On Jun 12, 2013, at 9:01 PM, Scott Weeks sur...@mauigateway.com wrote:
--- do...@dougbarton.us wrote:
From: Doug Barton do...@dougbarton.us
On 06/12/2013 05:13 PM, Scott Weeks wrote:
cat /var/log/router.log | egrep -v 'term1|term2|term3' | less
Prototypical useless use of cat
Not really, no one has claimed it's impossible to hide traffic. What is
true is that it's not feasible to do so at scale without it becoming
obvious. Steganography is great for hiding traffic inside of legitimate
traffic between two hosts but if one of my routers starts sending cay
photos
was that they might have installed a secret kill-switch to be activated
against 'enemy' nodes in time of war was an cyber shock and awe campaign.
mg
On Thu, Jun 13, 2013 at 8:24 PM, Michael Thomas m...@mtcc.com wrote:
On 06/13/2013 10:20 AM, Scott Helms wrote:
Not really, no one has claimed
-)
scott
.
-
http://www.cl.cam.ac.uk/~sps32/ches2012-backdoor.pdf
scott
amount of time looking at botnet traffic which has the same kind of
requirements.
On Jun 13, 2013 6:45 PM, William Herrin b...@herrin.us wrote:
On Thu, Jun 13, 2013 at 1:20 PM, Scott Helms khe...@zcorum.com wrote:
if one of my routers starts sending cat
photos somewhere, no matter how cute, I'm
8:39 PM, Michael Thomas m...@mtcc.com wrote:
On 06/13/2013 05:28 PM, Scott Helms wrote:
Bill,
Certainly everything you said is correct and at the same time is not
useful
for the kinds traffic interception that's been implied. 20 packets of
random traffic capture is extraordinarily
. Something has to pass rules to the box to be able trigger off of.
On Jun 13, 2013 9:53 PM, Michael Thomas m...@mtcc.com wrote:
On 06/13/2013 06:11 PM, Scott Helms wrote:
Not at all Michael, but that is a targeted piece of data and that means
a command and control system. I challenge your
Targeted how without an active CC system?
On Jun 13, 2013 10:01 PM, Jimmy Hess mysi...@gmail.com wrote:
On 6/13/13, Patrick W. Gilmore patr...@ianai.net wrote:
It should be trivial to prove to yourself the box is, or is not, doing
something evil if you actually try.
What if it's not doing
infrastructure.
Kill switches and secret back doors are all feasible but the rest of this
is fantasy.
On Jun 13, 2013 10:05 PM, Michael Thomas m...@mtcc.com wrote:
On 06/13/2013 06:57 PM, Scott Helms wrote:
What you're describing is a command and control channel unless you're
suggesting
On Fri, Jun 14, 2013 at 8:47 AM, Rich Kulawiec r...@gsp.org wrote:
On Thu, Jun 13, 2013 at 09:11:35PM -0400, Scott Helms wrote:
I challenge your imagination to come up with a
common scenario where a non targeted I'm/they're here that's useful to
either the company or the Chinese government
On Fri, Jun 14, 2013 at 1:51 PM, valdis.kletni...@vt.edu wrote:
On Fri, 14 Jun 2013 13:21:09 -0400, Scott Helms said:
How? There is truly not that much room in the IP packet to play games
and
if you're modifying all your traffic this would again be pretty easy to
spot. Again
Really? In a completely controlled network then yes, but not in a
production system. There is far too much random noise and actual latency
for that to be feasible.
On Jun 14, 2013 7:35 PM, Jimmy Hess mysi...@gmail.com wrote:
On 6/14/13, Scott Helms khe...@zcorum.com wrote:
backdoors
of communication system.
On Jun 14, 2013 8:13 PM, Jimmy Hess mysi...@gmail.com wrote:
On 6/14/13, Scott Helms khe...@zcorum.com wrote:
Really? In a completely controlled network then yes, but not in a
production system. There is far too much random noise and actual latency
for that to be feasible
I was a military guyback in the day 31m and 31q to be precise.
