To some extent, you're both right. I actually have some background in
this, so bear with me.
The telecom business is, fundamentally, about wringing as much marginal
additional cash flow out of your fixed infrastructure and operations
costs as possible. There are variances around the margins, such
Hello,
Around 7:45am this morning, we started to see intermittent
issues for some sites across Cogent's backbone. Their
internal tracking number appears to be #800535. Does anyone
have more information?
Eric :)
We started seeing issues around 6am in reston VA
-Zak
-Original Message-
From: Eric Gauthier [mailto:[EMAIL PROTECTED]
Sent: Tuesday, October 07, 2008 9:33 AM
To: nanog@nanog.org
Subject: Cogent backbone issue
Hello,
Around 7:45am this morning, we started to see intermittent
issues
Are there any recommendations from an operational
perspective, should one or more of these or other telecom
companies have such problems?
Make sure that you have more than one upstream provider,
preferably three providers minimum so that if one of
them is suddenly shut off, you still have
On Tue, 07 Oct 2008 11:00:20 BST, [EMAIL PROTECTED] said:
In general, your upstream providers' operational networks
and you, the customer connected to that operational network,
are considered to be valuable assets so if a company falls
into Chapter 11, there is a good chance that another
Thank you,
it is appreciated.
Joel
MAWATARI Masataka wrote:
Dear NANOG Colleagues,
We have updated JANOG (Japan Network Operators' Group) English wiki
page.
Recent additions include presentation titles and abstracts for the
JANOG22 meeting, which was held July 2008.
You can view
On Mon, 6 Oct 2008, Buhrmaster, Gary wrote:
The Federal Government (through its Trusted Internet
Connection initiative) is trying to limit the number
of entry points into the US Government networks.
(As I recall from 4000 interconnects to around 50,
where both numbers have a high percentage of
On Tue, 07 Oct 2008, Sean Donelan wrote:
On Mon, 6 Oct 2008, Buhrmaster, Gary wrote:
The Federal Government (through its Trusted Internet
Connection initiative) is trying to limit the number
of entry points into the US Government networks.
(As I recall from 4000 interconnects to around 50,
I had no connectivity to Cogent (not even the web site) at 6:59 to
7:15 AM EDT from
Sprint EVD0 at National Airport in (near) DC. (That was all the time I
had while I was trying onboard the plane.) At the same time, Netnod in
Sweden did have connectivity to Cogent.
Regards
Marshall
On Oct
On Tue, 7 Oct 2008, [EMAIL PROTECTED] wrote:
On Tue, 07 Oct 2008 11:30:11 CDT, J. Oquendo said:
What about exceeding the minimum requirements for a change.
(I think you'll find that if somebody is actually willing to *pay* for more
security, there's plenty of outfits who are more than happy to
On Tue, 7 Oct 2008 14:07:04 -0400 (EDT)
Sean Donelan [EMAIL PROTECTED] wrote:
On Tue, 7 Oct 2008, [EMAIL PROTECTED] wrote:
On Tue, 07 Oct 2008 11:30:11 CDT, J. Oquendo said:
What about exceeding the minimum requirements for a change.
(I think you'll find that if somebody is actually
All:
Just a reminder to get your Program Committee nominations into [EMAIL
PROTECTED] In just a few days the Merit team will be off to LA and NANOG44.
While at the meeting we have many tasks that will take us away from email for a
bit. We do not want to miss any one, so please take a moment
Superficially, one difference between government and business security
programs is that government has intelligence agencies that they can draw
upon for threat assessment. It is a separate question if intelligence
agencies accurately determine certain threats, or if politicians pay
attention to
On Tue, 07 Oct 2008 14:13:08 EDT, Steven M. Bellovin said:
Right. The US government is a *huge* operation. Suppose you were the
CIO or the CSO for the US government (excluding the classified stuff)
-- what is the proper cybersecurity strategy?
Step 1: Figure out what I actually *have*
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Tue, Oct 7, 2008 at 11:55 AM, [EMAIL PROTECTED] wrote:
On Tue, 07 Oct 2008 14:13:08 EDT, Steven M. Bellovin said:
Right. The US government is a *huge* operation. Suppose you were the
CIO or the CSO for the US government (excluding the
On Oct 7, 2008, at 3:01 PM, Paul Ferguson wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Tue, Oct 7, 2008 at 11:55 AM, [EMAIL PROTECTED] wrote:
On Tue, 07 Oct 2008 14:13:08 EDT, Steven M. Bellovin said:
Right. The US government is a *huge* operation. Suppose you were
the
CIO
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Tue, Oct 7, 2008 at 12:05 PM, Marshall Eubanks [EMAIL PROTECTED]
wrote:
Step 0. DONT PANIC.
Good point.
Along the same line, I would like to point out this Ira Winkler article on
the topic:
Not Much Genius in DHS's Einstein 3.0 Plan
One special case to consider - your provider gets taken over, and the new owner
regrooms the combined fiber networks, such that formerly physically diverse
paths no longer are...
These are lessons many learned 7 years ago...
