Re: Ghosts in our 6 New Ubiquity Pros - provision issues.
The IP can change on the UniFi without having to re-adopt or re-provision. APs are identified by MAC address at the UniFi protocol level (not layer 2). On 06/19/2015 09:09 AM, Naslund, Steve wrote: Here is another though. If your APs are re-provisioning every eight hours, what is your DHCP lease time? Are you sure the APs are able to renew their leases (if not, could your scope be full)? Do you see the IP addresses on the APs changing when they come back up? These could indicate a DHCP server issue. If the AP gets a new IP address it will likely have to be re-adopted to the controller. You might want to static address one or more APs to test this theory. Steven Naslund Chicago IL
Re: Ghosts in our 6 New Ubiquity Pros - provision issues.
Only have 1 Pro on my network and it hasn't given me any issues, several of the original AP and AP-LR as well without issues. What is the uptime on the AP? You should be able to ssh into the APs using the controller username and password. It is a linux base so 'uptime' will tell you. You can also check for ethernet errors using 'ip -s link' on the AP side. On 06/19/2015 11:45 AM, Bob Evans wrote: We have all APs set with static addresses. EdgeMax only hands out IPs to clients using the APs. This happens when people are using the APs and when no one is even in the building at 2am when there are no clients connected. It can happen to one then 5 hours later it happens again...then doesn't happen again for 12 hours. Totally random no interval. It is nice to know that others have no issues with these UniFi AP Pros. They seem to be fine except for the 2 mins or so they randomly drop link and reboot themselves. All are on APC UPSes and other devices in the same switch , like voip phones, never drop the ports. They are all new, delivered in various batches over time. We checked and all are the latest versions. Bob Evans The IP can change on the UniFi without having to re-adopt or re-provision. APs are identified by MAC address at the UniFi protocol level (not layer 2). On 06/19/2015 09:09 AM, Naslund, Steve wrote: Here is another though. If your APs are re-provisioning every eight hours, what is your DHCP lease time? Are you sure the APs are able to renew their leases (if not, could your scope be full)? Do you see the IP addresses on the APs changing when they come back up? These could indicate a DHCP server issue. If the AP gets a new IP address it will likely have to be re-adopted to the controller. You might want to static address one or more APs to test this theory. Steven Naslund Chicago IL
Re: FCC form 477 geocoding
Address to lat/lng using google api http://maps.googleapis.com/maps/api/geocode/json?address=$addresssensor=true Lat/Lng to Census Block via FCC http://data.fcc.gov/api/block/2010/find?latitude=$latitudelongitude=$longitudeshowall=trueformat=JSON On 03/03/2015 05:06 PM, Jay Hennigan wrote: On 3/3/15 14:59, Josh Luthman wrote: Well you'll need to translate those into addresses. That should be easy with Google or Bing. We have the addresses, need census tract and block. -- Jay Hennigan - CCIE #7880 - Network Engineering - j...@impulse.net Impulse Internet Service - http://www.impulse.net/ Your local telephone and internet company - 805 884-6323 - WB6RDV
Re: [tor-talk] William was raided for running a Tor exit node. Please help if you can.
On 11/30/2012 03:30 PM, Naslund, Steve wrote: WAIT A SECOND HERE!?!? I just read below that this guy runs a large ISP in Austria. I thought his Tor node was hosted with an external provider. If he runs the ISP, why would he not host his own server in house? I suppose there are reasons but I can't think of one, especially if you feel so strongly about this being your right. He talks about moving it to another ISP in the article interviewing him. How about moving it to the large ISP you run? If he runs a large ISP he must not be very good at it if he needs our donations to help him defend himself from a crime he has not been charged with yet. Most of the guys I know that run large ISPs have legal guys available to them. They could also come up with 1EUR if necessary. What is he going to do with this money if no charges are filed and they give his gear back? If he believes that he is innocent of any crime then he should be confident they won't find anything to charge him with, right? If convicted i could face up to 6 years in jail, of course i do not want that and i also want to try to set a legal base for running Tor exit nodes in Austria or even the EU. Six years in jail for what? They didn't arrest you yet. How do you know what the charges are? The cops must not be too worried about the Tor node if they did not seize it. They seem a lot more interested in his personal storage devices. He seems to have a lot of data at home, not illegal (possibly) but I am wondering what it all might be. The cops have a lot of looking around ahead of them. Seems awful worried for a guy who claims to be innocent. I am wondering why he seems so sure he will be charged that he is building a legal defense fund before being arrested. Sadly we have nothing like the EFF here that could help me in this case by legal assistance, so i'm on my own and require a good lawyer. Thus i'm accepting donations for my legal expenses which i expect to be around 5000-1 EUR. So you know how much it costs to defend a case with unknown charges and without knowing if you will be arrested yet?!?!?! This whole thing sounds flakier with every new detail. Steven Naslund -Original Message- From: Eugen Leitl [mailto:eu...