Re: UDP/123 policers & status

2020-03-28 Thread Roland Dobbins
e well-understood and -documented, and a bit of research can help bring one up to speed on them pretty quickly. -------- Roland Dobbins

Re: FlowSpec

2020-04-23 Thread Roland Dobbins
mer A the ability to interfere with Customer B's traffic, and the difficulty of implementing such constraints). It can be an option worth exploring, in many circumstances. -------- Roland Dobbins

Re: BGP FlowSpec

2016-04-30 Thread Roland Dobbins
On 30 Apr 2016, at 19:56, Pierre Lamy wrote: > to null out the destination rather than the source. <https://tools.ietf.org/html/rfc5635> ------- Roland Dobbins

Re: BGP FlowSpec

2016-05-02 Thread Roland Dobbins
to provide for a higher degree of automation, increased rapidity of response, and interoperability in both inter- and intra-network DDoS mitigation scenarios. --- Roland Dobbins

Re: BGP FlowSpec

2016-05-02 Thread Roland Dobbins
stood out in my mind); those espousing it pretty quickly changed their tunes once their networks had been knocked flat a couple of times. ;> --- Roland Dobbins

Re: BGP FlowSpec

2016-05-02 Thread Roland Dobbins
on reading various reports and research papers, but rather upon our actions which generate the data and experiential observations upon which such reports and research papers are based. ----------- Roland Dobbins

Re: NIST NTP servers

2016-05-10 Thread Roland Dobbins
ing-Opensourcely-wp.pdf> Just keep in mind, *nothing* is perfect. --- Roland Dobbins

Re: Turning Off IPv6 for Good (was Re: Netflix VPN detection - actual engineer needed)

2016-06-01 Thread Roland Dobbins
their ISPs? ;> --- Roland Dobbins

Re: AW: Verizon and Level3 DNS flush

2016-06-02 Thread Roland Dobbins
dom, if ever, accomplishes anything useful in terms of successfully defending against DDoS attacks. --- Roland Dobbins

Re: AW: AW: Verizon and Level3 DNS flush

2016-06-02 Thread Roland Dobbins
're now experiencing. Sometimes it isn't possible, of course. ------- Roland Dobbins

Re: Thinking Methodically about building a PoC

2016-06-12 Thread Roland Dobbins
On 13 Jun 2016, at 8:52, Kasper Adel wrote: > 2) Do some planning and research first. This. --- Roland Dobbins

Re: EVERYTHING about Booters (and CloudFlare)

2016-07-29 Thread Roland Dobbins
uring they can be enforced. --- Roland Dobbins

Re: PlayStationNetwork blocking of CGNAT public addresses

2016-09-16 Thread Roland Dobbins
m with NAT; as CGN becomes more prevalent on wireline broadband networks, it's only going to get worse. AFAIK, PSN doesn't support IPv6. That would be another topic of discussion with the operational folks. ------- Roland Dobbins

Re: PlayStationNetwork blocking of CGNAT public addresses

2016-09-16 Thread Roland Dobbins
is a dearth of engagement of clueful folks in the global operational community. Some gaming-oriented networks are well-represented; others are not, sadly. ------- Roland Dobbins

Re: PlayStationNetwork blocking of CGNAT public addresses

2016-09-21 Thread Roland Dobbins
re sending .gifs or something, surely this might be possible, yes? It seems within the realm of possibility this sort of response - or lack thereof - could result in some gaming network operators becoming a bit jaded. And perhaps some customers, too. ------- Roland Dobbins

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-26 Thread Roland Dobbins
e's no separation in the public mind of 'my network' from 'the Internet' that is analogous to the separation between 'the power company' and 'the electrical wiring in my house/apartment' (and even in that space, the conceptual separation often isn't present). --- Roland Dobbins

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-26 Thread Roland Dobbins
iferation of connected devices - militates against user troubleshooting, as well. --- Roland Dobbins

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-26 Thread Roland Dobbins
elf how many people set up and use 2FA for any online service which supports it, on their own initiative (i.e., not having a bank ship them a pre provisioned dongle). The number of people capable of doing this troubleshooting for themselves is roughly equivalent to the number of people who've successfully set up 2FA on their own initiative. --- Roland Dobbins

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-26 Thread Roland Dobbins
g similar would work here. Concur that this is the least-improbable model, absolutely. But keep in mind that subscriptions/services for in-home wiring were (and are) also a tiny percentage of the user base. ------- Roland Dobbins

