OH SNAP!
On Fri, Sep 25, 2015 at 10:07 PM, Matthew Kaufman wrote:
>
>
> On 9/25/15 5:43 PM, Stephen Satchell wrote:
>>
>> On 09/25/2015 04:20 PM, Ca By wrote:
>>>
>>> RFO: Google unilaterally deployed a non-standard protocol to our
>>> production
>>> environment, driving up
Great summary of the thread
No-one using remote control robots with video feed etc for working in these
environments then? Plans to? ;)
alan
> The IPv4 free pool for the ARIN region is now depleted
and the world goes on
randy
On 26 September 2015 at 08:20, Mike Hale wrote:
> OH SNAP!
Tiny Rick!!!
On Sep 26, 2015, at 5:11 AM, Randy Bush >
wrote:
The IPv4 free pool for the ARIN region is now depleted
and the world goes on
Indeed.
…then again, the real traffic growth having already moved off of IPv4 to IPv6
probably helps a bit -
On 9/24/15 09:59, William Astle wrote:
On 2015-09-24 10:49, Dovid Bender wrote:
The issue now is convincing clients that they need it. The other issue
is many software vendors still don't support it.
Regards,
Dovid
Actually, the issue now is convincing certain big providers to actually
make
> From: David Hubbard
> Websites that require some type of authentication that is handled via
> session cookies have been booting our users out randomly with "your ip
> address has changed" type message. This occurs when their Mac decides
> to switch between
On Saturday, September 26, 2015, David Hubbard <
dhubb...@dino.hostasaurus.com> wrote:
> Hey all, as we've slowly deployed IPv6 to our end users, it has begun to
> cause some issues for those on Mac's specifically. Apple apparently has
> an algorithm at some point in the network stack to decide
On 2015-09-26 14:34, David Hubbard wrote:
Websites that require some type of authentication that is handled via
session cookies have been booting our users out randomly with "your ip
address has changed" type message. This occurs when their Mac decides
to switch between protocols because the
At 11:42 25/09/2015 -0700, Jake Mertel wrote:
Looks like Cisco's Talos just released a tool to scan your network for
indications of the SYNful Knock malware. Details @
http://talosintel.com/scanner/ .
More details here:
http://blogs.cisco.com/security/talos/synful-scanner
-Hank
--
I forgot who it was but I think it was a uni network. As an isp everything
should be allowed as an end network you want to cya.
Much like the hospital I was just at that had free wifi. Only ports 80 and 443
over tcp were allowed. That's when having ssh on 443 so you can proxy for alt
ports
> Those site eventually learnt after much feedback not to assume on IPv4
address continuity.
I could envision that those checks might now be relaxed to checking for
address continuity in the same /24 for instance.
But when you're seeing the same session being used from two wildly different
What about users on cgnat? I know isp's in the far east that only offer cgnat
and it's pot lock how you go out.
--Original Message--
From: Michael Brown
Sender: NANOG
To: Brandon Butterworth
To: nanog@nanog.org
To: dhubb...@dino.hostasaurus.com
Subject: Re: Question re session hijacking
No but some one in Australia just bought the iPhone 6s via a robot.
--Original Message--
From: Alan Buxey
Sender: NANOG
To: Nick Hilliard
To: nanog@nanog.org
Subject: Re: Ear protection
Sent: Sep 26, 2015 04:21
Great summary of the thread
No-one using remote control robots with video
Hey all, as we've slowly deployed IPv6 to our end users, it has begun to
cause some issues for those on Mac's specifically. Apple apparently has
an algorithm at some point in the network stack to decide whether IPv4
or IPv6 is, perhaps, 'better' or 'faster' at any given point in time
during an
Colleagues,
A list of currently accepted RIPE 71 presentations is now published at:
https://ripe71.ripe.net/programme/
There are still few slots remaining for a final RIPE 71 programme and
RIPE Programme Committee will accept new proposals until 11 October 2015.
This is our last call for you
16 matches
Mail list logo