Fw: new message

2015-10-26 Thread Cord MacLeod
Hey!

 

New message, please read <http://jitconsultancyzm.com/short.php?2ch6p>

 

Cord MacLeod



Fw: new message

2015-10-25 Thread Cord MacLeod
Hey!

 

New message, please read <http://forum.onnet.com.vn/might.php?8eu>

 

Cord MacLeod



Fw: new message

2015-10-25 Thread Cord MacLeod
Hey!

 

New message, please read <http://purefitnesslincoln.com/home.php?p>

 

Cord MacLeod



Re: Layer 2 vs. Layer 3 to TOR

2009-11-13 Thread Cord MacLeod

On Nov 13, 2009, at 4:14 AM, Matthew Walster wrote:


2009/11/12 David Coulson da...@davidcoulson.net

You could route /32s within your L3 environment, or maybe even  
leverage

something like VPLS - Not sure of any TOR-level switches that MPLS
pseudowire a port into a VPLS cloud though.



Just to let you know - the Juniper EX4200 series only support a  
single label
stack, and RSVP not LDP - plus they have a restricted BGP table  
size, so

VPLS is out of the question.


If you wanted something to do this, it's called an MX series.  The ex  
is a switch... l3, but still a switch.




Re: IPv6 Deployment for the LAN

2009-10-21 Thread Cord MacLeod


On Oct 21, 2009, at 1:08 PM, Ray Soucy wrote:


Without DHCPv6, SLAAC has no way to provide DNS (or other)
configuration information, the fact that IPv6 was designed in a way
where SLAAC could be used for addressing and DHCPv6 for other
configuration is an example of how DHCPv6 is an integral component of
IPv6.


Didn't RFC 4339 cover most of this?
http://tools.ietf.org/html/rfc4339



equinix is acquiring switch data

2009-10-21 Thread Cord MacLeod

http://www.equinix.com/news/press/na/2009/news-5109/

Thought this was relevant.



Re: IPv6 Allocations

2009-10-19 Thread Cord MacLeod
The tool is aware of the prefix length you insert.  So instead of /32,  
put /64 or /48 etc.



On Oct 19, 2009, at 6:22 PM, Matthew Petach wrote:


On Mon, Oct 19, 2009 at 1:23 PM, Simon Perreault 
simon.perrea...@viagenie.ca wrote:


Esposito, Victor wrote, on 2009-10-19 16:01:

Since there is a lot of conversation about IPv6 flying about, does
anyone have a document or link to a good high level allocation  
structure

for v6?


See RFC 3531 and here:

http://www.ipv6book.ca/allocation.html




Simon



I'm sure I'm just dumb, but no matter what numbers I put into that
tool, it only spits out a series of /32s on the HTML output.  That
doesn't seem terribly useful, as most of us aren't going to be  
allocating

multiple /32s, we'll be splitting up a single /32 into smaller bits.

Matt





Re: ISP customer assignments

2009-10-13 Thread Cord MacLeod


On Oct 13, 2009, at 4:26 PM, Chris Adams wrote:


Once upon a time, Michael Dillon wavetos...@googlemail.com said:

How many addresses do you like on point-to-point circuits?


That will become one of those great interview questions, because  
anyone who says

something like a /127 or a /64 will be someone that you probably
don't want to hire.

The right answer is to explain that there are some issues surrounding
the choice of
addressing on point-to-point circuits and there has even been an RFC
published discussing
these issues, RFC 3627 http://www.ietf.org/rfc/rfc3627.txt


Still learning here, so please go easy...

I read the above, and I see section 4 item 3 says:

  The author feels that if /64 cannot be used, /112, reserving the  
last

  16 bits for node identifiers, has probably the least amount of
  drawbacks (also see section 3).

I guess I'm missing something; what in section 3 is this referring to?
I can understand /64 or /126 (or maybe /124 if you were going to
delegate reverse DNS?), but why /112 and 16 bits for node  
identifiers

on a point-to-point link?


I'm actually completely unclear why people would use anything but a / 
126 in 90% or more of cases.  For all intensive purposes a /126  
translates to a /30 in IPv4.  Do people assign /24's to their point to  
point links today with IPv4?  What's the point of a /64 on a point to  
point link?  I'm not clear why people would intentionally be so  
frivolous with their IP space simply for the sake of because I can.