@leitl.org] Sent: Friday, November 30, 2012 1:25 AM To: NANOG list Subject: Re: [tor-talk] William was raided for running a Tor exit node. Please help if you can. - Forwarded message from Asad Haider a...@asadhaider.co.uk - From: Asad Haider a...@asadhaider.co.uk Date: Thu, 29 Nov 2012 19:37:24 + To: tor-t...@lists.torproject.org Subject: Re: [tor-talk] William was raided for running a Tor exit node. Please help if you can. Reply-To: tor-t...@lists.torproject.org William will be posting a statement soon which will explain everything that's happened and give a detailed account of events, along with evidence including pictures showing the aftermath of the raid in his apartment, as well as copies of the warrant and inventory of seized items. He runs a large ISP in Austria and is a well respected member of the community, a lot of us have already sent in donations. His blog is https://rdns.im/ and I'm guessing the statement will be posted on there, I'll send everyone a link once it's finished being written. On 29 November 2012 19:22, Eugen Leitl eu...@leitl.org wrote: - Forwarded message from Emily Ozols win...@team-metro.net - From: Emily Ozols win...@team-metro.net Date: Fri, 30 Nov 2012 01:14:08 +1100 To: nanog@nanog.org Subject: Re: William was raided for running a Tor exit node. Please help if you can. Hi, I gotta ask and I'm sure someone would if I didn't, but how do we know this guy is legit? He's jumped up on a forum saying, Hey, police raided me, help. gib mone plz and failed to provide and reason as to how he's real and not just making it up. Maybe if there's a way to know this guy is legit, I'll help out if possible, but until then I'm just going to watch others with caution and I suggest others do as well. On Fri, Nov 30, 2012 at 12:04 AM, Chris cal...@gmail.com wrote: I'm not William and a friend pasted a link on IRC to me. I'm going to send him a few bucks because I know how it feels to get blindsided by the police on one random day and your world is turned upside down. Source: http://www.lowendtalk.com/discussion/6283/raided-for-running-a-tor-exi t-accepting-donations-for-legal-expenses From the URL: Yes, it happened to me now as well - Yesterday i got raided for someone sharing child pornography over one of my Tor exits. I'm good so far, not in jail, but all my computers and hardware have been confiscated. (20 computers, 100TB+ storage, My Tablets/Consoles/Phones) If convicted i could face up to 6 years in jail, of course i do not want that and i also want to try to set a legal base for running Tor exit nodes in Austria or even the EU. Sadly we have nothing like the EFF here that could help me in this case by legal
Re: Operation Ghost Click
On 04/26/2012 05:00 PM, Andrew Latham wrote: On Thu, Apr 26, 2012 at 5:57 PM, Kyle Creytskyle.cre...@gmail.com wrote: http://www.fbi.gov/news/stories/2011/november/malware_110911/DNS-changer-malware.pdf On Apr 26, 2012 5:48 PM, Leigh Porterleigh.por...@ukbroadband.com wrote: On 26 Apr 2012, at 22:47, Andrew Latham lath...@gmail.commailto:lath...@gmail.com wrote: On Thu, Apr 26, 2012 at 5:38 PM, Jeroen van Aart jer...@mompl.netmailto:jer...@mompl.net wrote: Yes its a major problem for the users unknowingly infected. To them it will look like their Internet connection is down. Expect ISPs to field lots of support s Is there a list of these temporary servers so I can see what customers are using them (indicating infection) and head off a support call with some contact? -- Leigh 85.255.112.0 through 85.255.127.255 67.210.0.0 through 67.210.15.255 93.188.160.0 through 93.188.167.255 77.67.83.0 through 77.67.83.255 213.109.64.0 through 213.109.79.255 64.28.176.0 through 64.28.191.255 Or for those that don't want to do the math, here they are in CIDR notation 85.255.112.0/20 67.210.0.0/20 93.188.160.0/21 77.67.83.0/24 213.109.64.0/20 64.28.176.0/20
Re: Any recommended router. They are reliable and have good support.
http://imagestream.com On 11/22/11 9:38 AM, Deric Kwok wrote: Hi Can I know any selection of Linux routers except cisco / juniper? They are reliable and have good support provided We would like to get one for testing. Thank you