Re: Order of ASes in the BGP Path

2005-08-30 Thread Abhishek Verma
> As no one has asked yet, allow me.. what are you trying to do?   Basically I was thinking on these lines.   If i have an AS path {1 2} [3 4] { 5 } then is it possible to pull the AS in the last segment and merge it with the first segment? This would give me {1 2 5} [3 4]. This way i dont need to

Re: Order of ASes in the BGP Path

2005-08-29 Thread Abhishek Verma
Since i smell some traces of sarcasm here. On 8/30/05, Randy Bush <[EMAIL PROTECTED]> wrote: > I thank everyone who took time off their busy schedules and answered me on> this. I now understand that people do look at the AS_PATH and the order of > ASes is important for debugging, etc.and thank you

Re: Order of ASes in the BGP Path

2005-08-29 Thread Abhishek Verma
at 10:15:26PM +0530, Abhishek Verma wrote:>> Hi,>> Is the order of AS numbers (except for perhaps the first one which > denotes the AS the route was originated from) in the AS_PATH in BGP> important? In fact, does anybody even care for the first AS number> that appears in the P

Order of ASes in the BGP Path

2005-08-29 Thread Abhishek Verma
Hi, Is the order of AS numbers (except for perhaps the first one which denotes the AS the route was originated from) in the AS_PATH in BGP important? In fact, does anybody even care for the first AS number that appears in the Path? AFAIK, AS numbers in the BGP serves two purposes. It helps in lo

BGP AS Sets in the wild

2005-08-23 Thread Abhishek Verma
Hi, I was looking at route-views.routeviews.org for the BGP routes and i dont see any AS-Sets whatsoever. Are BGP routes with AS-SETs not generally leaked into the wild? Is this the case? I am under the impression that AS_SETs are generated whenever there are some routes that are aggregated. Is

Re: Blocking certain terrorism/porn sites and DNS

2005-08-18 Thread Abhishek Verma
coz i assumed that everyone wants to block such sites. sorry if i hurt some feelings. apologies, abhishek On 8/18/05, Randy Bush <[EMAIL PROTECTED]> wrote: > > Again, I am not discussing "censoring ideas". > > then why did you use emotionally loaded words such as "terrorist?" > > randy > >

Re: Blocking certain terrorism/porn sites and DNS

2005-08-18 Thread Abhishek Verma
> It was bad enough back in the '90s when Internic refused to accept > registration of certain four letter words. DNS is not a proper venue > for censoring ideas. Again, I am not discussing "censoring ideas". I want to know if its indeed "tehnically" possible and feasible to block a website URL

Re: Blocking certain terrorism/porn sites and DNS

2005-08-18 Thread Abhishek Verma
> > If we, is the US department of commerce, the answer is probably yes. > > The only operational significance, is that there is no way easy way of > estimating in advance the effect of removing valid DNS information from the > system, unless you are the administrator of the system concerned (an

Re: Blocking certain terrorism/porn sites and DNS

2005-08-18 Thread Abhishek Verma
>> Will this work? > > It would stop them using whichever hostnames you banned but do you really > think this would stop them using the internet. No, that wasnt my point. I just wanted to make sure that my understanding of banning a hostname was indeed correct. We can this way atleast block all

Blocking certain terrorism/porn sites and DNS

2005-08-18 Thread Abhishek Verma
Hi, I have a doubt which i am sure a lot of people in this list would be able to help me with. There was news that terror groups like Al Qaida, etc. are using internet to promote their terror links and these web sites provide online training on how one could assemble bombs, etc. The community a

Re: OSPF -vs- ISIS

2005-06-27 Thread Abhishek Verma
Hi Manav, Excellent Document! I see that this document has expired. Are you folks thinking of respinning a copy of this draft? Thanks, Abhishek On 6/23/05, Manav Bhatia <[EMAIL PROTECTED]> wrote: > > Hi Daniel, > > We wrote a draft some time back comparing the two protocols ISIS and OSPF. >

Routes Selection

2004-10-07 Thread Abhishek Verma
Hi, Given two routes similar in preference (BGP steps) where each is received from a different ISP (or technically speaking an AS). How do I as a network operator decide which one to install in the forwarding table? Here goes the list of options that i have: (a) I can install both the routes in

Blackhole Routes

2004-09-29 Thread Abhishek Verma
Hi, There are ways to add static routes that can be blackholed. I can understand the utility of such routes if those are installed in my forwarding table. What bewilders me is why would anyone want to advertise "blackhole" routes using say, BGP? Is it only to prevent some sort of DoS attacks or

RIP in Operation

2004-09-16 Thread Abhishek Verma
Hi, I am sure that there would be very few people running RIP in their networks, but since the IETF RIP mailing list is dead, and also because its more of an operational question, the Nanog list felt most appropriate to me for the following post. Why would you, as an operator, recieve RIPv2 Requ

Problem

2004-09-13 Thread Abhishek Verma
Hi Nanogers, A brief introduction before i begin. I am Abhishek and am doing my masters in Comp Sc. from IT BHU. This is my first mail to Nanog, which i believe has the most number of network operators in its list. We have simulated a mini model of the Internet here in our labs with around 50 de