Re: Phone adapter with router

2015-03-12 Thread Brandon Galbraith
Quick hijack: Can anyone recommend a device that will terminate to a
phone, supports SIP, *and* can fallback to SIM for emergency calls?

On Tue, Mar 10, 2015 at 8:44 AM, Pedersen, Sean speder...@io.com wrote:
 +1

 Used them in a past life as a SIP ALG and NAT router for a “bring your own 
 broadband” hosted SIP service. Worked well enough.

 You might get more suggestions if you provide a little bit more about what 
 your requirements are, how they’re being deployed (one-off, ISP, etc.), or 
 what the others didn’t do well.



 On 3/9/15, 11:16 PM, Joe Hamelin j...@nethead.com wrote:

I've run into a few of these and they seem to do a good job.

ftp://ftp.edgewaternetworks.com/pub/docs/CD_contents/DOCS/EdgeMarc/200/200%20Series%20Datasheet.pdf

--
Joe Hamelin, W7COM, Tulalip, WA, 360-474-7474

On Mon, Mar 9, 2015 at 4:07 PM, A MEKKAOUI amekka...@mektel.ca wrote:

 Hi



 Do you know any good router with phone adapters to provide home phone and
 internet? We tried couple of them like Linksys, Thomson, etc. and no one
 does the job perfectly. Any comment will be appreciated.



 Thank you



 Karim






 Founded in 2007, IO provides the data center as a service to businesses and 
 governments around the world.

 The communication contained in this e-mail is confidential and is intended 
 only for the named recipient(s) and may contain information that is 
 privileged, proprietary, attorney work product or exempt from disclosure 
 under applicable law. If you have received this message in error, or are not 
 the named recipient(s), please note that any form of distribution, copying or 
 use of this communication or the information in it is strictly prohibited and 
 may be unlawful. Please immediately notify the sender of the error, and 
 delete this communication including any attached files from your system. 
 Thank you for your cooperation.


Re: distinguishing eBGP from show ip BGP

2015-03-12 Thread Mark Tinka



On 11/Mar/15 21:18, Jared Mauch wrote:


Similarly send-community on IOS requires beyond the basic “neighbor 1.2.3.4 
remote-as 5” type config.


One has the same issue in IOS XR, where BGP communities are only 
signaled by default for iBGP neighbors. One needs to enable signaling of 
communities to eBGP neighbors.


Junos does the right thing :-).

Mark.


FCC releases Open Internet document

2015-03-12 Thread Ca By
For the first time to the public
http://transition.fcc.gov/Daily_Releases/Daily_Business/2015/db0312/FCC-15-24A1.pdf

Enjoy.


RE: Searching for a quote

2015-03-12 Thread Keith Medcalf

Robustness is desirable from a security perspective.  Failure to be liberal in 
what you accept and not being prepared to deal with malformed input leads to 
such wonders as the Microsoft bug that led to unexpected/malformed IP datagrams 
mishandled as execute payload with system authority.  Rather than sloppiness 
you could also attribute the error to malice -- that it was injected at the 
specific request of certain government agencies, perhaps under threat, perhaps 
with just a wink and a nod ...

---
Theory is when you know everything but nothing works.  Practice is when 
everything works but no one knows why.  Sometimes theory and practice are 
combined:  nothing works and no one knows why.


-Original Message-
From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of Michael Thomas
Sent: Thursday, 12 March, 2015 18:32
To: nanog@nanog.org
Subject: Re: Searching for a quote

Jon Postel. I'm told that it is out of favor these days in protocol-land,
from a security standpoint if nothing else.

Mike

On 3/12/15 5:24 PM, Tom Paseka wrote:
 Be conservative in what you send, be liberal in what you accept

 ^http://en.wikipedia.org/wiki/Robustness_principle

 On Thu, Mar 12, 2015 at 5:20 PM, Jason Iannone
jason.iann...@gmail.com
 wrote:

 There was once a fairly common saying attributed to an early
 networking pioneer that went something like, be generous in what you
 accept, and send only the stuff that should be sent.  Does anyone
 know what I'm talking about or who said it?







Re: Searching for a quote

2015-03-12 Thread Rich Kulawiec
On Thu, Mar 12, 2015 at 05:33:19PM -0700, Dave Taht wrote:
 Had he lived, email and netnews would have remained usable by mere
 mortals and met the challenge of extreme growth and abuse. And ICANN,
 and for that netsol, wouldn't have become the ugly morass they became.
 Hell, even the IETF might have remained viable.

Indeed.  That sentiment, and his memory, deserve a toast of MacAllan 18-year.

And they shall have it momentarily.

---rsk


Re: FCC releases Open Internet document

2015-03-12 Thread shawn wilson
On Mar 12, 2015 11:01 AM, Ca By cb.li...@gmail.com wrote:

 For the first time to the public

http://transition.fcc.gov/Daily_Releases/Daily_Business/2015/db0312/FCC-15-24A1.pdf

 Enjoy.

Uh yeah, I'll wait for the reviews when y'all get done trudging through
that...


Brocade CES Routing Table Issue

2015-03-12 Thread Jordan Hamilton
I have been troubleshooting an issue with Brocade TAC in regards to our Brocade 
CES that we use for some static routing.  The Firmware has been upgraded and 
hardware has been replaced and still the problem is occurring.  I have talked 
to some other carriers I work with that have previously used Brocade gear and 
switched because of odd issues that could not be resolved.  Curious if anyone 
on this list has had other odd Layer 3 issues with Brocade/Foundry Networks 
gear?  My issue seems to be somehow related to the table in memory that the ARP 
and next-hop entries are stored in, entries will point to the wrong mac address 
or the wrong port for the next-hop, it happens about every 60 days like 
clockwork.

Jordan Hamilton
Telecommunications Engineer

Empire District Electric Co.
720 Schifferdecker
PO Box 127
Joplin, MO 64802

Ph:  417-625-4223
Cell:  417-388-3351


--
Note: To protect against computer viruses, e-mail programs may prevent sending 
or receiving certain types of file attachments.  Check your e-mail security 
settings to determine how attachments are handled.

