On 30/11/2012, Robert E. Seastrom r...@seastrom.com wrote:
[*] The OpenBSD side of the story can be read at
http://en.wikipedia.org/wiki/Common_Address_Redundancy_Protocol#No_official_Internet_protocol_number
Seems that there is a lesson to be learned here:
o hai, we wrote this software but
case of the same situation all[1] 'software md5 tcp' implementations
have? sign but never verify...
and freebsd :(
The amount of detail in the original posting is rather disappointing,
with absolutely no hope of anyone being able to reproduce the problem
with the data given.
Did the vhid and vrrp group overlap? Were there duplicate IP addresses?
- Forwarded message from grarpamp grarp...@gmail.com -
From: grarpamp grarp...@gmail.com
Date: Thu, 29 Nov 2012 17:36:33 -0500
To: tor-rel...@lists.torproject.org
Cc: e...@stderr.org
Subject: [tor-relays] Bandwidth and server leads [was: Tor raid]
Reply-To: tor-rel...@lists.torproject.org
David Walker davidianwal...@gmail.com writes:
[ patent fight recap ]
Thanks for posting those. I recall the discussions surrounding the
HSRP patents well, but it's been a while and I have proportionally
more gray hair (and less overall) now.
My problem is not with Theo nor with the IETF. My
On 30/11/2012 05:52, Robert E. Seastrom wrote:
[*] The OpenBSD side of the story can be read at
http://en.wikipedia.org/wiki/Common_Address_Redundancy_Protocol#No_official_Internet_protocol_number
Seems that there is a lesson to be learned here:
o hai, we wrote this software but can not be
* Will Hargrave (w...@harg.net) wrote:
On 29 Nov 2012, at 20:53, George Herbert george.herb...@gmail.com wrote:
The assertion being made here, that it's somehow illegal (or immoral,
or scary) for there to be not-completely-traceable internet access in
the US, is absurd.
The real
On Thu, Nov 29, 2012 at 08:04:02AM -0500, Chris quoted (William):
Yes, it happened to me now as well - Yesterday i got raided for
someone sharing child pornography over one of my Tor exits.
Question: what evidence has been published -- that is, placed somewhere
that we can all see it -- that
On 2012-11-30 13:51 , Joakim Aronius wrote:
* Will Hargrave (w...@harg.net) wrote:
On 29 Nov 2012, at 20:53, George Herbert george.herb...@gmail.com
wrote:
The assertion being made here, that it's somehow illegal (or
immoral, or scary) for there to be not-completely-traceable
internet
* Robert E. Seastrom r...@seastrom.com [2012-11-30 13:46]:
My problem is not with Theo nor with the IETF. My problem is with a
crappy and credulous implementation. When an outage is caused by
redundancy software that comes from an organization that prides itself
on well-written code, the
On 2012-11-30, Robert E. Seastrom r...@seastrom.com wrote:
I can't seem to recall anyone griping about this here on our august
little list but google finds that I'm by no means the first to have
been burned by an unholy interaction between VRRP and CARP.
Let's skip the protocol discussions
On 2012-11-30, Randy Bush ra...@psg.com wrote:
case of the same situation all[1] 'software md5 tcp' implementations
have? sign but never verify...
and freebsd :(
openbsd verifies these, btw.
Henning Brauer hb-na...@bsws.de writes:
* Robert E. Seastrom r...@seastrom.com [2012-11-30 13:46]:
My problem is not with Theo nor with the IETF. My problem is with a
crappy and credulous implementation. When an outage is caused by
redundancy software that comes from an organization that
Hi James,
Is your windows client seeing traffic from the 6500 with the real (Burned
in) MAC address of your 6500? If so it may be re-arping to find out which
of the MAC addresses is the 'right' one to use, the real MAC or the HSRP
MAC.
My memory is fuzzy, but I think I've seen issues like that
Jussi Peltola pe...@pelzi.net writes:
The amount of detail in the original posting is rather disappointing,
with absolutely no hope of anyone being able to reproduce the problem
with the data given.
It was not intended as a bug report, instead merely an expression of
disappointment and an
I'll see your disagree and raise you another ;-)
I would say you almost never want to store addresses as character data
unless the only thing you're using them for is logging (even then it's
questionable). I run into people who do this all the time and it's a
nightmare.