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-27 Thread Roland Dobbins
cle of clothing they own, every can of soda in their refrigerator, ever major (and many minor) components of their automobiles, every blade in their windowshades, etc. ------- Roland Dobbins

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-27 Thread Roland Dobbins
e a single provider, just as they typically do for electricity and water. ------- Roland Dobbins

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-27 Thread Roland Dobbins
On 27 Sep 2016, at 22:37, Patrick W. Gilmore wrote: All the more reason to educate people TODAY on why having vulnerable devices is a Very Bad Idea. Yes, but how do they determine that a given device is vulnerable? --- Roland Dobbins

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-27 Thread Roland Dobbins
* the unruly children, but *choose* to ignore them. That's the difference. Keep in mind, most of the folks on this list are not representative of the average consumer in terms of the skill-sets which are relevant in this problem space. ------- Roland Dobbins

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-27 Thread Roland Dobbins
world, however. Especially the Internet part. ;> --- Roland Dobbins

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-27 Thread Roland Dobbins
On 28 Sep 2016, at 0:18, Brielle Bruns wrote: > I call shenanigans on providers not seeing their unruly users. I was talking about the users, not the ISPs. --- Roland Dobbins

Re: MPLS in the campus Network?

2016-10-20 Thread Roland Dobbins
moving forward. ------- Roland Dobbins

Re: MPLS in the campus Network?

2016-10-20 Thread Roland Dobbins
On 20 Oct 2016, at 23:32, Mark Tinka wrote: Some requirements call for Ethernet transport as opposed to IP. Sure - but it's probably worth revisiting the origins of those requirements, and whether there are better alternatives. --- Roland Dobbins

Re: Dyn DDoS this AM?

2016-10-21 Thread Roland Dobbins
On 21 Oct 2016, at 23:01, Mike Hammett wrote: > Are there sites that can test your BCP38\84 compliance? <https://www.caida.org/projects/spoofer/> ------- Roland Dobbins

Re: How to find all of an ISP's ASNs

2016-10-25 Thread Roland Dobbins
On 26 Oct 2016, at 0:41, Gary Baribault wrote: > other than the two local major ISPs (keeping last Friday in mind!) . . . why would you want to expose them to the public Internet at all? There are many, many reasons not to do so. --- Roland Dobbins

Re: Spitballing IoT Security

2016-12-02 Thread Roland Dobbins
e actors' are somehow 'learning how to take down the Internet' is equally uninformed. State actors already know how to do this, they don't need to 'learn' or 'test' anything. DDoS attacks are the Great Equalizer; when it comes to DDoS, nation-states are just another player. --- Roland Dobbins

Re:

2016-12-02 Thread Roland Dobbins
On 2 Dec 2016, at 22:31, Christopher Morrow wrote: > that statement seems ... hard to prove. Paging Geoff Huston to the white courtesy phone . . . ;> --- Roland Dobbins

Re: Favorite Speed Test Systems

2016-12-05 Thread Roland Dobbins
On 5 Dec 2016, at 21:50, Graham Johnston wrote: What is your preferred one and why? <http://testmy.net/> Thorough, reasonable teat methodology, allows one to store history, decent range of test servers worldwide. --- Roland Dobbins

Re: Recent NTP pool traffic increase

2016-12-15 Thread Roland Dobbins
esync queries, or lots of level-6/level-7 admin command attempts? --- Roland Dobbins

Re: Recent NTP pool traffic increase

2016-12-15 Thread Roland Dobbins
On 16 Dec 2016, at 10:09, Dan Drown wrote: This seems more like "someone pushed out bad firmware" rather than something malicious. Everything old is new again . . . ------- Roland Dobbins

Re: Recent NTP pool traffic increase

2016-12-15 Thread Roland Dobbins
On 16 Dec 2016, at 10:16, Roland Dobbins wrote: > <http://pages.cs.wisc.edu/~plonka/netgear-sntp/> ------- Roland Dobbins

Re: Recent NTP pool traffic increase

2016-12-15 Thread Roland Dobbins
On 16 Dec 2016, at 10:17, Roland Dobbins wrote: <http://pages.cs.wisc.edu/~plonka/netgear-sntp/> Over on nznog, Cameron Bradley posited that this may be related to a TR-069/-064 Mirai variant, which makes use of a 'SetNTPServers' exploit. Perhaps one of them is