No circuit is set and forget, including so-called protected
hat org=NANOG Program Committee role=Chair
NANOG45 will be held in the middle of the North American Winter in
beautiful Santo Domingo in the Dominican republic on January 25-28.
http://nanog.org/meetings/nanog45/
This is the first time that a NANOG has been held outside of the US or
Canada
Somebody on the NANOG mailing list has their mail pointing to tcwireless.us,
which is throwing challenge/response mail like the following:
Your message
From: [EMAIL PROTECTED]
To: n3td3v [EMAIL PROTECTED]
Subject: Re: Fwd: cnn.com - Homeland Security seeks cyber counterattack system (
Einstein
I just received the following:
Your message
From: Howard C. Berkowitz [EMAIL PROTECTED]
To: nanog@nanog.org
Subject: RE: Fwd: cnn.com - Homeland Security seeks cyber
counterattacksystem(Einstein 3.0)
Date: 10/7/2008
has been just received by nanog.org mailserver.
To prove that
[EMAIL PROTECTED] wrote:
Somebody on the NANOG mailing list has their mail pointing to tcwireless.us,
which is throwing challenge/response mail like the following:
Your message
From: [EMAIL PROTECTED]
To: n3td3v [EMAIL PROTECTED]
Subject: Re: Fwd: cnn.com - Homeland Security seeks cyber
I received the same message
Subject : Challenge Response
Received: from mail.tcwireless.us ([67.108.86.20] verified)
Your message
...
has been just received by gmail.com mailserver.
I assumed that this is a phishing scam due to the from / mailserver
mismatch, which I think this confirms.
Apology to NANOG for the whitelist failing..
Fredric S. Moses
Chief Technology Officer,Tri-County Times
[EMAIL PROTECTED]
-Original Message-
From: Marshall Eubanks [mailto:[EMAIL PROTECTED]
Sent: Tuesday, October 07, 2008 4:29 PM
To:
Finally a caribbean host.. :) and great timing of the year! Tried few years
ago a meeting in San Juan, PR unfortunately couldn¹t make it possible. Very
well knowing how hard to satisfy certain needs of these kind of meetings,
all kudos to the sponsors and merit!
See ya all in santa domingo! Ohh
We've got plenty of military toyz we could level at Redmond...
_H*
This one? http://www.wired.com/science/discoveries/news/1998/07/13987
-Original Message-
From: *Hobbit* [mailto:[EMAIL PROTECTED]
Sent: Tuesday, October 07, 2008 4:11 PM
To: nanog@nanog.org
Subject: Re: Fwd: cnn.com - Homeland Security seeks cybercounterattack
system(Einstein 3.0)
I think I may have found a spin for the political statements: With the
USA government so focused on blaming axis of evil countries for all
its woes, perhaps the statement was really meant to say that should
evil country setup some botnet attack against our systems, the USA
would retaliate by
---Original Message---
From: *Hobbit* [mailto:[EMAIL PROTECTED]
We've got plenty of military toyz we could level at Redmond...
---
- [EMAIL PROTECTED] wrote: -
From: Howard C. Berkowitz [EMAIL PROTECTED]
This one?
On Tue, 07 Oct 2008 14:54:33 PDT, Scott Weeks said:
http://upload.wikimedia.org/wikipedia/commons/5/57/USS_Yorktown.jpg
was rendered unusable by a sh!++y OS? !!!
To be fair, designing a system that could be dead in the water if one component
bluescreened probably wasn't a wise idea
Scott Weeks wrote:
This:
http://upload.wikimedia.org/wikipedia/commons/5/57/USS_Yorktown.jpg
was rendered unusable by a sh!++y OS? !!!
wipes tears from eyes after rolling around on the floor in convulsive laughter
Um, no, that one was rendered unusable by Japanese bombs and
Ah, it's a bit worse. This is the ship that ran Windows.
http://upload.wikimedia.org/wikipedia/commons/thumb/a/a1/USS_Yorktown_%28CG-
48%29%3B04014806.jpg/300px-USS_Yorktown_%28CG-48%29%3B04014806.jpg
You have a picture of the World War II carrier. Now, this one, the second
ship of the class, has
On Tue, 7 Oct 2008, Steven M. Bellovin wrote:
On Tue, 7 Oct 2008 14:07:04 -0400 (EDT)
Sean Donelan [EMAIL PROTECTED] wrote:
On Tue, 7 Oct 2008, [EMAIL PROTECTED] wrote:
On Tue, 07 Oct 2008 11:30:11 CDT, J. Oquendo said:
What about exceeding the minimum requirements for a change.
(I think
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Greetings,
I agree with Howard here, I don't think this is a mis-configuration,
but a harvest attempt. The mailserver is in different messages, and
I can't see how that could get misconfigured in a honest validation
server. My guess is that
The person responsible already posted about this about 4 hours ago, BTW;
further speculation is obsolete. :)
- S
-Original Message-
From: Owen DeLong [mailto:[EMAIL PROTECTED]
Sent: Tuesday, October 07, 2008 9:11 PM
To: Christopher LILJENSTOLPE
Cc: nanog@nanog.org
Subject: Re: OK, who's
Date: Tue, 7 Oct 2008 21:25:26 -0700
From: Paul Ferguson [EMAIL PROTECTED]
Go sharks. :-)
All Right! Maybe we can have a nice teal-clad group down in LA.
Sharks!
--
R. Kevin Oberman, Network Engineer
Energy Sciences Network (ESnet)
Ernest O. Lawrence Berkeley National Laboratory (Berkeley
36 matches
Mail list logo