It's easy to store a v6
Stuart Henderson s...@spacehopper.org writes:
I don't see anything here indicating that it's to do with CARP
believing things sent over the wire, I suspect the problem would still
occur if CARP were disabled on the pfSense box. (Do people really
run CARP in the wild without authentication
Comments inline ... as best I can.
On 30/11/2012, Robert E. Seastrom r...@seastrom.com wrote:
David Walker davidianwal...@gmail.com writes:
[ patent fight recap ]
Thanks for posting those. I recall the discussions surrounding the
HSRP patents well, but it's been a while and I have
On 11/30/2012 09:45 AM, Ray Soucy wrote:
I'll see your disagree and raise you another ;-)
I would say you almost never want to store addresses as character data
unless the only thing you're using them for is logging (even then it's
questionable). I run into people who do this all the time and
I think if they took the cash registers too the Starbucks lawyer would be
in court an hour later with a motion to quash in one hand and an offer of
full cooperation in the other.
Regards, Bill Herrin
The standard, in the U.S., is any electronic device capable of storing
data.
No, but to isolate any possible layer2 traffic that could affect the issue, one
of my colleagues performed host to guest testing in a VM and we are seeing the
same issue.
14:28:30.420589 00:1c:42:d7:92:84 00:1c:42:00:00:08, ethertype ARP (0x0806),
length 42: Request who-has 10.211.55.2
On November 29, 2012 at 11:50 george.herb...@gmail.com (George Herbert) wrote:
On Thu, Nov 29, 2012 at 11:18 AM, Tom Beecher tbeec...@localnet.com wrote:
Assuming it's true, it was bound to happen. Running anything , TOR or
otherwise, that allows strangers to do whatever they want is just
On Nov 30, 2012, at 5:08 AM, Henning Brauer hb-na...@bsws.de wrote:
and re IANA, they made it clear they would not give us a proto number
As they should have. IANA abides by the rules laid down for it by the
IETF/IESG/IAB. The openbsd folks couldn't be bothered to even write up a draft
and
Hello again,
I sincerely appreciate all the suggestions over the past week or so. We are
mostly out of the woods.
Yahoo is still blocking one of our MXs (12.25.180.94), despite repeated
attempts to clear that IP. It appears as though no matter who we contact at
Yahoo, they are all sending the
On November 30, 2012 at 08:18 joa...@aronius.se (Joakim Aronius) wrote:
I am all for being anonymous on the net but I seriously believe that we
still need to enforce the law when it comes to serious felonies like child
pr0n, organized crime etc, we can't give them a free pass just by
Barry Shein wrote:
On November 30, 2012 at 08:18 joa...@aronius.se (Joakim Aronius) wrote:
I am all for being anonymous on the net but I seriously believe that we
still need to enforce the law when it comes to serious felonies like child pr0n,
organized crime etc, we can't give them a
On Fri, Nov 30, 2012 at 12:48 PM, Barry Shein b...@world.std.com wrote:
Yeah, next they'll let just anyone walk down the sidewalk without
identifying themselves. And those are public sidewalks paid for by tax
dollars!
If you hang out with criminals, sooner or later you'll encounter a
situation
This issue came up originally during my tenure at IANA, and FWIW I
concur with David. I have a vague memory of engaging directly with some
folks from OpenBSD and letting them know that I was sympathetic with
their situation, but IANA has strict rules to follow, and unless they
followed procedure
This is an automated weekly mailing describing the state of the Internet
Routing Table as seen from APNIC's router in Japan.
The posting is sent to APOPS, NANOG, AfNOG, AusNOG, SANOG, PacNOG, LacNOG,
TRNOG, CaribNOG and the RIPE Routing Working Group.
Daily listings are sent to
On Fri, Nov 30, 2012 at 9:45 AM, Ray Soucy r...@maine.edu wrote:
I'll see your disagree and raise you another ;-)
I would say you almost never want to store addresses as character data
unless the only thing you're using them for is logging (even then it's
questionable). I run into people who
On Nov 30, 2012, at 4:58 AM, Rich Kulawiec r...@gsp.org wrote:
On Thu, Nov 29, 2012 at 08:04:02AM -0500, Chris quoted (William):
Yes, it happened to me now as well - Yesterday i got raided for
someone sharing child pornography over one of my Tor exits.
