This report has been generated at Fri Feb 13 21:13:35 2009 AEST.
The report analyses the BGP Routing Table of AS2.0 router
and generates a report on aggregation potential within the table.
Check http://www.cidr-report.org for a current version of this report.
Recent Table History
Date
BGP Update Report
Interval: 12-Jan-09 -to- 12-Feb-09 (32 days)
Observation Point: BGP Peering with AS131072
TOP 20 Unstable Origin AS
Rank ASNUpds % Upds/PfxAS-Name
1 - AS9583 187305 4.3% 125.8 -- SIFY-AS-IN Sify Limited
2 - AS7643 167261 3.8%
On Fri, Feb 13, 2009 at 8:27 PM, Jens Ott - PlusServer AG
j@plusserver.de wrote:
- - What do you think about such service?
- - Would you/your ASN participate in such a service?
- - Do you see some kind of usefull feature in such a service?
- - Do you have any comments?
Ah.
would this itself not be a dos path?
randy
In that way, Spamcop and other folks are DOS'ing for years aswell. And in
fact, by denying things around, they are just scrubing and filtering, to make
our day happier, avoiding huge masses of spam and useless crap.
I don't see it the way you do.
A project like this, like also spamcop, are
Hi Suresh,
But in the meanwhile, a decade later, it does not longer exist.
At least, i can't reach that host, and i was unable to find working
documentation on google of how about this project works, today.
In fact, the first link that google gave out, says that this project is dead at
least
On Fri, 13 Feb 2009 15:57:32 +0100, Jens Ott - PlusServer AG said:
Therefore I had the following idea: Why not taking one of my old routers and
set it up as blackhole-service. Then everyone who is interested could set up a
session to there and
1.) announce /32 (/128) routes out of his
DDoS drones - especially with botnets - can produce a really large zone
To start with google spamhaus drop list. Then look at the cbl and
see if you think its worth using as a bgp feed
On Fri, Feb 13, 2009 at 9:20 PM, Nuno Vieira - nfsi telecom
nuno.vie...@nfsi.pt wrote:
Hi Suresh,
But in the
valdis.kletni...@vt.edu wrote:
How do you vet proposed new entries to make sure that some miscreant doesn't
DoS a legitimate site by claiming it is in need of black-holing? Note that
it's a different problem space than a bogon BGP feed or a spam-source BGP
feed - if the Cymru guys take another
Ok, however, what i am talking about is a competelly diferent thing, and i
think that my thoughts are alligned with Jens.
We want to have a Sink-BGP-BL, based on Destination.
Imagine, i as an ISP, host a particular server that is getting nn Gbps of DDoS
attack. I null route it, and start
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Skywing schrieb:
Of course, whomever hosts such a service becomes an attractive DoS target
themselves if it were ever to gain real traction in the field. There is also
the reverse-DoS issue of an innocent party getting into the feed if anyone
On Fri, 13 Feb 2009 16:41:41 + (WET)
Nuno Vieira - nfsi telecom nuno.vie...@nfsi.pt wrote:
Ok, however, what i am talking about is a competelly diferent thing,
and i think that my thoughts are alligned with Jens.
We want to have a Sink-BGP-BL, based on Destination.
Imagine, i as an
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
@jack: sorry for duplicate ... pressed reply instead of reply-all ;)
Jack Bates schrieb:
valdis.kletni...@vt.edu wrote:
Presumably, the route server would have to have the same guidelines as
issued by service providers. ie, /32 networks injected
Paul Vixie wrote:
i think Spamhaus and Cymru are way ahead of you in implementing such a thing,
and it's likely that there are even commercial alternatives to Trend Micro
although i have not kept up on those details.
I think there's a misunderstanding from what I've read about what is
being
Jens,
I would be interested in participating with a destination blackhole
service, so long as peers were authenticated and only authorized to
advertise /32s out of space that they are assigned -- hopefully the same
OrgID is used for the ASN as the IP allocations.
However, a blackhole
blackholing victims is an interesting economics proposition. you're saying
the attacker must always win but that they must not be allowed to affect the
infrastructure. and you're saying victims will request this, since they know
they can't withstand the attack and don't want to be held
Listen online to my favorite hip hop radio station http://www.Jellyradio.com
On Feb 13, 2009, at 9:35 AM, Paul Vixie vi...@isc.org wrote:
blackholing victims is an interesting economics proposition. you're
saying
the attacker must always win but that they must not be allowed to
affect
This is an automated weekly mailing describing the state of the Internet
Routing Table as seen from APNIC's router in Japan.
Daily listings are sent to bgp-st...@lists.apnic.net
For historical data, please see http://thyme.apnic.net.
