Fair enough – I just looked it up and it came back as a site that has been 
identified as malware – I was just giving heads up to Vladimir and hit “reply 
all” by accident,  I had to continue the thread

 

BTW – viewing a jpeg or other from a website can compromise a system – 
(multiple vulnerabilities in the past have been identified and compromised)

 

As I mentioned I meant to send it straight to Vladimir to let him know -

 

My Bad but the intention was good.

 

 

 

From: Marko Milivojevic [mailto:[email protected]] 
Sent: February-20-11 4:30 PM
To: Jason Maynard
Cc: Vladimir Osipenko; [email protected]
Subject: Re: [OSL | CCIE_RS] BGP peer and TCP state correspondence

 

 

Jason - link was to a JPEG file. It's perfectly harmless - I don't see the 
point of posting this information on the list?

 

--

Marko Milivojevic - CCIE #18427

Senior Technical Instructor - IPexpert

 

FREE CCIE training: http://bit.ly/vLecture

 

Mailto: [email protected]

Telephone: +1.810.326.1444

Web: http://www.ipexpert.com/

 

On Sun, Feb 20, 2011 at 19:00, Jason Maynard <[email protected]> wrote:

Not sure Vladimir but I scanned the URL and received the following result:


1 VT Community user(s) with a total of 1 reputation credit(s) say(s) this
URL is benign. 1 VT Community user(s) with a total of 4184 reputation
credit(s) say(s) this URL is malicious.
Submission date: 2011-02-20 18:57:37 (UTC)
Current status: finished
Antivirus report: Not available
Webscan result: 1 /6 (16.7%)
VT Community

malicious
 Safety score: 0.0%
Compact
Print results
URL analysis tool       Result
Firefox Clean site
G-Data  Clean site
Google Safebrowsing     Clean site
Opera   Clean site
ParetoLogic     Malware site
Phishtank       Clean site
Additional informationShow all
Normalized URL: http://dl.dropbox.com/
URL MD5: c65dab23caf66263aa546845bcda79b3
Content-Type: text/plain
VT Community

User:EP_X0FF
Reputation: 4184 credits
Comment date: 2010-12-15 15:05:50 (UTC)
Malware distribution site, payload various trojans including TDL4 rootkit
Tags:


########



-----Original Message-----
From: [email protected]
[mailto:[email protected]] On Behalf Of Vladimir Osipenko
Sent: February-20-11 12:55 PM
To: [email protected]
Subject: [OSL | CCIE_RS] BGP peer and TCP state correspondence

Hi, Guys!

I did some research to identify how state of TCP connection
corresponds to BGP peer state. I configured one neighbour as Active,
and the other as Passive and started to play with debug & ACL.  I
managed (by blocking ACK packets, OPEN packets)  to identify that
correspondence. You wont find this info in CCIE books, actually they
have either incorrect info, or not based on Cisco implementation.

So here it is:

http://dl.dropbox.com/u/7208038/BGPandTCP.png

BTW, Cisco does not show "Connect" state in output of the "sh ip bgp
sum" but shows it in the "debug bgp all" output =) .

You questions and feedback are highly welcome! I am ready to proof my
research =).
_______________________________________________
For more information regarding industry leading CCIE Lab training, please
visit www.ipexpert.com

_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

 

_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Reply via email to