Henry Linneweh <[EMAIL PROTECTED]> wrote:
> And just when things looked dismal this had to happen to make it
> more so
> http://www.washingtonpost.com/wp-dyn/articles/A1898-2004Jun24.html?referrer=email
And for those of us who either don't want to give their first born to
read it and/or find
- Original Message -
From: "Dr. Jeffrey Race" <[EMAIL PROTECTED]>
To: "Smith, Donald" <[EMAIL PROTECTED]>
Cc: <[EMAIL PROTECTED]>
Sent: Thursday, June 24, 2004 6:22 PM
Subject: RE: Attn MCI/UUNet - Massive abuse from your network
>
> On Thu, 24 Jun 2004 21:39:26 -0600, Smith, Donald wro
Since I've been hitting a lot of looking glass sites on traceroute.org
lately that no longer worked, I decided to make my own list in wiki
form. That way, as links drop off the face of the earth, or as new
looking glass pages turn up, the community can edit the wiki page to
keep it current.
I
Janet, all,
FYI Traceroute.org is updated approx once a month, most of the input is
based on user feedback these days since automated checking is usually
rejected by a lot (most) webmasters in order to prevent automated querries
so I get a lot of false positives. Also, since quite a few of these
This report has been generated at Fri Jun 25 21:43:33 2004 AEST.
The report analyses the BGP Routing Table of an AS4637 (Reach) router
and generates a report on aggregation potential within the table.
Check http://www.cidr-report.org/as4637 for a current version of this report.
Recent Table Hist
Thomas Kernen wrote:
Since I've been hitting a lot of looking glass sites on traceroute.org
lately that no longer worked, I decided to make my own list in wiki
form.
> FYI Traceroute.org is updated approx once a month, most of the input
> is based on user feedback these days since automated check
> From the AOL theft article:
> "The revelations come as AOL and other Internet providers have
> ramped up their efforts to track down the purveyors of spam, which
> has grown into a maddening scourge that costs consumers and
> businesses billions of dollars a year."
Interesting. An insider at
Michael, I agree totally. Every ISP I know of is working to combat spam.
They all have a staffed abuse desk. They all coordinate with other ISP's
that is one of the reasons I joined this list.
I believe its time to move this to the next level. Follow the money.
When you see spam report it to the
>>> Pete Kruckenberg <[EMAIL PROTECTED]> 6/24/04 5:09:19 PM >>>
>It's been so long since I learned network troubleshooting
>techniques I can't remember how I learned them or even how I
>used to do it (so poorly).
>
>Does anyone have experience with developing a
>skills-improvement program on this
Well said sir!
Scott C. McGrath
On Fri, 25 Jun 2004 [EMAIL PROTECTED] wrote:
>
> > From the AOL theft article:
> > "The revelations come as AOL and other Internet providers have
> > ramped up their efforts to track down the purveyors of spam, which
> > has grown in
On Thu, Jun 24, 2004 at 09:54:14PM -0700, Henry Linneweh wrote:
>
> And just when things looked dismal this had to happen
> to make it more so
>
> http://www.washingtonpost.com/wp-dyn/articles/A1898-2004Jun24.html?referrer=email
http://bugmenot.com/view.php?url=washingtonpost.com
-Setzer
Has anyone noticed that the DHS plan is probably closer to the current
status of things than the FCC one is?
AFAIK, Currently this information _isn't_ required to be publicly
reported. The FCC wants it to be.
DHS would prefer that it be semi-public at best - just like Michael
Dillion wants.
What I am proposing is have a registry that you must register
with before other mail servers will accept mail from you. Similar to how
MAPS RBL works, but the mail server itself, enforces it, rather than a
firewall or a ancillary device ACL. This could be made a standard of
SMTP.
LP
Bes
Larry Pingree writes on 6/26/2004 12:11 AM:
What I am proposing is have a registry that you must register
with before other mail servers will accept mail from you. Similar to how
MAPS RBL works, but the mail server itself, enforces it, rather than a
firewall or a ancillary device ACL. This could b
At 04:00 PM 6/24/2004, Hannigan, Martin wrote:
> >On Thu, 24 Jun 2004, Ben Browning wrote:
> this discussion anyways, is access to the internet. When the
> actions of a
> downstream damage that product(IE more and more networks
> nullroute UUNet
> traffic),
[ Operations content: ] Do you know of an
** Reply to message from Brad Knowles <[EMAIL PROTECTED]> on Fri,
25 Jun 2004 18:14:43 +0200
> At 8:44 AM -0700 2004-06-25, Jeff Shultz wrote:
>
> > At least if someone in this "clearing house" sells it to the
> > terrorists, they will have had to work for it a bit, instead of having
> > us h
> Food for thought: Could an analyst, looking at outage reports over a
> period of time, build a schematic that would demonstrate that if you
> took out n points, you'd kill x% of data traffic in and out of
> $pickyourmetropolitanarea?
