Raymond L. Corbin wrote:
It'd be nice if more companies of their size responded that way. :)
they have ~6% of the employees of the employees of say verizon and
slightly less than the 123 years of cruft that the later has.
-Ray
-Original Message-
From: [EMAIL PROTECTED]
Suresh Ramasubramanian wrote:
On Sun, Apr 13, 2008 at 3:57 PM, Rob Szarka [EMAIL PROTECTED] wrote:
True, though some aspects of mail service are inextricably tied to broader
networking issues, and thus participation here might still benefit them. But
sadly Yahoo doesn't even seem to
Hank Nussbacher wrote:
At 11:49 PM 08-04-08 -0400, Sean Donelan wrote:
On Tue, 8 Apr 2008, Martin Hannigan wrote:
You can purchase these things from sattelite image services these days
as well as get them from intelligence services.
Awesome, so could anyone buy a copy of the same images?
Brian Raaen wrote:
Russia (or the USSR at that time) used to use liquid graphite to cool their
nuclear reactors, even thought it was flammable of course that was what
they were using in Chernobyl.
This has diverged far enough that it's now off the topic of cooling. The
melting point
Ben Butler wrote:
There comes a point where you cant physically transfer the energy using air
any more - not less you wana break the laws a physics captin (couldn't
resist sorry) - to your DX system, gas, then water, then in rack (expensive)
cooling, water and CO2. Sooner or later we will sink
Mark Newton wrote:
Those of us who use ADSL or (heaven forbid) Cable are kinda out of luck.
I haven't yet found ADSL2+ CPE that does IPv6 over PPPoE or PPPoA out
of the box.
Any cablelebs certified docsis 3.0 CM or CMTS supports ipv6.
Your cable provider will have to upgrade their CMTS
Frank Bulk - iNAME wrote:
Slightly off-topic, but tangentially related that I'll dare to ask.
I'm attending an Emerging Communications course where the instructor
stated that there are SOHO routers that natively support IPv6, pointing to
Asia specifically.
Do Linksys, D-Link, Netgear, etc.
Dave Pooser wrote:
To me there is no question of whether or not you filter traffic for
residential broadband customers.
SBC in my area (Dallas) went from wide open to outbound 25 blocked by
default/opened on request. I think doing the same thing with port 22 would
also people who do real
Frank Bulk wrote:
The last few spam incidents I measured an outflow of about 2 messages per
second. Does anyone know how aggressive Telnet and SSH scanning is? Even
if it was greater, it's my guess there are many more hosts spewing spam than
there are running abusive telnet and SSH scans.
Randy Bush wrote:
Isn't it the case in the real world that the Internet isn't TCP ECN
compatible?
actually, no. ecn compat is increasing, happy to say.
Hopefully the number of people with 8 year old pix firewall software is
not...
Frank Bulk - iNAME wrote:
To keep this OT as much as possible, my question is if a mesh-configuration
of backup routes (where one link could provide 'protection' for many) would
be considered a sufficient replacement for SONET rings, or if the Qwest CTO
is really trying to get out of providing
John Payne wrote:
On Feb 25, 2008, at 1:22 AM, Christopher Morrow wrote:
except that even the 'good guys' make mistakes. Belt + suspenders
please... is it really that hard for a network service provider to
have a prefix-list on their customer bgp sessions?? L3 does it, ATT
does it, Sprint
Tuc at T-B-O-H.NET wrote:
Doesn't sound like sabotage to me. In fact, it sounds like bad luck.
Will this now be termed Anchor fade in the future?
It's only being occurring for ~160 years at this point, so clearly it's
a new and exciting phenomena.
Tuc
Owen DeLong wrote:
I'm sorry, but, I have a great deal of difficulty seeing how an IP can
be considered
personally identifying.
In the case the german regulator is dealing with the ip address is not
be considered exclusive of the rest of a data set. The question is given
a commercially
Eric Brunner-Williams wrote:
Correct. In the EU DP framework (see:
http://ec.europa.eu/justice_home/fsj/privacy/), personal
privacy doesn't arise from private law (contract or property), but from
public law (the human rights
statements contained in the treaty under which the EU is formed).
