Hi,
On Thu, 2008-09-25 at 09:25 +0200, Colin Alston wrote:
> Noel Butler wrote:
> > Some of you may recall back in late 2006 we ran an international poll on
> > MTA's, where over a period of several months and 12 and half thousands
> > voters later, Sendmail was declared king, followed by Qmail, t
Hi,
Anyone involved in Cox's DNS resolver engineering and maintainance: can
you contact me off list to resolve some problems?
Thanks!
William
Hi,
ASPEWS is listing 216.83.32.0/20 as being associated with the whole
Atrivo incident of 2008. My memory does not recall 216.83.32.0/20 being
involved, nor the provider that belongs to.
So it'd be cool if I could you know, talk to someone who has involvement
with that, because frankly, I do no
On Fri, 2009-12-11 at 09:55 -0800, Alex Lanstein wrote:
> >>>Also, the fact that Atrivo is *dead* and this
> >>>stuff is still listed means that anyone who gets
> >>>those blocks from ARIN next are basically screwed
>
> Why would you say Atrivo is dead?
>
> r...@localhost --- {~} nslookup www.go
On Fri, 2009-12-11 at 17:25 -0800, Alex Lanstein wrote:
> William Pitcock wrote:
> >>>Cernal and Atrivo are two different entities, Atrivo used to host
> >>>Cernal, but now they have different hosting arrangements.
>
> I now understand the original point you wer
On Fri, 2009-12-11 at 23:39 +, John Levine wrote:
> >ASPEWS is listing 216.83.32.0/20 as being associated with the whole
> >Atrivo incident of 2008. My memory does not recall 216.83.32.0/20 being
> >involved, nor the provider that belongs to.
>
> Since nobody but the occasional highly vocal G
Hi,
On Sat, 2009-12-12 at 18:02 +0100, Michelle Sullivan wrote:
> Michelle Sullivan wrote:
> > Seth Mattinen wrote:
> >>
> >> You should still be able to submit a ticket to SORBS, no? I was
> >> always under the impression that it was "open a ticket and wait or
> >> you are moved to the back of
On Mon, 2009-12-14 at 11:32 +0100, Michelle Sullivan wrote:
> Read the last paragraph again.. "will be submitted for delisting" .. not
> "has been delisted and it will take 3-5 hours to propagate"... I have to
> process all removals manually after the robot because the robot does get
> it wrong,
Hi,
Does anyone know of a webservice that converts a given IP into the
public CIDR range that belongs to? I am developing a tool where IP to
CIDR conversion based on RIR whois data would be useful for implementing
filtersets.
William
Hi,
On Mon, 2009-12-14 at 21:10 -0800, Mehmet Akcin wrote:
> Current RIR whois actually does that.
>
> ie: search for 199.4.29
> it will show you 199.4.28/22
Yes, but it has to be parsed, and RIRs have varying whois formats. ARIN
vs RIPE whois output, for example.
William
Hi,
On Mon, 2009-12-14 at 21:12 -0800, Paul Ferguson wrote:
> On Mon, Dec 14, 2009 at 8:57 PM, William Pitcock
> wrote:
>
> > Hi,
> >
> > Does anyone know of a webservice that converts a given IP into the
> > public CIDR range that belongs to? I am devel
Hi,
On Thu, 2009-12-10 at 16:55 +, Sven Olaf Kamphuis wrote:
> thing is that it's illegal to maintain a database with "personal details"
> which ip addresses according to various german courts are (don't ask..
> mmk? ;) ofcourse we all know ip addresses identify nodes on a network, not
> perso
On Wed, 2009-12-30 at 20:12 -0800, Paul Ferguson wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> On Wed, Dec 30, 2009 at 8:05 PM, Keith Medcalf wrote:
>
> >
> > Without a warrant, there is an absolute right to privacy.
> > It continues to exist right up until either (a) one party ch
On Wed, 2009-12-30 at 23:25 -0500, Christopher Morrow wrote:
> On Wed, Dec 30, 2009 at 11:13 PM, William Pitcock
> wrote:
>
> > It "worked" against Indymedia UK: http://www.indymedia.org/fbi/
>
> indymedia is in texas, no mlat required.
It was an MLAT initiated
On Tue, 2010-01-05 at 16:24 -0500, Robert Brockway wrote:
> On Tue, 5 Jan 2010, Dobbins, Roland wrote:
>
> > In the most basic terms, a stateful firewall performs bidirectional
> > classification of communications between nodes, and makes a pass/fail
> > determination on each packet based on a)
On Wed, 2010-01-06 at 01:47 -0600, James Hess wrote:
> On Tue, Jan 5, 2010 at 11:41 PM, Dobbins, Roland wrote:
> > On Jan 6, 2010, at 11:52 AM, Jonathan Lassoff wrote:
> > DDoS attacks are attacks against capacity and/or state. Start reducing
>
> DDoS, by its very nature is a type of attack tha
On Thu, 2010-01-07 at 11:30 -0600, Brian Johnson wrote:
> Has anyone noticed that accessing http://www.he.net or
> http://ipv6.he.net is either slow or inaccessible?
