Hi,
How is a BGP implementation tested with real Internet routing data (BGP
UPDATEs)? Are there any experimental/test networks that can be connected to
for testing a BGP implementation?
Thanks,
-Sathya
Thanks Henk! We'll be back in touch in later in September, once all the
NANOG26 submissions have been received and reviewed.
Susan Harris, Ph.D.
Merit Network/Univ. of Mich.
On Mon, 16 Sep 2002, Henk Uijterwaal (RIPE-NCC) wrote:
Hi Susan,
Hi - just a reminder that abstracts are
Hello:
I am writing a second article on IPv6. My first article is indexed at
http://www.circleid.com/articles/2533.asp
I have tested IPv6 with the assistance if freenet6.net. It seems to work.
In my second article I would like to include a list of ISP's who offer IPv6
to their customers.
At 10:26 AM -0700 2002/09/15, Dave Crocker wrote:
2. The issue with email is authentication, not privacy.
Authentication can be achieved can be achieved easily over port
25, without encryption. Hence, blocking port 25 blocks
legitimately validated email, as well as possible spam.
On Tue, 17 Sep 2002 18:30:36 +0200, Brad Knowles said:
I imagine if you could get cisco (and other vendors) to fix their
transparent proxy server software to be more intelligent, that would
fix the problem.
I suppose suggesting the use of port 587 would be pointless? ;)
On Tue, Sep 10, 2002 at 08:10:46AM -0400, Marshall Eubanks
[EMAIL PROTECTED] replied to Iljitsch van Beijnum [EMAIL PROTECTED]:
[snip]
When I go to Internet cafe's (I like Global Gossip), I connect my Ti-book
to the local ethernet if at all possible (that's why I like Global Gossip)
and
At 1:00 PM -0400 2002/09/17, [EMAIL PROTECTED] wrote:
I imagine if you could get cisco (and other vendors) to fix their
transparent proxy server software to be more intelligent, that would
fix the problem.
I suppose suggesting the use of port 587 would be pointless? ;)
William said they changed a lot of the way they do things at the
company
that hosts CNN.com since 9/11. I don't believe they were the only ones.
Which was my point to start with...
- kurtis -
On Mon, Sep 09, 2002 at 11:31:44PM +0200, [EMAIL PROTECTED] said:
[snip]
At 10:08 AM -0700 2002/09/09, John M. Brown wrote:
How do you determin what is spam ?
Not trying to be difficult or start another bloody thread.
It would seem to me that in order to create an off the shelf
On Mon, Sep 09, 2002 at 06:15:12PM -0700, [EMAIL PROTECTED] said:
Rafi Sadowsky wrote:
Maybe I'm missing something obvious but do how you get rate-limiting per
TCP *flow* with Cisco IOS ?
There is something called flow-based RED (FRED) but it consumes a whole
lot of memory because you
At 1:51 PM -0400 2002/09/17, Greg A. Woods wrote:
No, Dave's second sentence is not true, thus his conclusion is bogus.
Dave was talking about normal TCP connections, and I was
following the same model.
If you're talking about hi-jacking the TCP connection, then you
are
At 11:07 AM -0700 2002/09/17, Scott Francis wrote:
Much more complex to implement and manage; doesn't scale well. The fewer
decisions the anti-spam system has to make, the better it will work. If it
only has to decide whether or not a specific IP/port combination has exceeded
a certain
If you are testing the receipt of routes and inbound filtering, I just block
all outbound advertisements and connect to an ISP or one of my border
routers.
That way you can test your filters and inbound access-lists and manipulate
the BGP tables before putting the router into production.
Hope
On måndag, sep 16, 2002, at 18:02 Europe/Stockholm, JC Dill wrote:
When I got back to the office, I learned that the big screen TV that
had previously been located in the exercise room had been moved to the
center of the office so that everyone could more easily see it, and
everyone
I apologize if this is an obvious question, but I've search bugtraq and
other sources...
I've had two customers complain today about massive amounts of incoming
UDP traffic on port 2002.
They appear to be some kind of DDOS or spoofed attack since the origin IPs
on each packet are different.
Thanks for the quick response everyone, searching for udp 2002 found way
to many things at first, and then I found the info (within 1 minute of
sending my email, of course).
My apologies again for the time wasting :)
-S
Anybody willing to share with me (off list) some experiences with Network
Instruments' Observer and Analyst packs ? Rating A-E (A=best) perhaps ?
As always obliged.
Bert Fortrie
[EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE-
Hash: MD5
Hello Joe,
Tuesday, September 17, 2002, 11:15:21 AM, you wrote:
JB I have tested IPv6 with the assistance if freenet6.net. It seems to work.
Whewthank the gods for that. I mean the tests done by Cisco,
Juniper, Sprint, ATT, Nokia and other
On Tue, 17 Sep 2002, Allan Liska wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: MD5
Hello Joe,
Tuesday, September 17, 2002, 11:15:21 AM, you wrote:
JB I have tested IPv6 with the assistance if freenet6.net. It seems to work.
Whewthank the gods for that. I mean the tests done
At 02:11 PM 9/16/2002 -0400, Greg A. Woods wrote:
2. The issue with email is authentication, not privacy. Authentication can
be achieved can be achieved easily over port 25, without encryption.
Well, no, not securely it can't. You cannot have a secure authenticated
service running over a
On Tue, Sep 17, 2002 at 08:29:39PM -0700, Dave Crocker wrote:
3. SMTPAUTH does not require an alternate port, yet it is sufficient for
ensuring accountability. Hence it is sufficient for dealing with the
reason that port 25 is blocked, without requiring that it be blocked.
I don't
21 matches
Mail list logo