RE: TransAtlantic Cable Break

2007-06-22 Thread W.D.McKinney
_  

From: Rod Beck [mailto:[EMAIL PROTECTED]
To: Sean Donelan [mailto:[EMAIL PROTECTED], Hank Nussbacher [mailto:[EMAIL 
PROTECTED]
Cc: nanog [mailto:[EMAIL PROTECTED]
Sent: Fri, 22 Jun 2007 10:14:20 -0800
Subject: RE: TransAtlantic Cable Break



Protected 10 gig waves NYC/London are extremely expensive. Say $60K or more per 
month.
  Not bad as DS3's between Alaska  Seattle used to cost that much.

-Dee





  So it usually makes sense for the Layer 3 guys to lease diversely routed 10 
gig waves and do the protection themselves using MPLS or load balancing or some 
other protocol about which I know little ...
  
  Roderick S. Beck
  Hibernia Atlantic
  1 Passage du Chantier, 75012 Paris
  http://www.hiberniaatlantic.com
  Wireless: 1-212-444-8829.
  Landline: 33-1-4346-3209
  [EMAIL PROTECTED]
  [EMAIL PROTECTED]
  ``Unthinking respect for authority is the greatest enemy of truth.'' Albert 
Einstein.
  
  
  
  -Original Message-
  From: [EMAIL PROTECTED] on behalf of Sean Donelan
  Sent: Fri 6/22/2007 4:56 PM
  To: Hank Nussbacher
  Cc: nanog
  Subject: Re: TransAtlantic Cable Break
  
  
  On Fri, 22 Jun 2007, Hank Nussbacher wrote:
   Tell that to the 10 gig wave customers who lost service. Very few cable
   systems provide protection at the 10 gig wave level.
  
   If you don't pay the extra amount for a protected circuit, why should your
   circuit get protection for free when others have to pay for it?  Now, if
   there are 10G customers with protected circuits who lost service, then
   hopefully they have in their contract hefty penalty clauses against the
   carrier.  If not, then they are just plain stupid.
  
  Is paying for protected circuits actually worth it.  Or are you better
  off just buying two circuits and using both during normal conditions.
  Use switching at layer 3 to the remaining circuit during abnormal
  conditions.  Most of the time, you get twice the capacity for only twice
  the price instead of a protected circuit where you only get the once
  the capacity for twice the price.
  
  Of course, there is still the problem some facility provider will groom
  both your circuits on to the same cable.  If you are buying pre-emptable
  circuits, hopefully you understand what that means.
  
  

Re: Undersea fiber cut after Taiwan earthquake - PCCW / Singtel / KT e tc connectivity disrupted

2006-12-28 Thread W.D.McKinney

I was formerly employed by WCI Cable in Forest Grove, OR. which had the landing 
station for cable to Alaska, Australia, Japan, etc. It was not Alaska Northstar 
then, but Alaska FiberStar.

-Dee

- Original Message -
From: Fred Heutte [mailto:[EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED], nanog@merit.edu
Sent: Thu, 28 Dec 2006 17:28:36 -0900
Subject: Re: Undersea fiber cut after Taiwan earthquake - PCCW / Singtel / KT e 
tc connectivity disrupted


 
 There are significant cable landing sites at Pacific City and at 
 Nedonna Beach near Rockaway, Oregon, not far from here in Portland.
 They connect variously to Japan, Hawaii (and Australia), Alaska
 and California.
 
 Quite a bit about these cable terminuses can be found at the
 Oregon Fishermen's Cable Committee web site.
 
 www.ofcc.com/cable_locations.htm
 
 The OFCC worked closely from the mid-1990s onward with at least
 three cable operators, Tyco, Alaska Northstar and Southern Cross
 (which has the main US-Australia loops).  They have a special
 agreement that basically amounts to a collaborative approach to 
 actual or potential cable snags by trawlers.  
 
