> On Apr 21, 2018, at 3:48 PM, Mark Andrews wrote:
> You have a logic fail. This fails because it STILL depends on the DNS for
> the zone working.
If the DNS fails to that extent, everything fails. I was addressing the single
application endpoint point-of-failure. But
> On Apr 21, 2018, at 2:47 PM, Keith Medcalf wrote:
> Actually, a I doubt that there are any "real" people with vanity domains
> behind this move. I suspect that it is the scammers and spammers who want to
> hide their information for very good reason.
> And of
> On Apr 21, 2018, at 2:27 PM, Lyndon Nerenberg <lyn...@orthanc.ca> wrote:
>> But backup and failover are reasonably well understood technologies
>> where one cares. Registrars could for example cache copies of those
>> zone records and act as failover whois
> On Apr 21, 2018, at 1:58 PM, b...@theworld.com wrote:
> That's actually an excellent point and counterpoint to my suggestion
> to move the WHOIS information into DNS RRs.
> But backup and failover are reasonably well understood technologies
> where one cares. Registrars could for example
> On Dec 28, 2017, at 7:50 PM, valdis.kletni...@vt.edu wrote:
> Comcast is passing out CPE that provides a subnet for the actual subscriber,
> and another one for *other* Comcast roaming customers. And somehow this
> works for a company the size of Comcast without the customers needing to
> On Dec 28, 2017, at 7:26 PM, Brock Tice wrote:
> Most of our customers only have 2-5 devices. I know this is not the case
> in most of America but we are quite rural and for many people they've
> never had better than 1.5Mbps DSL until we install service at their
> On Dec 28, 2017, at 7:28 PM, Tony Wicks wrote:
> I think its time you all had a bit of a holiday break and stopped thinking
> of IP networking for a little while, Just saying...
Nah. This is a useful conversation (and argument) to have.
> On Dec 28, 2017, at 6:54 PM, Ricky Beam wrote:
> Home networks with multiple LANs??? Never going to happen; people don't know
> how to set them up, and there's little technical need for it.
Again, you are assuming you know how people will use networks forever.
Peripherally, it's worth noting that, in far less time then we have not
migrated from IPv4 to IPv6, the UK moved from 7-digit to 11-digit telephone
numbers. If that's not embarrassing ...
> On Dec 28, 2017, at 6:11 PM, Scott Weeks wrote:
> All I was trying to say is there're going to be things
> not thought of yet that will chew up address space
> faster than ever before now that everyone believes it's
> essentially inexhaustible. And, I expect,
> :: Isn't this the utopia we've been seeking out?
> I like that one! :-)
Seriously. If we run out of networks while handing out /48s, by migrating
everything to HTTPS we can claw back the 16 bit 'port' field in the IP header
and reassign it as part of the 140-bit IPv6.1 address space.
> On Dec 28, 2017, at 4:57 PM, Lyndon Nerenberg <lyn...@orthanc.ca> wrote:
> Instead, think about how we can carve up a 2^61 address space (based on the
> current /3 active global allocation pool) between 2^32 people (Earth's
> current population)
Of course, I screwed u
> On Dec 28, 2017, at 3:28 PM, Brock Tice wrote:
> We are currently handing out /52s to customers. Based on a reasonable
> sparse allocation scheme that would account for future growth that
> seemed like the best option.
Could you detail the reasoning behind your allocation
> On Dec 28, 2017, at 2:31 PM, Thomas Bellman wrote:
> My problem with the IPv6 addressing scheme is not the waste of 64 bits
> for the interface identifier, but the lack of bits for the subnet id.
> 16 bits (as you normally get a /48) is not much for a semi-large organi-
> On Dec 4, 2017, at 3:19 AM, Edwin Pers wrote:
> As an anecdotal aside, approx. 70% of incoming portscanners/rdp bots/ssh
> bots/etc that hit the firewalls at my sites are coming from AWS.
> I used to send abuse emails but eventually gave up after receiving nothing
> On Oct 5, 2017, at 4:52 PM, Steve Feldman wrote:
> I have a vague recollection of parts of 192.168.0.0/16 being used as default
> addresses on early Sun systems. If that's actually true, it might explain
> that choice.
