On Saturday, 23 February, 2019 10:03, Stephane Bortzmeyer wrote:
>Very good article, very detailed, with a lot of technical precisions,
>about the recent domain name hijackings (not using the DNS, just good
>old hijackings at registrar or hoster).
>https://krebsonsecurity.com/2019/02/a-deep-dive-
cted.
>
>ICANN seems to think that is the case: ICANN Calls for Full DNSSEC
>Deployment
>https://www.icann.org/news/announcement-2019-02-22-en
>
>Of course, DNSSEC is often blamed for not protecting those who did
>not deploy/use it. Not sure what can be said about that line of
&
>https://twofactorauth.org/#domains gives a good view of the domain
>management landscape regarding 2FA.
Seems to require the unfettered execution of third-party code ...
Are you offering an indemnity in case that code is malicious? What are the
terms and the amount of the indemnity?
---
The
sday, 26 February, 2019 09:36
>To: nanog@nanog.org
>Subject: Re: 2FA, was A Deep Dive on the Recent Widespread DNS
>Hijacking
>
>On 2/25/19 9:59 PM, Keith Medcalf wrote:
>> Are you offering an indemnity in case that code is malicious? What
>are the terms and the amount
On Tuesday, 12 March, 2019 15:51, valdis.kletni...@vt.edu wrote:
>Would you be super pissed if you died for real because Overwatch
>suppressed a tornado or other severe weather alert relevant to
>your location? Serious question here.
Seeing as you are dead, I doubt that you could be super pis
On Sunday, 26 February, 2017 19:16 Matt Palmer said:
> On Sun, Feb 26, 2017 at 05:41:47PM -0600, Brett Frankenberger wrote:
> > On Sun, Feb 26, 2017 at 12:18:48PM -0500, Patrick W. Gilmore wrote:
> > > I repeat something I've said a couple times in this thread: If I can
> > > somehow create two
until the address is relinquished
by the user (i.e., when the user moves the device off the Verizon Wireless
network).
•
IPv4-only devices are not compatible with Persistent Prefix IPv6 addresses.
---
Keith Stokes
The purpose of SPF is to REJECT messages before the data phase. This cannot be
done if you are checking the RFC-822 From: header since that requires accepting
the message and invalidates the entire purpose of SPF.
I have never seen an SPF implementation that uses the RFC-822 header From.
Doi
The SMBv1 issue was disclosed a year or two ago and never patched.
Anyone who was paying attention would already have disabled SMBv1.
Thus is the danger and utter stupidity of "overloading" the function of service
listeners with unassociated road-apples. Wait until the bad guys figure out
that
Nathan Brookfield [mailto:nathan.brookfi...@simtronic.com.au]
> Sent: Friday, 12 May, 2017 22:48
> To: Keith Medcalf
> Cc: nanog@nanog.org
> Subject: Re: Please run windows update now
>
> Well it was patched by Microsoft of March 14th, just clearly people
> running large amounts
oɯ ɹnoʎ 'sıɥʇ pɐǝɹ uɐɔ noʎ ɟı
> -Original Message-
> From: Joe [mailto:jbfixu...@gmail.com]
> Sent: Friday, 12 May, 2017 23:08
> To: Keith Medcalf
> Cc: nanog@nanog.org
> Subject: Re: Please run windows update now
>
> One word. Linux.
>
> After this w
I do not see any links to actually download the actual patches. Just a bunch
of text drivel.
--
˙uʍop-ǝpısdn sı ɹoʇıuoɯ ɹnoʎ 'sıɥʇ pɐǝɹ uɐɔ noʎ ɟı
> -Original Message-
> From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of
> timrutherf...@c4.net
> Sent: Monday, 15 May, 2017 09:23
https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/
Look near the bottom under Further Resources.
On May 15, 2017, at 10:44 AM, Keith Medcalf
mailto:kmedc...@dessus.com>> wrote:
I do not see any links to actually download the actual patches.