Re: Recent NTP pool traffic increase

2016-12-16 Thread Roland Dobbins
? --- Roland Dobbins

Re: Recent NTP pool traffic increase

2016-12-16 Thread Roland Dobbins
On 16 Dec 2016, at 16:40, Roland Dobbins wrote: Looking at the source IP distribution, does a significant proportion of the larger query base seem to originate out-of-region? And are do they appear to be mostly broadband access networks, or

Re: Prepending with another ASN you don't own

2016-12-16 Thread Roland Dobbins
On 17 Dec 2016, at 0:13, Job Snijders wrote: There are providers who inspect the AS_PATH's contents and make decisions to reject (ignore) a route announcement or not based on the presence of certain values. +1 --- Roland Dobbins

Re: Recent NTP pool traffic increase

2016-12-20 Thread Roland Dobbins
On 20 Dec 2016, at 12:18, Laurent Dumont wrote: > As a student in the field, this is the kind of stuff I live for! ;) <https://en.wikipedia.org/wiki/NTP_server_misuse_and_abuse#Notable_cases> ------- Roland Dobbins

Re: [Tier1 ISP] : Vulnerable to a new DDoS amplification attack

2016-12-22 Thread Roland Dobbins
On 22 Dec 2016, at 20:27, Jean | ddostest.me via NANOG wrote: the already known Layer 4 amp DDoS like dns, ntp, ssdp, snmp These are layer-7 reflection/amplification attacks - i.e., application-layer - *not* layer-4. --- Roland Dobbins

Re: [Tier1 ISP] : Vulnerable to a new DDoS amplification attack

2016-12-22 Thread Roland Dobbins
ter/ttl-expiry-attack.html> ----------- Roland Dobbins

Re: Distributed Object Architecture versus DNS

2017-01-06 Thread Roland Dobbins
ectory services, per se. Can you provide more context? ------- Roland Dobbins

Re: Distributed Object Architecture versus DNS

2017-01-06 Thread Roland Dobbins
nature, I've been waiting for the ITU to impose GOSIP or whatever on us for the last ~30 years or so - but so far, nothing much has happened in that regard. Is there actually a reason to suspect that this time it will be any different? --- Roland Dobbins

Re: Distributed Object Architecture versus DNS

2017-01-06 Thread Roland Dobbins
On 7 Jan 2017, at 14:22, Joly MacFie wrote: > Blind backlash from IoT DDoS? Looming billions of rf tagged items​? None of this has anything to do with this 'DOA' thing, though. ------- Roland Dobbins

Re: SP security knowledge build up

2018-07-23 Thread Roland Dobbins
tworking-Technology-ebook/dp/B0051TM5L2/> ----------- Roland Dobbins

Re: tcp md5 bgp attacks?

2018-08-14 Thread Roland Dobbins
On 15 Aug 2018, at 6:28, Grant Taylor via NANOG wrote: > Is there something that I've missed the boat on? No - it's a belt-and-suspenders sort of thing, along with GTSM. ------- Roland Dobbins

Re: tcp md5 bgp attacks?

2018-08-14 Thread Roland Dobbins
it the attacker. ------- Roland Dobbins

Re: automatic rtbh trigger using flow data

2018-08-30 Thread Roland Dobbins
/s/xznjloitly2apixr5xge> ----------- Roland Dobbins

Re: automatic rtbh trigger using flow data

2018-08-31 Thread Roland Dobbins
neral. --- Roland Dobbins

Re: automatic rtbh trigger using flow data

2018-08-31 Thread Roland Dobbins
ng_Isp_v2.pdf> ------- Roland Dobbins

Re: automatic rtbh trigger using flow data

2018-08-31 Thread Roland Dobbins
and should use them in a situationally-appropriate manner. And when we're using techniques like QoSing down certain ports/protocols, we must err on the side of caution, lest we cause larger problems than the attacks themselves. --- Roland Dobbins

Re: automatic rtbh trigger using flow data

2018-09-01 Thread Roland Dobbins
in your span of administrative control. * btw, what can you experts tell me about tcp-based volumetric attacks... TCP reflection/amplification. ----------- Roland Dobbins

Re: automatic rtbh trigger using flow data

2018-09-01 Thread Roland Dobbins
point is that when applying broad policies of this nature, one must be very conservative, else one can cause larger problems on a macro scale. Internet ateriosclerosis is a significant issue. ------- Roland Dobbins