Randy Bush wrote:
vendors, like everyone else, will do what is in their best interests.
as i am an operator, not a vendor, that is often not what is in my best
interest, marketing literature aside. i believe it benefits the ops
community to be honest when the two do not seem to coincide.
If
Randy Bush wrote:
Joel Jaeggli wrote:
equipment makers (as much as randy hates them)
excuse?!?!? that is unjustified and uncalled for.
vendors, like everyone else, will do what is in their best interests.
as i am an operator, not a vendor, that is often not what is in my best
interest
Joe Greco wrote:
It's likely that the device may choose to nat when they cannot obtain a
prefix... pd might be desirable but if you can't then the alternative is
easy.
I thought we were all trying to discourage NAT in IPv6.
You/we are... Which is why you really need PD, and cpe needs to
Joe Greco wrote:
There is a huge detent at /48, but there's a certain amount of guidance
that can only be derived from operational experience. It's not clear to
me why /56 would be unacceptable, particularly if you're delegating them
to a device that already has a /64. Are one's customers
Randy Bush wrote:
the but what if they want the toaster on a separate subnet from the
blender gives a new depth to 'reaching.' the one case i can think of
for firewalling/routing within the home is to keep the bathroom scale
from locking the fridge.
and if you can't make a reasonable case
Randy Bush wrote:
Joel Jaeggli wrote:
Randy Bush wrote:
the but what if they want the toaster on a separate subnet from the
blender gives a new depth to 'reaching.' the one case i can think of
for firewalling/routing within the home is to keep the bathroom scale
from locking the fridge
Randy Bush wrote:
There is a huge detent at /48
other than the perennial operational pontification from on high by the
gods of the ietf (brought to us by the folk who brought us the wonderful
TLA, NLA, etc. classfulness++), could you elucidate?
From one angle, last time I looked, the RIRs
Roland Dobbins wrote:
On Nov 27, 2007, at 7:03 AM, Jared Mauch wrote:
Other operating systems may follow. (This was a WAG, based on gut
feeling).
Nokia by default require app installed on the phones to be signed,
though one can disable this functionality (and in fact must, in order
Suresh Ramasubramanian wrote:
On Nov 22, 2007 6:15 PM, Adrian Chadd [EMAIL PROTECTED] wrote:
On Thu, Nov 22, 2007, Suresh Ramasubramanian wrote:
Great. So half the world's population is dead, lots of dotbombs are
out of business .. but you have LOTS of IP space that's suddenly
unused and
30 to 50% of your user population using 802.11a.
Frank
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Joel
Jaeggli
Sent: Saturday, November 10, 2007 11:51 PM
To: Adrian Chadd
Cc: Suresh Ramasubramanian; nanog@merit.edu
Subject: Re: cpu needed
Adrian Chadd wrote:
On Sat, Nov 10, 2007, Suresh Ramasubramanian wrote:
Speaking of all that, does someone have a conference wireless' bcp
handy? The sort that starts off with dont deploy $50 unbranded
taiwanese / linksys etc routers that fall over and die at more than 5
associations,
[EMAIL PROTECTED] wrote:
And of course, if you still believe just adding bandwidth
will solve the problems
Joe St. Sauver probably said it best when he pointed out in slide 5 here
http://www.uoregon.edu/~joe/i2-cap-plan/internet2-capacity-planning.ppt
the N-body problem can be a
Paul Vixie wrote:
Dr. Larry Roberts, co-founder of the ARPANET and inventor of packet
switching, predicts the Internet is headed for a major crisis in an article
published on the Internet Evolution web site today. Internet traffic is now
growing much more quickly than the rate at which router
Frank Bulk wrote:
Here's timely article: KDDI says 900k target for fibre users 'difficult'
http://www.telegeography.com/cu/article.php?article_id=20215email=html
KDDI isn't the only ftfth provider... NTT east/west (flets), usen,
softbank/yahooBB and others all play in that space.
