Any simple NAT (PNAT, to be correct) box decrease a chance of infection by
last worms to 0. Just 0.%.
O course, it does not protects very well from intentional attacks, and do
not protect against e-mail bombs and
java script exploints.
In reality, having WIN2K after NAT box 100% time connecte
Petri Helenius wrote:
There is also a lot of "background Internet radiation" coming from p2p
applications which seem to remember their peers for a week or two. These
usually account for most of the unidirectional traffic knocking on doors
unanswered. (not counting large DDoS).
Martian packets, i
On Thu, 6 May 2004, Patrick W.Gilmore wrote:
> >> That is DAMNED impressive. I've never seen a router which can take a
> >> Gigabit of traffic to its CPU and stay up. What kind of router was
> >> this? You mentioned Juniper and Cisco before, but I know a cisco will
> >> fall over long before a
On 07.05.2004 00:02 Drumm, Dan wrote:
> I was wondering, basically, if I have any chance at this? While RIPE
> clearly states the admission policy is open to any organization, in
> order to get PIR (Provider Independent routing) being a RIPE NCC is
> required, and I don't know if a corporation
On Thu, 06 May 2004 16:02:53 MDT, "Drumm, Dan" writes:
>I'm starting the process of filling out an application to register the
>company, based in Ratingen, DE with RIPE as a Local Internet Registry
>(LIR) so that we can request a /18 (or /17 if we can get one) for the 40
>some production facilitie
Hi!
> I was wondering, basically, if I have any chance at this? While RIPE
> clearly states the admission policy is open to any organization, in
> order to get PIR (Provider Independent routing) being a RIPE NCC is
> required, and I don't know if a corporation would have a shot.
> Currently, we a
Taking this off list.
-MH
At 03:54 PM 5/6/2004, Nicole wrote:
As shown below I keep getting these connects from various adelphia.net mta
servers. No data is ever sent. Anyone know what they are up to?
Nicole
May 6 14:17:45 krell postfix/smtpd[90694]: connect from
mta7.adelphia.net[68.168.78.
Nanog:
I work as the Network Architect for a multinational
corporation, Ball Corporation (http://www.ball.com).
Currently, we hold a Class B network, 162.18.0.0/16 and have
been multi-homed in the past, and will be multi-homed in the future, and have
our own AS. The network is very
On Thu, 6 May 2004, Nicole wrote:
>
>
> As shown below I keep getting these connects from various adelphia.net mta
> servers. No data is ever sent. Anyone know what they are up to?
Checking my log for those IPs I see lots of sender verifications. (mail
from <> rcpt to <[EMAIL PROTECTED]>, no da
As shown below I keep getting these connects from various adelphia.net mta
servers. No data is ever sent. Anyone know what they are up to?
Nicole
May 6 14:17:45 krell postfix/smtpd[90694]: connect from
mta7.adelphia.net[68.168.78.193]
May 6 14:17:45 krell postfix/smtpd[90694]: disconnect
On May 6, 2004, at 2:42 PM, Arnold Nipper wrote:
On 06.05.2004 20:03 Steve Gibbard wrote:
I'm curious as to what sorts of response rates those who have been
actively contacting peers to ask for MD5 configuration have been
getting,
as well as whether other networks that have not been being proactiv
On Thu, 6 May 2004, Vish Yelsangikar wrote:
> Hi there.
>
> We are in the middle of a major project that will be rolled out in the next
> 3-4 months. With this project, I will be multihoming my network. To get
> ready for this project, I recently applied for an AS# for my company with
> ARIN an
->i think you only need to wait until 30 days before, not 11
->hours before.
->
->ARIN in my experience responds with reasonable promptness to
->ASN requests,
->and assuming your paperwork is in order, you really are
->worrying unnecessarily.
->
I second that..
When we multihomed, I gave the
It only took me a few days from start to finish to obtain a new AS# for
a client of mine. If you're only multihoming in one location, have a
really small network or you're only accepting local or default only
routes from your upstream providers it should be rather trivial to set
up the BGP pe
On Thu, 6 May 2004 13:02:11 -0700 Vish Yelsangikar <[EMAIL PROTECTED]> wrote:
> We are in the middle of a major project that will be rolled out in the next
> 3-4 months. With this project, I will be multihoming my network. To get
> ready for this project, I recently applied for an AS# for my com
Hi there.
