* Jean-Daniel Pauget
> I confess using IPv6 behind a 6in4 tunnel because the "Business-Class"
> service
> of the concerned operator doesn't handle IPv6 yet.
>
> as such, I realised that, as far as I can figure, ICMPv6 packet "too-big"
> (rfc 4443)
> seem to be ignored or
On 6/3/19 03:29, Mark Andrews wrote:
>
>
>> On 6 Mar 2019, at 3:37 pm, Fernando Gont wrote:
>>
>> On 6/3/19 01:09, Mark Andrews wrote:
>>>
>>>
On 6 Mar 2019, at 1:30 pm, Fernando Gont wrote:
On 3/3/19 18:04, Mark Andrews wrote:
> There are lots of IDIOTS out there that BLOCK
> On 6 Mar 2019, at 3:37 pm, Fernando Gont wrote:
>
> On 6/3/19 01:09, Mark Andrews wrote:
>>
>>
>>> On 6 Mar 2019, at 1:30 pm, Fernando Gont wrote:
>>>
>>> On 3/3/19 18:04, Mark Andrews wrote:
There are lots of IDIOTS out there that BLOCK ALL ICMP. That blocks PTB
getting
On 6/3/19 01:09, Mark Andrews wrote:
>
>
>> On 6 Mar 2019, at 1:30 pm, Fernando Gont wrote:
>>
>> On 3/3/19 18:04, Mark Andrews wrote:
>>> There are lots of IDIOTS out there that BLOCK ALL ICMP. That blocks PTB
>>> getting
>>> back to the TCP servers. There are also IDIOTS that deploy load
How much do these boxes cost?
On Tue, Mar 5, 2019 at 5:24 PM Kaiser, Erich wrote:
> It would be worth your time to look at Extreme SLX9640 with advanced
> routing license.
>
>
>
> On Tue, Mar 5, 2019 at 4:47 PM Roel Parijs wrote:
>
>> We have been using the 7280SR-48C6 for 2.5 years now. Just
Access to Comcast ethernet services on a wholesale level, interconnection
for NNI to use comcast as local access, etc
On Tue, Mar 5, 2019 at 9:01 PM Keith Christian
wrote:
> TJ,
>
> What are you seeking, exactly?
>
> Keith
>
> On Tue, Mar 5, 2019 at 7:46 PM TJ Trout wrote:
>
>> Does anyone
> On 6 Mar 2019, at 1:36 pm, Fernando Gont wrote:
>
> On 5/3/19 03:26, Mark Andrews wrote:
>>
>>
>>> On 5 Mar 2019, at 5:18 pm, Mark Tinka wrote:
>>>
>>>
>>>
>>> On 5/Mar/19 00:25, Mark Andrews wrote:
>>>
Then Cloudflare should negotiate MSS’s that don’t generate PTB’s if
> On 6 Mar 2019, at 1:30 pm, Fernando Gont wrote:
>
> On 3/3/19 18:04, Mark Andrews wrote:
>> There are lots of IDIOTS out there that BLOCK ALL ICMP. That blocks PTB
>> getting
>> back to the TCP servers. There are also IDIOTS that deploy load balancers
>> that
>> DO NOT LOOK INSIDE ICMP
On 5/3/19 03:26, Mark Andrews wrote:
>
>
>> On 5 Mar 2019, at 5:18 pm, Mark Tinka wrote:
>>
>>
>>
>> On 5/Mar/19 00:25, Mark Andrews wrote:
>>
>>>
>>> Then Cloudflare should negotiate MSS’s that don’t generate PTB’s if
>>> they have installed broken ECMP devices. The simplest way to do that
Does anyone know the name, or have contact information for the department
within Comcast that handles carriers looking to purchase local access, etc?
Normally this would be the carrier or wholesale group, but either of their
websites seem to be aligned to the services we are looking for?
Thank
On Tue, Mar 5, 2019 at 07:15 Rich Kulawiec wrote:
> On Mon, Mar 04, 2019 at 08:04:12AM +1100, Mark Andrews wrote:
> > ICMP is NOT optional.
>
> I've pointed folks at this for years:
>
> ICMP Packet Filtering v1.2
> http://www.cymru.com/Documents/icmp-messages.html
>
> ---rsk
>
On 3/3/19 20:16, Mark Andrews wrote:
>
>
>> On 4 Mar 2019, at 9:33 am, Stephen Satchell wrote:
>>
>> On 3/3/19 1:04 PM, Mark Andrews wrote:
>>> There are lots of IDIOTS out there that BLOCK ALL ICMP. That blocks PTB
>>> getting
>>> back to the TCP servers.
