On Wed, Nov 26, 2014 at 12:41 AM, Nick B n...@pelagiris.org wrote:
At no point does that spec say a single thing about speed. The closest
part I could find was Upstream data rate 1.244Gbps, but I think it's
pretty clear that that is the link speed, not the actual data rate. It's
worth
Chris
Some that come to my mind:
draft-ietf-v6ops-balanced-ipv6-security and (not sure how up to date is
this one) RFC 6092 Recommended Simple Security Capabilities in Customer
Premises Equipment (CPE) for Providing Residential IPv6 Internet Service
RFC 5157 IPv6 Implications for Network
Hi,
Perhaps https://tools.ietf.org/html/rfc7217 might also fit in the list.
--
Marco
Arturo Servin schreef op 26-11-14 om 10:28:
Chris
Some that come to my mind:
draft-ietf-v6ops-balanced-ipv6-security and (not sure how up to date is
this one) RFC 6092 Recommended Simple Security
On Tuesday, November 25, 2014 09:51:47 PM Colton Conor
wrote:
Are exchanges really that unreliable compared to a
traditional cross connect?
Not necessarily.
It's just that when money is changing hands, folk tend to
find (passive) x-connects within the data centre to be far
more reliable
On Tuesday, November 25, 2014 10:34:14 PM Eric Van Tol
wrote:
It's been a while since I've checked the Equinix Customer
Agreement and Policies documents, but I know at one time
they required a physical presence in the in the IDC for
an Exchange cross-connect. This may have changed in the
On Tuesday, November 25, 2014 11:03:16 PM Bob Evans wrote:
I agree with Bill...going it on the cheap is risky. DOn't
consider it for primary. It may be good for backup. I
have sold small amounts of transit to non-ISP companies
on exchanges (100-200 meg). It's a good extra backup for
ISPs, if
Hi,
I’m pretty sure IX Reach can take you into an Equinix exchange, so it is
probably possible that they allow this kind of stuff to happen.
Ammar.
This email and any files transmitted with it are confidential and intended
solely for the use of the individual or entity to whom they are
On Wednesday, November 26, 2014 02:42:39 PM Ammar Zuberi
wrote:
I’m pretty sure IX Reach can take you into an Equinix
exchange, so it is probably possible that they allow
this kind of stuff to happen.
I meant in terms of a reseller model between the exchange
point and preferred service
On Tue, 25 Nov 2014 15:34:14 -0500, Eric Van Tol said:
but I know at one time they required a physical presence in the in the IDC
for an Exchange cross-connect.
At the risk of being snarky, if somebody doesn't have a presence where do
you connect the other end of the cross-connect cable? :)
Well, we would have a BGP router in another town. Then get a wave from a
transport provider from the other town to the town that equinix or the
peering exchange was located at. The cross connect would go from the
transport providers Z location to the port on the exchange. I have
confirmed that
peering exchange was located at. The cross connect would go from the
transport providers Z location to the port on the exchange. I have
In which case the cross connect is between the target and Z, who *has*
a physical presence at the exchange
pgp0hLFgZZD1w.pgp
Description: PGP signature
Name: thepiratebay.se
Address: 194.71.107.27
Its reachable from some places and not others.
Is it being filtered?
Is it being hijacked?
Email to them bounced from google apps.
Are we now officially living in a police state?
mtr dies at hop 2 for me:
2.
Works for me
Josh Luthman
Office: 937-552-2340
Direct: 937-552-2343
1100 Wayne St
Suite 1337
Troy, OH 45373
On Wed, Nov 26, 2014 at 12:41 PM, Javier J jav...@advancedmachines.us
wrote:
Name: thepiratebay.se
Address: 194.71.107.27
Its reachable from some places and not others.
Is it
All good from hibernia's network (AS5580).
On 26 Nov 2014 17:43, Javier J jav...@advancedmachines.us wrote:
Name: thepiratebay.se
Address: 194.71.107.27
Its reachable from some places and not others.
Is it being filtered?
Is it being hijacked?
Email to them bounced from google apps.
im hitting 30 hops tracing from one location, and 30 from some EC2s. another
shows
4. v638.core1.tor1.he.net
5. 100ge1-2.core1.nyc4.he.net
6. 100ge7-2.core1.lon2.he.net
7. 100ge3-2.core1.ams1.he.net
8.
