Lorell,
On Jan 25, 2009, at 5:27 PM, Lorell Hathcock wrote:
Every time I see a post like the one below on this list, I can't
help but
feel like big brother has infiltrated the list.
Someone stating the obvious implications of the lack of the Internet
operations community to address a known
'long as you have your compiler working, Quagga reportedly builds and
runs out of the box: http://www.quagga.net/
No clue about OSX, but OpenBGPd works well on generic FreeBSD, you
could give it a try: http://www.openbgpd.org/
-Jack Carrozzo
On Sun, Jan 25, 2009 at 9:31 PM, wrote:
> Does anyon
Does anyone known which open source BGP implementation I can get running on
Mac OS X Leopard with a minimum of fuss?
This is for experimentation only (not for a production environment) so I am
not too concerned about scaling and performance.
If any tweaking is needed to get it to compile /
Every time I see a post like the one below on this list, I can't help but
feel like big brother has infiltrated the list.
There's no mess like the ones government will create for you.
Lorell
-Original Message-
From: David Conrad [mailto:d...@virtualized.org]
Sent: Friday, January 23, 20
-original message-
Subject: Re: Are we really this helpless? (Re: isprime DOS in progress)
From: Michael Dillon
Date: 25/01/2009 10:16 pm
>
> I think each point above is true -- BCP38 is indeed a technique, but
> failure to universally implement it defaults to (almost) a tragedy of the
> common
>
> I think each point above is true -- BCP38 is indeed a technique, but
> failure to universally implement it defaults to (almost) a tragedy of the
> commons.
>
> After ~10 years, it is surreal to me that we, as a community, are still
> grappling with issues where it could be beneficial for the In
I just took a snapshot of my bind logs from the past two hours (on
01/25/209 at 14:40 EST). Based on what I'm seeing, four DNS servers are
still under attack at varying levels. 206.71.158.30 is bearing the
brunt of the attacks. And as you indicated, 76.9.16.171 is still being
targeted, although
All NANOG45 Attendees!
Don't miss tonight's Dominican Fiesta Party sponsored by the Dominican
Government for NANOG attendees in Santo Domingo.
Buses will be outside the lobby starting 7 p.m. and leaving the hotel
promptly at 7:30 p.m. If you miss the bus you can take a taxi (~US$10)
to:
Restaur
I'm not sure you're entirely out of the water yet:
17:13:45.680944 76.9.16.171.53868 > .53: 58451+ NS? . (17)
17:13:45.681251 .53 > 76.9.16.171.53868: 58451 Refused- 0/0/0
(17)
CIDR: 76.9.0.0/19
NetName:ISPRIME-ARIN-3
In addition to the one that Brian Keefer menti
Jon Kibler wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
valdis.kletni...@vt.edu wrote:
Well, we *could* hunt down the perpetrators, pool some $$, and hire 3 or 4
baseball-bat wielding professional explainers to go explain our position to
them. Figuring out how to do so without brea
On Sat, Jan 24, 2009 at 9:00 PM, Frank Bulk wrote:
> I would not recommend sucking in your dns log into array, rather, read line
> by line and iterate over the file, line by line.
>
> Frank
True.. reading into an array can get a bit nasty, if your server logs
are a few gigabytes in size.
Could u
On Jan 24, 2009, at 7:00 PM, Frank Bulk wrote:
-Original Message-
From: Brian Keefer [mailto:ch...@smtps.net]
Caveat: my PERL is _terrible_.
http://www.smtps.net/pub/dns-amp-watch.pl
I would not recommend sucking in your dns log into array, rather,
read line
by line and iterate o
valdis.kletni...@vt.edu wrote:
On Fri, 23 Jan 2009 18:33:14 PST, Seth Mattinen said:
Back to my original question: is there really not a better solution?
Well, we *could* hunt down the perpetrators, pool some $$, and hire 3 or 4
baseball-bat wielding professional explainers to go expl
13 matches
Mail list logo