192.9.200.X rings a bell; but those might
> On Sep 20, 2017, at 6:40 PM, Sean Donelan wrote:
> Some ham radio operators have been verified as operating from Dominica. Its
> an unfortunate, but necessary thing that needs to be verified during disaster
I'm not clear what you're getting at here.
> On Aug 27, 2016, at 6:46 PM, Matt Palmer wrote:
> On Sat, Aug 27, 2016 at 01:25:42AM -, John Levine wrote:
>> In article
>>> I was working within the limits of what I had
> On Feb 23, 2017, at 6:10 PM, Ricky Beam wrote:
> When you can do that in the timespan of weeks or days, get back to me.
Stop thinking in the context of bits of fake news on your phone. Start
thinking in the context of trans-national agreements that will soon be signed
Canada should just have Comcast (or is it "Xfinity"?) provided nation-wide
Internet service as a for-profit monopoly.
Just as long as we have *someone* to Telus whom to chose.
> On Oct 3, 2016, at 6:52 PM, Lyndon Nerenberg <lyn...@orthanc.ca> wrote:
> It's the closed software that is fscking everything up right now. A little
> sunshine on the code base will go a long way towards those people not losing
> their Ferrari's after all.
> On Oct 3, 2016, at 6:33 PM, Matthew Petach wrote:
> If you hold the executives of the hardware manufacturer
> responsible for the software running on their devices,
> then the next generation of hardware from every
> manufacturer is going to be hardware locked to
> On Oct 3, 2016, at 5:39 PM, Jay R. Ashworth wrote:
> You're not familiar with CPSC mandatory recalls, are you?
I'm not sure how you could make the case that a compromised DVR, e.g., directly
creates a risk of physical injury to a person. Without that, I don't see how
This is where device profiles could help. If enough devices register
profiles with the local router, at some point the router's default
could be closed, so devices with no profile can't talk to the outside.
That would be nice, but a manufacturer who can't be bothered to take even
But that does not remove those devices from the network.
That ship has sailed.
In thinking over the last DDos involving IoT devices, I think we don't have a
good technical solution to the problem. Cutting off people with defective
devices they they don't understand, and have little control over, is an
action that makes sense, but hurts the innocent. "Hey, Grandma, did
> On Oct 1, 2016, at 8:37 PM, Hugo Slabbert wrote:
> So, kudos, Rogers Wireless!
This has also been live on Roger's Fido sub-brand for a while now, too.
2605:8d80:484:: is live in Vancouver.
> On Aug 31, 2016, at 6:36 PM, Matt Palmer wrote:
> Thanks, Netscape. Great ecosystem you built.
Nobody at that time had a clue how this environment was going to scale, let
alone what the wide-ranging security issues would be.
And where were you back then, not saving
Is there a Yahoo MTA admin listening who can help diagnose what might be a
network ACL block to one of our SMTP server subnets?
> In other words, it's not just Netflix that has this problem...
No, it's Netflix that has the problem. Audible actually gives a fuck about
> 1. C-band teleport in Singapore with SingTel IPs, remote terminals in
> 2. Ku-band teleport in Germany with IP space in an Intelsat /20, remote
> terminal on the roof of a US government diplomatic facility in
> 3. Teleports in Miami with IP space that
> On Jun 3, 2016, at 4:59 PM, jim deleskie wrote:
> I don't suspect many folks that are outside of this list would likely have
> any idea how to set up a v6 tunnel. Those of us on the list, likely have a
> much greater ability to influence v6 adoption or not via day job
[...] but I would also have doubts over running anything business
critical on a RP2.
We use them as reverse terminal servers, for dhcp/tftp bootstrapping other
machines, and soon, NTP. They are absolutely rock solid. There's
something to be said for "no moving parts inside."
> On May 11, 2016, at 5:42 PM, Scott Weeks wrote:
> Wouldn't the buffers empty in a FIFO manner?
They will empty in whatever order the implementation decides to write them.