 The background makes for interesting reading.  The Oregon 
 Fishermen's Undersea Cable Committee Agreement (Oregon 
 Fishermen's Agreement) is the first effort by two industries to 
 discuss, describe and delineate their shared use of a community 
 resource -- the ocean . . . The Oregon Fishermen's Agreement is 
 intended to prevent damage to the fiber optic cable by releasing 
 a Participating Fisherman from possible civil liability for ordinary 
 negligence to WCICI/ANC/NorthStar Network under defined 
 circumstances rather than by relying on fear and litigation.
 
 www.ofcc.com/about_ofcc.htm
 
 There's also an International Cable Protection Committee with what
 looks like a pretty complete listing of all active, retired and planned
 cable routes at:
 
 www.iscpc.org
 
 -- fh 
   
 -
 
 Frank Coluccio wrote:
  
  Kidding aside, these errors are actually intentional, and the publisher 
  makes
  no bones about it at the bottom of the page. See disclaimer under the South
  Atlantic Ocean:
  
  Cable Routes do not represent all subsea cable networks and do not reflect
  actual location of cables
 
 The relevant charts and or current navigation software have the cables
 well marked because mariners have an obligation under several
 international treaties (going back to 1884) not to hit them... If you
 have the tools to go on a fishing trip you have the tools to find the
 cable.  If you obfuscate the location of cables I can plead ignorance
 when I drag it up with my achor.
 
 http://mapserver.maptech.com/mapserver/nautical_symbols/L4.html
 
 Like with back-hoeing through fiber, if you think hitting a submarine
 cable is bad there's plenty other stuff out there that has potentially
 disastrous consequences, gas lines, oil lines, well heads, high voltage
 power lines, and of course lots of other things that fall into the
 category of navigational hazards.
 
 joelja
 -- 
 
 Joel Jaeggli Unix Consulting  [EMAIL PROTECTED]
 GPG Key Fingerprint:   5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2
 
 
 


RE: workhorse of the future...

2006-01-10 Thread W.D.McKinney

We are working Juniper to build the next gen version, hopefully they listen.

-Dee

 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
 [EMAIL PROTECTED]
 Sent: Tuesday, January 10, 2006 1:40 PM
 To: [EMAIL PROTECTED]
 Subject: workhorse of the future...
 
 
 
 first it was the vitalinks, then the bridge gear, then proteon, then cisco
 AGS,
 then 7600VXR, then 7301s
 
 looking to find the next-gen workhorse ... looking for 4-6yr life
 expectancy.
 pointers(private are ok) are appreciated - as well as -why- you think the
 suggested boxen are likely candidates.
 
 --bill




Re: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-02 Thread W.D.McKinney

-Original Message-
From: Daniel Senie [mailto:[EMAIL PROTECTED]
Sent: Friday, December 2, 2005 11:27 AM
To: [EMAIL PROTECTED]
Subject: Clueless anti-virus products/vendors (was Re: Sober)


At 03:12 PM 12/2/2005, Michael Loftis wrote:



--On December 2, 2005 2:02:15 PM -0600 Dennis Dayman 
[EMAIL PROTECTED] wrote:


Interested, but I see many Sober postings and outages on other lists and
not here...has anyone been having issues? I know the ISP's are fighting
the living out of the virus.

I've been seeing a few really large bursts into our mailserver.  Not 
sure if it's a new variant or a reoccurrence of an old strain.  I 
put in a good number of new port 25 inbound blocks for infected 
systems and attempted to put up a few checks inside of our front end 
mail servers rather than in the virus and spam filtering (which 
happens later for us, so for bad surges we put a few custom rules up 
front early in postfix).

Only stuff we're seeing is a lot of blowback from dumb mail systems 
that accept email, THEN scan for viruses, and ultimately decide to 
send a note back to the From: address in the body of the infected 
email. Since the From: is invariably forged, the uninvolved owner of 
those forged email addresses gets hammered.

Can people building virus scanning devices PLEASE GET A %^*^ CLUE? 
This means you, Barricuda Networks, more than anyone else, but we 
also see this annoyance from Symantec devices, and from some AOL 
systems as well.


It's a simple switch in the GUI of Barracuda Networks to turn of this 
annoyance. More operator error than Barracuda's fault, IMHO.

-Dee




Blasting a note back does two things:

1. It allows the worm or virus author an opportunity to implement an 
amplified attack on a third party using your filtering systems.

2. The bounce messages mostly include an advertisement for the 
filtering box's vendor. Get a clue... this is a REALLY negative 
advertisement for your spam  virus filtering technology. If you 
can't manage to realize the virus laden email should perhaps be 
dropped, then it makes your box look poorly designed.

Oh, and please delete the infected file rather than sending that along too.

OK, off my soapbox.

Dan







RE: Clueless anti-virus products/vendors (was Re: Sober)

2005-12-02 Thread W.D.McKinney



 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
 Richard Cox
 Sent: Friday, December 02, 2005 4:23 PM
 To: [EMAIL PROTECTED]
 Subject: Re: Clueless anti-virus products/vendors (was Re: Sober)
 
 
 On Sat, 03 Dec 2005 00:45:05 +
 W.D.McKinney [EMAIL PROTECTED] wrote:
  It's a simple switch in the GUI of Barracuda Networks to turn of
  this annoyance. More operator error than Barracuda's fault, IMHO.
 