--
This e-mail and any files transmitted with it are the property of THE EMPIRE 
DISTRICT ELECTRIC COMPANY, are confidential, and are intended solely for the 
use of the individual or entity to whom this email is addressed. If you are not 
one of the named recipients or otherwise have reason to believe that you have 
received this message in error, please delete this message immediately from 
your computer and contact the sender by telephone at (417)-625-5100.
Any other use, retention, dissemination, forwarding, printing or copying of 
this email is strictly prohibited.


Re: FCC releases Open Internet document

2015-03-12 Thread Lamar Owen

On 03/12/2015 12:13 PM, Bryan Tong wrote:
I read through the introduction. This document seems like a good thing 
for everyone.



I'm about 50 pages in, reading a little bit at a time.  Paragraph 31 is 
one that anyone who does peering or exchanges should read and 
understand.  I take it to mean something like 'Guys who abuse peering 
and engage in peering disputes, take note of what we just did to the 
last mile people; you have been warned.'  But, having read Commission 
RO's before on the broadcast (Media Bureau) side of the house for 
years, maybe I'm a bit cynical.


Paragraphs 37 through 40, including footnotes, appear tailored as a 
reply to Verizon's creative Morse reply.  It's impossible to know which 
was first, but it is an interesting thought.


The 'Verizon Court' is mentioned numerous times.  Paragraph43 and 
footnote 40 mention the 'Brand X' decision of the Supreme Court, 
mentioning that that decision left open the reclassification avenue.  
This could cause any legislation that attempted to thwart this RO to 
eventually be ruled unconstitutional, citing Brand X.  Prior to reading 
this RO I wasn't familiar with this decision, so I've already learned 
something new.and I think the reference in paragraph 43, footnote 
41, is rather interesting as well.  And Justice Scalia's pizza delivery 
analogy makes a humorous (in the political context!) appearance.  
Delightful.


Paragraphs 60 through 74 give a concise history of the action, and are a 
great read.  And it also shows me that I should have paid a bit closer 
attention to the Part 8 I read a few days back; that's the part 8 from 
the RO of 2010; the part 8 as of today in the eCFR has not been updated 
with the new sections, including 8.18.  So the rules as set into place 
by this RO were not public earlier; I stand corrected.


Paragraphs 78 through 85 and associated footnotes (I found footnote 131 
particularly relevant) state in a nutshell why the FCC thought that this 
action had to be taken.  And I am just in awe of the first sentence of 
paragraph 92.  And paragraph 99 is spot-on on wireless carrier switching 
costs.


One of the more interesting side effects of this is that it would appear 
that a mass-market BIAS (the FCC's term, not mine, for Broadband 
Internet Access Service) provider cannot block outbound port 25 (RO 
paragraph 105 and footnote 241 in particular). Well, it does depend upon 
what Paragraph 113 means about a device that 'does not harm the network.'


Whether you agree with the RO or not, I believe that you will find it a 
very readable document.  Some will no doubt strongly disagree.






Re: FCC releases Open Internet document

2015-03-12 Thread Livingood, Jason
Note: IANAL and this is my *personal* reading (in no way the view of my
employer). I¹m only 7 pages in as well, so this is likely under-informed
and in another 300+ pages I will become more enlightened...

Part A.16. No Throttling. ...A person engaged in the provision of
broadband Internet access service, insofar as such person is
so engaged, shall not impair or degrade lawful Internet traffic on the
basis of Internet content,application, or service, or use of a non-harmful
device, subject to reasonable network management.

They then say in A.17 (which is not the rule I don¹t think but still
probably carries weight in some way) ...It prohibits the degrading of
Internet traffic based on source, destination, or content.

Unfortunately the rule itself only seems to speak to content, not source
or destination. Did someone miss adding that to the rule?

- Jason








Re: FCC releases Open Internet document

2015-03-12 Thread William Kenny
Page 7 -14 looks to be pretty important. Specifcially:

NO BLOCKING:
A person engaged in the provision of broadband Internet access service,
insofar as such person is so engaged, shall not block lawful content,
applications, services, or nonharmful devices, subject to reasonable
network management.

NO THROTTLING:
A person engaged in the provision of broadband Internet access service,
insofar as such person is so engaged, shall not impair or degrade lawful
Internet traffic on the basis of Internet content, application, or service,
or use of a non-harmful device, subject to reasonable network management.

NO PAID PRIORITIZATION:
A person engaged in the provision of broadband Internet access service,
insofar as such person is so engaged, shall not engage in paid
prioritization.

There is also an interesting bit on gatekeeping:
Any person engaged in the provision of broadband Internet access service,
insofar as such person is so engaged, shall not unreasonably interfere with
or unreasonably disadvantage (i) end users’ ability to select, access, and
use broadband Internet access service or the lawful Internet content,
applications, services, or devices of their choice, or (ii) edge providers’
ability to make lawful content, applications, services, or devices
available to end users. Reasonable network management shall not be
considered a violation of this rule.

I think there are going to be a lot of complex implications of this
announcement (canidate for most obvious statement aware winner!).

On Thu, Mar 12, 2015 at 10:32 AM, shawn wilson ag4ve...@gmail.com wrote:

 On Mar 12, 2015 11:01 AM, Ca By cb.li...@gmail.com wrote:
 
  For the first time to the public
 

 http://transition.fcc.gov/Daily_Releases/Daily_Business/2015/db0312/FCC-15-24A1.pdf
 
  Enjoy.

 Uh yeah, I'll wait for the reviews when y'all get done trudging through
 that...



Re: Unlawful transfers of content and transfers of unlawful content

2015-03-12 Thread Lamar Owen

On 03/12/2015 04:58 PM, Donald Kasper wrote:



More then website blocking I've been wondering what this means for 
spam prevention?


