On Fri, 10 Aug 2007 16:11:04 -0700
Douglas Otis <[EMAIL PROTECTED]> wrote:
> TCP offers a means to escape UDP related issues. On the other hand,
> blocking TCP may offer the necessary motivation for having these UDP
> issues fixed. After all, only UDP should be required. When TCP is
> de
On Aug 10, 2007, at 9:13 AM, Max Inux wrote:
> Working for a content delivery network I can tell you that there
> are many nameservers ignoring TTL that affect many users (AOL
> being the largest american one). Coincidentally AOL users aren't
So, I'd also ask this, do you know it's the recur
> >>> On 8/9/2007 at 10:07 PM, Mark Andrews <[EMAIL PROTECTED]> wrote:
>
> > In article <[EMAIL PROTECTED]> you write:
> >>
> >>I suspect that the origin of the myth that DNS/TCP is more
> >>dangerous than DNS/UDP is that the first root expliot of
> >>named was over TCP not UDP. The
On Aug 10, 2007, at 4:41 PM, Paul Vixie wrote:
On the other hand, potentially larger messages may offer the
necessary
motivation for adding ACLs on recursive DNS, and deploying BCP 38.
i surely do hope so. we need those ACLs and we need that
deployment, and if
message size and TCP fallb
> Your comments have helped.
groovy.
> When TCP is designed to readily fail, reliance upon TCP seems questionable.
i caution against being overly cautious about DNS TCP if you're using RFC 1035
section 4.2.2 as your basis for special caution. DNS TCP only competes
directly against other DNS TC
>>> On 8/10/2007 at 11:55 AM, "Patrick W. Gilmore" <[EMAIL PROTECTED]>
wrote:
> On Aug 10, 2007, at 12:46 PM, John Levine wrote:
>
>>> Very interesting. We've all heard and probably all passed along
>>> that little
>>> bromide at one time or another. Is it possible that at one time
>>> it
>>> On 8/9/2007 at 10:07 PM, Mark Andrews <[EMAIL PROTECTED]> wrote:
> In article <[EMAIL PROTECTED]> you write:
>>
>> I suspect that the origin of the myth that DNS/TCP is more
>> dangerous than DNS/UDP is that the first root expliot of
>> named was over TCP not UDP. There were l
On Aug 9, 2007, at 2:05 PM, Paul Vixie wrote:
Your comments have helped.
i think you're advising folks to monitor their authority servers to
find out how many truncated responses are going out and how many
TCP sessions result from these truncations and how many of these
TCP sessions are
Carl Karsten wrote:
I guess yes. They might implement a non swimmers basin for the
windows people and a sharks only basin for the rest of us.
what is a non swimmers basin ?
A toilet?
Or maybe a kiddie wading pool.
--
Jay Hennigan - CCIE #7880 - Network Engineering - [EMAIL PROTECTED]
Im
Hello Guys,
Thanks for the information. What I was thinking was if you get more
information, can you make any use of it? Can you provide a bundled service
per se? Can it help you in remote management of home consoles?
Thanks
On 8/10/07, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
>
> On Fri,
On Aug 10, 2007, at 12:46 PM, John Levine wrote:
Very interesting. We've all heard and probably all passed along
that little
bromide at one time or another. Is it possible that at one time
it was true
(even possibly for AOL) but with the rise of CDNs, policies of not
honoring
TTL's have
This is an automated weekly mailing describing the state of the Internet
Routing Table as seen from APNIC's router in Japan.
Daily listings are sent to [EMAIL PROTECTED]
For historical data, please see http://thyme.apnic.net.
If you have any comments please contact Philip Smith <[EMAIL PROTECTED
On Aug 10, 2007, at 1:55 AM, Paul Reubens wrote:
How do you engineer around enterprise and ISP recursors that don't
honor TTL, instead caching DNS records for a week or more?
