Fred Heutte wrote:
(1) There will be a market for independent ISPs as long CLECs
I think a more appropriate term would be ALEC
(anti-competitive local exchange carrier)
...That having been said, the problem with the small guys providing access is
they can't generally achieve the economies of
Hi,
In past days I noticed the nxdomain statistics in
named.stats keeps increasing.( I run it every 5 min)
By tcpdump, it's found a remote computer keep asking
address for record like
999d38e693b9e6293b450.0existence.com,
60d38e693b9e6293b450.0be6c1xfa.net.
is that a virus affacted computer?
Alexei Roudnev wrote:
O, my god. Primitive hack, primitive ssh exploit I watched it all 6
years ago, bnothing changed since this.
It is _minor_ incident, in reality.
Primitive I can understand, but _minor_?
First, I don't really see why an attack should be estimated by the tool
*Your* boxes may be hardened beyond all belief and plausibility, but
you're
*STILL* screwed if some teenaged kid on another continent has more
effective
control of the router at the other end of your OC-48 than the NOC monkey
you
call when things get wonky
It is mostly fantasy. DNS
At a guess supplying services the Comcasts and Verizons of this world haven't
managed to provide well, like DNS, Email, Webservices, and feeding trolls.
ADSL is virtualised here anyway, as it is almost all from the national
telecomms carrier. Some of my best friends own virtual ISPs, they
As an economist I know likes to say: It depends.
To a varying extent (in some markets more than others), the massive
oversubscription of cable that meant poor bandwidth/latency at peak
times has declined to the point where the older arguments of committed
versus max is less meaningful. Of
For every day a company does the same thing they did yesterday, they
will be in business one day fewer
... or something like that,
- bri
Matt Bazan wrote:
bottom line is that in a few years everything will be virtualized and
cosolodation will rule the land. there will be single turnkey
On 5/12/05, Joe Shen [EMAIL PROTECTED] wrote:
By tcpdump, it's found a remote computer keep asking
address for record like
999d38e693b9e6293b450.0existence.com,
60d38e693b9e6293b450.0be6c1xfa.net.
is that a virus affacted computer?
Sure looks like some kind of massmailer trojan, or a
Joe Shen wrote:
Hi,
In past days I noticed the nxdomain statistics in
named.stats keeps increasing.( I run it every 5 min)
By tcpdump, it's found a remote computer keep asking
address for record like
999d38e693b9e6293b450.0existence.com,
60d38e693b9e6293b450.0be6c1xfa.net.
is that
I agree. But I saw, how hackers intruded into XXX agency (USA's, I mean) 6
years ago. Cisco sources never was a great secret
Then you shouldn't be talking about it.
(a lot of people saw them; they are almost useless without Cisco's
infrastructure; they are interesting for competitors
in
Alexei Roudnev wrote:
*Your* boxes may be hardened beyond all belief and plausibility, but
you're
*STILL* screwed if some teenaged kid on another continent has more
effective
control of the router at the other end of your OC-48 than the NOC monkey
you
call when things get wonky
While I'm not claiming this is the beginning of a trend, last
week a former dialup customer who left ShaysNet for Comcast several
months ago returned to our dialups AND brought along a friend who had
never been one of our customers before but who was fed up with Comcast.
Aside from the Switch Data in Southfield and
the nearby Level 3 location, has anyone encountered
good locations for private peering in the metro
Detroit area?
On Thu, 12 May 2005 01:30:36 PDT, Alexei Roudnev said:
It is mostly fantasy. DNS security is much much more important and much more
real issue, vs this fictions.
Very true, but
Sites that have their routers tied down right tend to get the DNS right too,
and sites that are lax with the
On Thu, 12 May 2005 04:15:07 -1000, Brian Russo said:
Is there now justification for allowing transit for ms-sql slammer ports?
That depends. Do you believe in end-to-end or walled-garden?
pgp000U5ef4oe.pgp
Description: PGP signature
End to end, but I'm afraid current realities do not always permit that
approach and we must occasionally build walls.
Sure, I wish people would fully step up to the plate and demand robust
software/protocols. Secure, strong encryption and software that isn't
filled with buffer overflows and
At 11:26 AM -0400 2005-05-12, [EMAIL PROTECTED] wrote:
It's often suggested that you have *two* DNS setups - one that only answers
requests from inside for recursion and caching, and an authoritative one that
faces out and refuses to recurse.
The original question from Joe Shen said that a
I agree. But I saw, how hackers intruded into XXX agency (USA's, I mean)
6
years ago. Cisco sources never was a great secret
Then you shouldn't be talking about it.
I mean - such things was common even 6 years ago. There was (always) some
level of rooted servers, some level of teen
On Thu, 12 May 2005 04:15:07 -1000
Brian Russo [EMAIL PROTECTED] wrote:
Perhaps a better question is:
Is there now justification for allowing transit for ms-sql slammer
ports?
I think there always has been some justification. Here is a very
small sample of real traffic that I can assure
Just as an FYI:
In an interesting turn of events (e.g. multiple states
suing Vongae, multiple RBOC's now offering to make their
E911 infrastructure available to VoIP providers in the face
of ineveitable FCC madates to do so, etc.), Vonage is saying
that they will make their E911 service and
Not pointing any fingers but many of you think these
small ISP's are just going to die off instead of
adapt. Wireless is becoming a better and more reliable
technology that in the future will be able to provide
faster service then FTTH. I know of atleast one small
ISP in Michigan that went from
Not pointing any fingers but many of you think these
small ISP's are just going to die off instead of
adapt. Wireless is becoming a better and more reliable
technology that in the future will be able to provide
faster service then FTTH. I know of atleast one small
ISP in Michigan that went from
So imagine a residential area all pulling digital video over wireless.
