It was a glitch with the re-signing of the zone. There should be a official
report sometime tomorrow. That said "dnssec-lookaside auto;" has been a no-op
in BIND since BIND 9.9.12, BIND 9.10.7, BIND 9.11.3 and a fatal configuration
error as of BIND 9.12.0. We didn’t want the DLV lookup traffic an
Excellent work. I’m curious to know how many of the big ASs are participating
to date. If you or anyone on the list knows if this is published please let me
know.
Thanks
J~
> On Mar 25, 2020, at 21:03, Michel Py wrote:
>
> Hi Job,
>
>> Job Snijders wrote :
>> Exciting news! Today NTT's Gl
Hi Job,
> Job Snijders wrote :
> Exciting news! Today NTT's Global IP Network (AS 2914) enabled RPKI based BGP
> Origin Validation on virtually all
> EBGP sessions, both customer and peering edge. This change positively impacts
> the Internet routing system.
Great, and thanks !
I do have a ques
On 3/25/20 11:27 AM, Nick Hilliard wrote:
nntp is a non-scalable protocol which broke under its own weight.
That statement surprises me. But I'm WAY late to the NNTP / Usenet game.
Threaded news-readers are a great way of catching up with large mailing
lists if you're prepared to put in the
Dear group,
Exciting news! Today NTT's Global IP Network (AS 2914) enabled RPKI
based BGP Origin Validation on virtually all EBGP sessions, both
customer and peering edge. This change positively impacts the Internet
routing system.
The use of RPKI technology is a critical component in our efforts
Let's start a public blacklist, sort of like a RBL reputation block list or
800notes.com, but for companies to "never to do business with" for spamming.
On Wed, Mar 25, 2020 at 06:11:41PM -0400, Martin Hannigan wrote:
> This is overt and more than DB scraping IMHO. It's repulsive.
>
> Public pre
> In recent months, I've been trying to bring your attention to BGP
> optimization.
Is that not the thing that leaked a massive amount of prefixes some time ago ?
Michel.
TSI Disclaimer: This message and any files or text attached to it are intended
only for the recipients named above and con
On 3/25/20 3:47 PM, Randy Bush wrote:
some of us still do uucp, over tcp and over pots.
My preference is to do UUCP over SSH (STDIO) over TCP/IP. IMHO the SSH
adds security (encryption and more friendly authentication (keys / certs
/ Kerberos)) and reduces the number of ports that need to b
This is overt and more than DB scraping IMHO. It's repulsive.
Public pressure is the only way to police _this_.
YMMV,
-M<
On Wed, Mar 25, 2020 at 4:30 PM Chuck Anderson wrote:
> Someone should tell them what happened to Cogent for scraping ARIN WHOIS.
>
> On Wed, Mar 25, 2020 at 04:13:51PM -0
I like that idea!
Erich Kaiser
On Wed, Mar 25, 2020 at 4:57 PM Mike Lyon wrote:
> Actually, you should route their calls to the IRS scammers who keep
> calling. I'm sure the two callers would have a lot of fun chatting with
> each other.
>
> On Wed, Mar 25, 2020 at 2:51 PM Kaiser, Erich wr
Actually, you should route their calls to the IRS scammers who keep
calling. I'm sure the two callers would have a lot of fun chatting with
each other.
On Wed, Mar 25, 2020 at 2:51 PM Kaiser, Erich wrote:
> Cogent calls me about 2-3 times a week. TIme to start re-routing their
> calls back to
And here I actually went to their website (not Cogent -- they still call me all
the time as well) to see what they sell.
-Original Message-
From: "Kaiser, Erich"
Sent: Wednesday, March 25, 2020 5:50pm
To: "NANOG list"
Subject: Re: [EXT] Shining a light on ambulance chasers - Nocti
Cogent calls me about 2-3 times a week. TIme to start re-routing their
calls back to them..
Erich Kaiser
On Wed, Mar 25, 2020 at 3:29 PM Chuck Anderson wrote:
> Someone should tell them what happened to Cogent for scraping ARIN WHOIS.
