http://www.renesys.com/blog/2008/02/pakistan_hijacks_youtube_1.shtml
Clearly this is not the first interesting accidental hijacking and
certainly won't be the last.
t.
--
_
todd underwood
n is
the target of a competent campaign to disrupt its telecommunications
(slashdot paranoia notwithstanding).
i'll be interested to hear more about what is found about the physical
layer causes.
t.
--
___
On Thu, Jan 31, 2008 at 01:56:42AM +, Paul Ferguson wrote:
>
> For what its worth, Todd Underwood has a very good overview of the
> countries affected by this outage over on the Renesys Blog here:
>
> http://www.renesys.com/blog/2008/01/mediterranean_cable_break.shtml
wh
ng for 3 years or so
now and never had a significant (detected) failure or latency.
if you don't like this way of doing things you could get an gprs modem
and originate sms directly from the computer.
t.
--
___
e next
> inertube or something - maybe we can get them to do it :)
>
--
_____
todd underwood +1 603 643 9300 x101
renesys corporationvp operations and professional
svcs
[EMAIL PROTECTED]
http://www.renesys.com/blog/todd.shtml
ude 4-byte AS support can be
> found at http://www.potaroo.net/tools/bgpd/)
>
> cheers,
>
> Geoff
>
>
>
--
_
todd underwood +1 603 643 9300 x101
re
the interconnection).
t.
--
_____
todd underwood +1 603 643 9300 x101
renesys corporationchief of operations & security
[EMAIL PROTECTED]
http://www.renesys.com/blog/todd.shtml
2) it makes it
less likely that everyone will already have a full charge on their
laptop batteries.
having power at every seat would be easy and they should just do it.
t
_
todd underwood +1 603 643 9300 x101
r
patrick,
> I disagree.
i disagree with your disagreement.
>
> Seat power is ubiquitous on some airlines (e.g. American), and
> available in all but coach on others (e.g. Virgin, Luftansa). It's
"all but coach"? seriously? hilarious.
"democracy is available to all but the majority"
rodney, all,
nice commentary, rodney. useful.
one additional fact is relevant here: at it's peak, boeing connexion
employed over 670 people (mike hughes pointed me to the nubmer and i
can't find the link).
astonishing staffing for a service of this size.
i've commented on the panasonic inf
like v6 may be).
thanks,
--
_____
todd underwood +1 603 643 9300 x101
renesys corporationchief of operations & security
[EMAIL PROTECTED]
htt
from the
"optical-electrical-airwaves".
t.
--
_____
todd underwood +1 603 643 9300 x101
renesys corporationchief of operations & security
[
f-concept that can be taken-up and
completed by someone else.
t.
--
_____
todd underwood +1 603 643 9300 x101
renesys corporationchief of operations & security
[EMAIL PROTECTED]
http://www.renesys.com/blog/todd.shtml
michael, all,
On Mon, Jun 12, 2006 at 10:43:16AM +0100, [EMAIL PROTECTED] wrote:
>
> > you were attending nanog without registering and paying? that is
> > rude. have you offered to pay retroactively? that would be the
> > honorable thing to d
you offered to pay retroactively? that would be the
honorable thing to do.
t.
--
_____
todd underwood +1 603 643 9300 x101
renesys corporationchief of operations & secu
216.230.159.0/24
216.230.160.0/20
216.230.163.0/24
216.230.164.0/24
216.230.165.0/24
216.230.166.0/24
216.230.176.0/20
216.230.192.0/19
216.230.224.0/20
216.230.240.0/20
216.236.210.0/24
216.236.213.0/24
--
_____
todd underwood
7-388-2663
> Renesys Corporation(w) 617-395-8574
> Member of Technical Staff Network Operations
>[EMAIL PROTECTED]
>
--
_
todd underwood +1 603 643 9300 x101
renesys corporationchief of operations & security
[EMAIL PROTECTED]
http://www.renesys.com/blog/todd.shtml
e
customer-base ranking may be a mistake].
t.
