On Fri, Feb 19, 2010 at 12:15 AM, Scott Weeks sur...@mauigateway.com wrote:
Anyone got the ASN of Office des Postes et Télécommunications in French
Polynesia? I'm having a heck of a time looking for it in APNIC.
I'm not sure whether the OPT from French Polynesia has its own ASN as
it owns
Hi,
Does anyone know a contact for AS33259?
It seems the AS33259 is leaking a bunch of prefixes in error, and this
caused reachability problems.
-
Matsuzaki Yoshinobu m...@iij.ad.jp
- IIJ/AS2497 INOC-DBA: 2497*629
Any multicast networks seeing a large amount of traffic for the beacon
group 233.4.200.18? Starting approximately 0730 GMT, we started receiving
more than 12 Mbps for that group which normally is far less.
Group: 233.4.200.18, (?)
Source: 64.251.63.189 (mcast.cen.ct.gov)
Rate: 1095
Date: Fri, 19 Feb 2010 20:05:10 +0900 (JST)
Matsuzaki Yoshinobu m...@iij.ad.jp wrote
It seems the AS33259 is leaking a bunch of prefixes in error, and this
caused reachability problems.
at the route-views.oregon-ix.net, it looks like '701 33259 25843 3356
...' as follows.
| * 12.147.32.0/21
This appears to be ongoing.
I'm seeing more updates here:
http://puck.nether.net/bgp/leakinfo.cgi
Some people at 701 are getting email alerts from my monitoring system.
I'll ask them about this shortly.
- jared
On Feb 19, 2010, at 7:06 AM, Matsuzaki Yoshinobu wrote:
Date: Fri, 19 Feb 2010
On Thu, Feb 18, 2010 at 09:50:59AM -0800, Crist Clark wrote:
And I want to know how they figured out we had a Barracuda.
It's not that hard, much of the time -- they tend to make
themselves visible via their poor behavior.
As to Spamhaus policy re appliances in general, their terms are on their
| * 12.147.32.0/21 157.130.10.233 0 701 33259
25843 3356 7132 14858 i
| * 17.86.0.0/16 157.130.10.233 0 701 33259
25843 3356 4637 1221 714 714 714 714 714 714 i
| * 17.86.132.0/22 157.130.10.233 0 701 33259
Rich Kulawiec wrote:
On Thu, Feb 18, 2010 at 09:50:59AM -0800, Crist Clark wrote:
And I want to know how they figured out we had a Barracuda.
It's not that hard, much of the time -- they tend to make
themselves visible via their poor behavior.
Is there some very specific poor
All,
We noticed at around midnight for a brief period of time and around 6AM EST for
an extended period that several hosted customer servers (4 completely different
customers) launched quite a campaign doing 100Mbps during these times (on
100Mbps ports).
The thing I find 'suspicious' is that
On Fri, 19 Feb 2010, Drew Weaver wrote:
All,
We noticed at around midnight for a brief period of time and around 6AM
EST for an extended period that several hosted customer servers (4
completely different customers) launched quite a campaign doing 100Mbps
during these times (on 100Mbps
Sorry, the point was that MRTG and other metrics also showed that they were
doing 100Mbps, and I am well aware of counter bugs in Cisco's IOS but it has
never been that out of whack (on several different switches) before, also the
fact that all of these hosts are Windows 2003 and had the exact
Dean Drako dr...@barracuda.com writes:
^
When they were providing a free service we promoted them strongly,
Translation: We made money using it and it didn't cost us anything.
but when they started charging the customers that really used it,
we had to part
The differential delay is most likely caused by the T1's in the MFR bundle
riding physically diverse paths across the TDM network. The carrier would need
to validate their CLR/DLR to see what paths/DS3's the individual T1's follow to
verify they are on the same circuit. Unfortunately there are
On Feb 18, 2010, at 2:25 PM, Nick Hilliard wrote:
On 18/02/2010 10:40, Michelle Sullivan wrote:
They seem to be doing that a lot of late. They also contacted my
employer and demanded $100k/yr(?) for having a Use Spamhaus RBL in our
software.
I sympathise. It's very frustrating when
On Feb 16, 2010, at 9:24 AM, Joe Abley wrote:
On 2010-02-14, at 12:41, Lorell Hathcock wrote:
My problem on the redesign is I want to provide routed, copper gig-e ports
at a reasonable price per port.
Force10 S25N/S50N. http://www.force10networks.com/products/s50n.asp
If you look
Michelle Sullivan matt...@sorbs.net writes:
Rich Kulawiec wrote:
On Thu, Feb 18, 2010 at 09:50:59AM -0800, Crist Clark wrote:
And I want to know how they figured out we had a Barracuda.
It's not that hard, much of the time -- they tend to make
themselves visible via their poor behavior.
Hi.
Are there solutions already available implementing 40GBASE-LR4,
100GBASE-LR4 and 100GBASE-ER4 draft standards ? By solutions it means
both switches with CFP-MSA/QSFP/CXP ports and the modules.
Rubens
Bjørn Mork wrote:
Michelle Sullivan matt...@sorbs.net writes:
Rich Kulawiec wrote:
On Thu, Feb 18, 2010 at 09:50:59AM -0800, Crist Clark wrote:
And I want to know how they figured out we had a Barracuda.
