RE: Popular trouble ticket management system for IP NOC

2002-09-23 Thread Yu Ning
Hi all, Thanks for all your kindly reply. I'm currently evaluating HP Service Desk, and CA Unicenter service desk. Remedy seems have no Chinese contact. RT seems too non-commercial :-) thanks! Yu Ning |-Original Message- |From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On |Behalf

Re: selective prepends (RE: Cogent service)

2002-09-23 Thread German Martinez
> > > Date: Sun, 22 Sep 2002 23:16:20 -0400 (EDT) > > From: jlewis > > > > Speaking of special...having played around a little with the > > BGP communities supported by C&W and Sprint, I'm wondering > > which other big transit providers (it seems almost a waste to > > say Tier 1 anymore) support

Re: Pricing model for transit services

2002-09-23 Thread Richard A Steenbergen
On Mon, Sep 23, 2002 at 05:28:15PM -0400, Joe Abley wrote: > > I think the problem is not that there are multiple definitions of > how to calculate the 95th percentile of a sample population, but > that different peoples' sample populations are constructed in > different ways. > > I have seen b

RE: Cogent service

2002-09-23 Thread Frank Scalzo
This was a totally bogus reason from the very beginning. Given that real backbones carry no prefixes longer than 24 bits the "long" lookup in Last numbers I saw put 701 at over 100k prefixes in the /25-/32 range. The more correct statement is backbones carry no external prefixes longer then /24

Re: Security Practices question

2002-09-23 Thread Scott Francis
On Sun, Sep 22, 2002 at 03:22:11PM -0700, [EMAIL PROTECTED] said: > > I have question for the security community on NANOG. > > What is your learned opinion of having host accounts > (unix machines) with UID/GID of 0:0 > > otherwords > > > jmbrown_r:password:0:0:John M. Brown:/export/home/jmb

Re: Pricing model for transit services

2002-09-23 Thread Joe Abley
On Mon, Sep 23, 2002 at 04:07:47PM -0400, Richard A Steenbergen wrote: > On Mon, Sep 23, 2002 at 12:50:17PM -0700, Lane Patterson wrote: > > > And there are at least 4 ways of computing 95th percentile, though I'm sure > > there've already been threads on this. > > There is only one way, anyone

Re: Wireless insecurity at NANOG meetings

2002-09-23 Thread Greg Maxwell
On Mon, 23 Sep 2002, Huopio Kauto wrote: > How about just plainly blocking the most obvious holes, that is > telnet and POP? If someone wants a direct telnet connection to a > route server or something similar - open a hole with a web-based tool? > Ok, then you say all unencrypted www traffic wi

Re: Wireless insecurity at NANOG meetings

2002-09-23 Thread Huopio Kauto
How about just plainly blocking the most obvious holes, that is telnet and POP? If someone wants a direct telnet connection to a route server or something similar - open a hole with a web-based tool? Ok, then you say all unencrypted www traffic with plain username/pw.. SSH'ing everything back to

RE: Cogent service

2002-09-23 Thread David Schwartz
On Sun, 22 Sep 2002 23:16:20 -0400 (EDT), [EMAIL PROTECTED] wrote: >What are these 'special needs' people keep mentioning? What special needs >might you have of your transit providers? It's hard to generally categorize special needs because they're special. I can give you an example

Re: Pricing model for transit services

2002-09-23 Thread Stephen J. Wilcox
On Mon, 23 Sep 2002, Richard A Steenbergen wrote: > > On Mon, Sep 23, 2002 at 12:50:17PM -0700, Lane Patterson wrote: > > > Also, some large ISP's have a policy that you must buy the whole pipe > > unmetered if your commit is >50% pipe speed. > > Never heard that one, but conversly most ISPs

Re: Pricing model for transit services

2002-09-23 Thread Richard A Steenbergen
On Mon, Sep 23, 2002 at 12:50:17PM -0700, Lane Patterson wrote: > Also, some large ISP's have a policy that you must buy the whole pipe > unmetered if your commit is >50% pipe speed. Never heard that one, but conversly most ISPs have a minimum commit for "big expensive ports". For example, 1 me

