. *
Scott
If you're re-defining the general perception of DNS, why not re-define IPv4
whilst you're at it?
It looks like the 4 at the start shouldn't be there - or at least, there is
a DNS server at the IP address you get without the 4...
Scott
On Thu, Jul 11, 2013 at 10:08 PM, Alex Buie alex.b
--- rw...@ropeguru.com wrote:
From: Robert Webb rw...@ropeguru.com
At least there are some that try and take a stand for
their customer and not just hand over the keys to the
palace when the good ole boys ask.
---
Like web search engine startpage.com
scott
of caution preferred.
---
Thanks for the explanation. I will begin to learn more
about this.
scott
they are able to make the purchase? Please
don't suggest arbitration because that only increases
the cost to those countries.
Who's going to buy .nanog?
Who's going to buy .ietf?
etc.
Did icann have any financial requirements to get .icann?
scott
then charging the tiny countries mors when they
are able to make the purchase?
s/tiny countries/cities in tiny countries/
Does the speculator issue have to go to arbitration?
scott
is not
insignificant to them.
scott
actually implement that?
No:
http://en.wikipedia.org/wiki/Stream_Control_Transmission_Protocol
---
C'mon Jay! Get with the plan! ;-)
scott
they grok that not understanding Van Jacobson dooms
you to repeat it.
Van is at Google. Much grokking is going on.
-Scott
https://docs.google.com/**document/d/**1lmL9EF6qKrk7gbazY8bIdvq3Pno2X**
j_l_YShP40GLQE/preview?sle=**true#heading=h.h3jsxme7rovmhttps://docs.google.com/document/d
I hope I've gotten the quotations correct...
--- joe...@bogus.com wrote:
From: joel jaeggli joe...@bogus.com
On 6/24/13 1:19 PM, Scott Weeks wrote:
joe...@bogus.com wrote:
That's why I'm trying to follow up on the original question. Is
there something similar
to prospective customers?
scott
in this country,
or in others, and we need to protect ourselves.
scott
more
important on microwave shots when security is desired.
scott
employed in these products, they are export controlled items and
are regulated by the Bureau of Industry and Security (BIS) of the
U.S. Department of Commerce. They may not be exported or shipped
for re-export to restricted countries... wheee! :-)
scott
--- william.allen.simp...@gmail.com wrote:
From: William Allen Simpson william.allen.simp...@gmail.com
On 6/23/13 12:48 AM, Scott Weeks wrote:
By security protocol do you mean encrypting the traffic?
Like what a Fastlane does?
http://www.gdc4s.com/Documents/Products/SecureVoiceData
?
Like what a Fastlane does?
http://www.gdc4s.com/Documents/Products/SecureVoiceData/NetworkEncryption/GD-FASTLANE-w.pdf
scott
to lots of data, they'd never be considered as targets for data
interception. To that point there are other, better, places to intercept
data that has both better throughput and fewer challenges (ie less
expensive).
Scott Helms
Vice President of Technology
ZCorum
(678) 507-5000
is much more realistic and
leveraging PCs is several orders of magnitude better because there is much
more available horsepower and its much easier to make a PC passively listen
for interesting data on its own.
Scott Helms
Vice President of Technology
ZCorum
(678) 507-5000
of communication that it can't just send a copy. A core router seldom
has so many spare CPU cycles free RAM that it can afford to read through
the data and glean the interesting bits.
Scott Helms
Vice President of Technology
ZCorum
(678) 507-5000
http://twitter.com
has or can get
access to that information for a given manufacturer.
Scott Helms
Vice President of Technology
ZCorum
(678) 507-5000
http://twitter.com/kscotthelms
On Sat, Jun 15, 2013 at 7:57 AM, Jimmy Hess mysi...@gmail.com wrote
On Fri, Jun 14, 2013 at 8:47 AM, Rich Kulawiec r...@gsp.org wrote:
On Thu, Jun 13, 2013 at 09:11:35PM -0400, Scott Helms wrote:
I challenge your imagination to come up with a
common scenario where a non targeted I'm/they're here that's useful to
either the company or the Chinese government
On Fri, Jun 14, 2013 at 1:51 PM, valdis.kletni...@vt.edu wrote:
On Fri, 14 Jun 2013 13:21:09 -0400, Scott Helms said:
How? There is truly not that much room in the IP packet to play games
and
if you're modifying all your traffic this would again be pretty easy to
spot. Again
Really? In a completely controlled network then yes, but not in a
production system. There is far too much random noise and actual latency
for that to be feasible.
