsyPmdQy7Aa98=
=R64s
-END PGP SIGNATURE-


Internet2

2005-04-26 Thread Vicky Rode
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi there,
Just wondering how's internet2 community/partners protecting themselves
from lawsuits of illegal use of music/movie downloads.
In general, how are they protecting themselves from malicious code
infection spreading at internet2 speed? How are the devices coping up
with filters in place, if any?
Like to hear what nanog community and the people who are involved w/
internet2 connectivity think.
Any insight and /or pointers to any papers will be appreciated.
regards,
/vicky
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFCbp19pbZvCIJx1bcRApbRAKCNWtZP/f+5TPwzB0gkU7tLmgpq9gCgiR+H
bsR8d1Ai9zWFnUQeXPPB7fs=
=ebza
-END PGP SIGNATURE-


Re: Internet2

2005-04-26 Thread Vicky Rode
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I made that up :-)
Basically I meant to say not congested as the current Internet is.

regards,
/vicky
Mikael Abrahamsson wrote:
| On Tue, 26 Apr 2005, Vicky Rode wrote:
|
|
|In general, how are they protecting themselves from malicious code
|infection spreading at internet2 speed? How are the devices coping up
|with filters in place, if any?
|
|
| What is internet2 speed? As far as I can see Internet2 is a 10G based
| national network. What is so special about that in this day and age?
|
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFCbq2DpbZvCIJx1bcRAgOjAKCuprmc0AVDET7d7qokD+3IlrScngCg22Pj
vV0ZVZS8egBkpmIprN3h9f4=
=9zJe
-END PGP SIGNATURE-


Re: Internet2

2005-04-26 Thread Vicky Rode
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
since you deviated from my original post...
http://www.icir.org/floyd/ccmeasure.html

regards,
/vicky
Daniel Roesen wrote:
| On Tue, Apr 26, 2005 at 02:07:15PM -0700, Vicky Rode wrote:
|
|Basically I meant to say not congested as the current Internet is.
|
|
| It is?
|
|
| Regards,
| Daniel
|
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFCbtTopbZvCIJx1bcRAhoYAKDbWlRfn24TrCf1qiL4onXZDZSoSwCgqkEN
NxQzrae8KtOS60CQDPyJKEA=
=g+6Y
-END PGP SIGNATURE-


Re: DSCP ECN bits

2005-04-18 Thread Vicky Rode
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi Christian,
The ECN capable transport (ECT) bit would need to be set by the data
sender to indicate that the end-points of the transport protocol are
ECN-capable. The intermediate routers will need to honor these bits as well.
Fore more information, checkout, http://www.faqs.org/rfcs/rfc2481.html
regards,
/vicky
[EMAIL PROTECTED] wrote:
| Hi,
|
| Is anyone using the DSCP ECN bits to any great extent? Does it require
| end-host support in the stack to actually work?
|
| Cheers,
| Christian
|
|
|
| This message and any attachments (the message) is
| intended solely for the addressees and is confidential.
| If you receive this message in error, please delete it and
| immediately notify the sender. Any use not in accord with
| its purpose, any dissemination or disclosure, either whole
| or partial, is prohibited except formal approval. The internet
| can not guarantee the integrity of this message.
| BNP PARIBAS (and its subsidiaries) shall (will) not
| therefore be liable for the message if modified.
|
|
**
|
| BNP Paribas Private Bank London Branch is authorised
| by CECEI  AMF and is regulated by the Financial Services
| Authority for the conduct of its investment business in the
| United Kingdom.
|
| BNP Paribas Securities Services London Branch is authorised
| by CECEI  AMF and is regulated by the Financial Services
| Authority for the conduct of its investment business in the
| United Kingdom.
|
| BNP Paribas Fund Services UK Limited is authorised and
| regulated by the Financial Services Authority.
|
|
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFCZCyZpbZvCIJx1bcRAnBdAKCIBOzBExnGSHKa3VvSN2gCbb/zUwCg6zJI
AiguIwhvN6jIyu7/rri3s/c=
=chxS
-END PGP SIGNATURE-


djbdns: An alternative to BIND

2005-04-08 Thread Vicky Rode
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
http://software.newsforge.com/article.pl?sid=05/04/06/197203from=rss
Just wondering how many have transitioned to djbdns from bind and if so
any feedback.
regards,
/vicky
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFCVwvTpbZvCIJx1bcRAh5sAKCxu8Ab2BJUn7lH6GFQtWiRcfleEQCfbxvH
mOmy510OhNffb8sSCWCckZ0=
=tlMB
-END PGP SIGNATURE-


Re: djbdns: An alternative to BIND

2005-04-08 Thread Vicky Rode
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
thanks for the insight to all who responded.

regards,
/vicky
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFCVyRKpbZvCIJx1bcRArkUAKCufhrpcR1KqZ1hGJ8NRWxcOs0yWQCcC802
qhn641Q/PIGw0GKEWmPbnGU=
=u65M
-END PGP SIGNATURE-


Re: Contact from ACM?

