On 1/22/13, Suresh Ramasubramanian wrote:
> On Tuesday, January 22, 2013, Matt Palmer wrote:
What the article may not tell us is, what the applicable College's
technology policies would be, or what sort of contacts between
student and university staff were taking place.
I see this as more as
On Mon, Jan 21, 2013 at 02:23:53AM -0600, Jimmy Hess wrote:
> that sort of abuse is likely need to be protected against
> via a captcha challenge as well,
Once again: captchas have zero security value. They either defend
(a) resources worth attacking or (b) resources not worth attacking. If
On 23 January 2013 09:45, Rich Kulawiec wrote:
> On Mon, Jan 21, 2013 at 02:23:53AM -0600, Jimmy Hess wrote:
>> that sort of abuse is likely need to be protected against
>> via a captcha challenge as well,
>
> Once again: captchas have zero security value. They either defend
> (a) resources wor
On 23/01/2013 02:57, Dobbins, Roland wrote:
> The overwhelming need for it is orthogonal to any schemes for hashing NAT
> source/dest ports.
There are several conflicting requirements, including:
- requirement to run a business which makes money
- constraints on IPv4 addresses which mandate NA
On Tue, Jan 22, 2013 at 4:52 PM, Dan Wing wrote:
> draft-donley-behave-deterministic-cgn provides that functionality in
> an attempt to help randomize ports (see RFC6056). However, because
> the ports are fixed and there are relatively few ports, an attacker
> can determine the ports by causing t
Le 2013-01-23 14:22, William Herrin a écrit :
I thought this was desirable behavior for a CGN since effective port
prediction facilitates p2p nat traversal?
No. NAT traversal using port prediction is a Worst Current Practice.
Simon
Hi,
> There are several conflicting requirements, including:
>
> - requirement to run a business which makes money
> - constraints on IPv4 addresses which mandate NAT
> - law enforcement requirements, mandating either logging / port tracking
> - network telemetry
>
> law enforcement requirements
> I am so glad that Dutch law enforcement officially confirmed that
> logging is not allowed by law because of privacy impact, and that
> port tracking is not required.
wow! is there enough of what they are drinking to be shared widely?
randy
On 23/01/2013 14:17, Randy Bush wrote:
>> I am so glad that Dutch law enforcement officially confirmed that
>> logging is not allowed by law because of privacy impact, and that
>> port tracking is not required.
>
> wow! is there enough of what they are drinking to be shared widely?
This probably
This kid is not a hacker. Changing a url to point to
profile.php?id=45 instead or profile.php?id=44 don't require anything
special. Downloading a tool only requiere knowing how to click
"download". This is level basic of computer useage. Kids these days
host modded Minecraft servers at 11 years
On Wed, Jan 23, 2013 at 8:32 AM, Simon Perreault
wrote:
> Le 2013-01-23 14:22, William Herrin a écrit :
>> I thought this was desirable behavior for a CGN since effective port
>> prediction facilitates p2p nat traversal?
>
> NAT traversal using port prediction is a Worst Current Practice.
In othe
Le 2013-01-23 16:37, William Herrin a écrit :
NAT traversal using port prediction is a Worst Current Practice.
In fact, were someone to use those "worst current practices" to build
some generic p2p VPN software, even old games could leverage it to
allow someone behind a CGN to host.
Have a lo
On 13/12/2012 22:28, Nick Hilliard wrote:
> I also got a quote for BT Diamond IP. I managed to stop laughing some
> weeks later when I found that they had put me on some spam list of theirs
> with no unsubscribe option and no response to manual unsubscribe requests
> (although to be fair, they too
Only if you install it for me, Pierre! :-) (I'm not a sysadmin, I just play
one on the Internet)
Software prerequisite
Netmagis needs the following software:(not the usual yada yada yada, to quote
Google)
Much appreciated, Eric
From: Pierre DAVID
To: NA
Thanks James. We just activated a demo with 6Connect last week. We'll see how
it goes.
Much appreciated, Eric
From: James Wininger
To: Eric A Louie
Cc: ""
Sent: Mon, December 17, 2012 8:56:53 AM
Subject: Re: IP Address Management IPAM software for small
--- oscar.vi...@gmail.com wrote:
From: " ."
weak. A more realistic reason is moral panic // he is making us look
bad. Making stupid people look stupid should not be a crime.
