Hey all, anyone aware of issues with Arelion this morning? We have a bunch of
end users on at least Cox and Cogeco who are having serious issues with service
access, and the problem appears to be on the return path where it traverses
Arelion. Source net is Lumen/L3 3356 but loss/latency
across the
internet for ten seconds; 3.47 Gbps, 162 retransmits. Across the P2P, this
time at least, 637 Mbps, 3633 retransmits.
David
From: David Hubbard
Date: Friday, September 1, 2023 at 10:19 AM
To: Nanog@nanog.org
Subject: Re: Lossy cogent p2p experiences?
The initial and recurring
The initial and recurring packet loss occurs on any flow of more than ~140
Mbit. The fact that it’s loss-free under that rate is what furthers my opinion
it’s config-based somewhere, even though they say it isn’t.
From: NANOG on behalf
of Mark Tinka
Date: Friday, September 1, 2023 at 10:13
before this miserable
behavior began in late June.
From: Eric Kuhnke
Date: Thursday, August 31, 2023 at 4:51 PM
To: David Hubbard
Cc: Nanog@nanog.org
Subject: Re: Lossy cogent p2p experiences?
Cogent has asked many people NOT to purchase their ethernet private circuit
point to point service
Hi all, curious if anyone who has used Cogent as a point to point provider has
gone through packet loss issues with them and were able to successfully
resolve? I’ve got a non-rate-limited 10gig circuit between two geographic
locations that have about 52ms of latency. Mine is set up to support
Heck, I can’t even get Cogent to keep my paid services functional; going on
four weeks with an unusable 10gig point to point.
From: NANOG on behalf
of Mike Hammett
Date: Thursday, July 20, 2023 at 1:03 PM
To: Tom Beecher
Cc: nanog@nanog.org
Subject: Re: Cogent Abuse - Bogus Propagation of
Trying to determine an outage issue between Akamai and 33398; any Akamai folks
on here?
Thanks,
David
Have spent 90 minutes with tech support trying to get a peering issue a few
hundred miles away in front of the right department, and all I have to show for
it is broken local equipment lol.
Thanks,
David
It seemed like a decade in the making but has the IPv6 transit between Cogent
and Google (via that showed up last fall remained stable? I’d ruled them out
on a number of projects for this reason but may reconsider if it has been
reliable. Appears HE (ASN6939) is still unreachable though… I
I don't know that there is a normal as it likely depends heavily on the revenue
per customer and the service's tolerance for giving out IP addresses. It also
depends heavily on the back end infrastructhre and what kind of service is
being provided. There's probably massive scale behind
I recently cancelled a circuit with them that began life as transit and
converted to P2P, where the BGP fee never disappeared, and had been fighting
them on it for eight months. Now that the circuit is gone they've switched to
completely ignore mode. So, not likely I'll use them again. I did
Hi all, would love to get any current opinions (on or off list) on the
stability of Arista’s BGP implementation these days. Been many years since I
last looked into it and wasn’t ready for a change yet. Past many years have
been IOS XR on NCS5500 platform and Arista everywhere but the edge.
After sending them abuse reports for years with only an increase in malicious
traffic, I have no expectation of anything they do getting better or being for
the benefit of the internet as a whole. Only reason this is probably getting
any attention from them is in hopes they don’t irreparably
Was thinking the exact same thing; they and Digital Ocean seem to compete for
the number two spot behind China as a malicious traffic source on all my public
facing networks.
From the pics, the place looked like it has had quite a few semi-trailer
containers added around it, perhaps they were
first. I mean how can you seriously sell a circuit to anyone in a data center
and have a caveat that massive, that no other provider has.
From: Dovid Bender
Date: Wednesday, February 17, 2021 at 4:50 PM
To: David Hubbard
Cc: "nanog@nanog.org"
Subject: Re: Viable Third Optio
I’ve been pretty happy with NTT but their POPs can be limited; I’ve had to pick
up waves to them, which sometimes still comes out ahead. I’m slowly dropping
Cogent due to the v6 issues. I haven’t been able to try HE because they and a
frequent colo provider I use (Switch) don’t seem to get
Curious if anyone is seeing issues with 3356 cross country, particularly
Orlando-LA? I have to assume they’re having issues in Texas, so perhaps too
much capacity has been lost and it’s overloading what is functioning?