Re: Pricing model for transit services

2002-09-23 Thread Lane Patterson
On Mon, Sep 23, 2002 at 11:26:22AM -0400, Alex Rubenstein <[EMAIL PROTECTED]> wrote: > > > > > - flat fee for a L Mbps link > > Also known as 'fractional' or 'tiered.' $x for y mb/s, and it is > rate-limited. > > > > - volume based, y $ per Mbps (95% quantile) for a L Mbps link > > - burst

RatHole: Wireless insecurity at NANOG meetings

2002-09-23 Thread Al Rowland
"That [WEB] will give people a false sense of security." IMHO those 'people' are a group that is a subset of folk that will do 'unwise' things no matter what level of scurity is in place. Move along, nothing to see here... Internet != secure, period. Best regards, _ Ala

Re: Wireless insecurity at NANOG meetings

2002-09-23 Thread Chris Adams
On Sunday, Sep 22, 2002, at 15:41 US/Pacific, William Allen Simpson wrote: > I will agree that the security in WEP is almost useless, and have > personally campaigned to change it for years. But, it is still the > only > Access Control widely available. So, it should be used, in addition to >

Re: Wireless insecurity at NANOG meetings

2002-09-23 Thread Joel Jaeggli
On Sun, 22 Sep 2002, Iljitsch van Beijnum wrote: > > On Sun, 22 Sep 2002, Richard A Steenbergen wrote: > > > On Sun, Sep 22, 2002 at 01:11:07PM +0200, Iljitsch van Beijnum wrote: > > > > There are also people ssh'ing to personal and corporate machines from > > > > the terminal room where the r

Re: Wireless insecurity at NANOG meetings

2002-09-23 Thread JC Dill
On 07:19 AM 9/23/02, Steven M. Bellovin wrote: >>I can't say without a sniffer, but I'd bet that most NANOG participants are >>doing the same: SSH or IPsec VPN's back to home (wherever that is). > >Experience doesn't support this, I fear. How many passwords were >captured last time? Passw

Re: Security Practices question

2002-09-23 Thread Barb Dijker
Hi John, Haven't seen you in a while. I hope all is well. Maybe I'll make it to a nanog or arin meeting again one of these days. As these are unix security questions and I've been a principle reviewer of the bible on unix sysadmin (by Ms. Nemeth et al)... At 03:22 PM 9/22/02 -0700, John M.

Re: Pricing model for transit services

2002-09-23 Thread Alex Rubenstein
> - flat fee for a L Mbps link Also known as 'fractional' or 'tiered.' $x for y mb/s, and it is rate-limited. > - volume based, y $ per Mbps (95% quantile) for a L Mbps link > - burstable, flat fee for x Mbps on a L Mbps and z $ per Mbps above x These two are essentially the same. You do ha

Re: Wireless insecurity at NANOG meetings

2002-09-23 Thread mike harrison
> > > 10-15 minutes. None of the doors of that class is in your house. Why do you > > > have a door on your house? > > > > It keeps honest people honest, and opportunists from taking advantage of > > easy opportunity. > > Thank you. Why is it different from putting even rudimentary security i

Re: Wireless insecurity at NANOG meetings

2002-09-23 Thread Richard Welty
On Mon, 23 Sep 2002 14:52:41 +0100 Simon Lockhart <[EMAIL PROTECTED]> wrote: > Someone sat in the hotel lobby with a powerful laptop isn't going to > cause > anyone to look twice, at a NANOG conference. ok, i think we need to talk about the actual threats at a nanog conference. 1) some otherwis

Re: Wireless insecurity at NANOG meetings

2002-09-23 Thread Steven M. Bellovin
In message <006a01c2630a$19725020$[EMAIL PROTECTED]>, "Stephen Sprunk" wr ites: > >I can't say without a sniffer, but I'd bet that most NANOG participants are >doing the same: SSH or IPsec VPN's back to home (wherever that is). Experience doesn't support this, I fear. How many passwords were

Re: Wireless insecurity at NANOG meetings

2002-09-23 Thread David Diaz
Actually, from a legal standpoint, you put locks on the door same reason as u would on the wireless. Otherwise an invitation could be implied. It's hard for someone to argue that they were invited if they had to use breakin tools. Otherwise I dont think anyone would have a case, public area

Re: Wireless insecurity at NANOG meetings

2002-09-23 Thread Stephen Sprunk
Thus spake "Sean Donelan" <[EMAIL PROTECTED]> > The wireless networks at NANOG meetings never follow what the security > professionals say are mandatory, essential security practices. The NANOG > wireless network doesn't use any authentication, enables broadcast SSID, > has a trivial to guess SSI

