Maybe like OT we need to put FM at the beginning of the subject line.
-Original Message-
From: AF On Behalf Of Bill Prince
Sent: Friday, June 19, 2020 6:51 PM
To: af@af.afmug.com
Subject: Re: [AFMUG] Be careful out there!
Two words:
Florida man.
bp
On 6/19/2020 3:40 PM, Robert
Two words:
Florida man.
bp
On 6/19/2020 3:40 PM, Robert wrote:
http://wirelessestimator.com/articles/2020/two-cell-site-electricians-shot-to-death-while-performing-an-att-upgrade-in-florida/?fbclid=IwAR16EUeS0qoLyKK2YabtO8S2kxl1xJGqraa36b_-UQmkBOZ3Fkk_jAIhGOU
--
AF mailing list
Initially I assumed the 5G conspiracy theorists had graduated from destroying
equipment to shooting phone company workers.
From: AF On Behalf Of ch...@wbmfg.com
Sent: Friday, June 19, 2020 5:57 PM
To: AnimalFarm Microwave Users Group
Subject: Re: [AFMUG] Be careful out there!
Burglary,
Burglary, Robbery gone bad.
Killing witnesses to another crime.
Someone got disrespected.
From: Matt Hoppes
Sent: Friday, June 19, 2020 4:52 PM
To: AnimalFarm Microwave Users Group
Subject: Re: [AFMUG] Be careful out there!
Wait. What???
The site is in a relatively safe area of
Wait. What???
The site is in a relatively safe area of Jacksonville, neighbors say, but
according to a number of social media posts of tower techs who have worked on
that site or in the area, it’s not.
> On Jun 19, 2020, at 6:41 PM, Robert wrote:
>
>
http://wirelessestimator.com/articles/2020/two-cell-site-electricians-shot-to-death-while-performing-an-att-upgrade-in-florida/?fbclid=IwAR16EUeS0qoLyKK2YabtO8S2kxl1xJGqraa36b_-UQmkBOZ3Fkk_jAIhGOU
--
AF mailing list
AF@af.afmug.com
http://af.afmug.com/mailman/listinfo/af_af.afmug.com
H, that sounds a little scarier than something I’d be willing to sign up
for.
At least they weren’t uploading kiddie porn or making terrorist threats from
your IPs. But getting your customers semi-banned by Google is still uncool.
I don’t suppose Google was paying them to monitor
thats good to know Josh
On Thu, Jun 18, 2020 at 1:41 PM Josh Luthman
wrote:
> No one has said they have issues I don't believe. Just sync up your
> settings and you're good to go. Need to make sure you have certain
> versions+ to gain compatibility.
>
> Josh Luthman
> Office: 937-552-2340
>
AAaahh, yeah, DIVI...
Every now and then something like this pops up with them.
-
Mike Hammett
Intelligent Computing Solutions
Midwest Internet Exchange
The Brothers WISP
- Original Message -
From: "Christopher Tyler"
To: "AnimalFarm Microwave Users Group"
Pretty sure that we traced it back to DiviNetworks.
They are supposed to use spare bandwidth to pseudonymously originate web
requests. They use our IP addresses and in theory they are supposed to do this
without disturbing our customers and only access web sites whose owners have
contracted
No we are not pre-defining blocks at this time, I will look at implementing
that, thank you.
--
Christopher Tyler
Senior Network Engineer
MTCRE/MTCNA/MTCTCE/MTCWE
Total Highspeed Internet Solutions
1091 W. Kathryn Street
Nixa, MO 65714
(417) 851-1107 x. 9002
www.totalhighspeed.com
-
Are you pre-defining blocks, though?
Inside IP Outside IP/Port range
100.64.1.1 2.2.2.2:2000-2099
100.64.1.2 2.2.2.2:2100-2199
100.64.1.3 2.2.2.2:2200-2299
I'd do more than 100 ports, but table is just meant to express the concept.
Then you ALWAYS know IP:port to
It is a Mikrotik router. Nothing appears to be out of the ordinary.
--
Christopher Tyler
Senior Network Engineer
MTCRE/MTCNA/MTCTCE/MTCWE
Total Highspeed Internet Solutions
1091 W. Kathryn Street
Nixa, MO 65714
(417) 851-1107 x. 9002
www.totalhighspeed.com
- Original Message -
> From:
That is how we are doing it for the most part. We still have a lot of old
172.16.0.0/12 addresses that need to be converted to 100.64.0.0/10. We have
been and still are steadily working towards that goal though.