>>
>> For those of us who are in the
On 3/3/19 18:04, Mark Andrews wrote:
> There are lots of IDIOTS out there that BLOCK ALL ICMP. That blocks PTB
> getting
> back to the TCP servers. There are also IDIOTS that deploy load balancers
> that
> DO NOT LOOK INSIDE ICMP messages for redirecting ICMP messages to the correct
> back
On 3/3/19 16:57, Jeroen Massar wrote:
> On 2019-03-03 20:13, Mark Tinka wrote:
>>
>>
>> On 3/Mar/19 18:05, Jeroen Massar wrote:
>>
>>> IPv6 requires a minimum MTU of 1280.
>>>
>>> If you cannot transport it, then the transport (the tunnel in this case)
>>> needs to handle the fragmentation of
On 27/2/19 07:01, Jean-Daniel Pauget wrote:
> hello,
>
> I confess using IPv6 behind a 6in4 tunnel because the "Business-Class"
> service
> of the concerned operator doesn't handle IPv6 yet.
>
> as such, I realised that, as far as I can figure, ICMPv6 packet "too-big"
> (rfc
On Wed, Mar 6, 2019 at 8:32 Smith, Courtney
wrote:
> On 3/5/19, 6:04 PM, "NANOG on behalf of Job Snijders"
> j...@instituut.net> wrote:
>
> On Sun, Mar 03, 2019 at 08:42:02PM -0500, Joshua Miller wrote:
> > A while back I read somewhere that transit providers shouldn't delete
> >
On 3/5/19, 6:04 PM, "NANOG on behalf of Job Snijders"
wrote:
On Sun, Mar 03, 2019 at 08:42:02PM -0500, Joshua Miller wrote:
> A while back I read somewhere that transit providers shouldn't delete
> communities unless the communities have a specific impact to their
> network, but
It would be worth your time to look at Extreme SLX9640 with advanced
routing license.
On Tue, Mar 5, 2019 at 4:47 PM Roel Parijs wrote:
> We have been using the 7280SR-48C6 for 2.5 years now. Just after Arista
> announced the full table BGP routing.
> Looking at the price / port there is
On Sun, Mar 03, 2019 at 08:42:02PM -0500, Joshua Miller wrote:
> A while back I read somewhere that transit providers shouldn't delete
> communities unless the communities have a specific impact to their
> network, but my google-fu is failing me and I can't find any sources.
>
> Is this still the
Don't forget, just because its the source IP in the packet doesn't mean thats
where it originated from (its probably not). But, since it contains a
consistent source IP, it should be fairly simple to filter it upstream.
-Original message-
From:Tyler Harden
Sent:Tue 03-05-2019 02:44 pm
We have been using the 7280SR-48C6 for 2.5 years now. Just after Arista
announced the full table BGP routing.
Looking at the price / port there is nothing near Arista. We also use Cisco
ASR1K and Juniper MX204 but these have far less capacity.
When we first started, there were quite a few
On Fri, Mar 1, 2019 at 8:26 AM Anderson, Charles R wrote:
>
> We require LLDP/LLDP-MED to configure our VOIP phones.
>
> For trunk links, it is extremely helpful to verify correct topology.
>
> For datacenters, it is EXTREMELY helpful to verify hypervisor connectivity.
I'd say it's extremely
thanks everyone watching the video, working on some more new ones. I am
also working on a ranking system for transit providers. The way ranking
will work is going to be limited to a Metro
Do you guys have any recommendations what technical aspects to look for
when ranking ISPs? it's quiet hard to
Is anyone else being DDOS’d or flooded with traffic from Internap Corporation
registered IP space?
We’re on day 2 of consistent outages and the traffic I’m receiving is entirely
from IPs in the /15 range 64.94.0.0-64.95.255.255
Cheers,
Tyler Harden
President
exospec
Thanks for info!
--
Dmitry Sherman
Interhost Networks Ltd
dmi...@interhost.net
Mobile: +972-54-3181182
Office: +972-74-7029881
Web: www.interhost.co.il
On 05/03/2019, 21:26, "Saku Ytti" wrote:
Hey Dmitry,
> What do you think about Arista 7280SR (DCS-7280SR-48C6-M-R) as a BGP
Check out the 7280sr2k, which is actually 24*10G, 24*25G, 6*100G
On 03/05/2019 08:55 PM, David Hubbard wrote:
> I love the NCS5501, but once Arista gets the 2M-route capacity down into the
> 48x10g format, I'd jump ship in a heartbeat; currently you have to do a much
> larger chassis-based
On 3/5/19, 2:28 PM, "NANOG on behalf of Saku Ytti" wrote:
Hey Dmitry,
> What do you think about Arista 7280SR (DCS-7280SR-48C6-M-R) as a BGP
peering router with 3 x upstream with full route view in RIB (ipv4 + ipv6) and
another IXP feed?
> Considering switching from ASR9001
Hey Dmitry,
> What do you think about Arista 7280SR (DCS-7280SR-48C6-M-R) as a BGP peering
> router with 3 x upstream with full route view in RIB (ipv4 + ipv6) and
> another IXP feed?