But what's more important is the order in which the incoming packets are
presented to the
I'd get something like a 1U ATOM server ($120 eBay) with small SSD
($18). Runup your favorite FOSS OS, and conserver. For more than the
single real serialport, you can most likely fit a USB hub inside
the case still, and hang a number of USB serial dongles off.
We use Raspberry Pi 2s with
Are any of you pushing MACsec (802.1AE) out from your switches to the edge
hosts? Vs. just running it on the network cross-connect fabric?
We have a scenario where, if we could MACsec encrypt those (switch <-> host)
links, we could eliminate a lot of application level TLS. But searching for a
On Dec 3, 2015, at 6:28 PM, Lyndon Nerenberg <lyn...@orthanc.ca> wrote:
> Are we perhaps, finally, reaching the cusp where everyone has realized that
> if we all, collectively, tell the rodents to f*** off, they just might?
I should also mention that, despite their bluster, the
On Dec 3, 2015, at 9:14 PM, Lyndon Nerenberg <lyn...@orthanc.ca> wrote:
> I should also mention that, despite their bluster, they can't keep it up for
> more than half an hour.
The mailing list has been quiet. All step forward who are scared to say "me
too" on accoun
Afaik, the DDoS is "only" a UDP based one (or much of the attack), you should
be able to mitigate
some to much of the damage caused by filled pipes by blocking incomming UDP
trafic at your ISP level.
This is the Armada Collective, based on the description. We just went
through a round with
On Dec 3, 2015, at 5:00 PM, alvin nanog wrote:
> run tcpdump and/or etherreal to capture the DDoS attacks
Of course! If we had only thought of this sooner!
Description: Message signed with OpenPGP using GPGMail
Typically, businesses hide from admitting they've been hit by drive-by attacks
like Armada is trying to pull off. It has been interesting to see the public
reaction from the post-Protonmail targets, many of whom are being very visible
about 1) admitting they have been hit by the attacks, and 2)
On Jul 14, 2015, at 11:56 AM, Tony Hain alh-i...@tndh.net wrote:
IPv6 is not the last protocol known to mankind. IF it burns out in 400-500
years, something will have gone terribly wrong, because newer ideas about
networking will have been squashed along the way. 64 bits for both hosts and
On Jul 14, 2015, at 6:33 PM, Curtis Maurand cmaur...@xyonet.com wrote:
Since IPV6 does not have NAT, it's going to be difficult for the layman to
understand their firewall. deployment of ipv4 is pretty simple. ipv6 on the
otherhand is pretty difficult at the network level. yes, all the
On Jul 14, 2015, at 7:26 PM, valdis.kletni...@vt.edu wrote:
But.. But... How does that work without using UPNP? :)
Description: Message signed with OpenPGP using GPGMail
For a bit of fun, the results after 30 minutes of https://orthanc.ca/figure-1
being out on the nanog list:
This is strictly GETs on the target page, not tainted by CSS or favicon
I don't know what this says about the proclivity of Nanog readers to blindly
On Jul 13, 2015, at 1:57 PM, Mel Beckman m...@beckman.org wrote:
Did you consider running an IPv6 tunnel through HE.net?
Tunnels work, but they really are getting old. I have run 3ffe:: 6bone, HE
tunnels, and (currently) aiccu. They all work very reliably, and I have
I've been poking around looking for an inexpensive xDSL circuit tester to do
some measurements on my home DSL line, in opposition to the telco. $2K+ is not
in the budget, so I'm curious about the accuracy of the $300 Chinese units
kicking around eBay (e.g. the ST332B). Anyone out there have
On Jun 27, 2015, at 5:35 AM, Rafael Possamai raf...@gav.ufsc.br wrote:
How long do you think it will take to completely get rid of IPv4? Or is it
even going to happen at all?
IPX ruled the roost, very popularly, for a little while. How long did it take
to die? Why did it die? What were the
On Jun 22, 2015, at 5:27 PM, Scott Weeks sur...@mauigateway.com wrote:
I do SSH over geostationary satellite links (C-band) all
the time. I'd say it's slow, but not excruciating, unless
you type really fast on the network device's CLI. :-)
SSH client/server authors would do well to learn
What problem do you expect this to solve? This is a real question,
since you can be 100% sure that any DMARC policy will wreak havoc on
any of your users who use mailing lists like this one.
