On 2 Feb 2004, Paul Vixie wrote:
the spammers have nothing to fear from you, or us, or me, or anybody. with
the incredible number of bottomfeeders and antivirus companies polluting the
econsystem with their own various get-rich-quick schemes, there's no way to
tell the difference between
On Mon, 2 Feb 2004, Brian Bruns wrote:
They are bold, and don't seem to fear anyone. You can keep killing them, and
they don't learn.
That's because nobody's _killing_ them.
There is an anecdotal story of some russian ISP actually sending few
toughs to beat up some HACK0R DUD3Z. That ISP
On Fri, 30 Jan 2004, Iljitsch van Beijnum wrote:
Actually IMO putting all their crap in their own dir is a feature
rather than a bug. I really hate the way unix apps just put their stuff
all over the place so it's an incredible pain to get rid of it again.
Putting all crap in the working
Criminal hackers _are_ stupid (like most criminals) for purely economical
reasons: those who are smart can make more money in various legal ways,
like by holding a good job or running their own business. Hacking into
other people's computers does not pay well (if at all).
Those who aren't in
I can project a nearly infinite rate of growth in my personal income when
I deposit a $3.95 rebate check. It's a matter of defining the sampling
period.
The truth is, that kind of creative statistics is exactly what allowed
Worldcom (and the rest of the telecom) to get into the deep pile of
On Thu, 15 Jan 2004, Randy Bush wrote:
i was helping get the link up into kacst (their nsf equivalent) in
ryadh back in '94, and a rather grownup friend there, Abdulaziz A.
Al Muammar, who had his phd from the states and all that, explained
it to me something like this way.
yes, to a
On Thu, 15 Jan 2004, H. Michael Smith, Jr. wrote:
For the record... I have first hand knowledge that KSA's filtering is
not too effective.
Good :) The more people are exposed to humanity of the Great Satan, the
less they're likely to tolerate their own fanatics and zealots.
--vadim
On Wed, 14 Jan 2004 [EMAIL PROTECTED] wrote:
Getting to 1mpps on a single router today will probably be hard. However,
I've been considering implementing a clustered router architecture,
should scale pps more or less linearly based on number of PCs or
routing nodes involved. I'm not sure if
He also said that Internet is growing by 1000% a year.
In fact I think that it is an extremely bad idea to use clusters of
enterprise boxes to build a global network.
--vadim
On Wed, 14 Jan 2004, Randy Bush wrote:
On the topic of PC routers, I've fully given in to the zen
of Randy
On Tue, 13 Jan 2004, Michael Hallgren wrote:
On Jan 13, 2004, at 6:33 AM, Michael Hallgren wrote:
Unfortunately, I've seen Peering Policies which require
things like Must announce a minimum of 5,000 prefixes. :(
Wonderful...
mh
Easy to fix by changing to covering N million
On Thu, 13 Nov 2003, Don Mills wrote:
But it would
be a tragic mistake on anyone's behalf to pre-assume that all those letters
means I don't know what I am talking about. That's stereotyping, isn't it?
Don (take it as a good-spirited needling, please) I'd like to point out
that this
On Thu, 13 Nov 2003, Don Mills wrote:
Nah. I'm just a quick study and it's better than drinking all weekend.
Oh, you _do_ have weekends :)
--vadim
Now, the problem of finding a good recruiter is substituted for the
problem of finding a good engineer :) The trade-off is good only if
you're planning to hire dozens of engineers, considering monetary costs of
such arrangement. Even better, if you're creating a large org, get a
headhunter on
The only problem - they have no clue about the profession they're
recruiting for and tend to judge applicants not by them saying reasonable
things but by their self-assuredness and by keywords in resume.
Recruiters are only good for initial screening and attracting applicants,
and in this
Ahem. Many of us are Star Trek experts, and it will take a LOT more
than this to get people to wear a red shirt.
A red EFF t-shirt (as a sign of recent donation) would be a good choice :)
--vadim
RBLs Sounds like a great application for P2P.
Perhaps, but it also seems like moving an RBL onto a P2P network would
making poisoning the RBL far too easy...
Andrew
USENET, PGP-signed files, 20 lines in perl.
--vadim
On Wed, 24 Sep 2003, David Schwartz wrote:
Each mailserver could keep a cryptographically verified list, the
list is distributed via some P2P mechanism, and DoS directed at the
'source' of the service only interrupts updates, and only does so until
the source slips an updated
On Tue, 23 Sep 2003, Randy Bush wrote:
some engineers think that all social and business problems
can be solved by technical hacks.