That's a pretty interesting thought, and it is pretty well addressed by 
paragraphs 376, 377, and 378.  Basically, the FCC found that spam 
blocking is a separate add-on information service.  It may be that the 
consumer now must opt-in to that service after clear disclosure of what 
the service entails.  The FCC even found that DNS is not an information 
service (paragraphs 366-371), and the argument is compelling.  This 
Commission is not technically illiterate, that's for sure, whether you 
agree with the RO or not.




Re: FCC releases Open Internet document

2015-03-12 Thread Lamar Owen

On 03/12/2015 02:02 PM, Rob McEwen wrote:
Nevertheless, in such a circumstance, 47 USC 230(c)(2) should prevail 
and trump any such interpretation of this!


(If anyone thinks that 47 USC 230(c)(2) might not prevail over such an 
interpretation, please let me know... and let me know why?)


Found it; paragraph 532 addresses 230(c).  In a nutshell, the 
applicability does not change due to the reclassification of BIAS 
providers as telecommunications services.




Re: FCC releases Open Internet document

2015-03-12 Thread Lamar Owen

On 03/12/2015 10:58 AM, Ca By wrote:

For the first time to the public
http://transition.fcc.gov/Daily_Releases/Daily_Business/2015/db0312/FCC-15-24A1.pdf



The actual final rules are in Appendix A, pages 283 through 290 (8 
pages), although that's a bit misleading, as the existing Part 8 is not 
included in full in that Appendix.There are also three amendments to 
Part 20, as well, in the Definitions, which means other paragraphs of 
Part 20 may apply.


It's interesting that pages 321 through 400 (80 pages) are taken up 
entirely by the dissenting Commissioner's statements, and Tom Wheeler's 
statement begins on page 314.


This will indeed be an interesting read.



Google served from non-google IPs?

2015-03-12 Thread Jason Lixfeld
So today, I saw this:

BlackBox:~ jlixfeld$ host google.ca 8.8.8.8
Using domain server:
Name: 8.8.8.8
Address: 8.8.8.8#53
Aliases:

google.ca has address 206.126.112.166
google.ca has address 206.126.112.177
google.ca has address 206.126.112.172
google.ca has address 206.126.112.187
google.ca has address 206.126.112.151
google.ca has address 206.126.112.158
google.ca has address 206.126.112.157
google.ca has address 206.126.112.173
google.ca has address 206.126.112.181
google.ca has address 206.126.112.155
google.ca has address 206.126.112.147
google.ca has address 206.126.112.185
google.ca has address 206.126.112.143
google.ca has address 206.126.112.170
google.ca has address 206.126.112.162
google.ca has IPv6 address 2607:f8b0:4006:808::100f
google.ca mail is handled by 50 alt4.aspmx.l.google.com.
google.ca mail is handled by 30 alt2.aspmx.l.google.com.
google.ca mail is handled by 20 alt1.aspmx.l.google.com.
google.ca mail is handled by 10 aspmx.l.google.com.
google.ca mail is handled by 40 alt3.aspmx.l.google.com.
BlackBox:~ jlixfeld$

That is not Google IPv4 address space, and those IPv4 IPs are not being 
announced by 15169.

Am I dumb in thinking that this is weird or is this sort of thing commonplace?

Re: Google served from non-google IPs?

2015-03-12 Thread Eduardo Schoedler
Look for GGC.

--
Eduardo Schoedler


2015-03-12 16:58 GMT-03:00 Jason Lixfeld ja...@lixfeld.ca:

 So today, I saw this:

 BlackBox:~ jlixfeld$ host google.ca 8.8.8.8
 Using domain server:
 Name: 8.8.8.8
 Address: 8.8.8.8#53
 Aliases:

 google.ca has address 206.126.112.166
 google.ca has address 206.126.112.177
 google.ca has address 206.126.112.172
 google.ca has address 206.126.112.187
 google.ca has address 206.126.112.151
 google.ca has address 206.126.112.158
 google.ca has address 206.126.112.157
 google.ca has address 206.126.112.173
 google.ca has address 206.126.112.181
 google.ca has address 206.126.112.155
 google.ca has address 206.126.112.147
 google.ca has address 206.126.112.185
 google.ca has address 206.126.112.143
 google.ca has address 206.126.112.170
 google.ca has address 206.126.112.162
 google.ca has IPv6 address 2607:f8b0:4006:808::100f
 google.ca mail is handled by 50 alt4.aspmx.l.google.com.
 google.ca mail is handled by 30 alt2.aspmx.l.google.com.
 google.ca mail is handled by 20 alt1.aspmx.l.google.com.
 google.ca mail is handled by 10 aspmx.l.google.com.
 google.ca mail is handled by 40 alt3.aspmx.l.google.com.
 BlackBox:~ jlixfeld$

 That is not Google IPv4 address space, and those IPv4 IPs are not being
 announced by 15169.

 Am I dumb in thinking that this is weird or is this sort of thing
 commonplace?




-- 
Eduardo Schoedler


Unlawful transfers of content and transfers of unlawful content (was:Re: Verizon Policy Statement on Net Neutrality)

2015-03-12 Thread Lamar Owen

On 02/27/2015 02:14 PM, Jim Richardson wrote:

What's a lawful web site?

Paragraphs 304 and 305 in today's released RO address some of this.  
The wording 'Unlawful transfers of content and transfers of unlawful 
content' is pretty good, and covers what the Commission wanted to cover.




Re: Google served from non-google IPs?

2015-03-12 Thread Stephen Fulton

Local Google caches at QIX?

