Re: Is there another NANOG somewhere?

2007-02-15 Thread Randy Bush
http://www1.ietf.org/mail-archive/web/ietf/current/msg45167.html is about volume. for me, it's not the volume, per se. it is the shameless and (should be) embarrassing self-promotion, the copying and reposting of others' ideas and work, ... and it's not only gadi, but he makes such a good

Re: Is there another NANOG somewhere?

2007-02-15 Thread Etaoin Shrdlu
Martin Hannigan wrote: there's Full Disclosure (another place where I have Gadi kill filed), Are you sure this isn't your own personal issue? yes It actually preserves some sanity. FD is so full of noise that I just read it via gmail. I long ago quit having it arrive here,

Re: Is there another NANOG somewhere?

2007-02-15 Thread william(at)elan.net
On Thu, 15 Feb 2007, Martin Hannigan wrote: http://www1.ietf.org/mail-archive/web/ietf/current/msg45167.html is about volume. for me, it's not the volume, per se. it is the shameless and (should be) embarrassing self-promotion, the copying and reposting of others' ideas and work, ... and

RE: Wireless Network Question

2007-02-15 Thread Frank Bulk
If you forced your customers use 802.1X for authentication they wouldn't get an IP address unless they were authorized. If 802.1X is not in the mix, another solution is to give them a very short lease (say 2 minutes) until they've completed web-based authentication, and then give them the

Re: wifi for 600, alex

2007-02-15 Thread Marshall Eubanks
The IETF experience is that enough people run 802.11a to take significant load off of the {b,g} network. Marshall On Feb 15, 2007, at 9:45 AM, Pickett, McLean (OCTO) wrote: Works well if everyone has 802.11a/g card. That's been my biggest concern with deploying 802.11a recently.

Re: wifi for 600, alex

2007-02-15 Thread Carl Karsten
That is a really nice list. Is there a wiki somewhere I could post this to? Carl K Suresh Ramasubramanian wrote: There are a few fairly easy things to do. 1. Don't do what most hotel networks do and think that simply sticking lots of $50 linksys routers into various rooms randomly does the

Re: wifi for 600, alex

2007-02-15 Thread Joe Abley
On 15-Feb-2007, at 10:39, Carl Karsten wrote: That is a really nice list. Is there a wiki somewhere I could post this to? http://nanog.cluepon.net/ !

RE: wifi for 600, alex

2007-02-15 Thread Anton Kapela
-Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Suresh Ramasubramanian Sent: Wednesday, February 14, 2007 6:25 PM To: Marshall Eubanks Cc: Carl Karsten; NANOG Subject: Re: wifi for 600, alex [snip] 2. Plan the network, number of APs based on

RBL for bots?

2007-02-15 Thread Drew Weaver
Has anyone created an RBL, much like (possibly) the BOGON list which includes the IP addresses of hosts which seem to be infected and are attempting to brute-force SSH/HTTP, etc? It would be fairly easy to setup a dozen or more honeypots and examine the logs in order to create an initial

Re: wifi for 600, alex

2007-02-15 Thread Robert E. Seastrom
Inasmuch as anyone with an ICBM (Intel-Chip-Based-Mac) has 802.11a capability, and such devices have been gaining increasing traction among geeks of late, I'm not surprised. The latest Airport Extreme base station from Apple is A/B/G/N (the Express is still b/g).

Re: DNS: Definitely Not Safe?

2007-02-15 Thread Robert E. Seastrom
Joe Abley [EMAIL PROTECTED] writes: i thought it was actually covered on-list... during the event, no? I don't think it was especially covered on this list (you are no doubt thinking of other lists). There was a lightning talk about it in Toronto, for which slides can be found in the usual

Re: RBL for bots?

2007-02-15 Thread Valdis . Kletnieks
On Thu, 15 Feb 2007 11:30:34 EST, Drew Weaver said: Has anyone created an RBL, much like (possibly) the BOGON list which includes the IP addresses of hosts which seem to be infected and are attempting to brute-force SSH/HTTP, etc? It would be fairly easy to setup a dozen or more

Re: RBL for bots?

2007-02-15 Thread Sean Donelan
On Thu, 15 Feb 2007, Drew Weaver wrote: Has anyone created an RBL, much like (possibly) the BOGON list which includes the IP addresses of hosts which seem to be infected and are attempting to brute-force SSH/HTTP, etc? Bots are rarely single purpose engines. If they have been detected

Paging ATT.com DNS master

2007-02-15 Thread David Ulevitch
You broke the zone for ATT.com. That's probably not good. -david $ dig @ns3.attdns.com att.com ; DiG 9.2.2 @ns3.attdns.com att.com ;; global options: printcmd ;; Got answer: ;; -HEADER- opcode: QUERY, status: NXDOMAIN, id: 940 ;; flags: qr aa rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0,

Re: RBL for bots?