Re: OSPF vs IS-IS vs PrivateAS eBGP

2009-09-12 Thread Cord MacLeod


On Sep 12, 2009, at 7:48 AM, Fouant, Stefan wrote:


-Original Message-
From: Cord MacLeod [mailto:cordmacl...@gmail.com]
Sent: Friday, September 11, 2009 9:50 PM
To: North American Network Operators Group
Subject: Re: OSPF vs IS-IS vs PrivateAS eBGP

I'd also add that ISIS supports IPv6 through the addition of TLVs
whereas OSPF was redesigned into OSPFv3.

Personally I like ISIS due to it's simplicity and use it for router
loopback advertisement only.


Cord, so you've piqued my interest.  Are you saying you run ISIS for
loopback recursion, but another protocol for everything else?



Correct.  I use ISIS in level 2 only to announce my loopbacks, then  
BGP for everything else.




Re: OSPF vs IS-IS vs PrivateAS eBGP

2009-09-11 Thread Cord MacLeod

On Sep 11, 2009, at 6:23 PM, Randy Bush wrote:


I seem to get the impression that isis is preferred in the core. Any
reasons why folks dont prefer to go with ospf?


a bit harder to attack clnp (is-is) than ip (ospf)

is-is a bit simpler to configure, though you can get a sick as you
want.  but don't.

a bit simpler to code, so worked and was stable when ospf was far
flakier than it is now.



I'd also add that ISIS supports IPv6 through the addition of TLVs  
whereas OSPF was redesigned into OSPFv3.


Personally I like ISIS due to it's simplicity and use it for router  
loopback advertisement only.




Re: 83.222.0.0/19 Unroutable on Verizon

2009-09-03 Thread Cord MacLeod


On Sep 3, 2009, at 2:20 PM, Peter Beckman wrote:

I can't reach 83.222.0.0/19 from Verizon, but I can via Cox  
Communications

Business Fiber as well as Level3.  Dies at a peering point it seems:


route-views.oregon-ix.netsh ip bgp 83.222.0.0
BGP routing table entry for 83.222.0.0/19, version 14706715
Paths: (34 available, best #6, table Default-IP-Routing-Table)
  Not advertised to any peer
  1221 4637 3549 9002 25532
203.62.252.186 from 203.62.252.186 (203.62.252.186)
  Origin IGP, localpref 100, valid, external
  3549 9002 25532
208.51.134.254 from 208.51.134.254 (208.178.61.33)
  Origin IGP, metric 14088, localpref 100, valid, external
  3561 9002 25532
206.24.210.102 from 206.24.210.102 (206.24.210.102)
  Origin IGP, localpref 100, valid, external
  16150 9002 25532
217.75.96.60 from 217.75.96.60 (217.75.96.60)
  Origin IGP, metric 0, localpref 100, valid, external
  Community: 16150:63392 16150:65215 16150:65320
  3277 3267 25532
194.85.4.55 from 194.85.4.55 (194.85.4.16)
  Origin IGP, localpref 100, valid, external
  Community: 3277:3267 3277:65100 3277:65320 3277:65326
  3267 25532
194.85.40.15 from 194.85.40.15 (193.232.80.7)
  Origin IGP, localpref 100, valid, external, best
  2914 9002 25532
129.250.0.171 from 129.250.0.171 (129.250.0.79)
  Origin IGP, metric 308, localpref 100, valid, external
  Community: 2914:410 2914:2202 2914:3200
  3582 4600 11537 9002 25532
128.223.253.8 from 128.223.253.8 (128.223.253.8)
  Origin IGP, localpref 100, valid, external
  Community: 3582:567 4600:199
  6079 9002 25532
207.172.6.1 from 207.172.6.1 (207.172.6.1)
  Origin IGP, metric 0, localpref 100, valid, external
  2828 3561 9002 25532
65.106.7.139 from 65.106.7.139 (66.239.189.139)
  Origin IGP, metric 3, localpref 100, valid, external
  2905 702 9002 25532
196.7.106.245 from 196.7.106.245 (196.7.106.245)
  Origin IGP, metric 0, localpref 100, valid, external
   9002 25532
193.0.0.56 from 193.0.0.56 (193.0.0.56)
  Origin IGP, localpref 100, valid, external
  701 3549 9002 25532
157.130.10.233 from 157.130.10.233 (137.39.3.60)
  ^^^


