Transatlantic response times.

2002-03-25 Thread Pistone, Mike
I wasn't really sure where to post this, but I figured NANOG would have some insight or at least experience here. I was curious if anybody would share what they consider to be average or acceptable transatlantic ping response times over a T1. I know there are tons of variables here, but I am

Re: Transatlantic response times.

2002-03-25 Thread Neil J. McRae
Should be around 70ms RTT for London to NYC on an E1, so maybe a little more or less for a T1. Regards, Neil. -- Neil J. McRae - Alive and Kicking [EMAIL PROTECTED]

Re: Transatlantic response times.

2002-03-25 Thread Iljitsch van Beijnum
On Mon, 25 Mar 2002, Pistone, Mike wrote: I was curious if anybody would share what they consider to be average or acceptable transatlantic ping response times over a T1. I know there are tons of variables here, but I am looking for ballpark figures. Assume that utilization on the circuit

Re: Transatlantic response times.

2002-03-25 Thread Jake Khuon
### On Mon, 25 Mar 2002 09:13:20 -0600, Pistone, Mike ### [EMAIL PROTECTED] casually decided to expound upon ### '[EMAIL PROTECTED]' [EMAIL PROTECTED] the following thoughts about ### Transatlantic response times.: MP I was curious if anybody would share what they consider to be average or MP

Re: Transatlantic response times.

2002-03-25 Thread PETER JANSEN
Mike: Our web site at http://sla.cw.net/ provides you with real time RTT measurements on our network. That should give you a good picture of typical large network response times. Regards Peter Jansen Global Peering Cable Wireless Date: Mon, 25 Mar 2002 10:13 -0500 (EST) From: Pistone,

Re: Transatlantic response times.

2002-03-25 Thread Richard A Steenbergen
On Mon, Mar 25, 2002 at 09:13:20AM -0600, Pistone, Mike wrote: Is there any equation to estimate response times? For example, if your circuit from A to Z has a 500ms avg response, than that equates to a circuit distance of aprox. 5000 miles or something? As I'm sure you remember from your

Re: PacBell Security/Abuse contact

2002-03-25 Thread Walter Prue
Jeremy, We have been a T3 customer of PacBell for 3 years. We have had a few DOS attacks over the years which required intervention by our backbone providers which included PacBell. In every case their policy was to not help. They refered us to their abuse email address or phone number

Re: Verio as an DS3 upstream provider - comments?

2002-03-25 Thread Steve Sobol
At 02:30 AM 3/25/02 -0500, you wrote: Speaking for extensive personal experience as a former Verio employee (full disclosure, Doug :) - Verio has a heck of a backbone. And if you're in one of the cities they plan on continuing to provide access in, then they'd be a viable option - If you know

sprint dsl

2002-03-25 Thread michael
Hello, Could someone from sprint dsl group or netops please contact me offline. This is in regards to sprint business class dsl and routing legacy IP space. Thanks, Michael

Re: PacBell Security/Abuse contact

2002-03-25 Thread Jeremy T. Bouse
More specifically I belive this is a Distributed Reflection DoS like what hit GRC.COM back on Jan 11th... Basically a flood of SYN packets to well known ports from IPs which appear to be spoofed. I've actually been riding it out now for over 2 weeks... The tech support is

RE: PacBell Security/Abuse contact

2002-03-25 Thread Cheung, Rick
Title: RE: PacBell Security/Abuse contact Does anyone have an opinion on a decent ISP out there that's proven to work with the customer during a DDOS storm? Rick Cheung -Original Message- From: Jeremy T. Bouse [mailto:[EMAIL PROTECTED]] Sent: Monday, March 25, 2002 2:46 PM To:

Re: PacBell Security/Abuse contact

2002-03-25 Thread Jon Mansey
UUnet, excellent responsive abuse team IMHO. jm On Monday, March 25, 2002, at 12:12 PM, Cheung, Rick wrote:     Does anyone have an opinion on a decent ISP out there that's proven to work with the customer during a DDOS storm? Rick Cheung -Original Message- From: Jeremy

Re:PacBell Security/Abuse Contact

2002-03-25 Thread David Barak
Regarding securiy issues, I'd suggest working with UUNet/Worldcom (or whatever AS701 is called lately). I've seen some of their folks work closely with aggrieved victims of DDOS attacks. -David Barak Quis custodes ipsos custodiet? - Juvenal Rick Cheung wrote: Does anyone have an