-- Stephen

On 2015-03-12 3:58 PM, Jason Lixfeld wrote:

So today, I saw this:

BlackBox:~ jlixfeld$ host google.ca 8.8.8.8
Using domain server:
Name: 8.8.8.8
Address: 8.8.8.8#53
Aliases:

google.ca has address 206.126.112.166
google.ca has address 206.126.112.177
google.ca has address 206.126.112.172
google.ca has address 206.126.112.187
google.ca has address 206.126.112.151
google.ca has address 206.126.112.158
google.ca has address 206.126.112.157
google.ca has address 206.126.112.173
google.ca has address 206.126.112.181
google.ca has address 206.126.112.155
google.ca has address 206.126.112.147
google.ca has address 206.126.112.185
google.ca has address 206.126.112.143
google.ca has address 206.126.112.170
google.ca has address 206.126.112.162
google.ca has IPv6 address 2607:f8b0:4006:808::100f
google.ca mail is handled by 50 alt4.aspmx.l.google.com.
google.ca mail is handled by 30 alt2.aspmx.l.google.com.
google.ca mail is handled by 20 alt1.aspmx.l.google.com.
google.ca mail is handled by 10 aspmx.l.google.com.
google.ca mail is handled by 40 alt3.aspmx.l.google.com.
BlackBox:~ jlixfeld$

That is not Google IPv4 address space, and those IPv4 IPs are not being 
announced by 15169.

Am I dumb in thinking that this is weird or is this sort of thing commonplace?



Re: Google served from non-google IPs?

2015-03-12 Thread Trent Farrell
^ my thought, they're on the QIX public block

On Thu, Mar 12, 2015 at 1:00 PM, Stephen Fulton s...@lists.esoteric.ca
wrote:

 Local Google caches at QIX?

 -- Stephen


 On 2015-03-12 3:58 PM, Jason Lixfeld wrote:

 So today, I saw this:

 BlackBox:~ jlixfeld$ host google.ca 8.8.8.8
 Using domain server:
 Name: 8.8.8.8
 Address: 8.8.8.8#53
 Aliases:

 google.ca has address 206.126.112.166
 google.ca has address 206.126.112.177
 google.ca has address 206.126.112.172
 google.ca has address 206.126.112.187
 google.ca has address 206.126.112.151
 google.ca has address 206.126.112.158
 google.ca has address 206.126.112.157
 google.ca has address 206.126.112.173
 google.ca has address 206.126.112.181
 google.ca has address 206.126.112.155
 google.ca has address 206.126.112.147
 google.ca has address 206.126.112.185
 google.ca has address 206.126.112.143
 google.ca has address 206.126.112.170
 google.ca has address 206.126.112.162
 google.ca has IPv6 address 2607:f8b0:4006:808::100f
 google.ca mail is handled by 50 alt4.aspmx.l.google.com.
 google.ca mail is handled by 30 alt2.aspmx.l.google.com.
 google.ca mail is handled by 20 alt1.aspmx.l.google.com.
 google.ca mail is handled by 10 aspmx.l.google.com.
 google.ca mail is handled by 40 alt3.aspmx.l.google.com.
 BlackBox:~ jlixfeld$

 That is not Google IPv4 address space, and those IPv4 IPs are not being
 announced by 15169.

 Am I dumb in thinking that this is weird or is this sort of thing
 commonplace?




-- 

*Trent Farrell*

*Riot Games*

*IP Network Engineer*

E: tfarr...@riotgames.com | IE:  +353 83 446 6809 | US: +1 424 285 9825

Summoner name: Foro


Re: Google served from non-google IPs?

2015-03-12 Thread Steven Schecter
Those IPs appear to be used by to Google cache servers at the QIX.  It's
common for CDNs to utilize provider space and not maintain their own
layer-3.  E.g. cache servers connected to switch, connected to provider,
without the requirement of a router.


/Steve

On Thu, Mar 12, 2015 at 3:58 PM, Jason Lixfeld ja...@lixfeld.ca wrote:

 So today, I saw this:

 BlackBox:~ jlixfeld$ host google.ca 8.8.8.8
 Using domain server:
 Name: 8.8.8.8
 Address: 8.8.8.8#53
 Aliases:

 google.ca has address 206.126.112.166
 google.ca has address 206.126.112.177
 google.ca has address 206.126.112.172
 google.ca has address 206.126.112.187
 google.ca has address 206.126.112.151
 google.ca has address 206.126.112.158
 google.ca has address 206.126.112.157
 google.ca has address 206.126.112.173
 google.ca has address 206.126.112.181
 google.ca has address 206.126.112.155
 google.ca has address 206.126.112.147
 google.ca has address 206.126.112.185
 google.ca has address 206.126.112.143
 google.ca has address 206.126.112.170
 google.ca has address 206.126.112.162
 google.ca has IPv6 address 2607:f8b0:4006:808::100f
 google.ca mail is handled by 50 alt4.aspmx.l.google.com.
 google.ca mail is handled by 30 alt2.aspmx.l.google.com.
 google.ca mail is handled by 20 alt1.aspmx.l.google.com.
 google.ca mail is handled by 10 aspmx.l.google.com.
 google.ca mail is handled by 40 alt3.aspmx.l.google.com.
 BlackBox:~ jlixfeld$

 That is not Google IPv4 address space, and those IPv4 IPs are not being
 announced by 15169.

 Am I dumb in thinking that this is weird or is this sort of thing
 commonplace?




-- 
Steven J. Schecter
(m) 917.676.1646


Re: FCC releases Open Internet document

2015-03-12 Thread Lamar Owen

On 03/12/2015 01:28 PM, Lamar Owen wrote:

On 03/12/2015 12:13 PM, Bryan Tong wrote:
I read through the introduction. This document seems like a good 
thing for everyone.



I'm about 50 pages in, reading a little bit at a time.  Paragraph 31 
is one that anyone who does peering or exchanges should read and 
understand.  I take it to mean something like 'Guys who abuse peering 
and engage in peering disputes, take note of what we just did to the 
last mile people; you have been warned.'  But, having read Commission 
RO's before on the broadcast (Media Bureau) side of the house for 
years, maybe I'm a bit cynical.
Another 40 pages, and found the detailed paragraphs related to this 
introductory paragraph.  Those here who know how peering works in the 
real world, read paragraphs 194 through 206 of this RO, including 
footnotes, and see if the FCC 'gets it' when it comes to how peering works.




