On Fri, 13 Feb 2009 21:08:12 -0600
Chris Adams wrote:
> Once upon a time, Joe Greco said:
> > FreeBSD used a 64-bit time_t for the AMD64 port pretty much right
> > away. On the flip side, it used a 32-bit time_t for the Alpha
> > port. I guess someone predicted "it wouldn't be a problem."
>
>
Once upon a time, Joe Greco said:
> FreeBSD used a 64-bit time_t for the AMD64 port pretty much right away.
> On the flip side, it used a 32-bit time_t for the Alpha port. I guess
> someone predicted "it wouldn't be a problem."
Tru64 on Alpha uses a 32 bit time_t (they have their own time64_t an
> Once upon a time, Nathan Malynn said:
> > Question about 2k38: Aren't most Unixoid systems using 64-bit clocks now?
>
> Unix/POSIX systems use "time_t" to store the base time counter, which is
> seconds since the epoch (1970-01-01 00:00:00 UTC). Most platforms still
> use a 32 bit time_t for c
Nuno et all,
Count me in for this..
Cheers,
--Ricardo
http://www.cs.ucla.edu/~rveloso
On Feb 13, 2009, at 8:41 AM, Nuno Vieira - nfsi telecom wrote:
Ok, however, what i am talking about is a competelly diferent thing,
and i think that my thoughts are alligned with Jens.
We want to have a Si
On Fri, Feb 13, 2009 at 6:06 PM, Nathan Malynn wrote:
> Question about 2k38: Aren't most Unixoid systems using 64-bit clocks now?
>
Exactly! What are we going to do when we're at the end of the 2^64
epoch?? (after the sun burns out and.. oh wait)
--
Eric
http://nixwizard.net
Once upon a time, Nathan Malynn said:
> Question about 2k38: Aren't most Unixoid systems using 64-bit clocks now?
Unix/POSIX systems use "time_t" to store the base time counter, which is
seconds since the epoch (1970-01-01 00:00:00 UTC). Most platforms still
use a 32 bit time_t for compatibility
Question about 2k38: Aren't most Unixoid systems using 64-bit clocks now?
On Fri, Feb 13, 2009 at 8:03 PM, Chris Adams wrote:
> Once upon a time, Ravi Pina said:
>> Yes... that is more like the y2k38 problem on 03:14:07 UTC
>> 2038-01-19...
>
> Oddly enough, the end of the current Unix epoch is
Once upon a time, Ravi Pina said:
> Yes... that is more like the y2k38 problem on 03:14:07 UTC
> 2038-01-19...
Oddly enough, the end of the current Unix epoch is a prime. Not only
that, it is a Mersenne prime, 2^31 - 1. Even more, it is the largest
known Mersenne prime where its Mersenne number
And/or see if bell canada can sell you something diverse.
- Original Message -
From: Seth Mattinen
To: Charles Regan
Cc: nanog@nanog.org
Sent: Fri Feb 13 18:58:54 2009
Subject: Re: One /22 Two ISP no BGP
Charles Regan wrote:
> The problem we have now is that we got our /22 from arin t
You haven't lived until you've lived through an epoch.
On Fri, Feb 13, 2009 at 06:54:54PM -0500, Ravi Pina wrote:
> On Fri, Feb 13, 2009 at 06:49:49PM -0500, Steve Church wrote:
> > Just in case you missed it.
> >
> > date -d "Fri Feb 13 23:31:30 UTC 2009" +%s
> >
> > It's like a really geeky y2
Charles Regan wrote:
> The problem we have now is that we got our /22 from arin to do multihoming.
> If we dump tlb, no more multihoming? No /22. Is that correct?
>
> We also have a contract with tlb.
> $$$ 1.5yrs left...
>
>
There's something in there about non-multihomed sites, but I'm not
f
On Fri, Feb 13, 2009 at 06:49:49PM -0500, Steve Church wrote:
> Just in case you missed it.
>
> date -d "Fri Feb 13 23:31:30 UTC 2009" +%s
>
> It's like a really geeky y2k without the potential cataclysm. :)
>
> Steve
Yes... that is more like the y2k38 problem on 03:14:07 UTC
2038-01-19...
..
Just in case you missed it.
date -d "Fri Feb 13 23:31:30 UTC 2009" +%s
It's like a really geeky y2k without the potential cataclysm. :)
Steve
The problem we have now is that we got our /22 from arin to do multihoming.
If we dump tlb, no more multihoming? No /22. Is that correct?
