Test
Threads by month
- ----- 2025 -----
- January
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1999 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1998 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1997 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1996 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1995 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1994 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1993 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1992 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- 54012 discussions
=============================================================================
CA-94:01 CERT Advisory
February 3, 1994
Ongoing Network Monitoring Attacks
-----------------------------------------------------------------------------
In the past week, CERT has observed a dramatic increase in reports of
intruders monitoring network traffic. Systems of some service
providers have been compromised, and all systems that offer remote
access through rlogin, telnet, and FTP are at risk. Intruders have
already captured access information for tens of thousands of systems
across the Internet.
The current attacks involve a network monitoring tool that uses the
promiscuous mode of a specific network interface, /dev/nit, to capture
host and user authentication information on all newly opened FTP,
telnet, and rlogin sessions.
In the short-term, CERT recommends that all users on sites that offer
remote access change passwords on any network-accessed account. In
addition, all sites having systems that support the /dev/nit interface
should disable this feature if it is not used and attempt to prevent
unauthorized access if the feature is necessary. A procedure for
accomplishing this is described in Section III.B.2 below. Systems
known to support the interface are SunOS 4.x (Sun3 and Sun4
architectures) and Solbourne systems; there may be others. Sun Solaris
systems do not support the /dev/nit interface. If you have a system
other than Sun or Solbourne, contact your vendor to find if this
interface is supported.
While the current attack is specific to /dev/nit, the short-term
workaround does not constitute a solution. The best long-term
solution currently available for this attack is to reduce or eliminate
the transmission of reusable passwords in clear-text over the network.
-----------------------------------------------------------------------------
I. Description
Root-compromised systems that support a promiscuous network
interface are being used by intruders to collect host and user
authentication information visible on the network.
The intruders first penetrate a system and gain root access
through an unpatched vulnerability (solutions and workarounds for
these vulnerabilities have been described in previous CERT
advisories, which are available anonymous FTP from
info.cert.org)
The intruders then run a network monitoring tool that captures up
to the first 128 keystrokes of all newly opened FTP, telnet, and
rlogin sessions visible within the compromised system's domain.
These keystrokes usually contain host, account, and password
information for user accounts on other systems; the intruders log
these for later retrieval. The intruders typically install
Trojan horse programs to support subsequent access to the
compromised system and to hide their network monitoring process.
II. Impact
All connected network sites that use the network to access remote
systems are at risk from this attack.
All user account and password information derived from FTP,
telnet, and rlogin sessions and passing through the same network
as the compromised host could be disclosed.
III. Approach
There are three steps in CERT's recommended approach to the
problem:
- Detect if the network monitoring tool is running on any of your
hosts that support a promiscuous network interface.
- Protect against this attack either by disabling the network
interface for those systems that do not use this feature or by
attempting to prevent unauthorized use of the feature on systems
where this interface is necessary.
- Scope the extent of the attack and recover in the event that
the network monitoring tool is discovered.
A. Detection
The network monitoring tool can be run under a variety of
process names and log to a variety of filenames. Thus, the
best method for detecting the tool is to look for 1) Trojan
horse programs commonly used in conjunction with this attack,
2) any suspect processes running on the system, and 3) the
unauthorized use of /dev/nit.
1) Trojan horse programs:
The intruders have been found to replace one or more of the
following programs with a Trojan horse version in conjunction
with this attack:
/usr/etc/in.telnetd
and /bin/login - Used to provide back-door access for the
intruders to retrieve information
/bin/ps - Used to disguise the network monitoring process
Because the intruders install Trojan horse variations of
standard UNIX commands, CERT recommends not using other
commands such as the standard UNIX sum(1) or cmp(1) commands
to locate the Trojan horse programs on the system until these
programs can be restored from distribution media, run from
read-only media (such as a mounted CD-ROM), or verified using
cryptographic checksum information.
In addition to the possibility of having the checksum
programs replaced by the intruders, the Trojan horse programs
mentioned above may have been engineered to produce the same
standard checksum and timestamp as the legitimate version.
Because of this, the standard UNIX sum(1) command and the
timestamps associated with the programs are not sufficient to
determine whether the programs have been replaced.
CERT recommends that you use both the /usr/5bin/sum and
/bin/sum commands to compare against the distribution media
and assure that the programs have not been replaced. The use
of cmp(1), MD5, Tripwire (only if the baseline checksums were
created on a distribution system), and other cryptographic
checksum tools are also sufficient to detect these Trojan
horse programs, provided these programs were not available
for modification by the intruder. If the distribution is
available on CD-ROM or other read-only device, it may be
possible to compare against these volumes or run programs off
these media.
2) Suspect processes:
Although the name of the network monitoring tool can vary
from attack to attack, it is possible to detect a suspect
process running as root using ps(1) or other process-listing
commands. Until the ps(1) command has been verified against
distribution media, it should not be relied upon--a Trojan
horse version is being used by the intruders to hide the
monitoring process. Some process names that have been
observed are sendmail, es, and in.netd. The arguments to the
process also provide an indication of where the log file is
located. If the "-F" flag is set on the process, the
filename following indicates the location of the log file
used for the collection of authentication information for
later retrieval by the intruders.
3) Unauthorized use of /dev/nit:
If the network monitoring tool is currently running on your
system, it is possible to detect this by checking for
unauthorized use of the /dev/nit interface. CERT has created
a minimal tool for this purpose. The source code for this
tool is available via anonymous FTP on info.cert.org in the
/pub/tools/cpm directory or on ftp.uu.net in the
/pub/security/cpm directory as cpm.1.0.tar.Z. The checksum
information is:
Filename Standard UNIX Sum System V Sum
-------------- ----------------- ------------
cpm.1.0.tar.Z: 11097 6 24453 12
MD5 Checksum
MD5 (cpm.1.0.tar.Z) = e29d43f3a86e647f7ff2aa453329a155
This archive contains a readme file, also included as
Appendix C of this advisory, containing instructions on
installing and using this detection tool.
B. Prevention
There are two actions that are effective in preventing this
attack. A long-term solution requires eliminating
transmission of clear-text passwords on the network. For
this specific attack, however, a short-term workaround
exists. Both of these are described below.
1) Long-term prevention:
CERT recognizes that the only effective long-term solution to
prevent these attacks is by not transmitting reusable
clear-text passwords on the network. CERT has collected some
information on relevant technologies. This information is
included as Appendix B in this advisory. Note: These
solutions will not protect against transient or remote access
transmission of clear-text passwords through the network.
Until everyone connected to your network is using the above
technologies, your policy should allow only authorized users
and programs access to promiscuous network interfaces. The
tool described in Section III.A.3 above may be helpful in
verifying this restricted access.
2) Short-term workaround:
Regardless of whether the network monitoring software is
detected on your system, CERT recommends that ALL SITES take
action to prevent unauthorized network monitoring on their
systems. You can do this either by removing the interface, if
it is not used on the system or by attempting to prevent the
misuse of this interface.
For systems other than Sun and Solbourne, contact your vendor
to find out if promiscuous mode network access is supported
and, if so, what is the recommended method to disable or
monitor this feature.
For SunOS 4.x and Solbourne systems, the promiscuous
interface to the network can be eliminated by removing the
/dev/nit capability from the kernel. The procedure for doing
so is outlined below (see your system manuals for more
details). Once the procedure is complete, you may remove the
device file /dev/nit since it is no longer functional.
Procedure for removing /dev/nit from the kernel:
1. Become root on the system.
2. Apply "method 1" as outlined in the System and Network
Administration manual, in the section, "Sun System
Administration Procedures," Chapter 9, "Reconfiguring the
System Kernel." Excerpts from the method are reproduced
below:
# cd /usr/kvm/sys/sun[3,3x,4,4c]/conf
# cp CONFIG_FILE SYS_NAME
[Note that at this step, you should replace the CONFIG_FILE
with your system specific configuration file if one exists.]
# chmod +w SYS_NAME
# vi SYS_NAME
#
# The following are for streams NIT support. NIT is used by
# etherfind, traffic, rarpd, and ndbootd. As a rule of thumb,
# NIT is almost always needed on a server and almost never
# needed on a diskless client.
#
pseudo-device snit # streams NIT
pseudo-device pf # packet filter
pseudo-device nbuf # NIT buffering module
[Comment out the preceding three lines; save and exit the
editor before proceeding.]