On Jun 14, 2013 7:35 PM, Jimmy Hess mysi...@gmail.com wrote:
On 6/14/13, Scott Helms khe...@zcorum.com wrote:
backdoors
of communication system.
On Jun 14, 2013 8:13 PM, Jimmy Hess mysi...@gmail.com wrote:
On 6/14/13, Scott Helms khe...@zcorum.com wrote:
Really? In a completely controlled network then yes, but not in a
production system. There is far too much random noise and actual latency
for that to be feasible
I was a military guyback in the day 31m and 31q to be precise.
On Jun 14, 2013 9:09 PM, Michael Thomas m...@mtcc.com wrote:
On 06/14/2013 05:34 PM, Scott Helms wrote:
Is it possible? Yes, but it's not feasible because the data rate would be
too low. That's what I'm trying to get across
Not really, no one has claimed it's impossible to hide traffic. What is
true is that it's not feasible to do so at scale without it becoming
obvious. Steganography is great for hiding traffic inside of legitimate
traffic between two hosts but if one of my routers starts sending cay
photos
was that they might have installed a secret kill-switch to be activated
against 'enemy' nodes in time of war was an cyber shock and awe campaign.
mg
On Thu, Jun 13, 2013 at 8:24 PM, Michael Thomas m...@mtcc.com wrote:
On 06/13/2013 10:20 AM, Scott Helms wrote:
Not really, no one has claimed
-)
scott
.
-
http://www.cl.cam.ac.uk/~sps32/ches2012-backdoor.pdf
scott
amount of time looking at botnet traffic which has the same kind of
requirements.
On Jun 13, 2013 6:45 PM, William Herrin b...@herrin.us wrote:
On Thu, Jun 13, 2013 at 1:20 PM, Scott Helms khe...@zcorum.com wrote:
if one of my routers starts sending cat
photos somewhere, no matter how cute, I'm
8:39 PM, Michael Thomas m...@mtcc.com wrote:
On 06/13/2013 05:28 PM, Scott Helms wrote:
Bill,
Certainly everything you said is correct and at the same time is not
useful
for the kinds traffic interception that's been implied. 20 packets of
random traffic capture is extraordinarily
. Something has to pass rules to the box to be able trigger off of.
On Jun 13, 2013 9:53 PM, Michael Thomas m...@mtcc.com wrote:
On 06/13/2013 06:11 PM, Scott Helms wrote:
Not at all Michael, but that is a targeted piece of data and that means
a command and control system. I challenge your
Targeted how without an active CC system?
On Jun 13, 2013 10:01 PM, Jimmy Hess mysi...@gmail.com wrote:
On 6/13/13, Patrick W. Gilmore patr...@ianai.net wrote:
It should be trivial to prove to yourself the box is, or is not, doing
something evil if you actually try.
What if it's not doing
infrastructure.
Kill switches and secret back doors are all feasible but the rest of this
is fantasy.
On Jun 13, 2013 10:05 PM, Michael Thomas m...@mtcc.com wrote:
On 06/13/2013 06:57 PM, Scott Helms wrote:
What you're describing is a command and control channel unless you're
suggesting
|term3'
or cat /var/log/router.log | egrep -v 'term1|term2|term3' | less
;-)
scott
--- do...@dougbarton.us wrote:
From: Doug Barton do...@dougbarton.us
On 06/12/2013 05:13 PM, Scott Weeks wrote:
cat /var/log/router.log | egrep -v 'term1|term2|term3' | less
Prototypical useless use of cat :)
-
What would you use
On Jun 12, 2013, at 9:01 PM, Scott Weeks sur...@mauigateway.com wrote:
--- do...@dougbarton.us wrote:
From: Doug Barton do...@dougbarton.us
On 06/12/2013 05:13 PM, Scott Weeks wrote:
cat /var/log/router.log | egrep -v 'term1|term2|term3' | less
Prototypical useless use of cat
-and-regional/nsa-claims-know-how-to-ensure-no-illegal-spying/article_ec623964-d23a-53c6-aeb0-14bf325a7f3c.html
scott
On Fri, May 31, 2013 at 11:16 AM, Warren Bailey
wbai...@satelliteintelligencegroup.com wrote:
We talked about this the other day. I think the consensus was.. In San
Fran, you're best off to head over to Fry's.
The nearest Frys to SF is about 30 miles away in Palo Alto.
