On Thu, 18 Dec 2003, Richard A Steenbergen wrote:
>> * 0.0.0.0 216.218.252.1520 6939 6461
>> * 216.218.252.1450 6939 6461
>> * 1.0.0.0 64.50.230.10 4181 65333
>
> route-views certainly
Rob,
Congratulations... You've become THE ASN that routes THE internet!!
I bet that must be worth some CVVs.
Owen
--On Thursday, December 18, 2003 17:34 -0600 Rob Thomas <[EMAIL PROTECTED]>
wrote:
Hi, NANOGers.
] Hate to follow up to myself, but as someone just pointed out, 65333 is
the
We give a full view of our internal BGP routing table to RouteViews.
Anyway, we normally don't carry 0.0.0.0/0 internally, we've now filtered
it. We don't normally receive 0.0.0.0/0 on any of our backup transit
sessions, apparently it was configured on a new session by default.
On Thu, 18 Dec
In a message written on Thu, Dec 18, 2003 at 03:12:17PM -0800, David Meyer wrote:
> Nope to the former. Someone (6461) is advertising it. We
Speaking for 6461, if a customer asks for a default route, we send
them one.
The {problem,cool thing} about route-views is many people send it a full
Hi, NANOGers.
] Hate to follow up to myself, but as someone just pointed out, 65333 is the
] cymru bogons server.
Woohoo, we're on route-views! We've made the big time! :) That
said, please remember to strip off such things with peers and
customers. :)
Thanks,
Rob.
--
Rob Thomas
http://www
On Thu, Dec 18, 2003 at 06:15:38PM -0500, Richard A Steenbergen wrote:
>
> route-views.oregon-ix.net>sh ip bgp
> ...
> * 0.0.0.0 216.218.252.1520 6939 6461 i
> *> 216.218.252.1450 6939 6461 i
> *> 1.0.0.0 64.50.2
On Thu, Dec 18, 2003 at 04:05:56PM -0800, [EMAIL PROTECTED] wrote:
>
> I'm seeing the following in RouteViews (possibly since they started
> getting data from paix):
>
> route-views.oregon-ix.net>sh ip bgp 0.0.0.1
> BGP routing table entry for 0.0.0.0/, version 19579757
> Paths: (2 available, b
On Thu, Dec 18, 2003 at 04:05:56PM -0800, [EMAIL PROTECTED] wrote:
>>
>> I'm seeing the following in RouteViews (possibly since they started
>> getting data from paix):
>>
>> route-views.oregon-ix.net>sh ip bgp 0.0.0.1
>> BGP routing table entry for 0.0.0.0/, version 19579757
>> Paths: (2 avail
I'm seeing the following in RouteViews (possibly since they started
getting data from paix):
route-views.oregon-ix.net>sh ip bgp 0.0.0.1
BGP routing table entry for 0.0.0.0/, version 19579757
Paths: (2 available, best #2, table Default-IP-Routing-Table)
Not advertised to any peer
6939 6461
there are many irc networks you might say which one these are on.
on Efnet there is a channel #dmsetup that will handle infected users
and clean them if you point them in that direction...
-HenryMike Damm <[EMAIL PROTECTED]> wrote:
Some folks might want to jump on the IRC server in question and i
> Having heard no answer, I will take a shot :
>
> I actually think that EPONs have a good chance to be the future method
> of distributing video from the "cable" provider to the home. As they
> are passive, it minimizes the amount of equipment out there. A
May be not... all xPON systems have a
On Thu, Dec 18, 2003 at 09:09:40AM -0800, John Obi wrote:
> Folks,
>
> I have sent many emails to [EMAIL PROTECTED] and
> [EMAIL PROTECTED] reporting a security abuse by one
> of their users but nothing done up to now.
>
> If there is real person from nlayer.net please contact
> me offline.
Jus
Some folks might want to jump on the IRC server in question and issue a
/who. There appear to be some infected machines members of this list may be
interested in cleaning.
Aside from the usual spew of cable/dsl I noticed:
*.nyu.edu
*.bu.edu
*.northwestern.edu
*.corp.yahoo.com
*.tufts.edu
*.uncwil
On Thu, Dec 18, 2003 at 12:35:52PM -0500, Rich Sena wrote:
>
> Can someone from AOL please contact me re: a blocked email domain.
Since you didn't go to google,
type in "aol postmaster" and click "I'm feeling Lucky" to get this,
http://postmaster.info.aol.com/
Just a few quick l
On Thu, 2003-12-18 at 08:09, John Obi wrote:
> Folks,
>
> I have sent many emails to [EMAIL PROTECTED] and
> [EMAIL PROTECTED] reporting a security abuse by one
> of their users but nothing done up to now.
>
> If there is real person from nlayer.net please contact
> me offline.
>
> Thanks,
>
Folks,
I have sent many emails to [EMAIL PROTECTED] and
[EMAIL PROTECTED] reporting a security abuse by one
of their users but nothing done up to now.
If there is real person from nlayer.net please contact
me offline.
Thanks,
-J
__
Do you Yahoo!?
New Yahoo! Phot
Dear Miguel;
Having heard no answer, I will take a shot :
I actually think that EPONs have a good chance to be the future method
of distributing video from the "cable" provider to the home. As they
are passive, it minimizes the amount of equipment out there. A
10-Gigabit Ethernet running multi
On Thu, 18 Dec 2003, Deepak Jain wrote:
>
> > Infected machines send up to 300pps per machine of ICMP packets which
> > fall into
> > the 96 slot above. So in this example you probably have many of them.
> >
>
> Couldn't this also mean he is being probed/attacked by many as well?
or backscatter
For those interested in this sort of thing:
(I glanced at the early code a while back, and like anything Henning has
written, seemed clean and neat).
Henning Brauer wrote:
> CVSROOT: /cvs
> Module name: src
> Changes by: [EMAIL PROTECTED] 2003/12/17 04:46:54
>
> Added files:
> usr.sbin/bgpd : M
Deepak Jain wrote:
Infected machines send up to 300pps per machine of ICMP packets which
fall into
the 96 slot above. So in this example you probably have many of them.
Couldn't this also mean he is being probed/attacked by many as well?
Certainly but this high ratios are usually only attainabl
Infected machines send up to 300pps per machine of ICMP packets which
fall into
the 96 slot above. So in this example you probably have many of them.
Couldn't this also mean he is being probed/attacked by many as well?
DJ
Hank Nussbacher wrote:
IP packet size distribution (46782M total packets):
1-32 64 96 128 160 192 224 256 288 320 352 384 416 448
480
.001 .395 .156 .032 .036 .010 .006 .004 .010 .004 .003 .003 .007 .008
.004
512 544 576 1024 1536 2048 2560 3072 3584 4096 4608
.004 .003 .
22 matches
Mail list logo