2005-03-30 Thread Vicky Rode
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi Mark,
You are not alone. I've had problems even as a member :-)
I'll try and ping someone there and see what I can do.
Feel free to contact me directly if need be.
regards,
/virendra
Mark Newton wrote:
| I need to talk to someone who can update the bogon filters on www.acm.org.
| Attempts to reach technical contacts via the website have failed, which
| is a bit surprising given the nature of the org.
|
| If anyone reading this is an ACM member who can pass this message along
| to someone who cares I'd appreciate it.
|
| Thanks,
|
|   - mark
|
| --
| Mark Newton   Email:
[EMAIL PROTECTED] (W)
| Network Engineer  Email:
[EMAIL PROTECTED]  (H)
| Internode Systems Pty Ltd Desk:   +61-8-82282999
| Network Man - Anagram of Mark Newton  Mobile: +61-416-202-223
|
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFCS5e4pbZvCIJx1bcRAsAYAKCN6n2N+sKOzgHQetns9brTgW45ngCeIJk2
oGn49qTY90KMFdTaEdRe12M=
=dg//
-END PGP SIGNATURE-


Re: outage/maintenance window opinion

2005-03-28 Thread Vicky Rode
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
It depends.
If your device(s) was part of the change management notification then
that's correct.
regards,
//virendra//
Luke Parrish wrote:
| Trying to get clarification on an issue.
|
| Maintenance/outage window is 2:00AM to 5:00AM, during the window the
router
| we are working on fails and does not come back online until 8:00AM.
|
|  From a outage reporting/documentation standpoint is the outage start
time
| 2:00AM or 5:01AM since 5:01AM is when the maintenance window and planned
| outage was over...
|
| My take is that the outage starts when the planned maintenance/outage
| window is over at 5:01AM.
|
| Luke
|
| Luke Parrish
| Centurytel Internet Operations
| 318-330-6661
|
|
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFCSD8+pbZvCIJx1bcRAkB3AKCMIDKF4yMufSfmPtBpS9JQ+yRhfQCgumRE
DxtoyAD6VvFrWENniiZiu90=
=4R3G
-END PGP SIGNATURE-


Re: IBM to offer service to bounce unwanted e-mail back to the computers that sent them

2005-03-22 Thread Vicky Rode
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Why even bother responding. Just imagine frontbridge (using them an
example, I have no affiliation with them) responding to each and every
spam they block..something like 7 terrabytes of data per week or so. I
guess this is one way to justify for more bandwidth :-)
regards,
/virendra
Colin Johnston wrote:
| The better idea would be fingerprint the spam to match the bot used to
match
| the exploit used to run the bot to then reverse exploit back to the
| exploited machine patching in the process.
| I managed to setup such a system a while ago with nimda traffic however I
| could not a find a software tool which exploited a nimda exploited machine
| which could then patch it and remove the virus
| (Ie a remote doctor without you knowing :)
|
| Colin Johnston
|
|
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFCQHd3pbZvCIJx1bcRAhPZAJsFJeNXkjKbtUkiMG5LKUH1C1ipPwCfYG1W
KHZwd5enWFB+mTp5kkJaEyw=
=ZtDG
-END PGP SIGNATURE-


scanner-dns

2005-03-03 Thread Vicky Rode
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi there,
Just wondering if there is any way I could use a scanner (I have a home
grown script for this) that would go thru the DNS registries from some
public source, scan for keywords in the domain name.
Anything that is available only to ISP's and perhaps we can dovetail
onto that if we cough up some $.
Any pointers will be appreciated.
regards,
/virendra
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFCJzEJpbZvCIJx1bcRAoIRAKC0JxOAUVuD30jKzrbtElrqWCoYWwCfdXop
b5J3TIDs4i2xILgtaYpApZI=
=T5GG
-END PGP SIGNATURE-


public accessible snmp devices?

2005-03-03 Thread Vicky Rode
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi there,
Just wondering if there are any pool of public accessible (read-only)
snmp enabled devices that one can access for testing purposes (such as
snmpwalk, polling devices via oid/mib, graphing chart..etc)?
I'm looking for a pool of devices that I run my test on.
Any pointers will be appreciated.
regards,
/virendra
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFCJzLfpbZvCIJx1bcRAqLcAJ95PzxXE4v51JgzTpeqfuEDZG6ibgCaAg20
WJxjcsJYroHriTPr635QOBE=
=SV3b
-END PGP SIGNATURE-


Re: broke Inktomi floods?

2005-01-21 Thread Vicky Rode
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
in-line:
Suresh Ramasubramanian wrote:
| Vicky Rode [EMAIL PROTECTED] wrote:
|
|
|not sure if spiders falls under spam or ddos bracket when they
|repeatedly start hammering one's network. you could possible report to
|spamcop (*grin*) to get a quicker response. spamcom hasn't been accurate
|in some instances :-)
|
|
| Er.. just what would you report to spamcop, and what would spamcop do
with your
| reports?
- --
that's why i asked, this type of behavior falls under what abuse terms?
|
|
|do you remember this incident,
http://www.cs.wisc.edu/~plonka/netgear-sntp/
|
|
| Not very new .. broken apps which keep hammering on a resource for
some reason
| are a fairly regular feature of the internet.
- -
doesn't mean that it shouldn't be blocked/reported.

regards,
/vicky
|
|   srs
|
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFB8a1ipbZvCIJx1bcRAmOrAKCnCHmj72VsJIec/CsA0JBjkbGdCACgi9BB
N20N5nuLVPFN5+bYVF3k7pY=
=BwbD
-END PGP SIGNATURE-


