-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
You could be sure of two things when there were ambiguities in the routing
tables:
1- Every manufacturer knew how to handle them.
2 - Every manufacturer did it a different way.
I suspect that in most cases where two conflicting route entries existed
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I seem to remember that before the advent of VLSM and CIDR there was no
requirement for the 1 bits in the netmask to be contiguous with no intervening
0 bits and there was always someone who tested it out on a production network
just to prove a poin
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I agree that bank fees for transfers between accounts is unusual. There may be
a limit on the number of transfers you can do each month but typically no fees.
I agree with the point about using a credit card for gas purchases, since you
are currentl
Especially if that "document" is a component of a ciphersuite exchange.
--Dave
-Original Message-
From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of
valdis.kletni...@vt.edu
Sent: Thursday, February 23, 2017 9:22 PM
To: Ricky Beam
Cc: nanog@nanog.org
Subject: Re: SHA1 collisions pr
How about Origin Obfuscation
--Dave
Dave Edelman
> On Nov 18, 2015, at 16:51, Joe Abley wrote:
>
>
>
>> On 18 Nov 2015, at 15:55, Arturo Servin wrote:
>>
>> Laundered route
>
> The routes in question are not just being laundered, they're being bleached.
>
>
> Joe
Argus (qosient.com) is worth looking at.
Dave Edelman
> On May 2, 2014, at 12:21, Leslie wrote:
>
> pmacct (http://www.pmacct.net/) is another pretty awesome open source tool.
>
> Leslie
>
>> On Fri, May 2, 2014 at 8:00 AM, Avi Freedman wrote:
>>
>> There's also SiLK from CMU. It's powe
Does anyone have an explanation for the IPv6 hopopt appearing as protocol
value 0 in http://www.iana.org/assignments/protocol-numbers?
--Dave
I can just see someone spoofing a packet from victimA port 7/UDP to victimB
port 19/UDP.
--Dave
-Original Message-
From: Leo Bicknell [mailto:bickn...@ufp.org]
Sent: Tuesday, June 11, 2013 3:13 PM
To: Bernhard Schmidt
Cc: nanog@nanog.org
Subject: Re: chargen is the new DDoS tool?
On
Take a look at argus www.qosient.com
Dave Edelman
On May 14, 2013, at 19:17, Mike Hale wrote:
> Solarwinds netflow is also way, way overpriced for what you get...and
> their license model for Netflow is utterly ridiculous.
>
> I like Splunk plus Netflow integrator. With some custom lookup
I think that you might be describing the DIX connector retaining clamp.
Dave Edelman
On Dec 20, 2012, at 13:40, "Howard C. Berkowitz" wrote:
> On 12/20/2012 1:20 PM, Michael Thomas wrote:
>> I was looking at a Raspberry Pi board and was struck with how large the
>> ethernet
>> connector is
On 7/7/12 1:24 AM, "Jared Mauch" wrote:
>Die proxy arp die. (and that's not German).
>
>I've had a job or consulting gig or two that has inadvertently had this
>as the hidden glue making things work.
>
>(wha, you can't route that subnet out an Ethernet interface without a
>next hop? It's always
On 7/6/12 2:10 AM, "Randy" wrote:
>--- On Thu, 7/5/12, William Herrin wrote:
>
>> From: William Herrin
>> Subject: Re: job screening question
>> To: "Jon Lewis"
>> Cc: "nanog@nanog.org"
>> Date: Thursday, July 5, 2012, 6:43 PM
>> On Thu, Jul 5, 2012 at 9:28 PM, Jon
>> Lewis
>> wrote:
>> >
On 7/6/12 12:50 AM, "Scott Weeks" wrote:
>
>
>--- b...@herrin.us wrote:
>From: William Herrin
>
>> 5. What is the reason for the 100m distance limit within an
>>ethernet collision domain?
>
>What's an ethernet collision domain? Seriously, when was the last time
>you dealt with a half dupl
13 matches
Mail list logo