100/100 from
Steven M. Bellovin wrote:
This result is unsurprising and not controversial. TCP achieves
fairness *among flows* because virtually all clients back off in
response to packet drops. BitTorrent, though, uses many flows per
request; furthermore, since its flows are much longer-lived than web
Jim Popovitch wrote:
On Sun, 2007-10-21 at 22:45 -0400, Geo. wrote:
Second, the more people on your network running fileshare network software
and sharing, the less backbone bandwidth your users are going to use when
downloading from a fileshare network because those on your network are
Scott Weeks wrote:
I have seen a LOT of that equipment out there in places like universities and
whatnot.
Eventually this stuff falls out of the internet or gets consigned to
roles where it can't do much in the way of damage. The timescale over
which this happens is extremely long. ipv4
Stephen Wilcox wrote:
On 9 Oct 2007, at 18:39, Joel Jaeggli wrote:
Stephen Wilcox wrote:
i'm not sure that sounds like improvement. why cant the charter just
allow them to decide a presentation is worth having without going
through all the hoops that Paul mentions if its appropriate
Martin Hannigan wrote:
I suggest with the best intention possible that marty unwad his shorts
and the rest of us STFU and GBTW.
I'll add others to the list, but yes, in the simplest possible terms, this
thread was a ridiculous waste of time of everyone involved.
Well, Vijay can KMA, but
Stephen Wilcox wrote:
i'm not sure that sounds like improvement. why cant the charter just
allow them to decide a presentation is worth having without going
through all the hoops that Paul mentions if its appropriate?
I don't recall feeling particularly bound by the procedure. In the sense
Randy Bush wrote:
no sc hat at all
I did not think at the time that, that particular message contributed
much to the general tenor of the discussion. The implication I derived
was not that joe nacchio was a felon, we all know this (19 counts of
insider trading), but that .au is still a penal
Martin Hannigan wrote:
How do we determine what people do want to read vs. what they don't?
It would be nice to have some direction. I don't mean from futures,
there's nobody really here, but I mean community wide overall? How do
we determine what people really want to hear about and act
[EMAIL PROTECTED] wrote:
I'm really interested to see what happens when we start filling those
same routers with ipv6 routes.
All 970 of them?
joelja
*Randy Bush [EMAIL PROTECTED]*
Sent by: [EMAIL PROTECTED]
10/08/2007 06:10 PM
To
Justin M. Streiner [EMAIL
[EMAIL PROTECTED] wrote:
please elaborate. My knowledge of IPv6 is admittedly lacking, but I
always assumed that the routing tables would be much larger if the
internet were to convert from IPv4 due to the sheer number of networks
available.
Currently The IPv6 DFZ is 970 routes from 808
[EMAIL PROTECTED] wrote:
And before anyone accuses me of sounding overly critical
towards the AU ISP's, let me point out that we've dropped the
ball in a major way here in the United States, as well.
We've dropped the ball in any place where the broadband architecture is
to backhaul IP
John Curran wrote:
At 9:21 PM -0400 9/3/07, Joe Abley wrote:
Is there a groundswell of *operators* who think TCP should be replaced, and
believe it can be replaced?
Just imagine *that* switchover, with the same level of
transition planning as we received with IPv6...
;-)
The congestion
William Herrin wrote:
On 8/30/07, John Curran [EMAIL PROTECTED] wrote:
I.E. If at some time unknown around 2010, ISP's stop receiving
new allocations from their RIR, and instead use of many smaller
recycled IPv4 address blocks, we could be looking at a 10x to
20x increase in routes per
Chengchen Hu wrote:
Thank you for your detailed explainaton.
Just suppose no business fators (like multiple ASes belongs to a same ISP),
is it always possible for BGP to automatically find an alternative path when
failure occurs if exist one? If not, what may be the causes?
If you
Philip Lavine wrote:
I just don't understand how if there is 1 segment that gets lost how this
could translate to such a catastrophic long period of slow-start. How can I
minimize the impact of the inevitable segment loss/out of order over a WAN.
Is QoS the only option?
Different tcp
Nicolás Antoniello wrote:
Hi Steve,
Sure... I've never mention 3 STM4... the example said 3 carriers.
