NANOG Mailing List

The North American Network Operators' Group discusses fundamental Internet infrastructure issues such as routing, IP address allocation, and containing malicious activity.

List Archives

Latest Posts

Webinar on LibreQos June 14rh Dave Taht (Jun 09)
<blatant advert>

We are doing an hour long deep dive webinar on LibreQos June 14th, courtesy
of the APNIC Academy, with an astounding 196 signups so far. We are pushing
multiple terabits of traffic around the world through it now, not just for
ISPs, but for MDUs, post VPN processing, upstream DIY circuits, on
everything from DSL to fiber.

As an open source, eBPF based transparent bridge, it only takes a few
minutes to install in-band, and...

Re: Announcing N91 Monday Keynote ... tcp on the floor Dave Taht (Jun 08)
I saw the keynote topic about how people seem to think bgp is a band's
name...
Which I would enjoy watching, perhaps, if the jokes are good.

I would like to suggest corey hand out something like

"I fixed the internet and all I got was this lousy t shirt. "

I have met so few people under 40 that know how to read a packet capture...
trained only few dozen that seem to really get how tcp is supposed to
work... it feels like I...

Re: Open source Netflow analysis for monitoring AS-to-AS traffic Dave Taht (Jun 08)
We are in the process of adding netflow collection to libreqos. Any
potential testers using any of these backends described below out there?

Spoofer Report for NANOG for May 2024 CAIDA Spoofer Project (Jun 08)
In response to feedback from operational security communities,
CAIDA's source address validation measurement project
(https://spoofer.caida.org) is automatically generating monthly
reports of ASes originating prefixes in BGP for systems from which
we received packets with a spoofed source address.
We are publishing these reports to network and security operations
lists in order to ensure this information reaches operational
contacts in these...

Re: Microsoft AS8075 Contacts TJ Trout (Jun 08)
https://irrexplorer.nlnog.net/asn/AS395657

Bad IRR?

On Sat, Jun 8, 2024, 6:49 AM Intel-Feed <Intel-Feed () hopliteindustries com>
wrote:

Microsoft AS8075 Contacts Intel-Feed (Jun 08)
Hello, if any Microsoft AS8075 admins are on the list, we are experiencing routing issues with a single prefix being
announced from AS395657 reaching 52.96.0.0/14. Confirmed behavior across Lumen, Cogent and Hurricane Electric. Please
contact me directly. Thank you.

Re: Open source Netflow analysis for monitoring AS-to-AS traffic Vincent Bernat (Jun 08)
Without much information, I think this is more likely that you are
running out of disk space.

RE: Comcast.net email servers - temporarily blacklisted IP Address errors Brotman, Alex via NANOG (Jun 07)
Hey folks,

Someone forwarded this directly to my inbox, much appreciated. We’ll work with Martin to get this sorted out.

Re: Comcast.net email servers - temporarily blacklisted IP Address errors Mike Hammett (Jun 07)
https://www.mailop.org/

-----
Mike Hammett
Intelligent Computing Solutions
http://www.ics-il.com

Midwest-IX
http://www.midwest-ix.com

----- Original Message -----

From: "Martin Cook" <Martin.Cook () consolidated com>
To: nanog () nanog org
Sent: Friday, June 7, 2024 1:15:17 PM
Subject: Comcast.net email servers - temporarily blacklisted IP Address errors

Hello NANOG,

We recently started getting some complaints...

Comcast.net email servers - temporarily blacklisted IP Address errors Martin Cook (Jun 07)
Hello NANOG,

We recently started getting some complaints from customers experiencing an error when trying to access their old
Comcast.net email accounts with one of their email clients (outlook tbird etc.) via POP3 or IMAP. Web based use of
their email via the Comcast portal is unaffected.

      "ERR [AUTH] Temporarily blacklisted IP Address - try again later"

These customers are previous Residential HSI subscribers of...

Weekly Global IPv4 Routing Table Report Routing Table Analysis Role Account (Jun 07)
This is an automated weekly mailing describing the state of the Global
IPv4 Routing Table as seen from APNIC's router in Japan.

The posting is sent to APOPS, NANOG, AfNOG, SANOG, PacNOG, SAFNOG
UKNOF, TZNOG, MENOG, BJNOG, SDNOG, CMNOG, LACNOG and the RIPE Routing WG.

Daily listings are sent to bgp-stats () lists apnic net.

For historical data, please see https://thyme.apnic.net.

If you have any comments please contact Philip Smith...

Hosteurope / GoDaddy contact Umut Alemdar (Jun 07)
Hi,

We are dealing with unannounced SOA record changes from Hosteurope to our
domain.
Is there anyone from Hosteurope / GoDaddy who we could reach out to quickly
resolve this matter?

Thanks,
Umut

Get ready for N91: Learn more about Monday's Keynote + More Nanog News (Jun 06)
*Get Ready for N91: Q + A with Keynote Corey Quinn*
*“Snarky” Chief Cloud Economist Discusses Upcoming Talk + Why Humor is the
Key to a Good Keynote*

Chief Cloud Economist at The Duckbill Group, Corey Quinn, will kick off the
NANOG 91 programming on Monday!

Attendees may be familiar with Corey from his sarcastic, thoughtful, and
humorous commentary on helping companies improve their Amazon Web Services
(AWS).

*READ NOW *
<...

Re: Any Zayo clue on the list? Ryan Hamel (Jun 05)
Mike,

Do you have the full MTR? Packet loss in the middle of the trace means nothing if it is not persistent all the way to
the end.

Ryan Hamel

________________________________
From: NANOG <nanog-bounces+ryan=rkhtech.org () nanog org> on behalf of Mike Lyon <mike.lyon () gmail com>
Sent: Wednesday, June 5, 2024 4:56 PM
To: NANOG list <nanog () nanog org>
Subject: Any Zayo clue on the list?

Caution: This is an external email...

Any Zayo clue on the list? Mike Lyon (Jun 05)
Have a zayo packet loss issue and your NOC doesn't see anything wrong...

Host Loss% Snt Last Avg Best Wrst StDev 1.
ae15.cs4.sjc4.us.zip.zayo.com 94.3% 142 28.7 28.9 28.0 30.6 0.8 2.
ae8.cs2.sea1.us.zip.zayo.com 27.5% 142 30.8 30.5 27.5 41.6 3.9

Any help would be appreciated. Please ping me off list.

Thank You,
Mike

More Lists

Dozens of other network security lists are archived at SecLists.Org.