 Not if a software upgrade from Barracuda can cause the current
 configuration to be silently reverted to Barracuda's defaults ...

That never happened on any of our cluster.

-Dee


 
 --
 Richard




OT: Anyone here know what's up with inet-access.net

2005-10-10 Thread W.D.McKinney


-Original Message-
From: Mail Delivery Subsystem [mailto:127.0.0.1] 
Sent: None
To: [EMAIL PROTECTED]
Subject: Delivery Status Notification

The original message was received at Mon, 10 Oct 2005 18:24:25 -0800.

   - The following addresses had permanent fatal errors -
[EMAIL PROTECTED] (reason: while talking to mqueue.netaxs.com; 554
[EMAIL PROTECTED]: Relay access denied)

Reporting-MTA: dns; burger.akwireless.net
Arrival-Date: Mon, 10 Oct 2005 18:24:25 -0800

Final-Recipient: rfc822; list@inet-access.net
Action: failed
Status: 5.0.0
Diagnostic-Code: smtp; while talking to mqueue.netaxs.com; 554 list@inet-access.net: Relay access denied
Last-Attempt-Date: Mon, 10 Oct 2005 18:24:25 -0800

---BeginMessage---
Just wondering if the list is still working?
-Dee

---End Message---


WISPA Wireless Crisis Center

2005-09-07 Thread W.D.McKinney

Katria network help about the Wireless side is at http://www.wispa.org/
and more pointedly at http://katrina.cnt.org/wordpress/

Hope this helps,

-Dee







Re: Update on Wireless Katrina Response

2005-09-05 Thread W.D.McKinney


-Original Message-
From: Fergie (Paul Ferguson) [mailto:[EMAIL PROTECTED]
Sent: Monday, September 5, 2005 08:35 AM
To: nanog@merit.edu
Subject: Update on Wireless Katrina Response


On Friday, the FCC held a conference call with wireless
internet service providers and representatives of tech
companies including Intel, Cisco, and Vonage -- the goal
was to urgently coordinate private and public sector resources
to get communication systems up again in areas devastated by
Katrina.

http://www.boingboing.net/2005/09/05/update_on_wireless_k.html

- ferg




The list at part-15.org has information on the Wisps setting up Wireless 
service ASAP. Also some VoIP services. 

-Cheers

Dee





Re: 192.169.0.0

2005-06-04 Thread W.D.McKinney


Christopher L. Morrow wrote:


On Fri, 3 Jun 2005, Randy Bush wrote:

 


more grist for your mill:

TWT has a route-server (from traceroute.org's listings) note the age of
this route:
B192.169.0.0/16 [200/0] via 168.215.52.102, 7w0d
 


i don't get it.  this is supposed to be a good thing.

am i supposed to just announce the 200+ /8s that cover the
net, figuring anyone who has space will announce their
longer prefix?

tricky stuff sits and waits to backfire on one.  so the
older and lazier of us tend to play as close to the
straight and narrow as we can to get the job done.
   



So, I'm not condoning this at all, just offering a possible explanation...
As was explained at one time on this list I think? Some folks will, in
favor of holding a complete 150k+ routes, hold large enough covering
routes internally and not most of the the smaller routes to save memory.
Something like 'almost default'... it confused me and it caused me some
pain so it seems like a bad thing. This seems to re-enforce that idea. (to
me atleast).

Perhaps someone will fix it? Where is the route leaking from TWTC in the
first place? A customer or ? Apparently only 14608 sees it at route-views?
Is alaska fiberstar listening tonight? a random sample of routerservers
off traceroute.org shows no one else with this route...


 



As you can see from the website http://www.alaskafiberstar.com they 
don't have any IP operations info available.
My guess is that they out-sourced IP operations as they filed bankruptcy 
in 2001. figures


Dee




Re: Battery Maint in LEC equipment

2005-06-04 Thread W.D.McKinney


-Original Message-
From: Sean Donelan [mailto:[EMAIL PROTECTED]
Sent: Sunday, June 5, 2005 04:02 AM
To: 'David Lesher'
Cc: 'nanog list'
Subject: Re: Battery Maint in LEC equipment


On Sat, 4 Jun 2005, David Lesher wrote:
 Have any NANOG'ers [NANOGites? NANOGees?] run into this? Again, this
 is LEC owned, LEC maintained, equipmentDo you provide generator
 power for such in your space?

