On Mon, 16 Oct 2017, Mike wrote:
'presidential alerts'. From what I see, this is really wrong. Yes I would
like there to be a broadcast capability with some kind of gps fencing. No, I
am not the police nor will I do their job and be their eyes and ears. Yes, I
want to know if there is a major f
I agree with Tony Wicks. I have seen an “active” wave referred to on active
wave gear a a “passive” wave on a passive mux.
Justin Wilson
j...@mtin.net
www.mtin.net
www.midwest-ix.com
> On Oct 1, 2017, at 4:29 PM, jeff herbel wrote:
>
> Yes. They might be thinking of dark fiber..
>
> On Sun,
re: alerts
last march, Montréal had a nasty winter storm which resulted in a
stretch of highway wheree all exits were blocked for hours (the
government had inquiry on what happened). Cars stuck in there in middle
of night for 6 hours.
Once police woke up, it would have been extremely helpful if
From: "Leo Bicknell"
> What about going the other way? Ask for 2^32-1. "We have the biggest
> ASN!"
Make ASNs great again?
--
Sabri
JNCIE #261
On 10/16/2017 09:01 AM, Sean Donelan wrote:
On Mon, 16 Oct 2017, Aaron C. de Bruyn wrote:
Simple programming problem.
Speaker: "There is a tornado warning in this area, would you like to
hear more?"
User: "How did you get my phone number?"
Speaker: "You have opted out of tornado warnings"
On Mon, 16 Oct 2017, Aaron C. de Bruyn wrote:
Simple programming problem.
Speaker: "There is a tornado warning in this area, would you like to hear more?"
User: "How did you get my phone number?"
Speaker: "You have opted out of tornado warnings"
Fast forward to the next tornado and techno-dar
On Mon, Oct 16, 2017 at 8:32 AM, Sean Donelan wrote:
> A smart speaker suddenly announcing "There is a tornado warning in this
> area, would you like to hear more?" will probably freak-out those same
> non-technical people.
Simple programming problem.
Speaker: "There is a tornado warning in this
On Sun, 15 Oct 2017, Peter Beckman wrote:
It is theoretically simple to:
1. Turn the address of your Smart Speaker into coordinates
2. Receive ALL alerts and only act upon those that apply to your
location
This way it isn't creepy, because the emergency alert wasn't targeted to
Cisco's PSIRT:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-
sa-20171016-wpa
Some fixes appear to be available, or will be soon.
-Original Message-
From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of
valdis.kletni...@vt.edu
Sent: Monday, Octob
On Mon, 2017-10-16 at 12:09 +, Edwin Pers wrote:
> I see here that MikroTik has patched this about a week ago: https://f
> orum.mikrotik.com/viewtopic.php?f=21&t=126695
>
> Any word on other vendor's response to this?
>
https://github.com/kristate/krackinfo has a nice overview of various
ven
Aruba: http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt
-- Jim Gogan / UNC-Chapel Hill
-Original Message-
From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of Edwin Pers
Sent: Monday, October 16, 2017 8:10 AM
To: Job Snijders ; valdis.kletni...@vt.edu
Cc: nanog@nanog
Ubiquiti already has it patched in UniFi firmware release 3.9.3 (see forums for
more detail, or I'll be doing a sticky post in /r/ubiquiti later). 3.8.15 for
Broadcom based APs like the first gen UAP-AC and ACv2 should be soon from what
I read.
Don't know about Airmax yet though.
So, any bet
In a message written on Mon, Oct 16, 2017 at 03:38:19AM -0400,
valdis.kletni...@vt.edu wrote:
> And it looks like we're all going to be reflashing a lot of devices.
Based on my reading this morning many (but not all) of the attacks are
against _clients_ with no way to migitate by simply upgrading
hey,
Any word on other vendor's response to this?
Aruba -
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007_FAQ_Rev-1.pdf
--
tarko
I see here that MikroTik has patched this about a week ago:
https://forum.mikrotik.com/viewtopic.php?f=21&t=126695
Any word on other vendor's response to this?
Ed
-Original Message-
From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of Job Snijders
Sent: Monday, October 16, 2017 5:
Dear all,
Website with logo: https://www.krackattacks.com/
Paper with background info: https://papers.mathyvanhoef.com/ccs2017.pdf
Kind regards,
Job
Looks like WPA2 may have just become the new WEP.
And it looks like we're all going to be reflashing a lot of devices.
"The proof-of-concept exploit is called KRACK, short for Key Reinstallation
Attacks. The research has been a closely guarded secret for weeks ahead of a
coordinated disclosure th
17 matches
Mail list logo