RE: PacBell Security/Abuse contact

2002-03-25 Thread LeBlanc, Jason
I agree. -Original Message- From: Jon Mansey [mailto:[EMAIL PROTECTED]] Sent: Monday, March 25, 2002 12:17 PM To: Cheung, Rick Cc: [EMAIL PROTECTED] Subject: Re: PacBell Security/Abuse contact UUnet, excellent responsive abuse team IMHO. jm On Monday, March 25, 2002,

Re: PacBell Security/Abuse Contact

2002-03-25 Thread Eric Brandwine
db == David Barak [EMAIL PROTECTED] writes: db Regarding securiy issues, I'd suggest working with db UUNet/Worldcom (or whatever AS701 is called lately). db I've seen some of their folks work closely with db aggrieved victims of DDOS attacks. I was going to say the same thing, but I'm

RE: Yipes

2002-03-25 Thread CARL . P . HIRSCH
How's Cogent looking these days? They, along with Yipes, were always trying to get meetings with me. -carl Daniel

RE: PacBell Security/Abuse contact

2002-03-25 Thread Eric Whitehill
UUNet, by far is the best. I've had mixed results with Sprint. A couple of years ago I had to deal with Hurricane Electric and the tech was really good about it - he added in the ACL I needed right over the phone. Also, I know of a couple providers in the upper midwest that are pretty good

Re: PacBell Security/Abuse Contact

2002-03-25 Thread Sean Donelan
db == David Barak [EMAIL PROTECTED] writes: db Regarding securiy issues, I'd suggest working with db UUNet/Worldcom (or whatever AS701 is called lately). db I've seen some of their folks work closely with db aggrieved victims of DDOS attacks. Historically, BBN/Genuity/GTE/Verizon/Genuity...

Wanted: Liebert AC Unit

2002-03-25 Thread Gary Attard
I realize this is not necessarily the most appropriate forum to search for a used five(5) or ten(10) ton Liebert AC Unit but it may be the most effective. I am looking for a used 5 and 10 ton unit for raised floor Data Center - anyone know of any recently closed Data Centers looking to

Possible New type of DOS attack

2002-03-25 Thread Vinny India
Anyone out there ever witness an attack were you received several RSHPORT attempts (5 per second) on a cisco router from different spoofed source addresses. It was capable of taking out BGP and OSPF sessions on the router.

Re: Possible New type of DOS attack

2002-03-25 Thread Mike Lewinski
It was probably a large packet flood to random destination ports. Some of them happened to hit rshell. What really took out your routing procs was likely a huge packet flood, but due to volume you may not have been able to access normal interface counters (i.e. MRTG doesn't get any SNMP packets

Re: PacBell Security/Abuse contact

2002-03-25 Thread Patrick
On Mon, 25 Mar 2002, Jon Mansey wrote: UUnet, excellent responsive abuse team IMHO. Too bad they don't seem to have a spam abuse department anymore. I've been complaining about a continuing flood of spam from jumpjive.com (another lying you-opted-in-to-receive-our-crap outfit) with nothing

RE: long distance gigabit ethernet

2002-03-25 Thread LeBlanc, Jason
The new 15540 is a much better box, not much more $ either. There are some other people making extremely killer products, ONI being one that is very popular. I wouldn't invest in a 15454 anymore with all the new products out there, we still use them, but anything new will be a better box.

RE: PacBell Security/Abuse contact

2002-03-25 Thread Joe Blanchard
Title: RE: PacBell Security/Abuse contact Pacbell's Abuse/Security Depts are totally useless with regard to assisting its own customers, let alone defending them. For the better portion of a few months now, I've emailed/called many times with regard to CodeRed boxes (On their netblocks)

RE: PacBell Security/Abuse contact

2002-03-25 Thread Todd Suiter
One person I know that gets hit on his home box with CR and nimda...well, he goes the extra mile and patches their stuff for them...and leaves a note on the console. Doesn't SBC own PB now? Why not go through the SBC side and see what you can shake loose? On Mon, 25 Mar 2002, Joe Blanchard

Re: 1024-bit RSA keys in danger of compromise (fwd)

2002-03-25 Thread Travis Pugh
Len Sassaman [EMAIL PROTECTED] writes: Prior to Bernstein's discovery the row-reduction step in factorization could be made massively parallelizable, we believed that 1024 bit keys would remain unfactorable essentially forever. Now, 1024 bit RSA keys look to be factorable either presently,

Re: 1024-bit RSA keys in danger of compromise (fwd)

2002-03-25 Thread Richard A Steenbergen
On Mon, Mar 25, 2002 at 03:32:08PM -0800, Len Sassaman wrote: What is most concerning to me is a few discoveries that were made while looking into the problem of widespread use of 1024 bit keys: Personally I'm not too concerned (yet). You're probably worse off due to implementation flaws.