David
Yes, exactly same issue for us, and it has happened in the past a few years ago
fortunately. Any chance the route takes a Level 3 (3356) path? I’m just
theorizing here, but my belief is they have some kind of link aggregation in
the path from TB to 3356 (or maybe just internal near some edge)
The leaking past the VPN thing is pretty obnoxious. There are people who may
be subject to policy and/or regulatory requirements that don’t permit split
tunnels (even if supposedly not in userspace), so it will be interesting to see
what burdens the use of an OS that intentionally leaks data
Hi all, was curious if anyone has found it necessary to alter their route
dampening rules related to anycast networks, and Cloudflare especially? I’ve
got a customer whose target web server has been going intermittently
inaccessible from a very geographically distant Cloudflare location (AU),
I had a discussion with them about a point to point circuit last year and ran
into some weirdness around how burstable it would be for specific IP to IP
streams as our use case was cheap circuit / high speed data replication between
given endpoints. The sales rep was suggesting to me that I’d
I think this is just someone trying to pull the stock price out of the dumps by
branding themselves a “tech company”. There are still things from the
TWTelecom days they haven’t finished integrating into the control panel, this
should be fun watching them try to change the name at the same
Here in Florida the self-preservation interests of the two party system have
resulted in all voter registrations being made public, including email, d/o/b,
phone, home address (since you can't legally register any other), party
affiliation. If you used your private email for any state
It’s just due to network size. Horrid service and reliability aside, if you
have enough eyeballs, application providers will want to directly peer, and if
you have enough app providers on net then access providers will want to peer.
With all the acquisitions, they have a ton of fiber in the
I just brought one of my sessions back up to attempt to avoid the blackholing,
should be full feed, getting all of 850 v4 routes and 106 v6.
From: NANOG on behalf
of Tomas Lynch
Date: Sunday, August 30, 2020 at 9:41 AM
To: Drew Weaver
Cc: "nanog@nanog.org"
Subject: Re: Centurylink having a
Same. Also, as reported on outages list, what’s even worse is that they appear
to be continuing to propagate advertisements from circuits whose sessions have
been turned down. I validated ours still were via a couple looking glass
portals. Down Detector shows nearly every major service
Curious if anyone has knowledge of a vendor / product designed to make it
possible to use back-to-front cooled equipment in racks that need to be
‘sealed’ for heat containment reasons? I’d envision this looking like some
kind of adjustable depth sleeve, to get the cold air to the equipment,
Agreeing with the other replies about scarcity. Also wanted to comment that
address exhaustion affects web hosts particularly hard because "SEO experts"
continue to believe that if a site they work on does not have an exclusive IP,
they're being penalized by Google. They'll convince clients
Nope the underlay can be v4-v4, just need to be able to carry the v4+v6 overlay
to allow for migration of addresses.
From: Tyler Conrad
Date: Friday, July 10, 2020 at 12:39 PM
To: David Hubbard
Cc: "nanog@nanog.org"
Subject: Re: IPv6 over vxlan+evpn Arista?
Do you need to carry
Hi all, was curious if anyone is doing dual stack v4/v6 over Arista’s
implementation of vxlan / evpn (the inter-data center transport would be v4)?
They have plenty of references for v4 deployments but had to check on v6
support, which can make one nervous; they did confirm it’s supported.
I suspect he’d want to slow adoption and push his frankestein IPv4 because any
extension of IPv4 use makes the netblocks’s he’s obtained questionable
‘ownership’ of more valuable, in theory.
From: NANOG on behalf
of Baldur Norddahl
Date: Wednesday, May 13, 2020 at 5:02 PM
To:
It just keeps getting dumber by the minute. My home ISP hasn’t even updated
firmware to one that supports v6, but yeah, they’re surely going to update to
your Frankenstein ipv4 because you’re going to give them a taste of addresses
from the nightmare pool that will reach even less of the
LOL the IPv4+ thing was a pretty entertaining read. You clearly don’t have
even a basic understanding of the v4 packet structure, or that the octet
display concept is simply for human benefit. IPv6 can be implemented with
‘software updates’ too…
From: NANOG on behalf of Elad Cohen
Date:
Could the operation be moved out of California to achieve dramatically reduced
operating costs and perhaps solve some problems via cost savings vs increased
donation? I have to imagine with the storage and processing requirements that
the footprint and power usage in SFO is quite costly. I
Just received notice that Google is eliminating the Safe Browsing for Network
Administrators service…. in favor of a new paid alternative; imagine that.