--
Christopher Tyler
Senior Network Engineer
MTCRE/MTCNA/MTCTCE/MTCWE
Total
Unimus would show the changes and alerted to them, if one was using Unimus and
their router was compromised.
-
Mike Hammett
Intelligent Computing Solutions
Midwest Internet Exchange
The Brothers WISP
- Original Message -
From: "Ken Hohhof"
To: "AnimalFarm Microwave
If you're NATing multiple customers behind a single IP address, do it this way:
https://wiki.mikrotik.com/wiki/Manual:IP/Firewall/NAT#Carrier-Grade_NAT_.28CGNAT.29_or_NAT444
-
Mike Hammett
Intelligent Computing Solutions
Midwest Internet Exchange
The Brothers WISP
-
Normally you can't spoof source addresses for TCP connections, the return
traffic would go to the real IP, unless there's some exotic BCP hijack
involved.
Are you sure that your router has not been compromised and a proxy server
installed? Like SOCKS if it's a Mikrotik?
-Original
The ratio was about half that, about to 218:1 NAT, just decreased to about 55:1.
And no, we are not recording sessions.
--
Christopher Tyler
Senior Network Engineer
MTCRE/MTCNA/MTCTCE/MTCWE
Total Highspeed Internet Solutions
1091 W. Kathryn Street
Nixa, MO 65714
(417) 851-1107 x. 9002
Yes, NAT is in play here, I just now increased the NAT pool to 128 addresses
based on TJ's theory that the NAT pool might be too small.
The source IP's seem to be spoofed or proxied somehow as the first IP address
in the list from Google is our ARIN /20 Network address (x.x.0.0) and I find it
He has an IP address that translates to 700 addresses in his customer
base. He doesn't record sessions. He doesn't have what's needed to
track and individual customer down. Probably wouldn't matter if he
only had 27 customers behind the IP address.
On 6/19/20 9:37 AM, Mike Hammett wrote:
You have the source IP, port, and time. What more do you need to determine
who's doing it?
I'm assuming you're NATing customers at the router in question.
-
Mike Hammett
Intelligent Computing Solutions
Midwest Internet Exchange
The Brothers WISP
- Original Message -
most likely too many nat hosts behind too few publics?
On Fri, Jun 19, 2020 at 9:00 AM Christopher Tyler
wrote:
> So the other day we got an email (excerpt below) from Google's automated
> tool...
>
> We are seeing automated scraping of Google Web Search from a large
> number of your IPs.
So the other day we got an email (excerpt below) from Google's automated tool...
We are seeing automated scraping of Google Web Search from a large
number of your IPs. Automated scraping violates our /robots.txt file
and also our Terms of Service. We request that you terminate this
traffic
Just wanted to clarify a couple things here (sorry, I am so late in getting to
this)…
The 900 MHz 450 product is kind of a hybrid between 450 and 450i.
The AP is 450i hardware (using 48 VDC input, same housing, etc.).
The SM is 450 hardware (having a “candy bar” form factor, 30 VDC input,
Yeah, the problem with 900mhz PTP is that unlike 2.4ghz or 5ghz, you can't
run any higher power in ptp mode than you can in ptmp, so 2.4ghz often does
work better... but there are some cases where 900mhz PTP does make sense.
If it's PTP, you definitely don't want the AUX port version, since
Redline RDL-3000 TVWS PTP setup. I have both ends and a full bandwidth key.
It was purchased for a specific project and then not used. I powered both
ends up, but never configured them.
Includes 2x radios, 2x PoEs, 2x speed keys, 4x log periodic antennas.
[Gravity mount is for show, probably
What they did in the 'i' hardware was change the drive strength require.
I'm not sure if that applies to the SM hardware or not, or the 900Mhz.
The safest item would be the 'syncbox junior deluxe' which has a port you
can power it with and then 6p6c ports to hook into the timing port on the
It is actually the PTP 450i that I’m talking about. I probably wouldn’t use it
again because it seems once you have enough power to use 900 MHz in PTP, then
you have plenty of power to use 2.4 GHz in PTP.
I was going to get the Syncbox Junior Aux Port, but there is no “uGPS power”
option in
Yes, with the caveat that they changed some stuff in the 450i *AP* hardware
which makes it incompatible with pipes before revision I0.
If it works and gets sync, it's good to go. If it doesn't, then you'll
just need to find a syncpipe or syncbox I0 or later. (That's the letter
I, it's kinda
29 matches
Mail list logo