# config SYS_NAME
# cd ../SYS_NAME
# make
# mv /vmunix /vmunix.old
# cp vmunix /vmunix
# /etc/halt
> b
[This step will reboot the system with the new kernel.]
[NOTE that even after the new kernel is installed, you need
to take care to ensure that the previous vmunix.old , or
other kernel, is not used to reboot the system.]
C. Scope and recovery
If you detect the network monitoring software at your site,
CERT recommends following three steps to successfully
determine the scope of the problem and to recover from this
attack.
1. Restore the system that was subjected to the network
monitoring software.
The systems on which the network monitoring and/or Trojan
horse programs are found have been compromised at the root
level; your system configuration may have been altered. See
Appendix A of this advisory for help with recovery.
2. Consider changing router, server, and privileged account
passwords due to the wide-spread nature of these attacks.
Since this threat involves monitoring remote connections,
take care to change these passwords using some mechanism
other than remote telnet, rlogin, or FTP access.
3. Urge users to change passwords on local and remote
accounts.
Users who access accounts using telnet, rlogin, or FTP either
to or from systems within the compromised domain should
change their passwords after the intruder's network monitor
has been disabled.
4. Notify remote sites connected from or through the local
domain of the network compromise.
Encourage the remote sites to check their systems for
unauthorized activity. Be aware that if your site routes
network traffic between external domains, both of these
domains may have been compromised by the network monitoring
software.
---------------------------------------------------------------------------
The CERT Coordination Center thanks the members of the FIRST community
as well as the many technical experts around the Internet who
participated in creating this advisory. Special thanks to Eugene
Spafford of Purdue University for his contributions.
---------------------------------------------------------------------------
If you believe that your system has been compromised, contact the CERT
Coordination Center or your representative in Forum of Incident
Response and Security Teams (FIRST).
Internet E-mail: cert(a)cert.org
Telephone: 412-268-7090 (24-hour hotline)
CERT personnel answer 8:30 a.m.-5:00 p.m. EST(GMT-5)/EDT(GMT-4),
and are on call for emergencies during other hours.
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh, PA 15213-3890
Past advisories, information about FIRST representatives, and other
information related to computer security are available for anonymous
FTP from info.cert.org.
---------------------------------------------------------------------------
Appendix A:
RECOVERING FROM A UNIX ROOT COMPROMISE
A. Immediate recovery technique
1) Disconnect from the network or operate the system in
single- user mode during the recovery. This will keep users
and intruders from accessing the system.
2) Verify system binaries and configuration files against the
vendor's media (do not rely on timestamp information to
provide an indication of modification). Do not trust any
verification tool such as cmp(1) located on the compromised
system as it, too, may have been modified by the intruder.
In addition, do not trust the results of the standard UNIX
sum(1) program as we have seen intruders modify system
files in such a way that the checksums remain the same.
Replace any modified files from the vendor's media, not
from backups.
-- or --
Reload your system from the vendor's media.
3) Search the system for new or modified setuid root files.
find / -user root -perm -4000 -print
If you are using NFS or AFS file systems, use ncheck to
search the local file systems.
ncheck -s /dev/sd0a
4) Change the password on all accounts.
5) Don't trust your backups for reloading any file used by
root. You do not want to re-introduce files altered by an
intruder.
B. Improving the security of your system
1) CERT Security Checklist
Using the checklist will help you identify security
weaknesses or modifications to your systems. The CERT
Security Checklist is based on information gained from
computer security incidents reported to CERT. It is
available via anonymous FTP from info.cert.org in the file
pub/tech_tips/security_info.
2) Security Tools
Use security tools such as COPS and Tripwire to check for
security configuration weaknesses and for modifications
made by intruders. We suggest storing these security
tools, their configuration files, and databases offline or
encrypted. TCP daemon wrapper programs provide additional
logging and access control. These tools are available via
anonymous FTP from info.cert.org in the pub/tools
directory.
3) CERT Advisories
Review past CERT advisories (both vendor-specific and
generic) and install all appropriate patches or workarounds
as described in the advisories. CERT advisories and other
security-related information are available via anonymous
FTP from info.cert.org in the pub/cert_advisories
directory.
To join the CERT Advisory mailing list, send a request to:
cert-advisory-request(a)cert.org
Please include contact information, including a telephone number.
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh, PA 15213-3890
Copyright (c) Carnegie Mellon University 1994
---------------------------------------------------------------------------
Appendix B:
ONE-TIME PASSWORDS
Given today's networked environments, CERT recommends that sites
concerned about the security and integrity of their systems and
networks consider moving away from standard, reusable passwords. CERT
has seen many incidents involving Trojan network programs (e.g.,
telnet and rlogin) and network packet sniffing programs. These
programs capture clear-text hostname, account name, password triplets.
Intruders can use the captured information for subsequent access to
those hosts and accounts. This is possible because 1) the password is
used over and over (hence the term "reusable"), and 2) the password
passes across the network in clear text.
Several authentication techniques have been developed that address
this problem. Among these techniques are challenge-response
technologies that provide passwords that are only used once (commonly
called one-time passwords). This document provides a list of sources
for products that provide this capability. The decision to use a
product is the responsibility of each organization, and each
organization should perform its own evaluation and selection.
I. Public Domain packages
S/KEY(TM)
The S/KEY package is publicly available (no fee) via
anonymous FTP from:
thumper.bellcore.com /pub/nmh directory
There are three subdirectories:
skey UNIX code and documents on S/KEY.
Includes the change needed to login,
and stand-alone commands (such as "key"),
that computes the one-time password for
the user, given the secret password and
the S/KEY command.
dos DOS or DOS/WINDOWS S/KEY programs. Includes
DOS version of "key" and "termkey" which is
a TSR program.
mac One-time password calculation utility for
the Mac.
II. Commercial Products
Secure Net Key (SNK) (Do-it-yourself project)
Digital Pathways, Inc.
201 Ravendale Dr.
Mountainview, Ca. 94043-5216
USA
Phone: 415-964-0707
Fax: (415) 961-7487
Products:
handheld authentication calculators (SNK004)
serial line auth interruptors (guardian)
Note: Secure Net Key (SNK) is des-based, and therefore restricted
from US export.
Secure ID (complete turnkey systems)
Security Dynamics
One Alewife Center
Cambridge, MA 02140-2312
USA
Phone: 617-547-7820
Fax: (617) 354-8836
Products:
SecurID changing number authentication card
ACE server software
SecureID is time-synchronized using a 'proprietary' number
generation algorithm
WatchWord and WatchWord II
Racal-Guardata
480 Spring Park Place
Herndon, VA 22070
703-471-0892
1-800-521-6261 ext 217
Products:
Watchword authentication calculator
Encrypting modems
Alpha-numeric keypad, digital signature capability
SafeWord
Enigma Logic, Inc.
2151 Salvio #301
Concord, CA 94520
510-827-5707
Fax: (510)827-2593
Products:
DES Silver card authentication calculator
SafeWord Multisync card authentication calculator
Available for UNIX, VMS, MVS, MS-DOS, Tandum, Stratus, as well as
other OS versions. Supports one-time passwords and super
smartcards from several vendors.
---------------------------------------------------------------------------
Appendix C:
cpm 1.0 README FILE
cpm - check for network interfaces in promiscuous mode.
Copyright (c) Carnegie Mellon University 1994
Thursday Feb 3 1994
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh, PA 15213-3890
This program is free software; you can distribute it and/or modify
it as long as you retain the Carnegie Mellon copyright statement.
It can be obtained via anonymous FTP from info.cert.org:pub/tools/cpm.tar.Z.
This program is distributed WITHOUT ANY WARRANTY; without the IMPLIED
WARRANTY of merchantability or fitness for a particular purpose.
This package contains:
README
MANIFEST
cpm.1
cpm.c
To create cpm under SunOS, type:
% cc -Bstatic -o cpm cpm.c
On machines that support dynamic loading, such as Sun's, CERT recommends
that programs be statically linked so that this feature is disabled.
CERT recommends that after you install cpm in your favorite directory,
you take measures to ensure the integrity of the program by noting
the size and checksums of the source code and resulting binary.
The following is an example of the output of cpm and its exit status.