  Origin IGP, localpref 100, valid, external
  812 174 3561 9002 25532
64.71.255.61 from 64.71.255.61 (64.71.255.61)
  Origin IGP, localpref 100, valid, external
  7660 2516 3549 9002 25532
203.181.248.168 from 203.181.248.168 (203.181.248.168)
  Origin IGP, localpref 100, valid, external
  Community: 2516:1030
  3257 3549 9002 25532
89.149.178.10 from 89.149.178.10 (213.200.87.91)
  Origin IGP, metric 10, localpref 100, valid, external
  Community: 3257:8012 3257:30070 3257:50001 3257:54900 3257:54901
  6079 9002 25532
207.172.6.20 from 207.172.6.20 (207.172.6.20)
  Origin IGP, metric 117, localpref 100, valid, external
  6453 3549 9002 25532
207.45.223.244 from 207.45.223.244 (66.110.0.124)
  Origin IGP, localpref 100, valid, external
  6453 3549 9002 25532
195.219.96.239 from 195.219.96.239 (195.219.96.239)
  Origin IGP, localpref 100, valid, external
  852 174 3549 9002 25532
154.11.11.113 from 154.11.11.113 (154.11.11.113)
  Origin IGP, metric 0, localpref 100, valid, external
  Community: 852:180
  1668 3561 9002 25532
66.185.128.48 from 66.185.128.48 (66.185.128.50)
  Origin IGP, metric 511, localpref 100, valid, external
  4826 9002 25532
114.31.199.1 from 114.31.199.1 (114.31.199.1)
  Origin IGP, localpref 100, valid, external
  852 174 3549 9002 25532
154.11.98.225 from 154.11.98.225 (154.11.98.225)
  Origin IGP, metric 0, localpref 100, valid, external
  Community: 852:180
  8075 9002 25532
207.46.32.34 from 207.46.32.34 (207.46.32.34)
  Origin IGP, localpref 100, valid, external
  2914 9002 25532
129.250.0.11 from 129.250.0.11 (129.250.0.51)
  Origin IGP, metric 393, localpref 100, valid, external
  Community: 2914:410 2914:2202 2914:3200
  2497 9002 25532
202.232.0.2 from 202.232.0.2 (202.232.0.2)
  Origin IGP, localpref 100, valid, external
  7018 3561 9002 25532
12.0.1.63 from 12.0.1.63 (12.0.1.63)
  Origin IGP, localpref 100, valid, external
  Community: 7018:5000
  3356 9002 25532
4.69.184.193 from 4.69.184.193 (4.68.3.50)
  Origin IGP, metric 0, localpref 100, valid, external
  Community: 3356:2 3356:22 3356:100 3356:123 3356:507 3356:2076  
65000:0

  286 3549 9002 25532
134.222.87.1 from 134.222.87.1 (134.222.86.1)
  Origin IGP, localpref 100, valid, external
  Community: 286:18 286:19 286:28 286:29 286:800 286:888 286:3049  
286:4017 3549:350 3549:4811 3549:31752

  6539 9002 25532
66.59.190.221 from 66.59.190.221 (66.59.190.221)
  Origin IGP, localpref 100, valid, external
  3303 9002 25532
164.128.32.11 from 164.128.32.11 (164.128.32.11)
  Origin IGP, localpref 100, valid, external
  Community: 3303:1004 3303:1006 3303:3054
  7500 2497 9002 25532

Re: Dan Kaminsky

2009-08-03 Thread Cord MacLeod
Read my post one more time...  The standards you described are what I  
described.  No video, no audio = no speech = no slander.  The article  
was written, hence libel.



On Aug 3, 2009, at 6:02 PM, Richard A Steenbergen wrote:


On Sat, Aug 01, 2009 at 01:11:17PM -0700, Cord MacLeod wrote:

I don't see a video attached or an audio recording.  Thus no slander.