Dunno about some engineers, but engineers in general can do a lot to avoid
creation of many problems in the first place. This wildcard flop is a
perfect
On Wed, 17 Sep 2003, John Brown wrote:
speaking as a shareholder of Verisign, I'm NOT HAPPY
with the way they handled this wildcard deal, nor
am I happy about them doing it all. As a *shareholder*
I'd cast my vote that they *remove* it.
You have no control over operations of the company.
If we take a step back, we could say that the whole Verisign incident
demonstrated pretty clearly that the fundamental DNS premise of having no
more than one root in the namespace is seriously wrong. This is the
fallacy of universal classification so convincingly trashed by
J.L.Borges in The
On Wed, 17 Sep 2003, [ISO-8859-1] Mathias Krber wrote:
If we take a step back, we could say that the whole Verisign incident
demonstrated pretty clearly that the fundamental DNS premise of having no
more than one root in the namespace is seriously wrong. This is the
fallacy of
!
--vadim
On Wed, 17 Sep 2003, David G. Andersen wrote:
On Wed, Sep 17, 2003 at 02:50:51AM -0700, Vadim Antonov quacked:
In fact, we do have an enormously useful and popular way of doing exactly
that - this is called search engines and bookmarks. What is needed is
an infrastructure
On Wed, 17 Sep 2003 [EMAIL PROTECTED] wrote:
If the goal were unique identification, MAC addresses would do just fine.
No need for DNS.
MAC addresses are not without authority delegation. The IEEE is the ultimate
authority in said case.
Yep... But have you seen any controversy about
On Wed, 17 Sep 2003, David Schwartz wrote:
In fact, you could just use an RSA public key as the identifier directly.
This is likely not the best algorithm, but it's certainly an existence proof
that such algorithms can be devised without difficulty.
In fact, I'm going to call
I'm going to hack my BIND so it'll discard wildcard RRs in TLDs, as a
matter of reducing the flood of advertising junk reaching my desktop.
I think BIND resolver developers would do everyone a service by adding
an option having the same effect.
Thank you, VeriSign, I will never do business
Communigate Pro is not a Windows mail server... It runs on nearly
everything; and can handle millions of accounts (it has extensive
clustering support). Check their website: www.stalker.com for specs.
--vadim
On Thu, 4 Sep 2003, Robert Boyle wrote:
At 11:02 AM 9/4/2003, you wrote:
This
On Mon, 1 Sep 2003, David Schwartz wrote:
When you don't have liability you don't have to worry about quality.
What we need is lemon laws for software.
That would destroy the free software community. You could try to exempt
free software, but then you would just succeed in
On Tue, 2 Sep 2003, David Schwartz wrote:
this will be my last reply.
David, since all your arguments are variations on You think you know
better than anyone else what they need (whereby you, supposedly, extoll
virtues of a system which you don't yourself think is the best one) I do
concur
When you don't have liability you don't have to worry about quality.
What we need is lemon laws for software.
--vadim
On 1 Sep 2003, Paul Vixie wrote:
... Micr0$0ft's level of engineered-in vulnerabilities and wanton
disregard for security in the name of features. ...
i can't see
On Fri, 29 Aug 2003, Randy Bush wrote:
when folk want to pay $50/mb, how much clue do we think
isps can pay for, especially to deal with peak clue loads
such as this last week or two?
yes, money talks. but in many ways.
Doesn't work this way. It is much better to have one clueful guy
On Wed, 27 Aug 2003, Iljitsch van Beijnum wrote:
I wouldn't recommend this. If you have two DNS servers on different
addresses, everyone can talk to #2 if #1 doesn't answer.
I noticed that many Windoze mail servers don't bother to check the second
server if the primary's dead.
--vadim
On Thu, 28 Aug 2003, Matthew Crocker wrote:
Shouldn't customers that purchase IP services from an ISP use the ISPs
mail server as a smart host for outbound mail?
Shouldn't. There are privacy implications of having mail to be recorded
(even temporarily) at someone's disk drive.
--vadim
On Thu, 28 Aug 2003, Matthew Crocker wrote:
If your ISP violates your privacy or has a privacy policy you don't
like, find another one.
How do I know that?
