Re: [c-nsp] Cisco ScanSafe, aka Cisco Cloud Web Security

2013-12-06 Thread Eugeniu Patrascu
Helllo Pui, Thanks for the pointers but I think you misunderstood my question. I know how to set up a captive portal for WiFi access. What I wanted to know is how are users logging into captive portals when the browser has a proxy set and it tries to send all requests to the proxy server which un

Re: list scraping by QualiSystems

2013-12-06 Thread Scott Weeks
On 12/5/2013 2:52 PM, Scott Weeks wrote: > :: QualiSystems team met you during the 2011 Nanog > :: Conference in Denver. > > No you didn't. --- i...@kjro.se wrote: From: Kelly John Rose You didn't quite play this one right. You need to see if you can use them to get a ticket to the next conf

Caps (was Re: AT&T UVERSE Native IPv6, a HOWTO)

2013-12-06 Thread Mark Radabaugh
On 12/5/13 7:35 PM, Phil Karn wrote: On 12/05/2013 02:00 PM, Owen DeLong wrote: If AT&T has capped me, then, I haven’t managed to hit the cap as yet. Admittedly, the connection isn’t always as reliable as $CABLECO, but when it works, it tends to work at full speed and it does work the vast majo

Someone’s Been Siphoning Data Through a Huge Security Hole in the Internet

2013-12-06 Thread Eugen Leitl
http://www.wired.com/threatlevel/2013/12/bgp-hijacking-belarus-iceland/ Someone’s Been Siphoning Data Through a Huge Security Hole in the Internet BY KIM ZETTER12.05.136:30 AM Hijacked traffic went all the way to Iceland, where it may have been copied before being released to its intended desti

Re: Someone’s Been Siphoning Data Through a Huge Security Hole in the Internet

2013-12-06 Thread Jared Mauch
On Dec 6, 2013, at 12:38 PM, Eugen Leitl wrote: > > http://www.wired.com/threatlevel/2013/12/bgp-hijacking-belarus-iceland/ > > Someone’s Been Siphoning Data Through a Huge Security Hole in the Internet > ... > In 2008, two security researchers at the DefCon hacker conference > demonstrated a

Re: list scraping by QualiSystems

2013-12-06 Thread Warren Bailey
I will accept all Schwag that does not involve consuming food (cups etc) or clothing. I still randomly get amazon gift cards, but I suspect they are catching on to the fact that their money is being spent on toys for a 4 year old "engineer" (my daughter). I'm happy to accept free money.. I just

Weekly Routing Table Report

2013-12-06 Thread Routing Analysis Role Account
This is an automated weekly mailing describing the state of the Internet Routing Table as seen from APNIC's router in Japan. The posting is sent to APOPS, NANOG, AfNOG, AusNOG, SANOG, PacNOG, LacNOG, TRNOG, CaribNOG and the RIPE Routing Working Group. Daily listings are sent to bgp-st...@lists.ap

Re: Someone’s Been Siphoning Data Through a Huge Security Hole in the Internet

2013-12-06 Thread Brandon Galbraith
If your flows are a target, or your data is of an extremely sensitive nature (diplomatic, etc), why aren't you moving those bits over something more private than IP (point to point L2, MPLS)? This doesn't work for the VoIP target mentioned, but foreign ministries should most definitely not be trust

Re: Someone¹s Been Siphoning Data Through a Huge Security Hole in the Internet

2013-12-06 Thread Warren Bailey
That didn¹t seem to work for google.. ;) On 12/6/13, 9:39 AM, "Brandon Galbraith" wrote: >If your flows are a target, or your data is of an extremely sensitive >nature (diplomatic, etc), why aren't you moving those bits over >something more private than IP (point to point L2, MPLS)? This doesn't