>
> Please let me know if you have a different experience currently.
It is up here.
> CONFIDENTIALITY NOTICE: This email message,
On Fri, 2010-01-22 at 22:16 -0500, Steven Bellovin wrote:
> On Jan 22, 2010, at 12:26 AM, Bruce Williams wrote:
>
> > The problem with IE is the same problem as Windows, the basic design
> > is fundementally insecure and "timely updates" can't fix that.
>
> You do realize, of course, that IE is r
Hi,
On Tue, 2010-01-26 at 09:56 -0800, Gerald Wluka wrote:
>
> I am new to this mailing list - this should be a response to an already
> started thread that I cannot see:
>
Welcome to NANOG!
>
>
> IntelliguardIT has a new class of network appliance that installs inline
> (layer 2 appliance)
On Wed, 2010-02-10 at 17:12 -0700, Blake Pfankuch wrote:
> Anyone have some insight on a good dual stack Linux (or BSD) router distro?
> Currently using IPCop but it lacks ipv6 support. I've used SmoothWall
> Express but not in some time and not sure how well it works with IPv6. Not
> looking
Hi,
On Thu, 2010-02-11 at 13:05 -0500, Jack Carrozzo wrote:
> Lots of people roll FreeBSD with Quagga/pf/ipfw for dual stack. See
> the freebsd-isp list.
FreeBSD's network stack chokes up in DDoS attacks due to interrupt
flooding. We used to use FreeBSD for firewalling and basic routing, but
whe
On Mon, 2010-02-22 at 16:21 +0200, Gadi Evron wrote:
> Last week Czech researchers released information on a new worm which
> exploits CPE devices (broadband routers) by means such as default
> passwords, constructing a large DDoS botnet. Today this story hit
> international news.
>
What makes
On Fri, 2010-02-26 at 11:29 -0700, Brielle Bruns wrote:
> Isn't the timestamps inserted by syslog rather then the reporting
> program itself?
The syslog message sent to the local unix socket (/dev/log
or /dev/syslog) may contain a timestamp, in which case, that timestamp
may be used instead of th
On Fri, 2010-02-26 at 19:30 +, gordon b slater wrote:
> On Fri, 2010-02-26 at 13:17 -0600, William Pitcock wrote:
> > The syslog message sent to the local unix socket (/dev/log
> > or /dev/syslog) may contain a timestamp, in which case, that timestamp
> > may be used inst
On Thu, 2010-03-11 at 22:52 -0800, Nathan wrote:
> Hello,
>
> I'm hoping to alleviate the "what's going on!?" type messages here this time.
> :)
>
Any IPs we can ping and get a response back from to verify everything is
ok? 1.2.3.4 isn't pingable, for example. :(
William
On Tue, 2010-03-16 at 07:53 +, gordon b slater wrote:
> Hmm, the "hey! it's open source!" factor doesn't hold much sway in the
> network world, no-one will be amazed at that. Many observers are
> surprised at the amount of free software employed by ISPs and the
> like, but it's certainly no new
Hello,
Few people actually care about nsp-sec so what exactly are you getting at?
"Guillaume FORTAINE" wrote:
>Misses, Misters,
>
>I would want to inform you that the security of the Internet, that is
>discussed in the NSP-SEC mailing-list [0] by a selected group of vendors
>(Cisco, Juniper &
On Thu, 2010-03-18 at 23:52 -0400, Patrick W. Gilmore wrote:
> On Mar 18, 2010, at 11:46 PM, William Pitcock wrote:
>
> > Few people actually care about nsp-sec so what exactly are you getting at?
>
> I might argue the "few" comment, but I think it's better not t
On Fri, 2010-03-19 at 08:31 -0500, John Kristoff wrote:
> An ongoing area of work is to build better closed,
> trusted communities without leaks.
Have you ever considered that public transparency might not be a bad
thing? This seems to be the plight of many security people, that they
have to be
On Sat, 2010-03-20 at 20:30 +0200, Hank Nussbacher wrote:
> On Fri, 19 Mar 2010, William Pitcock wrote:
>
> > On Fri, 2010-03-19 at 08:31 -0500, John Kristoff wrote:
> >> An ongoing area of work is to build better closed,
> >> trusted communities without leaks.
&g
On Sat, 2010-03-20 at 22:12 +0200, Gadi Evron wrote:
> On 3/20/10 8:37 PM, William Pitcock wrote:
> > That is not what I mean and you know it.