Running cpm on a machine where both the le0 and le2 interfaces are
in promiscuous mode, under csh(1):
% cpm
le0
le2
% echo $status
2
%
Running cpm on a machine where no interfaces are in promiscuous
mode, under csh(1):
% cpm
% echo $status
0
%
1
0
Scott,
> I have asked the question many time. "What is a provider?". Once the
> CIDR allocation started the "Providers" came out of the woodworks.
> No one so far has given an answer to the question that the majority can
> agree with. I will not be at the regional tech meeting in CA but Mark will.
> I don't know a group better suited to answer the question that established
> providers. Do us a favor and come up with a proposed answer to "What is a
> provider". I will work with NSF and Postel to make it policy. This would
> make our life easier.
I think we have to be very careful here. When we make policy that
adversely affects someone's business interests we're just begging for
a suit. Especially with the *perceived* "shortage" or IPv4
addresses. It seems to me that it would be very difficult to exclude
anybody from the category of "provider" (for the purpose of giving
him or her addresses) who has even the flimsiest claim to being one.
Perhaps some sliding scale based on demonstrated need would work.
But it would have to be conservative (liberal?) and easily quantified
to make it defensible.
--Richard
3
3
The ANS NOC (formerly part of Merit) has been located on the North
Campus of the University of Michigan for many years now. Many of you,
have visited us at one time or another.
We have grown considerably in the past two years and the University
was not able to accomodate our growing space needs. So with mixed
feelings, we started looking for another suitable space in Ann Arbor.
I am pleased to report that on February 7, the ANS Network Operations
Center will be moving to our new location, where we have over 11,000
square feet of freshly renovated space.
Our new address will be:
Advanced Network & Services, Inc.
100 Phoenix Dr.
Ann Arbor, MI 48108-2202
Our 800 number will remain the same; 800-456-6300. The local NOC number,
however, will change to 313-677-7333. The new general number for ANS in
Ann Arbor will be 313-677-7300.
We will be staging the moving of the various NOC systems, equipment
and staff, so as to assure a smooth transistion and prevent any
service disruptions.
And you are all, of course, invited to see our new place...
Regards,
John
1
0
The following changes have been made to the NSFNET policy-based routing
database and will be installed on the backbone by 08:00 EST :
Total = */8 + */16 + */24 + Other
Configured Networks 23659 = 28 4353 19278 0
Added Networks 166 = 0 5 161 0
Deleted Networks 1 = 0 1 0 0
IP address Net name Country Priority:AS
---------- -------- ------- -----------
131.141/16 DRE-LAN2-B-141 C:CA 1:2493
135.131/16 NCRWIN13 C:US 1:2149 2:174
144.67/16 UNIONCARBIDE-0 C:US 1:1329
144.68/16 UNIONCARBIDE-1 C:US 1:1329
167.218/16 WISC-DILHR C:US 1:1225 2:267 3:266
192.21.10/24 FORMTEK C:US 1:204 2:1206
192.52.109/24 MICROWARE C:US 1:1323
192.92.40/24 INFOLAN-C20 C:US 1:2149 2:174
192.126.1/24 HTC-NMC-NET3 C:FI 1:701 2:1800
192.126.6/24 HTC-NET4 C:FI 1:701 2:1800
192.148.168/24 FORMTEK1 C:US 1:204 2:1206
192.148.169/24 FORMTEK2 C:US 1:204 2:1206
192.163.158/24 HTC-NET6 C:FI 1:701 2:1800
192.215.128/24 CERFNET-128 C:US 1:1740
192.215.129/24 CERFNET-129 C:US 1:1740
192.215.130/24 CERFNET-130 C:US 1:1740
192.215.131/24 CERFNET-131 C:US 1:1740
192.215.132/24 CERFNET-132 C:US 1:1740
192.215.133/24 CERFNET-133 C:US 1:1740
192.215.134/24 CERFNET-134 C:US 1:1740
192.215.135/24 CERFNET-135 C:US 1:1740
192.215.136/24 CERFNET-136 C:US 1:1740
192.215.137/24 CERFNET-137 C:US 1:1740
192.215.138/24 CERFNET-138 C:US 1:1740
192.215.139/24 CERFNET-139 C:US 1:1740
192.215.140/24 CERFNET-140 C:US 1:1740
192.215.141/24 CERFNET-141 C:US 1:1740
192.215.142/24 CERFNET-142 C:US 1:1740
192.215.143/24 CERFNET-143 C:US 1:1740
192.215.148/24 CERFNET-148 C:US 1:1740
192.215.150/24 CERFNET-150 C:US 1:1740
192.216.130/24 TANDEM-216-130 C:US 1:200 2:201
192.216.131/24 TANDEM-216-131 C:US 1:200 2:201
192.217.45/24 CICNET-C-217-45 C:US 1:1225 2:266 3:267
192.217.46/24 CICNET-C-217-46 C:US 1:1225 2:266 3:267
192.219.17/24 EICONMTL1 C:CA 1:2493
192.219.18/24 EICONMTL2 C:CA 1:2493
192.219.19/24 EICONMTL3 C:CA 1:2493
192.219.20/24 EICONMTL4 C:CA 1:2493
192.219.21/24 EICONMTL5 C:CA 1:2493
192.219.23/24 EICONMTL7 C:CA 1:2493
192.219.24/24 EICONMTL8 C:CA 1:2493
192.219.25/24 EICONMTL9 C:CA 1:2493
192.219.26/24 EICONMTL10 C:CA 1:2493
192.219.27/24 EICONMTL11 C:CA 1:2493
192.219.28/24 EICONMTL12 C:CA 1:2493
192.219.76/24 EICONMTL-C-219-76 C:CA 1:2493
192.219.77/24 EICONMTL-C-219-77 C:CA 1:2493
192.219.78/24 EICONMTL-C-219-78 C:CA 1:2493
192.219.79/24 EICONMTL-C-219-79 C:CA 1:2493
192.219.80/24 EICONMTL-C-219-80 C:CA 1:2493
192.219.81/24 EICONMTL-C-219-81 C:CA 1:2493
192.219.82/24 EICONMTL-C-219-82 C:CA 1:2493
192.219.83/24 EICONMTL-C-219-83 C:CA 1:2493
192.219.84/24 EICONMTL-C-219-84 C:CA 1:2493
192.219.85/24 EICONMTL-C-219-85 C:CA 1:2493
192.219.86/24 EICONMTL-C-219-86 C:CA 1:2493
192.219.87/24 EICONMTL-C-219-87 C:CA 1:2493
192.221.62/24 SURA-SUB-PRJ-C-221-62 C:US 1:86 2:279
192.221.63/24 SURA-SUB-PRJ-C-221-63 C:US 1:86 2:279
192.233.192/24 MTCS-C-233-192 C:US 1:560 2:701
192.233.193/24 MTCS-C-233-193 C:US 1:560 2:701
192.233.194/24 MTCS-C-233-194 C:US 1:560 2:701
192.233.195/24 MTCS-C-233-195 C:US 1:560 2:701
192.233.196/24 MTCS-C-233-196 C:US 1:560 2:701
192.233.197/24 MTCS-C-233-197 C:US 1:560 2:701
192.233.198/24 MTCS-C-233-198 C:US 1:560 2:701
192.233.199/24 MTCS-C-233-199 C:US 1:560 2:701
193.101.46/24 POP-MESSE C:DE 1:701 2:1800