Re: Please Check Filters - BOGON Filtering IP Space 72.14.128.0/19

2005-01-20 Thread Vicky Rode
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
in-line:
Jared Mauch wrote:
| On Thu, Jan 20, 2005 at 06:26:15PM +0530, Suresh Ramasubramanian wrote:
|
|David Barak [EMAIL PROTECTED] wrote:
|
|While it says that bogon filters change, and provides
|a URL to check it, what percentage of folks who would
|use a feature like autosecure would ever update
|their filters?
|
|
|What do they do to update that bogon list anyway - push a new IOS image?
|
|
|   Actually, my assumption is anyone with autosecure gets
| free software upgrades for life, as this is a flexible list that
| will change over time.  Each time a change is made they
| need to release new software, and notify their installed
| customer base.
- ---
i understand bogon filters and reasoning behind it and i'm all for it.
but why does one think (maybe i missing something) this approach
(autosecure) is scalable and acceptable to update your ios or even
constantly updating your acls every time one has to update their bogon
filters? yet another think to look out for? i like to see the network
availability for aol, google, nasdaq, every time they update their bogons.
why can't this somehow be dynamically updated and /or linked to a
master file as opposed to upgrading the ios?
like to hear more thoughts on it.

regards,
/vicky
|
|   - jared
|
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFB7+ugpbZvCIJx1bcRApL0AJ0T2xb1ZHkxDSg0Ne3UwXqQ8z7xogCaA4rc
/An79+f9qmCKqfqkDsMH1wU=
=Sv6E
-END PGP SIGNATURE-


Re: broke Inktomi floods?

2005-01-20 Thread Vicky Rode
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
not sure if spiders falls under spam or ddos bracket when they
repeatedly start hammering one's network. you could possible report to
spamcop (*grin*) to get a quicker response. spamcom hasn't been accurate
in some instances :-)
do you remember this incident, http://www.cs.wisc.edu/~plonka/netgear-sntp/

regards,
/vicky
Dan Hollis wrote:
| On Thu, 20 Jan 2005, Suresh Ramasubramanian wrote:
|
|On Thu, 20 Jan 2005 14:30:04 +0200, Gadi Evron [EMAIL PROTECTED] wrote:
|
|Inktomi (now Yahoo!) sends it's spiders all over the Internet. Lately
|some of our systems are reporting that they open many HTTP connections
|to our web sites, without ever sending any data and immediately
|disconnecting. This is getting to a level where it disturbs us.
|
|I have heard previous stories of inktomi ignoring robots.txt (not seen
|this for myself though).  And there are threads like this -
|Quoting from http://www.webmasterworld.com/forum11/1968-1-15.htm
|
|
| back in 1999 inktomi hammered our nameserver (which never has, and never
| will run http. ever.) After _weeks_ of complaining to them and to their
| upstream exodus (hah!) I finally got them to stop. Only to have them
| start up again a month later.
|
| not suprising to see them up to their old antics again.
|
| time to nullroute i guess?
|
| -Dan
|
|
|
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFB8DFOpbZvCIJx1bcRAu2FAJ4+a2SHF7XxWgaHKFZzi7hf46tJFwCfcU12
fbIMwtwkPhI33onPawlBKYE=
=P+y0
-END PGP SIGNATURE-


Re: Measure overall network availability

2005-01-07 Thread Vicky Rode
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
in-line:
Jim Popovitch wrote:
| On Fri, 2005-01-07 at 12:09 +0530, Suresh Ramasubramanian wrote:
|
|
|Maybe maintain a few 1U colo boxes (cheap!) in data centers on
|selected networks around the world, from where you want to measure
|reachablity .. run nothing except nagios or some other monitoring app
|for measuring availablity of services like http, smtp, etc that you
|want to know are available or not,
|
|
| I've often wondered, as I work intimately with NMS software, just how
| much cross network traffic is are you there? related.  Would it have a
| positive impact on overall net performance if everyone just turned off
| all internetwork status polling?
- -
depends on the polling period.
regards,
/vicky
|
| ducking
|
| -Jim P.
|
|
|
|
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFB3pt6pbZvCIJx1bcRAhZFAKDony2dCnDUUcH9T7wntDfDNMA2kQCdGSmU
gO++o+vIxzUAEaEUmFT5T3M=
=KBqR
-END PGP SIGNATURE-


Consortium sheds light on dark fiber's potential

2004-11-24 Thread Vicky
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
http://www.eetimes.com/showArticle.jhtml?articleID=53700951

regards,
/vicky
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFBpMpOpbZvCIJx1bcRAqFmAJ96505uhm2Ipg//JLYktUm59adqsQCgi1Hh
mnOxyvTt188SnRmHtU5sBo8=
=cdob
-END PGP SIGNATURE-


Re: Public Interest Networks

2004-11-24 Thread Vicky
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi Deepak!
you raise some interesting points from bw standpoint.
what really got me scratching my head is the fact that throwing bw to
conserve computing power. in this cat and mouse game, mouse always wins :-)
The OptiPuter project aims at learning how to 'waste' bandwidth and
storage in order to conserve 'scarce' computing in this new world of
inverted values, said Smarr.
i'm not even sure why even implement mpls where latency/congestion is
not an issue specially in this case or even talking about I2 for that
matter.
regards,
/vicky
Deepak Jain wrote:
| Vicky, I apologize if I am hijacking your thread.
|
| Is it just me or does all this talk of Research (and other Public
| Interest) Networks and logical separation by layer 1/2 leave [everyone]
| nonplussed?
|
| How is logical separation of a network [say via MPLS] much different
| than using a lambda to do the same thing? It seems kind of dumb to me
| that a network that is spending the money to buy capacity is selling a
| 2.5G or 10G wave to universities as any kind of improvement... I'm not
| even sure they could do it at a better price than a desperate telco that
| is selling the underlying fiber in the first place.
|
| Engineering idea: All the constituent folks do the same network, but
| build it as a single logical network, with say all 40x10G Lambdas on it.
| Everyone is given a 2.5G or 10G MPLS tunnel with the ability to use all
| unused bandwidth that is available on the network at that time... That
| would at least have some legs and create some value for having more
| membership.
|
| This smacks me as similar to Philadelphia wanting to deploy universal
| WiFi and charging $20-$25/month for it -- a free network to the city
| makes sense, afterall they pay taxes -- a psuedo-commercial service,
| what's the point? Do these government (and other so-called Public
| Interest) networks really make sense in the U.S. or is everyone still
| stuck in a timewarp when/where the NSFnet made sense because no one
| (commercially) could/would step up to perform the same function.
|
| Hopefully there is some operational content in there... If you don't see
| an on-list response from me, you probably know why.
|
| Deepak Jain
| AiNET
|
| Vicky wrote:
|
|
|http://www.eetimes.com/showArticle.jhtml?articleID=53700951
|
|
|
|
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFBpOqspbZvCIJx1bcRAtonAJsH2dJLmQo+OpB5q/bcl/iOsCQt1wCeM+rQ
sM0+tPS3yN+nCrl5y0iA7KM=
=R/vP
-END PGP SIGNATURE-