On Jun 14, 2013 9:09 PM, Michael Thomas m...@mtcc.com wrote:
On 06/14/2013 05:34 PM, Scott Helms wrote:
Is it possible? Yes, but it's not feasible because the data rate would be
too low. That's what I'm trying to get across
is much more realistic and
leveraging PCs is several orders of magnitude better because there is much
more available horsepower and its much easier to make a PC passively listen
for interesting data on its own.
Scott Helms
Vice President of Technology
ZCorum
(678) 507-5000
of communication that it can't just send a copy. A core router seldom
has so many spare CPU cycles free RAM that it can afford to read through
the data and glean the interesting bits.
Scott Helms
Vice President of Technology
ZCorum
(678) 507-5000
http://twitter.com
has or can get
access to that information for a given manufacturer.
Scott Helms
Vice President of Technology
ZCorum
(678) 507-5000
http://twitter.com/kscotthelms
On Sat, Jun 15, 2013 at 7:57 AM, Jimmy Hess mysi...@gmail.com wrote
to lots of data, they'd never be considered as targets for data
interception. To that point there are other, better, places to intercept
data that has both better throughput and fewer challenges (ie less
expensive).
Scott Helms
Vice President of Technology
ZCorum
(678) 507-5000
?
Like what a Fastlane does?
http://www.gdc4s.com/Documents/Products/SecureVoiceData/NetworkEncryption/GD-FASTLANE-w.pdf
scott
--- william.allen.simp...@gmail.com wrote:
From: William Allen Simpson william.allen.simp...@gmail.com
On 6/23/13 12:48 AM, Scott Weeks wrote:
By security protocol do you mean encrypting the traffic?
Like what a Fastlane does?
http://www.gdc4s.com/Documents/Products/SecureVoiceData
more
important on microwave shots when security is desired.
scott
employed in these products, they are export controlled items and
are regulated by the Bureau of Industry and Security (BIS) of the
U.S. Department of Commerce. They may not be exported or shipped
for re-export to restricted countries... wheee! :-)
scott
I hope I've gotten the quotations correct...
--- joe...@bogus.com wrote:
From: joel jaeggli joe...@bogus.com
On 6/24/13 1:19 PM, Scott Weeks wrote:
joe...@bogus.com wrote:
That's why I'm trying to follow up on the original question. Is
there something similar
to prospective customers?
scott
in this country,
or in others, and we need to protect ourselves.
scott
actually implement that?
No:
http://en.wikipedia.org/wiki/Stream_Control_Transmission_Protocol
---
C'mon Jay! Get with the plan! ;-)
scott
they grok that not understanding Van Jacobson dooms
you to repeat it.
Van is at Google. Much grokking is going on.
-Scott
https://docs.google.com/**document/d/**1lmL9EF6qKrk7gbazY8bIdvq3Pno2X**
j_l_YShP40GLQE/preview?sle=**true#heading=h.h3jsxme7rovmhttps://docs.google.com/document/d
they are able to make the purchase? Please
don't suggest arbitration because that only increases
the cost to those countries.
Who's going to buy .nanog?
Who's going to buy .ietf?
etc.
Did icann have any financial requirements to get .icann?
scott
then charging the tiny countries mors when they
are able to make the purchase?
s/tiny countries/cities in tiny countries/
Does the speculator issue have to go to arbitration?
scott
is not
insignificant to them.
scott
of caution preferred.
---
Thanks for the explanation. I will begin to learn more
about this.
scott
--
Bail on M$ period. If they give the data willingly this
way, I'm sure they also do it in other currently unknown
ways. Company culture and all that...
scott
. *
Scott
If you're re-defining the general perception of DNS, why not re-define IPv4
whilst you're at it?
It looks like the 4 at the start shouldn't be there - or at least, there is
a DNS server at the IP address you get without the 4...
Scott
On Thu, Jul 11, 2013 at 10:08 PM, Alex Buie alex.b
--- rw...@ropeguru.com wrote:
From: Robert Webb rw...@ropeguru.com
At least there are some that try and take a stand for
their customer and not just hand over the keys to the
palace when the good ole boys ask.
---
Like web search engine startpage.com
scott
Don't know about you, but when I log into my Comcast account I see :
*Note:enforcement of the 250GB data consumption threshold is currently
suspended
*
Even then, the 250GB only ever applied for the slower accounts.