> What would be more of an interesting discussion, to me, would be why
> doesn't Microsoft know about these hoarding of vulnerabilities by State
> actors and plug them up?
Some state actors they do know. They custom write the security flaws on the
state actors request.
> Are they really that c
On Tuesday, 16 May, 2017 18:13, Valdis Kletnieks wrote:
> On Tue, 16 May 2017 16:41:36 -0600, "Keith Medcalf" said:
>> Of course Microsoft knew, since they wrote in the backdoor in the first
>> place. That is why when informed by their employers that the backdoor
>&
> > This sounds something like the MEF Third Network type stuff I mean
> > the ability to setup connection dynamically across network boundaries
> > on-the-fly, via an ordering system... that has always sounded awesome
> > to me... and I've wondered how we could actually get there one day.
> t
> >> to me, this was the dream of optical switching and gmpls (which is
> >> not mpls)
> > And, pray tell, what is the use of me setting up "peering" between
> > myself and a network on the other side of the world when the data
> > still has to flow over the same connections, merely encapsulated
>
Microsoft has released "critical patches" for "recently disclosed
vulnerabilities which may be used for imminent attacks". Main page is here:
https://technet.microsoft.com/en-us/library/security/4025685.aspx
and that has links to the appropriate articles and places where you can
actually down
How else would one maintain government control over free encryption
certificates?
--
˙uʍop-ǝpısdn sı ɹoʇıuoɯ ɹnoʎ 'sıɥʇ pɐǝɹ uɐɔ noʎ ɟı
> -Original Message-
> From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of Randy Bush
> Sent: Tuesday, 20 June, 2017 17:34
> To: Edwin Pers
> Cc:
d test how well the
EAS works during extreme telecommunications damage.
>From my brief time as a radio station tech, all you need for EAS to function
>properly is power to the receiver/decoder and for the station's transmitter to
>be alive
---
Keith Stokes
I have equipment in. I have equipment in several others from
different companies and most are probably 15-20 degrees cooler.
Thanks,
David
---
Keith Stokes
If you are using hot/cold aisles and don't fill the rack, don't forget you have
to put in blank panels.
--
Keith Stokes
> On Oct 12, 2017, at 5:45 PM, William Herrin wrote:
>
> On Wed, Oct 11, 2017 at 8:31 AM, David Hubbard <
> dhubb...@dino.hostasaurus.com> wr
> ... smart speakers ...
Do not we need to find intelligent life on earth before we can find "Smart
Speakers"?
Looks OK on my old 12" 240i interlace CRT. However, it is not High Definition.
Like everything on the Roku it is CATRS (Compressed All To Rat Shit) and
motion decimated and unsuitable for display on anything bigger/more modern than
a 12 240i CRT circa 1980 or so, and certainly completely unwa
In which case neither will they be RFC compliant.
(1) The "inaddr-arpa" ptr from the incoming connection, when resolved, MUST
result in a set of IP Addresses which includes the original IP Address.
(2) The "name" specified in the HELO/EHLO MUST resolve to an MTA that meets the
above reverse/fo
Not old enough to have had an Executive Secretary processing your incoming
snail-mail before it gets to you?
The "envelope" in which a letter arrived is just as important as the letter
itself and contains valuable information that is duplicated in e-mail -- the
postmark (received headers), the
On Thursday, 30 November, 2017 10:55, Bjørn Mork , wrote:
>Steve Atkins writes:
>>> On Nov 30, 2017, at 1:22 AM, Bjørn Mork wrote:
>>> "John Levine" writes:
>> It tells you something about the competence of the operator and
>> whether the host is intended by the owners to send email.
>No.
On Monday, 4 December, 2017 04:20, Edwin Pers wrote:
>As an anecdotal aside, approx. 70% of incoming portscanners/rdp
>bots/ssh bots/etc that hit the firewalls at my sites are coming from
>AWS.
