Re: Routeviews and possible 0/0 route

2003-12-18 Thread william
On Thu, 18 Dec 2003, Richard A Steenbergen wrote: >> * 0.0.0.0 216.218.252.1520 6939 6461 >> * 216.218.252.1450 6939 6461 >> * 1.0.0.0 64.50.230.10 4181 65333 > > route-views certainly

Re: Routeviews and possible 0/0 route

2003-12-18 Thread Owen DeLong
Rob, Congratulations... You've become THE ASN that routes THE internet!! I bet that must be worth some CVVs. Owen --On Thursday, December 18, 2003 17:34 -0600 Rob Thomas <[EMAIL PROTECTED]> wrote: Hi, NANOGers. ] Hate to follow up to myself, but as someone just pointed out, 65333 is the

Re: Routeviews and possible 0/0 route

2003-12-18 Thread Mike Leber
We give a full view of our internal BGP routing table to RouteViews. Anyway, we normally don't carry 0.0.0.0/0 internally, we've now filtered it. We don't normally receive 0.0.0.0/0 on any of our backup transit sessions, apparently it was configured on a new session by default. On Thu, 18 Dec

Re: Routeviews and possible 0/0 route

2003-12-18 Thread Leo Bicknell
In a message written on Thu, Dec 18, 2003 at 03:12:17PM -0800, David Meyer wrote: > Nope to the former. Someone (6461) is advertising it. We Speaking for 6461, if a customer asks for a default route, we send them one. The {problem,cool thing} about route-views is many people send it a full

Re: Routeviews and possible 0/0 route

2003-12-18 Thread Rob Thomas
Hi, NANOGers. ] Hate to follow up to myself, but as someone just pointed out, 65333 is the ] cymru bogons server. Woohoo, we're on route-views! We've made the big time! :) That said, please remember to strip off such things with peers and customers. :) Thanks, Rob. -- Rob Thomas http://www

Re: Routeviews and possible 0/0 route

2003-12-18 Thread Richard A Steenbergen
On Thu, Dec 18, 2003 at 06:15:38PM -0500, Richard A Steenbergen wrote: > > route-views.oregon-ix.net>sh ip bgp > ... > * 0.0.0.0 216.218.252.1520 6939 6461 i > *> 216.218.252.1450 6939 6461 i > *> 1.0.0.0 64.50.2

Re: Routeviews and possible 0/0 route

2003-12-18 Thread Richard A Steenbergen
On Thu, Dec 18, 2003 at 04:05:56PM -0800, [EMAIL PROTECTED] wrote: > > I'm seeing the following in RouteViews (possibly since they started > getting data from paix): > > route-views.oregon-ix.net>sh ip bgp 0.0.0.1 > BGP routing table entry for 0.0.0.0/, version 19579757 > Paths: (2 available, b

Re: Routeviews and possible 0/0 route

2003-12-18 Thread David Meyer
On Thu, Dec 18, 2003 at 04:05:56PM -0800, [EMAIL PROTECTED] wrote: >> >> I'm seeing the following in RouteViews (possibly since they started >> getting data from paix): >> >> route-views.oregon-ix.net>sh ip bgp 0.0.0.1 >> BGP routing table entry for 0.0.0.0/, version 19579757 >> Paths: (2 avail

Routeviews and possible 0/0 route

2003-12-18 Thread william
I'm seeing the following in RouteViews (possibly since they started getting data from paix): route-views.oregon-ix.net>sh ip bgp 0.0.0.1 BGP routing table entry for 0.0.0.0/, version 19579757 Paths: (2 available, best #2, table Default-IP-Routing-Table) Not advertised to any peer 6939 6461

RE: nlayer.net Abuse and Security contact

2003-12-18 Thread Henry Linneweh
there are many irc networks you might say which one these are on. on Efnet there is a channel #dmsetup that will handle infected users and clean them if you point them in that direction...   -HenryMike Damm <[EMAIL PROTECTED]> wrote: Some folks might want to jump on the IRC server in question and i

Re: pon's and ethernet to the home

2003-12-18 Thread Rubens Kuhl Jr.
> Having heard no answer, I will take a shot : > > I actually think that EPONs have a good chance to be the future method > of distributing video from the "cable" provider to the home. As they > are passive, it minimizes the amount of equipment out there. A May be not... all xPON systems have a