>
> What do you mean than? Hank made a good point on the type of traffic
> normally going through these groups.
My point hasn't
On Fri, 4 Feb 2011 16:37:55 +1300 (FJST)
Franck Martin wrote:
> Any relation?
>
> http://mobile.slashdot.org/story/11/02/04/0043234/Verizon-To-Throttle-High-Bandwidth-Users
No, that has to do with wireless users, not DSL. Wireless is an
entirely different part of the Verizon empire.
William
Hi,
On Sat, 5 Feb 2011 17:12:40 -0600
"Aaron Wendel" wrote:
> How can someone steal something from you that you don’t own?
>
>
Legacy space. The best example I can think of was Choopa's hijacking
of Erie Forge and Steel's legacy space. In this case, it was theft as
it was a legacy allocatio
Hi,
Could an nLayer network engineer contact me offlist regarding a service
or core router at I'm guessing One Wilshire that is having serious
problems?
Thanks.
William
Hi,
On Mon, 21 Feb 2011 12:41:57 -0800
Kate Gerry wrote:
> We've been advised by a client that they're incorrectly listing
> a /15. The listing is:
>
> (E-431420) 96.44.0.0/15
>
> According to their FAQ they only take delistings via newsgroups and
> Google News isn't co-operating with me in re
Hi,
On Tue, 1 Mar 2011 09:25:23 + (GMT)
Tim Franklin wrote:
> > I do not live over there, I have never seen a Vonage or Magic jack
> > or any other VoIP service ad on TV in the UK, ever.
>
> Vonage *are* advertising on UK TV. Hardly the carpet-bombing the OP
> suggests is the case in the
On Thu, 03 Mar 2011 09:03:18 -0500
Leon Kaiser wrote:
> This is the man who poisoned DroneBL. He is a bad man. Keep your
> children safe.
> http://raged.tittybang.org/
How, exactly, has kunwon1 poisoned DroneBL when he has had no RPC key
for over a year?
William
On Thu, 03 Mar 2011 15:34:11 +0100
Alfa Telecom wrote:
> On 03/03/2011 03:25 PM, Brandon Ross wrote:
> > On Thu, 3 Mar 2011, Alfa Telecom wrote:
> >
> >> Both ranges are from RIPE region and couldn't be announced from
> >> ARIN ASN at all.
> >
> > Your premise is incorrect. Any block from any RI
On Sun, 13 Mar 2011 05:39:02 -0700 (PDT)
goe...@anime.net wrote:
> On Sun, 13 Mar 2011, Alexander Maassen wrote:
> > Why o why are isp's and hosters so ignorant in dealing with such
> > issues and act like they do not care?
>
> they don't act like they do not care. they really *don't* care. no
>
On Mon, 28 Mar 2011 15:18:30 -0700
Wil Schultz wrote:
> I'm attempting to find out information on the SEO implications of
> testing ipv6 out.
>
> A couple of concerns that come to mind are:
>
> 1) www.domain.com and ipv6.domain.com are serving the exact same
> content. Typical SEO standards are
On Thu, 14 Apr 2011 15:02:36 -0700
Dan Dill wrote:
> http://www.pcbgov.com/city_directory.htm
>
> Seems like it wouldn't be hard to track down that information...
Can you identify where on that page it lists a contact for the IT
department of the Panama City government?
I can't, because it doe
On Mon, 9 May 2011 17:14:06 -0400
Lamar Owen wrote:
> On Monday, May 09, 2011 04:45:36 PM Kevin Oberman wrote:
> > Depends on what he is doing. BSDs tend to be far more mature than
> > any Linux. They are poor systems for desktops or anything like
> > that. They are heavily used as servers by man
On Tue, 10 May 2011 10:12:57 -0400
"Thomas York" wrote:
> At my current place of business, we have several manufacturing plants
> in China as well as the United States. All of the plants have an OVPN
> tunnel to a datacenter here in Indianapolis which connect all of the
> plants. Our China plants
On Tue, 10 May 2011 10:22:03 -0400
Christopher Morrow wrote:
> On Tue, May 10, 2011 at 10:15 AM, Scott Brim
> wrote:
> > On Tue, May 10, 2011 at 09:42, Leigh Porter
> > wrote:
> >> So are they basing this on you downloading it or on making it
> >> available for others?
> >
> > Without knowing t
On Wed, 18 May 2011 13:07:32 -0700
Landon Stewart wrote:
> Lets say you had a file that was 1,000,000,000 characters consisting
> of 8,000,000,000bits. What if instead of transferring that file
> through the interwebs you transmitted a mathematical equation to tell
> a computer on the other end
101 - 145 of 145 matches
Mail list logo