Nicole wrote:
So.. I guess we will be cranking out those H1b's...Plan to kiss your
raises
and or jobs bye bye to some specialized cheap imported Cisco trained
networking person from China.
There is an implicit assumption here that the objective of 100% of these
trainees will be to move as economic
Robert Blayzor wrote:
One would hope that they're rejecting the incoming mail with a 400
series error and not 500 series.
Where does the 400lb gorilla lie down ? Whereever it likes.
AOL does pretty much anything it wants to. If they start 500'ing your mail,
it becomes your problem. Unless you have
Paul Vixie wrote:
besides which, i hated the phone. i couldn't get it out of my
pocket without hitting the voice-call button. the asynchronous
nature of the java-based UI meant that the softkeys often changed
what they meant while i was trying to press one. what a total
piece of garbage.
Yep, al
Michel Py wrote:
In other words: as of today a large part of the bandwidth is allocated
to building everyone's collection of files. This might gradually
change to become bandwidth being used only for incremental updates as
huge local file libraries become common place.
But this possible assumes tha
Michel Py wrote:
2) Make audio CD's unreadable in a computer so nobody can rip the .wav
tracks to .mp3. Totally stupid:
2.a) Remember the last ones that tried (namely Sony)? Their protection
scheme could be defeated in 2 seconds with a sharpie. I'm still
laughing at it. Hara-kiri comes to mind.
...
Lars Erik Gullerud wrote:
Then there's always the option to implement something else. Hm, where
can I order a CARP license again...?
... which is why I think I used VRRP as an example - "ignore and replace" as
opposed to "embrace and extend".
In answer to Mark Borchers' point about the IETF draft
Stephen J. Wilcox wrote:
> 2) she "only uses the pc for web browsing, if it gets infected theres
> no harm that can be done"
>
> So how do you argue with that?
I think we have to learn to explain to the "normal" people, without scaring
them too much, that their PCs are part of a big online world
Larry Pingree wrote:
> Can you suggest another method that would have more accuracy? I think
> it's ridiculous that every service on the internet is provided without
> any authentication and integrity services, if we allowed anyone to
> call from anywhere within the telephone network, you'd have r
> Or, go see the movie "Super Size Me" - you might just give up McDonald's
> entirely, reducing your risk of burns from their overheated coffee. :)
Haven't been in one on over 2 years - and not through any great principal, I
just stopped. Odd how our tastes change with age ;-)
Peter
Eric Kuhnke wrote:
Here it is, complete with OC-768 interface:
http://www.cisco.com/en/US/products/ps5763/index.html
Today's Financial Times in the UK carried a mutli-page (1/3rd or so of
each broadsheet page) series of ads for this platform.
Ergh, the worst fluffy "now you can do this" marketing
Eric A. Hall wrote:
What's most interesting about the half-dozen accusations of xenophobia
I've received (off-list and on) is that they've almost all come from
foreigners. I promise not to read anything into that. Really.
Could it be perhaps because us foreigners are conditioned by repeated
exposu
Richard Cox wrote:
> This is known as "call-gapping" and is not without some controversy.
Richard doesn't say - cause he's too polite - is that in the UK you can
*buy* this service as a customer. Oh, I only want 1 in 20 calls to arrive
please... This has started to die as more and more large call
Alexei Roudnev wrote:
> Cisco source codes never were a top secret, many people around the
> world had access to them (and I believe, it explains Cisco's
> stability and success).
... and here is to hoping that Cisco don't try to use this incident, if it
gets coverage outside a narrow readership,
Todd Vierling wrote:
> With this and the patent funny business, I don't know if I can roll
> my eyes any further into the back of my head.
I dunno, but perhaps there is a (new) policy of applying for a patent for
every bug fix or code change in IOS - just in case the incompetent USPTO
grants one
E.B. Dreger wrote:
> I don't think we're even that far along. If I'm reading FreeBSD
> 4.9 and NetBSD 1.6.2 source correctly,
>
> /usr/src/sys/netinet/in_pcb.c
Should have stretched as far as OpenBSD then. Same file.
> tells all.
