Re: IXP

2009-04-19 Thread Alan Hannan
A solution I put in place at UUnet circa 1997 was to take a set of /32 routes representing major destination, e.g. ISP web sites, content sites, universities, about 20 of them, and temporarily place a /32 static route to each participant at the public exchange and traceroute to the destinatio

Re: IXP

2009-04-19 Thread vijay gill
If you are unfortunate enough to have to peer at a public exchange point, put your public ports into a vrf that has your routes. Default will be suboptimal to debug. I must say stephen and vixie and (how hard this is to type) even richard steenbergens methodology makes the most sense going forward

Re: SkypeSetup Rogue Download

2009-04-19 Thread Rubens Kuhl
Could be a local trojan inserting bogus entries on the hosts file, could be DNS poisoning on one particular resolver, or an infection on the distribution source. Rubens On Sun, Apr 19, 2009 at 5:55 PM, Mari Nichols wrote: > I believe the file is originating directly from Skype.  Our writer >

Re: google noc

2009-04-19 Thread John Martinez
issue has been resolved. Thanks to all that responded. Stephen Stuart wrote: >> Anyone have any contact information for the google noc or adsense noc? >> Thanks in advance. > > Did you send email ?

Re: google noc

2009-04-19 Thread Matthew Moyle-Croft
http://www.peeringdb.com/view.php?asn=15169 On 20/04/2009, at 7:22 AM, John Martinez wrote: Anyone have any contact information for the google noc or adsense noc? Thanks in advance. -- Matthew Moyle-Croft Networks, Internode/Agile Level 5, 162 Grenfell Street, Adelaide, SA 5000 Australia Em

google noc

2009-04-19 Thread John Martinez
Anyone have any contact information for the google noc or adsense noc? Thanks in advance.

Re: SkypeSetup Rogue Download

2009-04-19 Thread Mari Nichols
I believe the file is originating directly from Skype. Our writer stated that he had tried download.com's version and it was clean against VT. I'm on ISC handler duty today, just wondering if anyone had seen this happening. Mari Nichols HoD From: Paul Ferguso

Re: IXP

2009-04-19 Thread Randy Bush
>>> Iirc it's on the roadmap for thier next generation of switches. >> bummer, as performance and per-port cost are certainly tasty. > Afaik low latency is due to the fact that Arista boxes are doing cut > through. no shock there > Pricewise they are very attractive. And Arista EOS actually is mo

SkypeSetup Rogue Download

2009-04-19 Thread Mari Nichols
Has anyone seen anything like this? http://www.virustotal.com/analisis/f58203f8d5cb98628eaa785e27c9e059

Re: IXP

2009-04-19 Thread Arnold Nipper
On 19.04.2009 01:38 Randy Bush wrote >>> just curious. has anyone tried arista for smallish exchanges, before >>> jumping off the cliff into debugging extreme, foundry, ... >> last time I look at them their products lacked port security or >> anything similiar. > > whoops! > >> Iirc it's on the

Re: IXP

2009-04-19 Thread Arnold Nipper
On 19.04.2009 19:43 Chris Caputo wrote > On Sun, 19 Apr 2009, Mikael Abrahamsson wrote: >> On Sat, 18 Apr 2009, Nick Hilliard wrote: >> > - ruthless and utterly fascist enforcement of one mac address per >> > port, using either L2 ACLs or else mac address counting, with no >> > exceptions for an

Re: IXP

2009-04-19 Thread Nick Hilliard
On 19/04/2009 08:31, Mikael Abrahamsson wrote: Well, as long as it simply drops packets and doesn't shut the port or some other "fascist" enforcement. We've had AMSIX complain that our Cisco 12k with E5 linecard was spitting out a few tens of packets per day during two months with random source m

Re: IXP

2009-04-19 Thread Sean Donelan
On Sat, 18 Apr 2009, Paul Vixie wrote: "Even"? *Especially* -- or they're not competent at doing security. wouldn't a security person also know about http://en.wikipedia.org/wiki/ARP_spoofing and know that many colo facilities now use one customer per vlan due to this concern? (i re

Re: IXP

2009-04-19 Thread Chris Caputo
On Sun, 19 Apr 2009, Mikael Abrahamsson wrote: > On Sat, 18 Apr 2009, Nick Hilliard wrote: > > - ruthless and utterly fascist enforcement of one mac address per > > port, using either L2 ACLs or else mac address counting, with no > > exceptions for any reason, ever. This is probably the single m

Re: IXP

2009-04-19 Thread Jeff Young
Yeah, You could count packets or you could forward them not both. ACLs could crash everything. Retrieving the config via SNMP would crash a router. I gotta get back into an ISP and get a new set of stories to tell. jy On Apr 18, 2009, at 10:29 PM, Deepak Jain wrote: Remember when you didn't

Re: IXP

2009-04-19 Thread Mikael Abrahamsson
On Sat, 18 Apr 2009, Nick Hilliard wrote: - ruthless and utterly fascist enforcement of one mac address per port, using either L2 ACLs or else mac address counting, with no exceptions for any reason, ever. This is probably the single more important stability / security enforcement mechanism f