OMG can't you people run proper spam filtering on your own mail
servers that filter out the nanog messages that are spam?!
I think I've had two messages in the last month, while others of you
are talking about dozens?
Do you need to buy some hosting for your email accounts?
My filtering wor
On 14/07/2011 9:08 a.m., Larry Stites wrote:
> Given what you know now, if you were 21 and just starting into networking /
> communications industry which areas of study or specialty would you
> prioritize?
>
Rebeccah Harris in my physics lectures. She was clearly up for it.
--
Leigh
On Thu, Jul 14, 2011 at 06:48:54PM +1200, Don Gould wrote:
> OMG can't you people run proper spam filtering on your own mail
> servers that filter out the nanog messages that are spam?!
One of the fundamental principles of spam mitigation is that blocking
is usually best (in terms of: efficacy, ac
On 13/07/11 11:37 PM, Richard Kulawiec wrote:
> On Tue, Jul 12, 2011 at 04:13:10PM +0200, Mattias Ahnberg wrote:
>> I might have missed some discussion; but why are we moving
>> away from mailman, and what software is in the new system?
>
> Seconded. Mailman is presently the gold standard for mai
That issue can be resolved by changing email addresses for multiple
language support by using announce...@example.com,
anounce...@example.com ?
Alex
On Thu, Jul 14, 2011 at 8:57 AM, Ben McGinnes wrote:
> On 13/07/11 11:37 PM, Richard Kulawiec wrote:
>> On Tue, Jul 12, 2011 at 04:13:10PM +0200,
On 15/07/11 12:24 AM, Alex Ryu wrote:
> That issue can be resolved by changing email addresses for multiple
> language support by using announce...@example.com,
> anounce...@example.com ?
Yeah, that's how I'd get around it. I think the Document Foundation
had some other issues, like wanting addre
Hello All:
Given the issues we had with the mailing list transition, we would like to
solicit volunteers to assist in testing the "new" configuration. Please note,
we are just moving the existing Mailman configuration to a new server under our
control, but we have to move the list due to contr
Hi All,
I just wanted to throw a question out to the list...
In our data center we feed Internet to some of our US based offices and every
now and again we receive complaints that they can't access some US based
Internet content because they are coming from a Canadian based IP.
This has sparke
Hi Jeff,
You might have some luck following the instructions on
http://nanog.cluepon.net/index.php/GeoIP to register one particular /32
within your Canadian-announced netblock as being in the USA, and selectively
NATing as you suggest, but I believe some stricter GeoIP databases check
next hops an
On Jul 14, 2011, at 12:34 PM, Jeff Cartier wrote:
> Hi All,
>
> I just wanted to throw a question out to the list...
>
> In our data center we feed Internet to some of our US based offices and every
> now and again we receive complaints that they can't access some US based
> Internet content
On 7/13/2011 4:28 PM, Saku Ytti wrote:
On (2011-07-13 14:08 -0700), Larry Stites wrote:
Given what you know now, if you were 21 and just starting into networking /
communications industry which areas of study or specialty would you
prioritize?
Again? Buy AAPL, INTC and MSFT with loan money and
On Thu, 14 Jul 2011, Jeff Cartier wrote:
- Does the idea of having local Internet at each site make more sense?
If so why?
IME, costs for private backhaul circuits of any flavor are significantly
higher than costs for plain internet access - so backhauling internet
access (unless you have ex
Once upon a time, Jason Baugher said:
> If I had to have a job where I did the same thing every day, year after
> year, I'd stab a pencil in my eye. I love that our industry is
> constantly evolving.
Definate +1 to that.
I look at how my father's job has changed in his 49+ years; he's gone
fro
On Jul 14, 2011, at 2:35 PM, david raistrick wrote:
> On Thu, 14 Jul 2011, Jeff Cartier wrote:
>
>> - Does the idea of having local Internet at each site make more sense? If so
>> why?
>
> IME, costs for private backhaul circuits of any flavor are significantly
> higher than costs for plain i
On 07/11/2011 09:17 PM, Karl Auer wrote:
> I realise this is not "specific implementations" as you requested, but
> it seems to me that the problem is generic enough not to require that.
>
> The attack is made possible by the design of the protocol, not any
> failing of specific implementations. S
On Thu, Jul 14, 2011 at 7:29 PM, Fernando Gont wrote:
> On 07/11/2011 09:17 PM, Karl Auer wrote:
> Vulnerability to this specific issues has a great deal to do with the
> implementation. After all, whenever there's a data structure that can
Yes
> In this particular case, if the implementation enf
you want to give ops feedback to the ietf, well ...
