hour of every day for
those 3 years and there would still be many networks filtering those
networks. The only way to catch it is to notice the block and make contact
with the network. In many cases, personal contact is necessary as emails are
often misunderstood or ignored.
Jack Bates
BrightNet
From: Avi Freedman
Router CPUs average 50%, and S-BG adds 10% (paraphrase)
Average is somewhat less relevant than common peaks.
GSRs and 7500s and 7200s all get up there at 90+% on the real Internet.
I agree. I'm have a tricked 7200 managing 3 peers. Normal traffic
utilization rate is 30%
From: Avi Freedman
snip
: Why don't SWIP forms include Origin-AS?
Ahem. Origin-AS(s) - plural. Agreed - mildly. Of course, SWIP isn't
updated when delegation info changes, so origin AS(s) would get just as
stale as contact info.
If networks are filtering based on SWIP information, it
Why is probing networks wrong?
I would agree exploiting vulnerabilities discovered from probing networks
is wrong. But I don't agree that probing is inherently wrong.
People probe networks for great reasons. Likewise, people have the ability
to prevent other people from probing their
From: Marshall Eubanks
Can anyone else get to ripe.net ?
I cannot seem to access the whois or any other service (my ripe traffic
goes through Sprint).
When I ping peach.ripe.net, I get 90%+ missing packets + destination
host unreachable
from inside Sprint.
The same goes for me via
From: Remco van de Meent [EMAIL PROTECTED]
[I cannot post on nanog hence this private mail]
RIPE NCC just sent an email to the AMS-IX list stating that they are
currently experiencing an ICMP DDOS attack.
cheers, Remco.
From: Tim
Rand
Hi -
I have searched the archives but have not found an answer to my question
- is there any danger in using excessively high TTL values with
ebgp-multihop? For example, neighbor x.x.x.x ebgp-multihop
255 - 255 is generally much higher than needed, but is
From: [EMAIL PROTECTED]
We (Atlantic.Net) have gotten a flurry of abuse complaints from people
who's systems have been scanned by 209.208.0.15 (rt.njabl.org...a DNSBL
hosted on our network). I'm hoping the new PTR record will head off many
complaints now.
For the past 15 months, NJABL
From: E.B. Dreger
Even after the NANOG thread months back? Yuck.
Yes. This last weekend, the state network added a Bogon list to their
routers. Too bad the list they chose still had 69/8 in it. Not that I mind.
The complaint came from a customer who's multi-homed between us. I like it
when
From: Adam Kujawski
Fiber Network Solutions and Cogent Communications are pleased to announce
that
Cogent Communications has agreed to acquire the major assets of FNSI,
including
all FNSI customers.
snip self-righteousnous
With the constant change in the global network represented by the
would be difficult to say the
least.
Jack Bates
BrightNet Oklahoma
From: Charles Youse
My main concern is that some of the sites that will be tied with VoIP have
only T-1 data connectivity, and I don't want a surge in traffic to degrade
the voice quality, or cause disconnections or what-have-you. People are
more accustomed to data networks going down; voice
From: Stewart, William C (Bill), SALES
I think the key is that the failures described in the paper
are caused by overload rather than other things -
too much demand for power blows out the generator,
and without it, the grid tries to get the power from the next
nearest generators, which
N. Richard Solis
wrote:
Yeah yeah yeah. I know that everything isn't
simple. I actually worked at a power plant so
none of this is new to me. Can cascading failures occur?
Yes. Witness the Great Blackout in
NYC. My point was that there are places where the electrical
network is designed
Does anyone on the list know of any ISPs that bill based on average
utilization, rather than some variation of 95th percentile?
We look at an mrtg graph and pick a nice spot on the graph that looks like
it is pushing enough bandwidth. We call this the eye-ball averaging
method. No complaints
From: ren
*top post corrected*
At 08:54 PM 2/3/2003 -0800, Bill Woodcock wrote:
On Mon, 3 Feb 2003, Pete Kruckenberg wrote:
What systems/processes do you use to track all of this
information, and associate it to overall business success?
Customers Happy + (Bean Counter
From: Daniel Senie
The question this raises is whether you're concerned about MTA to MTA
communication, or MUA to MTA? I'd be happy to see certs in use for MTA-MTA
(and indeed support this today on my systems when talking to other MTAs
which are using STARTTLS). However, there are definitely
From: Andy Walden
On 4 Feb 2003, John R. Levine wrote:
It would be nice if we could use SMTP-AUTH on port 25, but the
spammers ruined that for us around the same time they ruined courtesy
relay.
How did they ruin SMTP Auth? Thanks.
ip access-list 100 deny ip any any eq 25
From: Dave Crocker
A flag day is not possible for changing the infrastructure of any
network operation that is large. Even when there is a single authority,
service operators cannot perform a conversion instantly.
That is true. However, there comes a day when enough people are
From: Sean Donelan
Historically providers have been reluctant to provide that level of
detail concerning traffic levels. A few providers, generally smaller
ones, do make MRTG graphs available. Once in a while a provider will
announce they had X Peta/Terrabytes of traffic for some time
From: Sean Donelan
Who has the biggest wall of big screen monitors?