Re: Diffserv service classes

2004-11-20 Thread Vicky
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
ietfreport is timing outhere's another url for this draft.
http://www.ietf.org/internet-drafts/draft-baker-diffserv-basic-classes-04.txt
interesting read at:
http://qbone.internet2.edu/papers/non-architectural-problems.txt
regards,
/vicky
Sean Donelan wrote:
| In the continuing effort to make Diffserv useful on the Internet,
| the Transport Area working group has the draft:
|
| http://ietfreport.isoc.org/idref/draft-baker-diffserv-basic-classes/
|
| The draft has a little bit for everyone. Lots of rope/flexibility for
| application developers. But have any network operators thought how they
| could actually support the framework in any meaningful way? And assuming
| the network actually supported it, what happens when you throw such fine
| grain differentiated traffic at the network?
|
|
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFBn8EfpbZvCIJx1bcRAn4mAKCAjZu5k89IVIDXajJW9tp2MmO4+QCgrFmM
ojED2CtlqNO92BqCcnWcG6Y=
=5lJL
-END PGP SIGNATURE-


Re: 3 Mb question

2004-10-13 Thread Vicky
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
...also look into IMA (inverse multiplex atm).

regards,
/vicky
Gerald wrote:
| I've got what seems to me like an innocuous question for this list...
|
| Someone is requesting access to about 3 mb of traffic up/dn. I figure 2
| T1s will give them the 3 Mb I need, but I'm looking for suggestions on
| either efficiently combining those 2 to get the most bandwidth for their
| buck or else I have to look at getting them a ds3 and scaling back to
| what they need.
|
| Is there an good low end suggestion for making effective use of 2 T1s to
| give 3 Mb of bandwidth? In practice, I've seen 2 T1s load balanced with
| CEF not do very well at giving a full 3 Mb. (This was without turning on
| per-packet CEF)
|
| I'm not personally experienced with MLPPP or mux hardware if that helps,
| but I could get it set up if that's the consensus as the best option.
| The NRC of something that would effectively couple the 2 T1s would
| easily beat the MRC of a DS3 which I think might be overkill for just 3
| Mb.
|
| Thanks for suggestions and tips.
|
| Gerald
|
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFBbb0TpbZvCIJx1bcRAtrbAKDxZDh+ln530q9peNDO5spDq6Qh6ACcD9/P
Jf/tXerUTYMWuqwvnhCIPkw=
=fhaT
-END PGP SIGNATURE-


[OT] Layer 2 Trace

2004-07-08 Thread Vicky
Hi there,
Just wondering if there's anyone who can recommend a layer 2 trace 
utility similar to l2trace on a cisco switch but one that runs on a 
linux box?

Any help will be appreciated.
regards,
/vicky


design related question

2004-06-13 Thread Vicky
Hi there,
Just want to hear your thoughts (pros and cons) on placing qos appliance 
between the below choke points.

(a) appliance sitting between internal 
lan-appliance-dmz-pix-edge router-wan cloud.

or
(b) appliance sitting between wan cloud-edge 
router-appliance-dmz-pix-internal lan

Currently this appliance supports the following qos components w/ 45mbps 
support on eth0 and eth1:

-- shaping
-- buffering
-- policing
Any pointers to white papers, similar deployment, lesson learned or 
simply your feedback will be appreciated.

regards,
/vicky


tools for traffic engineering networks

2004-05-30 Thread Vicky Rode
Hi there,
I'm curious to know what tools (in traffic engineering arena) people use 
in order to manage and verify their service assurance that they are 
providing and / or receiving they think they are.

How do you know the policers are functioning correctly?
How do you know whether your service provider and / or your internal 
traffic is not being over-book?