Scott
On Sat, Jul 13, 2013 at 9:49 PM, Grant Ridder shortdudey
I can be sure to
never buy from them.
scott
with. :/
---
No, we don't have to live with it. Name-n-shame and let us
vote with our dollars. As I've said in the past, the ONLY
thing they'll understand is negative impact to their bottom
line...
scott
skew the ugliness of spammers.
scott
as http://giglinx.com/
Scott
cookies:
https://en.wikipedia.org/wiki/Local_Shared_Object
firefox:
http://support.mozilla.org/en-US/kb/enable-and-disable-cookies-website-preferences?redirectlocale=en-USredirectslug=Enabling+and+disabling+cookies
scott
To paraphrase Douglas Adams...
The Internet is big. Really big. You just won't believe how vastly,
hugely, mind- bogglingly big it is. I mean, you may think it's a long way
down the road to the chemist's, but that's just peanuts to space!
Scott
On Wed, Aug 14, 2013 at 10:32 AM, Sean
it probably comes down to about 10
carts per day. After all, we all know that 90% of that 1 exabyte/day is
just the same 3 cat videos on Youtube...
Scott
or Exabytes of data.
Scott
On 2013-08-15 19:00, Jay Ashworth wrote:
Is anyone here stupid enough not to put the management interfaces behind
a firewall/VPN?
---
Pain is a great teacher...
scott
innovation flourishes. Yay! :-)
scott
I've two 2 short outages to both Google Search and Google Mail/Apps over
the last 30 mins. Both cleared after a few minutes. For Search at least
it was returning a Google error page.
Comcast in the Bay Area.
Scott
On Fri, Aug 16, 2013 at 4:29 PM, win...@team-metro.net wrote:
Hey guys
fairly clearly does resolve, and I've had no problems sending
email to anywhere else on the internet, so it's obviously a local issue.
Scott
On Sat, Aug 31, 2013 at 1:05 PM, Mr. James W. Laferriere
bab...@baby-dragons.com wrote:
Hello All , Are the roots for .au lost in the haze
/roadrunner-returns-to-dns-hijack-tactics/
).
Also, Google DNS and OpenDNS helped manually clean up bad records after the
NYTimes had their nameservers changed at the TLD registry (
http://blog.cloudflare.com/details-behind-todays-internet-hacks).
—Scott
a
specific date, thus at least stopping someone from using a recycled account
to carry out a password reset on another service.
Facebook at least is already sending this header on all emails.
Overall this is nothing new - Hotmail has been doing the same thing for
years.
Scott
On Tue, Sep 3, 2013
or altering orders to re-route troops or
supplies in a military operation.
--
This is just confused, like much of the rest of the article. Mostly
FUD with a small kernel of fact inside the FUD wrapper.
scott
the targeted information.
Scott Helms
Vice President of Technology
ZCorum
(678) 507-5000
http://twitter.com/kscotthelms
On Thu, Sep 5, 2013 at 7:20 AM, Eugen Leitl eu...@leitl.org wrote:
- Forwarded message from liberationt
On Fri, Sep 6, 2013 at 9:50 AM, Jorge Amodio jmamo...@gmail.com wrote:
IMHO, there is no amount of engineering that can fix stupid people doing
stupid things on both sides of the stupid lines.
Yes but there is engineering to ensure that they have the opportunity
to do the right thing in the
Not sure exactly what you are looking for, but how about:
http://localcallingguide.com/ (Free/open copy of certain LERG tables,
should list all providers in a given RC/LATA/NPA-NXX)
or
http://www.telcodata.us/
Hope that helps,
-Scott
-Original Message-
From: Stefan [mailto:netfort
and probably
change your mind.
scott
If there's anyone from the IP-side of Verizon Wireless, if you could
contact me off-list, that would be awesome! Saves me hours of pointless
phone calls. :)
Thanks!