We are in the middle of a major project that
will be rolled out in the next 3-4 months. With this project, I will be
multihoming my network. To get ready for this project, I recently applied
for an AS# for my company with ARIN and I was denied because I don't have a
multihomed
> There is also a lot of "background Internet radiation" coming
> from p2p
> applications which seem to remember their peers for a week or
> two. These
> usually account for most of the unidirectional traffic
> knocking on doors
> unanswered. (not counting large DDoS).
>
> Pete
While worki
William B. Norton wrote:
For those who say things like "can't define 'junk' precisely", I would
agree, but I think we also can agree that we all have a general idea
of what junk is. Just looking for round #'s really. It isn't 0%, and
it isn't 90% (although it seems that way sometimes).
I would
[EMAIL PROTECTED] wrote:
you can easily fit an entire router into a PC's slimline
case and the router can include a complete SI Firewall
capability. The PC BIOS will allow the initial SI Firewall
config to be done before booting the PC.
They got to it before you did; http://www.giwano.com/
Pete
On 06.05.2004 20:03 Steve Gibbard wrote:
> I'm curious as to what sorts of response rates those who have been
> actively contacting peers to ask for MD5 configuration have been getting,
> as well as whether other networks that have not been being proactive about
> this have been seeing contact ra
Packet Clearing House has routers at a several exchange points, which we
use to collect local snapshots of the routes available at the exchanges.
To do this, we peer with as many of the participants at each exchange as
possible. We're mainly just collecting data, so route flaps aren't a huge
prob
> i smell a hijack. the correct data are on google's servers.
... or a transfer that the registry didn't handle so well.
% whois -h whois.markmonitor.com orkut.com
shows data consistent with the display below. The ?.gtld-servers.net
servers are apparently still pointing to nameservers of the
I don't believe it FILLED the pipe. I suspect it made the interface
unusable by consuming buffer/processes/io ...
Other interfaces on the system were still functional. I did NOT measure
the actual through put.
[EMAIL PROTECTED] GCIA
http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xAF00EDCC
pg
> Thanks for the suggestions. The network ferret tools reports to
> do layer 2 discovery as well, maybe not so wishful thinking but
> I could be wrong -
>
> http://www.panix.com/~logikos/
Thanks for the pointer. HPOV claims their layer 2 discovery is independent
of vendor-proprietary techn
Today at 18:29 (+0200), Randy Bush wrote:
> Date: Thu, 6 May 2004 18:29:27 +0200
> From: Randy Bush <[EMAIL PROTECTED]>
> To: [EMAIL PROTECTED]
> Subject: Re: orkut dns?
>
>
> i smell a hijack. the correct data are on google's servers.
Ah Hah... I'll bet friendster's behind it then. ;-)
- Ch
Thanks for the suggestions. The network ferret tools reports to do layer 2 discovery
as well, maybe not so wishful thinking but I could be wrong -
http://www.panix.com/~logikos/
- Original Message -
From: Mark Boolootian <[EMAIL PROTECTED]>
Date: Thursday, May 6, 2004 11:59 am
Subject
i smell a hijack. the correct data are on google's servers.
roam.psg.com:/usr/home/randy> dig @ns1.google.com. orkut.com. ns
; <<>> DiG 9.3.0s20021217 <<>> @ns1.google.com. orkut.com. ns
;; global options: printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 30597
;; fla
for those who want to lose their (insert relevant time zone) meal,
try to get useful data from whois for orkut.com
randy
On 5-mei-04, at 21:55, Steve Gibbard wrote:
If a few of you can stop being so pedantic for a second, the definition
looks pretty easy to me: traffic unlikely to be wanted by the
recipient.
Presumably, if it's being sent that means somebody wanted to send it,
so
the senders' desires are a pretty m
Sean,
The one I downloaded, tried and then bought was solarwinds. They have a
demo copy that you can get the magic key to. If gives as much SNMP as
the router operators allow.
One feature that is nice is give it the "base" router and it will
discover everything attached to it.
