On Thu, 5 Sep 2019, Jon Lewis wrote:
I was doing some IRR clean-up and after a few successful updates, I'm no
longer able to alter or delete our objects in rr.level3.com.
Emails to r...@level3.com result in no action and no response. I've tried
reaching out to the Level3 (Centurylink) NOC vi
Yes, this is no longer occurring / is resolved.
Apologies,
W
On Mon, Sep 9, 2019 at 1:37 PM Florian Brandstetter via NANOG <
nanog@nanog.org> wrote:
> Unable to replicate this in London:
>
> ```
> ; <<>> DiG 9.11.5-P1-1ubuntu2.5-Ubuntu <<>> @ns1.google.com.
> www.google.com.
> ; (2 servers
In response to feedback from operational security communities,
CAIDA's source address validation measurement project
(https://spoofer.caida.org) is automatically generating monthly
reports of ASes originating prefixes in BGP for systems from which
we received packets with a spoofed source address.
Where are you based? I can check if this can be replicated in our backbone, in
case we have a PoP close.
On Sep. 6 2019, at 11:17 pm, Nick Hilliard wrote:
> Nick Hilliard wrote on 06/09/2019 21:19:
> > Chip Marshall via NANOG wrote on 06/09/2019 20:11:
> > > Hello, I'm seeing an oddity when doin
Hello Ronald,
if you'd open the traceroute you just sent you'd see that the target is route
looping and not actually used by their alleged customer? Since the loop is
actually between the FDC aggregation router and Cogent's backbone router. Also,
what would the target IP have been in this case,
Unable to replicate this in London:
```
; <<>> DiG 9.11.5-P1-1ubuntu2.5-Ubuntu <<>> @ns1.google.com. www.google.com.
; (2 servers found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 61970
;; flags: qr aa rd; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADD
6 matches
Mail list logo