As a hobby, I'm running a community site for an often misunderstood
sexual/lifestyle minority. Most of patrons would be very unhappy
It should be pointed put that the ISPs have their share of blame for the
quick-spreading worms, beause they neglected very simple precautions --
such as giving cutomers pre-configured routers or DSL/cable modems with
firewalls disabled by default (instead of the standard end-user, let only
On Sun, 17 Aug 2003 [EMAIL PROTECTED] wrote:
Use hydrogen. One solar panel (which will last forever unless you drop
something on it) can split H2O into H and O.
Solar panels do not last forever. In fact, they degrade rather quickly due
to the radiation damage to the semiconductor (older thin
On Sat, 16 Aug 2003, Petri Helenius wrote:
Maybe we could attach the packets to hot air balloons and send them with the wind?
This seems to be a promising idea, given that the high-tech industry is
already adept at producing immeasureable quantities of hot air.
--vadim
On 15 Aug 2003, Scott A Crosby wrote:
I also think that its hard to appreciate the stability differences
between shipping power a few hundred feet and shipping power 1000
miles. It looks like that long-distance shipping is the root cause of
the half-dozen major outages over the past 30
On 5 Aug 2003, Paul Vixie wrote:
i'd like to discuss these, or see them discussed. networks have edges,
even if some networks are edge networks and some are backbone networks.
bcp38 talks about various kinds of loose rpf, for example not accepting
a source for which there's no corresponding
On Tue, 5 Aug 2003, Christopher L. Morrow wrote:
Spoofed packets are harder to trace to the source than non-spoofed
packets. Knowing where a malicious packet is very important to the
this is patently incorrect: www.secsup.org/Tracking/ has some information
you might want to review.
On Fri, 1 Aug 2003, Jack Bates wrote:
There is nothing in C which guarantees that code will be unreliable or
insecure.
Lack of real strong typing, built-in var-size strings (so the compiler can
actually optimize string ops) and uncontrollable pointer operations is
enough to guarantee that
On 31 Jul 2003, Paul Vixie wrote:
the anti-nat anti-firewall pure-end-to-end crowd has always argued in
favour of every host for itself but in a world with a hundred million
unmanaged but reprogrammable devices is that really practical?
Not everything could be hidden behind a firewall,
On Thu, 31 Jul 2003, Petri Helenius wrote:
What we need is a new programming paradigm, capable of actually producing
secure (and, yes, reliable) software. C and its progeny (and program
now, test never lifestyle) must go. I'm afraid it'll take laws which
would actually make software
On Mon, 28 Jul 2003, Sean Donelan wrote:
But the President's movements creates its own vulnerabilities for the rest
of the critical infrastructures nearby. If you know the President will be
in the area (the FAA posts advance notice to airman)...
First of all it creates vulnerabilities for
On Wed, 2 Jul 2003, Steven M. Bellovin wrote:
Oh, joy -- more spam instead of telemarketers.
Joy, actually, since e-mail is not prone to giving unsolicited wake-up
calls to those of us who live graveyard shift.
--vadim
On Mon, 23 Jun 2003, Jim Deleskie wrote:
One router and it takes there entire network off-line... Maybe someone needs
a Intro to Networks 101 class.
No matter what kind of technology or design you have there are always
kinds of faults which may bring the entire system down. The problem is
Well, since adding a simple option to IPv4 header would solve all address
space problems w/o any need to change core routing infrastructure (unlike
introduding v6) - I see little need to go for an entirely new L3 protocol.
--vadim
On Sun, 15 Jun 2003, Deepak Jain wrote:
1) Is IPV4
On Sat, 14 Jun 2003, Nick Hilliard wrote:
At least there is general consensus among pretty much
everyone - with the exception of a small number of cranks - that IPv6 is
good.
Now I'm officially a crank because i fail to see why IPv6 is any better
than slightly perked up IPv4 - except for
Here's a 3KW one for E389:
http://www.taunus-transformatoren.de/transformers/transformers_110_120_220_230_240.htmlMatthew
Zito [EMAIL PROTECTED],
(Actually, you don't need a two-coil transformer - a one-coil transformer
with a tap in the middle will do, and those may be even cheaper).
Note
On Tue, 3 Jun 2003, Vadim Antonov wrote:
http://www.pfsc-ice.com/bbo/b/magnet/get_a_110_220_voltage_transformer_11.htm
2KW - for less than $100 ... enough for 8.5 Amp at 230V.
--vadim
There's only thing worse than government full of idiots: government
full of scared idiots.