Scott
On May 17, 2013 1:54 PM, John Starta j...@starta.org wrote:
On May 17, 2013, at 8:24 AM, valdis.kletni...@vt.edu wrote:
On Thu, 16 May 2013 15:16:22 -0700, Scott Weeks said:
He DOES NOT need a 260 word signature (see below!) to make sure he does
not get UCE from posting to NANOG
signature (see below!) to make sure he does
not get UCE from posting to NANOG. For any other sales folks out there
considering doing this, Brent's warning is a good one: It's a sure fire
way to get your company blacklisted among IT professionals.
scott
ps. WTF
://www.internap.com/business-internet-connectivity-services/route-optimi
zation-flow-control/
Good luck,
-Scott
-Original Message-
From: Erik Sundberg [mailto:esundb...@nitelusa.com]
Sent: Tuesday, May 14, 2013 7:00 PM
To: nanog@nanog.org
Subject: Looking for Netflow analysis package
No issues on Comcast cable in the bay area, either Comcast business or
Comcast home.
Scott
$ nslookup gmail.com 8.8.4.4
Server: 8.8.4.4
Address:8.8.4.4#53
Non-authoritative answer:
Name: gmail.com
Address: 74.125.239.149
Name: gmail.com
Address: 74.125.239.150
On Wed
32,000 to USD 56,000 (or more) and with a three-member
panel it could range from USD 70,000 to USD 122,000 (or more).
etc.
Seems a lot to someone like me. Hopefully my explanation won't light
flame throwers. I just want to explain my statement.
scott
.
scott
. :)
But likely caused by exactly the same problem - with the distinction
between between GeoIP of the DNS server and GeoIP of the client itself.
(Keeping in mind that the DNS lookup could be occurring over IPv4,
especially in the first example)
Scott
bandwidth, but I was surprised that their
system
gave such wrong results under what were effectively lab conditions.
--
It'd be nice to know if NDT was not accurate as well. Anyone tested it?
scott
Hey careful, Pigeons have won this fight before:
http://news.bbc.co.uk/2/hi/8248056.stm
-Original Message-
From: George Herbert [mailto:george.herb...@gmail.com]
Sent: Monday, April 01, 2013 10:37 PM
To: Jeff Kell
Cc: NANOG
Subject: Re: RFC 1149
Packets, shmackets. I'm just upset that
, speedtest sent only latin text in
large packets. NDT tests much more. The customers just use a web
browser and the only caveat is they need to have Java working.
Here's one to get a feeling of what your customers will see:
http://ndt.anl.gov:7123
scott
--- j...@2600hz.com wrote:
From: Joshua Goldbard j...@2600hz.com
It's going to completely revolutionize communications.
---
Ummm, yeah. Lemme know how that goes for you...
scott
(but not on NANOG)
as is.
Itty bitty rocket motors. One on each wing tip. Just have
to make sure they're balanced, so they don't go into routing
loops. WMAP (wing motor aggregation protocol? :)
scott
On 03/25/2013 08:44 AM, valdis.kletni...@vt.edu wrote:
On Mon, 25 Mar 2013 15:38:01 -, Nick Hilliard said:
On 25/03/2013 14:33, Mikael Abrahamsson wrote:
I would like to be able to request an IP list of open resolvers in my ASN,
perhaps sent to the contact details in RIPE whois database to
-
Got a link that we don't have to allow cookies and have to create an account to
read?
scott
against Spamhaus for
“abusing their influence.”
scott
...Sven Olaf Kamphuis, an Internet activist who
said he was a spokesman for the attackers...
I wonder is he'll ever post here again as he has in the past. It
probably would not go well for him if he did...
scott
NOC Contact
Date: Sat, 2 Mar 2013 04:17:04 -0500
Could someone from Comcast's NOC contact me off-list? We're seeing some
traffic take a strange route on its way back to some Comcast prefixes
from
several of our systems. Thank you!
-Rob
--
Scott Helms
Vice President
and the likelihood of
such behavioral (with Linode and Hetzner pretty much being at the top of
that list)
Scott.
.
The report was mainly for reporters. That's why they had
the omg sound byte bullet points at the top. It's also
why they had to explain several low level things in detail.
snip
Maybe it was meant to be found.
That is a definite possibility.
scott
something I just saw that
says it better than I can...
http://www.forbes.com/sites/andygreenberg/2013/02/21/the-shanghai-army-unit-that-hacked-115-u-s-targets-likely-wasnt-even-chinas-a-team/2/
scott
?
scott
--- calin.chior...@secdisk.net wrote:
From: calin.chiorean calin.chior...@secdisk.net
snipped
:: when all tools are available for windows os, you just have to compile them.
sniped out the rest
-
They're not all available for m$.
scott
them.
sniped out the rest
-
From: Scott Weeks sur...@mauigateway.com
::: They're not all available for m$.