>
> If this analyst were working for Bin Ladin
Yes an
** Reply to message from [EMAIL PROTECTED] on Fri, 25 Jun 2004
17:12:45 +0100
> Remember, that packet switched networking
> originated with the desire to build a telecom
> network that could survive massive destruction
> on the scale of a nuclear war, but continue to
> function. If we apply that
[EMAIL PROTECTED] wrote something like:
> Some ad hoc terrorists, in a country crawling with US troops, with a
> communications infrastructure nowhere as advanced as the USA just
> managed to coordinate a multiple bomb attack simultaneously.
I just got back from lunch at the Wok Inn (Morrill's
Jeff Shultz wrote:
** Reply to message from Brad Knowles <[EMAIL PROTECTED]> on Fri,
25 Jun 2004 18:14:43 +0200
At 8:44 AM -0700 2004-06-25, Jeff Shultz wrote:
At least if someone in this "clearing house" sells it to the
terrorists, they will have had to work for it a bit, instead of having
us ha
>Do you really think that if we publish all the insecurities of the
>Internet infrastructure that anyone is gonna stop using it, or
>business, government, and private citizens are going to quit depending
>on it?
That is a totally foolish statement in today's world. The incentive for
fixing the
On Fri, 25 Jun 2004, Ben Browning wrote:
> At 04:00 PM 6/24/2004, Hannigan, Martin wrote:
> >[ Operations content: ] Do you know of any ISP's null routing AS701?
>
> ISPs? Not of the top of my head. I know several businesses who have, and a
> great many people who have blocked UUNet space from sen
I think that is a bit irresponsible for the simple
reason that MCI has many co-lo clients and any of
their machines could be vulnerable, I think also that
needs to addressed so that blanket statements are
supported by fact and not the need to competitively
break a company down in hopes the you can
I noticed that recently on Geektools also and that
needs to updated and or fixed
-Henry
--- Janet Sullivan <[EMAIL PROTECTED]> wrote:
>
> Thomas Kernen wrote:
>
> >>Since I've been hitting a lot of looking glass
> sites on traceroute.org
> >>lately that no longer worked, I decided to make my
>
This is an automated weekly mailing describing the state of the Internet
Routing Table as seen from APNIC's router in Japan.
Daily listings are sent to [EMAIL PROTECTED]
If you have any comments please contact Philip Smith <[EMAIL PROTECTED]>.
Routing Table Report 04:00 +10GMT Sat 26 Jun, 2004
On Fri, 25 Jun 2004 09:11:36 PDT, Larry Pingree said:
>
> What I am proposing is have a registry that you must register
> with before other mail servers will accept mail from you. Similar to how
> MAPS RBL works, but the mail server itself, enforces it, rather than a
> firewall or a ancillar
On Sat, 26 Jun 2004 00:15:37 +0800, Suresh Ramasubramanian said:
> That's great. Let's all return to the good old days of X400 and UUCP
I have to congratulate you... it's been a while since anybody's managed to
bring back two entirely distinct sets of repressed nightmares in one line. :)
pgpPc
On Fri, 25 Jun 2004 09:47:07 PDT, Jeff Shultz <[EMAIL PROTECTED]> said:
> The problem with being totally open about infrastructure is that there
> are some vulnerabilities that simply cannot or will not be fixed -
> wires sometimes have to run across bridges, redundant pumping stations
> are too
> Only one customer? There are a couple "consulting" firms in
> particular around here that use arbitrary space on internal
> networks. Sometimes a currently-dark IP block is configured, so
> "it works for us". It gets annoying after a while.
The worst one I've seen so far is Ticketmaster... l
Authentication and Authorization are two separate and distinct
issues. TLS and Authentication have been around for quite a while, but
without centralized authorization it will never be deployed by disparate
corporations for inter-domain mail! This will not stop spam. Unless of
course you w
On 2004-06-25T12:47-0700, Larry Pingree wrote:
) single customer that you want to have conversations with. Authorization
) must still be authorized by a third party agency which verifies
) validity between everyone involved in communications.
You seem to be making a case for only accepting GPG-s
At 3:29 PM -0400 6/25/04, Eric Gauthier wrote:
> Only one customer? There are a couple "consulting" firms in
particular around here that use arbitrary space on internal
networks. Sometimes a currently-dark IP block is configured, so
"it works for us". It gets annoying after a while.
The wors
Hi,
The IETF's NETCONF WG is trying to select a retrieval filter mechanism
for use with and operations. The fundamental
issue is whether to use a subset of the XPath language or
whether to define a mechanism based on XML subtree matching.
Your comments can help us decide which propsal to choos
Larry Pingree [25/06/04 12:47 -0700]:
>
> Authentication and Authorization are two separate and distinct
> issues. TLS and Authentication have been around for quite a while, but
> without centralized authorization it will never be deployed by disparate
I'm sure the IETF MARID list would be
On 04/6/24 at 5:09 PM -0600, Pete Kruckenberg wrote the following :
>I'm working on trying to teach others in my group (usually
>less-experienced, but not always) how to improve their
>large-network troubleshooting skills (the techniques of
>isolating a problem, etc)
I took a 5 day course in ano
35 matches
Mail list logo