Question: what evidence has been
I believe that idea has legs regardless of practical considerations
and stands on it's own.
Besides, I won't discount OpenBSD out of hand for forging ahead,
withstanding practical issues, considering the runs they've got on the
board and the many facepalm fails we see in the diametrically
On Nov 30, 2012, at 11:09 AM, William Herrin b...@herrin.us wrote:
On Fri, Nov 30, 2012 at 9:45 AM, Ray Soucy r...@maine.edu wrote:
I'll see your disagree and raise you another ;-)
I would say you almost never want to store addresses as character data
unless the only thing you're using
On Fri, Nov 30, 2012 at 08:48:48AM -0800, David Conrad wrote:
On Nov 30, 2012, at 5:08 AM, Henning Brauer hb-na...@bsws.de wrote:
and re IANA, they made it clear they would not give us a proto number
As they should have. IANA abides by the rules laid down for it by the
IETF/IESG/IAB. The
-Original Message-
From: Rich Kulawiec [mailto:r...@gsp.org]
Sent: Friday, November 30, 2012 6:59 AM
To: nanog@nanog.org
Subject: Re: William was raided for running a Tor exit node. Please
help if you can.
On Thu, Nov 29, 2012 at 08:04:02AM -0500, Chris quoted (William):
Yes, it
WAIT A SECOND HERE!?!?
I just read below that this guy runs a large ISP in Austria. I thought
his Tor node was hosted with an external provider. If he runs the ISP,
why would he not host his own server in house? I suppose there are
reasons but I can't think of one, especially if you feel so
On 11/29/12, William Herrin b...@herrin.us wrote:
If the computer at IP:port:timestamp transmitted child porn, a warrant
for all computers is also too broad. Computers which use said IP
As you know, there may always be some uncertainty about which computer
was using a certain IP address at a
On 11/30/2012 04:01 PM, Naslund, Steve wrote:
I am a little concerned that this guy keeps a safe deposit box with a burner
phone and cash around. Is he a CIA agent? :)
Anyone who DOESN'T have such things stashed away somewhere is, IMHO,
incredibly naive and taking on quite a large amount
As a network professional do I not have a duty to protect my companies
network from unauthorized access within my ability to do so? I think I
do. If you lost all of your credit card and identity data because I
left an open wifi hotspot on my network would you have a liability case?
I sure think
This report has been generated at Fri Nov 30 21:13:10 2012 AEST.
The report analyses the BGP Routing Table of AS2.0 router
and generates a report on aggregation potential within the table.
Check http://www.cidr-report.org for a current version of this report.
Recent Table History
Date
BGP Update Report
Interval: 22-Nov-12 -to- 29-Nov-12 (7 days)
Observation Point: BGP Peering with AS131072
TOP 20 Unstable Origin AS
Rank ASNUpds % Upds/PfxAS-Name
1 - AS37113 100140 5.0%2328.8 -- tangerine-ug-as
2 - AS37044 46614 2.3%2330.7
OK, there must be a lot more paranoid people out there than I thought
there were. I personally don't have a runaway kit stashed away. I
will get right on that. So when that mouth breather cop won't believe
you are innocent, your answer is to grab your stuff and go on the lamb
for awhile? I am
On Fri, Nov 30, 2012 at 4:46 PM, Jimmy Hess mysi...@gmail.com wrote:
If they had a qualified technician, they probably wouldn't be raiding
a TOR exit node in the first place; they would have investigated the
matter more thoroughly, and saved precious time.
And what if the TOR exit node was
On 11/30/2012 03:30 PM, Naslund, Steve wrote:
WAIT A SECOND HERE!?!?
I just read below that this guy runs a large ISP in Austria. I thought
his Tor node was hosted with an external provider. If he runs the ISP,
why would he not host his own server in house? I suppose there are
reasons but I
From: Jimmy Hess [mailto:mysi...@gmail.com]
Sent: Friday, November 30, 2012 3:47 PM
To: William Herrin
Cc: NANOG list
Subject: Re: William was raided for running a Tor exit node. Please
help if you can.