RE: Brocade CES Routing Table Issue

2015-03-12 Thread Tony Wicks
I regularly had this many years ago with the old Foundry Big Irons, the
Route table on the processor would have the correct information but an
individual forwarding table on a line card would be out of sync causing
randomly occurring route loops. They never did fix it and that was the last
time I used them with full internet route tables. This being said I saw
similar issues (that were resolved) on Unisphere (now Juniper) and Extreme
kit.

-Original Message-
From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of Jordan Hamilton
Sent: Friday, 13 March 2015 2:48 a.m.
To: nanog@nanog.org
Subject: Brocade CES Routing Table Issue

I have been troubleshooting an issue with Brocade TAC in regards to our
Brocade CES that we use for some static routing.  The Firmware has been
upgraded and hardware has been replaced and still the problem is occurring.
I have talked to some other carriers I work with that have previously used
Brocade gear and switched because of odd issues that could not be resolved.
Curious if anyone on this list has had other odd Layer 3 issues with
Brocade/Foundry Networks gear?  My issue seems to be somehow related to the
table in memory that the ARP and next-hop entries are stored in, entries
will point to the wrong mac address or the wrong port for the next-hop, it
happens about every 60 days like clockwork.




Re: FCC releases Open Internet document

2015-03-12 Thread Rob McEwen

On 3/12/2015 1:30 PM, William Kenny wrote:

NO BLOCKING:
A person engaged in the provision of broadband Internet access service,
insofar as such person is so engaged, shall not block lawful content,
applications, services, or nonharmful devices, subject to reasonable
network management.


The document (if I read it correctly) states that reasonable network 
management includes spam filtering (yeah!)


However, in spite of that... it seems to give the MISTAKEN impression that:

(1) ALL spam is ALWAYS... NOT-lawful content
(2) ALL lawful content is NEVER spam.

(again, I'm not saying the document says this directly... only that it 
seems to give that impression at times!)


But, in fact, there is actually MUCH spam that is 100% legal,  but also 
100% unsolicited/undesired and therefore frequently blocked by spam 
filters, and rightly so. I just hope that nobody argues in a court of 
law that their exceptions for spam filtering only applies to UNLAWFUL 
spam!!! THAT would be a DISASTER!!!


Nevertheless, in such a circumstance, 47 USC 230(c)(2) should prevail 
and trump any such interpretation of this!


(If anyone thinks that 47 USC 230(c)(2) might not prevail over such an 
interpretation, please let me know... and let me know why?)


--
Rob McEwen



Re: FCC releases Open Internet document

2015-03-12 Thread Mike A
On Thu, Mar 12, 2015 at 12:30:16PM -0500, William Kenny wrote:
 Page 7 -14 looks to be pretty important. Specifcially:
 
 NO BLOCKING:
 A person engaged in the provision of broadband Internet access service,
 insofar as such person is so engaged, shall not block lawful content,
 applications, services, or nonharmful devices, subject to reasonable
 network management.
 
 NO THROTTLING:
 A person engaged in the provision of broadband Internet access service,
 insofar as such person is so engaged, shall not impair or degrade lawful
 Internet traffic on the basis of Internet content, application, or service,
 or use of a non-harmful device, subject to reasonable network management.
 
 NO PAID PRIORITIZATION:
 A person engaged in the provision of broadband Internet access service,
 insofar as such person is so engaged, shall not engage in paid
 prioritization.
 
 There is also an interesting bit on gatekeeping:
 Any person engaged in the provision of broadband Internet access service,
 insofar as such person is so engaged, shall not unreasonably interfere with
 or unreasonably disadvantage (i) end users’ ability to select, access, and
 use broadband Internet access service or the lawful Internet content,
 applications, services, or devices of their choice, or (ii) edge providers’
 ability to make lawful content, applications, services, or devices
 available to end users. Reasonable network management shall not be
 considered a violation of this rule.
 
 I think there are going to be a lot of complex implications of this
 announcement (canidate for most obvious statement aware winner!).
 
 On Thu, Mar 12, 2015 at 10:32 AM, shawn wilson ag4ve...@gmail.com wrote:
 
  On Mar 12, 2015 11:01 AM, Ca By cb.li...@gmail.com wrote:
  
   For the first time to the public
  
 
  http://transition.fcc.gov/Daily_Releases/Daily_Business/2015/db0312/FCC-15-24A1.pdf
  
   Enjoy.
 
  Uh yeah, I'll wait for the reviews when y'all get done trudging through
  that...

This will be interesting, in the context of cable providers providing inbound
access to subscriber-address server ports only for commercial accounts. 

-- 
Mike Andrews, W5EGO
mi...@mikea.ath.cx
Tired old sysadmin 


BCOP appeals numbering scheme -- feedback requested

2015-03-12 Thread Yardiel D. Fuentes


Hello NANOGers,

The  NANOG BCOP committee is currently considering strategies on how to best 
create a numbering scheme for the BCOP appeals. As we all know, most public 
technical references (IETF, etc) have numbers to clarify references. The goal 
is for NANOG BCOPs to follow some sort of same style.

The BCOP committee is looking for feedback and comments on this topic.

Currently, the below numbering scheme is being considered:

A proposed numbering scheme can be based on how the appeals appeals in the BCOP 
topics are presented as shown below:

http://bcop.nanog.org/index.php/Appeals

In the above page, the idea is to introduce a 100-th range for each category 
and as the BCOPs. This way a 100th number range generally identifies each of 
the categories we currently have. An example is:

BCP Range   Area of Practice
100 - 199   EBGPs   
200 - 299   IGPs
300 - 399   Ethernet
400 - 499   Class of Service
500 - 599   Network Information Processing
600 - 699   Security
700 - 799   MPLS
800 - 899   Generalized

An arguable objection could be that the range is limited...but a 
counter-argument is that considering more than 100 BCOPs would be either a 
great success or just a sign of failure for the NANOG community ...

Comments or Thoughts ?


Yardiel Fuentes







Re: BCOP appeals numbering scheme -- feedback requested

2015-03-12 Thread joel jaeggli
On 3/12/15 12:01 PM, Yardiel D. Fuentes wrote:
 
 
 Hello NANOGers,
 
 The  NANOG BCOP committee is currently considering strategies on how to best 
 create a numbering scheme for the BCOP appeals. As we all know, most public 
 technical references (IETF, etc) have numbers to clarify references. The goal 
 is for NANOG BCOPs to follow some sort of same style.
 
