On Fri, Feb 19, 2010 at 12:15 AM, Scott Weeks wrote:
>
> Anyone got the ASN of Office des Postes et Télécommunications in French
> Polynesia? I'm having a heck of a time looking for it in APNIC.
>
I'm not sure whether the OPT from French Polynesia has its own ASN as
it owns the operator named Ma
Hi,
Does anyone know a contact for AS33259?
It seems the AS33259 is leaking a bunch of prefixes in error, and this
caused reachability problems.
-
Matsuzaki Yoshinobu
- IIJ/AS2497 INOC-DBA: 2497*629
Any multicast networks seeing a large amount of traffic for the beacon
group 233.4.200.18? Starting approximately 0730 GMT, we started receiving
more than 12 Mbps for that group which normally is far less.
Group: 233.4.200.18, (?)
Source: 64.251.63.189 (mcast.cen.ct.gov)
Rate: 1095 pps
Date: Fri, 19 Feb 2010 20:05:10 +0900 (JST)
Matsuzaki Yoshinobu wrote
> It seems the AS33259 is leaking a bunch of prefixes in error, and this
> caused reachability problems.
at the route-views.oregon-ix.net, it looks like '701 33259 25843 3356
...' as follows.
| * 12.147.32.0/21 157.130.10.2
This appears to be ongoing.
I'm seeing more updates here:
http://puck.nether.net/bgp/leakinfo.cgi
Some people at 701 are getting email alerts from my monitoring system.
I'll ask them about this shortly.
- jared
On Feb 19, 2010, at 7:06 AM, Matsuzaki Yoshinobu wrote:
> Date: Fri, 19 Feb 2010
On Thu, Feb 18, 2010 at 09:50:59AM -0800, Crist Clark wrote:
> And I want to know how they figured out we had a Barracuda.
It's not that hard, much of the time -- they tend to make
themselves visible via their poor behavior.
As to Spamhaus policy re appliances in general, their terms are on their
> | * 12.147.32.0/21 157.130.10.233 0 701 33259
> 25843 3356 7132 14858 i
> | * 17.86.0.0/16 157.130.10.233 0 701 33259
> 25843 3356 4637 1221 714 714 714 714 714 714 i
> | * 17.86.132.0/22 157.130.10.233 0 701 33
Rich Kulawiec wrote:
> On Thu, Feb 18, 2010 at 09:50:59AM -0800, Crist Clark wrote:
>
>> And I want to know how they figured out we had a Barracuda.
>>
>
> It's not that hard, much of the time -- they tend to make
> themselves visible via their poor behavior.
>
>
Is there some very spec
All,
We noticed at around midnight for a brief period of time and around 6AM EST for
an extended period that several hosted customer servers (4 completely different
customers) launched quite a campaign doing 100Mbps during these times (on
100Mbps ports).
The thing I find 'suspicious' is that a
On Fri, 19 Feb 2010, Drew Weaver wrote:
All,
We noticed at around midnight for a brief period of time and around 6AM
EST for an extended period that several hosted customer servers (4
completely different customers) launched quite a campaign doing 100Mbps
during these times (on 100Mbps ports
Sorry, the point was that MRTG and other metrics also showed that they were
doing 100Mbps, and I am well aware of counter bugs in Cisco's IOS but it has
never been that out of whack (on several different switches) before, also the
fact that all of these hosts are Windows 2003 and had the exact s
> Dean Drako writes:
^
> When they were providing a free service we promoted them strongly,
Translation: We made money using it and it didn't cost us anything.
> but when they started charging the customers that really used it,
> we had to part ways.
Translatio
The differential delay is most likely caused by the T1's in the MFR bundle
riding physically diverse paths across the TDM network. The carrier would need
to validate their CLR/DLR to see what paths/DS3's the individual T1's follow to
verify they are on the same circuit. Unfortunately there are t
On Feb 18, 2010, at 2:25 PM, Nick Hilliard wrote:
> On 18/02/2010 10:40, Michelle Sullivan wrote:
>> They seem to be doing that a lot of late. They also contacted my
>> employer and demanded $100k/yr(?) for having a "Use Spamhaus RBL" in our
>> software.