--
*Scott Morris*, CCIE/x4/ (RS/ISP-Dial/Security/Service Provider) #4713,
CCDE #2009::D,
CCNP-Data Center, CCNP-Voice
Did anyone else on this list get spam from qualisystems.com? It
looks like they scraped technical mailing list addresses and I
am trying to find out where.
scott
Received: from sjmda14.webex.com (sjmda14.webex.com [64.68.124.162])by
dm0208.mta.everyone.net (EON-INBOUND) with ESMTP
Oh this sure will be fun. For a good time, see how GSMA handles
connectivity with IPXs.
On Sep 26, 2013 1:28 PM, William Herrin b...@herrin.us wrote:
On Thu, Sep 26, 2013 at 11:07 AM, John Curran jcur...@istaff.org wrote:
On Sep 26, 2013, at 4:52 AM, bmann...@vacation.karoshi.com wrote:
, making those decisions, I felt
like I was providing enough freedom for 10 years. That is,
a move from 64k to 640k felt like something that would last
a great deal of time. Well, it didn't - it took about only
6 years before people started to see that as a real problem.
scott
Organisation Name the ccie
Organisation Address. later
Organisation Address.
Organisation Address.
Organisation Address. singapore
Organisation Address. 100850
Organisation Address. singapore
Organisation Address. SINGAPORE
Scott
of the mistake
and what has been done to stop it from happening again in the future.
Corporatespeak reports are grounds for dismissal!;-)
scott
/files/intro_installer_0.png
Of course, you could argue there's a difference between opting-in for
enhancing your email with Intro and opting-in for Please MITM all of my
email and dynamic modify it, but that's really just semantics - it
definitely appears to be opt-in.
Scott
that there's no correct answer, but there
are incorrect answers - such as putting the term dynamic in the rDNS
for an email server. It may not be incorrect enough to break an RFC, but
it's still the wrong thing to do!
Scott
-
This goes back to our conversation last June:
http://mailman.nanog.org/pipermail/nanog/2013-June/thread.html#59352
now $189K may not seem as 'big'! ;-)
(http://mailman.nanog.org/pipermail/nanog/2013-June/059371.html)
scott
--- do...@dougbarton.us wrote:
From: Doug Barton do...@dougbarton.us
lo
Just in case some folks thought this was a typo...
https://en.wikipedia.org/wiki/ARPANET#ARPANET_deployed
:-)
scott
issues.
Scott
blacklisting it, just wanted to point out that all number-only
domains aren't necessarily spam-only.
Scott
On Thu, Oct 31, 2013 at 3:49 PM, Tony Hain alh-i...@tndh.net wrote:
John Levine wrote:
Right. Spam filtering depends on heuristics. Mail from hosts without
matching forward/reverse DNS
to be
a different group taking care of just the bulk encryptors. Last,
I have seen some strange behaviors, such as not passing BPDUs.
That makes VLANing *phun*. Not!
scott
hosts are
working so I suspect this is by design.
$ dig whoami.akamai.net +short
38.104.99.142
Scott
a home gateway product (video, MOCA, voice, router, and WIFI) will
often have 5+ MAC addresses, one for each of the devices and often each one
has its own configuration.
This tutorial may help some:
http://www.nanog.org/meetings/nanog48/presentations/Sunday/Riddel_VDOC_N48.pdf
Scott Helms
Vice
is
coming in as multi-cast. You could put up some fake hosts that will take
any multi-cast data, but they'd be pretty easy to spot over time and making
all of your home gateways accept multi-cast traffic they didn't ask for
would be a bad thing (think trivial DDoS of your system).
Scott Helms
; small as it may be.
I'd like to hear from others if their experiences are different.
scott
?)
use Sprint's cell network.
scott
, in addition to spamming, you're not telling the
truth.
Warning to others reading. Don't scrape the list
for email addresses and if you get caught DON'T TELL
FALSE THINGS to folks! :-(
scott
--- zoha...@qualisystems.com wrote:
From: Zohar Karni zoha...@qualisystems.com
To: sur...@mauigateway.com sur
the way.
YMMV
Scott
On Wed, Dec 4, 2013 at 7:53 AM, Herro91 herr...@gmail.com wrote:
Hi,
I'm doing some research on the Cisco Cloud Web Security offering, also
known as ScanSafe.
Has anyone on the lists explored Cisco's ScanSafe SaaS offering, now called
Cisco Cloud Web Security - as a means
On 12/5/2013 2:52 PM, Scott Weeks wrote:
:: QualiSystems team met you during the 2011 Nanog
:: Conference in Denver.