193.140.28/24 19MAYIS-NET C:TR 1:1800 2:1240
193.141.226/24 FREINET C:DE 1:1324 2:1800 3:1240 4:1133
193.204.116/24 ROMA-SSN-C-204-116 C:IT 1:293 2:291
193.204.117/24 ROMA-SSN-C-204-117 C:IT 1:293 2:291
193.233.17/24 INASLAN C:RU 1:1800 2:1240
198.6.12/24 DATATEL2 C:US 1:701 2:702
198.6.13/24 SYNETICS-VA C:US 1:701 2:702
198.14.39/24 PLE-AF-MIL8 C:US 1:175 2:22
198.14.48/24 PLE-AF-MIL17 C:US 1:175 2:22
198.14.49/24 PLE-AF-MIL18 C:US 1:175 2:22
198.14.50/24 PLE-AF-MIL19 C:US 1:175 2:22
198.14.51/24 PLE-AF-MIL20 C:US 1:175 2:22
198.14.52/24 PLE-AF-MIL21 C:US 1:175 2:22
198.14.53/24 PLE-AF-MIL22 C:US 1:175 2:22
198.14.54/24 PLE-AF-MIL23 C:US 1:175 2:22
198.14.55/24 PLE-AF-MIL24 C:US 1:175 2:22
198.14.56/24 PLE-AF-MIL25 C:US 1:175 2:22
198.14.57/24 PLE-AF-MIL26 C:US 1:175 2:22
198.14.58/24 PLE-AF-MIL27 C:US 1:175 2:22
198.14.63/24 PLE-AF-MIL32 C:US 1:175 2:22
198.17.150/24 MWARE-STUDIO C:US 1:1323
198.17.151/24 MICROWARE2 C:US 1:1323
198.93.1/24 VVSYSTEMS1 C:US 1:200 2:201
198.97.207/24 DSMCNET C:US 1:19 2:568
198.102.177/24 ELCSCI2 C:US 1:1240 2:1800
198.102.178/24 ELCSCI3 C:US 1:1240 2:1800
198.102.180/24 ELCSCI5 C:US 1:1240 2:1800
198.102.181/24 ELCSCI6 C:US 1:1240 2:1800
198.102.182/24 ELCSCI7 C:US 1:1240 2:1800
198.102.183/24 ELCSCI8 C:US 1:1240 2:1800
198.108.50/24 SPORTS-NET C:US 1:237 2:233 3:266 4:267 5:1225
198.112.222/24 CSHLB C:US 1:560 2:701
198.132.37/24 GM-EDS-C-132-37 C:US 1:2149 2:174
199.4.138/24 PRODIGY-C-4-138 C:US 1:1324
199.5.128/24 REDI-NET C:US 1:1740
199.18.0/24 NOARNET-C-18-0 C:US 1:2149 2:174
199.18.1/24 NOARNET-C-18-1 C:US 1:2149 2:174
199.18.2/24 NOARNET-C-18-2 C:US 1:2149 2:174
199.18.3/24 NOARNET-C-18-3 C:US 1:2149 2:174
199.18.4/24 NOARNET-C-18-4 C:US 1:2149 2:174
199.18.5/24 NOARNET-C-18-5 C:US 1:2149 2:174
199.18.6/24 NOARNET-C-18-6 C:US 1:2149 2:174
199.18.7/24 NOARNET-C-18-7 C:US 1:2149 2:174
199.18.8/24 NOARNET-C-18-8 C:US 1:2149 2:174
199.97.11/24 PSINET-C-97-11 C:US 1:2149 2:174
199.105.0/24 CERF-0 C:US 1:1740
199.105.1/24 CERF-1 C:US 1:1740
199.105.2/24 CERF-2 C:US 1:1740
199.105.3/24 CERF-3 C:US 1:1740
199.105.4/24 CERF-4 C:US 1:1740
199.105.5/24 CERF-5 C:US 1:1740
199.105.6/24 CERF-6 C:US 1:1740
199.105.7/24 CERF-7 C:US 1:1740
199.105.8/24 CERF-8 C:US 1:1740
199.105.9/24 CERF-9 C:US 1:1740
199.105.10/24 CERF-10 C:US 1:1740
199.105.11/24 CERF-11 C:US 1:1740
199.105.12/24 CERF-12 C:US 1:1740
199.105.13/24 CERF-13 C:US 1:1740
199.105.14/24 CERF-14 C:US 1:1740
199.105.15/24 CERF-15 C:US 1:1740
202.25.224/24 JUEN-C-25-224 C:JP 1:1240 2:1800
202.25.225/24 JUEN-C-25-225 C:JP 1:1240 2:1800
202.25.226/24 JUEN-C-25-226 C:JP 1:1240 2:1800
202.25.227/24 JUEN-C-25-227 C:JP 1:1240 2:1800
202.25.228/24 JUEN-C-25-228 C:JP 1:1240 2:1800
202.25.229/24 JUEN-C-25-229 C:JP 1:1240 2:1800
202.25.230/24 JUEN-C-25-230 C:JP 1:1240 2:1800
202.25.231/24 JUEN-C-25-231 C:JP 1:1240 2:1800
202.25.232/24 JUEN-C-25-232 C:JP 1:1240 2:1800
202.25.233/24 JUEN-C-25-233 C:JP 1:1240 2:1800
202.25.234/24 JUEN-C-25-234 C:JP 1:1240 2:1800
202.25.235/24 JUEN-C-25-235 C:JP 1:1240 2:1800
202.25.236/24 JUEN-C-25-236 C:JP 1:1240 2:1800
202.25.237/24 JUEN-C-25-237 C:JP 1:1240 2:1800
202.25.238/24 JUEN-C-25-238 C:JP 1:1240 2:1800
202.25.239/24 JUEN-C-25-239 C:JP 1:1240 2:1800
202.26.160/24 PUKMT-NET-C-26-160 C:JP 1:1240 2:1800
202.26.161/24 PUKMT-NET-C-26-161 C:JP 1:1240 2:1800
202.26.162/24 PUKMT-NET-C-26-162 C:JP 1:1240 2:1800
202.26.163/24 PUKMT-NET-C-26-163 C:JP 1:1240 2:1800
202.26.164/24 PUKMT-NET-C-26-164 C:JP 1:1240 2:1800
202.26.165/24 PUKMT-NET-C-26-165 C:JP 1:1240 2:1800
202.26.166/24 PUKMT-NET-C-26-166 C:JP 1:1240 2:1800
202.26.167/24 PUKMT-NET-C-26-167 C:JP 1:1240 2:1800
202.26.168/24 PUKMT-NET-C-26-168 C:JP 1:1240 2:1800
202.26.169/24 PUKMT-NET-C-26-169 C:JP 1:1240 2:1800
202.26.170/24 PUKMT-NET-C-26-170 C:JP 1:1240 2:1800
202.26.171/24 PUKMT-NET-C-26-171 C:JP 1:1240 2:1800
202.26.172/24 PUKMT-NET-C-26-172 C:JP 1:1240 2:1800
202.26.173/24 PUKMT-NET-C-26-173 C:JP 1:1240 2:1800
202.26.174/24 PUKMT-NET-C-26-174 C:JP 1:1240 2:1800
202.26.175/24 PUKMT-NET-C-26-175 C:JP 1:1240 2:1800
202.26.224/24 ANCTNET-C-26-224 C:JP 1:1240 2:1800
202.26.225/24 ANCTNET-C-26-225 C:JP 1:1240 2:1800
202.26.226/24 ANCTNET-C-26-226 C:JP 1:1240 2:1800
202.26.227/24 ANCTNET-C-26-227 C:JP 1:1240 2:1800
Deletions:
--139.175/16 SEED-NET C:TW 1:97
Expanded listing, sorted by country, then by organization:
==========================================================
Canada
------
Department of National Defense (LFC), N/A, N/A, N/A, CANADA
1:2493 FONOROLA-EAST
----------
131.141/16 DRE-LAN2-B-141 (CA)
Eicon Technology, 2196 32nd avenue, Lachine, Montreal, Quebec, H8T 2H8,
CANADA
1:2493 FONOROLA-EAST
-------------
192.219.17/24 EICONMTL1 (CA)
192.219.18/24 EICONMTL2 (CA)
192.219.19/24 EICONMTL3 (CA)
192.219.20/24 EICONMTL4 (CA)
192.219.21/24 EICONMTL5 (CA)
192.219.23/24 EICONMTL7 (CA)
192.219.24/24 EICONMTL8 (CA)
192.219.25/24 EICONMTL9 (CA)
192.219.26/24 EICONMTL10 (CA)
192.219.27/24 EICONMTL11 (CA)
192.219.28/24 EICONMTL12 (CA)
192.219.76/24 EICONMTL-C-219-76 (CA)
192.219.77/24 EICONMTL-C-219-77 (CA)
192.219.78/24 EICONMTL-C-219-78 (CA)
192.219.79/24 EICONMTL-C-219-79 (CA)
192.219.80/24 EICONMTL-C-219-80 (CA)
192.219.81/24 EICONMTL-C-219-81 (CA)
192.219.82/24 EICONMTL-C-219-82 (CA)
192.219.83/24 EICONMTL-C-219-83 (CA)
192.219.84/24 EICONMTL-C-219-84 (CA)
192.219.85/24 EICONMTL-C-219-85 (CA)
192.219.86/24 EICONMTL-C-219-86 (CA)
192.219.87/24 EICONMTL-C-219-87 (CA)
Finland
-------
Helsinki Telephone Company, P.O.BOX 148, SF-00131 HELSINKI, FINLAND
1:701 Alternet
2:1800 ICM-Atlantic
------------
192.126.1/24 HTC-NMC-NET3 (FI)
192.126.6/24 HTC-NET4 (FI)
192.163.158/24 HTC-NET6 (FI)