>
> I sympathise. It's very frustrati
On Feb 16, 2010, at 9:24 AM, Joe Abley wrote:
>
> On 2010-02-14, at 12:41, Lorell Hathcock wrote:
>
>> My problem on the redesign is I want to provide routed, copper gig-e ports
>> at a reasonable price per port.
>
> Force10 S25N/S50N. http://www.force10networks.com/products/s50n.asp
>
> If y
Michelle Sullivan writes:
> Rich Kulawiec wrote:
>> On Thu, Feb 18, 2010 at 09:50:59AM -0800, Crist Clark wrote:
>>
>>> And I want to know how they figured out we had a Barracuda.
>>
>> It's not that hard, much of the time -- they tend to make
>> themselves visible via their poor behavior.
>
>
Hi.
Are there solutions already available implementing 40GBASE-LR4,
100GBASE-LR4 and 100GBASE-ER4 draft standards ? By solutions it means
both switches with CFP-MSA/QSFP/CXP ports and the modules.
Rubens
Bjørn Mork wrote:
> Michelle Sullivan writes:
>
>> Rich Kulawiec wrote:
>>
>>> On Thu, Feb 18, 2010 at 09:50:59AM -0800, Crist Clark wrote:
>>>
>>>
And I want to know how they figured out we had a Barracuda.
>>> It's not that hard, much of the time -- they tend
Marc Powell wrote:
> On Feb 18, 2010, at 2:25 PM, Nick Hilliard wrote:
>
>
>> On 18/02/2010 10:40, Michelle Sullivan wrote:
>>
>>> They seem to be doing that a lot of late. They also contacted my
>>> employer and demanded $100k/yr(?) for having a "Use Spamhaus RBL" in our
>>> software.
>
On 2/19/2010 12:53 PM, Dean Anderson wrote:
> So you should think that its ok for blacklists to charge money for
> things they got for free?
Well, in the interest of staying on topic. I don't think Spamhaus is
selling the data (as you spammers in do do).
So far as I know, the data are supplie
[ subject: changed and refs headers removed ]
>> So you should think that its ok for blacklists to charge money for
>> things they got for free?
why not? apnic, arin, ripe, ... do!
randy
On Fri, Feb 19, 2010 at 07:18:38PM +0100, Bj??rn Mork wrote:
> I don't know what Rich referred to, but Barracudas used to be easy to
> spot by backscatter levels:
> http://www.dontbouncespam.org/#barracuda
They're *still* easy to spot by backscatter levels, probably because
(a) a lot of people sti
Hello all,
We have a customer that appears to have a portion of their ARIN-
assigned IP space blocked from accessing specific US Air Force
resources. We've tried opening tickets with various groups and are not
getting anywhere after several months of "dancing".
I was wondering if:
1) Anyon
On 13 Feb 2010, at 01:01, Nathan Ward wrote:
> On 13/02/2010, at 11:51 AM, Steve Bertrand wrote:
>
>> fwiw, I've also heard good things about bgpd(8) and ospfd(8), but I
>> haven't tried those either...zebra/Quagga just stuck.
> OpenBGPd would be great for a public route server at an IX.
Nathan
Thomas Magill wrote:
I am thinking about implementing a filter to block all traffic with
private AS numbers in the path. I see quite a few in my table though so
I am concerned I might block some legitimate traffic. In some cases,
these are just prefixes with the private appended to the end but
Has anyone experience problems using Intel 10 Gb NIC on VMware (AMD) ESX
4.0?
Some VM's are experiencing intermittent network drop issues even though
the actual VM is online. The VM are unable to ping out or respond to
ping and sometime unable to ping VM-to-Vm on the same physical server.