Re: automatic rtbh trigger using flow data

2018-09-01 Thread Roland Dobbins
niversal source-address validation (SAV). Without the ability to spoof, there would be no reflection/amplification attacks. ------- Roland Dobbins

Re: Software for network modelling / documentation / GIS

2017-02-23 Thread Roland Dobbins
rt of capability, too. --- Roland Dobbins

Re: Consumer networking head scratcher

2017-03-01 Thread Roland Dobbins
on Windows boxes, IIRC. ------- Roland Dobbins

Re: BCP38/84 and DDoS ACLs

2017-05-26 Thread Roland Dobbins
You may need one set of ACLs at the peering/transit edge, and other, more specific ACLs, at the IDC distribution gateway, customer aggregation gateway, et. al. --- Roland Dobbins

Re: BCP38/84 and DDoS ACLs

2017-05-26 Thread Roland Dobbins
On 27 May 2017, at 0:54, valdis.kletni...@vt.edu wrote: > I'll go out on a limb and suggest that except for a very basic home/SOHO > network, "You may need" should be "You will probably need". Concur, heh. ------- Roland Dobbins

Re: BCP38/84 and DDoS ACLs

2017-05-26 Thread Roland Dobbins
On 27 May 2017, at 0:19, Roland Dobbins wrote: > <https://app.box.com/s/ko8lk4vlh1835p36na3u> This is the correct URI for the first preso, apologies: <https://app.box.com/s/osk4po8ietn1zrjjmn8b> ------- Roland Dobbins

Re: New Active Exploit: memcached on port 11211 UDP & TCP being exploited for reflection attacks

2018-02-27 Thread Roland Dobbins
access policies at the IDC edge which disallow unwanted UDP/11211 as well as TCP/11211 from reaching abusable memcached deployments. ------- Roland Dobbins

Re: Attacks on BGP Routing Ranges

2018-04-18 Thread Roland Dobbins
infrastructure self-protection concepts: <https://app.box.com/s/osk4po8ietn1zrjjmn8b> --- Roland Dobbins

Re: Auto ACL blocker

2011-01-18 Thread Roland Dobbins
by hand. ---- Roland Dobbins // <http://www.arbornetworks.com> Most software today is very much like an Egyptian pyramid, with millions of bricks piled on top of each other, with no structural integrity, but just done by b

Re: Securing Border Routers

2011-01-20 Thread Roland Dobbins
//files.me.com/roland.dobbins/dweagy> -------- Roland Dobbins // <http://www.arbornetworks.com> Most software today is very much like an Egyptian pyramid, with millions of bricks piled on top of each other, with no structura

Re: [arin-announce] ARIN Resource Certification Update

2011-01-24 Thread Roland Dobbins
re the integrity of its answers, and which is already in the initial stages of its deployment - i.e., DNSSEC? Note I'm not advocating this position, per se, just being sure I understand the argument for purposes of discussion. ----------

Re: [arin-announce] ARIN Resource Certification Update

2011-01-24 Thread Roland Dobbins
ope this wouldn't be the case, yes? ---- Roland Dobbins // <http://www.arbornetworks.com> Most software today is very much like an Egyptian pyramid, with millions of bricks piled on top of each other, with no struct

Re: [arin-announce] ARIN Resource Certification Update

2011-01-24 Thread Roland Dobbins
to the addressing folks, who would then proceed to create/administer their RRs/certs without further day-to-day reference to the DNS folks. ---- Roland Dobbins // <http://www.arbornetworks.com> Most software today is very

Re: [arin-announce] ARIN Resource Certification Update

2011-01-24 Thread Roland Dobbins
NSSEC is in the initial stages of deployment. 3. There's additional relevant work going on which would make DNS more suitable for this application. 4. Deployment inertia. ---- Roland Dobbins // <http://www.a

Re: [arin-announce] ARIN Resource Certification Update

2011-01-25 Thread Roland Dobbins
;t really have a choice, now, do they? ;> -------- Roland Dobbins // <http://www.arbornetworks.com> Most software today is very much like an Egyptian pyramid, with millions of bricks piled on top of each other, with no st

