On Wed, Jun 3, 2015 at 7:56 AM, Owen DeLong o...@delong.com wrote:
For example, let’s say you have 20 machines for whom you want to allow
inbound SSH access. In the IPv4 world, with NAT, you have to configure an
individual port mapping for each machine and you have to either configure all
On 2015-06-01 22:07, Mark Andrews wrote:
If you have secure BGP deployed then you could extend the
authenication
to securely authenticate source addresses you emit and automate
BCP38 filter generation and then you wouldn't have to worry about
DNS, NTP, CHARGEN etc. reflecting spoofed traffic.
we are starting to waste packets arguing over some private intellectual
property
On Wed, Jun 3, 2015 at 3:24 PM, Christopher Morrow morrowc.li...@gmail.com
wrote:
On Wed, Jun 3, 2015 at 7:56 AM, Owen DeLong o...@delong.com wrote:
For example, let’s say you have 20 machines for whom you want
Yep, definitely i'll give this a trial run.
We are developing nullroute application internally.
I'll try to run this in our lab.
On Wed, Jun 3, 2015 at 3:16 AM, Pavel Odintsov pavel.odint...@gmail.com wrote:
Hello, Nanog!
I'm very pleased to present my open source DoS/DDoS attack monitoring
On Jun 2, 2015, at 4:08 PM, Matthew Kaufman matt...@matthew.at wrote:
On 6/2/15 2:35 AM, Owen DeLong wrote:
On Jun 2, 2015, at 5:49 AM, Matthew Kaufman matt...@matthew.at wrote:
On 6/1/2015 6:32 PM, Mark Andrews wrote:
In message
On 3 Jun 2015, at 9:04, Ethan Katz-Bassett wrote:
The same folks also followed up that workshop paper with a longer
paper on
the topic:
https://www.cs.bu.edu/~goldbe/papers/sigRPKI.pdf
Thanks to you and to Dale Carter - I was unaware of these papers.
Nonetheless, the risk remains of
Interesting project, Pavel. I'll most certainly give this a trial run.
On Tue, Jun 2, 2015 at 10:16 PM, Pavel Odintsov pavel.odint...@gmail.com
wrote:
Hello, Nanog!
I'm very pleased to present my open source DoS/DDoS attack monitoring
toolkit here!
We have spent about 10 months for
Grab the firmware and run it through BinWalk. Your should be able to pull
out the firmware and see what it does to the password before storing it.
On 2 Jun 2015 22:03, Landon Stewart landonstew...@gmail.com wrote:
On Jun 2, 2015, at 9:23 AM, Michael O Holstein michael.holst...@csuohio.edu
wrote:
Thank you for interest! Feel free to ask me about anything! Feature
requests very appreciate!
On Wed, Jun 3, 2015 at 9:31 AM, Johan Kooijman m...@johankooijman.com wrote:
Interesting project, Pavel. I'll most certainly give this a trial run.
On Tue, Jun 2, 2015 at 10:16 PM, Pavel Odintsov
+1 for CWNP courses. The CWNA and CWDP cover RF quite well too you'll pick
up most of what's needed. ..imho most of the vendor specific courses only
benefit is to tell you how to manage their control plane. Which button to
click on the interface etc ;)
alan
On (2015-06-02 21:51 -0700), Randy Bush wrote:
The RPKI is an X.509 based hierarchy [rfc 6481] which is congruent
with the internet IP address allocation administration, the IANA,
Hijacking this thread. I've requested both our main vendors for 'loose rpki'
years ago, nothing has
Hello!
Thank you! Please share your experience after tests!
On Wed, Jun 3, 2015 at 5:50 PM, Budiwijaya bbuuddi...@gmail.com wrote:
Yep, definitely i'll give this a trial run.
We are developing nullroute application internally.
I'll try to run this in our lab.
On Wed, Jun 3, 2015 at 3:16 AM,
Not sure what's up - however I see what's down this AM. From the hotel
nanog.org was not reachable. S, I tunneled out of the hotel to my
office, still not reachable at 6:15 AM
nanog.org (50.31.151.73)
www.nanog.org (50.31.151.73)
Bob Evans
CTO
Fiber Internet Center
At this time, we believe all services have been restored.
On Wed, Jun 3, 2015 at 11:16 AM, Eric Oosting eric.oost...@gmail.com
wrote:
This morning we suffered a hardware failure in our production environment.
The outage affected nanog mail and web services. While mail services have
recovered,
This morning we suffered a hardware failure in our production environment.
The outage affected nanog mail and web services. While mail services have
recovered, web services are still down.
We apologize for the inconvenience.
-e
On 6/3/2015 4:56 AM, Owen DeLong wrote:
On Jun 2, 2015, at 4:08 PM, Matthew Kaufman matt...@matthew.at
mailto:matt...@matthew.at wrote:
On 6/2/15 2:35 AM, Owen DeLong wrote:
On Jun 2, 2015, at 5:49 AM, Matthew Kaufman matt...@matthew.at
mailto:matt...@matthew.at wrote:
On 6/1/2015 6:32
Yeah, looks like this just made it to the list:
This morning we suffered a hardware failure in our production environment.
The outage affected nanog mail and web services. While mail services have
recovered, web services are still down.
On Wed, Jun 3, 2015 at 8:31 AM, Bob Evans
On Wed 2015-Jun-03 13:11:34 -0400, valdis.kletni...@vt.edu
valdis.kletni...@vt.edu wrote:
On Tue, 02 Jun 2015 09:35:11 -0700, Matthew Kaufman said:
Ah, the IPv6 subnets are so big you can't find the hosts myth.
Let's see... to find which hosts are active in IPv6 I can:
- run a popular web
On Mon, May 11, 2015 at 8:38 PM, Chaim Rieger chaim.rie...@gmail.com wrote:
Freddy, did you get your test up ?
Finally had some time to setup a lab environment and do some basic
testing regarding the fully transparent approach mentioned in the
initial email.
My biggest concern was that the cisco
On Mon, 01 Jun 2015 21:25:52 -0700, Tony Hain said:
Try https://snapchat.com and see if you ever get an IPv6 connection...
Obviously some gremlins got busy when they got called out on NANOG...
% wget https://www.snapchat.com
--2015-06-03 13:13:00-- https://www.snapchat.com/
Resolving
On Tue, 02 Jun 2015 09:35:11 -0700, Matthew Kaufman said:
Ah, the IPv6 subnets are so big you can't find the hosts myth.
Let's see... to find which hosts are active in IPv6 I can:
- run a popular web service that people connect to, revealing their addresses
If your vulnerable laser printer or
Hi all,
For those that missed them:
https://www.youtube.com/playlist?list=PLO8DR5ZGla8ju3ftZv_S6L12jBkZKEJVZ
--
Sadiq Saif (AS393949)
https://staticsafe.ca
On 6/2/2015 00:27, Scott Weeks wrote:
Great article for the WP and they asked good questions from
the correct people, but I have to take issue with the lack
of network operator's participation comments:
: But getting network operators to participate is proving
: difficult.
: Many network
--- larryshel...@cox.net wrote:
From: Larry Sheldon larryshel...@cox.net
On 6/2/2015 00:27, Scott Weeks wrote:
Great article for the WP and they asked good questions from
the correct people, but I have to take issue with the lack
of network operator's participation comments:
: But getting
IoT says your toaster will be uploading your breakfast to 10 social media
accounts and your socks will be connected to the hospital. Your fridge is also
a spambot now too!
http://www.businessinsider.com/hackers-use-a-refridgerator-to-attack-businesses-2014-1
IoT means everything gets hacked.
25 matches
Mail list logo