to query.
Read this draft for an idea of how this might work. If you haven't time to
read the whole thing then just look at section 7.
http://www.ehsco.com/misc/draft-ietf-crisp-lw-core-00.txt
And there is an IETF working group called CRISP that is discussing this
stuff.
-- Michael Dillon
and give you a pointer to that leaseholder's LDAP server
where you could query for whatever info they have available. This could
include route registry info.
--Michael Dillon
://ldap2dns.tiscover.com/
--Michael Dillon
and similar jobs.
--Michael Dillon
should use more pre-existing work by others in those areas where our needs
are not so unique.
--Michael Dillon
will publish their
usage in their own LDAP servers that will be part of the ARIN trust
hierarchy.
Once this begins to provide benefit in North America, the rest of the
world will soon follow.
--Michael Dillon
easier for other people to re-use,
improve and contribute
http://www.jython.org/
http://python-ldap.sourceforge.net/
http://ruby-ldap.sourceforge.net/
--Michael Dillon
with commercial off-the-shelf (COTS) hardware
and software. Too many people are biased against this approach because of
the days when the IBM RS-6000 based routers were replaced with
purpose-built boxes from Cisco and Wellfleet (now Nortel).
--Michael Dillon
versus dual-stack backbone. In fact, that
would be an interesting topic for some discussion on the list.
--Michael Dillon
. This is just one
example of how changing the pricing structure could radically change
people's behavior in using a service.
-- Michael Dillon
of the organization who has registered this address.
--Michael Dillon
PS: Worm? Virus? Who wrote this up concisely first?
Shockwave Rider by John Brunner
Is it still in print, I wonder?
--Michael Dillon
servers
would be infected.
--Michael Dillon
, system admin software etc.
The implication of this is that we have already almost run out of IPv4
address space because the rest of the former Class A space is tainted and
unusable on the global Internet.
IPv6 anyone?
http://www.ipv6forum.org
http://hs247.com/
--Michael Dillon
directories are already integral parts of running many large networks in
universities and corporations. We should use it in the global Internet as
well.
-- Michael Dillon
use UNIX servers and scripting languages in their network
operations.
--Michael Dillon
an LDAP server you can specify which fields you
want to retrieve. Applications that don't need the vulnerability info
won't bother asking for it.
--Michael Dillon
of thing will continue to
happen.
--Michael Dillon
the
filters. That should not be a problem assuming that ARIN issues addresses
every weekday.
--Michael Dillon
why anyone
would want to run any other data distribution protocol.
-- Michael Dillon
;-)
that there are lots of problems with this that need to
be solved and slippery slopes that we have to be wary of, but that is not
a reason for not trying.
--Michael Dillon
and people running LDAP directories on a much larger
scale than we need. There is no question that it would work, we just need
the will to prevail against these problems instead of throwing up our
hands and claiming it's too hard, it's impossible and it's not my problem.
--Michael Dillon
with rsync polling would be a vast
improvement over email. But LDAP is proving to be the direction that the
world is moving in for this type of directory service so why not leverage
the tools and expertise that are available out there?
-- Michael Dillon
and we should be
leveraging it rather than continuing with crude hacks for old times sake.
--Michael Dillon
doesn't do much more than the same old thing.
-- Michael Dillon
/index.html
-- Michael Dillon
or operational methods.
But there are non-technical and non-operational actions actions that ARIN
could take to help. The details of those actions and whether or not ARIN
members want to act are matters for the ppml list.
--Michael Dillon
topology of a
network.
If a researcher wants to do analysis of real network topologies they
either need to get the real maps from the ISPs in question or else they
need to ally themselves with someone like Telegeography who have this
information for at least some ISPs.
--Michael Dillon
of networks will reject this kind of centralized system in
the same way that they are rejecting every other form of centralized
control.
--Michael Dillon
in a
metropolitan area. Just as there are several major hospitals, there should
be several carrier hotels.
-- Michael Dillon
to a cooling tower?
Would this be better or safer than existing systems? Could it possibly be
built this way without municipal government involvement?
--Michael Dillon
, there is a role for government here. How about
tax reductions for companies who harden their networks by removing single
points of failure that are vulnerable to terrorist attack?
--Michael Dillon
fix the problem or find customers who care about other things like
PoP locations or SLA reporting or something other than network quality.
--Michael Dillon
you might remember or look up smb's presentation on 'pushback' at
some nanog or another (those anonymous hotel rooms kinda blur,
especially before first coffee). that's not perfect, but it
scales. and it's an engineering approach to a technology problem,
always a good sign.
I find
a server with a low-bandwidth stream of SYN packets.
--Michael Dillon
routes.
---
Michael Dillon
places to block them, you
should be trying to identify the good places that should be allowed
access. If someone from a good place can't get in, then give them a web
page to register a complaint and check it out manually if you think it is
worth your while.
Michael Dillon
the weighting
that should be applied to various ISP networks in calculating a national
traffic light report on Internet health.
I anyone is interested in discussing this further perhaps we could get
together in Eugene to discuss it.
-- Michael Dillon
802.11b radio traffic, it might be a lot easier to catch
them...
--Michael Dillon
i awoke from my hibernation to this mail. what's going on?
Why do we let RIchard Sexton get away with posting this kind of insulting
drivel to the list?
/paulgraham/spam.html
--Michael Dillon
is more current and more thorough and these people could help the courts
make better decisions if they would step up and offer their services as
expert witnesses or as advisors to the legal teams arguing these cases.
Michael Dillon
.
--Michael Dillon
of compromised
machines used to initiate DDOS attacks will begin to secure their machines
the way they should have in the first place.
-- Michael Dillon
Try a traceroute from inside the Ebone IP network at http://www.ebone.net.
A few minutes ago it was still working.
Have you got any confirmation that they are, in fact, shutting down the
DWDM equipment? This would leave everyone in the dark except for IRU
customers...
--Michael Dillon
ex
something called Deriveit that you can get on a 30 day trial which
might be sufficient for some people.
--Michael Dillon
601 - 646 of 646 matches
Mail list logo