Generally, the ILECs were the only ones that did this.  I've had multiple
CLECs (Brooks, MFS, WilTel, etc) install fibermux cabinets, none of them
provided any backup batteries by default.  They used local building power,
and we had to make sure they were connected to our backup generator.

If you wanted to pay for it, some of the CLECs would add batteries.  But
it wasn't part of the base package.


All the ATT pops usually have nice battery and gen sets. That's what I like.

Dee





Re: djbdns: An alternative to BIND

2005-04-08 Thread W.D.McKinney


-Original Message-
From: Vicky Rode [mailto:[EMAIL PROTECTED]
Sent: Friday, April 8, 2005 10:55 PM
To: nanog@merit.edu
Subject: djbdns: An alternative to BIND


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

http://software.newsforge.com/article.pl?sid=05/04/06/197203from=rss

Just wondering how many have transitioned to djbdns from bind and if so
any feedback.


We did that 2 years ago and it has been a nice move. Zones are much easier to 
transfer/build and it's a very solid DNS version.

Cheers,
Dee





Re: www.nanog.org returning 403 Forbidden error?

2005-03-07 Thread W.D.McKinney


-Original Message-
From: Brent Chapman [mailto:[EMAIL PROTECTED]
Sent: Monday, March 7, 2005 11:58 PM
To: nanog@merit.edu
Subject: www.nanog.org returning 403 Forbidden error?


I just tried accessing http://www.nanog.org/, and am getting back a 
403 Forbidden error:

   Forbidden
   You don't have permission to access / on this server.

Did somebody break the web server?


Works here fine for me. Nice to see Seattle on it also!

Dee





Re: Has postini been taken over?

2004-08-20 Thread W.D.McKinney

On Thu, 2004-08-19 at 21:27, Hank Nussbacher wrote:
 At 10:17 PM 19-08-04 -0700, Ray Wong wrote:
 
 
   I am just trying to understand how postini is bypassing my anti-spam ACLs.
 
 Again, you haven't answered his question Did your ISP or some other
 email provider possibly sign up for Postini?  How many different domain
 addresses forward into your account?  If you accept mail from any other
 server for any other domain, that domain could be a postini customer.
 
 You are missing my point.  I am the ISP.  I have a *downstream* customer 
 who may or may not have signed up to Postini.  This *downstream* customer 
 is bypassing my anti-spam ACLs by somehow using Postini.  I am trying to 
 figure out how Postini works.
 
 -Hank
 

Did you just get the reply from CKM Hank ?

Dee




Re: PPPoE questions

2004-07-29 Thread W.D.McKinney


-Original Message-
From: Curtis Maurand [mailto:[EMAIL PROTECTED]
Sent: Thursday, July 29, 2004 10:25 PM
To: 'J Sparacio'
Cc: [EMAIL PROTECTED]
Subject: Re: PPPoE questions



Been there, done that.

--
Curtis Maurand
mailto:[EMAIL PROTECTED]
http://www.maurand.com


On Thu, 29 Jul 2004, J Sparacio wrote:

 There's a thing called Google.com.  If you put a string in the search
 field, and hit search...it will return lots of websites that will
 probably have all the information you could want about PPPoE.  Here I'll
 even make it easy for you to get to google.  Just click here, you won't
 even have to put in a search string, I did that for you.  Good luck!

 On Thu, 2004-07-29 at 16:37, Curtis Maurand wrote:

 Anyone know where I can go to ask a couple questions regarding PPPoE.  I
 need to talk to someone more knowlegeable about it than I.

 Curtis

 --
 Curtis Maurand
 mailto:[EMAIL PROTECTED]
 http://www.maurand.com







Re: Overflow circuit

2004-03-27 Thread W.D.McKinney


-Original Message-
From: Mailing List Subscriptions [mailto:[EMAIL PROTECTED]
Sent: Saturday, March 27, 2004 08:13 AM
To: [EMAIL PROTECTED]
Subject: RE: Overflow circuit


I have been doing VoIP over sat to northern Canada and Latin America for
more than five years now, using Cisco routers with analog and digital voice
ports, and also IP phones. Other than the inevitable lag due to 500+ ms RTT,
the voice quality with the G.729 codec has been good. I have lost count of
the number of mining operations in northern Canada that rely in VoIP over
sat for communication with the civilized world. Some of the bigger
operations have in excess of 500+ Cisco IP phones.


