On Sat, 13 Aug 2005 06:08:22 +0200, Gadi Evron said:
> Cisco's lawyers are sending out cease-and-desist notices to Web sites
...
> I guess that answers the question of the lgality of the matter?
All it answers is the question "Do Cisco's lawyers think they can get
away with it?" The question of
I can understand that -- right on. :-)
One must understand that this whole thing is a moving
target, and perhaps the reporting features are just now
maturing (now Gadi, don't make a liar out of me).
Insofar as as detection methodologies, I'll have to defer
to Gadi to elaboarate (illustrate?) the
On Sat, 13 Aug 2005, Hannigan, Martin wrote:
>
> I was on it and unsubscribed. They wouldn't disclose the collection or
> validation process at that time. This made it useless for the most part
> as its hard to act on someones word without some idea of how they are
> getting their data and avoid
Title: Re: botnet reporting by AS - what about you?
I was on it and unsubscribed. They wouldn't disclose the collection or validation process at that time. This made it useless for the most part as its hard to act on someones word without some idea of how they are getting their data and avoi
Good suggestions for Gadi. ,-)
- ferg
-- "Christopher L. Morrow" <[EMAIL PROTECTED]> wrote:
cool, among the 800k+ complaints we see a month (yes, 800k) there are
quite a few completely useless ones :( Anything sent in as a complaint has
to have complete and useful information, else it's hard/i
On Sat, 13 Aug 2005, Fergie (Paul Ferguson) wrote:
> Chris,
>
> I can assure you that the Drone Army project is not run that
> way, and is quite useful, effective, etc.
>
> The folks behind the DA Project are certainly professionals...
> ...and the infromation is quite useable, parse-able, and
Chris,
I can assure you that the Drone Army project is not run that
way, and is quite useful, effective, etc.
The folks behind the DA Project are certainly professionals...
...and the infromation is quite useable, parse-able, and genuine.
- ferg
-- "Christopher L. Morrow" <[EMAIL PROTECTED]>
On Fri, 12 Aug 2005, Hannigan, Martin wrote:
>
> Translation:
>
> This isn't a contact list for hundreds of asn's.
perhaps we could back up and ask:
1) why are you not using the arin/ripe/apnic/japnic/krnic/lacnic poc's for
these asn's? certainly some are not up to date, but there are a large
Cisco flaw presentation spreads across the Web
FBI Investigation...
New copies of Michael Lynn's presentation on the Cisco router operating
system flaw are springing up faster than the lawyers can take them down
Cisco's lawyers are sending out cease-and-desist notices to Web sites
that have pu
Title: Re: botnet reporting by AS - what about you?
Translation:
This isn't a contact list for hundreds of asn's.
-Original Message-
From: Gadi Evron [mailto:[EMAIL PROTECTED]]
Sent: Fri Aug 12 22:43:47 2005
To: Richard A Steenbergen
Cc: nanog list
Subject: Re
On Fri, 12 Aug 2005, Richard A Steenbergen wrote:
>
> On Fri, Aug 12, 2005 at 08:41:52PM +0200, Gadi Evron wrote:
> >
> > Hello. The drone armies research and mitigation mailing list is moving
> > its reporting mechanism to the next level.
> >
> > If you have updated contact information for any o
What happened to replies off-list? Anyway, good point about actual
ASN's, so here goes.
Do you mean to tell me you can't find contact info for ANY of those ISPs
on your own (like those ALTERNET guys, they're hard to track down)? Are
you trying to start a service for notifing ISPs when they h
[ Charset ISO-8859-1 unsupported, converting... ]
>
>
>
>
> During the Northridge earthquake (the one during the
> world series in sf.ba.ca.us) there was a BUNCH of
> disruption of the infrastructure, drives were shaken
> til they crashed, power wend down all over the area,
> Telco lines g
Hi Rich,
> A. If open publication of the full source code of XYZ would render it
> insecure, then XYZ is _already_ insecure.
i like that way of looking at it..
> B. In analyzing any attack, it's prudent to presume that the attackers have
> the full source code of every piece of software involv
On Tue, Aug 09, 2005 at 04:11:45PM +0100, [EMAIL PROTECTED] wrote:
> There really is no such thing as closed source.
I've been saying this for years, and I'm sure you and I aren't the only ones.
Corrallaries:
A. If open publication of the full source code of XYZ would render
it insecure, then
I'd personally love more reporting services that will actually disclose
information to the ISPs who can actually take action to help straighten
out their customers. We have far too many people who sit around wringing
their hands about how horrible the botnets are, but who won't tell anyone
wh
On Fri, Aug 12, 2005 at 08:41:52PM +0200, Gadi Evron wrote:
>
> Hello. The drone armies research and mitigation mailing list is moving
> its reporting mechanism to the next level.
>
> If you have updated contact information for any of the below AS owners,
> please contact me _off-list_.
>
> T
On Fri, 12 Aug 2005 19:57:35 +0200, Gadi Evron said:
> > Cisco is just busy having the same cow that everybody else had on the x86
> > platform when Solar Designer wrote "Smashing the Stack for fun and profit",
> > because this is basically "Smashing the IOS stack for fun and profit"
>
> Wasn
This is an automated weekly mailing describing the state of the Internet
Routing Table as seen from APNIC's router in Japan.