 The BCOP committee is looking for feedback and comments on this topic.
 
 Currently, the below numbering scheme is being considered:
 
 A proposed numbering scheme can be based on how the appeals appeals in the 
 BCOP topics are presented as shown below:
 
 http://bcop.nanog.org/index.php/Appeals
 
 In the above page, the idea is to introduce a 100-th range for each category 
 and as the BCOPs. This way a 100th number range generally identifies each of 
 the categories we currently have. An example is:

identifier/locator overload.

giving intergers intrinsic meaning is generally a mistake imho.

 BCP Range Area of Practice
 100 - 199 EBGPs   
 200 - 299 IGPs
 300 - 399 Ethernet
 400 - 499 Class of Service
 500 - 599 Network Information Processing
 600 - 699 Security
 700 - 799 MPLS
 800 - 899 Generalized
 
 An arguable objection could be that the range is limited...but a 
 counter-argument is that considering more than 100 BCOPs would be either a 
 great success or just a sign of failure for the NANOG community ...
 
 Comments or Thoughts ?
 
 
 Yardiel Fuentes
 
 
 
 
 
 




signature.asc
Description: OpenPGP digital signature


Re: BCOP appeals numbering scheme -- feedback requested

2015-03-12 Thread Tony Tauber
Totally.  Also, then what if something is in the intersection of multiple
areas.

Complexity that's not needed.

Tony

On Thu, Mar 12, 2015 at 3:12 PM, Job Snijders j...@instituut.net wrote:

 On Mar 12, 2015 8:08 PM, joel jaeggli joe...@bogus.com wrote:
 
  On 3/12/15 12:01 PM, Yardiel D. Fuentes wrote:
   In the above page, the idea is to introduce a 100-th range for each
 category and as the BCOPs. This way a 100th number range generally
 identifies each of the categories we currently have. An example is:
 
  identifier/locator overload.
 
  giving intergers intrinsic meaning is generally a mistake imho.

 I agree with Joel



Re: FCC releases Open Internet document

2015-03-12 Thread Lamar Owen

On 03/12/2015 02:02 PM, Rob McEwen wrote:

On 3/12/2015 1:30 PM, William Kenny wrote:

NO BLOCKING:
A person engaged in the provision of broadband Internet access service,
insofar as such person is so engaged, shall not block lawful content,
applications, services, or nonharmful devices, subject to reasonable
network management.


The document (if I read it correctly) states that reasonable network 
management includes spam filtering (yeah!)


However, in spite of that... it seems to give the MISTAKEN impression 
that:


(1) ALL spam is ALWAYS... NOT-lawful content
(2) ALL lawful content is NEVER spam.




I think the issue is adequately addressed by the RO's paragraph 222 and 
its neighbors, with footnotes 571, 572, and 573 elucidating.  The short 
version: the FCC is not going to rigidly define this and leave it up to 
the providers, but they will address it on a case-by-case basis if need 
be.  At least that was my takeaway.


Nevertheless, in such a circumstance, 47 USC 230(c)(2) should prevail 
and trump any such interpretation of this!


(If anyone thinks that 47 USC 230(c)(2) might not prevail over such an 
interpretation, please let me know... and let me know why?)


It would seem, but I am not a lawyer, that perhaps it would.  It's not 
directly addressed in the portions of the RO that I've read thus far, 
and that specific paragraph is not cited that I could find.  A Good 
Samaritan law, in 47 USC. fun stuff.




Searching for a quote

2015-03-12 Thread Jason Iannone
There was once a fairly common saying attributed to an early
networking pioneer that went something like, be generous in what you
accept, and send only the stuff that should be sent.  Does anyone
know what I'm talking about or who said it?


Re: Searching for a quote

2015-03-12 Thread Tom Paseka
Be conservative in what you send, be liberal in what you accept

^http://en.wikipedia.org/wiki/Robustness_principle

On Thu, Mar 12, 2015 at 5:20 PM, Jason Iannone jason.iann...@gmail.com
wrote:

 There was once a fairly common saying attributed to an early
 networking pioneer that went something like, be generous in what you
 accept, and send only the stuff that should be sent.  Does anyone
 know what I'm talking about or who said it?



Re: Searching for a quote

2015-03-12 Thread Dave Taht
jon postel. http://en.wikipedia.org/wiki/Jon_Postel


On Thu, Mar 12, 2015 at 5:20 PM, Jason Iannone jason.iann...@gmail.com wrote:
 There was once a fairly common saying attributed to an early
 networking pioneer that went something like, be generous in what you
 accept, and send only the stuff that should be sent.  Does anyone
 know what I'm talking about or who said it?



-- 
Dave Täht
Let's make wifi fast, less jittery and reliable again!

https://plus.google.com/u/0/107942175615993706558/posts/TVX3o84jjmb


Re: Searching for a quote

2015-03-12 Thread Tim Durack
http://en.wikipedia.org/wiki/Jon_Postel

Postel's Law
Perhaps his most famous legacy is from RFC 760, which includes a Robustness
Principle which is often labeled Postel's Law: an implementation should be
conservative in its sending behavior, and liberal in its receiving
behavior (reworded in RFC 1122 as Be liberal in what you accept, and
conservative in what you send).

On Thu, Mar 12, 2015 at 8:20 PM, Jason Iannone jason.iann...@gmail.com
wrote:

 There was once a fairly common saying attributed to an early
 networking pioneer that went something like, be generous in what you
 accept, and send only the stuff that should be sent.  Does anyone
 know what I'm talking about or who said it?




