On Wed, Jun 14, 2006 at 04:46:31AM +, Christopher L. Morrow wrote:
is it really that hard to make your foudry/extreme/cisco l3 switch vlan
and subnet??? Is this a education thing or a laziness thing? Is this
perhaps covered in a 'bcp' (not even an official IETF thing, just a
hosters
Since power consumption was a topic at the last NANOG meeting.
subscription required, or buy a copy of the Wall Street Journal from
a newstand
http://online.wsj.com/article/SB115016534015978590.html
Surge in Internet Use, Energy Costs
Has Big Tech Firms Seeking Power
By KEVIN J. DELANEY and
We end up with customers asking for more IPs too. We just add additional
subnets to the interface, perhaps they started with a /30 but now need three
more IPs, we just add an additional /29 to the interface leaving both blocks.
It is not often that anything needs to be explained to the
actually, in a brilliant demonstration of fair use of copyrighted
lyrics, paul was quoting directly from the song about alice's
restaurant. well, actually, despite saying so, it's not much about
the restaurant at all. and the restaurant is not called alice's
restaurant, that's just the
On Wed, 14 Jun 2006, Christopher L. Morrow wrote:
| how about just mac security on switch ports? limit the number of mac's at
| each port to 1 or some number 'valid' ?
Hi,
Just to be clear, simple L2 mac security doesn't help here.
This attack (arp spoofing on a shared subnet) does not
is it really that hard to make your foudry/extreme/cisco l3 switch vlan
and subnet??? Is this a education thing or a laziness thing? Is this
perhaps covered in a 'bcp' (not even an official IETF thing, just a
hosters bible sort of thing) ?
Subnets aren't exactly good for address space usage.
On Wed, 2006-06-14 at 05:28 +, Edward B. DREGER wrote:
CLM Date: Wed, 14 Jun 2006 04:46:31 + (GMT)
CLM From: Christopher L. Morrow
CLM is it really that hard to make your foudry/extreme/cisco l3 switch vlan
CLM and subnet???
Of course not.
CLM Is this a education thing or a
Has anyone ever considered trying to come up
with a way that these crypto projects could be
explained in plain English?
yes.
I think a lot of the problem with adoption of
DNSSEC stems from the fact that most people who
might make a decision to use it, haven't got a
clue what it is, how
On Tue, 13 Jun 2006, Randy Bush wrote:
snip
how about cctlds, which are of great interest to me? i suspect
that iana will not play, so how would cctlds play in way in which i
can bet my bippies?
and how it would be rolled would be of interest.
key-roll through DLV is no different, from
At 10:20 +0100 6/14/06, [EMAIL PROTECTED] wrote:
Has anyone ever considered trying to come up
with a way that these crypto projects could be
explained in plain English? I think a lot of
Over and over and over and over again.
(Not to say we've done enough! but we've done all we can think of.)
[ dunno to whom you are replying, but they miss the point,
imiho ]
Has anyone ever considered trying to come up with a way that
these crypto projects could be explained in plain English?
yes.
to the best of my limited knowledge, the crypto has never been
an issue with dnssec. it was done
lurkmodeoffofftopicmodeon
Shoes for Industry!
- Joe Beets :-)
/lurkmodeoff/offtopicmodeon
At 01:04 PM 6/12/2006, you wrote:
Paul may be special ...
nope. we're all just bozos on this bus.
* Christopher L. Morrow:
On Wed, 14 Jun 2006, Suresh Ramasubramanian wrote:
http://thespamdiaries.blogspot.com/2006/02/new-host-cloaking-technique-used-by.html
* Monitor your local network for interfaces transmitting ARP
responses they shouldn't be.
how about just mac security on
* Christopher L. Morrow:
is it really that hard to make your foudry/extreme/cisco l3 switch vlan
and subnet??? Is this a education thing or a laziness thing?
You need those L3 switches before you can do this. Obviously, L2 gear
is much cheaper, and will work equally well until it is
Mikael == Mikael Abrahamsson [EMAIL PROTECTED] writes:
On Wed, 14 Jun 2006, Christopher L. Morrow wrote:
is it really that hard to make your foudry/extreme/cisco l3 switch
vlan and subnet??? Is this a education thing or a laziness thing?
Is this perhaps covered in a 'bcp' (not even an
On Tue, 13 Jun 2006, Randy Bush wrote:
I don't profess to speak for ISC here, but it may be worth noting
that ISC staff continue to spend a lot of time travelling to operator
meetings, workshops, root server installations and RIR and ICANN
meetings. Outreach and community participation is
Since this technique requires a IPinIP or GRE tunnel, wouldn't blocking
these two protocols to/from the hosts be sufficient? Assuming of course
the customer's host isn't using that normally.
Chuck
Netco Government Services has recently acquired Multimax and is changing its
name to Multimax
On Jun 14, 2006, at 1:53 PM, Church, Chuck wrote:
Since this technique requires a IPinIP or GRE tunnel, wouldn't
blocking
these two protocols to/from the hosts be sufficient? Assuming of
course
the customer's host isn't using that normally.
Unfortunately, that probably won't work for
On Jun 14, 2006, at 2:18 AM, John van Oppen wrote:
That being said, I know at least one of our transit customers does
hosting exactly how you are describing. Coincidentally, this
customer is also one of the customers that asked if we could give
them a class C block.
Ok, I KNOW I am
On Wed, 14 Jun 2006, Church, Chuck wrote:
Since this technique requires a IPinIP or GRE tunnel, wouldn't blocking
these two protocols to/from the hosts be sufficient? Assuming of course
the customer's host isn't using that normally.
sure, but those are probably just convenience things,
The effect of Nanog is remarkable. All the hybrid cells became fully
converted to embryonic stem cells, said Jose Silva of the University of
Edinburgh, Scotland, who reported the findings in the journal Nature.
As a hoster with many customers on large shared VLANs perhaps I can add a
bit...
Richard A Steenbergen [EMAIL PROTECTED] wrote:
Simple: Subnets are hard, customers are stupid, and ARIN is not exactly a
hosters best friend.
When a hosting customer asks for 5 IPs today and 25 IPs tomorrow, it
On Wed, Jun 14, 2006 at 07:03:10PM -0400, Matt Buford wrote:
As a hoster with many customers on large shared VLANs perhaps I can add a
bit...
Note that if you're reading this list, you have already identified
yourself as a non-typical hoster. Go read WHT or GFY for 10 minutes for an
example
And let me tell you.. inheriting a network like that, knowing a better way
to do it, will make you want to put a gun in your mouth. Two /19's worth
of address space in VLAN1 (not just in one vlan, but in vlan *1*. Cisco
nerds are slapping foreheads or spitting Coke right now.)
Trying to
24 matches
Mail list logo