http://www1.ietf.org/mail-archive/web/ietf/current/msg45167.html is
about volume.
for me, it's not the volume, per se. it is the shameless and (should
be) embarrassing self-promotion, the copying and reposting of others'
ideas and work, ... and it's not only gadi, but he makes such a good
Martin Hannigan wrote:
there's Full Disclosure (another place where I have Gadi kill filed),
Are you sure this isn't your own personal issue?
yes
It actually preserves some sanity. FD is so full of noise that I just
read it via gmail. I long ago quit having it arrive here,
On Thu, 15 Feb 2007, Martin Hannigan wrote:
http://www1.ietf.org/mail-archive/web/ietf/current/msg45167.html is
about volume.
for me, it's not the volume, per se. it is the shameless and (should
be) embarrassing self-promotion, the copying and reposting of others'
ideas and work, ... and
If you forced your customers use 802.1X for authentication they wouldn't get
an IP address unless they were authorized.
If 802.1X is not in the mix, another solution is to give them a very short
lease (say 2 minutes) until they've completed web-based authentication, and
then give them the
The IETF experience is that enough people run 802.11a to take
significant load off of the {b,g} network.
Marshall
On Feb 15, 2007, at 9:45 AM, Pickett, McLean (OCTO) wrote:
Works well if everyone has 802.11a/g card. That's been my biggest
concern
with deploying 802.11a recently.
That is a really nice list. Is there a wiki somewhere I could post this to?
Carl K
Suresh Ramasubramanian wrote:
There are a few fairly easy things to do.
1. Don't do what most hotel networks do and think that simply sticking
lots of $50 linksys routers into various rooms randomly does the
On 15-Feb-2007, at 10:39, Carl Karsten wrote:
That is a really nice list. Is there a wiki somewhere I could post
this to?
http://nanog.cluepon.net/ !
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Suresh Ramasubramanian
Sent: Wednesday, February 14, 2007 6:25 PM
To: Marshall Eubanks
Cc: Carl Karsten; NANOG
Subject: Re: wifi for 600, alex
[snip]
2. Plan the network, number of APs based on
Has anyone created an RBL, much like (possibly) the BOGON list which
includes the IP addresses of hosts which seem to be infected and are
attempting to brute-force SSH/HTTP, etc?
It would be fairly easy to setup a dozen or more honeypots and examine
the logs in order to create an initial
Inasmuch as anyone with an ICBM (Intel-Chip-Based-Mac) has 802.11a
capability, and such devices have been gaining increasing traction
among geeks of late, I'm not surprised. The latest Airport Extreme
base station from Apple is A/B/G/N (the Express is still b/g).
Joe Abley [EMAIL PROTECTED] writes:
i thought it was actually covered on-list... during the event, no?
I don't think it was especially covered on this list (you are no
doubt thinking of other lists). There was a lightning talk about it
in Toronto, for which slides can be found in the usual
On Thu, 15 Feb 2007 11:30:34 EST, Drew Weaver said:
Has anyone created an RBL, much like (possibly) the BOGON list which
includes the IP addresses of hosts which seem to be infected and are
attempting to brute-force SSH/HTTP, etc?
It would be fairly easy to setup a dozen or more
On Thu, 15 Feb 2007, Drew Weaver wrote:
Has anyone created an RBL, much like (possibly) the BOGON list which
includes the IP addresses of hosts which seem to be infected and are
attempting to brute-force SSH/HTTP, etc?
Bots are rarely single purpose engines. If they have been detected
You broke the zone for ATT.com.
That's probably not good.
-david
$ dig @ns3.attdns.com att.com
; DiG 9.2.2 @ns3.attdns.com att.com
;; global options: printcmd
;; Got answer:
;; -HEADER- opcode: QUERY, status: NXDOMAIN, id: 940
;; flags: qr aa rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0,
[EMAIL PROTECTED] wrote:
On Thu, 15 Feb 2007 11:30:34 EST, Drew Weaver said:
Has anyone created an RBL, much like (possibly) the BOGON list which
includes the IP addresses of hosts which seem to be infected and are
attempting to brute-force SSH/HTTP, etc?
