
NANOG Mailing List
The North American Network Operators' Group discusses fundamental Internet infrastructure issues such as routing, IP address allocation, and containing malicious activity.
List Archives
- Jan
- Feb
- Mar
- Apr
- May
- Jun
- Jul
- Aug
- Sep
- Oct
- Nov
- Dec
- 2025
- 182
- 148
- 229
- 224
- 300
- 136
- 206
- 528
- 141
- –
- –
- –
- 2024
- 468
- 367
- 206
- 192
- 225
- 119
- 171
- 152
- 143
- 128
- 283
- 281
- 2023
- 234
- 212
- 195
- 173
- 257
- 246
- 144
- 365
- 414
- 474
- 215
- 125
- 2022
- 414
- 370
- 968
- 369
- 302
- 379
- 251
- 338
- 236
- 203
- 235
- 135
- 2021
- 721
- 619
- 528
- 449
- 280
- 447
- 280
- 527
- 651
- 728
- 454
- 239
- 2020
- 659
- 461
- 821
- 544
- 461
- 651
- 449
- 534
- 476
- 473
- 345
- 372
- 2019
- 699
- 447
- 515
- 400
- 536
- 469
- 593
- 503
- 378
- 661
- 497
- 607
- 2018
- 386
- 203
- 397
- 418
- 504
- 423
- 508
- 269
- 373
- 485
- 322
- 620
- 2017
- 278
- 321
- 427
- 166
- 284
- 417
- 168
- 325
- 406
- 366
- 177
- 680
- 2016
- 680
- 515
- 536
- 513
- 499
- 854
- 515
- 388
- 587
- 661
- 338
- 380
- 2015
- 576
- 865
- 540
- 567
- 629
- 1363
- 1083
- 587
- 890
- 1344
- 497
- 618
- 2014
- 692
- 899
- 1041
- 885
- 681
- 540
- 1015
- 518
- 540
- 986
- 714
- 652
- 2013
- 931
- 1007
- 824
- 690
- 546
- 937
- 545
- 595
- 624
- 578
- 509
- 828
- 2012
- 1239
- 1367
- 1178
- 602
- 719
- 1107
- 891
- 774
- 953
- 681
- 879
- 697
- 2011
- 1789
- 2122
- 1029
- 802
- 962
- 1459
- 605
- 887
- 1148
- 802
- 976
- 993
- 2010
- 1136
- 1206
- 1305
- 1611
- 652
- 663
- 813
- 933
- 997
- 1339
- 1081
- 1476
- 2009
- 940
- 1254
- 552
- 1019
- 825
- 627
- 750
- 701
- 646
- 1105
- 884
- 956
- 2008
- 847
- 650
- 605
- 750
- 739
- 812
- 750
- 796
- 1027
- 536
- 628
- 716
- 2007
- 806
- 457
- 505
- 693
- 762
- 652
- 542
- 764
- 572
- 1022
- 355
- 299
- 2006
- 691
- 674
- 660
- 448
- 403
- 552
- 379
- 551
- 630
- 567
- 310
- 327
- 2005
- 824
- 619
- 915
- 1204
- 790
- 632
- 1075
- 1048
- 1085
- 1237
- 769
- 593
- 2004
- 852
- 1004
- 1182
- 891
- 785
- 1220
- 752
- 770
- 848
- 537
- 999
- 768
- 2003
- 1099
- 692
- 986
- 875
- 676
- 683
- 633
- 1529
- 1579
- 1527
- 757
- 675
- 2002
- 468
- 533
- 556
- 737
- 1171
- 979
- 1123
- 1097
- 815
- 714
- 735
- 575
- 2001
- 1088
- 949
- 1052
- 822
- 1145
- 1056
- 800
- 1150
- 1956
- 857
- 518
- 382
- 2000
- 468
- 684
- 338
- 498
- 539
- 617
- 716
- 497
- 634
- 323
- 651
- 550
- 1999
- 436
- 304
- 372
- 340
- 271
- 227
- 244
- 312
- 246
- 447
- 326
- 438
- 1998
- 404
- 633
- 431
- 576
- 862
- 796
- 285
- 629
- 754
- 1063
- 967
- 402
- 1997
- 720
- 507
- 576
- 486
- 796
- 613
- 1120
- 521
- 608
- 589
- 843
- 342
- 1996
- 364
- 213
- 275
- 496
- 290
- 233
- 349
- 333
- 903
- 1099
- 373
- 290
- 1995
- 94
- 74
- 191
- 267
- 171
- 25
- 150
- 253
- 251
- 210
- 391
- 140
- 1994
- –
- –
- –
- 161
- 44
- 59
- 33
- 49
- 116
- 84
- 54
- 52
Latest Posts
Weekly Global IPv4 Routing Table Report
Routing Table Analysis Role Account via NANOG (Sep 12)
This is an automated weekly mailing describing the state of the Global
IPv4 Routing Table as seen from APNIC's router in Japan.
The posting is sent to APOPS, NANOG, AfNOG, SANOG, PacNOG, SAFNOG
UKNOF, TZNOG, MENOG, BJNOG, SDNOG, CMNOG, LACNOG and the RIPE Routing WG.
