SMW4 Cable segment 1.1 cable fault
A cable fault was observed on SMW4 Seg. 1.1 (Singapore - Branching Unit #1A)
at 03:15GMT on 26-May. The fault point is about 46km from TUAS Singapore
cable station. Services will resume upon cable repair complete. Cable
ship Asean Restorer was mobilized for
On Tue, 27 May 2008 11:02:32 CDT, Gadi Evron said:
On Tue, 27 May 2008, Jared Mauch wrote:
*yawn*
I guess we will wait for the next one before waking up, than.
No Gadi. What Jared is saying is that there are exactly *ZERO* routers
(for some infinitesimally small value of zero) that will
On Tue, May 27, 2008, [EMAIL PROTECTED] wrote:
There's basically 2 classes of Cisco routers out there:
1) Ones managed by Jared and similarly clued people, who can quite rightfully
yawn because the specter of IOS rootkits changes nothing in their actual
threat model - they put stuff in
On Tue, 27 May 2008, Gadi Evron wrote:
Perhaps the above should be simplified.
Running a hacked/modded IOS version is a dangerous prospect.
This seems like such a non-event because what is the exploit path to load
the image? There needs to be a primary exploit to load the malware image.
On Tue, May 27, 2008 at 11:13 AM, Adrian Chadd [EMAIL PROTECTED] wrote:
Bloody network people, always assuming their network security stops at
their router.
So nowthat someone's done the hard lifting to backdoor an IOS binary,
and I'm assuming you all either upgrade by downloading from the
inline: Blank Bkgrd.gif
On Tue, 27 May 2008, [EMAIL PROTECTED] wrote:
On Tue, 27 May 2008 11:24:19 MDT, Chris Grundemann said:
Like MD5 File Validation? - MD5 values are now made available on
Cisco.com for all Cisco IOS software images for comparison against
local system image values.
That does wonders for catching a
On May 27, 2008, at 1:37 PM, Pederson, Krishna wrote:
Really now ... why we using [EMAIL PROTECTED] instead of
[EMAIL PROTECTED]
Totally messed up my mail filtering system.
Sometime last week people started sending TO or CC'ing [EMAIL PROTECTED]
instead of [EMAIL PROTECTED]
Can we go
-- [EMAIL PROTECTED] wrote: --
From: Tim Sanderson [EMAIL PROTECTED]
Same gripe here...
---Original Message---
From: Pederson, Krishna [mailto:[EMAIL PROTECTED]
Really now ... why we using [EMAIL PROTECTED] instead of [EMAIL PROTECTED]
Totally messed up my mail filtering
We never figured out how the accounts were compromised. I suspect
another .edu here ..
how we've seen it happen is we get blasted by one of those verify your
email account messages.
despite our countless efforts at user education about responding to this
stuff, a dozen or so people always
From [EMAIL PROTECTED] Tue May 27 12:06:50 2008
Subject: RE: amazonaws.com?
Date: Tue, 27 May 2008 18:08:16 +0100
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
If the address-space owner won't police it's own property,
there is no reason for the rest of the world to spend the
On Tue, 27 May 2008 19:49:21 BST, [EMAIL PROTECTED] said:
Like MD5 File Validation? - MD5 values are now made=20
available on Cisco.com for all Cisco IOS software images for=20
comparison against local system image values.
I would expect a real exploit to try to match Cisco's
MD5 hashes.
On 27/05/2008 20:53 Robert Bonomi wrote:
Because the _privilege_ to send packets to other networks has been, from
'day one', conditional on the presumption that the sending network _is_
a good neighbor to the networks receiving their traffic.
You need to wake up Dorothy, this isn't Kansas
On May 27, 2008, at 2:47 PM, Bill McGonigle wrote:
I've also heard contradictory information from Level3 reps on some
of the above, so I'm not asserting any accuracy for it; so just FYI.
Maybe they finally got to looking into your problem and unplugged
the fiber labeled 'Vermont' by
Verizon provides ipv6 connectivity according to their website.
I mentioned this on another list, but if anybody has tried to actually
turn the words referred to above into service, I would be very happy
to hear about how they did it.
Att most likely does as well.
The last time I
Heya NANOG members,
I have a client with ATT Metro DIA services who are looking to add
routable IPv6 services. We need an ATT contact who will have the
knowledge and ability to coordinate IPv6 netblock assignments and
delegate static routes to the IPv6 addresses assigned. As well as
provide
You didn't say native was required and a tunnel might be ok for testing. Try
Hurricane Electric's Tunnel Broker. Your favorite search engine will find it ie
'Hurricane Electric Tunnel Broker' IIRC.
-M.
- Original Message -
From: Mike Linsenmayer [EMAIL PROTECTED]
To: [EMAIL
On Tue, 27 May 2008, Sean Donelan wrote:
On Tue, 27 May 2008, [EMAIL PROTECTED] wrote:
What you want is cisco hardware that verifies firmware signatures in
hardware.
Of course, how do you know your hardware hasn't been compromised?
http://www.usdoj.gov/opa/pr/2008/February/08_crm_150.html
If you were an attacker, which would you go with:
1) The brute-force attack which will require hundreds of
thousands of CPU-years.
In this case an attacker would definitely go with this option. Since
they can't change most of the IOS bytes because they contain IOS and
the exploit, they
On Tue, 27 May 2008, [EMAIL PROTECTED] wrote:
Are you buying directly from cisco or from resellers? If you are getting
counterfeit hardware directly from cisco then I guess we have real problems.