--vadim
On Wed, 19 Mar 2003, J.A. Terranson wrote:
On Wed, 19 Mar 2003, Jeff Wasilko wrote:
http://www.southjerseynews.com/issues/march/m031603e.htm
If the nation escalates to red alert,
On Wed, 12 Mar 2003, Randy Bush wrote:
You need at least three flaps to trigger dampening.
i guess you really need to look at that pdf.
randy
Better Algorithms --
http://www.kotovnik.com/~avg/flap-rfc.txt
http://www.kotovnik.com/~avg/flap-rfc.ps
I didn't publish that one because I
I'm just waiting for hakerz to finally figure out that having the port
number a hash of host address will effectively make port-based
notch filtering useless. Usin
On Sun, 9 Mar 2003, Sean Donelan wrote:
Blocking ports in the core doesn't stop stuff from spreading. There are
too many
Thank you very much, but no.
DNS (and DNSSEC) relies on working IP transport for its operation.
Now you effectively propose to make routing (and so operation of IP
transport) dependent on DNS(SEC).
Am I the only one who sees the problem?
--vadim
PS. The only sane method for routing info
Well, sloppy thinking breeds complexity -- what I dislike about standards
commitees (IETF/IESG included) is that they always sink to the lowest
common denominator of the design talent or competence of its participants.
In fact, a method to encrypt small parcels of data efficiently is
well-known
On Tue, 18 Feb 2003, Stephen Sprunk wrote:
It also allows precomputation of the key stream, adding nearly zero
latency/jitter to the actual packet processing.
You fail to note that this requires precomputing and storing a keystream for
every SA on the encrypting device, which often
On Thu, 6 Feb 2003, N. Richard Solis wrote:
The main cause of AC disruption is a power plant getting out of phase
with the rest of the power plants on the grid.
This is typically a result of sudden load change (loss of transmission
line, short, etc) changing the electromagnetic drag in
On Wed, 29 Jan 2003, Christopher L. Morrow wrote:
On Wed, 29 Jan 2003, Mike Bernico wrote:
We currently use an IGP to route between our distribution routers and
the CPE routers we manage.
So, if customers bounce your IGP churns away? And customers have access to
your IGP data
On Wed, 29 Jan 2003, Mike Bernico wrote:
Is there someplace I can find tidbits of information like this? I
haven't been alive decades so I must have missed that memo. Other than
this list I don't know where to find anyone with lots of experience
working for a service provider.
Well, this
On Tue, 28 Jan 2003, Eric Germann wrote:
Not to sound to pro-MS, but if they are going to sue, they should be able to
sue ALL software makers. And what does that do to open source?
A law can be crafted in such a way so as to create distinction between
selling for profit (and assuming
I have a suggestion for UUNET's backbone engineering folks:
Please, create a fake customer ID and publish it, so outside folks could
file trouble reports regarding routing issues within UUNET.
--vadim
On Sat, 18 Jan 2003, Scott Granados wrote:
What's interesting is that I just tried to
On Mon, 20 Jan 2003, Avleen Vig wrote:
On Mon, 20 Jan 2003, Christopher L. Morrow wrote:
I was refering specifically to end user workstations. For example home
machines on dial up or broadband connections.
A lot of broadband providers already prohibit running servers and block
Do we need te equivalent of a dog bite law for computers. If your
computer attacks another computer, the owner is responsible. File a
police report, and the ISP will give the results of the *57 trace to
the local police. The police can then put down the rabid computer,
permanently.
This is not entirely hoax.
I know for sure (first-hand) that such actions were contemplated by at
least some recording companies.
--vadim
On Wed, 15 Jan 2003, Marshall Eubanks wrote:
The feeling in the music community is that this is almost certainly a
hoax.
Of course, RIAA apparently
On Tue, 10 Dec 2002, Stephen J. Wilcox wrote:
The better way of dealing with the problem of bogus routes is strong
authentication of the actual routing updates, whith key being allocated
together with the address block. Solves unused address space reclaimation
problem, too - when the
On Tue, 10 Dec 2002, Harsha Narayan wrote:
Key databases:
Using cryptography to authenticate routing updates gets messy very soon.
Then, there will again be the same problem of the Public Key Infrastucture
not getting updated or something like that.
Hard to do it right, yes, but not
On Tue, 10 Dec 2002, Barry Shein wrote:
The only solution to spam is to start charging for email (perhaps with
reasonable included minimums if that calms you down for some large set
of you) and thus create an economic incentive for all parties
involved.
Absolutely unrealistic...