Daily listings are sent to bgp-stats () lists apnic net.
For historical data, please see https://thyme.apnic.net.
If you have any comments please contact Philip Smith...
** Secure Your Spot at NANOG 95 Before Prices Rise + More
Nanog News via NANOG (Sep 12)
*** Secure Your Spot at NANOG 95 Before Prices Rise*
------------------------------------------------------------
*Lock in Your Spot at N95 Before Monday, Sept. 15*
🎟️ Ready to join your NANOG crew in Arlington? *Standard pricing wraps
Monday, Sept. 15 *— so don’t miss your chance to lock in.
From hallway conversations to inspiring peering collabs, NANOG 95 (Oct.
27–29) is where our community comes together to share ideas, sharpen...
Re: MD5 is too fast
Jay Acuna via NANOG (Sep 12)
See; The simple policy of: Routing protocol keys are to be created
using "pwgen 85" or at least "pwgen 38".
Never create a key by hand. This rule preferably applies to all
`passwords' sent over the network or keys which
secure a network protocol, even if encrypted transport is used, and
even if hashed.
A password with 80bits randomness or entropy (An ~11-character
properly generated random password)
contains 2^80 =...
RE: MD5 is too fast
nanog--- via NANOG (Sep 12)
[seems to have accidentally moved off list]
Passwords for TCP-MD5 and TCP-AO do not have to be remembered, and they are configured by experts who know they should
be random.
Re: Lexington Electric System blames internet outages on shotgun pellets
Christopher Morrow via NANOG (Sep 12)
I think at a long past Nanog meeting Vijay Gill had a slide that
showed a vendor provided image of 'reason for outage' - a .30-06 slug
stuck in the fiber... (or perhaps it was a .30 caliber hole through
the fiber?)
RE: MD5 is slow
Vasilenko Eduard via NANOG (Sep 12)
Hi Tom,
I do not want to discuss “why in 1st place” for 2 reasons:
1. It is not related to the previous discussion
2. I mostly agree with you: it is not a good idea to squeeze everything possible from something; the network is
becoming fragile after such an exercise (I have seen it many times).
But people are doing it! For my 30 years in networking, I have seen these “sub-second” discussions and other “IGP speed...
RE: MD5 is slow
Vasilenko Eduard via NANOG (Sep 11)
Let me do a little calculation here.
Imagine that we have access to one server with 8 cards "NVIDIA GeForce RTX 5090". Every respected black or white hacker
(including pintesters) has access to something similar.
Then we could do MD5 hash calculations (for one block) with the performance 1.72*10^12 hashes per second. I have
assumed Hashcat 7 that such people use extensively:...
Re: Lexington Electric System blames internet outages on shotgun pellets
jay--- via NANOG (Sep 11)
This is a very common problem in rural areas in California. Birds perch
on overhead wires and people shoot at the birds. It's been happening
since the twisted-pair days.
Lexington Electric System blames internet outages on shotgun pellets
Sean Donelan via NANOG (Sep 11)
Lexington Electric System's post
[...]
"With dove season in full swing, we ask all our customers to please be
mindful of their surroundings and avoid shooting doves on or near
fiber/electric lines."
https://www.facebook.com/LexingtonElectricSystem/posts/pfbid02sLbWAfYptUyMGiVNvGbyZNM25bVkd6kQjwizAEMLhgkpwVoxDuDSBkHZe9qmz6Shl
Re: KEA DHCPv6 HA - help with failover
Aaron Gould via NANOG (Sep 11)
Thanks Owen, will do!
-Aaron
Re: KEA DHCPv6 HA - help with failover
Aaron Gould via NANOG (Sep 11)
Thanks T.Marc, my server engineer coworkers said they are involved in
that KEA community, so I'll let them run with it. Appreciate it.
-Aaron
Re: KEA DHCPv6 HA - help with failover
T Marc Jones via NANOG (Sep 11)
Hello Aaron,
A good place to post your query is in the Kea Users mailing list.
There, a member of the Kea User community could comment and respond.
Please visit this link to join the mailing list:
https://lists.isc.org/mailman/listinfo/kea-users
Warmest regards,
Re: KEA DHCPv6 HA - help with failover
Owen DeLong via NANOG (Sep 11)
I have it operational in my environment. Feel free to reach out off list.
Owen
KEA DHCPv6 HA - help with failover
Aaron Gould via NANOG (Sep 11)
Anybody doing KEA DHCPv6 HA dual servers? We tested an outage scenario
of bringing down KEA service on one of the servers, but the other server
didn't seem to be able to service new DHCPv6 requests (or handle the
existing ones, that were previously given out by the now-downed server).
Re: MD5 is slow
Tom Beecher via NANOG (Sep 11)
I addressed this previously.
IS-IS and OSPF both have delays so that SPF isn't constantly running if a
given network is unstable. Take for example an IS-IS network on a Juniper.
By default :
- For a point to point interface, R1 transmits CSNPs every 5000ms.
- R2 receives CSNP, and updates its LSDB.
- LSDB change = topology change. R2 starts a 200ms timer before running
SPF.
- If additional CSNPs are received such that R2 runs SPF 3 times...
More Lists
Dozens of other network security lists are archived at SecLists.Org.