Sound familiar? Ironically close to TV! (yet so different)
What I can't understand is why multicast hasn't just gone gangbusters into
use yet. I see it as a really pent-up capability that, in light of
broadband video,
Via FrSIRT:
http://www.frsirt.com/english/advisories/2005/0527
- ferg
[snip]
* Technical Description *
A new vulnerability was identified in Cisco products, which may be exploited by
attackers to bypass the security restrictions. The flaw resides in the Cisco
Firewall Services Module
On Thu, 2005-05-12 at 14:32:45 -0400, Joe Loiacono proclaimed...
So imagine a residential area all pulling digital video over wireless.
Sound familiar? Ironically close to TV! (yet so different)
What I can't understand is why multicast hasn't just gone gangbusters into
use yet. I see it as
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Joe Loiacono wrote:
|
|
|
|
| So imagine a residential area all pulling digital video over wireless.
| Sound familiar? Ironically close to TV! (yet so different)
You mean like VoIP over dsl ?
Burning gigantic holes in the bandwidth to carry traffic
Can someone from Charter's NOC group please contact me off list?
Recurring problems with a node in Sacramento.
Thanks.
Todd
On Thu, 12 May 2005 12:23:19 CDT, John Kristoff said:
I think there always has been some justification. Here is a very
small sample of real traffic that I can assure is not Slammer traffic,
but it is being filtered nonetheless (IP addresses removed):
May 12 09:15:30.598 CDT[...] denied
| So imagine a residential area all pulling digital video over wireless.
| Sound familiar? Ironically close to TV! (yet so different)
You mean like VoIP over dsl ?
I'm looking to setup DSL over VoIP over DSL next. smirk
[EMAIL PROTECTED] wrote:
On Thu, 12 May 2005 12:23:19 CDT, John Kristoff said:
I think there always has been some justification. Here is a very
small sample of real traffic that I can assure is not Slammer traffic,
but it is being filtered nonetheless (IP addresses removed):
May 12
On May 12, 2005, at 4:23 PM, Jeff Rosowski wrote:
| So imagine a residential area all pulling digital video over
wireless.
| Sound familiar? Ironically close to TV! (yet so different)
You mean like VoIP over dsl ?
I'm looking to setup DSL over VoIP over DSL next. smirk
I'm going for v.90
--- Matthew Crocker [EMAIL PROTECTED] wrote:
On May 12, 2005, at 4:23 PM, Jeff Rosowski wrote:
| So imagine a residential area all pulling
digital video over
wireless.
| Sound familiar? Ironically close to TV! (yet so
different)
You mean like VoIP over dsl ?
I'm
Need tech contact at Akamai for troubleshooting access to some domains
hosted by them.
--William Caban
Net. Admin - HPCf
University of Puerto Rico
On May 12, 2005, at 4:55 PM, William Caban wrote:
Need tech contact at Akamai for troubleshooting access to some
domains hosted by them.
[EMAIL PROTECTED]
--
TTFN,
patrick
All - I am looking for a solution (open source, scripts) to allow me to
monitor ACL's on Cisco routers. So if for example a line dissapears from an
ACL or the entire ACL is removed - I am alerted via pager/e-mail etc.
regards,
Paul R
On (12/05/05 17:14), Paul Ryan wrote:
All - I am looking for a solution (open source, scripts) to allow me to
monitor ACL's on Cisco routers. So if for example a line dissapears from an
ACL or the entire ACL is removed - I am alerted via pager/e-mail etc.
http://www.shrubbery.net/rancid/
Paul,
I think a better solution maybe to implement TACACS+ and resrict rights
on who can do that..
Sounds like you don't trust someone.
I'd try that first...
Later,
Jim
-Original Message-
From: Paul Ryan [mailto:[EMAIL PROTECTED]
Sent: Thursday, May 12, 2005 5:15 PM
To:
On Thu, 12 May 2005, Paul Ryan wrote:
All - I am looking for a solution (open source, scripts) to allow me to
monitor ACL's on Cisco routers. So if for example a line dissapears from an
ACL or the entire ACL is removed - I am alerted via pager/e-mail etc.
rancid or 'rat' (router auditting
Wow, I hope not Matt. That is a VERY Bleak outlook.
Mark D. Bodley
President
Cyrix Systems
[EMAIL PROTECTED]
www.cyrixsys.com
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Matt
Bazan
Sent: Wednesday, May 11, 2005 6:02 PM
To: [EMAIL PROTECTED]
On Wed, 11 May 2005 15:02:29 PDT, Matt Bazan said:
bottom line is that in a few years everything will be virtualized and
cosolodation will rule the land. there will be single turnkey solutions
for the end user / corporate environment that will be infinitely
configurable to meet the latest
If you anticipate doing a lot of this kind of monitoring in the future you
may want to take a look at the expect programming language
http://expect.nist.gov/ , which has very simple send/expect constructs.
E.g. send show acl 101/r expect access-list .. etc. Perl also allows
similar although is
bottom line is that in a few years everything will be virtualized and
cosolodation will rule the land.
I've heard this over and over again, and it's just not happened. I'm
still one of the few 100% facilities based dial ISPs left in Iowa,
and if I have to be reduced to being a reseller to
On Thu, 12 May 2005, Glynn Stanton wrote:
If you anticipate doing a lot of this kind of monitoring in the future you
may want to take a look at the expect programming language
http://expect.nist.gov/ , which has very simple send/expect constructs.
E.g. send show acl 101/r expect
43 matches
Mail list logo