Daily listings are sent to [EMAIL PROTECTED]
If you have any comments please contact Philip Smith <[EMAIL PROTECTED]>.
Routing Table Report 04:00 +10GMT Sat 13 Aug, 2005
That is the product/technology they got from their acquisition of netVmg,
one of the companies in the so-called "route optimization" space (see also
Routescience, Proficient Networks, Sockeye Networks).
Sockeye was also acquired by Internap. And then later, RouteScience was
picked up by Av
Hello. The drone armies research and mitigation mailing list is moving
its reporting mechanism to the next level.
If you have updated contact information for any of the below AS owners,
please contact me _off-list_.
Thanks,
Gadi.
3MENATWORK - 3menatwork.com
AAPT AAPT Limited
ABACU
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
So I am standing in a datacenter fiddling with some fiber and
listening to an electrician explaining to the datacenter owner how he
has just finished auditing all of the backup power systems and that
the transfer switch will work this time (unl
[EMAIL PROTECTED] wrote:
On Fri, 12 Aug 2005 12:33:40 EDT, "J. Oquendo" said:
their equipment. If it's IPv6 based only, and not that big of a threat,
then they should see no problem with the information being released.
The specific exploit was IPv6 only. The concept that IOS is a sane ope
On Fri, 12 Aug 2005 12:33:40 EDT, "J. Oquendo" said:
> their equipment. If it's IPv6 based only, and not that big of a threat,
> then they should see no problem with the information being released.
The specific exploit was IPv6 only. The concept that IOS is a sane operating
system, and that give
Hi,
With apologies to the topic fairies ..
Crist Clark wrote:
It matters how you look at income taxes (figures never lie, but
liars figure). The top 3% of earners pay about 40% of all income
taxes. The top 1/12% pay about 10% of the taxes. Why do the super
rich guys want a flat tax? And the ot
Saying that this is IPv6 only is misleading. The point of Mike's talk
was to show that buffer overflows do more than DOS or reset a Cisco box,
but they can actually be exploited like most things we learn about every
Patch Tuesday.
In the example he used in the talk, he showed off an exploit that
Purpose for posting it was, after reading it, there is not enough in my
opinion to warrant a nuclear lock down on this information. I did this to
sort of prove a point to those in the industry: "Stop letting vendors sell
you short." As an engineer they've (Cisco) shortchanged clients using
their
J. Oquendo wrote:
www.infiltrated.net/cisco/holygrail.pdf
I find it rather funny, really.
Back in defcon, everybody was trading the presentation quietly and eagerly.
Then every kiddie started asking if anyone wants it.
Then we all got URL's to download it from.
Then there was another pass
www.infiltrated.net/cisco/holygrail.pdf
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
GPG Key ID 0x97B43D89
http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x97B43D89
To conquer the enemy without resorting to war is the most
desirable. The highest form of generalship is to
On Fri, 12 Aug 2005 06:50:47 CDT, "James D. Butt" said:
> Unless there is some sort of crazy story related to why a service provider
> could not keep the lights on, this should have not been an issue with
> proper operations and engineering.
So a while ago, we're in the middle of some major con
-Original Message-
From: [EMAIL PROTECTED]
On Behalf Of James D. Butt
> Unless there is some sort of crazy story related
> to why a service provider
> could not keep the lights on, this should have not
> been an issue with
> proper operations and engineering.
6 stories from the t
> Unless there is some sort of crazy story related to why a service
provider
> could not keep the lights on, this should have not been an issue with
> proper operations and engineering.
I'll let others tell you about the rat that caused a
short circuit when Stanford attempted to switch to
back
Yes that is an exception... not what happened in this case
You can come up with a lot of valid exceptions...
There are many reasons why a Tier 1 provider does not stick all its eggs
in multi-tenant buildings... smart things can be done with site selection.
I am not saying ever customer
On Fri, 12 Aug 2005, Greenhagen, Robin wrote:
Does anyone else require HICAP loop installs to be after hours? What
experiences have you had (good or bad) with getting the carriers to do
their work during off-peak hours for a reasonable fee?
We've done off-hours turnups before, at my previous
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of
James D. Butt
> Unless there is some sort of crazy story related to why a service provider
> could not keep the lights on, this should have not been an issue with
> proper operations and engineering.
The build
This report has been generated at Fri Aug 12 21:45:46 2005 AEST.
The report analyses the BGP Routing Table of an AS4637 (Reach) router
and generates a report on aggregation potential within the table.
Check http://www.cidr-report.org/as4637 for a current version of this report.
Recent Table Hist
I certainly understand why utility power goes out and that is the reason
why MCI loosing power confuses me. I am pretty sure that someone at MCI
also realizes why the blackout happens and how fragile things are.
It is irresponsible for a Tier 1 infrastructure provider to not be able to
gen
> Not sure I understand how on earth something like this happens... power
is
> not that confusing to make sure it does not stop working.
Is that so?
Have you read the report on the Northeast blackout of 2003?
https://reports.energy.gov/
--Michael Dillon
One of our incumbent LECs (who's initials begin with SBC) botched a
mid-day installation of an additional GIGAMAN drop at our primary DC
earlier this year. Whatever they did, it dropped all of our fiber plant
with SBC. The outages caused were PAINFULL and expensive from an SLA (to
our customers)
39 matches
Mail list logo