--
_____
todd underwood +1 603 643 9300 x101
renesys corporationchief of operations & security
[EMAIL PROTECTED] http://www.renesys.com/blog
unce any routes to Cogent for political reasons (or prepend or
> depref their routes). So, that metric won't be exactly helpful.
this is, in fact, a useful point. detecting and compensating for
asymmetric routing is difficult in a metric such as this, although
it's probably not impossible.
e appreciated by those
networks large enough to still have a R&D staff to take advantage of
it.
t.
--
_____
todd underwood
chief of operations & security
renesys - internet intelligence
[EMAIL PROTECTED] www.renesys.com
R, letter, email) validation of prefix ownership. routing a new
prefix with a new origination pattern is not especially dynamic now,
so let's not worry about throwing out a baby that's not even in the
bath.
t.
--
__
pposed to maintaining
already.
i'll be happy to talk to interested parties at nanog in dallas about
this (or almost anything else, expecially if you're buying).
t.
--
_____
todd underwood
chief of operations & security
renesys - internet intelligence
[EMAIL PROTECTED] www.renesys.com
nd the conversation about
it has reached the point where people seem to have stopped even
disagreeing about how to do it. in short, it's as dead as dns-sec.
so what are we do do in the meantime?
t.
--
_
todd underwood
chief of operations & security
renesys - internet intelligence
[EMAIL PROTECTED] www.renesys.com
ters more often doesn't change that existing architecture or
make the network somehow "bell-like". it might not work well enough
to solve the problem, but that's another, interesting objection.
--
_
todd underwood
chief of operations & security
renesys - internet intelligence
[EMAIL PROTECTED] http://www.renesys.com/blog
. at least until we
get all signed updates. how is that whole thing going? :-)
t.
--
_____
todd underwood
chief of operations & security
renesys - internet intelligence
[EMAIL PROTECTED] www.renesys.com
on spewed a bunch of routes
they didn't own and UUNet and Verio believed them).
Please let me know if you see errors in there.
t.
--
_____
todd underwood
chief of operations & security
renesys - internet intelligence
[EMAIL PROTECTED] www.renesys.com
t the operational content is asymptotically approaching zero.
please, let a poor, overworked thread die.
thanks,
t.
--
_
todd underwood
chief of operations & security
renesys - internet intelligence
[EMAIL PROTECTED] www.renesys.com
u to?
--anything else i'm missing.
replies in private email, pls. i'll be collecting results and am
happy to share with interested parties.
thanks,
t.
--
_____
todd underwood
chief of operations & security
renesys -
n automated way to determine exactly
which ones they are.
--
_____
todd underwood
director of operations & security
renesys - interdomain intelligence
[EMAIL PROTECTED] www.renesys.com
een from routing tables--we don't have
traffic data and most people who do won't give them up for public
viewing).
i don't want to waste time preparing it if people are over it already,
but would be happy to do something if there is interest.
todd
--
___
an exercise to the reader?
:-) i'd be happy to provide more detail if it seems useful.
t.
--
_
todd underwood
director of operations & security
renesys - interdomain intelligence
[EMAIL PROTECTED] www.renesys.com
of my peers
have/don't have routes to these prefixes.
todd
>
> randy
>
>
> ___
> afnog mailing list
--
_
todd underwood
director of operations & security
renesys - interdomain intelligence
[EMAIL PROTECTED] www.renesys.com
h the affected parties luck with those efforts.
most stuff just stayed up.
t.