>I used to send abuse emails but eventually gave up after receiving
>nothing beyond "well, aws ip's ar
On Wednesday, 6 December, 2017 03:53, Rich Kulawiec wrote:
>On Tue, Dec 05, 2017 at 09:54:21AM -0700, Grant Taylor via NANOG
>wrote:
>> If you are trying, make an honest mistake, and are willing to
>> correct it when others politely let you know, you will quite
>> likely find people willing to h
And thank god for that. Since Microsoft stopped diddle-farting with Windows 98
is was never infested with the UDP "Execute Payload with NT AUTHORITY\SYSTEM"
flag that appeared in all later versions of Windows TCP/IP stack.
As Windows 98 worked on the day after Microsoft stopped diddling with i
UPnP is the spawn of Beelzebub.
Implementation by Bugs Bunny's maroons for use by other maroons is ok, I
suppose, as long as those of us who are not maroons can turn the evil off.
However, if those maroons start whining about all the crap that happened to
them because they enabled UPnP they be
The "minimum" network size for IPv4 is a /29
The "Minimum" network size for IPv6 is a /64
That means that IPv6 has 2**(64-29) more minimal sized networks that IPv4 (the
fact that the size of those networks is different is immaterial).
2**(64-29) is 34,359,738,368 or 3.4e10
That is quite a few
No, because you have no cause of action known to law. You are not a customer
of Hulu and have no right of action.
However, your "users" could sue you for failing to provide proper service or
perhaps otherwise cause you to suffer damages.
In the former case you could file a defense and cross-c
would have certain success.
---
The fact that there's a Highway to Hell but only a Stairway to Heaven says a
lot about anticipated traffic volume.
>-Original Message-
>From: Michael Crapse [mailto:mich...@wi-fiber.io]
>Sent: Tuesday, 26 December, 2017 19:03
>To: Keith M
>> If you want to make that argument, that we shouldn’t have SLAAC and
>> we should use /96 prefixes, that wouldn’t double the space, it would
>> multiply it by roughly 4 billion.
> I'm saying I should be able to use whatever size LAN I want.
You are totally free to do that if you please, no one
g? Anyone care to share what an average copper xcon, single floor,
meet-me-room to cage, Ethernet from carrier circuit costs? (This xcon is
approx 30 feet..)
Thanks!
James
Sent from my iPad
---
Keith Stokes
[cid:71D8C5C8-00C4-4DF2-8EA2-9D534D8EB9A6@neilltech.com]
LaBrea Tarpit http://labrea.sourceforge.net/ can do this as well, though
perhaps only for IPv4. Basically it looks for unanswered ARP requests and
answers them. What it does with the ensuing session data is configurable.
---
The fact that there's a Highway to Hell but only a Stairway to Heave
Why would the carriers want to do anything? They are making money from call
termination fees.
---
The fact that there's a Highway to Hell but only a Stairway to Heaven says a
lot about anticipated traffic volume.
>-Original Message-
>From: NANOG [mailto:nanog-boun...@nanog.org] On Be
firewalls? Do they support IPv6
only environments? Details? Stories?
If you prefer not to disparage those poor product companies, please contact
me off the list.
Thanks,
Joe Klein
"inveniet viam, aut faciet" --- Seneca's Hercules Furens (Act II, Scene 1)
PGP Fingerprint: 295E 2691 F3
>Does anyone believe privacy etc will be enhanced by forbidding your
>finding out who owns this domain you were directed towards by a
>search engine?
>Granted you may not get a satisfactory answer but then maybe you
>choose not to do business with them, ok, your choice.
>But what if the response
ery happy with Peplink's Balance line (have a couple of
380's)
-Keith
>I don't see this as a technical problem, but one of business and ethics.