Germany
-------
2i Distribution & Solution GmbH, Haierweg 20e, D-79114 Freiburg, GERMANY
1:1324 ANS New York City - DNSS 35
2:1800 ICM-Atlantic
3:1240 ICM-Pacific
4:1133 CERN/DANTE
--------------
193.141.226/24 FREINET (DE)
POP Hamburg GmbH, Wendestr. 308, D-20537 Hamburg, GERMANY
1:701 Alternet
2:1800 ICM-Atlantic
-------------
193.101.46/24 POP-MESSE (DE)
Italy
-----
Consorzio Roma Ricerhe, Salita S. Nicola da Tolentino 1-B, Roma, I-00187,
ITALY
1:293 Energy Science Network (FIX-East)
2:291 Energy Science Network (FIX-West)
--------------
193.204.116/24 ROMA-SSN-C-204-116 (IT)
193.204.117/24 ROMA-SSN-C-204-117 (IT)
Japan
-----
Asahikawa National College of Technology, Shunkodai 2-2, Asahikawa,
Hokkaido, 071, JAPAN
1:1240 ICM-Pacific
2:1800 ICM-Atlantic
-------------
202.26.224/24 ANCTNET-C-26-224 (JP)
202.26.225/24 ANCTNET-C-26-225 (JP)
202.26.226/24 ANCTNET-C-26-226 (JP)
202.26.227/24 ANCTNET-C-26-227 (JP)
Joetsu University of Education, Yamayashiki 1,Joetsu-shi,Niigata 943,
Joetsu-shi, Niigata, 943, JAPAN
1:1240 ICM-Pacific
2:1800 ICM-Atlantic
-------------
202.25.224/24 JUEN-C-25-224 (JP)
202.25.225/24 JUEN-C-25-225 (JP)
202.25.226/24 JUEN-C-25-226 (JP)
202.25.227/24 JUEN-C-25-227 (JP)
202.25.228/24 JUEN-C-25-228 (JP)
202.25.229/24 JUEN-C-25-229 (JP)
202.25.230/24 JUEN-C-25-230 (JP)
202.25.231/24 JUEN-C-25-231 (JP)
202.25.232/24 JUEN-C-25-232 (JP)
202.25.233/24 JUEN-C-25-233 (JP)
202.25.234/24 JUEN-C-25-234 (JP)
202.25.235/24 JUEN-C-25-235 (JP)
202.25.236/24 JUEN-C-25-236 (JP)
202.25.237/24 JUEN-C-25-237 (JP)
202.25.238/24 JUEN-C-25-238 (JP)
202.25.239/24 JUEN-C-25-239 (JP)
Prefectural University of Kumamoto, 2432-1, Mizuarai, Kengun-machi,
Kumamoto 862, Kengun-machi, Kumamoto,
862, JAPAN
1:1240 ICM-Pacific
2:1800 ICM-Atlantic
-------------
202.26.160/24 PUKMT-NET-C-26-160 (JP)
202.26.161/24 PUKMT-NET-C-26-161 (JP)
202.26.162/24 PUKMT-NET-C-26-162 (JP)
202.26.163/24 PUKMT-NET-C-26-163 (JP)
202.26.164/24 PUKMT-NET-C-26-164 (JP)
202.26.165/24 PUKMT-NET-C-26-165 (JP)
202.26.166/24 PUKMT-NET-C-26-166 (JP)
202.26.167/24 PUKMT-NET-C-26-167 (JP)
202.26.168/24 PUKMT-NET-C-26-168 (JP)
202.26.169/24 PUKMT-NET-C-26-169 (JP)
202.26.170/24 PUKMT-NET-C-26-170 (JP)
202.26.171/24 PUKMT-NET-C-26-171 (JP)
202.26.172/24 PUKMT-NET-C-26-172 (JP)
202.26.173/24 PUKMT-NET-C-26-173 (JP)
202.26.174/24 PUKMT-NET-C-26-174 (JP)
202.26.175/24 PUKMT-NET-C-26-175 (JP)
Russian Federation
------------------
Institute of Astronomy RAS, 48 Pyatnitskaya St., Moscow, 109017, RUSSIAN
FEDERATION
1:1800 ICM-Atlantic
2:1240 ICM-Pacific
-------------
193.233.17/24 INASLAN (RU)
Turkey
------
19 Mayis University, Kurupelit Kampusu, Kurupelit, Samsun, 55139, TURKEY
1:1800 ICM-Atlantic
2:1240 ICM-Pacific
-------------
193.140.28/24 19MAYIS-NET (TR)
United States
-------------
BP Chemicals Inc., 1600 West 135th Street, Gardena, CA 90249-2506, USA
1:1740 CERFnet
--------------
192.215.150/24 CERFNET-150 (US)
CICNet, Inc., 2901 Hubbard Ave, Ann Arbor, MI 48105, USA
1:1225 CICNET at Argonne Labs
2:266 CICNET at MERIT
3:267 CICNET at UIUC
-------------
192.217.45/24 CICNET-C-217-45 (US)
192.217.46/24 CICNET-C-217-46 (US)
Cincom Systems, Inc, 2300 Montana Ave, Cincinnati, OH 45211, USA
1:2149 PSINET-2
2:174 NYSERNet Regional Network / PSI
-----------
199.18.0/24 NOARNET-C-18-0 (US)
199.18.1/24 NOARNET-C-18-1 (US)
199.18.2/24 NOARNET-C-18-2 (US)
199.18.3/24 NOARNET-C-18-3 (US)
199.18.4/24 NOARNET-C-18-4 (US)
199.18.5/24 NOARNET-C-18-5 (US)
199.18.6/24 NOARNET-C-18-6 (US)
199.18.7/24 NOARNET-C-18-7 (US)
199.18.8/24 NOARNET-C-18-8 (US)
Cold Spring Harbor Laboratory, 111 Hart Street, Beverly, MA 01915, USA
1:560 NEARnet Regional Network
2:701 Alternet
--------------
198.112.222/24 CSHLB (US)
Datatel, Inc., 4375 Fair Lakes Court, Fairfax, VA 22033, USA
1:701 Alternet
2:702 Alternet
-----------
198.6.12/24 DATATEL2 (US)
Defense Systems Management College, Commandant, Fort Belvoir, VA 22060, USA
1:19 Milnet (FIX-East)
2:568 Milnet (FIX-West)
-------------
198.97.207/24 DSMCNET (US)
Electro Scientific Industries, 13900 NW Science Park Drive, Portland, OR
97229, USA
1:1240 ICM-Pacific
2:1800 ICM-Atlantic
--------------
198.102.177/24 ELCSCI2 (US)
198.102.178/24 ELCSCI3 (US)
198.102.180/24 ELCSCI5 (US)
198.102.181/24 ELCSCI6 (US)
198.102.182/24 ELCSCI7 (US)
198.102.183/24 ELCSCI8 (US)
Electronic Data Systems (EDS), 120 West Passaic Street, Rochelle Park, NJ
07662, USA
1:2149 PSINET-2
2:174 NYSERNet Regional Network / PSI
-------------
198.132.37/24 GM-EDS-C-132-37 (US)
Formtek, Inc, 661 Anderson Drive, Pittsburgh, PA 15220, USA
1:204 PSCNET Regional Network
2:1206 PSCNET Regional Network
------------
192.21.10/24 FORMTEK (US)
192.148.168/24 FORMTEK1 (US)
192.148.169/24 FORMTEK2 (US)
INFONET, 2100 E. Grand Avenue, El Segundo, CA 90245, USA
1:2149 PSINET-2
2:174 NYSERNet Regional Network / PSI
------------
192.92.40/24 INFOLAN-C20 (US)
Maine Technical College System, 323 State Street, Augusta, ME 04330, USA
1:560 NEARnet Regional Network
2:701 Alternet
--------------
192.233.192/24 MTCS-C-233-192 (US)
192.233.193/24 MTCS-C-233-193 (US)
192.233.194/24 MTCS-C-233-194 (US)
192.233.195/24 MTCS-C-233-195 (US)
192.233.196/24 MTCS-C-233-196 (US)
192.233.197/24 MTCS-C-233-197 (US)
192.233.198/24 MTCS-C-233-198 (US)
192.233.199/24 MTCS-C-233-199 (US)
Michael Newton, 601 Bloomfield St, Apt #2, Hoboken, NJ 07030-4219, USA
1:2149 PSINET-2
2:174 NYSERNet Regional Network / PSI
------------
199.97.11/24 PSINET-C-97-11 (US)
Microware, 1900 NW 114th St., Des Moines, IA 50325-7077, USA
1:1323 ANS Chicago - DNSS 27
-------------
192.52.109/24 MICROWARE (US)
198.17.150/24 MWARE-STUDIO (US)
198.17.151/24 MICROWARE2 (US)