According to the FBI presentation, which may not be a reliable source
for this topic, Cisco has
Similarly, we have had no problems with ordering v6 transit
from NTT America, Global Crossing or Teleglobe in North
America (also, Tiscali in Europe, and FLAG in Asia). In each
case v6 transit was treated as a routine provisioning
exercise, with no need for escalation to obscure
Looks like I can't reach several of Comcast's fiber/coax customers in
Oregon and Washington:
grps-edge-rtr-1#trace 75.145.64.XXX
Type escape sequence to abort.
Tracing the route to 75-145-64-XXX-Oregon.hfc.comcastbusiness.net
(75.145.64.XXX)
1 fa-6-0.grps-edge-rtr-2.visp.net
On Tue, May 27, 2008 at 1:37 PM, Mike Linsenmayer
[EMAIL PROTECTED] wrote:
I am looking for a IPV6 internet feed for our testing labs in Southern
California, I know this is off subject but I am a little exasperated in
trying to locate one. if anyone on the list knows of a provider please
I think HE does native as well. Likely good based on their rep.
Best,
Marty
- Original Message -
From: Andrew Dorsett [EMAIL PROTECTED]
To: nanog@nanog.org nanog@nanog.org
Sent: Tue May 27 20:27:42 2008
Subject: Re: IPV6 network feeds
On Tue, May 27, 2008 at 1:37 PM, Mike
Here is the reverse view from one of my systems on residential Comcast
in the Everett/Mill Creek area (source is 76.121.150.xxx):
Tracing route to 208.74.128.9 over a maximum of 30 hops
11 ms1 ms1 ms 192.168.254.254
2 *** Request timed out.
3 9 ms
On Tue, 27 May 2008 20:45:11 BST, [EMAIL PROTECTED] said:
1) The brute-force attack which will require hundreds of
thousands of CPU-years.
Millions. Not thousands. See below.
In this case an attacker would definitely go with this option. Since
they can't change most of the IOS bytes
On Tue, 27 May 2008 [EMAIL PROTECTED] wrote:
On Tue, 27 May 2008 11:02:32 CDT, Gadi Evron said:
On Tue, 27 May 2008, Jared Mauch wrote:
*yawn*
I guess we will wait for the next one before waking up, than.
No Gadi. What Jared is saying is that there are exactly *ZERO* routers
(for some
On Tue, 27 May 2008, Jared Mauch wrote:
On May 27, 2008, at 12:02 PM, Gadi Evron wrote:
On Tue, 27 May 2008, Jared Mauch wrote:
On May 27, 2008, at 8:42 AM, Alexander Harrowell wrote:
An alternative rootkit ? Privilege level 16 used by the Lawful Intercept
[12] feature could be abused to
The official spokespeople don't mention it, but there is also a tendency
for local officials to divert fuel delivery trucks for their use instead
of maintaining communication facilities.
Perhaps a company will get in the business of labeling trucks that
normally say fuel to something
Date: Tue, 27 May 2008 15:46:34 -0400 (EDT)
From: Sean Donelan [EMAIL PROTECTED]
On Tue, 27 May 2008, [EMAIL PROTECTED] wrote:
Are you buying directly from cisco or from resellers? If you are getting
counterfeit hardware directly from cisco then I guess we have real problems.
The official spokespeople don't mention it, but there is also a tendency
for local officials to divert fuel delivery trucks for their use instead
of maintaining communication facilities.
Perhaps a company will get in the business of labeling trucks that
normally say fuel to
Mike Linsenmayer wrote:
Hey all,
I am looking for a IPV6 internet feed for our testing labs in Southern
California, I know this is off subject but I am a little exasperated in
trying to locate one. if anyone on the list knows of a provider please
contact me off list.
My queue to spam:
=
On May 27, 2008, at 6:09 PM, Tuc at T-B-O-H.NET wrote:
The official spokespeople don't mention it, but there is also a
tendency
for local officials to divert fuel delivery trucks for their use
instead
of maintaining communication facilities.
Perhaps a company will get in the
On May 27, 2008, at 6:47 PM, Jerry Dixon wrote:
Jared nailed it on the head. It is absolutely critical to get to
know who
your State JFO POC is, State EOC POC, and have the National
Communication
Systems Hotline on speed dial or at least in your cell. They can help
facilitate needs such
Michael Acosta wrote:
As a Comcast customer in the NW, I see the same thing outbound.
Traceroute to some sites die in glbx, and other sites work via other
transit providers.
Looks like whatever the SNAFU between Comcast and GLBX was, it's been
resolved for some time now... :)
Cheers,
--
I have a Comcast business line, and have bbeen up all day. Here is
my trace to the same IP (from Bremerton WA):
[EMAIL PROTECTED]:~/tmp$ traceroute 208.74.128.9
traceroute to 208.74.128.9 (208.74.128.9), 30 hops max, 38 byte packets
1 73.96.188.1 (73.96.188.1) 8.051 ms 11.888 ms 6.731 ms
2
On May 27, 2008, at 6:47 PM, Jerry Dixon wrote:
Jared nailed it on the head. It is absolutely critical to get to
know who
your State JFO POC is, State EOC POC, and have the National
Communication
Systems Hotline on speed dial or at least in your cell. They can help
Attached are all of the the current nominations to the nanog program
committee. comments in support (or opposition) to any candidate can
be made to the nanog steering committee [EMAIL PROTECTED]
(if you submitted a nomination and you do not see it here, please
notify me immediately, resend it
If you're a direct customer, use your MIS contact. We've used them for
nearly 8 years, and I've been consistently impressed. If not, your
upstream should be your first point of contact.
For maintenance (e.g., prefix-list mods) they tend to take their time
unless you insist on expedition; but,
39 matches
Mail list logo