RE: interesting article on Saudi Arabia's http filtering

2004-01-15 Thread H. Michael Smith, Jr.
For the record... I have first hand knowledge that KSA's filtering is not too effective. I'll abstain from the ethics/moral discussion. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Vadim Antonov Sent: Thursday, January 15, 2004 8:35 PM To: Randy Bush

RE: Pitfalls of annoucing /24s

2003-10-15 Thread H. Michael Smith, Jr.
IN Public Policy >Mailing List (PPML) and voice your opinion. > >http://www.arin.net/mailing_lists/index.html > >Forrest > > >-Original Message- >From: H. Michael Smith, Jr. [SMTP:[EMAIL PROTECTED] >Sent: Wednesday, October 15, 2003 4:24 PM >To:&

RE: Pitfalls of annoucing /24s

2003-10-15 Thread H. Michael Smith, Jr.
Even if they understand it, why should they accept it? If an ISP assigns an address block, runs BGP with the customer, promotes multi-homing, shouldn't they make a reasonable effort to make it work? Unless I am missing something, I am having a big problem with an ISP assigning a /24 to a multi-h

RE: Pitfalls of annoucing /24s

2003-10-15 Thread H. Michael Smith, Jr.
ng that I am missing something here. If not, I sure hope more folks don't adopt Verio's filtering techniques. (I know that a VERY low AS # issues /24's out of a /8) -Original Message- From: Phil Rosenthal [mailto:[EMAIL PROTECTED] Sent: Wednesday, October 15, 2003 5:42 PM T

RE: Pitfalls of annoucing /24s

2003-10-15 Thread H. Michael Smith, Jr.
What about the /24's that many ISPs (especially tier 2-3) are assigning to multi-homed customers? What about an IX or "critical infrastructure providers" that may be issued a /24 from ARIN (Policy 2001-3)? Although it may be rare that a large aggregate would become unreachable to a "large" net

Dynamic Internet Maps based on BGP table / AS_PATH

2003-09-09 Thread H. Michael Smith, Jr.
Hello All, A few months ago someone posted a URL to a tool that maps the Internet from the perspective of any (inputted) AS Number. Could someone send this URL (on- or off-list)? I've searched the archives, but I cannot find it. Thanks, Michael

RE: AS announcement question (easy)

2003-08-04 Thread H. Michael Smith, Jr.
el H. Michael Smith, Jr. Network Services and Security Manager Clark Atlanta University -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Mike Donahue Sent: Monday, August 04, 2003 2:22 PM To: '[EMAIL PROTECTED]' Subject: AS announcement quest

RE: Where is the edge of the Internet? Re: no ip forged-source-address

2002-11-07 Thread H. Michael Smith, Jr.
One of my clients is currently a victim of an over-zealous ISP recklessly trying to implement rpf. One (of two) ISPs are trying to monitor my customer's circuit by watching the serial interface (IP address) of the cpe (customer owned and controlled) router (IP address is from ISP's block). Due

RE: no ip forged-source-address

2002-10-30 Thread H. Michael Smith, Jr.
riginal Message- From: Christopher L. Morrow [mailto:chris@;UU.NET] Sent: Thursday, October 31, 2002 1:21 AM To: H. Michael Smith, Jr. Cc: 'Hank Nussbacher'; [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: RE: no ip forged-source-address On Wed, 30 Oct 2002, H. Michael Smith, Jr. wrote:

RE: no ip forged-source-address

2002-10-30 Thread H. Michael Smith, Jr.
A fundamental effect of spoofing addresses from your local subnet is that when the packets reach their target, the source addresses are meaningful. I realize that the traceability of these packets has already been mentioned, but I want to point out the profound difference between a DDoS attack wi

RE: ICANN Targets DDoS Attacks

2002-10-29 Thread H. Michael Smith, Jr.
0:26 AM To: fingers Cc: H. Michael Smith, Jr.; [EMAIL PROTECTED] Subject: Re: ICANN Targets DDoS Attacks I would point out that if we were to define it and provide the definition to the proper authorities, it would go a long way towards getting a definition that makes sense. I, (and many oth

RE: ICANN Targets DDoS Attacks

2002-10-29 Thread H. Michael Smith, Jr.
. -Original Message- From: fingers [mailto:fingers@;fingers.co.za] Sent: Tuesday, October 29, 2002 10:04 AM To: H. Michael Smith, Jr. Cc: [EMAIL PROTECTED] Subject: RE: ICANN Targets DDoS Attacks > Source address verification at access layer and rate limiting icmp would > be fine starts.

RE: ICANN Targets DDoS Attacks

2002-10-29 Thread H. Michael Smith, Jr.
Source address verification at access layer and rate limiting icmp would be fine starts. -Original Message- From: [EMAIL PROTECTED] [mailto:owner-nanog@;merit.edu] On Behalf Of fingers Sent: Tuesday, October 29, 2002 1:12 AM To: [EMAIL PROTECTED] Subject: Re: ICANN Targets DDoS Attacks

Tools used accounting/billing

2002-03-05 Thread H. Michael Smith, Jr.
Hello All. Can anyone suggest tools to use for gathering statistics for billing purposes? I would like to know what tools are most common among ISPs. Thanks, Michael <>