From FL I die at
xe-3-2.r02.dsdfge01.de.bb.gin.ntt.net (129.250.5.174) 172.519 ms 155.386 ms
187.235 ms
On Nov 26, 2014, at 12:43 PM, Josh Luthman j...@imaginenetworksllc.com wrote:
Works for me
Josh Luthman
Office: 937-552-2340
Direct: 937-552-2343
1100 Wayne St
Suite 1337
Troy,
Here is one from an EC2 instance in Sydney.
2. 100.68.201.19 0.0%24
0.5 0.6 0.4 4.3 0.8
3. 100.68.201.41 0.0%24
0.4 0.5 0.4 0.6 0.1
4. 100.67.166.5
On 11/26/2014 06:41 PM, Javier J wrote:
Its reachable from some places and not others.
Maybe a partial outage.
They do some wacky routing with internal IP addresses and AS prepending to
make it seem like that they see hosted in Korea.
I have no idea why anyone would but they do.
On 26 Nov 2014 17:54, Ken Chase m...@sizone.org wrote:
im hitting 30 hops tracing from one location, and 30 from some EC2s.
Failing for me from NYC FiOS
http://traceroute.monitis.com/index.jsp?url=thepiratebay.setestId=545087
On Wed, Nov 26, 2014 at 12:41:07PM -0500, Javier J said:
Name: thepiratebay.se
Address: 194.71.107.27
Its reachable from some places and not others.
Is it being
Perhaps it has something to do with Verizon' huge fiber cut in LA? Vandalism
this morning
Aaron D. Osgood
Streamline Solutions L.L.C
274 E. Eau Gallie Blvd. #336
Indian Harbour Beach, FL 32937
TEL: 207-518-8455
MOBILE: 207-831-5829
GTalk: aaron.osgood
aosg...@streamline-solutions.net
Colton Conor colton.co...@gmail.com writes:
Some might ask why not get a cross connect to the provider. It is cheaper
to buy an port on the exchange (which includes the cross connect to the
exchange) than buy multiple cross connects. Plus we are planning on getting
a wave to the exchange,
I heard about that vandalism. Can anyone confirm that is the issue? But I
am in the NY area so why would traffic destined to Europe go to LA?
On Wed, Nov 26, 2014 at 1:02 PM, Aaron D. Osgood
aosg...@streamline-solutions.net wrote:
Perhaps it has something to do with Verizon' huge fiber cut in
I confirmed It is also blocked for Comcast users. Even Comcast business
users. This is starting to look like censorship to me.
On Wed, Nov 26, 2014 at 1:14 PM, Javier J jav...@advancedmachines.us
wrote:
I heard about that vandalism. Can anyone confirm that is the issue? But I
am in the NY area
Javier,
I can't get to www.rrbone.net, an upstream provider to the IP I was given for
thepiratebay.se.
I tested on VZ FiOS and Wireless in Philadelphia area and both die within the
VZ network.
For Comcast, it looks like the space isn't showing up in the BGP table:
Only one of their /24's is in TATA's(AS6453) table.
http://bgp.he.net/AS51040#_prefixes
http://lg.as6453.net
Router: gin-aeq-tcore1
Site: US, Ashburn, AEQ
Command: show route protocol bgp 194.71.107.0/24 terse exact
{master}
Router: gin-aeq-tcore1
Site: US, Ashburn, AEQ
Command: show route
I can get to www.rrbone.net via ipv6 (HE.net tunnel) but on ipv4, it dies
on hop 2, same as thepiratebay.se on Verizon Fios.
On Wed, Nov 26, 2014 at 2:01 PM, eric-l...@truenet.com wrote:
Javier,
I can't get to www.rrbone.net, an upstream provider to the IP I was given
for thepiratebay.se.
I
Le 26/11/2014 18:51, Dominik Bay a écrit :
On 11/26/2014 06:41 PM, Javier J wrote:
Its reachable from some places and not others.
Maybe a partial outage.
From France:
mh@home:~$ mtr --report thepiratebay.org
Start: Wed Nov 26 23:09:31 2014
HOST: homeLoss% Snt Last
Chris,
Are you aware IPv6 has 3 or arguably 4 major generations of standards?