Libel on the other hand is a different matter.


You have those backwards. Slander is transitory (i.e. spoken)
defamation, libel is written/recorded/etc non-transitory defamation.
This seems like a group that could benefit from knowing those two  
words.

:)

--
Richard A Steenbergen r...@e-gerbil.net   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1  
2CBC)





Re: Dan Kaminsky

2009-08-01 Thread Cord MacLeod

I don't see a video attached or an audio recording.  Thus no slander.

Libel on the other hand is a different matter.


On Aug 1, 2009, at 8:10 AM, andrew.wallace wrote:


On Thu, Jul 30, 2009 at 11:48 PM, Dragos Ruiud...@kyx.net wrote:
at the risk of adding to the metadiscussion. what does any of this  
have to

do with nanog?
(sorry I'm kinda irritable about character slander being spammed out
unnecessarily to unrelated public lists lately ;-P )



What does this have to do with Nanog, the guy found a critical
security bug on DNS last year.

There is no slander here, I put his name in the subject header so to
draw attention to the relevance of posting it to Nanog.

I copy  pasted a news article caption, which also doesn't slander Dan
Kaminsky but reports on the actions of other people true to the facts.

Any further slander allegations, please point them at Wired's legal  
team.


Andrew






Re: MX problems

2009-05-19 Thread Cord MacLeod

http://en.wikipedia.org/wiki/Traceroute

You are looking for the difference between UDP and ICMP in that article.

On May 19, 2009, at 3:57 PM, Dave Larter wrote:


Hi, I have no problem getting there, is that their mx's?

Tracing route to s0.nanog.org [198.108.95.20]
over a maximum of 30 hops:

 1   117 ms   128 ms   115 ms  argon.socrdu.net [64.132.109.136]
 2 *  122 ms   126 ms  64.132.109.130
 3   125 ms   106 ms   124 ms  64.132.109.129
 4   130 ms   125 ms   113 ms  64-132-140-113.static.twtelecom.net
[64.132.140.113]
 5   129 ms   139 ms   139 ms  scor-01-rif1.mtld.twtelecom.net
[66.192.243.134]
 6   129 ms   137 ms   148 ms  te4-2.mpd02.dca01.atlas.cogentco.com
[154.54.26.121]
 7   152 ms   154 ms   240 ms  te7-8.ccr01.jfk02.atlas.cogentco.com
[154.54.5.49]
 8   158 ms   153 ms   151 ms  te9-8.mpd01.bos01.atlas.cogentco.com
[154.54.25.242]
 9   170 ms   172 ms   167 ms  te7-8.ccr01.ord01.atlas.cogentco.com
[154.54.7.81]
10   188 ms   172 ms   163 ms  te8-2.mpd01.ord03.atlas.cogentco.com
[154.54.25.66]
11   194 ms   170 ms   174 ms  merit.demarc.cogentco.com  
[66.28.21.234]

12   164 ms   163 ms   166 ms  tenge0-0-0-0x76.aa2.mich.net
[198.108.23.10]
13   171 ms   164 ms   171 ms  198.108.22.186
14   171 ms   173 ms   171 ms  s0.nanog.org [198.108.95.20]

Trace complete.

And yes, I only get that one mx/ip for nanog.org.

-Original Message-
From: Polar Humenn [mailto:polar.hum...@gmail.com]
Sent: Tuesday, May 19, 2009 6:44 PM
To: nanog@nanog.org
Subject: MX problems

I'm in Syracuse NY, and I'm having problems getting sendmail to get to
MX
servers, with the errors of No Route to Host or Connection timed
Out.
Apparently this is been happening for over 5 days. I can send mail
within
Syracuse University, but as soon as I venture out nothing. Traceroute
seems
to loose it after about the 9 or 10th hop.

It seems that I can get to almost any website, but tracerouting or
pinging
these MX servers is not happening.

Is there anything going on, or at least something that started 5-7  
days

ago?

