> -Original Message-
> From: NANOG On Behalf Of
> David Hubbard
> Sent: Friday, March 12, 2021 9:47 AM
> To: nanog@nanog.org
> Subject: Re: OVH datacenter SBG2 in Strasbourg on fire
>
> After sending them abuse reports for years with only an increase in malicious
> traffic, I have
Official statement:
https://mailchi.mp/ubnt/account-notification?e=30527b2904
Sincerely,
Eric Tykwinski
TrueNet, Inc.
P: 610-429-8300
Actually, how are other places implementing these lists? I would have thought
to use RPZ,
but as far as I know if the blocked DNS domain is using DNSSEC it wouldn't work.
Sincerely,
Eric Tykwinski
TrueNet, Inc.
P: 610-429-8300
F: 610-429-3222
-Original Message-
From: NANOG
I'm sure most have already seen the CVE from Cisco, and I was just reading
through the documentation from FireEye:
https://www.fireeye.com/blog/threat-research/2015/09/synful_knock_-_acis.htm
l
Question is that it looks to me like they are over-writing the ospf response
for "show ip ospf timers
The only example I could come up with is an IDN, which Todd already said
wasn't the case.
At least I know Unicode domains didn't work on Exchange 2013 OWA, but worked
when changed to ASCII.
It may have changed by now though.
Sincerely,
Eric Tykwinski
TrueNet, Inc.
P: 610-429-8300
F: 610-429-3222
Javier,
I can't get to www.rrbone.net, an upstream provider to the IP I was given for
thepiratebay.se.
I tested on VZ FiOS and Wireless in Philadelphia area and both die within the
VZ network.
For Comcast, it looks like the space isn't showing up in the BGP table:
Sadly, it doesn't look like this is the first for Indosat either:
January 14th, 2011
http://www.bgpmon.net/hijack-by-as4761-indosat-a-quick-report/
Sincerely,
Eric Tykwinski
TrueNet, Inc.
P: 610-429-8300
F: 610-429-3222
-Original Message-
From: Þórhallur Hálfdánarson
Sincerely,
Eric Tykwinski
TrueNet, Inc.
P: 610-429-8300
F: 610-429-3222
8 matches
Mail list logo