Re: UUNET issues?

2006-11-04 Thread Michael Smith
On Nov 4, 2006, at 10:51 PM, Randy Bush wrote: "Could you be any less descriptive of the problem you are seeing?" the internet is broken. anyone know why? Did you ping it? is that what broke it? Please. That's how you *know* it's broken.

Re: UUNET issues?

2006-11-04 Thread Michael Smith
On Nov 4, 2006, at 7:45 PM, Randy Bush wrote: Chris L. Morrow wrote: "Could you be any less descriptive of the problem you are seeing?" the internet is broken. anyone know why? Did you ping it? Mike

Re: 3rd Party Cisco CWDM GBICs?

2005-02-14 Thread Michael Smith
> From: Aaron Thomas <[EMAIL PROTECTED]> > Date: Mon, 14 Feb 2005 11:52:46 -0800 > To: 'nanog list' > Subject: 3rd Party Cisco CWDM GBICs? > > > Hi List, > > Cisco currently provides 8 lambdas for CWDM and we have a 10 lambda > mux/de-mux system we want to make use of over a single fibre (5 da

Re: The Cidr Report

2005-02-13 Thread Michael Smith
> From: "Warren Kumari, Ph.D, CCIE# 9190" <[EMAIL PROTECTED]> > Date: Mon, 14 Feb 2005 10:14:38 -0500 > To: > Subject: Re: The Cidr Report > > > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > > On Feb 13, 2005, at 2:31 AM, Christopher L. Morrow wrote: > >> >> >> On Sat, 12 Feb 2005,

RE: Open-Source Network Management Tools

2004-09-17 Thread Michael Smith
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 > -Original Message- > From: Alexei Roudnev [mailto:[EMAIL PROTECTED] > Sent: Friday, September 17, 2004 12:53 AM > To: Michael Smith; [EMAIL PROTECTED] > Subject: Re: Open-Source Network Management Tools > > I alwa

RE: Open-Source Network Management Tools

2004-09-15 Thread Michael Smith
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 > I'm looking for open-source alternatives for network management, > such as Nagios or Big Brother. We are currently using WhatsUp Gold, > and would like to move to something more flexible (and not running > on a Windows platform). Something that ha

RE: 802.17 RPR and L2 Ethernet interoperablity (Ethernet over RPR)

2004-07-07 Thread Michael Smith
ginal Message- > From: Sam Stickland [mailto:[EMAIL PROTECTED] > Sent: Wednesday, July 07, 2004 3:28 AM > To: Michael Smith > Cc: [EMAIL PROTECTED] > Subject: RE: 802.17 RPR and L2 Ethernet interoperablity (Ethernet > over RPR) > > Thanks for the reply. Pretty much ev

RE: 802.17 RPR and L2 Ethernet interoperablity (Ethernet over RPR)

2004-07-06 Thread Michael Smith
Hello: I think this is pretty provider-specific. However, we are doing this right now with a particular vendor using their flavor of RPR. The ring uses Q in Q tunneling in the core and all switches communicate directly to one another using .1Q encapsulated frames. Mike > -Original Messa

RE: concern over public peering points [WAS: Peering point speed publicly available?]

2004-07-03 Thread Michael Smith
> -Original Message- > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of > Mikael Abrahamsson > Sent: Saturday, July 03, 2004 10:22 AM > To: [EMAIL PROTECTED] > Subject: Re: concern over public peering points [WAS: Peering point speed > publicly available?] > > > On Sat, 3

RE: OT: Looking for Ethernt/Optical Device

2004-06-01 Thread Michael Smith
above that DWDM is your only option, and a hell of a lot > >>more expensive. > >> > >>Cheers, > >> > >>-- > >>--- > >>Erik Haagsman > >>Network Architect > >>We Dare BV > >>tel: +31(0)10 7507008 > >&

OT: Looking for Ethernt/Optical Device

2004-06-01 Thread Michael Smith
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hello All: I'm wondering if anyone has seen a good and cheap(er) solution for providing multiple Gigabit Ethernet circuits over single pair of fiber. I'm looking for a way to do CWDM or DWDM that's cheaper than putting in a Cisco 15454 or 15327.

Best Common Practice - Listening to local routes from peers?

2004-02-26 Thread Michael Smith
#x27;m not sure if it's appropriate, generally speaking. If other operators would like to reply directly to me I would be more than happy to summarize to the list. Thank you for any assistance you can provide. Michael Smith [EMAIL PROTECTED]

RE: interesting article on Saudi Arabia's http filtering

2004-01-15 Thread H. Michael Smith, Jr.
For the record... I have first hand knowledge that KSA's filtering is not too effective. I'll abstain from the ethics/moral discussion. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Vadim Antonov Sent: Thursday, January 15, 2004 8:35 PM To: Randy Bush

RE: Pitfalls of annoucing /24s

2003-10-15 Thread H. Michael Smith, Jr.
IN Public Policy >Mailing List (PPML) and voice your opinion. > >http://www.arin.net/mailing_lists/index.html > >Forrest > > >-Original Message- >From: H. Michael Smith, Jr. [SMTP:[EMAIL PROTECTED] >Sent: Wednesday, October 15, 2003 4:24 PM >To:&