Re: 1024-bit RSA keys in danger of compromise (fwd)

2002-03-25 Thread Len Sassaman
On Mon, 25 Mar 2002, Travis Pugh wrote: Out of curiosity, was there any indication that Bernstein's improvements might apply to the discrete log problem, DSA in general, Bernstein's paper was geared toward RSA, but I believe he makes the claim that discrete log based algorithms are

RE: 1024-bit RSA keys in danger of compromise (fwd)

2002-03-25 Thread Deepak Jain
Since you are mentioning Verisign here, and CA authorities in general, has anyone considered that factoring the CA authority's key is far simpler than breaking the underlying key [no matter how large?]. Based on the implementation, the CA's key cannot be changed often or easily. Key revocations

RE: 1024-bit RSA keys in danger of compromise (fwd)

2002-03-25 Thread Len Sassaman
On Mon, 25 Mar 2002, Deepak Jain wrote: Since you are mentioning Verisign here, and CA authorities in general, has anyone considered that factoring the CA authority's key is far simpler than breaking the underlying key [no matter how large?]. Based on the Well, that's not really the case.

RE: 1024-bit RSA keys in danger of compromise (fwd)

2002-03-25 Thread Deepak Jain
Exactly. Why think $2B is some insurmountable barrier when there are far cheaper ways of getting what you want. Most computer people think of security only in terms of computers. Bribing a few night security guards is far cheaper than even cryptanalysis and will give any sufficiently

RE: 1024-bit RSA keys in danger of compromise (fwd)

2002-03-25 Thread Len Sassaman
On Mon, 25 Mar 2002, Deepak Jain wrote: Exactly. Why think $2B is some insurmountable barrier when there are far $2B isn't an insurmountable barrier. It is well within most intelligence agencies' budgets, and that price will only get lower. At present, if you have the sophistication to

Re: 1024-bit RSA keys in danger of compromise (fwd)

2002-03-25 Thread Brad Barnett
On Mon, 25 Mar 2002 18:05:53 -0800 (PST) Len Sassaman [EMAIL PROTECTED] wrote: A machine that costs $2 billion today, according to Moore's law, will cost about $200,000 20 years from now. Not counting inflation. That will be well within many people's budgets. Hmm. Something very

Re: PacBell Security/Abuse contact

2002-03-25 Thread Daniel M. Spielman
uchicago.edu At 03:05 PM 3/25/2002 -0600, you wrote: On Mon, 25 Mar 2002 11:18:23 -0800 Daniel M. Spielman [EMAIL PROTECTED] wrote: I've had a similar experience with their tech team. I was being dos'd from a college in Chicago so I contacted them to Mind telling me what

Re: PacBell Security/Abuse contact

2002-03-25 Thread Todd Suiter
On Mon, 25 Mar 2002, Daniel M. Spielman wrote: uchicago.edu At 03:05 PM 3/25/2002 -0600, you wrote: On Mon, 25 Mar 2002 11:18:23 -0800 Daniel M. Spielman [EMAIL PROTECTED] wrote: I've had a similar experience with their tech team. I was being dos'd from a college

How to get better security people

2002-03-25 Thread Sean Donelan
According to a recent salary survey telephone companies have some of the lowest paid information security professionals in comparison with other technology corporations, federal government, or financial companies. When the US Transportation Security Administration (aka, the agency in charge of

Re:RE: 1024-bit RSA keys in danger of compromise (fwd)

2002-03-25 Thread rkuhljr
Does NSA need compromising US-based CA's private keys ? Probably not, because they either (a) already have the private keys, obtained thru a combination of political, financial and intelligence resources. or (b) already have proceedings with the CA's in order to issue valid look-a-like

Re: 1024-bit RSA keys in danger of compromise (fwd)

2002-03-25 Thread Richard A Steenbergen
On Mon, Mar 25, 2002 at 11:05:21PM -0500, Deepak Jain wrote: That is a falicy. Moore's law is most certainly not accelerating -- in fact: 1965-1990 Moore's law stated that the number of transistors per square inch on integrated circuits (and therefore, the speed) doubles every 2 years.

Re: 1024-bit RSA keys in danger of compromise (fwd)

2002-03-25 Thread Len Sassaman
On Mon, 25 Mar 2002, Richard A Steenbergen wrote: On Mon, Mar 25, 2002 at 11:05:21PM -0500, Deepak Jain wrote: That is a falicy. Moore's law is most certainly not accelerating -- in fact: 1965-1990 Moore's law stated that the number of transistors per square inch on integrated