Re: Wireless insecurity at NANOG meetings

2002-09-23 Thread alex
> Someone stood at your front door with lock picking tools for more than a > couple of minutes is going to arouse suspicion, and hopefully cause someone > to call the police. > > Someone sat in the hotel lobby with a powerful laptop isn't going to cause > anyone to look twice, at a NANOG confere

Re: Wireless insecurity at NANOG meetings

2002-09-23 Thread alex
> > 10-15 minutes. None of the doors of that class is in your house. Why do you > > have a door on your house? > > It keeps honest people honest, and opportunists from taking advantage of > easy opportunity. Thank you. Why is it different from putting even rudimentary security in place on the

Re: Wireless insecurity at NANOG meetings

2002-09-23 Thread alex
> > Rubbish. > > > > There are only two or three types of locks that cannot be picked from the > > outside by a lockpicker within 10-15 minutes. None of those locks is on your > > outside door. Why do you bother to lock your house? > > > But in the case of public WLAN, who is the one that you´re

Re: Wireless insecurity at NANOG meetings

2002-09-23 Thread Mike Harrison
> 10-15 minutes. None of the doors of that class is in your house. Why do you > have a door on your house? It keeps honest people honest, and opportunists from taking advantage of easy opportunity.

Re: Wireless insecurity at NANOG meetings

2002-09-23 Thread Simon Lockhart
On Mon Sep 23, 2002 at 09:47:06AM -0400, [EMAIL PROTECTED] wrote: > There are only two or three types of locks that cannot be picked from the > outside by a lockpicker within 10-15 minutes. None of those locks is on your > outside door. Why do you bother to lock your house? Someone stood at your

Re: Wireless insecurity at NANOG meetings

2002-09-23 Thread Petri Helenius
> > Rubbish. > > There are only two or three types of locks that cannot be picked from the > outside by a lockpicker within 10-15 minutes. None of those locks is on your > outside door. Why do you bother to lock your house? > But in the case of public WLAN, who is the one that you´re trying to ke

Re: Wireless insecurity at NANOG meetings

2002-09-23 Thread alex
> > At 06:41 PM 9/22/2002 -0400, William Allen Simpson wrote: > >... But, it is still the only > >Access Control widely available. So, it should be used, in addition to > >the better methods. > > Using a supposed security mechanism that is known to be essentially useless > does nothing but l

Pricing model for transit services

2002-09-23 Thread Olivier Bonaventure
Hello, We are working on a research project on interdomain traffic engineering and would like to quantitatively evaluate interdomain traffic engineering solutions in a realistic way. We have a BGP simulator that allows us to simulate networks with a few hundreds of AS and are adding several mech

Re: Wireless insecurity at NANOG meetings

2002-09-23 Thread Steven M. Bellovin
In message <[EMAIL PROTECTED]>, Sean Donelan writes: > >On Sun, 22 Sep 2002, Randy Bush wrote: >> - the users need to be told how to operate more safely, use >> end-to-end authentication and privacy, etc. it's a matter of >> education. and the education will stand them in good

Re: Security Practices question

2002-09-23 Thread D'Arcy J.M. Cain
On September 22, 2002 07:41 pm, Ryan Fox wrote: > On Sun, 2002-09-22 at 18:22, John M. Brown wrote: > > What is your learned opinion of having host accounts > > (unix machines) with UID/GID of 0:0 > > > > jmbrown_r:password:0:0:John M. Brown:/export/home/jmbrown:/bin/mysh > > The biggest argument

Re: Wireless insecurity at NANOG meetings

2002-09-23 Thread Steven M. Bellovin
In message <[EMAIL PROTECTED]>, Sean Donelan writes: > >On Sat, 21 Sep 2002, Martin J. Levy wrote: >> >I agre security is sadly lacking, but it is probably impossible to >> >implement in a conference environment. >> >> Look this is a very simple issue. Sean's first post really pointed out >> th

Re: Wireless insecurity at NANOG meetings

2002-09-23 Thread Vadim Antonov
> On Sun, 22 Sep 2002, William Allen Simpson wrote: > > > Sorry, any security requires a *SECRET*. The only thing security really requires is *trust*. Secret keys won't do any good if the platform is compromised. Elaborate protections are useless if people who are allowed access are untruthw