On Tue, 10 Dec 2002, Harsha Narayan wrote:
Using cryptography to authenticate routing updates gets messy very soon.
Then, there will again be the same problem of the Public Key Infrastucture
not getting updated or something like that.
It would require a PKI and also require every
On Fri, 29 Nov 2002, Stephen Sprunk wrote:
This is a bit of culture shock for most ISPs, because an ISP exists to serve
the network, and proper design is at least understood, if not always adhered
to. In the corporate world, however, the network and support staff are an
expense to be
On Wed, 27 Nov 2002 [EMAIL PROTECTED] wrote:
It depends which exchange point is hit. There are a couple of buildings
in London which if hit would have a disasterous affect on UK and European
peering.
Why hit buildings when removing relatively small number of people will
render Internet
On Thu, 21 Nov 2002, David Schwartz wrote:
Suppose, for example, we'd had closed cockpit doors. The 9/11 terrorists
would have threatened the lives of the passengers and crew to induce the
pilots to open the doors. The pilots would have opened the doors because the
reasoning until
On Tue, 19 Nov 2002, Richard Irving wrote:
To Paraphrase the -OLD- KGB:
Quick Comrade, we will protect you, sign here
What ? You want to be Safe, Comrade, don't you ?
s/Comrade/Citizen/
Naive :) They didn't have to ask to sign anything - you had to, to get a
better job,
Just to keep it off-topic :) The kinetic water-based accumulating
stations actually do exist, though they use elevated reservoirs to store
the water. The water is pumped up during off-peak hours, and then
electricity is generated during peaks. This is not common, though,
because most energy
I definitely would NOT want to see my doctor over a video link when I need
him. The technology is simply not up to providing realistic telepresense,
and a lot of diagnostically relevant information is carried by things like
smell and touch, and little details. So telemedicine is a poor
On Mon, 18 Nov 2002, Jere Retzer wrote:
Maybe it is a function of the origin and destination location + network.
Since Portland is not a top 25 market our service has never been very
good that's why we started an exchange
Yep, Intenet service quality is very uneven; and it does not seem to
On Mon, 18 Nov 2002, Jere Retzer wrote:
It's potentially even more important with elderly shut-ins, because
bringing them in can be difficult and expensive and their immune
systems are typically weaker so you should try to minimize their
exposure to people with contagious diseases.
What
On Fri, 15 Nov 2002, Jere Retzer wrote:
Some thoughts:
- Coast-to-coast guaranteed latency seems too low in most cases that
I've seen. Not calling CEOs and marketers liars but the real world
doesn't seem to do as well as the promises. As VOIP takes off local
IP exchanges will
On Thu, 14 Nov 2002, David Diaz wrote:
2) There is a lack of a killer app requiring peering every 100 sq Km.
Peering every 100 sq km is absolutely infeasible. Just think of the
number of alternative paths routing algorithms wil lhave to consider.
Anything like that would require serious
On Fri, 15 Nov 2002, Rafi Sadowsky wrote:
VA 2) There is a lack of a killer app requiring peering every 100 sq Km.
VA
VA Peering every 100 sq km is absolutely infeasible. Just think of the
VA number of alternative paths routing algorithms wil lhave to consider.
VA
VA Anything like
On Mon, 4 Nov 2002, Eric Anderson wrote:
Time for a new metaphor, methinks.
There's one. Defensive networking :)
--vadim
On Wed, 23 Oct 2002, Alan Hannan wrote:
I don't understand how giving the US federal government management control
of key components of the Internet will make it more secure.
It worked for airline security.
Yeah... removing shoes and randomly searching peace activists while
allowing
On Fri, 20 Sep 2002, Joe Abley wrote:
On Fri, Sep 20, 2002 at 06:40:56PM -0700, Vadim Antonov wrote:
This is all obvious stuff, of course. However, the derived rule of
thumb long traceroute bad, short traceroute good is the kind of
thing that can induce marketing people to require
On Fri, 20 Sep 2002, Stephen Sprunk wrote:
If you think you can make a gigabit router with PC parts, feel free.
You may be surprised to learn that BBN folks did practically that
(different CPU) with their 50 Gbps box (MGR). They had OC-48C line cards
and used Alpha 21164 CPU with pretty
On Fri, 20 Sep 2002, Stephen Stuart wrote:
Regarding CPU cycles for route lookups:
Back in the mid-1990s, route lookups were expensive. There was a lot
of hand-wringing, in fact, about how doing route lookups at every hop
in larger and larger FIBs had a negative impact on end-to-end
herecy
Or unless we design a network which does not rely on good will of its
users for proper operation.