Alaska has a lot connections doing VoIP over Sat also. Most of the state is served by 
Sat connections, being the largest state in the U.S.

Dee


 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On 
 Behalf Of Alexei Roudnev
 Sent: Friday, March 26, 2004 11:39 PM
 To: Patrick Murphy; Mailing List Subscriptions; [EMAIL PROTECTED]
 Subject: Re: Overflow circuit
 
 
 VoIP over satellite? I am very sceptical about it. Better, 
 forget such idea.
 
 
 
 
  You may want to look at using H.323 gatekeepers with CAC (Call 
  Admission Control).
 
  Here is a link to a Whitepaper on this Subject.
 
 
 http://www.cisco.com/en/US/partner/tech/tk652/tk701/technologi
 es_white_paper09186a00800da467.shtml
 
  Patrick
 
  - Original Message -
  From: Mailing List Subscriptions [EMAIL PROTECTED]
  To: [EMAIL PROTECTED]
  Sent: Friday, March 26, 2004 7:54 PM
  Subject: Overflow circuit
 
 
  
  
   I am looking for advice on technique or products that can 
 solve the 
   following challenge ...
  
   Two private line T1's between A and B - one terrestial T1 
 with 200 
   ms
  RTT,
   the other T1 is over satellite with ~500 ms RTT. The circuits are 
   being
  used
   for mixed VoIP (70%) and data (30%) applications. To 
 achieve optimal
 voice
   quality, we want to route all VoIP calls over the terrestial T1 
   until it
  is
   full, then divert all subsequent VoIP calls over the 
 satellite T1 
   (** while existing VoIP calls continue to be routed over 
 the terrestial T1).
  
   So it looks like I need per-flow (based on protocol, src 
 IP, dst IP, 
   src port, dst port) routing. It looks like MPLS Traffic 
 Engineering 
   can do
 the
   job. Is there anything else that can it with less complexity?
  
   Ideas or recommendations?
  
  
   Regards,
   Joe
  
  
 
 
 
 








Re: Juniper pepsi

2004-03-04 Thread W.D.McKinney

On Wed, 2004-03-03 at 14:52, Eric Kuhnke wrote:
 I have heard rumors of a new low-end 1U Juniper router, aimed directly 
 at replacing the 2600/3600 series.  Supposedly its code name is 
 Pepsi...   Does anyone have more info on this?  :-)
 
 
 
 

No, but hope so.

Dee
-- 
W.D.McKinney [EMAIL PROTECTED]



Re: dealing with w32/bagle

2004-03-03 Thread W.D.McKinney


-Original Message-
From: Dan Hollis [mailto:[EMAIL PROTECTED]
Sent: Wednesday, March 3, 2004 08:24 PM
To: '[EMAIL PROTECTED]'
Subject: dealing with w32/bagle


I am curious how network operators are dealing with the latest w32/bagle 
variants which seem particularly evil.

Also, does anyone have tools for regexp and purging these mails from unix 
mailbox (not maildir) mailspool files? Eg purging these mails after the 
fact if they were delivered to user's mailboxes before your virus scanner 
got a database update.

-Dan



Simply put, I run a Barracuda Networks box so I don't worry.
Dee









Re: How relable does the Internet need to be? (Was: Re: Converged Network Threat)

2004-02-25 Thread W.D.McKinney


-Original Message-
From: Steve Gibbard [mailto:[EMAIL PROTECTED]
Sent: Thursday, February 26, 2004 12:30 AM
To: [EMAIL PROTECTED]
Subject: How relable does the Internet need to be? (Was: Re: Converged Network Threat)

snipped

So, it appears that among general infrastructure we depend on, there are
probably the following reliability thresholds:

Employees not being able to get to work due to snow: two to three days per
year.
Berkeley storm sewers: overflow two to three days per year.
Residential Electricity: out two to three hours per year.
Cell phone service: Somewhat better than nine fives of reliability ;)
Landline phone service:  I haven't noticed an outage on my home lines in a
few years.
Natural gas: I've never noticed an outage.

How Internet service fits into that of course depends on how you're
accessing the Net.  The T-Mobile GPRS card I got recently seems
significantly less reliable than my cell phone.  My SBC DSL line is almost
to the reliability level of my landline phone or natural gas service,
except that the DSL router in my basement doesn't work when electric power
is out.  I'm probably poorly qualified to talk about the end-user
experience on the networks I actually work on, even if I had permission
to.  Like pretty much everybody else here, I'm always interested in doing
better on reliability.  And, like many of my neighbors, I'd like to be
able to store stuff on my basement floor.  In comparison to a lot of other
infrastructure we depend on, it seems to me the Internet is already doing
pretty well.

