Re: Anyone from Verizon/TATA on here? Possible Packet Loss

2012-09-26 Thread Derek Ivey
Thanks guys. Sorry for the noise... Derek On 9/26/2012 9:11 PM, Jay Ashworth wrote: - Original Message - From: "Derek Ivey" I'm at home now. I also have Verizon FiOS and believe I am seeing the same thing our client saw. So you guys are saying that the response times in traceroutes mi

Re: Anyone from Verizon/TATA on here? Possible Packet Loss

2012-09-26 Thread Jay Ashworth
- Original Message - > From: "Derek Ivey" > I'm at home now. I also have Verizon FiOS and believe I am seeing the > same thing our client saw. So you guys are saying that the response > times in traceroutes might not always be accurate because routers > prioritize ICMP messages. Does that

Re: Anyone from Verizon/TATA on here? Possible Packet Loss

2012-09-26 Thread Derek Ivey
I'm at home now. I also have Verizon FiOS and believe I am seeing the same thing our client saw. So you guys are saying that the response times in traceroutes might not always be accurate because routers prioritize ICMP messages. Does that mean values from MTR aren't accurate? I fired up MTR an

Re: Verizon FIOS troubleshooting

2012-09-26 Thread Randy McAnally
On 09/25/2012 7:11 pm, Bryan Seitz wrote: Recently began seeing things like this to the default GW from inside and outside the FIOS network. Called tech support but all they could do was put a ticket in for the NetEng team. http://pastie.org/4800421 http://www.bsd-unix.net/smokeping/smoke

Re: Anyone from Verizon/TATA on here? Possible Packet Loss

2012-09-26 Thread Pellitteri Alexis
That router might be experiencing a high CPU load, thus not being able to reply ICMP on a timely manner or maybe QoS policies are influencing depending on the kind of traffic the router deals with. If packets are only being delayed/lost on that segment, I would start my analysis there. On 0

Re: Anyone from Verizon/TATA on here? Possible Packet Loss

2012-09-26 Thread Pellitteri Alexis
That router might be experiencing a high CPU load, thus not being able to reply ICMP on a timely manner or maybe QoS policies are influencing depending on the kind of traffic the router deals with. If packets are only being delayed/lost on that segment, I would start my analysis there. On 09

Re: Anyone from Verizon/TATA on here? Possible Packet Loss

2012-09-26 Thread Jo Rhett
Many (most?) routers deprioritize ICMP meesages. Direct pings against the router are not informative re transit failures. On Sep 26, 2012, at 11:37 AM, Derek Ivey wrote: > After some further troubleshooting, I believe I have narrowed down the issue > to one of Verizon's routers (130.81.28.255).

Re: Anyone from Verizon/TATA on here? Possible Packet Loss

2012-09-26 Thread Derek Ivey
After some further troubleshooting, I believe I have narrowed down the issue to one of Verizon's routers (130.81.28.255). ping 130.81.28.255 repeat 100 Type escape sequence to abort. Sending 100, 100-byte ICMP Echos to 130.81.28.255, timeout is 2 seconds: ??!!!??!!

The optimistically named Project Moonshot (was Re: POLL: 802.1x deployment)

2012-09-26 Thread Jay Ashworth
- Original Message - > From: "Peter J. Cherny" > I've (re)sent this to the list as no-one else has noted it > > Possibly a game-changer in the (academic) 802.1x space ... > http://www.project-moonshot.org/diary > http://www.painless-security.com/blog/ I did see that come in, and was go

Re: Anyone from Verizon/TATA on here? Possible Packet Loss

2012-09-26 Thread Derek Ivey
Thanks guys. That was an informative read. I will do some more troubleshooting. Derek On Sep 26, 2012, at 1:16 PM, Darius Jahandarie wrote: > On Wed, Sep 26, 2012 at 1:10 PM, Blake Dunlap wrote: >> This is not the proper way to interpret traceroute information. Also, 3 >> pings is not sufficie

Re: Anyone from Verizon/TATA on here? Possible Packet Loss

2012-09-26 Thread Darius Jahandarie
On Wed, Sep 26, 2012 at 1:10 PM, Blake Dunlap wrote: > This is not the proper way to interpret traceroute information. Also, 3 > pings is not sufficient to determine levels of packet loss statistically. > > I suggest searching the archives regarding traceroute, or googling how to > interpret them

Re: Anyone from Verizon/TATA on here? Possible Packet Loss

2012-09-26 Thread Blake Dunlap
This is not the proper way to interpret traceroute information. Also, 3 pings is not sufficient to determine levels of packet loss statistically. I suggest searching the archives regarding traceroute, or googling how to interpret them in regards to packet loss, as what you posted does not indicate

Anyone from Verizon/TATA on here? Possible Packet Loss

2012-09-26 Thread Derek Ivey
Hi guys, We host a web application for a client and they've been complaining that it's been slow since yesterday. It seems fast from the locations I've tested and the system looks fine, so I suspected there was packet loss going on somewhere between them and our colo facility. I did a few tra

RE: Ethernet OAM BCPs Please are there any yet???