NCR, 1700 S. Patterson Blvd, Dayton, OH 45479, USA
1:2149 PSINET-2
2:174 NYSERNet Regional Network / PSI
----------
135.131/16 NCRWIN13 (US)
National University, 4141 Camino Del Rio South, San Diego, CA 92108, USA
1:1740 CERFnet
--------------
192.215.128/24 CERFNET-128 (US)
192.215.129/24 CERFNET-129 (US)
192.215.130/24 CERFNET-130 (US)
192.215.131/24 CERFNET-131 (US)
192.215.132/24 CERFNET-132 (US)
192.215.133/24 CERFNET-133 (US)
192.215.134/24 CERFNET-134 (US)
192.215.135/24 CERFNET-135 (US)
192.215.136/24 CERFNET-136 (US)
192.215.137/24 CERFNET-137 (US)
192.215.138/24 CERFNET-138 (US)
192.215.139/24 CERFNET-139 (US)
192.215.140/24 CERFNET-140 (US)
192.215.141/24 CERFNET-141 (US)
192.215.142/24 CERFNET-142 (US)
192.215.143/24 CERFNET-143 (US)
OL-AC PL/SC, BLDG 8352 RM 141, EDWARDS AFB, CA 93523, USA
1:175 AFWL-AS (Air Force Weapons Laboratory)
2:22 NOSC (Naval Ocean Systems Center)
------------
198.14.39/24 PLE-AF-MIL8 (US)
198.14.48/24 PLE-AF-MIL17 (US)
198.14.49/24 PLE-AF-MIL18 (US)
198.14.50/24 PLE-AF-MIL19 (US)
198.14.51/24 PLE-AF-MIL20 (US)
198.14.52/24 PLE-AF-MIL21 (US)
198.14.53/24 PLE-AF-MIL22 (US)
198.14.54/24 PLE-AF-MIL23 (US)
198.14.55/24 PLE-AF-MIL24 (US)
198.14.56/24 PLE-AF-MIL25 (US)
198.14.57/24 PLE-AF-MIL26 (US)
198.14.58/24 PLE-AF-MIL27 (US)
198.14.63/24 PLE-AF-MIL32 (US)
Pick Systems, 1691 Browning, Irvine, CA 92714, USA
1:1740 CERFnet
--------------
192.215.148/24 CERFNET-148 (US)
Prodigy Service Company, 445 Hamilton Ave., White Plains, NY 10601, USA
1:1324 ANS New York City - DNSS 35
------------
199.4.138/24 PRODIGY-C-4-138 (US)
Reliable Distributed Information Corp., 2500 E. Foothill Blvd., Suite 509,
Pasadena, CA 91107, USA
1:1740 CERFnet
------------
199.5.128/24 REDI-NET (US)
SURAnet, 8400 Baltimore Blvd., College Park, MD 20740, USA
1:86 SURANET Regional Network (College Park)
2:279 SURANET Regional Network (Georgia Tech)
-------------
192.221.62/24 SURA-SUB-PRJ-C-221-62 (US)
192.221.63/24 SURA-SUB-PRJ-C-221-63 (US)
Sports Markets, Inc, 611 Church St., Ann Arbor, MI 48104, USA
1:237 MichNet (MERIT)
2:233 UMnet (University of Michigan)
3:266 CICNET at MERIT
4:267 CICNET at UIUC
5:1225 CICNET at Argonne Labs
-------------
198.108.50/24 SPORTS-NET (US)
State of Wisconsin - DILHR, 201 E. Washington Avenue, Room 444, Madison, WI
53702, USA
1:1225 CICNET at Argonne Labs
2:267 CICNET at UIUC
3:266 CICNET at MERIT
----------
167.218/16 WISC-DILHR (US)
Synetics, 540 Edgewater Drive, Wakefield, MA 01880, USA
1:701 Alternet
2:702 Alternet
-----------
198.6.13/24 SYNETICS-VA (US)
Tandem Computers, Inc., 10435 N. Tantau, Cupertino, CA 95014-0727, USA
1:200 BARRNet
2:201 BARRNet
--------------
192.216.130/24 TANDEM-216-130 (US)
192.216.131/24 TANDEM-216-131 (US)
Union Carbide Corporation, Telecommunications Planning - G3, 39 Old
Ridgebury Road, Danbury, CT 06817, USA
1:1329 ANS Greensboro - DNSS 75
---------
144.67/16 UNIONCARBIDE-0 (US)
144.68/16 UNIONCARBIDE-1 (US)
University California San Diego, UCSD C-024, La Jolla, CA 92093-0124, USA
1:1740 CERFnet
------------
199.105.0/24 CERF-0 (US)
199.105.1/24 CERF-1 (US)
199.105.2/24 CERF-2 (US)
199.105.3/24 CERF-3 (US)
199.105.4/24 CERF-4 (US)
199.105.5/24 CERF-5 (US)
199.105.6/24 CERF-6 (US)
199.105.7/24 CERF-7 (US)
199.105.8/24 CERF-8 (US)
199.105.9/24 CERF-9 (US)
199.105.10/24 CERF-10 (US)
199.105.11/24 CERF-11 (US)
199.105.12/24 CERF-12 (US)
199.105.13/24 CERF-13 (US)
199.105.14/24 CERF-14 (US)
199.105.15/24 CERF-15 (US)
V & V Systems, 300 Montgomery Street, 2nd Fl, San Francisco, CA 94104, USA
1:200 BARRNet
2:201 BARRNet
-----------
198.93.1/24 VVSYSTEMS1 (US)
==========================================================
The configuration reports which reflect today's update will be
available for anonymous ftp on nic.merit.edu by 08:00 EST :
configuration reports --
nic.merit.edu:nsfnet/announced.networks:
as-as.now as-gw.now ans_core.now country.now net-comp.now
nets.doc nets.tag.now nets.unl.now
NSS routing software configuration files --
nic.merit.edu:nsfnet/backbone.configuration:
nss<NSS number>.t3p
Information is also avaiable through the PRDB whois server. Type
"whois -h prdb.merit.edu help" for details.
--------------------------------------------------------------------------
Please send all requests for configuration changes to nsfnet-admin(a)merit.edu
using the NSFNET configuration forms. The forms are available on-line
from the nic.merit.edu machine. Use ftp and the anonymous login to get on the
machine. Do a "cd nsfnet/announced.networks" and get the files template.net,
template.net.README, template.gate, and template.as.
In order to more efficiently process your requests, we have moved to a
system which requires the use of template.net (NACR) version 7.0
*******************************
--Steve Widmayer Merit/NSFNET skw(a)merit.edu
--Enke Chen Merit/NSFNET enke(a)merit.edu
--Steven J. Richardson Merit/NSFNET sjr(a)merit.edu
1
0
Hans-Werner,
>1. I am forced to assume that CIX membership does not connect me to
>the NSF backbone therefore I am missing half of the Internet! If
>this is true, how do I connect to the other half?
CIX membership provides exactly that; connectivity to CIX members.
ANS is a CIX member but the CIX rules (as they have been explained
to me) prohibit one service provider from acting as transit between
the CIX membership and other service providers (non-CIX members).
So if NSFNET regionals are not CIX members, the CIX filters traffic
with those non-members.
The only solution is to talk to service providers which will redistribute
the NSFNET routes and try to make a deal (if your customers agree to
only send traffic which is AUP compliant to the NSFNET service.)