--- wbai...@satelliteintelligencegroup.com wrote:
From: Warren Bailey wbai...@satelliteintelligencegroup.com
They are when you have
,
---
bzt. Wrong answer. Please study more. Next!
scott
...
;-)
scott
.
scott
ps. If you gottem both, well that's a whole other thingie.
infrastructure.
scott
on their computers, only know M$ and don't have the
knowledge to don't click on that bank email.
Technically, it was 74 pages of yawn. Don't waste your time unless
you're interested in how they found out where the attack was
originating from and how they tied it to the .cn gov't.
scott
encryptors are
all about; use them.
-
I would sure be interested in hearing about hands-on operational
experiences with encryptors. Recent experiences have left me
with a sour taste in my mouth. blech!
scott
...
Scott.
information isn't going to convince
anyone. Keep on this track and you're just going to be ignored by most
people on the list.
On Tue, Feb 12, 2013 at 5:57 PM, Masataka Ohta
mo...@necom830.hpcl.titech.ac.jp wrote:
Scott Helms wrote:
Numbers? Examples?
Greenfield SS and PON deployment costs
If the L1 provider's responsibility ends at the jack on the outside NIU,
as an ILEC's does today with copper, then you have clean separation and
easy access for both initial installation and for later
troubleshooting--clear benefits that help mitigate nearly all the
problems Scott refers
own.)
--
William McCall
--
Scott Helms
Vice President of Technology
ZCorum
(678) 507-5000
http://twitter.com/kscotthelms
other than a media converter or router with an appropriate
SFP.
Owen
Just so you know, this isn't viable, at least not to scale. You can on the
other hand use Cisco's ME line to do this even less expensively (so long as
you weren't planning on buying used 6509).
--
Scott Helms
Vice
.
Masataka Ohta
--
Scott Helms
Vice President of Technology
ZCorum
(678) 507-5000
http://twitter.com/kscotthelms
wrote:
On 2/11/13 4:16 PM, Masataka Ohta mo...@necom830.hpcl.titech.ac.jp
wrote:
Scott Helms wrote:
IMO if you can't pay for the initial build quickly and run it
efficiently then your chances of long term success are very low.
That is not a business model for infrastructure such as gas
On Tue, Feb 12, 2013 at 3:47 PM, Masataka Ohta
mo...@necom830.hpcl.titech.ac.jp wrote:
Scott Helms wrote:
Numbers? Examples?
Greenfield SS and PON deployment costs in Japan was already shown.
Japan has one of the highest population densities of major economies in the
world
. --Stephen Hawking
--
Scott Helms
Vice President of Technology
ZCorum
(678) 507-5000
http://twitter.com/kscotthelms
God does not play dice. --Albert Einstein
CCIE #3723 God is an inveterate gambler, and He throws the
K5SSSdice at every possible opportunity. --Stephen Hawking
--
Scott Helms
Vice President of Technology
ZCorum
(678) 507-5000
http
Lol, I didn't say all of them were doing that yet.
On Feb 11, 2013 3:50 PM, Christopher Morrow morrowc.li...@gmail.com
wrote:
On Mon, Feb 11, 2013 at 3:01 PM, Scott Helms khe...@zcorum.com wrote:
If you're a large MSO (say top 15)
then I can see it with today's technology, but even those
. --Albert Einstein
CCIE #3723 God is an inveterate gambler, and He throws the
K5SSSdice at every possible opportunity. --Stephen Hawking
--
Scott Helms
Vice President of Technology
ZCorum
(678) 507-5000
http://twitter.com/kscotthelms
I meant to add in more info, but my mobile Gmail client betrayed me.
On Mon, Feb 11, 2013 at 3:59 PM, Scott Helms khe...@zcorum.com wrote:
Lol, I didn't say all of them were doing that yet.
On Feb 11, 2013 3:50 PM, Christopher Morrow morrowc.li...@gmail.com
wrote:
On Mon, Feb 11, 2013 at 3
However you get your video feed you can encode it as ip and feed it out to
your shelves as IGMP streams. This is the normal way to handle linear
programming.
On Feb 9, 2013 2:03 PM, Jay Ashworth j...@baylink.com wrote:
Do any of the people who've worked with some of the IPTV delivery services
More accurately you'll do MPEG 4 streams controlled by IGMP.