Are there recommended similar services out there that will send netblock owners
alerts related to suspected compromised websites, malware
When they spam me I typically just ask if they have IPv6 to Google and never
hear back…
From: NANOG on behalf of David Guo via NANOG
Reply-To: David Guo
Date: Monday, January 6, 2020 at 11:06 AM
To: John Curran , "nanog@nanog.org"
Subject: RE: FYI - Suspension of Cogent access to ARIN Whois
Playing devil’s advocate, perhaps they were under emergency court order to not
deliver texts for a certain duration, market, who knows what, and that order
just ended, but some type of non-disclosure / secrecy directive continues to
exist… may have just had to come up with something to say
Curious if anyone knows of a security alert aggregation service? For example,
go and plug in all the various vendors hardware and software packages your
enterprise uses, and then the service subscribes to all the random RSS feeds,
CVE lists, vendor mailing lists, etc. to feed you the data
Our sales rep has been great, but unfortunately, for him, every time he calls
and I ask if Cogent is going to get me IPv6 transit to Google, he has to say
no, and then I tell him I can’t purchase any more circuits.
From: NANOG on behalf of Owen DeLong
Date: Monday, September 16, 2019 at 9:20
I wish Digital Ocean would put as much effort into policing their network; at
least two thirds of the malicious traffic hitting our customers comes from an
even split between them and OVH.
From: NANOG on behalf of Mel Beckman
Date: Thursday, September 5, 2019 at 10:48 AM
To: Phillip Carroll
Cogent is great, or worthless, depending on whether you like talking to Google
via IPv6.
From: NANOG on behalf of Darin Steffl
Date: Saturday, June 8, 2019 at 9:10 AM
To: Brielle Bruns
Cc: North American Network Operators' Group
Subject: Re: CenturyLink/Level 3 combined AS
Ok just so
Flexoptix may be an option; they're Germany. Even US shipping is typically two
day.
On 4/4/19, 4:10 PM, "NANOG on behalf of nanog-...@mail.com"
wrote:
Hello NANOG,
Could somebody recommend an SFP supplier in Europe with a warehouse in the
EU and fast shipping? I need to pick
Things are no better in Spectrum land; gotta love the innovation in monopoly
markets…. I ask every year and expect it in perhaps thirty.
From: NANOG on behalf of "Aaron C. de Bruyn via
NANOG"
Reply-To: "Aaron C. de Bruyn"
Date: Sunday, March 31, 2019 at 4:26 PM
To: "C. A. Fillekes"
Cc:
Oops, I was corrected that HE doesn’t have IPv6 issues with Google, not sure
why I had that in my head. Cogent certainly does but something had me thinking
there’s another big name that has the same problem.
David
From: NANOG on behalf of David Hubbard
Date: Thursday, March 28, 2019 at 12
Hey all, I’ve been having bad luck searching around, but did IPv6 transit
between HE and google ever get resolved? Ironically, I can now get to them
cheaply from a location we currently have equipment that has been Cogent-only,
so if it fixes the IPv6 issue I’d like to make the move. Anyone
On 3/19/19, 8:23 PM, "NANOG on behalf of Ronald F. Guilmette"
wrote:
In message
,
Tom Beecher wrote:
>Calling everyone an idiot in the midst of Endless Pontification isn't
>really a recipe for success.
I did not call "everyone" an idiot. I'm quite
On 3/5/19, 2:28 PM, "NANOG on behalf of Saku Ytti" wrote:
Hey Dmitry,
> What do you think about Arista 7280SR (DCS-7280SR-48C6-M-R) as a BGP
peering router with 3 x upstream with full route view in RIB (ipv4 + ipv6) and
another IXP feed?
> Considering switching from ASR9001
Curious if anyone has detail on the cause of the CenturyLink/L3 outage this
morning? Their master ticket response is not exactly confidence inspiring;
hey, routers nationwide decided to reboot, but don’t worry, service was
restored with no manual intervention….
*** CASCADED EXTERNAL NOTES
I’ve found the antenna choice and placement can make a huge difference in a
data center environment. In some cases it required going to a directional high
gain antenna pointed towards a desirable tower, which we found by having
someone monitor / reload the Opengear web interface while another
Yikes, they should change their name rather than be mistaken for Cogent lol
On 12/20/18, 2:04 PM, "Clayton Zekelman" wrote:
Cogent != Cogeco
Cogent - US Backbone Provider
Cogeco - Canadian Cable TV & Internet provider
At 01:00 PM 20/12/2018, David
Google and HE don't have IPv6 connectivity with Cogent because Cogent's CEO has
been in some decades long pissing match with them about free settlement free
peering. That's the unfortunate reality of the situation; nothing you can do
other than have another route to HE/Google IPv6 targets. We
They charge it even if you’re using your own address space. It’s a fee simply
for establishing BGP with them on a given circuit. I believe if you used
static routes and their space, you would not have to pay it.