On 11/29/12, William Herrin b...@herrin.us wrote:
If the computer at IP:port:timestamp
-Original Message-
From: Peter Kristolaitis [mailto:alte...@alter3d.ca]
Sent: Friday, November 30, 2012 4:53 PM
To: nanog@nanog.org
Subject: Re: William was raided for running a Tor exit node. Please help if
you can.
(Note: I don't mean to imply that all cops are power hungry
When is the last time you were arrested, or even in a legal situation
which required your attention as a defendant? It seems pretty straight
forward, but I can assure you this guy is getting very little sleep and
his heart is beating out of his chest. Granted this entire situation is
taking place
Well, in that case I am really worried that the cops might charge
me with a crime. They took my computers and are looking at them. I did
not do anything wrong but just in case they decide to charge me with a
crime, please send me some money.
Thanks,
Steven Naslund
-Original
-
Well I want to add my 10 cents,
I am a c++ programmer, and have been waiting for my isp to offer native
ipv6 for ever. I got fed up with waiting and setup a ipv6 over ipv4
tunnel. So once I got that done, I spent only an hour updating my socket
classes to support ipv6. I hadent done so
I didn't say anything about trying to run away. That probably won't
accomplish a whole lot in the long run. But when all of your bank
accounts and credit cards are frozen, and your house is a crime scene,
at least you have the means to rent a hotel room, contact
family/lawyers, etc.
And
On Fri, Nov 30, 2012 at 4:46 PM, Jimmy Hess mysi...@gmail.com wrote:
On 11/29/12, William Herrin b...@herrin.us wrote:
If the computer at IP:port:timestamp transmitted child porn, a warrant
for all computers is also too broad. Computers which use said IP
As you know, there may always be some
Guess who has power over the networks and Internet. We do and power corrupts
us too. There are some bad guy ISPs and engineers out there too. Just because
you are running a Tor server to allow for privacy protection does not mean
you were never doing anything illegal through it. I know this
On Fri, Nov 30, 2012 at 5:18 PM, Randy na...@afxr.net wrote:
-
Well I want to add my 10 cents,
I am a c++ programmer, and have been waiting for my isp to offer native ipv6
for ever. I got fed up with waiting and setup a ipv6 over ipv4 tunnel. So
once I got that done, I spent only an hour
OK, I get it. I think my BS detector is set to high today. I am just
really suspicious that this guy that runs an large ISP can't at least
wait until there are charges before all the uproar. I think if the cops
came and seized my home PCs right now I would probably give them the
time to look at
I might be reading this the wrong way but it looked to me like the cops
raided his home and the Tor server is hosted off site with an ISP. That
is what is bugging me so much. The cops raided his house, not the
location of the server. If they had tracked the server by its IP it
would have led to
OK, I get it. I think my BS detector is set to high today. I am just
really suspicious that this guy that runs an large ISP can't at least
wait until there are charges before all the uproar. I think if the cops
came and seized my home PCs right now I would probably give them the
time to
I can't help but wonder who would send money to same random person based on
a story that may or may not be true. Were these people sucked in by Nigeria
scams as well?
Not only that, but the list of people who proclaimed their innocence only
to be proven guilty is very long. I can't vouch for
On 2012-12-01 00:00, Dobbins, Roland wrote:
On Nov 29, 2012, at 12:27 PM, Owen DeLong wrote:
60% of the world's population still isn't on the internet and I
expect a significant fraction of that will be coming on in the next
2-4 years.
I live and work in a part of the world which
I understand that they could look at them for many months. In the
meantime, my life will go on. I don't believe there is a whole lot you
can do about it. If they take too long, I will consider asking a lawyer
to look into getting my stuff back but it would have to be expensive
stuff to make the
In message cap-gugwtcoafenkqsxsssomxmy1sqs2ofaprv26ww+gfvfp...@mail.gmail.com,
William Herrin writes:
On Fri, Nov 30, 2012 at 5:18 PM, Randy na...@afxr.net wrote:
-
Well I want to add my 10 cents,
I am a c++ programmer, and have been waiting for my isp to offer native ipv6
for ever. I
On Sat, Dec 01, 2012 at 02:05:14AM +1030, David Walker wrote:
As far as not using the same protocol number, that's neither here nor there.