>ISP X advertises/sells customers "up to 8Mbps" (as an example), but when
>it comes to delivering that product, they've only guaranteed 512Kbps (if
>any) because the ISP hasn't put in the infrastructure to support 8Mbps
>per
>The question at hand is.. Do countries/businesses have to affiliate or
>utilize any of those services provided by ICANN other than the assignment
>of an IP address?
No.
>And can you get away with LAN/CAN/MAN stand-alone systems [instead of
>utilizing DNS-via-ICANN]??
Yes.
>Example:
>Is it
>An LED screen doesn't refresh the way a CRT does, right? The light
>doesn't flash and fade, it stays constant until the next change. So
>why would a 30 hz refresh rate make any difference at all for tasks
>which update the screen less often than 30 times a second? Mike did
>say he used it for doi
eatre
and provides no actual security benefit whatsoever. Anyone believing otherwise
is operating under a delusion.
--- Keith Medcalf
() ascii ribbon campaign against html e-mail
/\ www.asciiribbon.org
ection in terms of any Fiber/SDH forums will be greatly
>appreciated.
Is this SDH router to router, or are you handing it off as Ethernet? I had a
similar problem, and it was simply a mismatched duplex setting.
-Keith
Dave CROCKER [mailto:d...@dcrocker.net] said on Sunday, 30 October, 2011 22:41
> On 10/30/2011 8:36 PM, Brian Johnson wrote:
>> So you support filtering end-user outbound SMTP sessions as this is a
>> means to prevent misuse of the Commons*. Correct?
> If it is acceptable to have the receiving
If your grandmother were running her own recursive DNS resolver, I expect she
would have no difficulty understanding the message.
It is the young-uns that have difficulty comprehending (and using) the English
language.
Sent from Samsung Mobile
Original message
From: bmann...@
Concomittant wirh reduced risk assessment capability?
Sent from Samsung Mobile
Original message
From: Randy Bush
Date:
To: Lynda
Cc: North American Network Operators' Group
Subject: Re: Advisory — D-root is changing its IPv4 address on the 3rd of
January.
Your assertion that using "bought" certificates provides any security benefit
whatsoever assumes facts not in evidence.
Given recent failures in this space I would posit that the requirement to use
certificates purchased from entities "under the thumb" of government control,
clearly motivated o
While i will agree that the client being able to validate the certificate
directly is the best place to be, I do not see any advantage of requiring
purchased certificates over self-signed certificates. IMO it provides no
realistic security benefit at all.
Then again I don't award points for
c
Perhaps Googles other "harvesters" and the government agents they sell or give
user credentials to, don't work against privately (not under the goverment
thumb) encryption keys without the surveillance state expending significantly
more resources.
Perhaps the cheapest way to solve this is to ap
Non prime number store certificates are acceptd for SMTP (25) both to and from
google.
Perhaps this is CYA to prevent compromised gmail accounts from giving
credentials from hijacked accounts to unknown servers.
I have no idea how credentials for gmails pop pickup work but perhaps having
hijac
No more difficult at all. A MITM is a MITM. The atack is the same and
intteger-store-bought certificates make the process neither more nor less
complicated.
Sent from Samsung Mobile
Original message
From: William Herrin
Date:
To: George Herbert
Cc: John Levine ,nanog
> > Don't most browsers accept all cookies by default without asking the
> > user?
> no idea, but i think most browsers today block at least third party
> cookies by default.
Most browsers accept any and all cookies by default.
Many browsers can be configured into three states (1) accept anythi
> Just an FYI...
>
> Every version of Windows since Windows 2000 (sans Windows Me) has had
> the DNS Client service which maintained this caching function. This was
> by design due to the massive dependency on DNS resolution which Active
> Directory has had since its creation. It greatly reduced t
If this gets delivered please delete me. Somehow I seem to have MX requests
for nanog.org failing ...
---
() ascii ribbon campaign against html e-mail
/\ www.asciiribbon.org
We can call them "rooted" domain names and "pwned" domain names...