-- 
Tim:


Re: Searching for a quote

2015-03-12 Thread Miles Fidelman

That was quick. :-)

Tom Paseka wrote:

Be conservative in what you send, be liberal in what you accept

^http://en.wikipedia.org/wiki/Robustness_principle

On Thu, Mar 12, 2015 at 5:20 PM, Jason Iannone jason.iann...@gmail.com
wrote:


There was once a fairly common saying attributed to an early
networking pioneer that went something like, be generous in what you
accept, and send only the stuff that should be sent.  Does anyone
know what I'm talking about or who said it?




--
In theory, there is no difference between theory and practice.
In practice, there is.    Yogi Berra



Re: Searching for a quote

2015-03-12 Thread Michael Thomas

Jon Postel. I'm told that it is out of favor these days in protocol-land,
from a security standpoint if nothing else.

Mike

On 3/12/15 5:24 PM, Tom Paseka wrote:

Be conservative in what you send, be liberal in what you accept

^http://en.wikipedia.org/wiki/Robustness_principle

On Thu, Mar 12, 2015 at 5:20 PM, Jason Iannone jason.iann...@gmail.com
wrote:


There was once a fairly common saying attributed to an early
networking pioneer that went something like, be generous in what you
accept, and send only the stuff that should be sent.  Does anyone
know what I'm talking about or who said it?





Re: Searching for a quote

2015-03-12 Thread Jason Iannone
Thanks all.

On Thu, Mar 12, 2015 at 6:28 PM, Tim Durack tdur...@gmail.com wrote:
 http://en.wikipedia.org/wiki/Jon_Postel

 Postel's Law
 Perhaps his most famous legacy is from RFC 760, which includes a Robustness
 Principle which is often labeled Postel's Law: an implementation should be
 conservative in its sending behavior, and liberal in its receiving behavior
 (reworded in RFC 1122 as Be liberal in what you accept, and conservative in
 what you send).

 On Thu, Mar 12, 2015 at 8:20 PM, Jason Iannone jason.iann...@gmail.com
 wrote:

 There was once a fairly common saying attributed to an early
 networking pioneer that went something like, be generous in what you
 accept, and send only the stuff that should be sent.  Does anyone
 know what I'm talking about or who said it?




 --
 Tim:


Re: Searching for a quote

2015-03-12 Thread Ted Cooper
On 13/03/15 10:20, Jason Iannone wrote:
 There was once a fairly common saying attributed to an early
 networking pioneer that went something like, be generous in what you
 accept, and send only the stuff that should be sent.  Does anyone
 know what I'm talking about or who said it?
 

Jon Postel's Robustness Principal.

http://en.wikipedia.org/wiki/Jon_Postel




Re: Searching for a quote

2015-03-12 Thread Dave Taht
On Thu, Mar 12, 2015 at 5:27 PM, Dave Taht dave.t...@gmail.com wrote:
 jon postel. http://en.wikipedia.org/wiki/Jon_Postel

Had he lived, email and netnews would have remained usable by mere
mortals and met the challenge of extreme growth and abuse. And ICANN,
and for that netsol, wouldn't have become the ugly morass they became.
Hell, even the IETF might have remained viable.

I have few heroes. He was one of them.


 On Thu, Mar 12, 2015 at 5:20 PM, Jason Iannone jason.iann...@gmail.com 
 wrote:
 There was once a fairly common saying attributed to an early
 networking pioneer that went something like, be generous in what you
 accept, and send only the stuff that should be sent.  Does anyone
 know what I'm talking about or who said it?



 --
 Dave Täht
 Let's make wifi fast, less jittery and reliable again!

 https://plus.google.com/u/0/107942175615993706558/posts/TVX3o84jjmb



-- 
Dave Täht
Let's make wifi fast, less jittery and reliable again!

https://plus.google.com/u/0/107942175615993706558/posts/TVX3o84jjmb


Re: Searching for a quote

2015-03-12 Thread Barney Wolff
I feel required to point out that Postel's Law was sage advice for its time,
but should now be amended with but assume that all input is hostile.

On Thu, Mar 12, 2015 at 08:28:22PM -0400, Tim Durack wrote:
 http://en.wikipedia.org/wiki/Jon_Postel
 
 Postel's Law
 Perhaps his most famous legacy is from RFC 760, which includes a Robustness
 Principle which is often labeled Postel's Law: an implementation should be
 conservative in its sending behavior, and liberal in its receiving
 behavior (reworded in RFC 1122 as Be liberal in what you accept, and
 conservative in what you send).


Re: Searching for a quote

2015-03-12 Thread Jason Iannone
Low hanging fruit.

On Thu, Mar 12, 2015 at 6:29 PM, Miles Fidelman
mfidel...@meetinghouse.net wrote:
 That was quick. :-)


 Tom Paseka wrote:

 Be conservative in what you send, be liberal in what you accept

 ^http://en.wikipedia.org/wiki/Robustness_principle

 On Thu, Mar 12, 2015 at 5:20 PM, Jason Iannone jason.iann...@gmail.com
 wrote:

 There was once a fairly common saying attributed to an early
 networking pioneer that went something like, be generous in what you
 accept, and send only the stuff that should be sent.  Does anyone
 know what I'm talking about or who said it?



 --
 In theory, there is no difference between theory and practice.
 In practice, there is.    Yogi Berra



Re: Searching for a quote

2015-03-12 Thread Larry Sheldon

On 3/12/2015 19:20, Jason Iannone wrote:

There was once a fairly common saying attributed to an early
networking pioneer that went something like, be generous in what you
accept, and send only the stuff that should be sent.  Does anyone
know what I'm talking about or who said it?




Postel's Law:  Be generous in what you accept; strict in what you send.*

*From aging memory, but I think that is close.

--
The unique Characteristics of System Administrators:

The fact that they are infallible; and,

The fact that they learn from their mistakes.


Quis custodiet ipsos custodes


Broken/trashed/junk Juniper MX5/80 and Cisco 2921 chassis?

2015-03-12 Thread Daniel Rohan
Hey all,

Sorry for the x-post with j-nsp, but I'm looking for something that seems
to be a bit hard to find and I'm hoping that someone in the larger
community might be able to help.

