booster to gain distance above 60km

2015-03-26 Thread Rodrigo Augusto
Hi folksŠ we have a point and have a 63km between point A to point BŠ. We have a sigle fiber ( only one fiber) and use a fiberstore sfp+ 10GB dibi 1270/1330 module to connect these sites. All attenuation are okŠI don¹t have any trouble on fiber Š. I have received this signal on my sfp+: Receiver

Re: Frontier: Blocking port 22 because of illegal files?

2015-03-26 Thread Seth Mos
Stephen Satchell schreef op 26-3-2015 om 12:24: On 03/25/2015 07:31 PM, Aaron C. de Bruyn wrote: After getting a few helpful users on the phone to run some quick tests, we found port 22 was blocked. It's been a while since I did this, but you can select an additional port to accept SSH

Re: Frontier: Blocking port 22 because of illegal files?

2015-03-26 Thread Jens Link
Stephen Satchell l...@satchell.net writes: It's been a while since I did this, but you can select an additional port to accept SSH connections. That's easy: jens@screen:~$ grep Port /etc/ssh/sshd_config Port 22 Port 443 Picking the right port to use is an exercise, though, that will

Re: Frontier: Blocking port 22 because of illegal files?

2015-03-26 Thread Stephen Satchell
On 03/25/2015 07:31 PM, Aaron C. de Bruyn wrote: After getting a few helpful users on the phone to run some quick tests, we found port 22 was blocked. It's been a while since I did this, but you can select an additional port to accept SSH connections. A Google search indicates you can specify

Re: Broken SSL cert caused by router?

2015-03-26 Thread Lewis,Mitchell T.
Meraki Access Points are interesting devices. I have found they cause issues with Linux firewalls if the merakis are not configured correctly. Meraki Access Points do content inspections which I have found can cause produce symptoms similar to yours, although I have not experienced what you

Re: More specifics from AS18978 [was: Prefix hijack by INDOSAT AS4795 / AS4761]

2015-03-26 Thread ML
Wouldn't it be a BCP to set no-export from the Noction device too? On 3/26/2015 6:20 PM, Nick Rose wrote: Several people asked me off list for more details, here is what I have regarding it. This morning a tier2 isp that connects to our network made an error in their router configuration

RE: More specifics from AS18978 [was: Prefix hijack by INDOSAT AS4795 / AS4761]

2015-03-26 Thread Nick Rose
This should be resolved from AS18978. If you experience anything else please let me know and I will get it addressed immediately. Regards, Nick Rose CTO @ Enzu Inc. -Original Message- From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of Randy Sent: Thursday, March 26, 2015 12:14 PM

Re: Frontier: Blocking port 22 because of illegal files?

2015-03-26 Thread Aaron C. de Bruyn
Someone with Frontier contacted me off-list and assured me they don't block port 22, and that it could have been related to port scans, infected PCs, etc... They are looking in to it. Apologies for the noise and for being a prat. ;) -A On Wed, Mar 25, 2015 at 7:31 PM, Aaron C. de Bruyn

Re: godaddy contact

2015-03-26 Thread Anne P. Mitchell, Esq.
Anyone from godaddy on here or have contact details for them? We are having a routing issue to them. Tim, please contact me offlist. Anne Anne P. Mitchell, Esq. CEO/President ISIPP SuretyMail Email Reputation, Accreditation Certification Your mail system + SuretyMail accreditation =

RE: More specifics from AS18978 [was: Prefix hijack by INDOSAT AS4795 / AS4761]

2015-03-26 Thread Randy
On 03/26/2015 9:00 am, Peter Rocca wrote: +1 The summary below aligns with our analysis as well. We've reached out to AS18978 to determine the status of the leak but at this time we're not seeing any operational impact. +2, after the morning coffee sunk in and helpful off list replies I can

Re: Broken SSL cert caused by router?

2015-03-26 Thread Eygene Ryabinkin
Thu, Mar 26, 2015 at 03:38:55PM -0700, Mike wrote: I have a customer however that uses our web mail system now secured with ssl. I myself and many others use it and get the green lock. But, whenever any station at the customer tries using it, they get a broken lock and 'your connection is

RE: More specifics from AS18978 [was: Prefix hijack by INDOSAT AS4795 / AS4761]

2015-03-26 Thread Nick Rose
Several people asked me off list for more details, here is what I have regarding it. This morning a tier2 isp that connects to our network made an error in their router configuration causing the route leakage. The issue has been addressed and we will be performing a full post mortem to ensure

Re: Broken SSL cert caused by router?

2015-03-26 Thread Roland Dobbins
On 27 Mar 2015, at 5:38, Mike wrote: How is this possible? Can anyone comment on these devices and tell me what might be going on here? It's been compromised and its being used for MITM? Or has some sort of TLS inspection capability built in which is essentially MITM, and which is

Re: Broken SSL cert caused by router?