*Any* mailing list.
Please help stamp out this abomination by refusing to capitulate to its insane
On Jun 11, 2015, at 9:06 PM, Karl Auer ka...@biplane.com.au wrote:
You don't get to just say I'm not going to implement this because I don't
agree with it, which is what Google is doing in the case of Android.
Actually, you DO get to just say that. Anyone can, but especially
On Jun 10, 2015, at 11:18 AM, goe...@anime.net wrote:
Indeed, the interview process is a two way street. Lets you evaluate who you
would be working for -- or if you really would want to.
I wrote most of a very long follow-up to this. But what it boils down to is:
For all of you
On Jun 10, 2015, at 8:39 PM, Stephen Satchell l...@satchell.net wrote:
After the phone screen, the company called me in for the face-to-face
interview. I put the word interview in quotes because, for 25 minutes,
the chief programmer of the place played a video game he wrote. That was the
Where is Mr. Protocol? When we need him most?!
Description: Message signed with OpenPGP using GPGMail
On Feb 28, 2015, at 4:37 PM, Jack Bates jba...@paradoxnetworks.net wrote:
The question is, if YOU paid for the fiber to be run to their ped, would they
hook you up?
No. But that's because they are using the fibre pedestals to deliver a high
bandwidth DSL service. The condo customers still
It's not about that's all they need, that's all they want, etc.
Whenever any vendor spouts this is what our customers want you know they are
talking pure bullshit. The only customers who know what they want are the
microscopic percentage who know what's actually possible, and we are dismissed
On Feb 28, 2015, at 5:24 PM, Stephen Satchell l...@satchell.net wrote:
(N.B.: we forced long TTLs to reduce the traffic necessary across our
peering points. At one point, the cable people said they had one,
count 'em one, peering link at 44 megabits/s, to serve all cable
On Feb 28, 2015, at 7:17 PM, Barry Shein b...@world.std.com wrote:
I remember when downloading still images (dial-up days) was considered
bandwidth hogging and only something very few people did. Of course no
one did it, it took minutes to download even a rather small image and
In my part of the world, a well-known service provider runs FTTC and
then runs VDSL into the home. Ummh...
I live in a 3rd word country. Oh Canada!
Description: Message signed with OpenPGP using GPGMail
I'm running into TLS interoperability problems with some of the SMTP
servers under the inbound.protection.outlook.com domain. Are there any
Outlook postmasters lurking here that could contact me off list to help
On Nov 23, 2014, at 7:41 PM, Brian Henson marin...@gmail.com wrote:
Is anyone else seeing their local craigslist redirected to another site
other than craigslist? I see it loading http://digitalgangster.com/5um.
*.craigslist.ca and *.craigslist.org have been offline since about 16:40
On Nov 23, 2014, at 8:51 PM, Randy Bush ra...@psg.com wrote:
and what tasty things did the hijacker's web site serve?
Firefox on my Mac started acting very strangely after encountering one of the
On Nov 10, 2014, at 4:24 PM, Izaac iz...@setec.org wrote:
If you're stuck working in a completely isolated environment, then work it
into the contract. That's the cost of being on an island.
This is the argument being made against all the citizens who have the temerity
to live in British
On Aug 18, 2014, at 3:05 PM, Randy Bush ra...@psg.com wrote:
the request message was a forge, see below. damned shame i did not
think of it, though. otoh, i consider the contact requests useful.
You just blew an opportunity to get on every north american late night talk
On Jul 14, 2014, at 5:39 PM, Matt Palmer mpal...@hezmatt.org wrote:
I assume that there's a leopard involved there somewhere?
It's noodling around in the disused lavatory with Moaning Myrtle.
