Anyone from Akamai on the list?

2006-06-20 Thread Amar
Please contact med off list. tia -- amar

RoadRunner security

2006-06-20 Thread Chris Horry
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 A general question to the list about RoadRunner security... I've been receiving a DNS flood from either a malicious, or badly configured IP in Taiwan since last Thursday. I've contacted the ISP responsible, but if the owner of 140.116.23.19 would

RE: RoadRunner security

2006-06-20 Thread Dennis Dayman
I am sending it to their security/postmaster (Todd Herr) guru now. -Dennis -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Chris Horry Sent: Tuesday, June 20, 2006 9:20 AM To: [EMAIL PROTECTED] Subject: RoadRunner security -BEGIN PGP

Re: Anyone from Akamai on the list?

2006-06-20 Thread John Payne
On Jun 20, 2006, at 6:01 AM, Amar wrote: Please contact med off list. Yes, several. Sent my akamai address offlist.

Internet 2010 - Predictions for 2010 from a Content Forum and NANOG 37 in San Jose

2006-06-20 Thread William B. Norton
Hi - At a content forum and NANOG in June 2006 I led some discussions involving predictions for what the Internet might look like in 2010. What makes this so interesting is that so many perspectives highlighted so many potential futures that others had not considered. When you then discuss the

voip calea interfaces

2006-06-20 Thread Eric A. Hall
I'm looking into the FCC ruling to require CALEA support for certain classes of VoIP providers, as upheld by the DC circuit court a couple of weeks ago [1]. The portion of VoIP that is covered by this order is pretty narrow (ie, you provide telephony-like voip services for $$ [read the specs for

Re: voip calea interfaces

2006-06-20 Thread Fred Baker
I'm willing to reply on-list, but obviously any business or legal contacts have to be off-list. For those, I can point you to the product manager for the technology, but it would frankly be better for one to go through one's account team, for scaling reasons. Yes, the vendors are aware

Re: Internet 2010 - Predictions for 2010 from a Content Forum and NANOG 37 in San Jose

2006-06-20 Thread Jake Khuon
### On Tue, 20 Jun 2006 09:13:16 -0700, William B. Norton ### [EMAIL PROTECTED] casually decided to expound upon nanog@merit.edu ### the following thoughts about Internet 2010 - Predictions for 2010 from ### a Content Forum and NANOG 37 in San Jose: WBN Content Provider Predictions for 2010 WBN

Re: voip calea interfaces

2006-06-20 Thread Eric A. Hall
On 6/20/2006 1:33 PM, Fred Baker wrote: Yes, the vendors are aware of this. Our legal people track it pretty closely, and we have been dealing with the issues in Europe, Australia, and a number of other places for quite a while. We talk directly with legislators, regulators, and

RE: key change for TCP-MD5

2006-06-20 Thread Bora Akyol
The draft allows you to have a set of keys in your keychain and the implementation tries all of them before declaring the segment as invalid. No time synchronization required. No BGP message required. The added cost for CPU-bound systems is that they have to try (potentially) multiple keys

Re: key change for TCP-MD5

2006-06-20 Thread Iljitsch van Beijnum
On 20-jun-2006, at 21:12, Bora Akyol wrote: The draft allows you to have a set of keys in your keychain and the implementation tries all of them before declaring the segment as invalid. No time synchronization required. No BGP message required. What if we agree to change the key on our

Silicon-germanium routers?