A friend of mine was working for a place that performed some service
on data (not important what, you send them
On Aug 10, 2007, at 9:13 AM, Max Inux wrote:
Working for a content delivery network I can tell you that there
are many nameservers ignoring TTL that affect many users (AOL
being the largest american one). Coincidentally AOL users aren't
nearly so affected by that as they are that thei
On Fri, 10 Aug 2007 09:45:39 CDT, Carl Karsten said:
> thanks. I kinda figured it was something like that, but it was just a bit
> too
> unfamiliar, and around here (US) they just have 2 sides of the pool, know as
> "the shallow end" and "the deep end".
I think Peter was referring to the "Wad
On Thu, 09 Aug 2007 22:58:40 -, Paul Vixie said:
> > How does the (eventual) deployment of DNSSEC change these numbers?
>
> DNSSEC cannot be signalled except in EDNS.
Right. Elsewhere in this thread, somebody discussed ugly patches to keep
the packet size under 512. I dread to think how man
Rodney Joffe wrote:
> On Aug 9, 2007, at 10:55 PM, Paul Reubens wrote:
>
>> How do you engineer around enterprise and ISP recursors that don't
>> honor TTL, instead caching DNS records for a week or more?
>>
>
> In my "little" bit of research and experience over the last 10 years
> in this fiel
On Aug 9, 2007, at 10:55 PM, Paul Reubens wrote:
How do you engineer around enterprise and ISP recursors that don't
honor TTL, instead caching DNS records for a week or more?
In my "little" bit of research and experience over the last 10 years
in this field, I have often pursued this "u
Peter Dambier wrote:
Carl Karsten wrote:
I guess yes. They might implement a non swimmers basin for the
windows people and a sharks only basin for the rest of us.
what is a non swimmers basin ?
Hi Carl,
in germany our public swimming pools have pools for swimmers
and pools for peopl
On Thu, 9 Aug 2007 15:53:12 -0700 (PDT)
Doug Barton <[EMAIL PROTECTED]> wrote:
How many bytes of shell code can you stuff into a 4096 byte EDNS0 UDP
packet? :)
Probably a lot. People used to have 4-line signatures
with the PGP encryption or DECSS. I have a 152-byte C
program that calculate
For ISP, I don't care what applications customers are running.
As long as they are legitimate, it's o.k. with me.
Only concern will be whether they are running malicious code such as
Virus, Spam, DDoS client, or not, which means abusing network resources
and other people's resource.
For that
Carl Karsten wrote:
I guess yes. They might implement a non swimmers basin for the
windows people and a sharks only basin for the rest of us.
what is a non swimmers basin ?
Hi Carl,
in germany our public swimming pools have pools for swimmers
and pools for people who cannot swim. If s
I guess yes. They might implement a non swimmers basin for the
windows people and a sharks only basin for the rest of us.
what is a non swimmers basin ?
Carl K
Paul Atkins wrote:
Hello,
I am a network researcher. One question I want to ask the ISPs here are
that if they have a choice of finding more information about the hosts
that connect to them, is it something they will like to spend money on?
For example if the ISP can find out what applicat
This report has been generated at Fri Aug 10 21:19:42 2007 AEST.
The report analyses the BGP Routing Table of AS2.0 router
and generates a report on aggregation potential within the table.
Check http://www.cidr-report.org for a current version of this report.
Recent Table History
Date
BGP Update Report
Interval: 09-Jul-07 -to- 09-Aug-07 (32 days)
Observation Point: BGP Peering with AS2.0
TOP 20 Unstable Origin AS
Rank ASNUpds % Upds/PfxAS-Name
1 - AS14906 205364 2.8% 41072.8 --
2 - AS9583 150849 2.1% 129.3 -- SIFY-AS-IN Si
> How do you engineer around enterprise and ISP recursors that
> don't honor TTL, instead caching DNS records for a week or more?
Ask their users to tell them to stop being muppets
brandon
--- [EMAIL PROTECTED] wrote:
From: "Paul Atkins" <[EMAIL PROTECTED]>
I am a network researcher. One question I want to ask the ISPs here are that
if they have a choice of finding more information about the hosts that
connect to them, is it something they will like to spend money on? For
example
28 matches
Mail list logo