i suggest a loc/id session at the next nanog, 20-30 mins each for
LISP
ILNP
6296
where each is explained at an architectural level in some detail with
also a predeterimied list of questions such as "how does this address
loc/id separation,
On Jul 14, 2011, at 6:24 PM, Jimmy Hess wrote:
> On Thu, Jul 14, 2011 at 7:29 PM, Fernando Gont wrote:
>> On 07/11/2011 09:17 PM, Karl Auer wrote:
>> Vulnerability to this specific issues has a great deal to do with the
>> implementation. After all, whenever there's a data structure that can
> Y
On Thu, Jul 14, 2011 at 2:34 PM, Jeff Cartier
wrote:
> - How should/can an enterprise deal with accessibility to internet
> content issues? (ie. that whole coming from a Canadian IP accessing US
> content)
You indeed might feed traffic towards such "IP restricted" sites
through a transp
On 07/14/2011 10:24 PM, Jimmy Hess wrote:
>> In this particular case, if the implementation enforces a limit on the
>> number of entries in the "INCOMPLETE" state, then only nodes that have
>> never communicated with the outside world could be affected by this
>> attack. And if those entries that a
On Jul 14, 2011, at 10:06 PM, Fernando Gont wrote:
>> It should be possible to mitigate this, so long as the attack does not
>> actually
>> originate from a neighbor on the same subnet as a router IP interface on
>> an IPv6 subnet with sufficient number of IPs.
>
> Well, unless there's some
On Jul 14, 2011, at 7:00 PM, Jimmy Hess wrote:
> On Thu, Jul 14, 2011 at 2:34 PM, Jeff Cartier
> wrote:
>> - How should/can an enterprise deal with accessibility to internet
>> content issues? (ie. that whole coming from a Canadian IP accessing US
>> content)
> You indeed might feed t
On 07/14/2011 11:35 PM, Jared Mauch wrote:
>> Well, unless there's some layer-2 anti-spoofing mitigation in
>> place, with /64 subnets the "local attacker" typically *will* have
>> enough addresses.
>
> Solving a local attack
Well, I was talking about not *introducing* ;-) one.
> is something
http://tools.ietf.org/html/draft-gashinsky-v6nd-enhance-00
Sent from my iThing
On Jul 14, 2011, at 10:57 PM, Fernando Gont wrote:
> On 07/14/2011 11:35 PM, Jared Mauch wrote:
>
>>> Well, unless there's some layer-2 anti-spoofing mitigation in
>>> place, with /64 subnets the "local attacker" ty
On Thu, Jul 14, 2011 at 9:35 PM, Jared Mauch wrote:
> On Jul 14, 2011, at 10:06 PM, Fernando Gont wrote:
> Anyone on a layer-2 network can do something interesting like flood all f's
> and kill the lan. Trying to keep the majority of thoughts here for layer-3
> originated attacks, even if the t
Hi Larry,
I would learn 2 things:
* having fun learning
* time management
It's been almost 14 years since I was 21 and I concur with many of the
things mentioned in this thread, and learned a few of them. However it
wasn't all the time I spend studying and learning, it's all the time I
spend bein
On 07/15/2011 12:24 AM, Jimmy Hess wrote:
> A similarly hazardous situation exists with IPv4, and it is basically
> unheard of for IPv4's Layer 2/ARP security weaknesses to be exploited
> to create a DoS condition, even though they can be (very easily),
IMO, the situation is different, in that
On Wed, Jul 13, 2011 at 3:08 PM, Larry Stites wrote:
> Given what you know now, if you were 21 and just starting into networking /
> communications industry which areas of study or specialty would you
> prioritize?
>
Make sure you are always learning. You can't stop learning in this
industry.
Sure. Sometimes it's nice/convenient to let firewalls advertise the
external blocks they use for NAT translations, etc. Otherwise you need
to statically route them to the firewall and redistribute the statics
from said routers into your IGP.
Also, in some cases, people want to do network-based loa
Is anyone else seeing that Googles DNS records just disappeared?
I just lost all connectivity to Google services including google.com,
plus.google.com, Public dns, etc.
Regards,
Cody Rose
NOC & Sys Admin
Website: www.killsudo.info
email: c...@killsudo.info
---
$
Service just returned,
DNS is active and connectivity directly to IPs are working again. Guess it was
just a blip.
Regards,
Cody Rose
NOC & Sys Admin
Website: www.killsudo.info
email: c...@killsudo.info
signature.asc
Description: This is a digitally signed message part.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Jul 15, 2011, at 1:31 AM, Cody Rose wrote:
> Is anyone else seeing that Googles DNS records just disappeared?
>
> I just lost all connectivity to Google services including google.com,
> plus.google.com, Public dns, etc.
Weird, works fine from h
It appeared to be very brief, I just happened to be in a Google Plus Hangout
when the chat died then my Gtalk died followed by my Google homepage.
By the time I got done checking DNS and was getting on a trace-route server my
chat reconnected and service was back to normal.
Just thought it was
On Jul 14, 2011, at 8:24 PM, Jimmy Hess wrote:
> On Thu, Jul 14, 2011 at 9:35 PM, Jared Mauch wrote:
>> On Jul 14, 2011, at 10:06 PM, Fernando Gont wrote:
>> Anyone on a layer-2 network can do something interesting like flood all f's
>> and kill the lan. Trying to keep the majority of thoughts
34 matches
Mail list logo