Re: Someone¹s Been Siphoning Data Through a Huge Security Hole in the Internet

2013-12-06 Thread Brandon Galbraith
An attacker who can "only" attack BGP is different than someone who can splice into your undersea cables undetected. Prepare for the worst appears to be the best SOP now. On Fri, Dec 6, 2013 at 12:44 PM, Warren Bailey wrote: > That didn¹t seem to work for google.. ;) > > On 12/6/13, 9:39 AM, "Bra

Re: AT&T UVERSE Native IPv6, a HOWTO

2013-12-06 Thread Owen DeLong
On Dec 5, 2013, at 16:35 , Phil Karn wrote: > On 12/05/2013 02:00 PM, Owen DeLong wrote: > >> If AT&T has capped me, then, I haven’t managed to hit the cap as yet. >> Admittedly, the connection isn’t always as reliable as $CABLECO, but >> when it works, it tends to work at full speed and it doe

Re: Someone’s Been Siphoning Data Through a Huge Security Hole in the Internet

2013-12-06 Thread Paul Ferguson
...but you've got to love the headlines it creates. :-) http://news.techeye.net/business/black-hole-found-in-the-internet - ferg On 12/6/2013 10:05 AM, Jared Mauch wrote: On Dec 6, 2013, at 12:38 PM, Eugen Leitl wrote: http://www.wired.com/threatlevel/2013/12/bgp-hijacking-belarus-icelan

Re: Someone’s Been Siphoning Data Through a Huge Security Hole in the Internet

2013-12-06 Thread Jared Mauch
On Dec 6, 2013, at 1:39 PM, Brandon Galbraith wrote: > If your flows are a target, or your data is of an extremely sensitive > nature (diplomatic, etc), why aren't you moving those bits over > something more private than IP (point to point L2, MPLS)? This doesn't > work for the VoIP target ment

Re: Someone’s Been Siphoning Data Through a Huge Security Hole in the Internet

2013-12-06 Thread Christopher Morrow
On Fri, Dec 6, 2013 at 2:48 PM, Jared Mauch wrote: > > On Dec 6, 2013, at 1:39 PM, Brandon Galbraith > wrote: > >> If your flows are a target, or your data is of an extremely sensitive >> nature (diplomatic, etc), why aren't you moving those bits over >> something more private than IP (point to

Re: Someone’s Been Siphoning Data Through a Huge Security Hole in the Internet

2013-12-06 Thread deleskie

Re: Someone’s Been Siphoning Data Through a Huge Security Hole in the Internet

2013-12-06 Thread Eugeniu Patrascu
On Fri, Dec 6, 2013 at 9:48 PM, Jared Mauch wrote: > > On Dec 6, 2013, at 1:39 PM, Brandon Galbraith > wrote: > > > If your flows are a target, or your data is of an extremely sensitive > > nature (diplomatic, etc), why aren't you moving those bits over > > something more private than IP (point

Re: Someone’s Been Siphoning Data Through a Huge Security Hole in the Internet

2013-12-06 Thread Stephane Bortzmeyer
On Fri, Dec 06, 2013 at 06:38:31PM +0100, Eugen Leitl wrote a message of 357 lines which said: > http://www.wired.com/threatlevel/2013/12/bgp-hijacking-belarus-iceland/ Except the remarks from Kapela, it has very little content above what was in the Renesys paper, discussed here two weeks ago

Re: Someone’s Been Siphoning Data Through a Huge Security Hole in the Internet

2013-12-06 Thread Stephane Bortzmeyer
On Fri, Dec 06, 2013 at 01:05:54PM -0500, Jared Mauch wrote a message of 36 lines which said: > I've detected 11.6 million of these events since 2008 just looking at the > route-views data. Most recently the past two days 701 has done a large MITM > of > traffic. The big novelty in the Rene

Re: Someone¹s Been Siphoning Data Through a Huge Security Hole in the Internet

2013-12-06 Thread Scott Weeks
--- brandon.galbra...@gmail.com wrote: From: Brandon Galbraith someone who can splice into your undersea cables undetected. - Or detected and others framed? SE-WE-ME-4, FLAG, EASSy, SEACOM, etc... {;-) The above is a tin foil hat smiley