If you have any comments please contact Philip Smith
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Jack Bates schrieb:
Paul Vixie wrote:
Do you have a miraculous way to stop DDOS? Is there now a way to quickly
and efficiently track down forged packets? Is there a remedy to shutting
down the *known* botnets, not to mention the unknown ones?
Hello,
If anyone from TeliaSonera is around please contact me off-list
Thanks
German
pgptdISWjhXk2.pgp
Description: PGP signature
I am in need of dark fiber in the Parker, Arizona area.
If anyone can help please contact me off list.
Thanks,
David
On Fri, Feb 13, 2009 at 1:04 PM, Jack Bates jba...@brightok.net wrote:
Paul Vixie wrote:
blackholing victims is an interesting economics proposition. you're
saying
the attacker must always win but that they must not be allowed to affect
the
infrastructure. and you're saying victims will
I think this solution addresses a number of issues that the current blackhole
process lacks. Generally when a blackhole is sent to your provider, they in
turn pass that on to the rest of their routers, dropping the traffic as soon as
it hits their network. The traffic is still taking up just as
Just got final confirmation from ISP1 that they will not do BGP with us.
ISP1 is Telebec.
http://www.iptools.com/dnstools.php?tool=ipwhoisuser_data=142.217.0.0submit=Go
My subnet
http://www.iptools.com/dnstools.php?tool=ipwhoisuser_data=204.144.60.0submit=Go
What can we do now ? Any suggestions
Hi
I have old model extreme switch
Anyone knows about hyperterminal setting.
ls null modem cable same as HP serial cables?
I try both cables in this switch and can see the boot information
but keyboard is not responsing !
Thank you
I see multiple paths to that block all converge at bell.ca.
I don't see a route with 35911 (telebec) in the AS_PATH, unless it is
start-of-string and followed by _577_ (bell.ca).
They seem to be consistent...
-Original Message-
From: Charles Regan [mailto:charles.re...@gmail.com]
Telebec's only upstream is Bell Canada (AS577) hence why you see
that...;)
Paul
-Original Message-
From: Michael Smith [mailto:msm...@internap.com]
Sent: Friday, February 13, 2009 3:34 PM
To: Charles Regan; nanog@nanog.org
Subject: RE: One /22 Two ISP no BGP
I see multiple paths to
* Valdis Kletnieks:
On Fri, 13 Feb 2009 15:57:32 +0100, Jens Ott - PlusServer AG said:
Therefore I had the following idea: Why not taking one of my old routers and
set it up as blackhole-service. Then everyone who is interested could set up
a
session to there and
1.) announce /32 (/128)
Charles Regan wrote:
Just got final confirmation from ISP1 that they will not do BGP with us.
ISP1 is Telebec.
http://www.iptools.com/dnstools.php?tool=ipwhoisuser_data=142.217.0.0submit=Go
My subnet
http://www.iptools.com/dnstools.php?tool=ipwhoisuser_data=204.144.60.0submit=Go
What
We use Extreme products, but use telnet or SSH behind firewall.
Can you use telnet? It provide more flexibility, but SSH is more secure
Regardless of the connection the CLI configuration is the same.
HyperTerminal setting?
Baud rate-9600
Data bits-8
Stop bit-1
Parity-None
Flow control-XON/XOFF
That was my implication...
-Original Message-
From: Paul Stewart [mailto:pstew...@nexicomgroup.net]
Sent: Friday, February 13, 2009 3:50 PM
To: Michael Smith; Charles Regan; nanog@nanog.org
Subject: RE: One /22 Two ISP no BGP
Telebec's only upstream is Bell Canada (AS577) hence why you
eventually, the rpki will give you the first half, authentication
of the owner of the ip space. this leaves, as smb hinted, securing
the request path from the black-hole requestor to the service and
of the service to the users.
smb:
You can't do this without authoritative knowledge of exactly
Thank you
it works properly
Do you know the default pw?
Thank you again
--- On Fri, 2/13/09, LEdouard Louis ledou...@edrnet.com wrote:
From: LEdouard Louis ledou...@edrnet.com
Subject: RE: anyone knows about extreme switch
To: oiyan...@yahoo.ca, nanog@nanog.org
Received: Friday, February
The default user name is admin and there is no password.
--Louis
-Original Message-
From: ann kok [mailto:oiyan...@yahoo.ca]
Sent: Friday, February 13, 2009 5:31 PM
To: nanog@nanog.org; LEdouard Louis
Subject: RE: anyone knows about extreme switch
Thank you
it works properly
Do you
Barry Shein wrote:
And it was observed that routing around damage could at least in
theory have utility in a situation where circuit facilities were being
damaged in warfare so long as some route between two points remained.