Horse pucky. On the Internet, the secure and reliable players
co-ordinate their protocol actions through the IANA, using the
published IANA rules for how
I would guess that a lot of the access growth going forward is going to
be a lot of what I would term incidental access. More and more
devices and technology requires or supports Internet access. So while a
lot of people may not ask for internet service that don't already have
it, it will be
Naslund, Steve wrote:
I might be reading this the wrong way but it looked to me like the cops
raided his home and the Tor server is hosted off site with an ISP. That
is what is bugging me so much. The cops raided his house, not the
location of the server. If they had tracked the server by its
On 30/11/2012 21:01, Claudio Jeker wrote:
Still carp packets can coexist with vrrp packets. They use a different
version numbers.
And the same mac address pool, which means that if you use the same vhid as
vrrp group number, you will trash both your carp and vrrp virtual IPs.
Carp was coded
PROCEDURE FOR SEIZURE OF COMPUTERS AND RELATED DEVICES
This search warrant covers and controls the procedure for searching: (1)
electronic or computer devices, related equipment or media which has been
authorized to be seized pursuant to this warrant on the basis that it is
contraband or a
On Fri, 30 Nov 2012, Naslund, Steve wrote:
My message to the cops and my lawyer would be charge me or lets clear
this up. There are laws to protect you from the government from taking
your stuff in an unfair manner if you want to go that route. If there
is a misunderstanding I will talk to the
Not a lawyer.
than stfu with the legal crap
Not only that, but the list of people who proclaimed their innocence only
to be proven guilty is very long. I can't vouch for countries outside of
the USA, but here at least we don't get subpoenas on a whim. They are
usually part of a very long drawn-out investigation, and they usually are
On Fri, Nov 30, 2012 at 6:12 PM, Mark Andrews ma...@isc.org wrote:
In message
cap-gugwtcoafenkqsxsssomxmy1sqs2ofaprv26ww+gfvfp...@mail.gmail.com,
William Herrin writes:
On Fri, Nov 30, 2012 at 5:18 PM, Randy na...@afxr.net wrote:
It wasn't difficult to update to ipv6, only some reading was
On 11/30/12 5:15 PM, Naslund, Steve wrote:
Well, in that case I am really worried that the cops might charge
me with a crime. They took my computers and are looking at them. I did
not do anything wrong but just in case they decide to charge me with a
crime, please send me some money.
As
Japan and South Korea are doing quite well indeed
I guess that depends upon how one defines 'quite well', heh. They're
certainly ahead of other countries in the region with regards to IPv6
i can only speak about japan, and it's embarrassing big-time. europe
is in better shape. see, for
As well you could be, because you appear to have the same name as a
registered sex offender:
ok children. can we pull ourselves up out of the mud, please?
randy
On Dec 1, 2012, at 10:32 AM, Randy Bush wrote:
i am pretty sure cernet-2 serves a few times as many people than the entire
population of the united states
I'm certain that it does not.
China did a fantastic job of showcasing IPv6 with the Beijing Olympics, but
it's not widely deployed for
On Nov 30, 2012, at 7:20 PM, William Allen Simpson wrote:
As well you could be, because you appear to have the same name as a
registered sex offender:
Hey, that's a fun game:
http://www.sexoffenderin.com/reg77161/william_a_simpsonmugshot.htm
Those who do not remember history...
On Fri, Nov 30, 2012 at 5:23 PM, goe...@anime.net wrote:
On Fri, 30 Nov 2012, Naslund, Steve wrote:
My message to the cops and my lawyer would be charge me or lets clear
this up. There are laws to protect you from the government from taking
your stuff
am Freitag, 30. November 2012 um 22:30 schrieb NANOG list:
WAIT A SECOND HERE!?!?
I just read below that this guy runs a large ISP in Austria.
The info from tor-talk was somewhat misleading. William Weber is not
the owner of the ISP. He works there as an administrator. So he runs
it (maybe)
76 matches
Mail list logo