I'm trying to find a totally broken, cheap, MX5/80 and a Cisco 2921 chassis
that I can use for demonstration trainings with our edge technicians. We're
currently running the demos with spare gear, but even though we transport
this gear in shock-mounted cases, I'd much rather be transporting dummy
equipment.

Our SEs don't have a line on this kind of gear either. Aparently this type
of gear is destroyed or refurbished, but there isn't much demand for broken
equipment sitting around staying broken.

If you have a line on some of this gear that you'd be willing to share, I'd
appreciate it.

Thanks,

Dan


RE: Unlawful transfers of content and transfers of unlawful content (was:Re: Verizon Policy Statement on Net Neutrality)

2015-03-12 Thread Donald Kasper
 Date: Thu, 12 Mar 2015 15:48:31 -0400
 From: lo...@pari.edu
 To: nanog@nanog.org
 Subject: Unlawful transfers of content and transfers of unlawful content 
 (was:Re: Verizon Policy Statement on Net Neutrality)
 
 On 02/27/2015 02:14 PM, Jim Richardson wrote:
  What's a lawful web site?
 
 Paragraphs 304 and 305 in today's released RO address some of this.  
 The wording 'Unlawful transfers of content and transfers of unlawful 
 content' is pretty good, and covers what the Commission wanted to cover.
 

More then website blocking I've been wondering what this means for spam 
prevention?   

Re: BCOP appeals numbering scheme -- feedback requested

2015-03-12 Thread Owen DeLong

 On Mar 12, 2015, at 12:01 , Yardiel D. Fuentes yard...@gmail.com wrote:
 
 
 
 Hello NANOGers,
 
 The  NANOG BCOP committee is currently considering strategies on how to best 
 create a numbering scheme for the BCOP appeals. As we all know, most public 
 technical references (IETF, etc) have numbers to clarify references. The goal 
 is for NANOG BCOPs to follow some sort of same style.
 
 The BCOP committee is looking for feedback and comments on this topic.
 
 Currently, the below numbering scheme is being considered:
 
 A proposed numbering scheme can be based on how the appeals appeals in the 
 BCOP topics are presented as shown below:
 
 http://bcop.nanog.org/index.php/Appeals
 
 In the above page, the idea is to introduce a 100-th range for each category 
 and as the BCOPs. This way a 100th number range generally identifies each of 
 the categories we currently have. An example is:
 
 BCP Range Area of Practice
 100 - 199 EBGPs   
 200 - 299 IGPs
 300 - 399 Ethernet
 400 - 499 Class of Service
 500 - 599 Network Information Processing
 600 - 699 Security
 700 - 799 MPLS
 800 - 899 Generalized
 
 An arguable objection could be that the range is limited...but a 
 counter-argument is that considering more than 100 BCOPs would be either a 
 great success or just a sign of failure for the NANOG community ...
 
 Comments or Thoughts ?

The problem with any such numbering scheme is how you handle the situation when 
you exhaust the avaialble number space. What happens with the 101st EBGP BCOP, 
for example?

I also agree with Joel’s comment about identifier/locator overload. Have we 
learned nothing from the issues created by doing this in IPv4 and IPv6?

Instead, how about maintaining a BCOP subject index which contains titular and 
numeric information for each BCOP applicable to the subjects above.

e.g.:

BCOP Subject Index:

Subjects:
1.  EBGP
2.  IGP
3.  Ethernet
4.  Class of Service
5.  Network Information Processing
6.  Security
7.  MPLS
8.  Generalized


1.  EBGP
104 lorem ipsum
423 ipsum lorem



Then, just like the RFCs, maintain the BCOP appeal numbering as a sequential 
monotonically increasing number and make the BCOP editor responsible for 
updating the index with the publishing of each new or revised BCOP.

Note, IMHO, a revised BCOP should get a new number and the previous revision 
should be marked “obsoleted by X” and it’s document status should reflect 
“Obsoletes , , and ” for all previous revisions. The index should 
probably reflect only BCOPs which have not been obsoleted.

Just my $0.02.

Owen



Re: Searching for a quote

2015-03-12 Thread Patrick W. Gilmore
On Mar 12, 2015, at 20:44 , Larry Sheldon larryshel...@cox.net wrote:
 On 3/12/2015 19:20, Jason Iannone wrote:

 There was once a fairly common saying attributed to an early
 networking pioneer that went something like, be generous in what you
 accept, and send only the stuff that should be sent.  Does anyone
 know what I'm talking about or who said it?
 
 Postel's Law:  Be generous in what you accept; strict in what you send.*
 
 *From aging memory, but I think that is close.

https://en.wikipedia.org/wiki/Robustness_principle

Be conservative in what you do, be liberal in what you accept from others 
(often reworded as Be conservative in what you send, be liberal in what you 
accept).

-- 
TTFN,
patrick



Re: Searching for a quote

2015-03-12 Thread manning bill
it is true that the risk profile has changed in the last 30 years.
his core belief in interconnecting things in an open way, enabling _anyone_ to 
create,build, and deploy
is the core of ISOCs “permission less innovation” thrust.

crypto/security folks are green with envy …  it is somewhat “sour grapes” no?

I count my time working for him as one of the highlights of my life.  In some 
respects, I still do… :)

/bill
PO Box 12317
Marina del Rey, CA 90295
310.322.8102

On 12March2015Thursday, at 17:31, Michael Thomas m...@mtcc.com wrote:

 Jon Postel. I'm told that it is out of favor these days in protocol-land,
 from a security standpoint if nothing else.
 
 Mike
 
 On 3/12/15 5:24 PM, Tom Paseka wrote:
 Be conservative in what you send, be liberal in what you accept
 
 ^http://en.wikipedia.org/wiki/Robustness_principle
 
 On Thu, Mar 12, 2015 at 5:20 PM, Jason Iannone jason.iann...@gmail.com
 wrote:
 
 There was once a fairly common saying attributed to an early
 networking pioneer that went something like, be generous in what you
 accept, and send only the stuff that should be sent.  Does anyone
 know what I'm talking about or who said it?