---
() ascii ribbon campaign against html e-mail
/\ www.asciiribbon.org
> -Original Message-
> From: Andrew Sullivan [mailto:asulli...@dyn.com]
> Sent: Saturday, 23 February, 2013 15:15
> To: nanog@nanog.org
> Subject:
The "default" mtu of 576 is because, well, 2400 baud signaling is pretty
darn slow and interactive performance (or any kind of multileaving of more
than a single connection packet stream) is, what do we call it, laggy.
Sort of like trying to telnet while doing a bulk transfer if you have
bloa
And only the telco approved web sites are accessible, and the only protocol
supported is the telco approved http and then only to port 80 ...
---
() ascii ribbon campaign against html e-mail
/\ www.asciiribbon.org
> -Original Message-
> From: Niels Bakker [mailto:niels=na...@bakker.
> icmp redirect from 192.168.140.36: 192.168.179.80 => 192.168.140.254
The host attempted to send a packet to 192.168.179.80 via 192.168.140.36.
192.168.140.36 forwarded the packet to 192.168.140.254 according to its routing
table, but is advising you (and the kernel has added to the routing t
http://email-guru.com/ ?
---
() ascii ribbon campaign against html e-mail
/\ www.asciiribbon.org
> -Original Message-
> From: Warren Bailey [mailto:wbai...@satelliteintelligencegroup.com]
> Sent: Wednesday, 01 May, 2013 10:12
> To: JoeSox; nanog@nanog.org
> Subject: Re: Could not send
There is video hosting web sites on the intertubes?
Now where would those be found, I wonder. All I have ever seen is
macro-streaming that is fraudulently labeled and advertised as video -- the
worst being something called FlashVirus, which was written by a company called
MacroVirus Media or
---
() ascii ribbon campaign against html e-mail
/\ www.asciiribbon.org
> On Thursday, 05 January, 2012 08:30, Marshall Eubanks said:
> > On Thu, Jan 5, 2012 at 4:51 AM, Keith Medcalf wrote:
> > > There is video hosting web sites on the intertubes?
> > > Now
As port 137 is the Netbios Name Service port are you *sure* this is a port scan
and not a windows box (or other OS running NetBIOS crud) that simply has
fat-fingered addresses configured?
---
() ascii ribbon campaign against html e-mail
/\ www.asciiribbon.org
> -Original Message-
>
nking of right now and I don't want to be "that guy" who puts
something in place and is cursed for a decade.
Thanks,
Keith Tokash
> Unfortunately that's not under control of those businesses. This plain text
> email you sent comes across with clickable mailto and http links in your
> signature in most modern email clients despite you having sent it in plain
> text. "Helpful" email program defaults won't force people to copy a
Is it April already? I though April Fools Day wasn't until next month.
I did, I did. I did see a snake-oil salesman!
---
() ascii ribbon campaign against html e-mail
/\ www.asciiribbon.org
> -Original Message-
> From: Guru NANOG [mailto:nanog.g...@gmail.com]
> Sent: Saturday, 03 M
Have you tried looking under Qwest?
-Original Message-
From: Jason Lixfeld [mailto:ja...@lixfeld.ca]
Sent: Tuesday, March 06, 2012 2:54 PM
To: nanog@nanog.org
Subject: AS209/CenturyLink NOC email?
Anyone from AS209/CentryLink around to troubleshoot some routing weirdness? If
not, anyon
> > http://www.bbc.co.uk/news/uk-politics-17576745
> > It's sad when you just can't tell with things like this..
> I was hoping for something good, like maybe an extension of RFC 1149
> implementing ECN (aka SQUAWK) in avian carriers. I'm disappointed.
ECN doesn't help if the Hunting Season bit
Check nanpa.com
http://nanpa.com/nas/public/assigned_code_query_step1.do?method=resetCodeQueryModel
although number portability may confuse things slightly-
Keith
-Original Message-
From: Jarek Kasjaniuk [mailto:ja...@dolsatbelchatow.pl]
Sent: Friday, May 25, 2012 10:48 AM
To: nanog
ng both the
technical challenges but also the political implications of such a system.