Each generation requires nuanced defense strategies, based on which clauses
(must and should) were implemented. Some of the derived security works,
do not reflect, and in some cases contradict current security
Reachable from 32748.
tim-macbookair:~ tim$ curl -I thepiratebay.se | head -n 2
HTTP/1.1 200 OK
Server: nginx/1.6.0
tim-macbookair:~ tim$ traceroute thepiratebay.se
traceroute to thepiratebay.se (194.71.107.27), 64 hops max, 52 byte packets
1 ip253 (208.100.33.253) 4.519 ms 3.744 ms 7.527
Network unreachable from Vz DSL in Philly:
$ traceroute 194.71.107.27
traceroute to 194.71.107.27 (194.71.107.27), 64 hops max, 52 byte packets
1 192.168.1.1 (192.168.1.1) 1.064 ms 0.709 ms 0.699 ms
2 10.7.120.1 (10.7.120.1) 24.135 ms 24.033 ms 23.911 ms
3
Hi,
On Wed, Nov 26, 2014 at 08:54:07AM -0500, Joe Klein wrote:
Chris,
Are you aware IPv6 has 3 or arguably 4 major generations of standards?
Each generation requires nuanced defense strategies, based on which clauses
(must and should) were implemented. Some of the derived security works,
I just posted TATA as a single example. This route is missing from multiple
networks. I could not find the specific /24 on, Sprint(1239) ATT(7018) and
Centurylink either.
rvi...@route-server.ip.att.net show route 194.71.107.0/24
rvi...@route-server.ip.att.net
from
Anyone know what’s up ?
Looks like they are still working thru issues where I am.
Not sure if their domain was hijacked or what exactly.
If someone has a list where this is already being discussed id appreciate that
info.
Thanks,
Steve
No problem here in New Zealand
tonyw@vrhost1-w show route 194.71.107.0/24
icore1-w.inet.0: 519451 destinations, 525214 routes (519437 active, 14
holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both
194.71.107.0/24*[BGP/170] 10:25:44, MED 0, localpref 90
AS
http://www.kohls.com/ comes up for me fine on the west coast.
-Grant
On Wed, Nov 26, 2014 at 6:18 PM, o...@columbus.rr.com wrote:
Anyone know what’s up ?
Looks like they are still working thru issues where I am.
Not sure if their domain was hijacked or what exactly.
If someone has a list
Thanks - it's good now. Just earlier seemed to be some issues.
http://www.isitdownrightnow.com/kohls.com.html
Guess it could have been a hosting issue.
From: Javier J jav...@advancedmachines.us
Date: Wednesday, November 26, 2014 at 9:25 PM
To: Steven Parsons o...@columbus.rr.com
Subject: Re:
No problem here in Los Angeles either, but seeing a lone route through
Atrato only.
flags destination gateway lpref med aspath origin
*194.71.107.0/24 100 0 3491 5580 39138 22351 2.207
51040 i
* 194.71.107.0/24 100 0 174 5580 39138
Paul, I think this is isolated to ISP providers in the US.
It seems this is affecting Comcast, ATT U-Verse and Verizon FIOS customers.
Here is some interesting info:
http://www.reddit.com/r/AskTechnology/comments/2ni118/is_att_uverse_blocking_the_pirate_bay/
On Wed, Nov 26, 2014 at 10:06 PM,
No problem here in Los Angeles either, but seeing a lone route through Atrato
only.
flags destination gateway lpref med aspath origin
* 194.71.107.0/24 100 0 3491 5580 39138 22351 2.207 51040
i
* 194.71.107.0/24 100 0 174 5580
No problem here in Los Angeles either, but seeing a lone route through Atrato
only.
flags destination gateway lpref med aspath origin
* 194.71.107.0/24 100 0 3491 5580 39138 22351 2.207 51040
i
* 194.71.107.0/24 100 0 174 5580
Hi, Chris,
On 11/25/2014 05:32 PM, Chris Grundemann wrote:
Hail NANOG!
I am looking for IPv6 security resources to add to:
http://www.internetsociety.org/deploy360/ipv6/security/
This is stuff that I've authored or that I've been involved in:
Tools
* (Open Source) IPv6 Security
44 matches
Mail list logo