OK, you may do it with communities, but if you advertise all in just one
prefix, even with communities, I find it very difficult to control the
trafic when it pass through 2 or more AS
Kevin Oberman wrote:
SNIP
While these are wasted, getting them back is essentially impossible.
The term wasted is being used way to freely on this list.
If by waste you mean:
To use, consume, spend, or expend thoughtlessly or carelessly.
Then I have to disagree.
If you mean they
Adrian Chadd wrote:
On Mon, Jun 04, 2007, Sam Stickland wrote:
Personally I hate NAT. But I currently work in a large enterprise
environment and NAT is suprisingly popular. I came from a service
provider background and some of the attitudes I've discovered towards
private addresses in
Randy Bush wrote:
the average number of v4 prefixes per AS is ~10, and it's rising. In
v6, the goal is that every PI site can use a single prefix**, meaning
the v6 routing table will be at least one (and two or even three
eventually) orders of magnitude smaller than the v4 one.
how much
Neal R wrote:
44.0.0.0/8 is assigned to amateur radio operators. I'm a technician
licensee in good standing (callsign K0BSD) and I'd like to start using
portions of this space for an access project. I've been casting around
with the Google for a little bit and I can't find any central
Sean Donelan wrote:
On Sun, 13 May 2007, Florian Weimer wrote:
Fortunately, there is a simple solution to this kind of problem: ISPs
are very likely liable if they fail to alert customers about security
problems, and do not provide updates in a timely manner. After a few
painful
Patrick W. Gilmore wrote:
The only good thing I can say about this proposal is that 10GB is not
NEARLY enough to get your typical luser to think about changing their
configuration. Therefore, it probably won't have an impact on v6
adoption. (That ghod.)
Nor was it intended to. From what
J. Oquendo wrote:
On Thursday, 29 March 2007, a Cisco Systems router, flying
in low Earth Orbit onboard the UK-DMC satellite built by
Surrey Satellite Technology Ltd (SSTL), was successfully
configured by NASA Glenn Research Center to use IPsec and
IPv6 technologies in space.
The program committee (I am a member, but not representing) had some
discussion in Toronto on the subject of recruiting tutorials containing
entry level material. Philip's bgp tutorials have always been well
received but most tutorial material we receive is aimed fairly narrowly
at
Jack Bates wrote:
Jeff Shultz wrote:
Alexander Harrowell wrote:
768 ain't broadband. Buy Cisco, Alcatel, and Akamai stock!
If you don't like it, you can always return to dialup.
It certainly is - just ask the CALEA folks and as for who is
pushing the bandwidth curve, for the
Roland Dobbins wrote:
On Mar 13, 2007, at 10:10 AM, Daniel Senie wrote:
As with the deployment of telephone service a century ago, the
ubiquitious availability of broadband service will require government
involvement in the form of fees on some and subsidies for others
(might be a good
[EMAIL PROTECTED] wrote:
On Thu, 15 Feb 2007 11:30:34 EST, Drew Weaver said:
Has anyone created an RBL, much like (possibly) the BOGON list which
includes the IP addresses of hosts which seem to be infected and are
attempting to brute-force SSH/HTTP, etc?
It would be fairly easy to
Etaoin Shrdlu wrote:
NANOG-L is unique. There isn't anything else devoted to issues for truly
large networks, and the providers that manage the distance between them.
When I see Cisco (or Juniper, or Extreme) announcements about a
vulnerability, those are useful. Nonsense about Solaris 10
Paul Vixie wrote:
(i'm guessing kc will be on the phone soon, to get from them their data?)
While I'm sure people were looking for headlines, I think the broader
implication in the report was current pricing power not supporting new
investment.
...
A recent report from Deloitte said 2007
Just a reminder, This BOF has been scheduled for monday afternoon in the
16:00-17:30 slot in Sheraton hall B/C.
If you are going to be at NANOG 39 and you have an interest in the
subject or a perspective you'd like to offer please attend the BOF.
If you'd like some time set aside on the agenda
Joseph S D Yao wrote:
On Wed, Jan 24, 2007 at 01:48:04PM -, [EMAIL PROTECTED] wrote:
...
