Fair enough – I just looked it up and it came back as a site that has been identified as malware – I was just giving heads up to Vladimir and hit “reply all” by accident, I had to continue the thread
BTW – viewing a jpeg or other from a website can compromise a system – (multiple vulnerabilities in the past have been identified and compromised) As I mentioned I meant to send it straight to Vladimir to let him know - My Bad but the intention was good. From: Marko Milivojevic [mailto:[email protected]] Sent: February-20-11 4:30 PM To: Jason Maynard Cc: Vladimir Osipenko; [email protected] Subject: Re: [OSL | CCIE_RS] BGP peer and TCP state correspondence Jason - link was to a JPEG file. It's perfectly harmless - I don't see the point of posting this information on the list? -- Marko Milivojevic - CCIE #18427 Senior Technical Instructor - IPexpert FREE CCIE training: http://bit.ly/vLecture Mailto: [email protected] Telephone: +1.810.326.1444 Web: http://www.ipexpert.com/ On Sun, Feb 20, 2011 at 19:00, Jason Maynard <[email protected]> wrote: Not sure Vladimir but I scanned the URL and received the following result: 1 VT Community user(s) with a total of 1 reputation credit(s) say(s) this URL is benign. 1 VT Community user(s) with a total of 4184 reputation credit(s) say(s) this URL is malicious. Submission date: 2011-02-20 18:57:37 (UTC) Current status: finished Antivirus report: Not available Webscan result: 1 /6 (16.7%) VT Community malicious Safety score: 0.0% Compact Print results URL analysis tool Result Firefox Clean site G-Data Clean site Google Safebrowsing Clean site Opera Clean site ParetoLogic Malware site Phishtank Clean site Additional informationShow all Normalized URL: http://dl.dropbox.com/ URL MD5: c65dab23caf66263aa546845bcda79b3 Content-Type: text/plain VT Community User:EP_X0FF Reputation: 4184 credits Comment date: 2010-12-15 15:05:50 (UTC) Malware distribution site, payload various trojans including TDL4 rootkit Tags: ######## -----Original Message----- From: [email protected] [mailto:[email protected]] On Behalf Of Vladimir Osipenko Sent: February-20-11 12:55 PM To: [email protected] Subject: [OSL | CCIE_RS] BGP peer and TCP state correspondence Hi, Guys! I did some research to identify how state of TCP connection corresponds to BGP peer state. I configured one neighbour as Active, and the other as Passive and started to play with debug & ACL. I managed (by blocking ACK packets, OPEN packets) to identify that correspondence. You wont find this info in CCIE books, actually they have either incorrect info, or not based on Cisco implementation. So here it is: http://dl.dropbox.com/u/7208038/BGPandTCP.png BTW, Cisco does not show "Connect" state in output of the "sh ip bgp sum" but shows it in the "debug bgp all" output =) . You questions and feedback are highly welcome! I am ready to proof my research =). _______________________________________________ For more information regarding industry leading CCIE Lab training, please visit www.ipexpert.com _______________________________________________ For more information regarding industry leading CCIE Lab training, please visit www.ipexpert.com _______________________________________________ For more information regarding industry leading CCIE Lab training, please visit www.ipexpert.com