Any recommendations, thoughts, white papers, pointers will be greatly 
appreciated.

regards,
/vicky




Re: best effort has economic problems

2004-05-29 Thread Vicky Rode
interesting reading
http://mail.internet2.edu:8080/guest/archives/qbone-arch-dt/log200205/msg0.html
regards,
/vicky
Edward B. Dreger wrote:
GC Date: Sat, 29 May 2004 16:53:17 -0400
GC From: Gordon Cook
GC The point I am making in my report is NOT that the best
GC effort network has technology problems but rather that it has
GC ECONOMIC PROBLEMS.  That it might support 2 or 3 players not
GC 2 or 3 HUNDRED.
Best effort is cheaper to provide.  Cheaper sells.  Is there
enough of a market to sustain premium services?  IP-based VPNs
haven't replaced FR and PtP WAN links, but FR and PtP haven't
thwarted IP-based VPNs.
GC That until companies begin to go chapter seven and vanish,
GC the best effort net will be a black hole that burns up
GC capital because, for many players, the OPERATIONAL expense is
GC more than they get for bandwidth never mind cap-ex.
Definitely true about opex and capex... but I'm not convinced
that QoS is the magic bullet that will make the marketplace big
enough and profitable enough.  I don't see service offerings
fixing the woes of screwball pricing.
GC best effort won't go away.  many best effort players will.
If all best effort players provided QoS/guaranteed services,
would the survival rate be significantly higher as a result?
GC for the time being, best effort bandwidth prices as an
GC absolute commodity cannot sustain networks over the long
GC haul.  A network that can deliver QoS the report hypothesizes
GC may be able to attract enough revenue to become profitable.
That's where I'm not convinced.  Current IP delineates the lower
reliability boundary and a benchmark price point.  Premium
services won't have a lower cost than best-effort, so they must
sell for more.  Would the incremental service improvements be
high enough to draw customers away from cheap BE _and_ support
sufficient margins?
First class hasn't stopped the cycle of airline bankruptcies and
government bailouts.  I don't see first class data as much
different.
GC How to to this my group is still discussing.  We don't
GC pretend that QoS is easy or any kind of mature collection of
GC technologies, but increasingly it looks as though the
GC industry, if it is ever going to be self sustaining, really
GC needs to look at QoS services and solutions.
Perhaps, but only if the price is right.  DSL sells better than
Internet T1 lines, which sell better than end-to-end private
lines and packet clouds.  There's a reason for that.
Eddy
--
EverQuick Internet - http://www.everquick.net/
A division of Brotsman  Dreger, Inc. - http://www.brotsman.com/
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 785 865 5885 Lawrence and [inter]national
Phone: +1 316 794 8922 Wichita
_
  DO NOT send mail to the following addresses :
  [EMAIL PROTECTED] -or- [EMAIL PROTECTED] -or- [EMAIL PROTECTED]
Sending mail to spambait addresses is a great way to get blocked.



Re: WAN accelerator recommendations

2004-05-26 Thread Vicky Rode
I'm interested in hearing people's view points on this as well. In 
general what do folks thing about implementing yet another appliance 
within their networks as opposed to implementing the same features (if 
supported by their gear vendor) within their choke points.

regards,
/vicky
Matt Bazan wrote:
Hello,
I'm looking for advice and recommendations on WAN (T1 speeds)
accelerator devices.  I've seen the literature on the offerings from
Peribit, NetCelera and Packeteer and am looking for some real-world
feedback.  Can anyone provide me with their experiences using these
products or similar?  Thanks,
  Matt


New QoS Mailing List [nsp-qos]

2004-05-14 Thread Vicky Rode


Mailing list for QoS discussions has been created. This is multi-vendor 
list accelerating the adoption of IP products and services that benefit 
from QoS capabilities.

This list is intended to aid anyone deploying QoS solutions. Feel free 
to spread the word.

Many thanks to Jared Mauch in setting this up.

Subscribe:
https://puck.nether.net/mailman/listinfo/nsp-qos
regards,
/vicky


Spamcop

2004-05-11 Thread Vicky Rode
Hi there,

Just wondering why was my e-mail thread (Hierarchical Credit-based 
Queuing (HCQ): QoS) dated 5/9/2004 9:36 PM reported as a spam? Just 
trying to understand so that I don't repeat it. Below is a cut and paste 
of the reported incident.

Please advice.