> AFAIK, sequential search is about it. Try a port number, veri
Henry Yen wrote:
> s/most profitable company/convicted (and continuing) OS\&browser
> monopolist/
Sadly the two are not incompatible it appears. If the "rewards" of breaking
the law were normally so good, then most of us would be down at the
localbank with a shotgun... actually, given the audienc
John Curran wrote:
> incidents from almost every router vendor on the planet (and simply
> don't buy from the ones that fail to correct the problem).
Yep, that's the important one to me. Most of the time I don't really care
when a "brand" makes a stupid mistake, what I judge the company on is the
Charles Sprickman wrote:
> This is yet another misguided effort to semi-telepathically tell if a
> sender is "suspicious". Personally, I see nothing odd about a largish
> operation having one set of servers accepting mail and another set
> exclusively acting as smtp relays for customer mail. Peo
Laurence F. Sheldon, Jr. wrote:
> Peter Galbavy wrote:
>
>> OK, it isn't secret - since I know about it for a start - but the
>> terms are secret and also it is very under-advertised to the locals.
>> Wonder what other countries have sold their souls to Satan ?
&g
Joshua Brady wrote:
> The "Child" you speak of caused destruction over a network, the same
> applied for the 2 hackers here who were sent over without even
> questioning the UK. If the US Government is Satan then I suppose I am
> going to hell, because I sure as hell support it.
Do you support th
Dave Howe wrote:
> cause - which is *not* true in reverse, or for any other country. Up
> until recently, the US authorities would have had to make a case for
> extradition and/or arrest to a UK judge before the local plod would
> even be informed that there was an interest in the kid
Not th
[EMAIL PROTECTED] wrote:
> PS: Without Satan, there would be no Internet for you to express your
> considered opions on.
So the work at the University of London was just incidental ?
Peter
Rachael Treu wrote:
> Guys...firewall is as generic a term as any. Saying grandma needs a
> router does not mean that an M20 is interchangeable with her Linksys.
You're preaching to a list with people on it who invented the terms you are
using *and* wrote the books. Stop lecturing and *listen*.
Alexei Roudnev wrote:
> Of course, not - he is not from USA (more likely), the end.
> Why people believe, that this acts means ANYTHING? In Internet, they
> (acts) means NOTHING.
Unless they live in a country that has a "secret" treaty with the US, like
the UK has had for some years, where any US
For those interested in this sort of thing:
(I glanced at the early code a while back, and like anything Henning has
written, seemed clean and neat).
Henning Brauer wrote:
> CVSROOT: /cvs
> Module name: src
> Changes by: [EMAIL PROTECTED] 2003/12/17 04:46:54
>
> Added files:
> usr.sbin/bgpd : M
Deepak Jain wrote:
> Is there a documented process for a new CA to get their certs
> approved/added or is it a clandestine process?
"You are in a twisty little maze of corporate back scratching, all
political."
Peter
[EMAIL PROTECTED] wrote:
> It's the same reason that I like to ask candidates to tell a story
> about some past event and how they, personally, dealt with it. If a
> candidate has had real personal experience of something then they will
> be able to tell me a story filled with detail. On the other
Eric Brunner-Williams in Portland Maine wrote:
of my best hires (at sri, .5k hosts, circa 1987) were simply
> trainable. an english major (f) from reed, and a cs major (m) from a
> school that taught cobol as a modern language -- i hired him for his
> night job skills, managing an auto body shop,
[EMAIL PROTECTED] wrote:
> How original of them! But for other router manufactures present on
> this
> list, make notice - DO NOT DO IT IN YOUR OWN PRODUCT EVER. I (and from
> newsgrousp there are appears to be many others with same opinion
> about it)
> do not want routers modifying my network pa
Chris Lewis wrote:
> More intriguing is what has to be done at high arctic places (like
> little Ellesmere island, the northernmost mine in the world). Most of
> the vehicles are Toyota diesel pickups (winter weight fuel, you
> betcha!). They never shut the engines down. Except when they're
> i
[EMAIL PROTECTED] wrote:
> So, tell me--are you willing to pay a premium for
> unfiltered access to the Internet?:)
Yes, that's why I don't use AOL.
Peter
Sorry, I know many are going to think I should go and scan rfc-index.txt
etc., but there is no real better group of people to ask for definitive
pointers.