>
> On Wed, Mar 25, 2020 at 04:13:51PM -0400, Rodney Joffe
some of us still do uucp, over tcp and over pots. archaic, but still
the right tool for some tasks.
randy
On Wed, Mar 25, 2020 at 09:59:53AM -0600, Grant Taylor via NANOG wrote:
> Something that might make you groan even more than NNTP is UUCP. UUCP
> doesn't even have the system-to-system (real time) requirement that NNTP
> has. It's quite possible to copy UUCP "Bag" files to removable media and
> u
Someone should tell them what happened to Cogent for scraping ARIN WHOIS.
On Wed, Mar 25, 2020 at 04:13:51PM -0400, Rodney Joffe wrote:
> Under the heading of sales spam from our community that is in even poorer
> taste, and sucks:
>
>
> Begin forwarded message:
>
> > From: Josh Ankin
> > Sub
We've been told to make sure we have company ID (which has a photo,
albeit an old one) and a business card on us as well as the letter(s).
On Wed, Mar 25, 2020 at 11:38 AM Tim Požár wrote:
>
> They are so open ended, they are really useless. Not sure why they
> didn't issue this with a company a
Under the heading of sales spam from our community that is in even poorer
taste, and sucks:
Begin forwarded message:
> From: Josh Ankin
> Subject: BGP Management
> Date: March 25, 2020 at 3:39:02 PM EDT
> To: rjo...@centergate.com
> Reply-To: jan...@noction.com
>
> Hello Rodney,
>
> I know
Don’t hold your breath :-(.
> On Mar 24, 2020, at 4:55 PM, Mark Tinka wrote:
>
>
>
> On 24/Mar/20 22:48, Randy Bush wrote:
>
>> almost all our cultures have gaps; but some worse than others. we will
>> all learn lessons in the coming many months of plague. i know an office
>> which lost key
Indeed, many folks are developing letters summarizing the specific
company mission, employee role & authorization, and tethering that to
the DHS access letter(s) with more information to inform / better enable
anyone that may need to assess.
You should also be aware of any local / state req
Disaster Service Workers are different - see this link for information on DSWs,
which are typically Government employees that have had special training and
swearing-in. They are not (necessarily) telecom workers but telecom workers
may be DSWs.
Information on current status of DSWs in CA durin
However, if you are stopped and don't have a letter, you're much more
likely to trigger the "bozo making stuff up" detector and get sent home.
Virtually no one stops to print out a weird document on their way to buy
beer.
I'm aware of security guards and telecom techs who have been sent home for
The letters are not to be confused with hall passes.;they don't even have
an individual's name on it.
They simply outline a federal mandate that already exists to inform anyone
who may not know.
Law enforcement of any area that has implemented "stay at home" or "shelter
in place" should already b
I got these. One each for travel and fuel. I could fake
one in 15 minutes or so. Heck, I could probable find one
online and modify it in less time than that! Because of
that I don't see the usefulness.
scott
Proper planning prevents piss poor performance.
“You go to war with the army you have, not the army you might want or wish
to have at a later time.”
When someone does the after-action report, that will need to be a topic
then. Right now, we've need to work with what we've got.
On Wed,
They are so open ended, they are really useless. Not sure why they
didn't issue this with a company affiliation, etc to nail it down to say
credentials that the person may have with them.
Back in my Broadcast Engineering days, I would get passes issued by the
local LE such as the SF Police de
Normally when there is an impending doom moment with BIND or another software
release there is at least some amount of coverage of it.
Was this not announced or known in advance?
Thanks,
-Drew
-Original Message-
From: NANOG On Behalf Of Chuck Anderson
Sent: Wednesday, March 25, 2020 2:
The CISA critical infrastructure letters are a courtesy request letter.
If people abuse its purpose, local officials do not need to extend any
courtesy and can deny access.