We also have a contract with tlb.
$$$ 1.5yrs left...
2009/2/13, Seth Mattinen :
> Charles Regan wrote:
>> Isp2 is vtl not bell
>>
>> 2009/2/13, Seth Matti
Is anyone else seeing convulsions via Sprint Chicago? Lightly loaded OC3
and we've got stuff all over the net seeing crazy latency.
--
mailto:n...@layer3arts.com //
GoogleTalk: nrauhau...@gmail.com
IM: nealrauhauser
Barry Shein wrote:
> And it was observed that routing around damage could at least in
> theory have utility in a situation where circuit facilities were being
> damaged in warfare so long as some route between two points remained.
>
> So these two goals are not mutually exclusive by any means.
T
The default user name is admin and there is no password.
--Louis
-Original Message-
From: ann kok [mailto:oiyan...@yahoo.ca]
Sent: Friday, February 13, 2009 5:31 PM
To: nanog@nanog.org; LEdouard Louis
Subject: RE: anyone knows about extreme switch
Thank you
it works properly
Do you kn
Thank you
it works properly
Do you know the default pw?
Thank you again
--- On Fri, 2/13/09, LEdouard Louis wrote:
> From: LEdouard Louis
> Subject: RE: anyone knows about extreme switch
> To: oiyan...@yahoo.ca, nanog@nanog.org
> Received: Friday, February 13, 2009, 4:11 PM
> We use Extreme
From: Fernando Gont
>While many textbooks and articles have created the myth that the
>Internet protocols were designed for warfare environments, the top level
>goal for the DARPA Internet Program was the sharing of large service
>machines on the ARPANET.
This in itself has become an oft-repeate
>-Original Message-
>From: Paul Stewart [mailto:pstew...@nexicomgroup.net]
>Sent: Friday, February 13, 2009 3:50 PM
>To: Michael Smith; Charles Regan; nanog@nanog.org
>Subject: RE: One /22 Two ISP no BGP
>
>Telebec's only upstream is Bell Canada (AS577) hence why you see
>that...;)
>
>Paul
eventually, the rpki will give you the first half, authentication
of the owner of the ip space. this leaves, as smb hinted, securing
the request path from the black-hole requestor to the service and
of the service to the users.
smb:
> You can't do this without authoritative knowledge of exactly w
That was my implication...
>-Original Message-
>From: Paul Stewart [mailto:pstew...@nexicomgroup.net]
>Sent: Friday, February 13, 2009 3:50 PM
>To: Michael Smith; Charles Regan; nanog@nanog.org
>Subject: RE: One /22 Two ISP no BGP
>
>Telebec's only upstream is Bell Canada (AS577) hence wh
We use Extreme products, but use telnet or SSH behind firewall.
Can you use telnet? It provide more flexibility, but SSH is more secure
Regardless of the connection the CLI configuration is the same.
HyperTerminal setting?
Baud rate-9600
Data bits-8
Stop bit-1
Parity-None
Flow control-XON/XOFF
Charles Regan wrote:
> Just got final confirmation from ISP1 that they will not do BGP with us.
>
> ISP1 is Telebec.
> http://www.iptools.com/dnstools.php?tool=ipwhois&user_data=142.217.0.0&submit=Go
>
> My subnet
> http://www.iptools.com/dnstools.php?tool=ipwhois&user_data=204.144.60.0&submit=Go
* Valdis Kletnieks:
> On Fri, 13 Feb 2009 15:57:32 +0100, Jens Ott - PlusServer AG said:
>> Therefore I had the following idea: Why not taking one of my old routers and
>> set it up as blackhole-service. Then everyone who is interested could set up
>> a
>> session to there and
>>
>> 1.) announce
Telebec's only upstream is Bell Canada (AS577) hence why you see
that...;)
Paul
-Original Message-
From: Michael Smith [mailto:msm...@internap.com]
Sent: Friday, February 13, 2009 3:34 PM
To: Charles Regan; nanog@nanog.org
Subject: RE: One /22 Two ISP no BGP
I see multiple paths to that
I see multiple paths to that block all converge at bell.ca.
I don't see a route with 35911 (telebec) in the AS_PATH, unless it is
start-of-string and followed by _577_ (bell.ca).
They seem to be consistent...
>-Original Message-
>From: Charles Regan [mailto:charles.re...@gmail.com]
>Se
Hi
I have old model extreme switch
Anyone knows about hyperterminal setting.
ls null modem cable same as HP serial cables?