--
_____
todd underwood
director of operations & security
renesys - interdomain intelligence
[EMAIL PROTECTED] www.renesys.com
randy, all,
On Sun, Sep 11, 2005 at 04:11:50AM +0700, Randy Bush wrote:
> Re: From: Todd Underwood <[EMAIL PROTECTED]>
> but, the geolocation stuff is cool. could it have told us, in
> an operationally useful/timely manner, that at&t had moved from
> new jersey to spa
global table impacting
connectivity to hospitals, schools, government and lots of
businesses).
i would agree that our method of routing table analysis has
significant limitations and needs to be combined with other data. but
it's a fantastic way of showing a lower bound on what was affecte
sean,
On Sat, Sep 10, 2005 at 10:18:25AM -0400, Sean Donelan wrote:
> On Sat, 10 Sep 2005, Todd Underwood wrote:
> > the general idea is: take a large peerset sending you full
> > routes, keep every update forever, and take a reasonably long (at
> > least a month or two) ti
ly to the reader
(randy, in this case).
t.
--
_____
todd underwood
director of operations & security
renesys - interdomain intelligence
[EMAIL PROTECTED] www.renesys.com
ortly and
i'll address it when/if it does). :-)
--
_____
todd underwood
director of operations & security
renesys - interdomain intelligence
[EMAIL PROTECTED] www.renesys.com
ll haven't been restored, 10 days later
We're happy to take questions on the report, the data, the
methodology, etc.
t.
--
_____
todd underwood
director of operations & security
renesys - interdomain
his outage
that you'd like to share, pls let me know or post to the list here.
t.
--
_____
todd underwood
director of operations & security
renesys - interdomain intelligence
[EMAIL PROTECTED] www.renesys.com
6.135.0/24)
Southern University New Orleans LA 70126 (204.196.86.0/23)
Louisiana State Group Benefits Program LA 70804 (204.196.93.0/24)
t.
--
_____
todd underwood
director of operations & security
renesys - interdomain intel
d that the dyndns services work well:
http://www.dyndns.org/services/netmon/
cheap, reliable, easy to configure. what more would you like? :-)
t.
--
_____
todd underwood
director of operations & security
renesys - interdomai
likely to go anywhere or cause problems.
good to know.
funny.
all threads eventually merge. (and then someone mentions the nazis
and they end. i think meta-mentions like this explicitly don't count
so we may have to suffer through this thread for a while longer).
t.
--
___
On Thu, Jun 30, 2005 at 06:16:37PM -0700, Fred Baker wrote:
> On Jun 30, 2005, at 5:37 PM, Todd Underwood wrote:
> >where is the service that is available only on IPv6? i can't seem to
> >find it.
>
> You might ask yourself whether the Kame Turtle is dancing at
&g
otocol suite with
multi-homing).
--
_____
todd underwood
director of operations & security
renesys - interdomain intelligence
[EMAIL PROTECTED] www.renesys.com
outages and instability to fix a non-problem.
operators in those circumstances had little choice but to roll out
"critical security fixes", but i think we all deserve an apology, an
explanation and a commitment to do better in the future.
t
--
__
ras, all,
On Thu, Jun 23, 2005 at 12:14:12AM -0400, Richard A Steenbergen wrote:
> On Wed, Jun 22, 2005 at 10:04:09PM -0400, Todd Underwood wrote:
> > a) many (all?) implementations of md5 protection of tcp expose
> > new, easy-to-exploit vulnerabilities in host OSes. m
"vulnerability"
i would encourage everyone to seriously rethink the routine use of MD5
passwords to protect BGP tcp sessions.
t.
--
_____
todd underwood
director of operations & security
renesys - interdomain intelligence
[EMAIL PROTECTED] www.renesys.com
do feel that pain *still* haven't decided that preventing hijacking by
means of authenticating routes is something they're willing to pay
extra for. so, like everything else on the $5/mb/s gige-port
internet, we get what we pay for and the lowest common denominator is
more or less
nd for a while and
obviously aren't being implemented by anyone yet). so my comments are
more general.
t.
--
_
todd underwood
director of operations & security
renesys - interdomain intelligence
[EMAIL PROTECTED] www.renesys.com
ld be *much* smaller, obviously.
t.
--
_____
todd underwood
director of operations & security
renesys - interdomain intelligence
[EMAIL PROTECTED] www.renesys.com
51 matches
Mail list logo