Description: Message signed with OpenPGP using GPGMail
On Jun 20, 2014, at 6:24 AM, Jacques Latour jacques.lat...@cira.ca wrote:
Just as an indicator, we have 316 .ca domains with IPv6 glue records :-(
Part of the problem might be that two of the bigger registrars (Webnames and
easyDNS) *still* can't handle input of IPv6 addresses in their
On Feb 16, 2014, at 7:59 PM, Mark Tinka mark.ti...@seacom.mu wrote:
Juniper's Junos implementation (which is based on FreeBSD)
hasn't been patched
Using firewall filters is the only way to mitigate the
But doesn't the JunOS ntpd read/parse ntpd.conf? It's worth getting
On Feb 16, 2014, at 8:30 PM, Christopher Morrow morrowc.li...@gmail.com wrote:
and good luck with figuring out:
1) when you need to re-do that magic move
2) making sure that the move is automatable over time
I was suggesting it as an alternative to just chopping off NTP at your border.
On Nov 1, 2013, at 7:18 PM, Mike Lyon mike.l...@gmail.com wrote:
So even if Goog or Yahoo encrypt their data between DCs, what stops
the NSA from decrypting that data? Or would it be done simply to make
their lives a bit more of a PiTA to get the data they want?
Markhov chain text generators
On 2013-06-25, at 7:58 PM, Sean Donelan s...@donelan.com wrote:
The memo provides an overview and principles regarding Lawful Intercept(LI)
of networks using RFC 1149, A Standard for the Transmission of IP Datagrams
on Avian Carriers. National requirements are not addressed.
On 2013-06-25, at 8:24 PM, Caruso, Anthony acar...@mre-consulting.com wrote:
Yes, if you can identify the source of the grains, you know origin and flight
path prior to your lawn. NSA approach's is getting the pigeon shit off of
Then I am in favour of PRISM. NSA: come
On 2013-06-25, at 8:54 PM, Jason Hellenthal jhellent...@dataix.net wrote:
Anyone got a pentagram packet and a weje board ?
Be careful, when you pull out the chalk to draw a pentaGRAM around your data
centre, that you don't – accidentally – draw a pentaGONE.
On 2012-12-20, at 12:13 PM, Michael Thomas wrote:
things need to have gig-e speeds? Probably not... for a lot even Bluetooth
are probably fine. But they do want to be really small and really inexpensive.
Then run RS-422 or RS-485 over a single twisted pair. You don't even
I'm looking for innovative ideas on how to find such a rogue device,
ideally as soon as it is plugged in to the network.
There was a SIGCOMM paper a few years back that described a scheme based on
measuring the the ACK delays of TCP sessions. In a nutshell, you can detect
nodes on the
On 2012-10-14, at 14:56 PM, Matthias Waehlisch wrote:
do you mean http://conferences.sigcomm.org/imc/2007/papers/imc122.pdf
That's the one!
On 2012-08-24, at 10:33 AM, valdis.kletni...@vt.edu wrote:
If you can use 3ms to extract enough money out of the market to pay for a
cable, that market is *way* too volatile in the first place.
Heh. Think things are volatile now? Wait 'til they get it down to
pico-payment based trading of
It is far preferable for the merchant to request ID and verify that the
signature matches the ID _AND_ the picture in the ID matches the
In the late 1990s I had a Visa card from (I think) Citibank that had my
picture embossed on the front of the card. I'm surprised this didn't
On 2012-06-08, at 12:48 PM, Michael Thomas wrote:
I'm sorry, my brain doesn't hold that many passwords. Unless you're a savant,
yours. So what you're telling me and the rest of the world is impossible.
https://agilebits.com/onepassword (1Password) is one solution to managing
On 2012-06-08, at 1:02 PM, Scott Weeks wrote:
Only if you have an OS you have to pay for: apple or ms.
I don't pay for them. $WORK pays for them.
If you're complaint is about 1Password not running on your particular operating
systems, then pick a solution that *does* run on your OS. There
On 2012-06-08, at 1:22 PM, Michael Thomas wrote:
Does your password safe know how to change the password on each
website every several months?
On 2012-06-08, at 1:41 PM, Michael Thomas wrote:
I run a website. If it can change it on mine, I'd like to understand
how it manages to do that.