>2. With CIDR and Number aggregation, we are expected to provide our
>customer networks a number range from our larger range. However, we
>cannot get a number range from INTERNIC. They expect us to get ours
>from "our supplier". Is this CIX? Or do you have to contract with a
>"supplier" who has NSF Backbone connections to get a IP number range?
> I guess I thought that we would be a supplier!
It was my understanding that you have to define yourself as a supplier
and let the Internic know your status.
> What am I missing?
>Dave Nordlund nordlund(a)ukanvm.cc.ukans.edu
>University of Kansas 913/864-0450
>Computing Services FAX 913/864-0485
>Lawrence, KS 66045
I am not on the com-priv list but perhaps someone on the regional-techs
list has more information concerning these questions.
--Elise
2
1
Forwarded message:
>From daemon Sun Jan 30 13:43:45 1994
Date: Sun, 30 Jan 1994 15:38:40 CST-600
From: Dave Nordlund <NORDLUND(a)ccstaff.cc.ukans.edu>
Subject: Confusion
To: com-priv(a)psi.com
Message-Id: <517D84AF8(a)ccstaff.cc.ukans.edu>
X-Mailer: PMail v3.0 (R1a)
Content-Transfer-Encoding: 7BIT
Priority: normal
Folks
I am working with a company to form a network to resell Internet
access. Years of experience with the existing NSF based Internet
does not prepare me for the present confusion I see in the
commercial Internet world.
1. I am forced to assume that CIX membership does not connect me to
the NSF backbone therefore I am missing half of the Internet! If
this is true, how do I connect to the other half?
2. With CIDR and Number aggregation, we are expected to provide our
customer networks a number range from our larger range. However, we
cannot get a number range from INTERNIC. They expect us to get ours
from "our supplier". Is this CIX? Or do you have to contract with a
"supplier" who has NSF Backbone connections to get a IP number range?
I guess I thought that we would be a supplier!
What am I missing?
Dave Nordlund nordlund(a)ukanvm.cc.ukans.edu
University of Kansas 913/864-0450
Computing Services FAX 913/864-0485
Lawrence, KS 66045
4
3
Folks,
Appended is a proposal on address allocation for private
internets. It was drafted by myself and Bob Moskowitz (Chrysler Corp.).
Yakov & Bob.
P.S. The proposal incorporates comments that we received from
several people. The Acknowledgement section will be added to reflect
their contributions.
--------------------------------cut here--------------------------------
Address Allocation for Private Internets
Hosts within sites that use IP can be partitioned into
three categories:
- hosts that do not require Internet access
- hosts that need access to a limited set of Internet
services (e.g. E-mail, FTP, netnews, remote login) which
can be handled by application layer relays
- hosts that need unlimited access (provided via IP
connectivity) to the Internet
Hosts within the first category may use IP addresses that are
unambiguous within a site, but may be ambiguous within the Internet.
For many hosts in the second category an unrestricted Internet
access (provided via IP connectivity) may be more than just
unnecessary -- it may be undesirable for privacy/security reasons.
Just like hosts within the first category, such hosts may use IP
addresses that are unambiguous within a site, but may be ambiguous
within the Internet.
Only hosts in the last category require IP addresses that are
unambiguous within the Internet.
It is common for organizations to build private internets which
have little or no hosts falling into the third category. Even if an
organization has a mixed category of hosts, in many cases within
the organization hosts in the first and the second category are
interconnected in such a way as to disable their IP level
connectivity to the Internet, and hosts in the third category
are segregated into a separate segment(s) of topology (separate
Link Layer subnetwork). Only these segments need to have IP level
connectivity to the Internet. Even if the hosts in the third category
are not segregated into a separate physical segment of topology,
such hosts can be segregated on a common (with the hosts in the first or
the second category) physical segment of topology by assigning two
distinct subnetwork numbers to the segment.
To conserve IP network address space utilization for the public
Internet, hosts within private internets that fall into the
first or the second category may take their addresses out of
the specific IP address block to be used exclusively by such
hosts.
The size of the block is expected to be sufficient to accommodate
most or all of the practical situations. The reserved block consists
of three sub-blocks: a single Class A network number (X), 8 contiguous
Class B network numbers (from Y to Z), and 255 contiguous Class C
network number (from W to V).
For sites with fewer than 1,000 hosts we suggest to use addresses
out of the sub-block of Class C network numbers. For sites with more
than 10,000 hosts we suggest to use addresses out of the Class A
network number. For all other sites we suggest to use addresses out of
the sub-block of Class B network numbers. Of course, it is also possible
for a site to use addresses out of more than one sub-block
(using a mix of Class A, B, and C network numbers)
An organization that uses addresses out of the pool allocated
for private networks can be more liberal in terms of address
space utilization, as compared to the address space utilization
of the Internet-visible address space. Thus, rather than using
variable-length subnettting, a site may use fixed-length subnetting.
In many cases use of Class C network numbers may be helpful to avoid
dealing with IP subnetting altogether.
The reserved IP address block will not be routed in the Internet.
Routers in the Internet are expected to be configured to
reject (filter out) Network Layer Reachability Information
associated with the destinations identified by the address block.
If a router receives such information the rejection shall not
be treated as a routing protocol error.
Since within a single internet IP addresses have to be
unambigous, assigning IP addresses out of the block allocated
for private internets has the following implications:
- when a host that is taken its IP address from the block moves
from the first or the second category into the third one,
the host has to change its IP address.
- if several previously unconnected sites (several private internets)
that have hosts numbered out of the block decide to interconnect
(merge their internets into a single internet), this may
require changing addresses of the hosts.
Since the IP addresses within the block will not be routed in
the Internet, a host that takes its IP address from the
block will be unreachable (at the network layer) from any host
in the Internet. That offers additional firewall protection.
With the proposed scheme many large corporate sites can use a
relatively small block of addresses from the global IP address space.
That would benefit the Internet by conserving the use of IP
address space.
1
0
Since the issue of NANOG is going to be discussed at the regional-techs
meeting I thought it would be useful to have the EEPG ToR. After I
dug it out I thought I'd pass it along. I believe this was the initial
draft that Bernard published; I'm not sure if it's been updated (it's the
only one I could find on ftp.ripe.net)
--Richard
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
TERMS OF REFERENCE
FOR
EUROPEAN ENGINEERING AND PLANNING GROUP (EEPG)
Bernhard Stockman
December 27, 1993
The European Engineering and Planning Group is the platform for the
engineering and deployment planning of the European part of the
Internet. The Internet shall here be seen in a broader sense not
just networks based on the TCP/IP protocol suite. EEPG will be
active in the area of operational planning and engineering among
various network service providers. EEPG will work in close liaison
with the Intercontinental Enginering and Planning Group (IEPG) and
bring attention to IEPG key activities as relevant within the
European networking environment. EEPG can thus be seen as the
European branch of the IEPG and European participation in the IEPG
will be drawn from EEPG. EEPG is open for anyone but is mainly
intended for operational planning and engineering among network
service providers.
RIPE, being the organization for coordination of European network
services, is the adequate framework for the EEPG. EEPG will thus
have the form of a RIPE Working Group and meet in conjunction with
general RIPE meetings, currently three times a year.
With the recent development and growth of the global network
environment and the foreseen problems in maintaining an ubiquitous
and homogeneous global network infrastructure the EEPG sees as its
role to to identify and prioritize key activities of a technical
nature which have a direct impact on the European and worldwide
networking environment. For this reason EEPG will:
- propose solutions for an optimized interconnectivity
infrastrucutre among European network service providers with the
ambition of securing maximal connectivity and flexibility in terms
of engineering and management. With the increasing number of
international network service providers, the maintenance and
improvement of pan-European and global connectivity is an obvious
challenge.
- propose coordinated deployment of basic distributed network
applications. The overall future of the global networking
infrastructure is dependent on our common ability to evolve the
collection of basic applications in the direction of enhanced
quality and reliability of services.
- propose practices and methods for efficient fault isolation and
recovery as well as coordinated information dissemination in the
area of network management. The focus here is to advocate the
necessity of basic common operational methodologies and procedures
within each network provider's operational domain to ensure that
the user community can be serviced with a seamless end to end
capability with appropriate mechanisms to ensure overall quality
and reliability of the offered service. This area explicitly
includes Network Information Center (NIC) and Network Operations
Center (NOC) interaction.