-Steve



With BPL on the horizon and the Electric Utils looking to de-regulate in some areas, 
it will be interesting to watch infrastructure adapt accordingly.
I think the Internet is doing pretty well save some IOS code problems from time to 
time, and the typical root server hicups.

Dee
 








Re: How relable does the Internet need to be? (Was: Re: Converged Network Threat)

2004-02-25 Thread W.D.McKinney

Thanks for pointing that out. That was the wrong way to describe my standpoint. 
Frequent changes in DNS across the board, including edge servers 
make connections seem non-working, when in reality it is a mis-configured DNS zone. So 
whether 

Dee


-Original Message-
From: Joe Abley [mailto:[EMAIL PROTECTED]
Sent: Thursday, February 26, 2004 12:57 AM
To: 'W.D.McKinney'
Cc: [EMAIL PROTECTED]
Subject: Re: How reliable does the Internet need to be? (Was: Re: Converged  Network 
Threat)



On 26 Feb 2004, at 08:46, W.D.McKinney wrote:

 I think the Internet is doing pretty well save some IOS code problems 
 from time to time, and the typical root server hicups.

I'm interested to know what you mean by typical root server hicups. 
I'm trying to think of an incident which left the Internet generally 
unable to receive answers to queries on the root zone, but I can't 
think of one.

By typical, do you mean non-existent?


Joe







Re: Anti-spam System Idea

2004-02-14 Thread W.D.McKinney

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
Sent: Sunday, February 15, 2004 01:21 AM
To: 'Tim Thorpe'
Cc: [EMAIL PROTECTED]
Subject: RE: Anti-spam System Idea


On Sat, 14 Feb 2004, Tim Thorpe wrote:

 If these exist then why are we still having problems? 

Because the spammers are creating proxies faster than any of the anti-spam
people can find them.  Evidence suggests, at least on the order of 10,000
new spam proxies are created and used every day by spackers 
(spammer/hackers).

The relative insecurity of windows and ignorance of the average internet 
user has created an incredibly target rich environment for the spackers.
 
 Why do we let customers who have been infected flood the networks with
 traffic as they do? Should they not also be responsible for the security
 of their computers? Do we not do enough to educate?

Economics, and convenience outweighing security.  We're big, and slow to 
change.  They're small and mobile.



The Barracuda Networks Firewall helped us and especially recently. Realize it's an 
edge solution, but seems about all we can do right. Some of the 
users still are using other accounts are getting spacked.

Dee
Alaska Wireless Systems








Re: www.sco.com no longer has an DNS A record

2004-02-01 Thread W.D.McKinney

On Sat, 2004-01-31 at 22:55, Sean Donelan wrote:
 On Sun, 1 Feb 2004, Adam 'Starblazer' Romberg wrote:
 
   SCO appears to have deleted the A record for www.sco.com from their DNS
   about 1 hour ago.  I don't know how often MyDoom does the DNS lookup, so
   it may not stop things.
 
  As of 1:33AM CST, www.sco.com is still resolving... however their A record
  has a TTL of 60 seconds.  I even queried ns.calderasystems.com directly
  and it still answers for www.sco.com and sco.com
 
 Looks like SCO has added the records back.  I queried
 ns.calderasystems.com directly. Here is what it looked like earlier:
 
 $ORIGIN sco.com.
 ;www5931IN  SOA ns.calderasystems.com.
 hostmaster.caldera.com. (
 ;   2004013103 3600 900 604800 21600 );sco.com.;NXDOMAIN
 ;-$
 ;Cr=auth [216.250.130.1]
 
 


Odd it does not resolve for me. http://www.sco.com

Dee



-- 
W.D.McKinney (Dee)
Alaska Wireless Systems
http://www.akwireless.net
(907)349-4308 Office
(907)349-2226 Fax




Re: nlayer.net Abuse and Security contact

2003-12-18 Thread W.D.McKinney

On Thu, 2003-12-18 at 08:09, John Obi wrote:
 Folks,
 
 I have sent many emails to [EMAIL PROTECTED] and
 [EMAIL PROTECTED] reporting a security abuse by one
 of their users but nothing done up to now.
 
 If there is real person from nlayer.net please contact
 me offline.
 
 Thanks,
 

One suggestion is to use an e-mail account other than a yahoo.
That might be an issue with abuse/security folks.