It's not that hard, much of the time -- they tend to make
[ subject: changed and refs headers removed ]
So you should think that its ok for blacklists to charge money for
things they got for free?
why not? apnic, arin, ripe, ... do!
giggle
randy
On Fri, Feb 19, 2010 at 07:18:38PM +0100, Bj??rn Mork wrote:
I don't know what Rich referred to, but Barracudas used to be easy to
spot by backscatter levels:
http://www.dontbouncespam.org/#barracuda
They're *still* easy to spot by backscatter levels, probably because
(a) a lot of people still
Hello all,
We have a customer that appears to have a portion of their ARIN-
assigned IP space blocked from accessing specific US Air Force
resources. We've tried opening tickets with various groups and are not
getting anywhere after several months of dancing.
I was wondering if:
1) Anyone
On 13 Feb 2010, at 01:01, Nathan Ward wrote:
On 13/02/2010, at 11:51 AM, Steve Bertrand wrote:
fwiw, I've also heard good things about bgpd(8) and ospfd(8), but I
haven't tried those either...zebra/Quagga just stuck.
OpenBGPd would be great for a public route server at an IX.
Nathan has
Thomas Magill wrote:
I am thinking about implementing a filter to block all traffic with
private AS numbers in the path. I see quite a few in my table though so
I am concerned I might block some legitimate traffic. In some cases,
these are just prefixes with the private appended to the end but
Has anyone experience problems using Intel 10 Gb NIC on VMware (AMD) ESX
4.0?
Some VM's are experiencing intermittent network drop issues even though
the actual VM is online. The VM are unable to ping out or respond to
ping and sometime unable to ping VM-to-Vm on the same physical server.
BGP Update Report
Interval: 11-Feb-10 -to- 18-Feb-10 (7 days)
Observation Point: BGP Peering with AS131072
TOP 20 Unstable Origin AS
Rank ASNUpds % Upds/PfxAS-Name
1 - AS18170 89373 7.0%4062.4 -- CHANGWON-AS-KR Changwon
National University
2 - AS31055
This report has been generated at Fri Feb 19 21:11:27 2010 AEST.
The report analyses the BGP Routing Table of AS2.0 router
and generates a report on aggregation potential within the table.
Check http://www.cidr-report.org for a current version of this report.
Recent Table History
Date
on Thu, Feb 18, 2010 at 09:50:59AM -0800, Crist Clark wrote:
Spamhaus does some good work, but being used as a pawn in
some conflict between vendors doesn't feel nice. And I want to
know how they figured out we had a Barracuda.
If it's connected to the 'Net and listening on port 25, it's
On 2010-02-04 at 17:50 -0500, Richard E. Brown wrote:
My company, Dartware, have derived a regex for testing whether an IPv6
address
is correct. I've posted it in my blog:
http://intermapper.ning.com/profiles/blogs/a-regular-expression-for-ipv6
This has links to the regular
On Fri, Feb 19, 2010 at 3:30 PM, Rich Kulawiec r...@gsp.org wrote:
Barracuda's engineers apparently think
that using SPF stops backscatter -- and it most emphatically does not.
Reject good, bounce baaad. [1]
Whine all you want about backscatter but until you propose a
comprehensive
On 2/19/2010 7:20 PM, William Herrin wrote:
On Fri, Feb 19, 2010 at 3:30 PM, Rich Kulawiec r...@gsp.org wrote:
Barracuda's engineers apparently think
that using SPF stops backscatter -- and it most emphatically does not.
Reject good, bounce baaad. [1]
Whine all you want about
Reject good, bounce baaad. [1]
Whine all you want about backscatter but until you propose a
comprehensive solution that's still reasonably compatible with RFC
2821's section 3.7 you're just talking trash.
no, rich is talking operation pragmatics. more and more these years,
rfcs are
US carried out Cyber Shockwave - an exercise by non-government actors who
have close relations to the government past.
The results will be aired on CNN this weekend.
Intelligence suggests the scenario was not standard and that a crash in the
smart phone network was used as a concept of how US
the details were in the press days ago. 83.2% scare, negligible lessons
we can actually put in practice without becoming (more of) a police
state.
randy
On Fri, Feb 19, 2010 at 9:02 PM, Randy Bush ra...@psg.com wrote:
Reject good, bounce baaad. [1]
Whine all you want about backscatter but until you propose a
comprehensive solution that's still reasonably compatible with RFC
2821's section 3.7 you're just talking trash.
no, rich is
On Fri, Feb 19, 2010 at 8:35 PM, Larry Sheldon larryshel...@cox.net wrote:
On 2/19/2010 7:20 PM, William Herrin wrote:
If an SMTP server has accepted the task of relaying the mail and
later finds that the destination is incorrect or that the mail cannot
be delivered for some other reason, then
On Fri, Feb 19, 2010 at 5:20 PM, William Herrin b...@herrin.us wrote:
On Fri, Feb 19, 2010 at 3:30 PM, Rich Kulawiec r...@gsp.org wrote:
Barracuda's engineers apparently think
that using SPF stops backscatter -- and it most emphatically does not.
Reject good, bounce baaad. [1]
Whine
On Fri, Feb 19, 2010 at 9:28 PM, Scott Howard sc...@doc.net.au wrote:
They finally fixed this a few years ago, and can not integrate with
LDAP (and possibly others) for address validation. Of course, it's
still down to the admin to implement it...
... can NOW integrate... even.
Scott.
37 matches
Mail list logo