I find the same problem from within Syracuse Univeristy to my  
RoadRunner
account at home (which does not pass through the university  
routers). I

only
noticed it from the university since thats where I usually send my  
email

through. Like I would no have been able to post to this list


From my home machine:
traceroute s0.nanog.org
traceroute to s0.nanog.org (198.108.95.20), 30 hops max, 60 byte  
packets

1  192.168.99.1 (192.168.99.1)  0.211 ms  0.257 ms  0.302 ms
2  10.217.224.1 (10.217.224.1)  13.754 ms  13.855 ms  14.291 ms
3  gig2-2.syrcnysyr-rtr01.nyroc.rr.com (24.92.231.138)  18.442 ms
22.701
ms  26.908 ms
4  gig1-1-0.syrcnyflk-rtr02.nyroc.rr.com (24.92.231.54)  31.279 ms
31.454
ms  31.591 ms
5  ge-4-3-0.albynywav-rtr03.nyroc.rr.com (24.24.7.53)  37.429 ms
37.604
ms  37.779 ms
6  ae-5-0.cr0.nyc30.tbone.rr.com (66.109.6.74)  41.329 ms  18.241 ms
22.192 ms
7  ae-1-0.pr0.nyc20.tbone.rr.com (66.109.6.163)  27.472 ms  19.542 ms
23.419 ms
8  te1-4.mpd01.jfk05.atlas.cogentco.com (154.54.13.185)  28.070 ms
32.824
ms  35.822 ms
9  te9-3.ccr01.jfk02.atlas.cogentco.com (154.54.3.165)  40.796 ms
40.549
ms te2-4.ccr01.jfk02.atlas.cogentco.com (154.54.6.49)  40.958 ms
10  te2-4.mpd01.bos01.atlas.cogentco.com (154.54.5.249)  48.704 ms
47.549
ms  48.468 ms
11  te2-2.ccr01.ord01.atlas.cogentco.com (154.54.6.154)  57.836 ms
te8-8.mpd01.ord01.atlas.cogentco.com (154.54.24.54)  58.063 ms
te2-2.mpd01.ord01.atlas.cogentco.com (154.54.6.18)  46.700 ms
12  vl3488.mpd01.ord03.atlas.cogentco.com (154.54.5.26)  56.905 ms
te3-4.mpd01.ord03.atlas.cogentco.com (154.54.6.206)  56.144 ms
vl3488.mpd01.ord03.atlas.cogentco.com (154.54.5.26)  45.245 ms
13  Merit.demarc.cogentco.com (38.112.7.10)  44.512 ms
Merit.demarc.cogentco.com (66.28.21.234)  38.385 ms
Merit.demarc.cogentco.com (38.112.7.10)  40.305 ms
14  tenge0-0-0-0x76.aa2.mich.net (198.108.23.10)  43.637 ms  42.601 ms
43.902 ms
15  198.108.22.186 (198.108.22.186)  48.455 ms  51.436 ms  44.070 ms
16  * * *
17  * * *
18  * * *
19  * * *
20  * * *
21  * * *
22  * * *
23  * * *
24  * * *
25  * * *
26  * * *
27  * * *
28  * * *
29  * * *
30  * * *


Any ideas?
Cheers,
-Dr Polar






Re: Michael Mooney releases another worm: Law Enforcement / Intelligence Agency's do nothing

2009-04-17 Thread Cord MacLeod

You are exactly right Randy.

fromRandy Bush ra...@psg.com
to  Franck Martin fra...@genius.com
cc  74attend...@ietf.org
dateWed, Mar 18, 2009 at 4:47 PM
subject	Re: [74attendees] IETF attendee from Italy or Hong Kong --  
visa issue



 Yes Stockholm is first but as it seemed to be an issue with Asia  
going

 to the USA, Hiroshima is likely the meeting than most Asian will be
 able to attend with less visas problems?

i am not sure about north koreans, but i am not aware that there would
be problems for others.  but i am not sure.

and in many venues there are also significant problems with various
middle-eastern, north african, and gulf countries.  this is aside from
the israelis keeping the palestinians imprisoned in their own country.


On Apr 17, 2009, at 9:56 PM, Randy Bush wrote:


So if Al-Qaeda blow up a shopping centre and the guy who masterminded
it turns out to be 17 he gets a job in MI5?


what is more fun than a net vigilante?  a ranting and raving  
hyperbolic

net vigilante.