Re: Using IPv6 with prefixes shorter than a /64 on a LAN

2011-01-25 Thread Roland Dobbins
walls in front of client access LANs, and everything behind said stateful firewalls, from DDoS. ---- Roland Dobbins // <http://www.arbornetworks.com> Most software today is very much like an Egyptian pyramid, with millions o

Re: Using IPv6 with prefixes shorter than a /64 on a LAN

2011-01-25 Thread Roland Dobbins
oesn't take into account hinted scanning via routing table lookups, whois lookups, and walking reverse DNS, not to mention making use of ND mechanisms once a single box on a given subnet has been successfully botted. --------

Re: Using IPv6 with prefixes shorter than a /64 on a LAN

2011-01-25 Thread Roland Dobbins
of hinted scanning. -------- Roland Dobbins // <http://www.arbornetworks.com> Most software today is very much like an Egyptian pyramid, with millions of bricks piled on top of each other, with no structural integrity, but just done by brute forc

Re: Using IPv6 with prefixes shorter than a /64 on a LAN

2011-01-25 Thread Roland Dobbins
tion seem to be assuming that the assignment and consumption of IPv6 addresses (and networking technology and the Internet in general) will continue to be constrained by the current four-decade-old paradigm into the foreseeable future. ---------

Re: IPv6 filtering

2011-01-25 Thread Roland Dobbins
ich, given the prevalence of broken PMTU-D alone, is apparently not well-understood in many quarters, heh. ---- Roland Dobbins // <http://www.arbornetworks.com> Most software today is very much like an Egyptian pyramid, with mi

Re: Using IPv6 with prefixes shorter than a /64 on a LAN

2011-01-25 Thread Roland Dobbins
to share your optimism in that regard. ;> -------- Roland Dobbins // <http://www.arbornetworks.com> Most software today is very much like an Egyptian pyramid, with millions of bricks piled on top of each other, with no structural integrity

Re: Using IPv6 with prefixes shorter than a /64 on a LAN

2011-01-26 Thread Roland Dobbins
x27;s where the real money is. -------- Roland Dobbins // <http://www.arbornetworks.com> Most software today is very much like an Egyptian pyramid, with millions of bricks piled on top of each other, with no structural integrit

Re: Another v6 question

2011-01-26 Thread Roland Dobbins
nobody has heretofore thought of, heh. ;> -------- Roland Dobbins // <http://www.arbornetworks.com> Most software today is very much like an Egyptian pyramid, with millions of bricks piled on top of each other, with no struc

2010 Worldwide Infrastructure Security Report available for download.

2011-02-01 Thread Roland Dobbins
ou contributed to the survey which forms the foundation of the report; as always, we're grateful for your insight and participation, and welcome your feedback and comments. Thanks much! ------------ Roland Dobbins // <http://www.arbornetworks.com>

Re: netflow analysis for jitter and packet loss?

2011-02-01 Thread Roland Dobbins
mention. ---- Roland Dobbins // <http://www.arbornetworks.com>

Re: ntp defence preso at apricot

2014-01-28 Thread Roland Dobbins
Randy Bush wrote: >i am on the apricot 2014 pc. we do not have a submission on nap defense. can >someone please do one? I can, see my reply on apops. --- Roland Dobbins

Re: Observations of an Internet Middleman (Level3) (was: RIP Network Neutrality (was: Wow its been quiet here...

2014-05-14 Thread Roland Dobbins
ike 'paid peering', but with a slightly different emphasis) monetary exchanges? ------ Roland Dobbins // <http://www.arbornetworks.com> Equo ne credite, Teucri. -- Laocoön

Re: Large DDoS, small extortion

2014-05-22 Thread Roland Dobbins
tarted: <http://mailman.nanog.org/pipermail/nanog/2010-January/016747.html> Ensure you have flow telemetry enabled at all your edges; there are open-source tools like nfsen/nfdump that you can get started with quickly. ---------- Rola

Re: Large DDoS, small extortion

2014-05-22 Thread Roland Dobbins
n money to a DDoSer. ------ Roland Dobbins // <http://www.arbornetworks.com> Equo ne credite, Teucri. -- Laocoön

Re: Large DDoS, small extortion

2014-05-22 Thread Roland Dobbins
On May 23, 2014, at 3:38 AM, Barry Shein wrote: > Some real life experience and results, case studies. Some of us have quite a bit of real-life experience and results in these situations. -- Roland Dobbins // &l