I am going to be *trying* to work on some (free) BGP code and stuff aftre I
leave my day job (tomorrow!), and I will be spending my spare time
Daniel Karrenberg wrote:
> A contractor drills large holes in the central structural parts of a
> building to allow installation of their innovative garbage disposal.
> Civil engineers question the effects this has on the building's
> stability. The contractor's defense is: "Well it is still stand
E.B. Dreger wrote:
> HTTP implementations have had vulnerabilities due to insufficient
> checking. Thus HTTP is a bad idea.
>
> SMTP implementations have had vulnerabilities due to insufficient
> checking. Thus SMTP is a bad idea.
>
> SNMP implementations have had vulnerabilities due to insuffic
Sean Donelan wrote:
> Uhm, you are also aware that if the attacker can spoof the
> kiss-o'-death packets; the same attacker could spoof all sorts of
> other packets including the time protocol packets to change the clock
> on your computer.
"Yes but"... there is a strong likelyhood that less para
Sean Donelan wrote:
> Should other protocols include the same feature? If someone sends you
> a Dynamic DNS update, could the protocol include a kiss-o'-death
> packet to tell clients to go away? If someone keeps probing your
> HTTP server, should HTTP include a kiss-o'-death packet to tell
> cl
Matt Levine wrote:
> So now you care about giving notice the community? That didn't seem
> high on your priority list when you implemented it.
The "community" I suspect that they are sensitive about is not NANOG etc.
but the advertisers and the shareholders.
Remember, Verisign is the effective
Can anyone who is knowledgeable and possibly willing to help with these
devices please contact me off list ?
A colleague acquired a small number in a dot.com sale and they sounds really
cute / useful, but before even playing with them I would love to here from
anyone with wanrings / tips / etc. E
While sitting here watching bad TV, I had a thought(tm).
Has anyone set-up a generic web-page, not linked from anywhere useful, which
autogenerates a "contact e-mail" address (like [EMAIL PROTECTED]) and
logs which IP reads what address (even using the remote IP as the username
to provide) and th
I need a little help with (what appears to be) an IGP issue withing Telia's
UK network. I am stuck in a twisty maze of little resellers. Any response
would be appreciated.
Peter
[EMAIL PROTECTED] wrote:
> And so we should do nothing?
No, but neither should we plan on engineering a solution. As Neil say - and
many know Neil and I generally disagree on principal about everything - a
technical solution will never get rid of spam. It may reduce it for a time,
but not for ver
Roy wrote:
> This article seems to imply that North American networks don't care
> about IP V6 while the rest of the world is suffering great hardship
>
> http://www.msnbc.com/news/945119.asp
>
> PS. Please don't shoot the messenger
Regardless of the content of the above, let me say that with th
Martin Hepworth wrote:
> yeah seems to have a few min outage. came back very slow now OK
> again...
Yep. Our net is now back. I will be interested in PSI's explanation of why a
power failure at Telehouse (London) killed their LHC site. If anything
interesting turns up, I will let NANOG know.
Tha
Thorsten Toenges wrote:
> you're flapping too much :)
I wish it were me, but we are not doing BGP at that site. Sigh. Thanks for
looking. Still on hold - the uaul recorded platitudes about 'experts' and
'you are important'.
Peter
PSInet Europe (at least my hosted prefix - 146.101.245.xxx) has dropped off
the 'net. Not visible via LINX etc.
Anyone got any info ? I have been in a voice queue for > 5 minutes and being
asked to leave a message or hold further. I guess something is broken.
rgds,
--
Peter
ken emery wrote:
> I'm not sure what needs to be done, but the security as now
> implemented
> is not even close to enough IMHO. Networkwise (to bring this back on
> topic) I'm not sure there is really much that can be done.
Don't forget the desperate need for user *and* staff education. I have
Kevin Day wrote:
> The attacks we see now are... well orchestrated. 10-50,000 proxy
> servers all making login attempts at once, rather slowly. 10-50 login
> attempts per second, each from a different proxy. Still slow enough
> per IP that it doesn't hit our threshold for how many bad logins per
>
Neil J. McRae wrote:
> How so unlike you to take an anti-establishment view!
Not anti-establishment. I am far from an anarchist. "I am anti-idiot".