IPv6 makes NAT obsolete because IPv6 firewalls can provide all
the useful features of IPv4 NAT without any of the downsides.
...
IPv6 firewalls? Where? Good ones?
There are vendors on this list
Carl Karsten wrote:
Hi list,
I just read over: http://www.nanog.org/mtg-0302/ppt/joel.pdf because I
am on the PyCon ( http://us.pycon.org ) team and last year the hotel
supplied wifi for the 600 attendees was a disaster (they probably were
not expecting every single one to have and use a
Jim Segrave wrote:
On Sun 14 Jan 2007 (01:51 -0800), Bill Woodcock wrote:
http://news.yahoo.com/s/afp/20070112/tc_afp/asiaquakeinternet_070112170621
A few numbers to help understand the scale of the effort being applied.
Is it just me or is this article a migraine inducing mix of metric
on the agenda, mail me and we'll add you.
Thanks
Joel Jaeggli
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.4 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFFqtOL8AA1q7Z/VrIRAqBpAJ0d/AonXwzmQni22zwtnKjOWuEWigCeK1Fg
QngJ9c0pXxaFu377paCpxjA=
=I29s
-END PGP
disastrous consequences, gas lines, oil lines, well heads, high voltage
power lines, and of course lots of other things that fall into the
category of navigational hazards.
joelja
--
Joel Jaeggli Unix Consulting
Drew Weaver wrote:
I am looking for opinions of what US carriers have the best
connectivity with the international players such as teleglobe, etc.
Mainly, we are trying to determine if there is any way for us to get
less latency from teleglobe's customers to our network (we currently see
?
/rant
wanna present all this rant and the proper solution to rant at the next
nanog? :)
Perhaps we should be celebrating the upcoming 10th anniversary of bcp 17.
--
Joel Jaeggli Unix Consulting
the risk of fire due to
exploding batteries happening in the plane :P
--Mikael Abrahamssonemail: [EMAIL PROTECTED]
--
Joel Jaeggli Unix Consulting [EMAIL PROTECTED]
GPG Key Fingerprint: 5C6E 0104
the
comma is used for decimal notation.
ten thousand10.000
ten and 51 hundredths 10,51
and for good historical measure:
seventeen hundred sixty one M. DCC. LXI.
--
Joel Jaeggli Unix
they would possibly support
desktop issues like this.
joelja
Thanks,
Gadi.
--
Joel Jaeggli Unix Consulting [EMAIL PROTECTED]
GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2
Paul Vixie wrote:
[EMAIL PROTECTED] (Joel Jaeggli) writes:
Even in an enterprise it's really hard to justify the expenditure that a
rapid response to a host security problem involves. For an isp which is
not likely to be in the position to recover the cost of being reactive
let alone pro
On Wed, 9 Aug 2006 23:51:58 -0400
Derek J. Balling [EMAIL PROTECTED] wrote:
On Aug 9, 2006, at 10:59 PM, Allan Poindexter wrote:
At LISA a couple of years ago a Microsoftie got up at the SPAM
symposium and told of an experiment they did where they asked their
hotmail users to identify
represents a meaningful sample of google adwords customers is
left as an exercise for the reader.
That saves a lot of bandwidth urgently needed for ranting :)
Have a nice weekend.
Cheers
Peter and Karin
--
--
Joel Jaeggli
On Mon, 24 Apr 2006, Henry Linneweh wrote:
Maintenance windows are common on most network service
providers, have been for years...
In what way does that invalidate the fact that I think it wasn't worth
reporting?
-Henry
--- Joel Jaeggli [EMAIL PROTECTED] wrote:
On Sun, 23 Apr
reports are operational, unlike many
threads. More, please.
Daniel Golding
--
--
Joel Jaeggli Unix Consulting [EMAIL PROTECTED]
GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2
one for each TV...
Simon
(Currently working on an H.264 IPTV deployment)
--
--
Joel Jaeggli Unix Consulting [EMAIL PROTECTED]
GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2
]
--
--
Joel Jaeggli Unix Consulting [EMAIL PROTECTED]
GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2
it this day/year.)