Dee



 -J
 
 __
 Do you Yahoo!?
 New Yahoo! Photos - easier uploading and sharing.
 http://photos.yahoo.com/
 
 __
 From: John Obi [EMAIL PROTECTED]
 To: [EMAIL PROTECTED], [EMAIL PROTECTED]
 Cc: [EMAIL PROTECTED]
 Subject: Abuse and spamming trojans via www.darkhell.org
 Date: Mon, 15 Dec 2003 22:57:36 -0800
 
 Dear Sir/Madam,
 
 We have known script kiddie who spreads
 Download.Trojan and BAT.Trojan.
 
 The script kiddi runs port scan and infect the users
 who use WinNT, 2000 and XP via port 445 if the windows
 isn't updated.
 
 He is issuing commands to the infected PC to download
 this setup file which has these trojans.
 
 http://www.darkhell.org/sh1.exe
 
 This host is hosting the trojan files which is in
 sh1.exe
 
 When you download this file and you have Norton
 Antivirus or Mcafee with latest virus ID, your AV will
 detect it directly as below:
 
 can type:  Realtime Protection Scan
 Event:  Virus Found!
 Virus name: Download.Trojan
 File:  C:\WINNT\system32\Haver\Backsa.exe
 Location:  Quarantine
 Computer:  RASHID-ALKUBAIS
 User:  Administrator
 Action taken:  Clean failed : Quarantine succeeded :
 Access denied
 Date found: Tue Dec 16 09:23:12 2003
 
 Scan type:  Realtime Protection Scan
 Event:  Virus Found!
 Virus name: BAT.Trojan
 File:  C:\WINNT\system32\Haver\ceve.bat
 Location:  Quarantine
 Computer:  RASHID-ALKUBAIS
 User:  Administrator
 Action taken:  Clean failed : Quarantine succeeded :
 Access denied
 Date found: Tue Dec 16 09:23:12 2003
 
 
 When I got connected to his IRC server I saw this:
 
 * Dns resolved sh1.cellfiles.org to 81.134.89.149
 
 [07:01] * Connecting to 81.134.89.149 (6667)
 -
 [07:01] -irc.DarkHell.Org- *** Looking up your
 hostname...
 
 -
 There are 437 users and 0 invisible on 1 servers
 2 channels formed
 I have 437 clients and 0 servers
 -
 
 
 
 [07:01] * Now talking in #sh1-
 [07:01] [H0-3250] !pfast stop
 [07:01] [H0-3250] !syn 66.90.92.202 6667 500
 [07:01] [H0-3250] !pfast 44 66.90.92.202 6667
 [07:02] [H0-3250] !syn 202.91.32.181 6667 500
 [07:02] [H0-3250] !pfast stop
 [07:02] [H0-3250] !pfast 44 202.91.32.181 6667
 [07:02] [H0-3250] !syn 69.65.31.3 6667 500
 [07:02] [H0-3250] !pfast stop
 [07:02] [H0-3250] !pfast 44 69.65.31.3 6667
 [07:02] [H0-3250] !ipscan
 [07:02] [H0-3250] !syn 66.151.29.193 6667 500
 
 
 
 -
 [H0-3250] is
 [EMAIL PROTECTED] * h3h3
 [H0-3250] on +#sh1- 
 [H0-3250] using irc.DarkHell.Org DarkHell server
 [H0-3250] has been idle 18secs, signed on Mon Dec 15
 14:53:28
 [H0-3250] End of /WHOIS list.
 -
 
 ==
 
 And he issuing these DDoS attacks against the IRC
 servers around the globe and the http servers.
 
 The traceroute to www.darkhell.org  shows that it's
 hosted in your network.
 
 Show Level 3 (Baltimore, MD) Traceroute to
 www.darkhell.org (69.22.169.27) 
 