Peter
Richard Irving wrote:
> David Kelly has been dispatched by Tony Blair,
s/disp/desp/
You don't know quite how rife that rumour is over here at the moment.
Petre
E.B. Dreger wrote:
> Perhaps some "security" measures have a different purpose -- as
> you say, "LOOKS great" (emphasis added).
Just like 99% of all recent airport security measures... reassure the sheep,
then they might stop bleating and march to order instead. "Baauy
McDonalds, Bauy Gas
Gil Levi wrote:
> While it is impossible to stop someone (a terrorist) from cutting
> fiber, it is possible to limit his ability to do damage. It is
> possible to create alternative routes to be used in such cases. Then
> while the primary route may be down, the alternate route will be used
> and
[EMAIL PROTECTED] wrote:
> I think London is rather more paranoid. I work in London and just on
> Monday
> I was stopped by police at Tower Hill tube station and searched for
> explosive paraphernalia as part of their programme of random searches.
> When
> I told people about this in the office, s
[EMAIL PROTECTED] wrote:
> However we can work to spread out the infrastructure more so that it
> is harder for terrorists to find a single point of failure to attack.
> If they have to coordinate an attack on 3 or 4 locations, there is an
> increased probability that something will go wrong (as o
Jamie Reid wrote:
> I'd be interested in knowing how linking aggregated attack
> information to country of
> origin is actually valuable relative to our ability to respond to it.
It mostly salves the prejudices of those who want to see certain other
countries as the enemy. My view, as most of thi
Fearghas McKay wrote:
> ... Scotland
> has its own seperate legal system that is based on Roman law.
But that's OK - no one want to go there anyway, eh Fearghas and Neil ? Look,
even most of the UK cabinet have left to be corrupt in London instead...
:-) <- for the humour impaired from north of
Kevin Oberman wrote:
> You confuse civil and criminal law.
Always happy to learn. I hope M$ get very very embarassed in open court if
this makes it that far. "Pot calling the milk bottle black."
Peter
Paul Vixie wrote:
> consider microsoft-yahoo-aol's big fad of the moment which is suing
> spammers and blaming asia. the number one (#1) contributor to spam
And then: http://news.bbc.co.uk/1/hi/business/3020566.stm
Not in that report, but on TV last night a M$ spokedroid was quoted as
saying so
Sean Donelan wrote:
> Except this is not "self-policing." ISPs are not being asked to
> police
> what ISPs do. For the most part ISPs don't attack their customer's
> (or anyone else's) computers. Remember, the traffic generally flows
> THROUGH
> the ISP's network, it doesn't come FROM the ISP.
Neil J. McRae wrote:
>> The problem - to try to steer this bus back onto topic - is the
>> sheer amount of self-policing that the powers-that-want-to-be want
>> us to do. Or it becomes our fault.
>
> Who should do the policing then Peter?
The police ?
>From a viewpoint in the UK, the real police
Stephen J. Wilcox wrote:
> Hmm where do you draw the line.. peer2peer file sharing, MS
> Networking, SMTP, telephones, snail mail, visiting foreign countries,
> meeting people at all.. ?
I am a very very poor student of history (my secondary school only offered a
strange variety that I never paid
Dan Hollis wrote:
> law enforcement seems to be much more interested in prosecuting
> hard to trace underage script kiddies, that it does prosecuting easily
> traceable adult porn spammers who trojan 1000's of peoples machines.
I suspect that the latter can pay for 'lobbying' better. Cough.
Pete
Sean Donelan wrote:
> If I'm willing to pay list price, I can get "peering" or an
> interconnection with almost any ISP in the world. I can call the
> sales offices of any provider, and on request most of them will sell
> me a connection to their network.
That isn't peering. That's transit or 'p
Matthew Zito wrote:
> This is marginally related to the power discussions earlier, but does
> anyone know of a product that steps up 120V AC to 220V AC and is
> reasonably datacenter-friendly? We're looking at an environment where
> there's no 220V available - but we only need ~7 amps so conversi
Jack Bates wrote:
> Please see Saphire worm. Then tell me that an ISP doesn't oversell
> services. The fact is, the entire Internet is oversold. If everyone
> did their full capacity, it would crash. DSL is also based on this
> assumption. Most of the providers selling DSL at the cheap rates are
> Not being from the US, I have very little idea if this is a reality based
> simply on this story...