/herecy
--vadim
On Tue, 10 Sep 2002 [EMAIL PROTECTED] wrote:
Most spam-fighting efforts on the technical side make the basic assumption
that spam has similar characteristics to a
On Tue, 10 Sep 2002, Iljitsch van Beijnum wrote:
Or we throw out SMTP and adopt a mail protocol that requires the sender to
provide some credentials that can't be faked. Then known spammers are easy
to blacklist.
The credentials that can't be faked is a rather hard to implement
concept.
On Tue, 10 Sep 2002, Barry Shein wrote:
And, although some won't like me saying this, having the technical
community deal with these new criminals is a bit like sending the boy
scouts after Al-Qaida.
Unfortunately it's going to take a much harsher view of reality than
maybe this regexp
Q.931 is built into H.323 (a VOIP call control protocol). Bellhead
standards are weird.
Hope this helps...
--vadim
On Tue, 20 Aug 2002, cw wrote:
I'm not familiar with all the protocols involved, so if my searches
are correct Q.931 is an ISDN control protocol. This is odd because
this
On 17 Aug 2002, Paul Vixie wrote:
Am I the only one who finds it odd that it's illegal to export crypto
or supercomputers to certain nations or to sell such goods with
prior knowledge that the goods are going to be resold in those
nations... or even to travel to certain nations... yet no
On Wed, 14 Aug 2002, Brad Knowles wrote:
At 5:13 PM -0500 2002/08/13, Blake Fithen wrote:
Is this sensitive info? Couldn't someone (theoretically) aim a
beam at an unoccupied office and another at their objective
office then filter out the 'noise'?
Actually, I don't
Microsoft already duped the software consumers into buying into fully
proprietary software. Given the prevalent time horizon of average IT
manager's thinking I fully expect Microsoft to get that stuff deployed
before the poor saps start realizing they're being ripped. After that
Microsoft
It makes little sense to detect transient glitches. Any possible reaction
on those glitches (i.e. withdrawal of exterior routes with subsequent
reinstatement) is more damaging than the glitches themselves.
--vadim
On Fri, 9 Aug 2002, Lane Patterson wrote:
BGP keepalive/hold timers are
On 10 Aug 2002, Paul Vixie wrote:
why on god's earth would subsecond anything matter in a nonmilitary situation?
Telemedicine, tele-robotics, etc, etc. Actually, there's a lot of cases
when you want to have subsecond recovery. The current Internet routing
technology is not up to the task;
Some long long long time ago I wrote a small tool called snmpstatd. Back
then Sprint management was gracious to allow me to release it as a
public-domain code.
It basically collects usage statistics (in 30-sec peaks and 5-min
averages), memory and CPU utilization from routers, by
On Mon, 15 Jul 2002, Pedro R Marques wrote:
From a point of view of routing software the major challenge of
handling a 256k prefix list is not actually applying it to the
received prefixes. The most popular BGP implementations all, to my
knowledge, have prefix filtering algorithms that
I would still contend that the number 1 issue is how you do express
the policy to the routing code. One could potentially attempt to
recognise the primary key is a route-map/policy-statement and compile
it as you suggest. It is an idea that ends up being tossed up in the
air frequently,
The discussion is certainly entertaining, but --
1) All-optical networking is a bunch of nonsense until optical processing
ability includes complete set of logic and storage elements - i.e.
achieving fully blown optical computing.
Rationale for the statement: telecom is
Oh, no. If anyone has illusions that politicos can somehow fix the
situation, he ought to do serious reality check. If anything, they made
that mess in the first place by creating ILEC monopolies and allowing
those supposedly regulated monopilists to strange the emerging last mile
broadband
On Tue, 18 Jun 2002, Martin, Christian wrote:
Regarding the diameter of the Internet - I'm still trying to
figure out
why the hell anyone would want to have edge routers (instead of dumb
TDMs) if not for inability of IOS to support large numbers of virtual
interfaces. Same story goes
eh, thats nothing. Try doing work in some of the buildings in NY without a
Union card ;)
Trade unions are schools of communism.
- Vladimir Il'yich Lenin
--vadim
On Thu, 30 May 2002, Richard A Steenbergen wrote:
Yes, demonstrating things to ARIN is remarkably annoying.
Demonstrating as in getting rid of monstrosities? :)
--vadim
1 - 100 of 105 matches
Mail list logo