The
BGP Update Report
Interval: 11-Feb-10 -to- 18-Feb-10 (7 days)
Observation Point: BGP Peering with AS131072
TOP 20 Unstable Origin AS
Rank ASNUpds % Upds/PfxAS-Name
1 - AS18170 89373 7.0%4062.4 -- CHANGWON-AS-KR Changwon
National University
2 - AS31055
This report has been generated at Fri Feb 19 21:11:27 2010 AEST.
The report analyses the BGP Routing Table of AS2.0 router
and generates a report on aggregation potential within the table.
Check http://www.cidr-report.org for a current version of this report.
Recent Table History
Date
on Thu, Feb 18, 2010 at 09:50:59AM -0800, Crist Clark wrote:
> Spamhaus does some good work, but being used as a pawn in
> some conflict between vendors doesn't feel nice. And I want to
> know how they figured out we had a Barracuda.
If it's connected to the 'Net and listening on port 25, it's rat
On 2010-02-04 at 17:50 -0500, Richard E. Brown wrote:
> My company, Dartware, have derived a regex for testing whether an IPv6
> address
> is correct. I've posted it in my blog:
>
> http://intermapper.ning.com/profiles/blogs/a-regular-expression-for-ipv6
>
> This has links to the regular
On Fri, Feb 19, 2010 at 3:30 PM, Rich Kulawiec wrote:
> Barracuda's engineers apparently think
> that using SPF stops backscatter -- and it most emphatically does not.
>
> Reject good, bounce baaad. [1]
Whine all you want about backscatter but until you propose a
comprehensive solution th
On 2/19/2010 7:20 PM, William Herrin wrote:
> On Fri, Feb 19, 2010 at 3:30 PM, Rich Kulawiec wrote:
>> Barracuda's engineers apparently think
>> that using SPF stops backscatter -- and it most emphatically does not.
>>
>> Reject good, bounce baaad. [1]
>
> Whine all you want about backsca
>> Reject good, bounce baaad. [1]
> Whine all you want about backscatter but until you propose a
> comprehensive solution that's still reasonably compatible with RFC
> 2821's section 3.7 you're just talking trash.
no, rich is talking operation pragmatics. more and more these years,
rfcs a
US carried out "Cyber Shockwave" - an exercise by non-government actors who
have close relations to the government past.
The results will be aired on CNN this weekend.
Intelligence suggests the scenario was not standard and that a crash in the
smart phone network was used as a concept of how US
the details were in the press days ago. 83.2% scare, negligible lessons
we can actually put in practice without becoming (more of) a police
state.
randy
On Fri, Feb 19, 2010 at 9:02 PM, Randy Bush wrote:
>>> Reject good, bounce baaad. [1]
>> Whine all you want about backscatter but until you propose a
>> comprehensive solution that's still reasonably compatible with RFC
>> 2821's section 3.7 you're just talking trash.
>
> no, rich is talki
On Fri, Feb 19, 2010 at 8:35 PM, Larry Sheldon wrote:
> On 2/19/2010 7:20 PM, William Herrin wrote:
>> "If an SMTP server has accepted the task of relaying the mail and
>> later finds that the destination is incorrect or that the mail cannot
>> be delivered for some other reason, then it MUST cons
On Fri, Feb 19, 2010 at 5:20 PM, William Herrin wrote:
> On Fri, Feb 19, 2010 at 3:30 PM, Rich Kulawiec wrote:
>> Barracuda's engineers apparently think
>> that using SPF stops backscatter -- and it most emphatically does not.
>>
>> Reject good, bounce baaad. [1]
>
> Whine all you want ab
On Fri, Feb 19, 2010 at 9:28 PM, Scott Howard wrote:
> They finally fixed this a few years ago, and can not integrate with
> LDAP (and possibly others) for address validation. Of course, it's
> still down to the admin to implement it...
... can NOW integrate... even.
Scott.
39 matches
Mail list logo