John Lee
http://
> The best GPL tool that I've come across in a long while, as far as
> network discovery goes, would have to be the discovery engine inside
> Netdisco (http://www.netdisco.org). This tool is fairly Cisco-centric,
> but Max has put a lot of work into a tool for folks who are tired of
> CiscoW
am i wrong or is there a problem (which is a dozen hours old)?
roam.psg.com:/usr/home/randy> dig +norec @a.gtld-servers.net. orkut.com. ns
; <<>> DiG 9.3.0s20021217 <<>> +norec @a.gtld-servers.net. orkut.com. ns
;; global options: printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: N
[discussing the traffic statistics reported at http://netflow.internet2.edu/ ]
#Note that this is biased by a very significant factor - we're looking here at
#Internet2 traffic *only*, which basically ends up meaning that email isn't seen
#unless both the sender *and* recipient are at one of the
The best GPL tool that I've come across in a long while, as far as network discovery
goes, would have to be the discovery engine inside Netdisco (http://www.netdisco.org).
This tool is fairly Cisco-centric, but Max has put a lot of work into a tool for
folks who are tired of CiscoWorks not wor
> On Thu, 6 May 2004 [EMAIL PROTECTED] wrote:
>
> > connectivity, not even wireless. But it does have an internal
> > 100baseTx Ethernet port that uses a non-standard connector.
> > And it also includes a router unit running off the same
> > power supply as the PC but otherwise completely indepen
I was wondering if anyone could recommend a good shareware or demo network discovery
tool. I was hoping to find something that will show vendor type during node
discovery. I came across a tool called network ferret that did the job, but nothing
downloadable.
I'm hoping to do some more work
On Thu, 06 May 2004 11:45:23 +0200, Iljitsch van Beijnum said:
> I object to the idea that requiring a software firewall inside a host
> is a reasonable thing to do. Why on earth would I want to run an
> insecure service and then have a filter to keep it from being used?
You object to it, I obje
On Wed, 05 May 2004 16:56:59 EDT, Marshall Eubanks said:
> Look at Table's 6, 7 and 8 - email, for example, is 1/2 %, so even if all email
> is spam, it's not that big a flow. Unidentified is typically about 30%, but
> most of that is probably file sharing.
Note that this is biased by a very sig
On Wed, 05 May 2004 12:55:04 PDT, Steve Gibbard said:
> Presumably, if it's being sent that means somebody wanted to send it, so
> the senders' desires are a pretty meaningless metric.
Actually, there's two cases:
1) the sender intended to send it, so the sender's desires don't matter
as we "know
On Thu, 6 May 2004 [EMAIL PROTECTED] wrote:
> connectivity, not even wireless. But it does have an internal
> 100baseTx Ethernet port that uses a non-standard connector.
> And it also includes a router unit running off the same
> power supply as the PC but otherwise completely independent.
Urg,
On May 5, 2004, at 7:31 PM, Christopher L. Morrow wrote:
On Wed, 5 May 2004, Patrick W.Gilmore wrote:
On May 5, 2004, at 2:39 PM, Smith, Donald wrote:
No. The router stays up. The tool I use is very fast. It floods the
GIGE
to the point that that interface is basically unusable but the router
itsel
On 5-mei-04, at 0:26, Rob Nelson wrote:
If the person doesn't continue to do acls/nat/firewalls, they'll just
get infected after the next hole is discovered. And yes, there are
plenty of holes that a firewall/nat box won't fix. Still, better than
the user only doing Windows Update on the day of
With all the spam, infected e-mails, DOS attacks, ultimately blackholed
traffic, etc. I wonder if there has been a study that quantifies
What percentage of the Internet traffic is junk?
Record Broken: 82% of U.S. Email is Spam
http://www.esecurityplanet.com/trends/article.php/3349921
-Hank
> "Microsoft is expected to recommend that the "average" Longhorn PC
feature a
> dual-core CPU running at 4 to 6GHz; a minimum of 2 gigs of RAM; up to a
> terabyte of storage; a 1 Gbit, built-in, Ethernet-wired port and an
802.11g
> wireless link; and a graphics processor that runs three times f
> With all the spam, infected e-mails, DOS attacks, ultimately blackholed
> traffic, etc. I wonder if there has been a study that quantifies
>
> What percentage of the Internet traffic is junk?
QED
45 matches
Mail list logo