So these two goals are not mutually exclusive by any means.
The
Is anyone else seeing convulsions via Sprint Chicago? Lightly loaded OC3
and we've got stuff all over the net seeing crazy latency.
--
mailto:n...@layer3arts.com //
GoogleTalk: nrauhau...@gmail.com
IM: nealrauhauser
The problem we have now is that we got our /22 from arin to do multihoming.
If we dump tlb, no more multihoming? No /22. Is that correct?
We also have a contract with tlb.
$$$ 1.5yrs left...
2009/2/13, Seth Mattinen se...@rollernet.us:
Charles Regan wrote:
Isp2 is vtl not bell
Just in case you missed it.
date -d Fri Feb 13 23:31:30 UTC 2009 +%s
It's like a really geeky y2k without the potential cataclysm. :)
Steve
Charles Regan wrote:
The problem we have now is that we got our /22 from arin to do multihoming.
If we dump tlb, no more multihoming? No /22. Is that correct?
We also have a contract with tlb.
$$$ 1.5yrs left...
There's something in there about non-multihomed sites, but I'm not
You haven't lived until you've lived through an epoch.
On Fri, Feb 13, 2009 at 06:54:54PM -0500, Ravi Pina wrote:
On Fri, Feb 13, 2009 at 06:49:49PM -0500, Steve Church wrote:
Just in case you missed it.
date -d Fri Feb 13 23:31:30 UTC 2009 +%s
It's like a really geeky y2k without
And/or see if bell canada can sell you something diverse.
- Original Message -
From: Seth Mattinen se...@rollernet.us
To: Charles Regan charles.re...@gmail.com
Cc: nanog@nanog.org nanog@nanog.org
Sent: Fri Feb 13 18:58:54 2009
Subject: Re: One /22 Two ISP no BGP
Charles Regan wrote:
Once upon a time, Ravi Pina r...@cow.org said:
Yes... that is more like the y2k38 problem on 03:14:07 UTC
2038-01-19...
Oddly enough, the end of the current Unix epoch is a prime. Not only
that, it is a Mersenne prime, 2^31 - 1. Even more, it is the largest
known Mersenne prime where its
Question about 2k38: Aren't most Unixoid systems using 64-bit clocks now?
On Fri, Feb 13, 2009 at 8:03 PM, Chris Adams cmad...@hiwaay.net wrote:
Once upon a time, Ravi Pina r...@cow.org said:
Yes... that is more like the y2k38 problem on 03:14:07 UTC
2038-01-19...
Oddly enough, the end of
Once upon a time, Nathan Malynn ne...@nerdramblingz.com said:
Question about 2k38: Aren't most Unixoid systems using 64-bit clocks now?
Unix/POSIX systems use time_t to store the base time counter, which is
seconds since the epoch (1970-01-01 00:00:00 UTC). Most platforms still
use a 32 bit
On Fri, Feb 13, 2009 at 6:06 PM, Nathan Malynn ne...@nerdramblingz.com wrote:
Question about 2k38: Aren't most Unixoid systems using 64-bit clocks now?
Exactly! What are we going to do when we're at the end of the 2^64
epoch?? (after the sun burns out and.. oh wait)
--
Eric
Nuno et all,
Count me in for this..
Cheers,
--Ricardo
http://www.cs.ucla.edu/~rveloso
On Feb 13, 2009, at 8:41 AM, Nuno Vieira - nfsi telecom wrote:
Ok, however, what i am talking about is a competelly diferent thing,
and i think that my thoughts are alligned with Jens.
We want to have a
Once upon a time, Nathan Malynn ne...@nerdramblingz.com said:
Question about 2k38: Aren't most Unixoid systems using 64-bit clocks now?
Unix/POSIX systems use time_t to store the base time counter, which is
seconds since the epoch (1970-01-01 00:00:00 UTC). Most platforms still
use a 32
Once upon a time, Joe Greco jgr...@ns.sol.net said:
FreeBSD used a 64-bit time_t for the AMD64 port pretty much right away.
On the flip side, it used a 32-bit time_t for the Alpha port. I guess
someone predicted it wouldn't be a problem.
Tru64 on Alpha uses a 32 bit time_t (they have their
On Fri, 13 Feb 2009 21:08:12 -0600
Chris Adams cmad...@hiwaay.net wrote:
Once upon a time, Joe Greco jgr...@ns.sol.net said:
FreeBSD used a 64-bit time_t for the AMD64 port pretty much right
away. On the flip side, it used a 32-bit time_t for the Alpha
port. I guess someone predicted it
49 matches
Mail list logo