And having left a couple of unread messages in my nanog folder, I noticed
this was raised in another thread. Apologies for double posting.
Peter
>From another mailing list;
Not being from the US, I have very little idea if this is a reality based
simply on this story...
- Original Message -
From: "Dave Feustel" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Friday, March 28, 2003 1:31 PM
Subject: Freedom to Tinker: Use a Firew
http://news.bbc.co.uk/1/hi/england/2879833.stm
Peter
> If all routes in the routing table are good (which soBGP and S-BGP can
> do for you) and routers filter based on the contents of the routing
> table, hosts will not see any bogon packets except locally generated
> ones so they shouldn't have bogon filters of their own. So this will
> indeed solv
Stephen J. Wilcox <[EMAIL PROTECTED]> wrote:
> posts. Perhaps clueful folk should sneak off and form nanog-clueful
> mailing list ;)
S the'll all want one.
Peter
> The issue at the core is whether ISPs should just roll over and cough up
> anything to law enforcement, any time, without valid warrants.
I am sure that such a cosmopolitan bunch as NANOG will also understand that
EU Data Protection laws give people quite a big comeback when they find
someone h
Dave Israel wrote:
> There's no real "science" here. This is a geek publicity stunt.
s/geek/funding/
Peter
McBurnett, Jim wrote:
> To be blunt:
> It seems that your opinion is: If a company wants to dump trash in
> my email account
> and they are able to find an ISP who is so blindly just taking a
> payment and cares less
> about what who they provide service to, so be it, I don't care.
I did not eve
quote:
> Well-managed, ethical members of the internet industry already conduct
> their businesses, successfully and profitably, according to the
> principles specified in the Practice. The proposed Practice simply
> aims to raise the entire industry to the level of today's best
> players.
I obj
Not as well connected as I once was and so I can only try from a couple of
upstreams, but I have lost all LINX transit traffic... www.linx.net is also
failing - which is not a good sign.
Anyone know different or better ?
Peter
Please learn to read and go back to my *operational* point about SpamCops
abuse of out of date RIPE data.
Peter
- Original Message -
From: "Greg A. Woods" <[EMAIL PROTECTED]>
To: "Peter Galbavy" <[EMAIL PROTECTED]>
Cc: "North America Network
But then there are the whacko's like SpamCop who just ignore every mail you
send them anyway.
i.e. My company set up the RIPE LIR for the UK company 'III' many years ago.
I was listed as a contact for a while, then when we stopped providing
services I removed my contact from the RIPE records. I
> I fail to see how blacklisting neighboring subnets (not associated with
> the organization in question) instead of just the offending one is "in
> order".
It depends on your maturity and 'professionalism' I guess. Some of us see
the problem, some see it as a 'cool way of getting attention'.
P
And you know what ? Just like all the other attempts at 'professional'
qualifications in this industry, they will prove you can pass an exam and
still not know anything...
Peter
- Original Message -
From: "Neil J. McRae" <[EMAIL PROTECTED]>
To: "cw" <[EMAIL PROTECTED]>
Cc: <[EMAIL PROTE
> Gotta go with the old head scratch on that one...
>
> Imagine the packet zipping down a wire. It hits a router. It slows
> down. Why? Because (until very recently) wire-speed != processing
> speed != backplane speed... This is called 'blocking'. The packet
> has to wait somewhere while the pr
> Note that the previous example was about end to end systems achieving line
> rate across a continent, nothing about routers was mentioned.
Fair enough - for that I can see the point. Maybe I need to read more though
:)
Peter
> To transfer 1Gb/s across 100ms I need to be prepared to buffer at least
> 25MB of data. According to pricewatch, I can pick up a high density 512MB
Why ?
I am still waiting (after many years) for anyone to explain to me the issue
of buffering. It appears to be completely unneccesary in a rout
> The guys around here are high on "The Prince" :]
Who mentioned Lorry ?
OK - As a knowledgeable bunch, maybe you lot can give me pointers.
A customer / friend phoned me last night saying that I sent him a virus by
e-mail. Now, I am far more careful than that - at least I hope. It turned
out that it wasn't me, but a forgery. Now, that is not unusual, but what is
that
83 matches
Mail list logo