I try both cables in this switch and can see the boot information
but keyboard is not responsing !
Thank you
___
Just got final confirmation from ISP1 that they will not do BGP with us.
ISP1 is Telebec.
http://www.iptools.com/dnstools.php?tool=ipwhois&user_data=142.217.0.0&submit=Go
My subnet
http://www.iptools.com/dnstools.php?tool=ipwhois&user_data=204.144.60.0&submit=Go
What can we do now ? Any suggesti
I think this solution addresses a number of issues that the current blackhole
process lacks. Generally when a blackhole is sent to your provider, they in
turn pass that on to the rest of their routers, dropping the traffic as soon as
it hits their network. The traffic is still taking up just as
On Fri, Feb 13, 2009 at 1:04 PM, Jack Bates wrote:
> Paul Vixie wrote:
>>
>> blackholing victims is an interesting economics proposition. you're
>> saying
>> the attacker must always win but that they must not be allowed to affect
>> the
>> infrastructure. and you're saying victims will request
I am in need of dark fiber in the Parker, Arizona area.
If anyone can help please contact me off list.
Thanks,
David
Hello,
If anyone from TeliaSonera is around please contact me off-list
Thanks
German
pgptdISWjhXk2.pgp
Description: PGP signature
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Jack Bates schrieb:
> Paul Vixie wrote:
>
> Do you have a miraculous way to stop DDOS? Is there now a way to quickly
> and efficiently track down forged packets? Is there a remedy to shutting
> down the *known* botnets, not to mention the unknown ones
This is an automated weekly mailing describing the state of the Internet
Routing Table as seen from APNIC's router in Japan.
Daily listings are sent to bgp-st...@lists.apnic.net
For historical data, please see http://thyme.apnic.net.
If you have any comments please contact Philip Smith .
Routing
Paul Vixie wrote:
blackholing victims is an interesting economics proposition. you're saying
the attacker must always win but that they must not be allowed to affect the
infrastructure. and you're saying victims will request this, since they know
they can't withstand the attack and don't want t
FYI - I think Paul knows exactly what you are talking about.
Hint - review the seminar:
http://www.nanog.org/meetings/nanog36/abstracts.php?pt=Mzk5Jm5hbm9nMzY=&nm=n
anog36
> -Original Message-
> From: Jack Bates [mailto:jba...@brightok.net]
> Sent: Friday, February 13, 2009 9:23 AM
>
Listen online to my favorite hip hop radio station http://www.Jellyradio.com
On Feb 13, 2009, at 9:35 AM, Paul Vixie wrote:
blackholing victims is an interesting economics proposition. you're
saying
the attacker must always win but that they must not be allowed to
affect the
infrastruct
Before everyone goes off and re-invents the wheel, please heed the advice
already provide by Randy, Steve, and Valdis. Community instigated RTBH is
used by a variety of Operational Security Communities. _Experience_ has
demonstrated caution. _Experience_ has pointed to the ways you use these
tools
blackholing victims is an interesting economics proposition. you're saying
the attacker must always win but that they must not be allowed to affect the
infrastructure. and you're saying victims will request this, since they know
they can't withstand the attack and don't want to be held responsibl
Steven M. Bellovin wrote:
In other words, a legitimate prefix hijacking service...
Absolutely, NOT. The origin AS will still be the AS that controls the IP
space. In fact, I think SBGP would be great for a layout like this to
secure down the injections. That being said, prefix lists with md5
Jens,
I would be interested in participating with a destination blackhole
service, so long as peers were authenticated and only authorized to
advertise /32s out of space that they are assigned -- hopefully the same
OrgID is used for the ASN as the IP allocations.
However, a blackhole service
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Steven M. Bellovin schrieb:
> On Fri, 13 Feb 2009 16:41:41 + (WET)
> Nuno Vieira - nfsi telecom wrote:
>
>> Ok, however, what i am talking about is a competelly diferent thing,
>> and i think that my thoughts are alligned with Jens.
>>
>> We want
Paul Vixie wrote:
i think Spamhaus and Cymru are way ahead of you in implementing such a thing,
and it's likely that there are even commercial alternatives to Trend Micro
although i have not kept up on those details.