regards,
/vicky
 cut here --

Return-Path: [EMAIL PROTECTED]
Received: from vamx01.mgw.rr.com ([24.28.193.148]) by
acme-reston.va.rr.com
  (Post.Office MTA v3.5.3 release 223
  ID# 0-59787U25L25S0V35) with SMTP id com
  for [EMAIL PROTECTED]; Mon, 10 May 2004 10:42:14 -0400
Received: from vmx2.spamcop.net (vmx2.spamcop.net [206.14.107.117])
by vamx01.mgw.rr.com (8.12.10/8.12.8) with ESMTP id
i4AEkwhn017175
for [EMAIL PROTECTED]; Mon, 10 May 2004 10:47:01 -0400 (EDT)
Received: from sc-app3.verio.ironport.com (HELO spamcop.net)
(192.168.11.203)
  by vmx2.spamcop.net with SMTP; 10 May 2004 07:47:00 -0700
Received: from [68.13.211.63] by spamcop.net
with HTTP; Mon, 10 May 2004 14:47:01 GMT
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [SpamCop (24.30.181.126) id:988145978]Hierarchical Credit-based
Queuing (HCQ): QoS
Precedence: list
Message-ID: [EMAIL PROTECTED]
Date: Sun, 9 May 2004 21:36:30 -0700 (PDT)
X-SpamCop-sourceip: 24.30.181.126
X-Mailer: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; .NET CLR
1.0.3705)
via http://www.spamcop.net/ v1.3.4
X-Virus-Scanned: Symantec AntiVirus Scan Engine
[ SpamCop V1.3.4 ]
This message is brief for your comfort.  Please use links below for
details.
Email from 24.30.181.126 / Sun, 9 May 2004 21:36:30 -0700 (PDT)
http://www.spamcop.net/w3m?i=z988145978zab5cec781dcfa15ae459c11bd03b7bef
z
[ Offending message ]
Return-path: owner-x
Envelope-to: x
Delivery-date: Mon, 10 May 2004 00:39:15 -0400
Received: from [198.108.1.26] (helo=trapdoor.merit.edu)
by wilma.widomaker.com with esmtp (Exim 3.36 #1)
id 1BN2ZP-000Jo6-00
for x; Mon, 10 May 2004 00:39:15 -0400
Received: by trapdoor.merit.edu (Postfix)
id B68EC91206; Mon, 10 May 2004 00:36:37 -0400 (EDT)
Delivered-To: x
Received: by trapdoor.merit.edu (Postfix, from userid 56)
id 8645591243; Mon, 10 May 2004 00:36:37 -0400 (EDT)
Delivered-To: x
Received: from segue.merit.edu (segue.merit.edu [198.108.1.41])
by trapdoor.merit.edu (Postfix) with ESMTP id 50AFD91206
for x; Mon, 10 May 2004 00:36:34 -0400 (EDT)
Received: by segue.merit.edu (Postfix)
id 3B3955914F; Mon, 10 May 2004 00:36:34 -0400 (EDT)
Delivered-To: x
Received: from ms-smtp-02-eri0.socal.rr.com
(ms-smtp-02-qfe0.socal.rr.com [66.75.162.134])
by segue.merit.edu (Postfix) with ESMTP id EAB7358E5D
for x; Mon, 10 May 2004 00:36:33 -0400 (EDT)
Received: from [192.168.2.2] (cpe-24-30-181-126.socal.rr.com
[24.30.181.126])
by ms-smtp-02-eri0.socal.rr.com (8.12.10/8.12.7) with ESMTP id
i4A4aUce025659
for x; Sun, 9 May 2004 21:36:30 -0700 (PDT)
Message-ID: [EMAIL PROTECTED]
Date: Sun, 09 May 2004 21:36:41 -0700
From: Vicky Rode [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
User-Agent: Mozilla Thunderbird 0.6 (Windows/20040502)
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: x
Subject: Hierarchical Credit-based Queuing (HCQ): QoS
X-Enigmail-Version: 0.83.6.0
X-Enigmail-Supports: pgp-inline, pgp-mime
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
X-Virus-Scanned: Symantec AntiVirus Scan Engine
Sender: owner-x
Precedence: bulk
Errors-To: [EMAIL PROTECTED]
X-Loop: nanog


Hi there,

Just wondering if anyone out there has either implemented or looked into

this queuing method for quality of service implementation.
This solution is offered (hardware solution) and patented by
foursticks.com. According to foursticks, HCQ achieves the efficiency
and flexibility of first generation queuing systems, without the
disadvantages.
It compares HCQ (interesting reading) w/ Class-Based Queuing (CBQ),
Random Early Discard (RED) and Weighted Random Early Discard
(WRED),Weighted Fair Queuing (WFQ),Priority Queuing (PQ)  Low Latency
Queuing (LLQ).
Also can anyone recommend a qos forum which I can ping as well.

Any insight will be appreciated.

regards,
/vicky



Type of Service (TOS)

2004-05-10 Thread Vicky Rode
Hi there,

Say if I had a qos appliance installed on networks between a lan and a 
wan box would the qos policies be carried across wan end points (point 
to point connection)? In other words, will the router retain the TOS 
bits across to the other side of the wan connection to provide QoS-style 
priority for the packets or will it clear the TOS bits? BTW, the other 
side of the wan connection also has the qos appliance sitting between a 
lan and a wan box.

Just so that I'm clear, I'm not talking about an upstream neighbor being 
an ISP connection  which I know they will likely ignore the TOS bits 
unless I pay them extra for the feature. The above scenario is a point 
to point connection to a remote site.

Any insight will be appreciated.

regards,
/vicky


Re: Type of Service (TOS)

2004-05-10 Thread Vicky Rode
Hi,

Do you know by default if the routers pass the TOS bits?

regards,
/vicky
Scott McGrath wrote:

The answer is it depends.  routers _usually_ honor the TOS bits unless
they are configured to clear or rewrite them.  We use the TOS bits for
designating traffic classes so in some cases we rewrite the TOS bits set
by the host so in your case we would modify the TOS bits.
Scott C. McGrath

On Mon, 10 May 2004, Vicky Rode wrote:


Hi there,

Say if I had a qos appliance installed on networks between a lan and a
wan box would the qos policies be carried across wan end points (point
to point connection)? In other words, will the router retain the TOS
bits across to the other side of the wan connection to provide QoS-style
priority for the packets or will it clear the TOS bits? BTW, the other
side of the wan connection also has the qos appliance sitting between a
lan and a wan box.
Just so that I'm clear, I'm not talking about an upstream neighbor being
an ISP connection  which I know they will likely ignore the TOS bits
unless I pay them extra for the feature. The above scenario is a point
to point connection to a remote site.
Any insight will be appreciated.

regards,
/vicky




Hierarchical Credit-based Queuing (HCQ): QoS

2004-05-09 Thread Vicky Rode
Hi there,

Just wondering if anyone out there has either implemented or looked into 
this queuing method for quality of service implementation.
This solution is offered (hardware solution) and patented by 
foursticks.com. According to foursticks, HCQ achieves the efficiency 
and flexibility of first generation queuing systems, without the 
disadvantages.

It compares HCQ (interesting reading) w/ Class-Based Queuing (CBQ), 
Random Early Discard (RED) and Weighted Random Early Discard 
(WRED),Weighted Fair Queuing (WFQ),Priority Queuing (PQ)  Low Latency 
Queuing (LLQ).

