We’re getting rocked by storms here in Michigan, could be related.
Sent from my iPhone
> On Feb 28, 2024, at 01:22, Hank Nussbacher wrote:
>
>
>
aside from the official pablum that was released about an “incorrect process
used”
(which says exactly nothing) does anyone actually know anything accurate and
more specific about the root cause?
(and why it took 11 hours to recover?)
> On Feb 22, 2024, at 11:15 AM, John Councilman wrote:
>
On Tue, Feb 27, 2024 at 12:03 PM 푀풶퓇풸표 풟풶퓋풾풹퓈 via NANOG
wrote:
>
> Op 27-02-24 om 16:22 schreef Brotman, Alex:
>
> > We are seeing the same,
>
> Thanks.
>
> > You may also want to ask the mailop list.
>
>
> I was about to do that, when I noticed that the problem seems solved.
sorry about the
> On Feb 27, 2024, at 08:54, Dave Taht wrote:
> One of the things I learned today was that starlink has published an
> extensive guide as to how existing BGP AS holders can peer with them to get
> better service.
Yes, essentially every AS does this. The ones that follow best-practices tend
> On Feb 27, 2024, at 08:54, Dave Taht wrote:
> One of the things I learned today was that starlink has published an
> extensive guide as to how existing BGP AS holders can peer with them to get
> better service.
Yes, essentially every AS does this. The ones that follow best-practices tend
Op 27-02-24 om 16:22 schreef Brotman, Alex:
We are seeing the same,
Thanks.
You may also want to ask the mailop list.
I was about to do that, when I noticed that the problem seems solved.
--
푀풶퓇풸표
On Tue, Feb 27, 2024 at 10:02 AM Javier Gutierrez
wrote:
> My design is very simplistic, I have 2 sets of firewalls that I
> will have advertising a /32 unicast to the network at each
> location and it will have a TFTP server behind each firewall.
Hi Javier,
That sounds straightforward to me
Thanks to you all for your answers, it has helped me a lot already.
My design is very simplistic, I have 2 sets of firewalls that I will have
advertising a /32 unicast to the network at each location and it will have a
TFTP server behind each firewall.
I have no intention to have this be part
Or this: https://bgp.tools/as/14593#peers
Personally I find bgp.tools to be the friendliest…
I realize that this thread is turning into an Me too! type
thread, but it does seem useful to share which tools work best for each of
us…
W
On Tue, Feb 27, 2024 at 7:33 AM, Marco Davids wrote:
>
We are seeing the same, but seems like it's mostly affecting delivery for
broadcom.com, and a few other smaller domains. However, connectivity to the MX
listed by gmail.com (and most other domains using GSuite, etc) are working fine
over IPv6.
You may also want to ask the mailop list.
--
The best way I've found (and it is indeed rather incomplete) is to have a BGP
feed going to something like QRator from that AS (or a downstream AS) that then
performs analytics on the BGP feed. Starlink is unlikely to have BGP customers,
so that makes it a bit more difficult.
Hi,
At https://internet.nl we're seeing IPv6 connection issues on TCP port
25 (SMTP) to mx[1-4].smtp.goog.
Either 100% DROP (so no TCP connection) or ⅔ failure to setup connection.
Further testing seems to confirm the problem is bigger and on Google's side.
So, this fails:
echo 'quit' | nc
Or this?
https://bgp.he.net/AS14593#_peers6
Op 27/02/2024 om 13:17 schreef b...@uu3.net:
Well, for some basic overview you can use CAIDA AS rank.
You can use it directly, or you may try my (more user friendly)
frontend for it: http://as-rank.uu3.net/?as=14593
-- Original message
Well, for some basic overview you can use CAIDA AS rank.
You can use it directly, or you may try my (more user friendly)
frontend for it: http://as-rank.uu3.net/?as=14593
-- Original message --
From: Dave Taht
To: NANOG
Subject: starlink ixp peering progress
Date: Tue, 27 Feb
On Mon, Feb 26, 2024 at 1:20 PM Joe via NANOG wrote:
>
> One thing that I recently read on this mailing list, is that at least in the
> US, a transmitting a fraudulent LOA is a federal crime - wire fraud. [0]
> Being able to hopefully charge and convict someone performing fraud is a
> useful
Hi Alex,
l...@qrator.net (Alexander Lyamin) wrote:
> Ray mentioned precisely that he wants to monitor BGP announcements and
> route changes.
>
> Leak detection is kind of on a different level. You need a bit more data
> to effectively detect them. ( I kind of know that).
Our use case is
Aha! That makes sense!
I was struggling to find any kind of public data on who runs it, so I
assumed whoever was presenting it probably runs / owned it
On Tue, Feb 27, 2024, 08:20 Fearghas Mckay wrote:
>
>
> On 27 Feb 2024, at 01:28, Ben Cox via NANOG wrote:
>
> I believe PacketVis is Massimo
Hi,
(please see inline)
On Mon, 26 Feb 2024, Tom Samplonius wrote:
There is one purpose: to facilitate IP fraud, and maintain currently
fraudulently routed IPs.
Yes!
Anyone can dummy up a LOA. And there is still quite a lot of unrouted
IP space.
Yes. But the endgame is not
Hi All,
There is this blogpost from the FIRST netsec-sig group, about this topic,
available at
https://www.first.org/blog/20231222-Is-the-LoA-DoA-for-Routing
I totally agree with Christopher. The above blogpost ends with (for those
who don't like to follow links):
"With the current
> On 27 Feb 2024, at 01:28, Ben Cox via NANOG wrote:
>
> I believe PacketVis is Massimo Candela , based on
> https://ripe85.ripe.net/archives/video/987/
It is run by his brother rather than Massimo, but it is his BGPalerter software
behind the family business :)
f
21 matches
Mail list logo