-
It's his wake up call ... oops, I mean his 'welcome' to the
wonder
Hey guys - We too are evaluating 6Connect, moving away from BlueCat Proteus.
So far so good on the backend and with automation.
We start our net ops operational trials tomorrow.
Blake
-Original Message-
From: Eric A Louie [mailto:elo...@yahoo.com]
Sent: Wednesday, January 23, 2013 11:57
Question abbout CGN:
Generally speaking for CGN setups, how many end users are NATed to a
single public IP address ?
In terms of traceability, there is a huge difference between loading
200k end users onto 1 public IP and putting say 5 end users per public IP.
In the later case, it becomes possi
> -Original Message-
> From: Jeff Kell [mailto:jeff-k...@utc.edu]
> Sent: Thursday, January 17, 2013 7:30 PM
[snip]
> Not sure about Vonage, but Skype, Xbox, and just about everything else
> imaginable (other than hosting a server) works just fine over NAT with
> default-deny inbound here,
On Wed, Jan 23, 2013 at 10:54 AM, Simon Perreault
wrote:
> Le 2013-01-23 16:37, William Herrin a écrit :
>> In fact, were someone to use those "worst current practices" to build
>> some generic p2p VPN software, even old games could leverage it to
>> allow someone behind a CGN to host.
>
> http://
On Wed, Jan 23, 2013 at 4:31 PM, Jean-Francois Mezei
wrote:
> Generally speaking for CGN setups, how many end users are NATed to a
> single public IP address ?
>
> In terms of traceability, there is a huge difference between loading
> 200k end users onto 1 public IP and putting say 5 end users per
Hi,
On Wed, 23 Jan 2013, William Herrin wrote:
The algorithm will exclude the .0 and .255 external addresses from
use, mapping the respective internal IPs to the other externals.
why would you want to do that. .0 and .255 are perfectly valid ips.
Greetings
Christian
--
Christian Kratzer
On Wed, Jan 23, 2013 at 6:21 PM, Christian Kratzer wrote:
> On Wed, 23 Jan 2013, William Herrin wrote:
>> The algorithm will exclude the .0 and .255 external addresses from
>> use, mapping the respective internal IPs to the other externals.
>
> why would you want to do that. .0 and .255 are perfec
Hi everyone,
This is probably an OT question for this list, but I thought someone here may
have encountered this.
I've been having a really annoying super slow web interface access to ILO 2 on
our DL360 G5s and G6s, since day one, on all of them. SSH to ILO is perfectly
fine. IPMI is fine. VSP
On Jan 23, 2013, at 14:42, "Blake Gillman" wrote:
> Hey guys - We too are evaluating 6Connect, moving away from BlueCat Proteus.
What are some of the reasons you are migrating away from BlueCat's products?
-Adam
> So far so good on the backend and with automation.
> We start our net ops
I've dealt with moody ILO's in the past. Presuming (1) they're all on
the latest firmware (2) there isn't anything fishy/tell-tale in the logs
and (3) that you aren't afraid of a CLI, my advice would be to look into
using python-hpilo, which provides a command line interface to the ILO
API for A-Z
On 24/01/2013 10:24 AM, Erik Levinson wrote:
> I've been having a really annoying super slow web interface access to ILO 2
> on our DL360 G5s and G6s, since day one, on all of them. SSH to ILO is
> perfectly fine.
I have had a similar experience a while back with some old Dell cards
(DRAC). Usual
On Wed, Jan 23, 2013 at 10:47:14AM -0800, Eric A Louie wrote:
> Only if you install it for me, Pierre! :-) (I'm not a sysadmin, I just play
> one on the Internet)
>
>
> Software prerequisite
> Netmagis needs the following software:(not the usual yada yada yada, to quote
> Google)
>
> Much a
I've had issues with HP, Dell, and Super micro in any higher amounts of
broadcast traffic, especially ARP requests. The iDRAC 5 and 6 behave very
badly in high broadcast environments, failing to respond to http and local
ipmi (ipmitool via the smbus or whatever) interface. That's probably where
I
29 matches
Mail list logo