2006-06-20 Thread David W. Hankins
IBM and Georgia Institute of Technology are experimenting with silicon- germanium, it is said here: http://tinyurl.com/g26bu I find this interesting having just attended NANOG 37 where some manufacturers of network devices told us in a panel that network heat problems weren't going away

RE: key change for TCP-MD5

2006-06-20 Thread Randy Bush
The added cost for CPU-bound systems is that they have to try (potentially) multiple keys before getting the **right** key once

Re: key change for TCP-MD5

2006-06-20 Thread Randy Bush
What if we agree to change the key on our BGP session, I add the new key on my side and start sending packets using the new key, while you don't have the new key in your configuration yet? again: try reading the draft

Re: key change for TCP-MD5

2006-06-20 Thread Iljitsch van Beijnum
On 20-jun-2006, at 21:23, Randy Bush wrote: What if we agree to change the key on our BGP session, I add the new key on my side and start sending packets using the new key, while you don't have the new key in your configuration yet? again: try reading the draft I've read the draft and it

Re: VoIP calea interfaces

2006-06-20 Thread Eric A. Hall
On 6/20/2006 2:57 PM, Hoffpauir, Dusty wrote: The FCC/FBI have left it up the industry to define a standard, they are not defining it themselves. Right. But they do have veto power, and they do not appear to have given approval yet. Meanwhile the deadline continues to close. This is an

Contact info for MSN.com NOC?

2006-06-20 Thread Reid Knuttila
NANOG Subscribers, I'm not sure if you've ever attempted to contact the MSN (Microsoft Network) NOCC, which would be AS 8075, or 207.68.160.0/19, but their ARIN WHOIS listed phone numbers are all going to a central receptionist - +1-425-882-8080,who won't help at all, and won't put you me

Re: key change for TCP-MD5

2006-06-20 Thread Valdis . Kletnieks
On Tue, 20 Jun 2006 21:16:05 +0200, Iljitsch van Beijnum said: What if we agree to change the key on our BGP session, I add the new key on my side and start sending packets using the new key, while you don't have the new key in your configuration yet? How is that *any* different than you

Re: key change for TCP-MD5

2006-06-20 Thread Crist Clark
On 6/20/2006 at 12:33 PM, Iljitsch van Beijnum [EMAIL PROTECTED] wrote: On 20-jun-2006, at 21:23, Randy Bush wrote: What if we agree to change the key on our BGP session, I add the new key on my side and start sending packets using the new key, while you don't have the new key in your

RE: Silicon-germanium routers?

2006-06-20 Thread Tony Li
IBM and Georgia Institute of Technology are experimenting with silicon- germanium, it is said here: http://tinyurl.com/g26bu I find this interesting having just attended NANOG 37 where some manufacturers of network devices told us in a panel that network heat problems weren't

RE: voip calea interfaces

2006-06-20 Thread Frank Bulk
USTelecom has put on a free webinar about this, with guests from VeriSign. It might be on interest. http://www.ustelecom.org/events.php?urh=home.events.web2006_0615 Frank -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Eric A. Hall Sent: Tuesday, June

Re: Silicon-germanium routers?

2006-06-20 Thread Peter Dambier
David W. Hankins wrote: IBM and Georgia Institute of Technology are experimenting with silicon- germanium, it is said here: http://tinyurl.com/g26bu I find this interesting having just attended NANOG 37 where some manufacturers of network devices told us in a panel that network heat

Re: Silicon-germanium routers?

2006-06-20 Thread Warren Kumari
On Jun 20, 2006, at 12:18 PM, David W. Hankins wrote: IBM and Georgia Institute of Technology are experimenting with silicon- germanium, it is said here: http://tinyurl.com/g26bu I find this interesting having just attended NANOG 37 where some manufacturers of network devices told

RE: Contact info for MSN.com NOC?

2006-06-20 Thread Dennis Dayman
I've got a customer who's recently assigned network block (from ARIN) is being blocked from access to MSN.com, and they would sure love to have their Hotmail working again. Anyone know who to contact over there? [EMAIL PROTECTED] They are pretty responsive. -Dennis

Re: voip calea interfaces

2006-06-20 Thread Fred Baker
On Jun 20, 2006, at 11:44 AM, Eric A. Hall wrote: This is interesting approach. For one, it seems to cover a lot more technology than CALEA requires. I suppose that is an artifact of trying to serve multiple countries' requiresments in a single architecture. Actually, no. IANAL US laws

Re: Silicon-germanium routers?