Also can anyone recommend a qos forum which I can ping as well.

Any insight will be appreciated.

regards,
/vicky


RE: has anyone notice this ?

2003-06-29 Thread Vicky Rode

Hi Todd,


sorry about the late responseyes in fact i am using my own dns servers
w/o any problems (knock on wood)time warner think its their cable modem
box but i think its a caching issue on there end.



regards,
/vicky

-Original Message-
From: Todd Mitchell - lists [mailto:[EMAIL PROTECTED]
Sent: Saturday, June 28, 2003 7:19 PM
To: [EMAIL PROTECTED]
Cc: 'David A. Ulevitch'; [EMAIL PROTECTED]
Subject: RE: has anyone notice this ?


Have you tried using DNS servers other than the ones supplied by your
ISPs DHCP server?

Todd

--


| -Original Message-
| From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf
Of
| Vicky Rode
| Sent: Saturday, June 28, 2003 9:57 PM
| To: David A. Ulevitch; [EMAIL PROTECTED]
| Subject: RE: has anyone notice this ?
|
|
| Hi David,
|
| i'm just couple feet away from my box. i'm currently using wireless
and
| even
| tried wired with same results. the fact others are experiencing
similar
| problems makes me believe the problem could be on time warner end,
| possible
| caching issue.
|
|
|
| regards,
| /vicky
|
|
|
| -Original Message-
| From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of
| David A. Ulevitch
| Sent: Saturday, June 28, 2003 6:03 PM
| To: [EMAIL PROTECTED]
| Subject: RE: has anyone notice this ?
|
|
|
|
| quote who=Vicky Rode
|  vickyr  i'm a time warner end-user trying to access outside world
|  which could be anything.
|
| [SNIP]
|
|  vickyr yes i have and they think it could be the cable modem box
|  and have issued a replacement. i sure hope they have a good stock
|  because i know whole bunch of people who are having similar
problems.
|  maybe its time to buy some 3com stocks :)
|
| A twisted or crumpled up ethernet cable can sometimes impede the flow
of
| ones and zeros.  Often looping up extra slack in your cat-5 can prove
| catastrophic for the free flow of electrons down the pipe.
|
| Ahh...Saturday (PDT)...
|
| -davidu
|
| 
|David A. Ulevitch -- http://david.ulevitch.com
|   http://everydns.net -+- http://communitycolo.net
| Campus Box 6957 + Washington University in St. Louis
| 
|
|






RE: has anyone notice this ?

2003-06-29 Thread Vicky Rode

Hi Jay,


comments in-line:


-Original Message-
From: Jay Hennigan [mailto:[EMAIL PROTECTED]
Sent: Saturday, June 28, 2003 10:22 PM
To: Vicky Rode
Cc: [EMAIL PROTECTED]
Subject: RE: has anyone notice this ?


On Sat, 28 Jun 2003, Vicky Rode wrote:

 It would be easier to troubleshoot if you used a browser that returned
 a meaningful error message.  The page could not be found could be just
 about anything.  DNS, routing, broken link, etc.
 ---
 vickyr i even tried the same thing under linux---mozilla and i get site
 name not found which i believe is less meaningful than ie :)

No such domain is the Mozilla response.  This points to a DNS issue,
which is more useful than Page could not be displayed.  What does dig
give you for the domain?  How about dig with a different name server
specified?
--
vickyr you might be correct but like i said in my case linux---mozilla
states www.cnn.com could not be found. please check the name and try
again. i finally gave up playing ping pong with time warner and started
using my dns servers.



 Also, you don't indicate if you're a Time Warner customer trying to reach
 web sites elsewhere or a non-customer trying to reach sites on the Time
 Warner network.  Your IP address or ISP's network and the URL of the site
 you're trying to reach, for example.
 -
 vickyr  i'm a time warner end-user trying to access outside world which
 could be anything.

Nag their tech support.
---
vickyr i even tried talking to their level 2 support and they still think
its my cable modem box even after presenting them the facts unless for some
reason their box also runs a cache server.




 Have you queried the Time Warner support staff?
 ---
 vickyr yes i have and they think it could be the cable modem box and have
 issued a replacement. i sure hope they have a good stock because vickyr i
 know whole bunch of people who are having similar problems.

It's those Warner Brothers Acme brand modems.  Same outfit that makes all
of Wile E.s stuff.  It's probably also an Acme nameserver.

Seriously, you should use some other tools such as name lookup to find
the IP address of the site in question.  If it fails with their default
resolvers, try a different resolver.  Then see if you can get to the site
(or a default site on the same server) by IP address, use traceroute,
etc.

 maybe its time to buy some 3com stocks :)

If a whole bunch of people are having the same issue and they're all on
Time Warner in your neck of the woods, it probably isn't the cable modem
hardware.
---
vickyr exactly my point.



regards,
/vicky


--
Jay Hennigan - CCIE #7880 - Network Administration - [EMAIL PROTECTED]
WestNet:  Connecting you to the planet.  805 884-6323  WB6RDV
NetLojix Communications, Inc.  -  http://www.netlojix.com/




has anyone notice this ?

2003-06-28 Thread Vicky Rode

howdy folks,


just wondering has anyone noticed http access issue (the page cannot be
displayed) on time warner network ? i literally have to try 5 to 6 times to
get to the page. i believe this problem just started a week or so back.

i've even talked to few other people on socal.rr.com network and they are
experiencing similar problems. is this socal.rr.com related or other regions
are expediting same problems too. time warner's network status page shows
everything is okay.



regards,
/vicky





RE: has anyone notice this ?