Re: Large DDoS, small extortion

2014-05-22 Thread Roland Dobbins
On May 23, 2014, at 11:22 AM, Blake Dunlap wrote: > Most of us wish we didn't. Concur 100%. ------ Roland Dobbins // <http://www.arbornetworks.com> Equo ne c

Re: Large DDoS, small extortion

2014-05-23 Thread Roland Dobbins
share. But never, under any circumstances, for any reason, no matter who advises you to do so, should you pay. ---------- Roland Dobbins // <http://www.arbornetworks.com> Equo ne credite, Teucri. -- Laocoön

Re: Large DDoS, small extortion

2014-05-23 Thread Roland Dobbins
lar recommendation, and would urge others to seriously think before doing it. ------ Roland Dobbins // <http://www.arbornetworks.com> Equo ne credite, Teucri. -- Laocoön

Re: Next steps in extortion case - ideas?

2014-06-28 Thread Roland Dobbins
On Jun 28, 2014, at 9:32 PM, Markus wrote: > Any other recommendations? Law enforcement. -- Roland Dobbins // <http://www.arbornetworks.com> Equo ne credite, Teucri. -- Laocoön

Re: Cheap LSN/CGN/NAT444 Solution

2014-06-30 Thread Roland Dobbins
SYN-floods and the like. -- Roland Dobbins // <http://www.arbornetworks.com> Equo ne credite, Teucri. -- Laocoön

Re: Cheap LSN/CGN/NAT444 Solution

2014-06-30 Thread Roland Dobbins
n limits and all that stuff aren't enough, either. ------ Roland Dobbins // <http://www.arbornetworks.com> Equo ne credite, Teucri. -- Laocoön

Re: Cheap LSN/CGN/NAT444 Solution

2014-06-30 Thread Roland Dobbins
about NATted wireless networks going down due to this sort of thing. It's a real problem. Also, there are horizontal behaviors which are undesirable, as well. ------ Roland Dobbins // <http://www.arbornetworks.com>

Re: Cheap LSN/CGN/NAT444 Solution

2014-06-30 Thread Roland Dobbins
ich don't employ me. <http://tools.ietf.org/html/rfc5635> ------ Roland Dobbins // <http://www.arbornetworks.com> Equo ne credite, Teucri. -- Laocoön

Re: Cheap LSN/CGN/NAT444 Solution

2014-06-30 Thread Roland Dobbins
to perform filtering on an as-needed basis. -- Roland Dobbins // <http://www.arbornetworks.com> Equo ne credite, Teucri. -- Laocoön

Re: Connectivity issue between Verizon and Amazon EC2

2014-07-21 Thread Roland Dobbins
s a difference? ------ Roland Dobbins // <http://www.arbornetworks.com> Equo ne credite, Teucri. -- Laocoön

Re: TCP Window Scaling issue

2014-07-24 Thread Roland Dobbins
in the path . . . ------ Roland Dobbins // <http://www.arbornetworks.com> Equo ne credite, Teucri. -- Laocoön

Re: DDoS using port 0 and 53 (DNS)

2012-07-24 Thread Roland Dobbins
ccur. Do *not* perform wholesale blocking of non-initial fragments (i.e., src/dst port 0), or you will have many unhappy customers and soon-to-be former customers. ;> ------- Roland Dobbins

Re: Greenfield Access Network

2014-07-31 Thread Roland Dobbins
ategorical advice, you can't really crowdsource the architecture, design, deployment, and operations of your network. ;> ------ Roland Dobbins // <http://www.arbornetworks.com> Equo ne credite, Teucri. -- Laocoön

Re: where to go to understand DDoS attack vector

2014-08-26 Thread Roland Dobbins
incomplete (29 bytes?) . . . ---------- Roland Dobbins // <http://www.arbornetworks.com> Equo ne credite, Teucri. -- Laocoön

Re: where to go to understand DDoS attack vector

2014-08-26 Thread Roland Dobbins
use a VPN. Problem solved. ------ Roland Dobbins // <http://www.arbornetworks.com> Equo ne credite, Teucri. -- Laocoön

Re: where to go to understand DDoS attack vector

2014-08-26 Thread Roland Dobbins
On Aug 26, 2014, at 8:26 PM, Stephen Satchell wrote: > qotd17/udp quote No, that's the protocol number - 17 is UDP - not the port number. ------ Roland Dobbins // <http://www.arborn

  1   2   3   4   5   >