Re: Craigslist hacked?

2014-11-23 Thread Nate Itkin
Looking at San Diego. Suspecting an issue with Google DNS.

Google-- dig @8.8.8.8 cities.l.craigslist.org. +short
74.63.219.135

My resolver-- dig cities.l.craigslist.org. +short
208.82.238.226

Authoritative-- dig @208.82.236.210 cities.l.craigslist.org. +short +norec
208.82.236.242


On Sun, Nov 23, 2014 at 10:59:35PM -0500, Brian Henson wrote:
 Im seeing it resolve to 74.63.219.135 on my network and on
 http://whois.domaintools.com/craigslist.org
 
 On Sun, Nov 23, 2014 at 10:57 PM, Quinn Kuzmich lostinmos...@gmail.com
 wrote:
 
  CoSprings list is coming up fine.
 
  On Sun, Nov 23, 2014 at 8:41 PM, Brian Henson marin...@gmail.com wrote:
 
  Is anyone else seeing their local craigslist redirected to another site
  other than craigslist? I see it loading http://digitalgangster.com/5um.
 
 
 


Re: Linux: concerns over systemd adoption and Debian's decision to switch

2014-10-21 Thread Nate Itkin
Often presented with an alternate spelling from those of us who 
had to live with it.

On Tue, Oct 21, 2014 at 01:44:17PM -0700, Eric Brunner-Williams wrote:
 systemd is insanity.
 
 see also smit.


Re: he.net down?

2011-10-03 Thread Nate Itkin
On Mon, Oct 03, 2011 at 11:14:03PM +, Michael J McCafferty wrote:
 Our session with them is up and down at Any2 at OWB.
 
 --Original Message--
 From: Aiden Sullivan
 To: nanog@nanog.org
 Subject: he.net down?
 Sent: Oct 3, 2011 3:35 PM
 
 www.he.net seems to be down on both IPv4 and IPv6 -- does anyone know what is
 going on?
 -- 
 Aiden
 Sent from my Verizon Wireless BlackBerry


Blaming DDOS.  http://status.linode.com

The incident was a probable DDOS attack, but its behavior was unusual and 
difficult to identify. Our network engineers made some adjustments to the DOS 
countermeasures acquired after last week's incident, and that seems to have 
stabilized traffic flow. We apologize for the inconvenience. -Ben Larsen 
Hurricane Electric Internet Services

Some supporting evidence would be nice.

- Nate Itkin



Re: medicare.gov / cms.gov DNSSEC Validation Failures

2010-12-28 Thread Nate Itkin
On Tue, Dec 28, 2010 at 06:39:21PM -0600, Richard Laager wrote:
 I'm looking for a DNS contact for medicare.gov (and cms.gov). They are
 failing DNSSEC validation.

Ditto.  Similar to uspto.gov not too long ago.

Try posting to dns-operations.
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
Almost certainly some *.gov dns admins lurking there.

Cheers,
Nate Itkin



Re: NTP clock source

2010-03-25 Thread Nate Itkin
On Thu, Mar 25, 2010 at 05:51:56AM -0700, Kyle Bader wrote:
 Can anyone recommend a solid clock souce (stratum 0) that's not overly
 expensive? 

The Endrun Technologies product worked well for me.  After an initial 
set-up, it was maintenance free. I couldn't install a rooftop antenna 
so I needed the CDMA receiver.  
http://www.endruntechnologies.com/network-time-server.htm

Nate Itkin



Re: FCC releases Internet speed test tool

2010-03-12 Thread Nate Itkin
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Fri, Mar 12, 2010 at 08:43:22AM -0500, Marshall Eubanks wrote:
 [ ... ]
 http://www.broadband.gov/

If you can't get there, check DNSSEC first  Lame server or bad signature:

Mar 12 08:57:57 mx1 named[18363]: no valid KEY resolving 
'www.broadband.gov/A/IN': 192.104.54.4#53

I'll send e-mail to dns-admin-at-fcc.gov, but that's probably a black
hole. If anyone has a contact at fcc.gov, please let them know.

Nate Itkin

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)

iQEcBAEBCAAGBQJLmpS5AAoJEDCWEYiadXeZqOsH/j8zsyQJHprWW4B2Zy5cdomb
mrMbfgIO6uCYPS6CFTEzmFYY9ggTnBTl6UR3E5X73riBlp+mocM+VP0l9J3LB90Y
uzVjItZEpnXjZ1ZfuneLXH9MisU5LXRfWMgTNU/vW1UtTW9pNGqp41eQp7/7Ojg7
r9c7pXwhga1UEpkORV/4fbDUXy8liI5CPaybF9YkePcUFhUAPLC1PqibgUPcQ4Ob
L3H3jq6c2XP/bK4c7k/tJ39JO02EsaR7JrOriHFrRqN/NfAbuhnLiJpgnEWBHmOL
9ilqWeVs0AVimIgM7fdUelooWUt2NGzOtuHP1UcdyB4ADFazwJI9N09IaVvn7l4=
=5r1z
-END PGP SIGNATURE-



Re: Security Guideance

2010-02-23 Thread Nate Itkin
On Tue, Feb 23, 2010 at 02:46:54PM -0500, Paul Stewart wrote:
 The problem is that a user on this box appears to be launching high
 traffic DOS attacks from it towards other sites.

It's possible the user inadvertently enabled the same exploit after you
rebuilt the system. I suggest caution with assigning culpability.

Nate Itkin