RE: Pitfalls of annoucing /24s

2003-10-15 Thread H. Michael Smith, Jr.
Even if they understand it, why should they accept it? If an ISP assigns an address block, runs BGP with the customer, promotes multi-homing, shouldn't they make a reasonable effort to make it work? Unless I am missing something, I am having a big problem with an ISP assigning a /24 to a multi-h

RE: Pitfalls of annoucing /24s

2003-10-15 Thread H. Michael Smith, Jr.
ng that I am missing something here. If not, I sure hope more folks don't adopt Verio's filtering techniques. (I know that a VERY low AS # issues /24's out of a /8) -Original Message- From: Phil Rosenthal [mailto:[EMAIL PROTECTED] Sent: Wednesday, October 15, 2003 5:42 PM T

RE: Pitfalls of annoucing /24s

2003-10-15 Thread H. Michael Smith, Jr.
What about the /24's that many ISPs (especially tier 2-3) are assigning to multi-homed customers? What about an IX or "critical infrastructure providers" that may be issued a /24 from ARIN (Policy 2001-3)? Although it may be rare that a large aggregate would become unreachable to a "large" net

Dynamic Internet Maps based on BGP table / AS_PATH

2003-09-09 Thread H. Michael Smith, Jr.
Hello All, A few months ago someone posted a URL to a tool that maps the Internet from the perspective of any (inputted) AS Number. Could someone send this URL (on- or off-list)? I've searched the archives, but I cannot find it. Thanks, Michael

RE: AS announcement question (easy)

2003-08-04 Thread H. Michael Smith, Jr.
el H. Michael Smith, Jr. Network Services and Security Manager Clark Atlanta University -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Mike Donahue Sent: Monday, August 04, 2003 2:22 PM To: '[EMAIL PROTECTED]' Subject: AS announcement quest

RE: Where is the edge of the Internet? Re: no ip forged-source-address

2002-11-07 Thread H. Michael Smith, Jr.
One of my clients is currently a victim of an over-zealous ISP recklessly trying to implement rpf. One (of two) ISPs are trying to monitor my customer's circuit by watching the serial interface (IP address) of the cpe (customer owned and controlled) router (IP address is from ISP's block). Due

RE: no ip forged-source-address

2002-10-30 Thread H. Michael Smith, Jr.
riginal Message- From: Christopher L. Morrow [mailto:chris@;UU.NET] Sent: Thursday, October 31, 2002 1:21 AM To: H. Michael Smith, Jr. Cc: 'Hank Nussbacher'; [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: RE: no ip forged-source-address On Wed, 30 Oct 2002, H. Michael Smith, Jr. wrote:

RE: no ip forged-source-address

2002-10-30 Thread H. Michael Smith, Jr.
A fundamental effect of spoofing addresses from your local subnet is that when the packets reach their target, the source addresses are meaningful. I realize that the traceability of these packets has already been mentioned, but I want to point out the profound difference between a DDoS attack wi

RE: ICANN Targets DDoS Attacks

2002-10-29 Thread H. Michael Smith, Jr.
0:26 AM To: fingers Cc: H. Michael Smith, Jr.; [EMAIL PROTECTED] Subject: Re: ICANN Targets DDoS Attacks I would point out that if we were to define it and provide the definition to the proper authorities, it would go a long way towards getting a definition that makes sense. I, (and many oth

RE: ICANN Targets DDoS Attacks

2002-10-29 Thread H. Michael Smith, Jr.
. -Original Message- From: fingers [mailto:fingers@;fingers.co.za] Sent: Tuesday, October 29, 2002 10:04 AM To: H. Michael Smith, Jr. Cc: [EMAIL PROTECTED] Subject: RE: ICANN Targets DDoS Attacks > Source address verification at access layer and rate limiting icmp would > be fine starts.

RE: ICANN Targets DDoS Attacks

2002-10-29 Thread H. Michael Smith, Jr.
Source address verification at access layer and rate limiting icmp would be fine starts. -Original Message- From: [EMAIL PROTECTED] [mailto:owner-nanog@;merit.edu] On Behalf Of fingers Sent: Tuesday, October 29, 2002 1:12 AM To: [EMAIL PROTECTED] Subject: Re: ICANN Targets DDoS Attacks

Re: Draft of Rep. Berman's bill authorizes anti-P2P hacking

2002-07-24 Thread Michael Smith
On 7/24/02 11:31 AM, "Adam Rothschild" <[EMAIL PROTECTED]> wrote: > > On 2002-07-24-14:10:00, James Thomason <[EMAIL PROTECTED]> wrote: >> If this legislation is passed, they certainly will earn Null0 on >> mine. > > Unless, of course, the RIAA, MPAA, and friends carry out their > cracking thr

Tools used accounting/billing

2002-03-05 Thread H. Michael Smith, Jr.
Hello All. Can anyone suggest tools to use for gathering statistics for billing purposes? I would like to know what tools are most common among ISPs. Thanks, Michael <>