-Keith
> This may result in mixed signals if a site on a SLD under .SECURE
> is actually compromised, which is more harmful than having no UI
> declaration.
The greatest advantage of .SECURE is that it will help ensure that all the
high-value targets are easy to find.
---
() ascii ribbon campaign
On Thursday, 07 June, 2012 12:52, Owen DeLong observed:
> This is a hard problem to solve. Not the least of the difficulties is
> the fact that if you ask 50 engineers to define "Cloud", you will get
> at least 100 definitions many of which are incompatible to the point
> of mutually exclusive.
Security Settings in the Trust Center:
"Read as Plain Text"
"Even Signed Messages as Plain Text"
"Never Download Images"
"Require Confirmation when Forwarding or Replying will Download
Anything at all"
Disable the AutoInfect options:
"Turn off the Preview"
> Windows security sucks.
The real problem with Windows is that there exist folks who believe that it is,
or can be, secured. They believe the six-colour glossy, the Gartner Reports,
and other (manufacturers') propaganda. As a consequence they do not act in a
fashion which will keep them saf
> The problem at this point is that even with improvements in newer
> Windows systems there are probably on the order of a billion systems
> out there, attached to the net, and still running these deeply flawed
> OS's which can be taken over by just clicking on the wrong mail
> message.
There hav
Leo,
This will never work. The "vested profiteers" will all get together and make
it a condition that in order to use this method the user has to have
"purchased" a "verified" key from them. Every site will use different
profiteers (probably whoever gives them the biggest kickback). You will
> 2. Pre-compromised-at-the-factory smartphones and similar. There's
> no reason why these can't be preloaded with spyware similar to CarrierIQ
> and directed to upload all newly-created private keys to a central
> collection point. This can be done, therefore it will be done, and when
> some se
> those. The beauty of most appliances is that they're easy to manage. If it
> fails, download the latest ISO from company, burn it, boot appliance,
> restore it and you're back in business in an hour or so. Keep in mind a
> linux kernel running just ntpd and some management necessities like ss
> Or you can ask the it guys to use a windows server... Eg:
>
> http://support.microsoft.com/kb/816042
That is a joke Jared? You left off the smiley.
Windows doesn't do NTP out-of-the-box (Microsoft assertions to the contrary
notwithstanding). You can build a reasonably working standard daemo
God damn that's a horrid piece of shit web site. You have to disable security
and permit remote code execution or it does not work.
What a crock!
---
() ascii ribbon campaign against html e-mail
/\ www.asciiribbon.org
> -Original Message-
> From: Nick Hilliard [mailto:n...@foobar.
> > The system clock needs to be UTC, not UTC ± some offset stuck
> > somewhere that keeps some form of running tally of the current leap
> > second offset since the epoch.
> Nope. UTC *includes* leap seconds already. It's UT1 that does not.
> Are you suggesting that NTP timekeeping should be
> Leap seconds are to align the artificial and very stable atomic timescale
> with the irregular and slowing rotation of the earth.
You are assuming facts not in evidence. The rotation is merely irregular
within the capabilities of our scheme of measurement, calculation, and
observation. Once
Tony Finch wrote:
> Keith Medcalf wrote:
> > You are assuming facts not in evidence. The rotation is merely
> > irregular within the capabilities of our scheme of measurement,
> > calculation, and observation.
> There is LOTS of evidence that the earth's rotatio
I see.
Replace "local access" control with "let anyone on the internet reconfigure the
thing". Whoever's idea it was should be p*ssed on, keelhauled, drawn and
quartered, then burned at the stake.
---
() ascii ribbon campaign against html e-mail
/\ www.asciiribbon.org
> -Original Messa
Significantly faster and with far fewer bugs than the Cisco/Linksys as well.