--
--
Joel Jaeggli Unix Consulting [EMAIL PROTECTED]
GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2
~
~~~
--
--
Joel Jaeggli Unix Consulting [EMAIL PROTECTED]
GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2
the data end-to-end.
Ross Hosman
Network/Systems Administrator
E: [EMAIL PROTECTED]
P: 618-644-2111 x 238
C: 314-898-3381
Y!: rosshosman
--
--
Joel Jaeggli Unix Consulting [EMAIL PROTECTED]
GPG Key
--
--
Joel Jaeggli Unix Consulting [EMAIL PROTECTED]
GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2
APs are trying to detect other configs
(Client for MS/Netware, F/P Sharing, SNMP, WINS, IPX, etc).
No they're just poor clueless users with bad software.
-Jim P.
--
--
Joel Jaeggli Unix Consulting
linksys on it, and have the word
vpn (among others) buried on the packaging someplace.
Steve
--
--
Joel Jaeggli Unix Consulting [EMAIL PROTECTED]
GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000
clued individuals is anything to go by!)
my 2-cents :0)
Steve
--
--
Joel Jaeggli Unix Consulting [EMAIL PROTECTED]
GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2
--
--
Joel Jaeggli Unix Consulting [EMAIL PROTECTED]
GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2
])
--[ ELMI-RIPE
]---
--
--
Joel Jaeggli Unix Consulting [EMAIL PROTECTED]
GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2
) everytime this happens.
joelja
--
--
Joel Jaeggli Unix Consulting [EMAIL PROTECTED]
GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2
, is prohibited.
--
--
Joel Jaeggli Unix Consulting [EMAIL PROTECTED]
GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2
of a few nodes.
QED, HTH, HAND
--
--
Joel Jaeggli Unix Consulting [EMAIL PROTECTED]
GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2
, but it's always good to ask.
Joe Johnson
[EMAIL PROTECTED]
--
--
Joel Jaeggli Unix Consulting [EMAIL PROTECTED]
GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2
not
publishing my network map.
Lee
--
--
Joel Jaeggli Unix Consulting [EMAIL PROTECTED]
GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2
?
--
--
Joel Jaeggli Unix Consulting [EMAIL PROTECTED]
GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2
On Mon, 12 Sep 2005, Suresh Ramasubramanian wrote:
On 12/09/05, Joel Jaeggli [EMAIL PROTECTED] wrote:
It doesn't scare us... ever try nmaping a /48?
one host at a time? from a single point? nope - once v6 becomes common
enough someone will just write a nice little distributed botnet
and population density here.
Joe
--
--
Joel Jaeggli Unix Consulting [EMAIL PROTECTED]
GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2
important than
supporting the needs of the community of interest, then they've obviously
failed their membership.
jms
--
--
Joel Jaeggli Unix Consulting [EMAIL PROTECTED]
GPG Key Fingerprint: 5C6E
rationally have a discussion of BSD
internals or differing *BSD development/management styles.
--
--
Joel Jaeggli Unix Consulting [EMAIL PROTECTED]
GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000
owned by Juniper of Borg.
-a
--
--
Joel Jaeggli Unix Consulting [EMAIL PROTECTED]
GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2
overlay networks don't make much use of the dns now for
service and resource location, it's seems likely that they won't on v6
either.
--==--
Bruce.
--
--
Joel Jaeggli Unix Consulting [EMAIL PROTECTED
stable.
--
--
Joel Jaeggli Unix Consulting [EMAIL PROTECTED]
GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2
On Fri, 5 Aug 2005, Joel Jaeggli wrote:
On Fri, 5 Aug 2005, Sabri Berisha wrote:
With the use of anycast DNS servers on the internet, TCP is no longer an
option for DNS.
oddly enough there's been some research on this subject. you might not in
fact be able to conclude that if your routing
Thanks in advance,
--
Makoto Kawano [EMAIL PROTECTED]
SOFTBANK BB Corp.
Yahoo!BB Network Operation Center
--
--
Joel Jaeggli Unix Consulting [EMAIL PROTECTED]
GPG Key Fingerprint: 5C6E 0104 BAF0 40B0
1 - 100 of 192 matches
Mail list logo