2007-02-15 Thread Joel Jaeggli
[EMAIL PROTECTED] wrote: On Thu, 15 Feb 2007 11:30:34 EST, Drew Weaver said: Has anyone created an RBL, much like (possibly) the BOGON list which includes the IP addresses of hosts which seem to be infected and are attempting to brute-force SSH/HTTP, etc? It would be fairly easy to

Re: RBL for bots?

2007-02-15 Thread Valdis . Kletnieks
On Thu, 15 Feb 2007 09:16:27 PST, Joel Jaeggli said: [EMAIL PROTECTED] wrote: 2) How important is it that you even accept connections from *anywhere* in that DHCP block? That depends... Do you sell Internet service to you customers or something else. If the former then they're

Re: wifi for 600, alex

2007-02-15 Thread Christian Kuhtz
On Feb 15, 2007, at 10:57 AM, Anton Kapela wrote: Speaking from experiences at Nanog and abroad, this has proven difficult (more like impossible) to achieve to the degree of success engineers would expect. In an ideal world, client hardware makers would all implement sane, rational, and

Re: Solaris telnet vuln solutions digest and network risks

2007-02-15 Thread Joseph S D Yao
On Tue, Feb 13, 2007 at 07:22:51PM -0600, Gadi Evron wrote: ... 2. If you haven't already, I strongly recommend checking your network for machines running telnet, and more specifcially, vulnerable to this particular issue. NO. The telnet DAEMON. NOT telnet. *sigh* Too many releases

RE: wifi for 600, alex

2007-02-15 Thread Anton Kapela
There are things underway that can mitigate some of this, neighbor lists for example. For the sake of the lists topic centrism, I was avoiding getting into points like that. :) Which brings me to the part about: Hmm. I think it would be good to frame which parts of a CDMA system

tracking fiber assets

2007-02-15 Thread Daniel J McDonald
What do people use to keep track of fiber-optic assets? We own fiber on electric transmission lines - a hundred spans or so, mostly 24-48 count, about 800-900 total route-miles. But we lack a tool to keep track of what is in use, which customers would be affected when we perform maintenance,

Re: RBL for bots?

2007-02-15 Thread Matthew Sullivan
Drew Weaver wrote: Has anyone created an RBL, much like (possibly) the BOGON list which includes the IP addresses of hosts which seem to be infected and are attempting to brute-force SSH/HTTP, etc? It would be fairly easy to setup a dozen or more honeypots and examine the logs in order

Re: RBL for bots?

2007-02-15 Thread Gadi Evron
On Thu, 15 Feb 2007 [EMAIL PROTECTED] wrote: On Thu, 15 Feb 2007 11:30:34 EST, Drew Weaver said: Has anyone created an RBL, much like (possibly) the BOGON list which includes the IP addresses of hosts which seem to be infected and are attempting to brute-force SSH/HTTP, etc? No BL

Re: wifi for 600, alex

2007-02-15 Thread Christian Kuhtz
On Feb 15, 2007, at 4:22 PM, Anton Kapela wrote: [..] Anyway, I don't mean to stray too far off topic, but indeed there are many 'good' things already designed (some decades ago) and understood within the wireless community which would be well to appear in .11 at some point. Hopefully my

Re: botnets: web servers, end-systems and Vint Cerf

2007-02-15 Thread Peter Moody
systems were botted. Just a little while back, Vint Cerf guesstimated that there's 140 million botted end user boxes. Unless 100% of Google's servers are botted, there's no way there's that many botted servers. :) I kept quiet on this for a while, but honestly, I appreciate Vint Cerf

Re: botnets: web servers, end-systems and Vint Cerf

2007-02-15 Thread Gadi Evron
On Thu, 15 Feb 2007, Peter Moody wrote: I kept quiet on this for a while, but honestly, I appreciate Vint Cerf mentioning this where he did, and raising awareness among people who can potentially help us solve the problem of the Internet. Still, although I kept quiet for a while, us

The Root of The Problem [Was: Re: botnets: web servers, end-systems an d Vint Cerf]

2007-02-15 Thread Fergie
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Well, I'm going to add my $.02 here, too, and I don't care who likes it or not. :-) I know Vint, and I've known Vint for a long time. He's a smart guy. And he's right. Why is he right? Because he got in front of the folks who actually _can_

Re: The Root of The Problem [Was: Re: botnets: web servers, end-systems an d Vint Cerf]

2007-02-15 Thread Gadi Evron
On Fri, 16 Feb 2007, Fergie wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Well, I'm going to add my $.02 here, too, and I don't care who likes it or not. :-) I know Vint, and I've known Vint for a long time. He's a smart guy. And he's right. Why is he right? Because he

Re: botnets: web servers, end-systems and Vint Cerf

2007-02-15 Thread Valdis . Kletnieks
On Thu, 15 Feb 2007 21:54:00 CST, Gadi Evron said: And the fact that web servers are getting botted is just the cycle of reincarnation - it wasn't that long ago that .edu's had a reputation of getting pwned for the exact same reasons that webservers are targets now: easy to attack, and