No you didn't.
--- i...@kjro.se wrote:
From: Kelly John Rose i...@kjro.se
You didn't quite play this one right.
You need to see if you can use them to get a ticket
... {;-)
The above is a tin foil hat smiley :-)
scott
allowed access from
certain IP address ranges AFAIK.
scott
reply back to
this thread with the details, so others can learn from it when
they're looking through the archives.
scott
. You'll notice a lot of recent
news about increased and more strict data caps for their subscribers,
and that is the only thing they will likely be doing to relieve these
types of recurring issues.
-Scott
On 01/02/2014 11:18 PM, R W wrote:
I'm seeing the same as well. Can anyone from Comcast
I've seen others reporting this elsewhere too, so it's clearly a problem at
Yahoo's end.
Someone on the mailops list reported that disabling TLS for
yahoodns.nethosts fixed the problem so it may be worth trying that.
Scott
On Sat, Jan 4, 2014 at 9:28 AM, Adrian Minta adrian.mi...@gmail.com
of what a BCP is and
their first response likely would be to ask, What's the business
case?
Government regulation is also not the answer. They can't all agree
on basic crap, much less on some esoteric (in their opinion) netgeekery
thingie...
scott
--- do...@dougbarton.us wrote:
From: Doug Barton do...@dougbarton.us
On 01/16/2014 03:45 PM, Scott Weeks wrote:
Many/most CEOs would not have an understanding of what a BCP is and
their first response likely would be to ask, What's the business
case?
What I've tried to explain to people
in the right direction...
Scott
On Sun, Jan 19, 2014 at 2:55 PM, John Levine jo...@iecc.com wrote:
I had some problems with incoming mail that I tracked down to a
configuration bug, two hosts on the same LAN configured to respond to
the IP address of the MX. It's fixed now.
While
from 3rd party sites
like Google.
Scott
On Fri, Jan 24, 2014 at 3:08 PM, Jay Ashworth j...@baylink.com wrote:
Given how much traffic these days is CDN and streaming, is that number
really supportable?
http://www.marketplace.org/topics/tech/down-goes-google-down-goes-internet
Cheers
their internet
broke instead of complaining and hoping something might change?
scott
And if they were the intended application of the term, I would think that
“cheese” would not the the appropriate choice to catch them. However,
cheese and crackers would seem to be more a snack, which is at least how
I interpreted that original comment.
Perhaps I need to drink more…
Scott
https://www.digitalocean.com/community/questions/when-ipv6-will-be-fully-supportedwhich
then links to
http://digitalocean.uservoice.com/forums/136585-digital-ocean/suggestions/2639897-ipv6-addressessays
it all, really...
Scott
On Sat, Mar 22, 2014 at 12:07 AM, Bryan Socha br
worse, as MTAs would be expected to accept mail from
everywhere, and we obviously can't trust end user devices or ISP CPE to
be secure against intrusion)
Scott Buettner
Front Range Internet Inc
NOC Engineer
On 3/26/2014 8:33 AM, Laszlo Hanyecz wrote:
Maybe you should focus on delivering email
email multiple times. Imagine if all vendors started doing what
cisco is doing.
:-(
scott
30 this time and once when there were 9 vulnerabilities
I got almost 50 emails from cisco.
scott
Vulnerabilities
- SSL VPN Denial of Service Vulnerability
- Crafted IPv6 Packet Denial of Service Vulnerability
---
scott
:-)
scott
? ;-)
scott
://www.techworld.com.au/article/542813/akamai_admits_its_openssl_patch_faulty_reissues_keys/
(Of course, the end result is positive, but...)
Scott
caused people to have to
take action to fix the brokenness, but in the long run they were both
hugely positive.
Scott
didn't do that here (or at least, they did, but they did it by
actually making the change by which time it was too late!)
Scott
wasn't one of them.
Scott
.
and in the middle of Heartbleed.
You might have had a point - if it had been ANY of those. Other than the
original claim of Friday afternoon it was none of those things.
Scott
801 - 900 of 1666 matches
Mail list logo