---
() ascii ribbon campaign against html e-mail
/\ www.asciiribbon.org
> -Original Message-
> From: David Hubbard [mailto:dhubb...@dino.hostasaurus.com]
> Sent: Thursday, 05 July, 2012 10:56
> To: nanog@nano
My response would be "insufficient information provided for meaningful
diagnosis".
The following could be issues:
... the user does not have a computer
... the computer is not turned on
... the keyboard is not plugged in
... the user is a quadraplegic and cannot use the mouse or keyboard
... the
> "A client cannot access the website "http://xyz.com";
>> How does the user know that it cannot access the web site?
> When did users become things?
> Probably a candidate that made this mistake should be dismissed from
> consideration on that basis alone.
How do you know that the client is a
> > "A client cannot access the website "http://xyz.com";
>
> >> How does the user know that it cannot access the web site?
>
> > When did users become things?
>
> > Probably a candidate that made this mistake should be dismissed from
> > consideration on that basis alone.
>
> How do you know that
>"What's the problem with using 255.255.255.247 as a subnet mask if you
>want to make a LAN subnet with 12 hosts?"
> (5 word answer)
Unemployment Office Is That Way ->
Is the only 5 word answer I could come up with. The correct answer "invalid
netmask", is only two words.
> "What TCP destina
> > "What's the problem with using 255.255.255.247 as a subnet
> > mask if you want to make a LAN subnet with 12 hosts?"
> > (5 word answer)
> My response would be: Discontiguous subnet masks were allowed in the pre-CIDR
> era. If you so desire, give me about 2 hours since I do not have a scien
er to "proxy SMTP mail from internal
sources".
It could of course just be a brilliant question designed to detect such
problems ...
> Owen
Keith
---
() ascii ribbon campaign against html e-mail
/\ www.asciiribbon.org
Ifconfig does not work on Windows.
Are you saying that there are other operating systems brain-dead enough to just
run any old arbitrary code from untrusted media?
Sent from my Android phone using TouchDown (www.nitrodesk.com)
-Original Message-
From: [valdis.kletni...@vt.edu]
Receiv
ct errors on my android phone as
well as seeing the looping terms of agreement and some type of Server Load
Error after hitting agree on the web site. I also tried reading the new ToS and
Privacy Policy and was unable to connect to those servers with both Chrome and
FF.
-Keith
hin an hour of a power failure. No
way to back them up easily that I can see.
Running BGP and hosting over a residential service such as cable or DSL, has
it's limitations as I have learned. I doubt your LEC has an SLA for DSL
service. I would look at hosting somewhere closer to your eyeball networks
and let them worry about power, cooling and network availability.
-Keith
Works fine in Firefox for me, and always has (within the limits of the shoddily
designed website that is). Nonetheless, I'd never buy anything from them since
they are an anti-security organization. Their Web site uses so much gratuitous
javascript crap and hard-coded assumptions about charac
Ugly bags of mostly water?
---
() ascii ribbon campaign against html e-mail
/\ www.asciiribbon.org
> -Original Message-
> From: Otis L. Surratt, Jr. [mailto:o...@ocosa.com]
> Sent: Friday, 28 September, 2012 05:33
> To: nanog@nanog.org
> Subject: RE: guys != gender neutral
>
> Maybe
> As an aside, you may want to fix your DNS, as some mail receivers don't
> like this:
> $ dig -x 72.249.91.101 +short
> static.serversandhosting.com.
> $ dig a static.serversandhosting.com +short
> 72.249.3.27
What is really meant to be said is that MTA's which require RFC compliance
won't talk
And don't forget about the NSA's "Operation Backhoe". What more convenient way
of installing a tap than cutting the fibre, then installing a passive tap while
repairs are in progress ...
---
() ascii ribbon campaign against html e-mail
/\ www.asciiribbon.org
> -Original Message-
>
201 - 300 of 417 matches
Mail list logo