From: NANOG on behalf of Josh Luthman
Date: Wednesday, October 17, 2018 at
Yep we pay it on our circuits, begrudgingly. Wouldn’t mind it as much if it
actually delivered me every BGP prefix in the global routing table…
From: NANOG on behalf of Josh Luthman
Date: Wednesday, October 17, 2018 at 11:49 AM
To: NANOG list
Subject: Cogent charging 50/mo for BGP (not IPs,
wasn't
interested because of the HE issue. I have yet to get another email...
On Tue, Oct 16, 2018 at 9:29 AM, Ca By
mailto:cb.li...@gmail.com>> wrote:
On Tue, Oct 16, 2018 at 5:16 AM David Hubbard
mailto:dhubb...@dino.hostasaurus.com>> wrote:
Have had the same sales rep for
Have had the same sales rep for several years now; unfortunately he has no
ability to fix their IPv6 peering issue so we’re slowly removing circuits, but
otherwise for a handful of 10gig DIA circuits it’s been stable.
From: NANOG on behalf of Ryan Gelobter
Date: Tuesday, October 16, 2018 at
, and its config has been deleted, the corresponding ifindex and related
counters should be gone; it no longer exists in any form. If you reload, it
will disappear, but that’s the only way.
From: Mel Beckman
Date: Saturday, October 13, 2018 at 4:46 PM
To: David Hubbard
Cc: "nanog@nanog.org"
Cisco tries very hard to make such useless data occur in XR. If you have a
gigE SFP in an SFP+ port, a new ifindex will appear for the resulting
GigabitEthernetX port, then it remains even if both the config and SFP have
been removed. Automated systems will keep querying it as if it were a
They actually profit from fraud; and my theory is that that's why issuers have
mostly ceased allowing consumers to generate one time use card numbers via
portal or app, even though they claim it's simply because "you're not
responsible for fraud." When a stolen credit card is used, the
This thread has piqued my curiosity on whether there'd be a way to detect a
rogue access point, or proxy server with an inside and outside interface?
Let's just say 802.1x is in place too to make it more interesting. For
example, could employee X, who doesn't want their department to be back
dev...@mejeticks.com>
Sent: Saturday, May 19, 2018 5:36:23 PM
To: David Hubbard; nanog@nanog.org
Subject: Re: Curiosity about AS3356 L3/CenturyLink network resiliency (in
general)
If this is a know issue and has happened before and point to point circuits
aren’t effected you always have the oppor
I’m curious if anyone who’s used 3356 for transit has found shortcomings in how
their peering and redundancy is configured, or what a normal expectation to
have is. The Tampa Bay market has been completely down for 3356 IP services
twice so far this year, each for what I’d consider an
Unfortunately, that's how it's done in route policy on XR, so people bouncing
between flavors can easily make that mistake.
On 4/13/18, 4:15 AM, "NANOG on behalf of Bjørn Mork" wrote:
Anurag Bhatia writes:
I'm finding it unreachable from at least one Level 3 router. I'm seeing
behavior which makes me suspect 1.1.1.1/32 has been incorrectly defined an
interface IP on that device; one of our locations gets an immediate ping
response for 1.1.1.1, and a traceroute of one hop, which is that first
I’ve been doing dual stack through Fortinet products for many years without
issue. Well, no issue from a technical perspective. Sometimes you have to dig
for a bit to find the equivalent v6 CLI commands, and occasionally there’s GUI
stuff missing that requires CLI where the v4 equivalent
We get static IP's to facilitate monitoring that the OOB remains online (easier
to hit a non-changing IP than getting false positives for outage between an IP
change and DDnS or whatever other type of update needs to happen), and it also
makes IPSec VPN easy if your roving sysadmins know what
Going to depend entirely on the data center. I've got OpenGear boxes deployed
in a variety of places, using Verizon LTE with static IP. One Level 3 colo I'm
in I had to buy a high gain directional antenna to get the signal strength up
above -80, where below that you're lucky to get a
with the situation,
so hopefully things are headed in the right direction now.