Re: Someone’s Been Siphoning Data Through a Huge Security Hole in the Internet

2013-12-06 Thread Stephane Bortzmeyer
On Fri, Dec 06, 2013 at 12:39:16PM -0600, Brandon Galbraith wrote a message of 43 lines which said: > If your flows are a target, or your data is of an extremely > sensitive nature (diplomatic, etc), why aren't you moving those bits > over something more private than IP (point to point L2, An

ICANN related question...

2013-12-06 Thread Eric Tykwinski
We have a customer that purchased a domain through a reseller of register.com. The Whois records only point to the actual company and the originating accredited registrar: register.com. Does anyone know of any hints to find out who the reseller is? Apparently Register.com can't supply us with tha

Re: ICANN related question...

2013-12-06 Thread ebw
why bother getting rcom to grovel through the records they should have kept (it happens to reseller model registrars, occasionally i'm asked if i can help a core registrant find their member (reseller)), just do a transfer request to another registrar (i'm not volunteering) and get the registrar-of

The Cidr Report

2013-12-06 Thread cidr-report
This report has been generated at Fri Dec 6 21:13:57 2013 AEST. The report analyses the BGP Routing Table of AS2.0 router and generates a report on aggregation potential within the table. Check http://www.cidr-report.org for a current version of this report. Recent Table History Date

BGP Update Report

2013-12-06 Thread cidr-report
BGP Update Report Interval: 28-Nov-13 -to- 05-Dec-13 (7 days) Observation Point: BGP Peering with AS131072 TOP 20 Unstable Origin AS Rank ASNUpds % Upds/PfxAS-Name 1 - AS754561106 2.5% 112.1 -- TPG-INTERNET-AP TPG Telecom Limited 2 - AS84025

Re: ICANN related question...

2013-12-06 Thread Robert L Mathews
On 12/6/13, 1:14 PM, e...@abenaki.wabanaki.net wrote: > why bother getting rcom to grovel through the records they should have > kept (it happens to reseller model registrars, occasionally i'm asked > if i can help a core registrant find their member (reseller)), just do > a transfer request to ano

Re: Caps (was Re: AT&T UVERSE Native IPv6, a HOWTO)

2013-12-06 Thread Michael Thomas
On 12/06/2013 05:54 AM, Mark Radabaugh wrote: I realize most of the NANOG operators are not running end user networks anymore. Real consumption data: Monthly_GBCountPercent <100GB 3658 90% 100-149 368 10% 150-199 173 4.7% 200-249 97 2

Re: Caps (was Re: AT&T UVERSE Native IPv6, a HOWTO)

2013-12-06 Thread cb.list6
On Dec 6, 2013 5:16 PM, "Michael Thomas" wrote: > > On 12/06/2013 05:54 AM, Mark Radabaugh wrote: >> >> >> I realize most of the NANOG operators are not running end user networks anymore. Real consumption data: >> >> Monthly_GBCountPercent >> <100GB 3658 90% >> 100-149

Re: Caps (was Re: AT&T UVERSE Native IPv6, a HOWTO)

2013-12-06 Thread Mark Radabaugh
On 12/6/13 8:14 PM, Michael Thomas wrote: Thanks for the stats, real life is always refreshing :) It seems to me -- all things being equal -- that the real question is whether Mr. Hog is impacting your other users. If he's not, then what difference does it make if he consumes the bits, or if

Re: ICANN related question...

2013-12-06 Thread Jimmy Hess
On Fri, Dec 6, 2013 at 4:34 PM, Robert L Mathews wrote: > > now you know the (gaining) r-of-r, and the (gaining) reseller (if any), > > and you're free to do whatever else you want. > ICANN is one potential recourse against the registrar, if non-cooperative with the registrant; another one is th