The CISA letter is only for "providing emergency communications
sustainment and restoration support to critical commun
Yeah, looks like that comment should have been updated to “harmless until…”
Owen
> On Mar 25, 2020, at 10:32 , Drew Weaver wrote:
>
> We just left the dnssec-lookaside auto; configuration in there. Probably
> because it specifically says in the documentation from ISC that it won't hurt
> any
On the BIND Users list:
https://lists.isc.org/pipermail/bind-users/2020-March/102820.html
On Wed, Mar 25, 2020 at 05:18:49PM +, Drew Weaver wrote:
> Did anyone else on CentOS 6 just have some DNS resolvers totally fall over?
>
> I noticed that this command: dnssec-lookaside auto; was causing
Thanks, my facepalm moment of the day (so far; it's
only 7:30am here) is...
Use tools from the past when the connections everywhere
were losy and slow. They already mentioned RT. I'll
mention that and NNTP/UUCP/etc.
scott
We just left the dnssec-lookaside auto; configuration in there. Probably
because it specifically says in the documentation from ISC that it won't hurt
anything to leave it in there...
# Configuring "dnssec-lookaside auto;" to activate this key is
# harmless
Guess not?
Thanks,
-Drew
Paul Ebersman wrote on 25/03/2020 16:59:
And scary as it sounds, UUCP over SLIP/PPP worked remarkably
robustly.
uucp is a batch oriented protocol so it's pretty decent for situations
where there's no permanent connectivity, but uncompelling otherwise.
nntp is a non-scalable protocol which brok
On Wed, Mar 25, 2020 at 05:18:49PM +,
Drew Weaver wrote
a message of 97 lines which said:
> Did anyone else on CentOS 6 just have some DNS resolvers totally fall over?
dlv.isc.org signatures just expired.
> # NOTE: The ISC DLV zone is being phased out as of February
> 201
Oh, yes. I am aware.
I am asking if anyone has any info as to why it just randomly stopped running
perfectly normally at exactly 1PM EST?
Thanks,
-Drew
-Original Message-
From: Nick Hilliard
Sent: Wednesday, March 25, 2020 1:21 PM
To: Drew Weaver
Cc: 'nanog@nanog.org'
Subject: Re:
The fix is either to remove "dnssec-lookaside auto;" from the config or
else set "dnssec-lookaside no;" and then reload named.
Nick
Drew Weaver wrote on 25/03/2020 17:18:
Did anyone else on CentOS 6 just have some DNS resolvers totally fall over?
I noticed that this command: dnssec-lookaside
Did anyone else on CentOS 6 just have some DNS resolvers totally fall over?
I noticed that this command: dnssec-lookaside auto; was causing the issue. The
issue occurred right at about 1PM EST.
I see this note in the ISC key file..
# ISC DLV: See https://www.isc.org/solutions/dlv for details.
woody> UUCP kicks ass.
And scary as it sounds, UUCP over SLIP/PPP worked remarkably
robustly. When system/network resources are skinny or scarce, you get
really good at keeping things working.
:)
> On Mar 25, 2020, at 4:59 PM, Grant Taylor via NANOG wrote:
> UUCP doesn't even have the system-to-system (real time) requirement that NNTP
> has.
Brian Buhrow and I replaced a completely failing
database-synchronization-over-Microsoft-Exchange system with UUCP across
American President Lin
In article <9f22cde2-d0a2-1ea1-89e9-ae65c4d47...@tnetconsulting.net> you write:
>I hadn't considered having a per system NNTP server. I sort of like the
>idea. I think it could emulate the functionality that I used to get out
>of Lotus Notes & Domino with local database replication. I rarely
On 3/25/20 5:39 AM, Rich Kulawiec wrote:> One of the tools that we've
had for a very long time but which is
often overlooked is NNTP. It's an excellent way to move information
around under exactly these circumstances: low bandwidth, lossy
connections -- and intermittent connectivity, limited res
One of the tools that we've had for a very long time but which is
often overlooked is NNTP. It's an excellent way to move information
around under exactly these circumstances: low bandwidth, lossy
connections -- and intermittent connectivity, limited resources, etc.
Nearly any laptop/desktop has
42 matches
Mail list logo