David
From: Martin Hannigan <hanni...@gmail.com>
Date: Friday, October 13, 2017 at 4:05 PM
To: David Hubbard <dhubb...@dino.hostasaurus.com>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Subject: Re:
Curious if anyone on here colo’s equipment at a Level 3 facility and has found
the temperature unacceptably warm? I’m having that experience currently, where
ambient temp is in the 80’s, but they tell me that’s perfectly fine because
vented tiles have been placed in front of all equipment
I’m seeing the same thing across our Level 3 circuits, even if the traffic
never leaves their network. This was not the case as recently as two days ago
when I had a reachability ticket open with them. My SE says they’re having an
internal issue that’s being worked on; didn’t provide detail.
Hey all, have some Brocade MLXe’s that can no longer handle a full v4 and v6
route table while also having VRF support (dumb CAM profile limitations in the
software). Mine don’t do anything fancy; just BGP to a few upstream peers and
OSPF/OSPFv3 to the inside, management VRF, some ACL’s. I’m
Would Arista 7280R work? Gets you 48+ 10gig and a couple QSFP ports even in
the cheapest model. I believe it has the features you want. Haven’t done MPLS
with it, but I’ve got some running OSPF/OSPFv3 with no issues.
On 4/13/17, 5:37 PM, "NANOG on behalf of Erik Sundberg"
Anyone have recommendations for an alternative service that works like bgpmon
(external reachability/peer monitoring, route hijack alerts, etc)? Since their
OpenDNS acquisition, I’ve found the service not working reliably, as in I
receive no alerts even when I’m intentionally taking one of our
Thought the list would find this interesting. Just received an email from VZ
wireless that they’re going to stop selling static IPv4 for wireless
subscribers in June. That should make for some interesting support calls on
the broadband/fios side; one half of the company is forcing ipv6, the
Provided you can get a cell signal, we’ve been very happy with Opengear boxes.
We’d been using their ACM5508 which is eight serial ports, two Ethernet, cell.
It runs linux, you can ssh into it, do fancy things like keep the cell side
down and use text messages to bring it up if you need to
Last 18 hour outage I experienced got me a fantastic half month credit. It
cost us more to pay me for the time I spent on hold than the credit was worth,
so I no longer call them if we’re down and downdetector shows others in the
area are too. We’re in the process of moving the circuit to a
Wouldn’t you want to use hexadecimal instead of ascii-text, since that would
match what the Cisco is asking for? I’m just throwing this out there, I’m not
familiar with Juniper but their docs seem to suggest that using hex will cause
it to ask for 40 hex chars.
David
On 11/10/16, 3:14 PM,
Do we know the attack destinations so we can watch transit traffic destined for
it to help sources that may be unaware?
David
Curious if anyone else is having issues with Level 3 (legacy Twtelecom
specifically) enterprise SIP? I’m at minute 45 of being on hold with them, so
I suspect they are having known issues. Our sales rep mentioned a toll free
outage being tracked under master ticket 11377637 but I don’t have
We’ve done this as well, and Arista support hasn’t hassled us about anything
yet so I’ve been pleased. I’ve been very happy using Flexoptics transceivers
in all kinds of equipment too, if anyone’s looking for something they know
works, and you get a programmer that will let you code optics to
We’d experienced similar, plus, email to text doesn’t work if the path between
alerting system and email gateway is broken.
We bought a few of these cellular gateways: http://www.smseagle.eu/
Then I went into a t-mobile store and bought a few $25/mo SIM cards, put credit
card on file to auto
Curious if anyone else is having issues reaching outlook.office365.com via ipv6
over Level 3? Our customers have begun reporting failures checking email, and
in the ones who have had this issue, are using the mail server name
outlook.office365.com and are on v6. Traceroute6 shows the traffic
il.com> wrote:
On 7/27/16, David Hubbard <dhubb...@dino.hostasaurus.com> wrote:
> Hi all, curious if anyone has recommendations on software that helps
manage
> routine duties assigned to operations staff?
Have computers do the routine scut work - not people.
Hi all, curious if anyone has recommendations on software that helps manage
routine duties assigned to operations staff?
For example, let’s say we have a P that says someone from the netops group
must check that Rancid is successfully backing up all router configs bi-weekly.
Ideally, it would
https://www.graylog.org/
On 6/6/16, 4:59 PM, "NANOG on behalf of Maximino Velazquez"
wrote:
>Hi nanog community
>
>I need help !!
>
>What is the best syslog server (opensource)?
>
>Thanks for your help
>
>Regards.
