We see this all the time with banking sites and some of the stock
trading ones
Todd
On 1/28/2014 5:06 AM, Jared Mauch wrote:
On Jan 26, 2014, at 12:47 PM, Jay Ashworth wrote:
something like 6 years ago, and couldn't get any traction on it then;
I'm not sure I think much has changed -- appar
On 1/28/2014 1:07 PM, Nick Olsen wrote:
While I see what you're saying. It's still not "Spoofed".
The device in question receives the request. And then generates a response
with the src address of the egress interface of the device dst to the IP
and port that requested it... In this case. The G
How about this - I have proposed to NIST we start filtering - realize
that the NIST ITS program itself was setup to run NTP in an open access
mode - we host a dozen or so of those systems and so we get hit all the
time.
The solution is actually not running timing services across UDP because
Or a whole bunch of small ones Vladis - and yes we are capable of
handling the loads.
:-)
Todd
On 2/3/2014 6:34 AM, valdis.kletni...@vt.edu wrote:
On Mon, 03 Feb 2014 06:14:30 -0800, TGLASSEY said:
My suggestion is that for those that need access we set up VLAN trunked
private networking
Raspberry Pi
---
This unfortunately doest give you trusted time. It gives you David's
Raspberry Pi with an Adafruit Ultimate GPS breakout board which is a
waste of time if you need an evidence grade of time service. It also
means you assemble it and run it yourself.
If you ne
Type Enforcement in the OS Kernel is the place to do that.
Todd
On 2/20/2014 2:12 PM, Damian Menscher wrote:
On Thu, Feb 20, 2014 at 1:03 PM, Jared Mauch wrote:
On Feb 20, 2014, at 3:51 PM, John Weekes wrote:
On 2/20/2014 12:41 PM, Edward Roels wrote:
Curious if anyone else thinks filter
I want to ask you folks something...
How do you as the people operating the network think two exabytes of
data gets pushed across your networks to each of the PRISM Collection
Sites (daily) with no one noticing... Know what I mean>?
Todd Glassey
On 3/21/2014 6:54 PM, Larry Sheldon wrote:
On
Yes Matthew it should. The question is whether they do or not.
Todd
On 4/14/2014 7:38 AM, Matthew Black wrote:
Shouldn't a decent OS scrub RAM and disk sectors before allocating them to
processes, unless that process enters processor privileged mode and sets a call
flag? I recall digging thro
Vladis is %100 on the money here. Lets take this a step farther and ask
is there a criminal liability for the person who checked that code in -
Oh you bet there is...
Todd
On 4/11/2014 5:49 PM, valdis.kletni...@vt.edu wrote:
On Sat, 12 Apr 2014 07:56:01 +1000, Matt Palmer said:
The interest
Wouldn't it make sense if we created a specific mail alias for
requesting DNS flushes? This seems to happen statistically often enough
it might be a valuable service to bundle under the NANOG umbrella.
Todd
On 4/16/2014 2:27 AM, Jaren Angerbauer wrote:
All,
Sending this out (to multiple list
BAE did this cute poster on the attack model
https://image-store.slidesharecdn.com/6f0027d2-c58c-11e3-af1f-12313d0148e5-original.jpeg?goback=%2Egde_1271127_member_5862330295302262788
On 4/16/2014 7:50 PM, Barry Shein wrote:
On April 17, 2014 at 10:03 g...@gdt.id.au (Glen Turner) wrote:
> Jas
Henning I understand your work is important - and that its open source
but that is part of the problem with global patent law today. No one
wants it around when their works are impacted by it. But patent
publications are binding under the treaties and in fact CARP clearly is
an infringement. Th
On 4/27/2014 9:57 AM, Rick Astley wrote:
I wish you would expand on that to help me understand where you are coming
from but what I pay my ISP for is simply a pipe, I don't know how it would
make sense logically to assume that every entity I communicate with on the
Internet must be able to conne
Bill - anything that puts another routable network alongside of the card
processing info is in scope. The real; issue is that the PCI-SSC decided
to formally create a policy to hold the auditors harmless in their
actions and that is about to change.
Todd
On 5/1/2014 8:52 AM, William Herrin w
The issue Jared is needing a consensus in a community where that may be
impossible to achieve because of differing agendas - so does that mean
that the protocol should not exist because the IETF would not grant it
credence? Interesting.
Todd
On 5/6/2014 6:51 PM, Jared Mauch wrote:
On May 6, 2
So I wanted to bring up we are making some changes in the NIST Server
addresses and creating two pools
they are:
east-pool.ustiming.org
west-pool.ustiming.org
Also there is a new VLAN which can provide you your own /24 of access
space for the NIST infrastructure anywhere in th
On 1/9/2013 9:12 AM, Leo Bicknell wrote:
I think this list goes too far, and has a decent chance of introducing
other fun failure modes as a result. The goal of OOB is generally
to gain control of a "misbehaving" device. Now, misbehaving can
take many forms, from the device actually being ok an
If there is anyone from Google Networking here on the list can you
contact me offlist please. I want to talk about 60 Hudson.
Todd Glassey
--
Regards TSG
"Ex-Cruce-Leo"
//Confidential Mailing - Please destroy this if you are not the intended
recipient.
I am looking for a contact at Cogent's route management team if you have
one?
Todd
--
Regards TSG
"Ex-Cruce-Leo"
//Confidential Mailing - Please destroy this if you are not the intended
recipient.
Arnd - the German Government is most likely a partner meaning
overloading the NSA is pointless if you could.
Todd
On 1/5/2014 1:15 AM, Arnd Vehling wrote:
Hi,
On 04.01.2014 21:07, Daniƫl W. Crompton wrote:
To my surprise I am seeing a theme fatalistic acceptance in this thread,
thats not r
This has been going on off and on for a while.
Todd
On 1/23/2014 7:41 AM, Adam Greene wrote:
We noticed some issues to Google & Level3 DNS last night:
8.8.8.8
8.8.4.4
4.2.2.2
1/23/1400:55:17 - 00:55:47 (UTC-5)
1/23/1401:09:32 - 01:11:03 (UTC-5)
Have not yet de
21 matches
Mail list logo