I think there's a misunderstanding from what I've read about what is
being bl
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
@jack: sorry for duplicate ... pressed reply instead of reply-all ;)
Jack Bates schrieb:
> valdis.kletni...@vt.edu wrote:
> Presumably, the route server would have to have the same guidelines as
> issued by service providers. ie, /32 networks injected
On Fri, 13 Feb 2009 16:41:41 + (WET)
Nuno Vieira - nfsi telecom wrote:
> Ok, however, what i am talking about is a competelly diferent thing,
> and i think that my thoughts are alligned with Jens.
>
> We want to have a Sink-BGP-BL, based on Destination.
>
> Imagine, i as an ISP, host a part
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Skywing schrieb:
> Of course, whomever hosts such a service becomes an attractive DoS target
> themselves if it were ever to gain real traction in the field. There is also
> the "reverse-DoS" issue of an innocent party getting into the feed if anyon
Of course, whomever hosts such a service becomes an attractive DoS target
themselves if it were ever to gain real traction in the field. There is also
the "reverse-DoS" issue of an innocent party getting into the feed if anyone
can peer with it.
- S
-Original Message-
From: Nuno Vieir
wrote:
> > > - - What do you think about such service?
> > > - - Would you/your ASN participate in such a service?
> > > - - Do you see some kind of usefull feature in such a service?
> > > - - Do you have any comments?
- "Suresh Ramasubramanian" wrote:
> > Ah. rbl.maps.vix.com from about a
Ok, however, what i am talking about is a competelly diferent thing, and i
think that my thoughts are alligned with Jens.
We want to have a Sink-BGP-BL, based on Destination.
Imagine, i as an ISP, host a particular server that is getting nn Gbps of DDoS
attack. I null route it, and start adver
valdis.kletni...@vt.edu wrote:
How do you vet proposed new entries to make sure that some miscreant doesn't
DoS a legitimate site by claiming it is in need of black-holing? Note that
it's a different problem space than a bogon BGP feed or a spam-source BGP
feed - if the Cymru guys take another 6
DDoS drones - especially with botnets - can produce a really large zone
To start with google "spamhaus drop list". Then look at the cbl and
see if you think its worth using as a bgp feed
On Fri, Feb 13, 2009 at 9:20 PM, Nuno Vieira - nfsi telecom
wrote:
> Hi Suresh,
>
> But in the meanwhile, a d
On Fri, 13 Feb 2009 15:57:32 +0100, Jens Ott - PlusServer AG said:
> Therefore I had the following idea: Why not taking one of my old routers and
> set it up as blackhole-service. Then everyone who is interested could set up a
> session to there and
>
> 1.) announce /32 (/128) routes out of his pre
Hi Suresh,
But in the meanwhile, a decade later, it does not longer exist.
At least, i can't reach that host, and i was unable to find working
documentation on google of how about this project works, today.
In fact, the first link that google gave out, says that this project is dead at
least 2
In that way, Spamcop and other folks are DOS'ing for years aswell. And in
fact, by denying things around, they are just scrubing and filtering, to make
our day happier, avoiding huge masses of spam and useless crap.
I don't see it the way you do.
A project like this, like also spamcop, are gre
Hi Jens,
I think we are in the same boat.
We suffered the same problem often, on a lower magnitude, but if a project like
this exists those DDoS could even be almost near zero.
This is somewhat similar to what Spamcop, and other folks do with SPAM today,
but applied on a diferent scope, say, B
would this itself not be a dos path?
randy
On Fri, Feb 13, 2009 at 8:27 PM, Jens Ott - PlusServer AG
wrote:
> - - What do you think about such service?
> - - Would you/your ASN participate in such a service?
> - - Do you see some kind of usefull feature in such a service?
> - - Do you have any comments?
Ah. rbl.maps.vix.com from about a d
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
in the last 24 hours we received two denial of service attacks with something
like 6-8GBit volume. It did not harm us too much, but e.g. one of our
upstreams got his Amsix-Port exploded.
With our upstreams we have remote-blackhole sessions runnin
This report has been generated at Fri Feb 13 21:13:35 2009 AEST.
The report analyses the BGP Routing Table of AS2.0 router
and generates a report on aggregation potential within the table.
Check http://www.cidr-report.org for a current version of this report.
Recent Table History
Date
BGP Update Report
Interval: 12-Jan-09 -to- 12-Feb-09 (32 days)
Observation Point: BGP Peering with AS131072
TOP 20 Unstable Origin AS
Rank ASNUpds % Upds/PfxAS-Name
1 - AS9583 187305 4.3% 125.8 -- SIFY-AS-IN Sify Limited
2 - AS7643 167261 3.8%
61 matches
Mail list logo