somebody impersonating/spinning
up a rogue AS8100, theoretical control over a massive amount
of prefixes, as these can be advertised without restrictions
and very likely reach a fairly high percentage of global
visibility.
--
Florian Brandstetter
President & Founder
SquareFlow Network LTD.
ce of ascendence caused by AS-SBAG
is negligible, as it appears, the entirity of
Quadranet and affiliates is affected.
Regards,
Florian Brandstetter
On Sat, 2020-01-25 at 01:02 +, Martijn Schmidt
wrote:
> Hi Florian, NANOG,
>
> While the symptom of (automatically) proxy
> registered
inevitably still transpire in
the global tables. An impression
emerges that commitment in resolving this incident lacks, apart from the guys
over at NTT which,
from what I gathered, suspended their IRR account temporarily to prevent
further damage.
—
Cheers,
Florian Brandstetter
On 27. Jan
Nope, lack of `allowas-in` on their edges.
--
Greetings,
Florian Brandstetter
Chief Executive Officer
SquareFlow Technologies
www.squareflow.net
Confidential: Please be advised that the information contained in this
email message, including all attached documents or files, is privileged
and
Load balancing is done on Layer 4 or Layer 3 when routing, so your ingress
connection will have the same hash as the outgoing connection (unless the
source port of the connection changes on the ACK - which it really should not).
On Mon, 08/19/2019 06:18 PM, Töma Gavrichenkov wrote:
>
On Mon
Might be worth to consider running a software router on that scale with perhaps
some cheap quad-port GbE PCIe NICs. BIRD would be the BGP daemon to go, or
FRRouting if you want an integrated shell. Hardware routers for 100 Mbit egress
seem a bit overpowered, however, as scaleable you want to go,
Ubiquiti's EdgeRouter Lite is equipped with 512 MiB of DDR2 memory, of which
after startup, roughly 491 MiB can be utilized. 119 MiB of the remaining memory
are allocated by the base of the router already, which leaves you with a
remainder of 372 MiB memory. Memory usage depends on the architect
Unable to replicate this in London:
```
; <<>> DiG 9.11.5-P1-1ubuntu2.5-Ubuntu <<>> @ns1.google.com. www.google.com.
; (2 servers found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 61970
;; flags: qr aa rd; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADD
Hello Ronald,
if you'd open the traceroute you just sent you'd see that the target is route
looping and not actually used by their alleged customer? Since the loop is
actually between the FDC aggregation router and Cogent's backbone router. Also,
what would the target IP have been in this case,
Where are you based? I can check if this can be replicated in our backbone, in
case we have a PoP close.
On Sep. 6 2019, at 11:17 pm, Nick Hilliard wrote:
> Nick Hilliard wrote on 06/09/2019 21:19:
> > Chip Marshall via NANOG wrote on 06/09/2019 20:11:
> > > Hello, I'm seeing an oddity when doin
Hello Ronald,
I don’t particularly side with any party here, but as already made clear
indirectly by my passive aggressive tone on your trace route (which was nothing
but a route loop in cogent’s network), I do certainly disagree with the way you
treat Mr. Cohen. This comes due to the nature th
he way of communication
that happens at this stage.
> On 19.09.2019, at 13:03, Ronald F. Guilmette wrote:
>
> In message <8a49bf73-7a68-4b8f-9dc5-e94b7fe63...@globalone.io>,
> Florian Brandstetter wrote:
>
>> ... this is certainly not a place where you can
>> slander his
Hi,
sorry - but why would you want to block Teredo / 6to4?
Florian Brandstetter
President & Founder
W // https://www.globalone.io
(https://link.getmailspring.com/link/5edc7c51-257c-47ac-b303-4b5a7f6e9...@getmailspring.com/0?redirect=https%3A%2F%2Fwww.globalone.io&recipient=bmFub2dAbmFu
Hello,
you're forgetting if that was to be amplification, the source addresses would
not be within Google or CloudFlare ranges (especially not CloudFlare, as they
are not running a vulnerable recursor, and merely authoritative nameservers),
the only possibility would be Google as in Google Clou
14 matches
Mail list logo