It would be fairly easy to
On Thu, 15 Feb 2007 09:16:27 PST, Joel Jaeggli said:
[EMAIL PROTECTED] wrote:
2) How important is it that you even accept connections from *anywhere* in
that DHCP block?
That depends...
Do you sell Internet service to you customers or something else. If
the former then they're
On Feb 15, 2007, at 10:57 AM, Anton Kapela wrote:
Speaking from experiences at Nanog and abroad, this has proven
difficult
(more like impossible) to achieve to the degree of success engineers
would expect. In an ideal world, client hardware makers would all
implement sane, rational, and
On Tue, Feb 13, 2007 at 07:22:51PM -0600, Gadi Evron wrote:
...
2. If you haven't already, I strongly recommend checking your network for
machines running telnet, and more specifcially, vulnerable to this
particular issue.
NO. The telnet DAEMON. NOT telnet. *sigh* Too many releases
There are things underway that can mitigate some of this,
neighbor lists for example.
For the sake of the lists topic centrism, I was avoiding getting into
points like that. :) Which brings me to the part about:
Hmm. I think it would be good to frame which parts of a CDMA
system
What do people use to keep track of fiber-optic assets? We own fiber on
electric transmission lines - a hundred spans or so, mostly 24-48 count,
about 800-900 total route-miles. But we lack a tool to keep track of
what is in use, which customers would be affected when we perform
maintenance,
Drew Weaver wrote:
Has anyone created an RBL, much like (possibly) the BOGON list
which includes the IP addresses of hosts which seem to be infected
and are attempting to brute-force SSH/HTTP, etc?
It would be fairly easy to setup a dozen or more honeypots and examine
the logs in order
On Thu, 15 Feb 2007 [EMAIL PROTECTED] wrote:
On Thu, 15 Feb 2007 11:30:34 EST, Drew Weaver said:
Has anyone created an RBL, much like (possibly) the BOGON list which
includes the IP addresses of hosts which seem to be infected and are
attempting to brute-force SSH/HTTP, etc?
No BL
On Feb 15, 2007, at 4:22 PM, Anton Kapela wrote:
[..]
Anyway, I don't mean to stray too far off topic, but indeed there are
many 'good' things already designed (some decades ago) and understood
within the wireless community which would be well to appear in .11 at
some point. Hopefully my
systems were botted. Just a little while back, Vint Cerf guesstimated
that
there's 140 million botted end user boxes. Unless 100% of Google's
servers
are botted, there's no way there's that many botted servers. :)
I kept quiet on this for a while, but honestly, I appreciate Vint Cerf
On Thu, 15 Feb 2007, Peter Moody wrote:
I kept quiet on this for a while, but honestly, I appreciate Vint Cerf
mentioning this where he did, and raising awareness among people who can
potentially help us solve the problem of the Internet.
Still, although I kept quiet for a while, us
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Well, I'm going to add my $.02 here, too, and I don't care who
likes it or not. :-)
I know Vint, and I've known Vint for a long time.
He's a smart guy. And he's right.
Why is he right?
Because he got in front of the folks who actually _can_
On Fri, 16 Feb 2007, Fergie wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Well, I'm going to add my $.02 here, too, and I don't care who
likes it or not. :-)
I know Vint, and I've known Vint for a long time.
He's a smart guy. And he's right.
Why is he right?
Because he
On Thu, 15 Feb 2007 21:54:00 CST, Gadi Evron said:
And the fact that web servers are getting botted is just the cycle of
reincarnation - it wasn't that long ago that .edu's had a reputation of
getting pwned for the exact same reasons that webservers are targets now:
easy to attack, and
28 matches
Mail list logo