2003-06-28 Thread Vicky Rode

Hi Jay,


see comments in-line:


-Original Message-
From: Jay Hennigan [mailto:[EMAIL PROTECTED]
Sent: Saturday, June 28, 2003 4:09 PM
To: Vicky Rode
Cc: [EMAIL PROTECTED]
Subject: Re: has anyone notice this ?


On Sat, 28 Jun 2003, Vicky Rode wrote:

 just wondering has anyone noticed http access issue (the page cannot be
 displayed) on time warner network ? i literally have to try 5 to 6 times
to
 get to the page. i believe this problem just started a week or so back.

It would be easier to troubleshoot if you used a browser that returned
a meaningful error message.  The page could not be found could be just
about anything.  DNS, routing, broken link, etc.
---
vickyr i even tried the same thing under linux---mozilla and i get site
name not found which i believe is less meaningful than ie :)




Also, you don't indicate if you're a Time Warner customer trying to reach
web sites elsewhere or a non-customer trying to reach sites on the Time
Warner network.  Your IP address or ISP's network and the URL of the site
you're trying to reach, for example.
-
vickyr  i'm a time warner end-user trying to access outside world which
could be anything.



 i've even talked to few other people on socal.rr.com network and they are
 experiencing similar problems. is this socal.rr.com related or other
regions
 are expediting same problems too. time warner's network status page shows
 everything is okay.

It really depends on the nature of the failure.  More information is needed.

Have you queried the Time Warner support staff?
---
vickyr yes i have and they think it could be the cable modem box and have
issued a replacement. i sure hope they have a good stock because vickyr i
know whole bunch of people who are having similar problems. maybe its time
to buy some 3com stocks :)



regards,
/vicky


--
Jay Hennigan - CCIE #7880 - Network Administration - [EMAIL PROTECTED]
WestNet:  Connecting you to the planet.  805 884-6323  WB6RDV
NetLojix Communications, Inc.  -  http://www.netlojix.com/




RE: has anyone notice this ?

2003-06-28 Thread Vicky Rode

Hi David,

i'm just couple feet away from my box. i'm currently using wireless and even
tried wired with same results. the fact others are experiencing similar
problems makes me believe the problem could be on time warner end, possible
caching issue.



regards,
/vicky



-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of
David A. Ulevitch
Sent: Saturday, June 28, 2003 6:03 PM
To: [EMAIL PROTECTED]
Subject: RE: has anyone notice this ?




quote who=Vicky Rode
 vickyr  i'm a time warner end-user trying to access outside world
 which could be anything.

[SNIP]

 vickyr yes i have and they think it could be the cable modem box
 and have issued a replacement. i sure hope they have a good stock
 because i know whole bunch of people who are having similar problems.
 maybe its time to buy some 3com stocks :)

A twisted or crumpled up ethernet cable can sometimes impede the flow of
ones and zeros.  Often looping up extra slack in your cat-5 can prove
catastrophic for the free flow of electrons down the pipe.

Ahh...Saturday (PDT)...

-davidu


   David A. Ulevitch -- http://david.ulevitch.com
  http://everydns.net -+- http://communitycolo.net
Campus Box 6957 + Washington University in St. Louis





69.0.0.0/8 - Please update your filters

2003-02-25 Thread Hsu, Vicky

-Original Message-
From: Chan, KaLun 
Sent: Thursday, February 20, 2003 4:18 PM
To: Chan, KaLun; DL NOC Managers; DL NOC-IP Services
Cc: Eisenhart, William; Minter, Daniel; DL Neteng-core-ip
Subject: RE: [ARIN-20030123.943] 69.3.0.0/Covad - who had this block before?


All,

It has recently come to our attention that many Internet routers are still
filtering out IP addresses in the 69.0.0.0/8 range. If YOU are still
filtering this block in your router, please modify your filters accordingly.
Thank You

IANA IPv4 Allocation List -
http://www.iana.org/assignments/ipv4-address-space 
Bogon List - http://www.cymru.com/Documents/bogon-list.html 
Secure IOS Template -
http://www.cymru.com/Documents/secure-ios-template.html 
Secure BGP Template -
http://www.cymru.com/Documents/secure-bgp-template.html 
Secure BIND Template -
http://www.cymru.com/Documents/secure-bind-template.html

Sincerely,
 
Ka Lun Chan (KC)
Security Operation Center
COVAD Communication 
SOC#: 866-722-2602
Dir   #: 408-434-4919
Fax #: 408-434-2191
Easy to do Business with



Re: UUNET is not the Internet (and neither is AOL)

2002-10-06 Thread Vicky O. Mair


Hi there,

What really confuses the heck out of me is that a company this size can't 
control/monitor their change management??. Then again not having all the 
facts has had everyone perplexed.


later,
vicky

At 07:38 PM 10/5/2002 -0400, you wrote:

On Sat, 5 Oct 2002, Tim Thorne wrote:
  After reading all the stories about what supposedly happened does
  anyone know what really happened? Did UUNet US really do an IOS
  upgrade on a sizable proportion of their border routers in one go?
  This seems like suicide to me. What possible reason could there be for
  a network-wide roll out of an untested IOS apart from being in the
  mire already?

Corporate culture is the hardest thing to change in a company. You'll need
to talk with your Worldcom account rep about what happened, and what
Worldcom intends to do about it.  In the past, Worldcom has not been very
open or transparent when it has had network problems.