2015-03-26 Thread Joe
You might want to look at some of the documentation on that device. Looks like it might be doing some proxy stuff. Regards, -Joe On Thu, Mar 26, 2015 at 5:38 PM, Mike mike-na...@tiedyenetworks.com wrote: Hi, I have a very odd problem. We've recently gotten a 'real' ssl certificate

Broken SSL cert caused by router?

2015-03-26 Thread Mike
Hi, I have a very odd problem. We've recently gotten a 'real' ssl certificate from godaddy to cover our domain (*.domain.com) and have installed it in several places where needed for email (imap/starttls and etc) and web. This works great, seems ok according to various online TLS

Re: Prefix hijack by INDOSAT AS4795 / AS4761

2015-03-26 Thread Christopher Morrow
On Thu, Mar 26, 2015 at 10:08 AM, Randy a...@djlab.com wrote: On Thursday March 26th 2015 at 12:18 UTC (and on-going) we are seeing more specifics on one of our prefixes. Anyone else seeing similar or is it just us? is your AS in the path below? (what is your AS so folk can check for your

Re: Prefix hijack by INDOSAT AS4795 / AS4761

2015-03-26 Thread Randy
On 03/26/2015 7:27 am, Christopher Morrow wrote: is your AS in the path below? (what is your AS so folk can check for your prefixes/customer-prefixes and attempt to help?) Sorry, we're 29889.

Re: Prefix hijack by INDOSAT AS4795 / AS4761

2015-03-26 Thread Christian Teuschel
Hi Randy, Assuming that your prefix is 198.98.180.0/22 (AS29889 - FSNET-1 - Fast Serv Networks, LLC) none of the mentioned more specifics are currently seen from the RIPE NCC's RIS network, see the Looking Glass widget: https://stat.ripe.net/198.98.180.0/23#tabId=routing

Re: Prefix hijack by INDOSAT AS4795 / AS4761

2015-03-26 Thread Andree Toonk
Hi List, this morning our BGPmon system picked up many new more specific announcements by a variety of Origin ASns, the interesting part is that the majority of them were classified as BGP Man In The middle attacks (MITM). A typical alert would look like:

Re: Frontier: Blocking port 22 because of illegal files?

2015-03-26 Thread Jeff Richmond
All, I have reached out to Aaron privately for details, but we do not block port 22 traffic unless it is in direct response to an attack or related item. Please let me know directly if you have any specific questions. Thanks, -Jeff On Mar 26, 2015, at 7:09 AM, Livingood, Jason

Re: Prefix hijack by INDOSAT AS4795 / AS4761

2015-03-26 Thread Chuck Anderson
We are AS 10326 130.215.0.0/16 and I just received a BGPmon alert as well: 130.215.160.0/20 4795 4795 4761 9304 40633 18978 4436 10326 130.215.176.0/20 4795 4795 4761 9304 40633 18978 4436 10326 On Thu, Mar 26, 2015 at 10:45:09AM -0400, Christopher Morrow wrote: On Thu, Mar 26, 2015 at 10:43

RE: Prefix hijack by INDOSAT AS4795 / AS4761

2015-03-26 Thread Peter Rocca
+1 The summary below aligns with our analysis as well. We've reached out to AS18978 to determine the status of the leak but at this time we're not seeing any operational impact. -Original Message- From: Andree Toonk [mailto:andree+na...@toonk.nl] Sent: March-26-15 11:54 AM To: Peter

Re: Prefix hijack by INDOSAT AS4795 / AS4761

2015-03-26 Thread Christopher Morrow
On Thu, Mar 26, 2015 at 10:38 AM, Randy a...@djlab.com wrote: On 03/26/2015 7:27 am, Christopher Morrow wrote: is your AS in the path below? (what is your AS so folk can check for your prefixes/customer-prefixes and attempt to help?) Sorry, we're 29889. ok, and it looks like the path you

Prefix hijack by INDOSAT AS4795 / AS4761

2015-03-26 Thread Randy
On Thursday March 26th 2015 at 12:18 UTC (and on-going) we are seeing more specifics on one of our prefixes. Anyone else seeing similar or is it just us? 198.98.180.0/23 4795 4795 4761 9304 40633 18978 4436 29889 198.98.182.0/23 4795 4795 4761 9304 40633 18978 4436 29889 -- Randy

RE: Prefix hijack by INDOSAT AS4795 / AS4761

2015-03-26 Thread Peter Rocca
We just received a similar alert from bgpmon - part of 108.168.0.0/17 is being advertised as /20's - although we're still listed as the origin. We are 40788. 108.168.64.0/20 4795 4795 4761 9304 40633 18978 6939 40788 108.168.80.0/20 4795 4795 4761 9304 40633 18978 6939 40788 108.168.96.0/20

Re: Prefix hijack by INDOSAT AS4795 / AS4761

2015-03-26 Thread Randy
All, Info gathered off-list indicates this may be a couple of issues in our case - possible routing leak by 18978 (check your tables!) and more specifics on our prefixes from 4795 that we couldn't see before the leak hence the apparent hijack. -- ~Randy