On Feb 9, 2013 3:55 PM, Scott Helms khe...@zcorum.com wrote:
However you get your video feed you can encode it as ip and feed it out to
your shelves as IGMP streams. This is the normal way to handle linear
programming.
On Feb 9
On Thu, Feb 7, 2013 at 3:51 AM, Mikael Abrahamsson swm...@swm.pp.se wrote:
On Wed, 6 Feb 2013, Scott Helms wrote:
The cost difference in a single interface card to carry an OC-3/12 isn't
significantly more than a Gig-E card. Now, as I said there is no advantage
to doing ATM, but the real
On Feb 7, 2013 12:24 PM, Mikael Abrahamsson swm...@swm.pp.se wrote:
On Thu, 7 Feb 2013, Scott Helms wrote:
That has not been demonstrated in the market. There are lots of people
who say this, generally they're involved in building fiber plants, but in
the US and Canada I've not seen a single
--
Regards,
Abzal
--
Scott Helms
Vice President of Technology
ZCorum
(678) 507-5000
http://twitter.com/kscotthelms
thumb and learn the lesson that
way.
--
Scott Helms
Vice President of Technology
ZCorum
(678) 507-5000
http://twitter.com/kscotthelms
L1 unbundling.
Masataka Ohta
--
Scott Helms
Vice President of Technology
ZCorum
(678) 507-5000
http://twitter.com/kscotthelms
.
Masataka Ohta
--
Scott Helms
Vice President of Technology
ZCorum
(678) 507-5000
http://twitter.com/kscotthelms
On Wed, Feb 6, 2013 at 9:46 AM, Robert E. Seastrom r...@seastrom.com wrote:
Scott Helms khe...@zcorum.com writes:
In that case its even harder. Before you even consider doing open
access talk to your FTTx vendor and find out how many they have done
using the same architecture you're
of broadband environment, because of high
cost to the customers.
Masataka Ohta
--
Scott Helms
Vice President of Technology
ZCorum
(678) 507-5000
http://twitter.com/kscotthelms
is _conflating_, not _confounding_.
Scott Helms khe...@zcorum.com writes:
On Wed, Feb 6, 2013 at 9:46 AM, Robert E. Seastrom [[r...@seastrom.com]]
wrote:
Scott Helms [[khe...@zcorum.com]] writes:
In that case its even harder. Before you even consider doing open
inexpensive Layer 1 connectivity things
would be different.
How, Scott, would you expect that sort of thing might happen?
By people taking the first step?
Yeah; thought so.
There are more first steps that are never followed up than people
actually starting a trend. There is a guy in my
RFC
2100
Ashworth Associates http://baylink.pitas.com 2000 Land
Rover DII
St Petersburg FL USA #natog +1 727 647
1274
--
Scott Helms
Vice President of Technology
ZCorum
(678) 507-5000
http
Robert,
Thanks for the information, I either missed VLAN per sub set up which does
make PON L2 sharing virtually the same as AE or the version of
hardware/firmware I last worked on didn't support it.
On Wed, Feb 6, 2013 at 11:28 AM, Robert E. Seastrom r...@seastrom.com wrote:
Scott Helms khe
On Wed, Feb 6, 2013 at 4:48 PM, Masataka Ohta
mo...@necom830.hpcl.titech.ac.jp wrote:
Scott Helms wrote:
Actually, at the level that Eric's discussing there isn't any real
drawback
to using ATM.
High cost is the real drawback.
The cost difference in a single interface card to carry
, but that doesn't
invalidate your point, that's not a good platform for the LNS side.
On Wed, Feb 6, 2013 at 5:04 PM, Jean-Francois Mezei
jfmezei_na...@vaxination.ca wrote:
On 13-02-06 16:53, Scott Helms wrote:
You realize that most commonly the L2TP LAC and LNS are just routers
right?
You're
On Wed, Feb 6, 2013 at 5:31 PM, Masataka Ohta
mo...@necom830.hpcl.titech.ac.jp wrote:
Scott Helms wrote:
The cost difference in a single interface card to carry an OC-3/12 isn't
significantly more than a Gig-E card. Now, as I said there is no
advantage
to doing ATM, but the real cost
of router based).
I'd agree. Its a better way of doing L2 unbundling than PPPoE. Its just
PPPoE had the sharing concept baked into it so it was easy for most
operators to use historically.
--
Scott Helms
Vice President of Technology
ZCorum
(678) 507-5000
http
801 - 900 of 1660 matches
Mail list logo