Re: nlayer.net Abuse and Security contact

2003-12-18 Thread Richard A Steenbergen
On Thu, Dec 18, 2003 at 09:09:40AM -0800, John Obi wrote: > Folks, > > I have sent many emails to [EMAIL PROTECTED] and > [EMAIL PROTECTED] reporting a security abuse by one > of their users but nothing done up to now. > > If there is real person from nlayer.net please contact > me offline. Jus

RE: nlayer.net Abuse and Security contact

2003-12-18 Thread Mike Damm
Some folks might want to jump on the IRC server in question and issue a /who. There appear to be some infected machines members of this list may be interested in cleaning. Aside from the usual spew of cable/dsl I noticed: *.nyu.edu *.bu.edu *.northwestern.edu *.corp.yahoo.com *.tufts.edu *.uncwil

Re: OT: AOL contact needed

2003-12-18 Thread Jared Mauch
On Thu, Dec 18, 2003 at 12:35:52PM -0500, Rich Sena wrote: > > Can someone from AOL please contact me re: a blocked email domain. Since you didn't go to google, type in "aol postmaster" and click "I'm feeling Lucky" to get this, http://postmaster.info.aol.com/ Just a few quick l

Re: nlayer.net Abuse and Security contact

2003-12-18 Thread W.D.McKinney
On Thu, 2003-12-18 at 08:09, John Obi wrote: > Folks, > > I have sent many emails to [EMAIL PROTECTED] and > [EMAIL PROTECTED] reporting a security abuse by one > of their users but nothing done up to now. > > If there is real person from nlayer.net please contact > me offline. > > Thanks, >

nlayer.net Abuse and Security contact

2003-12-18 Thread John Obi
Folks, I have sent many emails to [EMAIL PROTECTED] and [EMAIL PROTECTED] reporting a security abuse by one of their users but nothing done up to now. If there is real person from nlayer.net please contact me offline. Thanks, -J __ Do you Yahoo!? New Yahoo! Phot

Re: pon's and ethernet to the home

2003-12-18 Thread Marshall Eubanks
Dear Miguel; Having heard no answer, I will take a shot : I actually think that EPONs have a good chance to be the future method of distributing video from the "cable" provider to the home. As they are passive, it minimizes the amount of equipment out there. A 10-Gigabit Ethernet running multi

Re: Most up to date packet size distribution info

2003-12-18 Thread Christopher L. Morrow
On Thu, 18 Dec 2003, Deepak Jain wrote: > > > Infected machines send up to 300pps per machine of ICMP packets which > > fall into > > the 96 slot above. So in this example you probably have many of them. > > > > Couldn't this also mean he is being probed/attacked by many as well? or backscatter

OpenBSD + new bgpd (Fw: cvs.openbsd.org: src)

2003-12-18 Thread Peter Galbavy
For those interested in this sort of thing: (I glanced at the early code a while back, and like anything Henning has written, seemed clean and neat). Henning Brauer wrote: > CVSROOT: /cvs > Module name: src > Changes by: [EMAIL PROTECTED] 2003/12/17 04:46:54 > > Added files: > usr.sbin/bgpd : M

Re: Most up to date packet size distribution info

2003-12-18 Thread Petri Helenius
Deepak Jain wrote: Infected machines send up to 300pps per machine of ICMP packets which fall into the 96 slot above. So in this example you probably have many of them. Couldn't this also mean he is being probed/attacked by many as well? Certainly but this high ratios are usually only attainabl

Re: Most up to date packet size distribution info

2003-12-18 Thread Deepak Jain
Infected machines send up to 300pps per machine of ICMP packets which fall into the 96 slot above. So in this example you probably have many of them. Couldn't this also mean he is being probed/attacked by many as well? DJ

Re: Most up to date packet size distribution info

2003-12-18 Thread Petri Helenius
Hank Nussbacher wrote: IP packet size distribution (46782M total packets): 1-32 64 96 128 160 192 224 256 288 320 352 384 416 448 480 .001 .395 .156 .032 .036 .010 .006 .004 .010 .004 .003 .003 .007 .008 .004 512 544 576 1024 1536 2048 2560 3072 3584 4096 4608 .004 .003 .