>
>--
>
>
>
>Max
>Thank you,
>
>Jordan Medlen
>Enterprise Communications Manager
>Bisk Education
>(813) 612-6207
>
> <http://www.bisk.com/>
>
>On 5/16/16, 3:49 PM, "NANOG on behalf of David Hubbard"
><nanog-boun...@nanog.org on behalf of dhubb...@dino.hostasaurus.com&g
Anyone seeing issues with Level 3 networking right now? We’re seeing huge
latency and loss on traffic coming inbound (to us, AS33260) but it seems to be
at the peering points with other major ISP’s and Level 3. Comcast for example:
333 ms21 ms70 ms
Ed, and anyone else reading this thread, I’m curious if you’ve looked at their
authenticated NTP offering which uses different servers:
http://www.nist.gov/pml/div688/grp40/auth-ntp.cfm
We’re considering that but haven’t tried yet.
David
On 5/9/16, 11:01 PM, "NANOG on behalf of b f"
Hopefully the job posting includes replacing this guy:
http://www.tampabay.com/news/business/frontier-communications-pledges-smooth-take-over-of-verizon-fios-and-land/2271256
"I would never say we're 100 percent certain it will go perfectly," Mike Flynn,
Frontier's regional president
Curious if anyone has had similar experience; looking for a 10gig transit
circuit at a colo, contacted VZ as they’re on net in the facility, quoted me an
astronomical amount at 10-20x going rates these days. I’m curious if I just
happened across a bad rep and should dig further, or that’s par
Scott, I was interested in that as well, it was in my original post. I’m
considering that and the SMSEagle; both are from Europe. I can’t find too much
on them from a real world war stories perspective, but there has been mention
of the FoxBox on nanog in years past, so there are some users
The specific phrase you’ll want to use with your VZ rep is a “machine to
machine” plan. It’s the same type of plans alarm companies purchase for
cell-backups. They have plans with data allowances as low as 1 MB/month for a
few dollars, but you get destroyed if you go over the plan because the
Hey all, was curious if anyone has opinions on the FoxBox vs SMS Eagle boxes
for sending SMS alerts directly to the cell network?
http://www.smsfoxbox.it/en/foxbox-iq.html/
http://www.smseagle.eu/store/en/devices/1-sms-eagle.html
Any alternative options would be appreciated too. I saw
Curious if anyone's used the 7280 and wants to share their experience?
I'm looking at it primarily for three reasons, MLAG (i.e. multi-chassis
LACP), large ARP/MAC table (256k entries) and large IPv6 neighbor table
(256k entries). For the table sizes we would like out of one pair of
switches,
Had an idea the other day; we just need someone with a lot of cash
(google, apple, etc) to buy Netflix and then make all new releases
v6-only for the first 48 hours. I bet my lame Brighthouse and Fios
service would be v6-enabled before the end of the following week lol.
David
Hey all, as we've slowly deployed IPv6 to our end users, it has begun to
cause some issues for those on Mac's specifically. Apple apparently has
an algorithm at some point in the network stack to decide whether IPv4
or IPv6 is, perhaps, 'better' or 'faster' at any given point in time
during an
I wear one of two things:
1) The 3M Peltor 105 ear muffs which offer 30db reduction.
I keep them in my car because I also use them for the gun
range, they fit snug but not annoying. They're only $18
on amazon: http://tinyurl.com/peltor105
There's also a behind the head bar if you don't like the
From: Mel Beckman [mailto:m...@beckman.org]
David,
Did you consider running an IPv6 tunnel through HE.net?
We couldn't get the desired throughput via HE tunnel. We tried it, then
switched to v6 through VPN using a slice of our own allocation, but
ultimately didn't want that overhead
On Mon, 13 Jul 2015, Paul B. Henson wrote:
Seems to be a lot less noise on this iteration of the shake fist at
Verizon's lack of IPv6 thread, I guess everybody is pretty much burned
out and given up 8-/. Verizon should just update their IPv6 status
page with a link to hurricane electric's
Experiencing packetloss all over the place (chicago, tampa, atlanta) on
Level 3's network; can't even reach them from Brighthouse residential.
IPv6 seems to still be working fine, but of course Brighthouse doesn't
offer that lol.
Anyone seeing the same?
David
It appears something Google allowed to happen in 2008 has happened
again:
# openssl s_client -starttls smtp -connect smtp.gmail.com:587
CONNECTED(0003)
depth=3 C = US, O = Equifax, OU = Equifax Secure Certificate Authority
verify return:1
depth=2 C = US, O = GeoTrust Inc., CN = GeoTrust
1 - 100 of 181 matches
Mail list logo