2006-06-20 Thread Chris Adams
Once upon a time, Warren Kumari [EMAIL PROTECTED] said: Nope, all this says is that with sufficient cooling you can go faster. What we need is going faster with less cooling. Read the article, not the headline. They got 350GHz at room temperature (which is a lot more interesting than 500GHz

Re: Silicon-germanium routers?

2006-06-20 Thread David W. Hankins
On Tue, Jun 20, 2006 at 12:59:54PM -0700, Tony Li wrote: Sure doesn't sound like it. In fact, it sound like they're pushing to a high frequency regardless of the power and thermal consequences. I thought their 500 Ghz number was just for rediculous press teasing, like the people who use lHe to

Re: Tor and network security/administration

2006-06-20 Thread Lionel Elie Mamane
On Mon, Jun 19, 2006 at 04:25:09PM -0400, Todd Vierling wrote: On 6/19/06, Lionel Elie Mamane [EMAIL PROTECTED] wrote: You don't do your financial transactions over HTTPS? If you do, by the very design of SSL, the tor exit node cannot add any HTTP header. That would be a man-in-the-middle

RE: voip calea interfaces

2006-06-20 Thread Frank Bulk
Sorry, I should have given a link to the actual archived copy: http://w.on24.com/r.htm?e=24039s=1k=38C852E931DEFE2A92A709EDE5FCF209partn erref=website The master list of event can be found on this page: http://www.ustelecom.org/webinars.php?urh=home.events.webinars Frank -Original

RE: key change for TCP-MD5

2006-06-20 Thread Ross Callon
At 12:12 PM 6/20/2006 -0700, Bora Akyol wrote: The draft allows you to have a set of keys in your keychain and the implementation tries all of them before declaring the segment as invalid. DoS against routers is of course a major concern. Using encryption has the potential of making DoS

RE: key change for TCP-MD5

2006-06-20 Thread Bora Akyol
Good comments, please see inline: -Original Message- From: Ross Callon [mailto:[EMAIL PROTECTED] Sent: Tuesday, June 20, 2006 2:06 PM To: Bora Akyol; nanog@merit.edu Subject: RE: key change for TCP-MD5 At 12:12 PM 6/20/2006 -0700, Bora Akyol wrote: The draft allows you to

Re: key change for TCP-MD5

2006-06-20 Thread Richard A Steenbergen
On Tue, Jun 20, 2006 at 05:06:27PM -0400, Ross Callon wrote: DoS against routers is of course a major concern. Using encryption has the potential of making DoS worse, in the sense that the amount of processing that a bogus packet can cause is increased by the amount of processing needed to

Re: Silicon-germanium routers?

2006-06-20 Thread Warren Kumari
The point that I was trying to make (admittedly REALLY badly) was that this is not the 'next big thing' . Did you read anything more than just that article? IBMs press release is here: http://www-03.ibm.com/technology/news/2006/0620_frozen_chip.html and they have a video here:

RE: key change for TCP-MD5

2006-06-20 Thread Randy Bush
The added cost for CPU-bound systems is that they have to try (potentially) multiple keys before getting the **right** key but in real life this can be easily mitigated by having a rating system on the key based on the frequency of success. This mitigates the effect of authenticating valid

Re: key change for TCP-MD5

2006-06-20 Thread Warren Kumari
On Jun 20, 2006, at 4:29 PM, Richard A Steenbergen wrote: We already collectively wasted our time deploying MD5 passwords over a big scare that turned out to be nothing more than someone cracking open the manual and rediscovering how stuff worked all along Bwahahahhahaha. I work with

Re: key change for TCP-MD5

2006-06-20 Thread Randy Bush
I'd still like someone to explain why we're wasting man hours, CPU time, filling up our router logs, and potentially making DoS easier, for an attack that doesn't exist. because the non-existent attack(s) have occurred. and keys have been compomised. randy