Custom query (937 matches)

Filters
 
or
 
  
 
Columns

Show under each result:


Results (73 - 75 of 937)

Ticket Resolution Summary Owner Reporter
#579 fixed stray DHCP servers on wired network in Tower 2 ? cdoyle@… hermin.anggawijaya@…
Description
Hi

I am staying in room 2146 of Tower 2 and sometimes when my PC does a DHCP,
it got replies from either:
- 10.0.1.1 (28:37:37:3f:e5:84) offering 10.0.1.65/24 address
- 10.0.0.254 (00:50:18:5f:b2:ba) offering 10.0.0.115/24 address
- relay agent 130.129.64.1 (5c:5e:ab:d5:60:f0), and server 130.129.5.7
offering addresses that seem to work.

Does the wired network get managed by the IETF NOC team as well now ?
would be great if the servers offering 10.0.x.x address ranges could be
filtered out (if they are rogue servers).

Thanks

Hermin
#994 not broken strange packet loss jim@… leifj@…
Description

mtr ping.sunet.se on v6

klapautius (::) Tue Apr 5 20:46:09 2016 Keys: Help Display mode Restart statistics Order of fields quit

Packets Pings

Host Loss% Snt Last Avg Best Wrst StDev?

  1. 2001:67c:370:152::2 0.8% 263 3.5 6.2 0.9 284.5 22.9
  2. 2001:67c:370:232:3::13 0.4% 263 38.3 5.5 0.8 211.4 19.5
  3. 2800:40:12:a3::defa 0.0% 263 10.8 13.3 1.3 327.8 37.6
  4. 2800:40:0:132:190:210:110:234 58.6% 263 5.2 10.5 1.2 389.4 39.2
  5. 2001:13d0:0:1::a9 13.0% 262 17.5 13.9 3.2 185.4 19.7
  6. ???
  7. 2001:13d0::1:0 1.1% 262 5.7 7.3 2.1 179.6 14.3
  8. telecom-argentina.baires5.bai.s 1.1% 262 2.2 5.0 1.8 160.6 13.7
  9. lo0.londra32.lon.seabone.net 0.8% 262 234.9 239.6 234.8 355.3 14.6
  1. 2001:7f8:4::a2b:1 1.1% 262 243.9 251.7 239.0 459.5 18.4
  2. dk-uni.nordu.net 0.8% 262 288.3 276.8 256.9 529.2 31.0
  3. se-tug.nordu.net 0.8% 262 290.8 290.7 270.8 586.6 29.8
  4. t1tug-so-5-1-0.sunet.se 0.8% 262 290.4 292.1 274.5 614.0 28.3
  5. ping.sunet.se 1.1% 262 291.1 285.8 267.4 630.9 34.7
#1112 fixed source IP address spoofing from AS56554 (IETF meeting network) jim@… mjl@…
Description
Hi,

While reviewing recent public tests from the CAIDA spoofer client

https://www.caida.org/projects/spoofer/

I came across one involving the IETF meeting network.  It seems that
based on the testing history for AS56554, there is inadequate filtering
of IPv6 packets with invalid source addresses, so packets with spoofed
source addresses can leave your network.  These systems can
participate in volumetric denial of service attacks.

https://spoofer.caida.org/recent_tests.php?as_include=56554

Matthew

signature.asc

Note: See TracQuery for help on using queries.