2012-09-26 Thread Jonathon Exley
The ITU recommend the following levels: 5,6,7 = Customer 3,4 = Provider 1,2 = Operator 0= Local segment I don't know if there are any rules of thumb for the CCM interval - faster is more sensitive & unstable, slow is sluggish but stable. The spec allows between 3.33 ms and 10 minutes in 7

Cisco Security Advisory: Cisco Catalyst 4500E Series Switch with Cisco Catalyst Supervisor Engine 7L-E Denial of Service Vulnerability

2012-09-26 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Cisco Catalyst 4500E Series Switch with Cisco Catalyst Supervisor Engine 7L-E Denial of Service Vulnerability Advisory ID: cisco-sa-20120926-ecc Revision 1.0 For Public Release 2012 September 26 16:00 UTC (GMT

Cisco Security Advisory: Cisco IOS Software DHCP Denial of Service Vulnerability

2012-09-26 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Cisco IOS Software DHCP Denial of Service Vulnerability Advisory ID: cisco-sa-20120926-dhcp Revision 1.0 For Public Release 2012 September 26 16:00 UTC (GMT) +- Summary

Cisco Security Advisory: Cisco IOS Software DHCP Version 6 Denial of Service Vulnerability

2012-09-26 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Cisco IOS Software DHCP Version 6 Server Denial of Service Vulnerability Advisory ID: cisco-sa-20120926-dhcpv6 Revision 1.0 For Public Release 2012 September 26 16:00 UTC (GMT

Cisco Security Advisory: Cisco IOS Software Network Address Translation Vulnerabilities

2012-09-26 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Cisco IOS Software Network Address Translation Vulnerabilities Advisory ID: cisco-sa-20120926-nat Revision 1.0 For Public Release 2012 September 26 16:00 UTC (GMT) +- Summary

Cisco Security Advisory: Cisco IOS Software Malformed Border Gateway Protocol Attribute Vulnerability

2012-09-26 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Cisco IOS Software Malformed Border Gateway Protocol Attribute Vulnerability Advisory ID: cisco-sa-20120926-bgp Revision 1.0 For Public Release 2012 September 26 16:00 UTC (GMT

Cisco Security Advisory: Cisco IOS Software Tunneled Traffic Queue Wedge Vulnerability

2012-09-26 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Cisco IOS Software Tunneled Traffic Queue Wedge Vulnerability Advisory ID: cisco-sa-20120926-c10k-tunnels Revision 1.0 For Public Release 2012 September 26 16:00 UTC (GMT

Cisco Security Advisory: Cisco IOS Software Intrusion Prevention System Denial of Service Vulnerability

2012-09-26 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Cisco IOS Software Intrusion Prevention System Denial of Service Vulnerability Advisory ID: cisco-sa-20120926-ios-ips Revision 1.0 For Public Release 2012 September 26 16:00 UTC (GMT

Cisco Security Advisory: Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability

2012-09-26 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability Advisory ID: cisco-sa-20120926-sip Revision 1.0 For Public Release 2012 September 26 16:00 UTC (GMT

Cisco Security Advisory: Cisco Unified Communications Manager Session Initiation Protocol Denial of Service Vulnerability

2012-09-26 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Cisco Unified Communications Manager Session Initiation Protocol Denial of Service Vulnerability Advisory ID: cisco-sa-20120926-cucm Revision 1.0 For Public Release 2012 September 26 16:00 UTC (GMT

Re: What are qatesttwai.gov/fttesttwai.gov?

2012-09-26 Thread Robert Bonomi
> Date: Wed, 26 Sep 2012 14:46:04 +0200 > From: Sebastian Wiesinger > To: NANOG > Subject: What are qatesttwai.gov/fttesttwai.gov? > 'TWAI' is the U.S. gov't reasury eb pplications nfrastructre, run by the Federal Reerve, for a number of secure Treasury-wide application. Parallel production and

What are qatesttwai.gov/fttesttwai.gov?

2012-09-26 Thread Sebastian Wiesinger
Hello, my resolver running on a dedicated server is warning about DNSSEC validation failure for these two .gov domains 7 minutes after every full hour: Sep 26 13:07:04 alita unbound: [28931:0] info: validation failure : no keys have a DS with algorithm RSASHA1-NSEC3-SHA1 from 199.169.196.64 for k

Ethernet OAM BCPs Please are there any yet???

2012-09-26 Thread Adam Vitkovsky
Hi Are there any best common practices for the CFM levels use Since my pure Ethernet aggregation layers are small I believe I only need two CFM levels I plan on using Level 5 between CPEs managed by us and Level 4 between Aggregation devices -that's where MPLS PWs kicks in So leaving Level 7 and L

Re: POLL: 802.1x deployment

2012-09-26 Thread Peter J. Cherny
I've (re)sent this to the list as no-one else has noted it Possibly a game-changer in the (academic) 802.1x space ... http://www.project-moonshot.org/diary http://www.painless-security.com/blog/

Re: POLL: 802.1x deployment

2012-09-26 Thread Brent Jones
That is quite impressive that 5,000 orgs got 802.1x working correctly in this fashion. I had a lot of questions how they handled auth, but it appears auth is distributed according to a roaming user's realm/domain suffix. https://confluence.terena.org/display/H2eduroam/How+to+deploy+eduroam+on-site

Re: POLL: 802.1x deployment

2012-09-26 Thread Mohacsi Janos
On Tue, 25 Sep 2012, valdis.kletni...@vt.edu wrote: On Wed, 26 Sep 2012 00:37:38 +0200, Carsten Bormann said: The entirety of eduroam is on 802.1X (better known as WPA Enterprise). That must be an 8-digit number of users. If you need a list of sites, start with http://en.wikipedia.org/wiki/E