   1 so-11-0.hsa2.Baltimore1.Level3.net (4.68.112.70) 0
 msec
 so-6-1-0.mp1.Baltimore1.Level3.net (4.68.112.65) 0
 msec
 so-11-0.hsa2.Baltimore1.Level3.net (4.68.112.70) 0
 msec
   2 so-0-1-0.bbr2.Washington1.Level3.net
 (64.159.0.230) 0 msec
 so-6-1-0.mp2.Baltimore1.Level3.net (4.68.112.73) 0
 msec
 so-0-1-0.bbr2.Washington1.Level3.net
 (64.159.0.230) 0 msec
   3 so-6-1-0.bbr1.Washington1.Level3.net
 (64.159.0.106) 4 msec
 so-7-0-0.edge1.Washington1.Level3.net
 (209.244.11.14) 0 msec
 so-6-1-0.bbr1.Washington1.Level3.net
 (64.159.0.106) 4 msec
   4 209.0.227.118 4 msec
 so-6-0-0.edge1.Washington1.Level3.net
 (209.244.11.10) 0 msec
 209.0.227.118 4 msec
   5 209.0.227.118 4 msec
 pos3-1-2488M.cr2.WDC2.gblx.net (67.17.67.58)
 [AS3549 {GBLX}] 4 msec
 209.0.227.118 0 msec
   6 so4-0-0-2488M.cr1.PAO2.gblx.net (67.17.92.241)
 [AS3549 {GBLX}] 76 msec
 pos3-1-2488M.cr1.WDC2.gblx.net (67.17.67.54)
 [AS3549 {GBLX}] 4 msec
 so4-0-0-2488M.cr1.PAO2.gblx.net (67.17.92.241)
 [AS3549 {GBLX}] 76 msec
   7 so4-0-0-2488M.cr1.PAO2.gblx.net (67.17.92.241)
 [AS3549 {GBLX}] 76 msec
 so2-0-0-2488M.ar3.PAO2.gblx.net (67.17.67.238)
 [AS3549 {GBLX}] 80 msec
 so4-0-0-2488M.cr1.PAO2.gblx.net (67.17.92.241)
 [AS3549 {GBLX}] 76 msec
   8 gblx.ge-1-0-0.cr1.pao1.nlayer.net (69.22.143.193)
 [AS4474 {GVIL1}] 80 msec
 so2-0-0-2488M.ar3.PAO2.gblx.net (67.17.67.238)
 [AS3549 {GBLX}] 80 msec
 gblx.ge-1-0-0.cr1.pao1.nlayer.net (69.22.143.193)
 [AS4474 {GVIL1}] 76 msec
   9 gblx.ge-1-0-0.cr1.pao1.nlayer.net (69.22.143.193)
 [AS4474 

OT. - The end of inet-access

2003-01-13 Thread W.D.McKinney

Just wondering if anyone here has some info ?
Any idea if the final nail is in inet-access ? 

Thanks

W.D.McKinney (Dee)




RE: OT. - The end of inet-access

2003-01-13 Thread W.D.McKinney

Thanks for taking the time to help me today. I am subscribed again
and I apologize for sending the wrong signal to NANOG today.
Operator error *again*.

Dee



RE: Network integrity and non-random removal of nodes

2002-12-05 Thread W.D.McKinney

Thanks for posting Sean. Any other papers along the same vein ?
Dee

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
Sean Donelan
Sent: Wednesday, November 20, 2002 7:17 PM
To: [EMAIL PROTECTED]
Subject: Network integrity and non-random removal of nodes



On 20 Nov 2002, William Waites wrote:
 If you randomly  select nodes to remove, by the  time you have removed
 25% of them, the network breaks up into many isolated islands.

One of the key points was the nodes were removed in ranked order, not
in random order.  Removing the nodes in ranked order result in a linear
decrease in connectivity, i.e. remove the top 1% of the core nodes removes
1% of the connections.  But then the scary academic language appears the
curves appear to be highly asymmetric around a critical point. That is
an understatement like Houston, we have a problem.

http://www.caida.org/outreach/papers/2001/OSD/

Its a very interesting paper, and I recommend anyone responsible for
network integrity or reliability read it.





NIST Wireless ...

2002-07-27 Thread W.D.McKinney


NASA has had this out for over a year.
http://www.nas.nasa.gov/Groups/Networks/Projects/Wireless/index.html

/Dee

-- 
W.D.McKinney (Dee)
http://3519098920




RE: route statistics

2002-05-20 Thread W.D.McKinney


You could rebuild the source rpm to any flavour also.

/Dee

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
Bradley Dunn
Sent: Monday, May 20, 2002 9:47 AM
To: Ralph Doncaster
Cc: [EMAIL PROTECTED]
Subject: Re: route statistics



 I've been told getting the MRT sources to build is rather difficult.  I
 may give it a shot anyway...

Yeah I haven't been able to build directly from the MRT source recently. On
FreeBSD building from the ports tree works fine. On Linux SuSE has an RPM at
ftp://ftp.suse.com/pub/suse/i386/7.3/suse/n3/mrt.rpm that works on Linux
flavors.

Bradley