To my knowledge, Norad still does.
quoted from article
The Global Early Warning Information System, (GEWIS, pronounced
gee-whiz)
[...]
Mark Rasch, former head of the Justice Department's Computer Crime division,
questioned
From: Stephen Stuart
Billing disputes in the exchange point now involve three parties, and
become more complex as a result - this, in theory, results in the
technology not reducing op-ex but shifting it from the operations
department to the accounting and legal departments.
If a proper
From: Sean Donelan
snip
On the other hand, security is a much bigger win for a larger provider
than for a small provider. As Willie Sutton use to say, he robbed banks
because that's were the money was. Larger providers have more exposure,
and more to loose. Even a non-directed attack such
From: Iljitsch van Beijnum
If my regular saturday morning traffic is 50 Mbps and a worm generates
another 100, then 150 Mbps is a valid need as being limited to my usual
50 Mbps would mean 67% packet loss, TCP sessions go into hibernation and
I end up with 49.9% Mbps of worm traffic.
But a
From: Simon Waters
40 years of experience says it is unreasonable to expect the programmer to
get it right 100% of the time.
A modern server or Desktop OS is measured in hundreds of millions of lines
of code, what is an acceptable error rate per line of code?
Perhaps I'm missing it, but is
From: Dave Crocker
The goal is to obtain a coherent recommendation that is acceptable to
the Ops and the Email communities.
Email communities? You can't even get people to do proper reverse or secure
open relays. A large section of the 'net isn't RFC compliant. Most servers
are privately
is effected by different loads and which direction cascade failures
will go. Luckily, I have a relatively small network, yet such an
understanding and research should exist for any network regardless of size.
The records of both worms should be indications of the weak points in
people's networks.
Jack
necessarily in the bug but in the
education and notification.
Jack Bates
BrightNet Oklahoma
and maintain or
do you strive to push it to the envelope? Do you truly know your network?
Remember, it's a living, breathing thing. The complexity of variables makes
complete predictability impossible, and so we must learn to understand it
and how it reacts.
Then again, perhaps I'm a lunatic. :)
Jack
such as policy routing to save mass amounts of cpu time. I'm
still a neophyte when it comes to tag switching. Others might help better in
that.
Jack Bates
BrightNet Oklahoma
because someone didn't advise them properly
on handling security? There is such a thing as making penalties too stiff.
Many good businesses would be afraid to participate. Oh, wait. Never mind.
They'd have Internet Vulnerability insurance.
Jack Bates
BrightNet Oklahoma
somehow.
So what you're saying is that a really good worm could infiltrate any secure
network by targetting those who vpn from exterior sources, collect data, and
then run? Hmmm. Wait a sec. Would that constitute a worm if it had purpose?
Jack Bates
Network Engineer
to
inbound and outbound.
Jack Bates
Network Engineer
BrightNet Oklahoma
and outbound.
Jack Bates
Network Engineer
BrightNet Oklahoma
to go on, though,
so my assessment may not be accurate.
Jack Bates
BrightNet Oklahoma
other ports it uses (due to
various security models), but 1434 is a constant in all configurations
according to a quick search and a read on the last MS SQL vulnerability
found in 7/2002.
Jack Bates
BrightNet Oklahoma
created a lot
of Internet traffic hurting performance? That's a little underrated. But
then again, it's a port that could be blocked and not cause severe damage.
Block tcp/80 and people would through a fit.
*mental note: Block port 80 anytime another port must be blocked just to be
sure.
Jack Bates
that doesn't seem
right. In general, as most EUs are finding out as they install them pesky
firewalls, the 'net is full of noise.
Jack Bates
Network Engineer
BrightNet Oklahoma
won't
be able to handle traffic anyways, and it is better to cut off a portion of
the network than lose the entire network.
Jack Bates
Network Engineer
BrightNet Oklahoma
. They could be tunneling IP over any number of protocols commonly
used by banks. In essence, only one piece of common equipment has to be shut
down to cause a problem.
Jack Bates
BrightNet Oklahoma
for 5 minutes* Oh, wait.
Never mind, I got it. Go back to sleep. Thanks.
Jack Bates
Network Engineer
BrightNet Oklahoma
responsibility
is only to the edge of their controllable network, though. If you can't shut
off the ethernet port to an infected server, the customer is responsible for
that equipment. Ideally, you have one customer per each circuit that you
control.
Jack Bates
Network Engineer
BrightNet Oklahoma
of CityBank. :) Then again,
he may have died of old age by now.
Jack Bates
Network Engineer
BrightNet Oklahoma
can serve DNS from a MS-SQL database. Then
again, they could just be smart and be paranoid. If I had a private network
where security was required to be high, I'd have pulled the plug until the
storm was over. Why take chances?
Jack Bates
BrightNet Oklahoma
. Another
example would be the recent 69/8 issues; Smart networks trying to protect
themselves and damaging legitimate traffic in the process.
Jack Bates
Network Engineer
BrightNet Oklahoma
www.gwww.aol.com (205.188.160.121, 80)... Open
GET /
htmlhead
snip html
Any other tests?
Jack Bates
Network Engineer
BrightNet Oklahoma
201 - 246 of 246 matches
Mail list logo