I log in to your website, change my password, and the software picks up that
I've changed the password and updates the safe accordingly. The
On 2012-06-08, at 2:07 PM, Andrew Sullivan wrote:
I'm not trying to be dismissive. Those are excellent stopgap
measures. They're not a solution.
There is no solution. Security is about risk management, nothing more.
The only way to ensure your personal passwords are never compromised is
I have a couple of wiring projects coming up on salt water-going vessels and
I'm curious as to people's experiences with different types of cable marking
products in a high-humidity / salt air / bilge environment
None of the markers will be directly exposed to the outside elements, but quite
On 2012-03-08, at 2:10 PM, George Herbert wrote:
Which fuel is present affects the label durability...
I just went through some calculations for a (government) site that has the
Under the plausible assumption that very many people will start with a string
of digits, continue with a string of lower-case letters to reach seven
and then add a period, there are
There really is no winner or right way on this thread. In IPv4 as a
security guy we have often implemented NAT as an extra layer of obfuscation.
It's worse than just obfuscation. The 'security' side effect of NAT can
typically be implemented by four or five rules in a traditional firewall.
The last mile for the Level3 is coming on Telus (after a punch to
the face and gut for build out fee) so I'd like someone else.
Shaw does not offer service without what I suspect is another
punch to the face for a build out. Bell didn't return any of my
inquiries via email of voice message.
I hope someone will explain the operational relevance
of this ...
Sun V100 FreeBSD firewall/border gateway
Sun V100 Plan 9 kernel porting test bed
Sun V100 OpenBSD build/test/port box
Intel 8-core Solaris fileserver and zones host
AMDx4Random OS workstation
Sorry, poorly worded. What I was wondering is there is an equivalent of
KA9Q for IPv6. I believe one of the comments we got back when we were
trying to reclaim 44/8 was that folks couldn't migrate to IPv6 because
no software was available...
We've come a little way since NOS. Linux has
Does it make sense that ham radio operators have
routable IP address space any longer?
Yes. Keep your mitts off 44!
no no no.. it's simply, since the OP posited a math solution, md5.
ship the size of file + hash, compute file on the other side. All
files can be moved anywhere regardless of the size of the file in a
MD5 compression is lossy in this context. Given big enough files
sorry for the noise, but my contact at Syngenta says
they have 188.8.131.52/8 184.108.40.206/8 and 220.127.116.11/8,
Bugger. Now I have to renumber out of my 172.16/12 subnets :-(
and pigs fly
Well, sometimes they do.
There underlying problem here is flying sheep:
Note the accurate summarization of the entire issue.
Guess that move to Amazon EC2 wasn't such a good idea. First reddit,
FWIW, at $DAYJOB we haven't been able to run out a pool of a couple of
dozen EC2 instances for more than two weeks (since last
Just how much free time do you have? :)
1 minute to google the capacity of a 747-400F.
1 minute to google the dimensions and weight of an lto-4 cartridge.
1 minute to punch the numbers into bc(1).
Also, who you will really trust to run it ?
The UUCP network chugged along quite nicely for many years without any
central authority. (Pathalias and the maps weren't an authority, just
because most of the end users who would be querying it are in
Canada, and, with one nameserver in Canada and one in Japan,
they would get a long RTT on DNS queries roughly half the time.
But only, say, once per week if you're running a reasonable TTL on your
File transfer wasn't multihop
It was, for at least some versions (V2 and later?), if the intermediate
site(s) allowed execution of the uucp command. 25 years on the brain is
fuzzy on the details ...
You could certainly add uux and uux to the list of legal remote commands, but I
confess that my memory is also dim about whether
uucp file a!b!c
would be translated automatically. It has indeed been a while...
I'm pretty sure it was adding 'uucp' in the commands list that enabled
I am seriously suggesting that a redirect mechanism -- perhaps the email
equivalent of HTPP's 301/302 -- would be worth considering.
We already have SMTP's 221 and 521 response codes for this. But because the
response text is free-form there's no way to reliably parse out
1 - 100 of 114 matches
Mail list logo