> Considering switching from ASR9001 which is doing perfect work but has no
> more ports left.
> The price is
Those devices are awesome, I use those on the same usecase, and
recommend them
(I do not run pim, tho)
On 03/05/2019 07:17 PM, Dmitry Sherman wrote:
> Hello,
> What do you think about Arista 7280SR (DCS-7280SR-48C6-M-R) as a BGP peering
> router with 3 x upstream with full route view in RIB
Hello,
What do you think about Arista 7280SR (DCS-7280SR-48C6-M-R) as a BGP peering
router with 3 x upstream with full route view in RIB (ipv4 + ipv6) and another
IXP feed?
Considering switching from ASR9001 which is doing perfect work but has no more
ports left.
The price is very competitive
On Tue, Mar 5, 2019 at 10:09 AM Bjørn Mork wrote:
> Stephen Satchell writes:
> > Did you submit a bug report?
>
> I believe this was fixed 5 years ago (in Linux v3.17):
> https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb1ce2ef387b01686469487edd45994872d52d73
>
>
Stephen Satchell writes:
> On 3/5/19 2:54 AM, Thomas Bellman wrote:
>> Out of curiosity, which operating systems put anything useful (for use
>> in ECMP) into the flow label of IPv6 packets? At the moment, I only
>> have access to CentOS 6 and CentOS 7 machines, and both of them set the
>> flow
Can someone contact me off list about an issue.
On Tue, Mar 5, 2019 at 4:54 PM wrote:
> Let me play a devil's advocate here, the above statement begs a question
> then, how do you know all that is harmful would you test for every possible
> extension and hw/sw permutation?
> So there would be 3 sets (though lines might be blurred) known
> From: NANOG On Behalf Of Saku Ytti
>
> Hey Rich,
>
> > I've pointed folks at this for years:
> > ICMP Packet Filtering v1.2
> > http://www.cymru.com/Documents/icmp-messages.html
>
>
> To me, the correct pattern is here is to deny things you know to be harmful
> and can
On 3/5/19 2:54 AM, Thomas Bellman wrote:
> Out of curiosity, which operating systems put anything useful (for use
> in ECMP) into the flow label of IPv6 packets? At the moment, I only
> have access to CentOS 6 and CentOS 7 machines, and both of them set the
> flow label to zero for all traffic.
Hey Rich,
> I've pointed folks at this for years:
> ICMP Packet Filtering v1.2
> http://www.cymru.com/Documents/icmp-messages.html
To me this seems anti-pattern. It seems it was written on basis of
'what we know we allow, what we don't know we deny'. With assumption
that ICMP
On Mon, Mar 04, 2019 at 08:04:12AM +1100, Mark Andrews wrote:
> ICMP is NOT optional.
I've pointed folks at this for years:
ICMP Packet Filtering v1.2
http://www.cymru.com/Documents/icmp-messages.html
---rsk
> Out of curiosity, which operating systems put anything useful (for use
> in ECMP) into the flow label of IPv6 packets? At the moment, I only
> have access to CentOS 6 and CentOS 7 machines, and both of them set the
> flow label to zero for all traffic.
FreeBSD 11.2-STABLE.
Steinar Haug,
On Tue, Mar 5, 2019 at 12:09 PM Joel Jaeggli wrote:
> Parsing the icmp payload was something we considered in rfc7690 but wasn’t
> one the approaches we pursued (we broadcasted the ptb to all hosts on the
> segment(s) behind the load balancers in our original implementation).
>
> It actually
On 2019-03-05 07:26 CET, Mark Andrews wrote:
> It does work as designed except when crap middleware is added. ECMP
> should be using the flow label with IPv6. It has the advantage that
> it works for non-0-offset fragments as well as 0-offset fragments and
> also works for transports other than
Sent from my iPhone
> On Mar 5, 2019, at 01:31, Saku Ytti wrote:
>
>> On Tue, Mar 5, 2019 at 12:26 AM Mark Andrews wrote:
>>
>> Then Cloudflare should negotiate MSS’s that don’t generate PTB’s if
>> they have installed broken ECMP devices. The simplest way to do that
>
> Out of curiosity
On Tue, Mar 5, 2019 at 12:26 AM Mark Andrews wrote:
> Then Cloudflare should negotiate MSS’s that don’t generate PTB’s if
> they have installed broken ECMP devices. The simplest way to do that
Out of curiosity does that imply you are aware of non-broken ECMP
devices, which are able to hash on
Sent from my iPhone
> On Mar 4, 2019, at 22:26, Mark Andrews wrote:
>
>
>
>> On 5 Mar 2019, at 5:18 pm, Mark Tinka wrote:
>>
>>
>>
>>> On 5/Mar/19 00:25, Mark Andrews wrote:
>>>
>>>
>>> Then Cloudflare should negotiate MSS’s that don’t generate PTB’s if
>>> they have installed broken
44 matches
Mail list logo