An EEPG work-plan will be maintained describing current areas of
interest and priorities. The work-plan will from time to time be
updated and documented to reflect changes of focus.
3
2
28 Jan '94
The following changes have been made to the NSFNET policy-based routing
database and will be installed on the backbone by 08:00 EST :
Total = */8 + */16 + */24 + Other
Configured Networks 23494 = 28 4349 19117 0
Added Networks 162 = 0 9 153 0
Deleted Networks 0 = 0 0 0 0
IP address Net name Country Priority:AS
---------- -------- ------- -----------
135.137/16 NCRWIN13 C:US 1:2149 2:174
143.254/16 SJUSDNET C:US 1:2150 2:200 3:201
149.201/16 FHAC-LAN C:DE 1:293 2:291
161.129/16 MONEURO C:BE 1:93
161.149/16 CITYOFLA C:US 1:1740
164.144/16 MONLAN C:US 1:93
164.154/16 SD-NET C:US 1:93
165.110/16 SBAWAN C:US 1:701 2:702
166.98/16 OV C:US 1:1740
192.12.133/24 LLNL-TUE C:US 1:291 2:293 3:200 4:201
192.47.46/24 ANCTNET C:JP 1:1240 2:1800
192.133.5/24 NAPCNET C:US 1:19 2:568
192.204.156/24 ANSP-3 C:US 1:204 2:1206
192.204.157/24 ANSP-4 C:US 1:204 2:1206
192.207.127/24 OUTPOST C:US 1:560 2:701
192.216.3/24 NETAFFYMAX3 C:US 1:200 2:201
192.217.33/24 KASKASKIA C:US 1:1225 2:266 3:267
193.32.50/24 UKSECTOR-C-32-50 C:GB 1:701 2:1800
193.32.51/24 UKSECTOR-C-32-51 C:GB 1:701 2:1800
193.32.52/24 UKSECTOR-C-32-52 C:GB 1:701 2:1800
193.32.53/24 UKSECTOR-C-32-53 C:GB 1:701 2:1800
193.32.54/24 UKSECTOR-C-32-54 C:GB 1:701 2:1800
193.32.55/24 UKSECTOR-C-32-55 C:GB 1:701 2:1800
193.32.56/24 UKSECTOR-C-32-56 C:GB 1:701 2:1800
193.32.57/24 UKSECTOR-C-32-57 C:GB 1:701 2:1800
193.32.58/24 UKSECTOR-C-32-58 C:GB 1:701 2:1800
193.32.59/24 UKSECTOR-C-32-59 C:GB 1:701 2:1800
193.32.60/24 UKSECTOR-C-32-60 C:GB 1:701 2:1800
193.32.61/24 UKSECTOR-C-32-61 C:GB 1:701 2:1800
193.32.62/24 UKSECTOR-C-32-62 C:GB 1:701 2:1800
193.32.63/24 UKSECTOR-C-32-63 C:GB 1:701 2:1800
193.32.64/24 UKSECTOR-C-32-64 C:GB 1:701 2:1800
193.32.65/24 UKSECTOR-C-32-65 C:GB 1:701 2:1800
193.32.66/24 UKSECTOR-C-32-66 C:GB 1:701 2:1800
193.32.67/24 UKSECTOR-C-32-67 C:GB 1:701 2:1800
193.32.68/24 UKSECTOR-C-32-68 C:GB 1:701 2:1800
193.32.69/24 UKSECTOR-C-32-69 C:GB 1:701 2:1800
193.32.70/24 UKSECTOR-C-32-70 C:GB 1:701 2:1800
193.32.71/24 UKSECTOR-C-32-71 C:GB 1:701 2:1800
193.32.72/24 UKSECTOR-C-32-72 C:GB 1:701 2:1800
193.32.73/24 UKSECTOR-C-32-73 C:GB 1:701 2:1800
193.32.74/24 UKSECTOR-C-32-74 C:GB 1:701 2:1800
193.32.75/24 UKSECTOR-C-32-75 C:GB 1:701 2:1800
193.32.76/24 UKSECTOR-C-32-76 C:GB 1:701 2:1800
193.32.77/24 UKSECTOR-C-32-77 C:GB 1:701 2:1800
193.32.78/24 UKSECTOR-C-32-78 C:GB 1:701 2:1800
193.32.79/24 UKSECTOR-C-32-79 C:GB 1:701 2:1800
193.32.80/24 UKSECTOR-C-32-80 C:GB 1:701 2:1800
193.32.81/24 UKSECTOR-C-32-81 C:GB 1:701 2:1800
193.40.110/24 FOREX-NET C:EE 1:1800 2:1879 3:1133 4:1240
193.40.122/24 FOREX2-NET C:EE 1:1800 2:1879 3:1133 4:1240
193.101.11/24 INFODATA C:DE 1:701 2:1800
193.101.22/24 DIGI-NET C:DE 1:701 2:1800
193.104.224/24 FR-EUTELSAT1 C:FR 1:701 2:1800
193.115.32/24 LCD-C-115-32 C:GB 1:701 2:1800
193.115.33/24 LCD-C-115-33 C:GB 1:701 2:1800
193.115.34/24 LCD-C-115-34 C:GB 1:701 2:1800
193.115.35/24 LCD-C-115-35 C:GB 1:701 2:1800
193.141.106/24 DINOCO-NET C:DE 1:1324 4:1133
194.13.0/24 HENKNET C:NL 1:1800 2:1133 3:1674 4:1240
198.5.222/24 EXPLORE-NET C:US 1:701 2:702
198.5.223/24 MCSP-NET C:US 1:701 2:702
198.31.126/24 BARRNET-C-31-126 C:US 1:200 2:201
198.31.127/24 BARRNET-C-31-127 C:US 1:200 2:201
198.36.16/24 SCSDNET16 C:US 1:2149 2:174
198.51.77/24 PSYCHO-C-51-77 C:US 1:1740
198.51.78/24 PSYCHO-C-51-78 C:US 1:1740
198.51.79/24 PSYCHO-C-51-79 C:US 1:1740
198.51.80/24 PSYCHO-C-51-80 C:US 1:1740
198.51.81/24 PSYCHO-C-51-81 C:US 1:1740
198.78.184/24 TDEC C:US 1:279 2:86
198.80.31/24 ANS-C-80-31 C:US 1:1333
198.80.36/24 ANS-C-80-36 C:US 1:1327
198.80.56/24 RIAPUB-NET1 C:US 1:1324
198.86.40/24 UNC-OUTR C:US 1:81
198.87.15/24 CICNET-C-87-15 C:US 1:266 2:267 3:1225
198.94.36/24 CHABOT5 C:US 1:200 2:201
198.97.80/24 NWOCUNCLS C:US 1:19 2:568
198.112.202/24 ALPINECSI-1 C:US 1:560
198.114.152/24 FOLGER C:US 1:560 2:701
198.114.224/24 IDEA-C-114-224 C:US 1:560 2:701
198.114.225/24 IDEA-C-114-225 C:US 1:560 2:701
198.114.226/24 IDEA-C-114-226 C:US 1:560 2:701
198.114.227/24 IDEA-C-114-227 C:US 1:560 2:701
198.114.229/24 SEABEAM-C-114-229 C:US 1:560 2:701
198.114.230/24 SEABEAM-C-114-230 C:US 1:560 2:701
198.114.231/24 SEABEAM-C-114-231 C:US 1:560 2:701
198.114.232/24 VPHARM-2 C:US 1:560 2:701
198.138.182/24 BELL-ATL-MDN1 C:US 1:97
198.138.183/24 BELL-ATL-MDN2 C:US 1:97
198.145.84/24 WDN-C-145-84 C:US 1:1240 2:1800
198.151.210/24 MBSA C:US 1:1240 2:1800
198.161.23/24 NOFC1-NET C:CA 1:602 2:601 3:603
198.166.11/24 WCB-GOV-NS-CA C:CA 1:603 2:601 3:602
198.177.182/24 WRH C:US 1:210 2:209
198.178.132/24 IWU C:US 1:1225 2:267 3:266
198.186.155/24 PSYCHO-C-186-155 C:US 1:1740
198.186.156/24 PSYCHO-C-186-156 C:US 1:1740
198.186.157/24 PSYCHO-C-186-157 C:US 1:1740
198.186.158/24 PSYCHO-C-186-158 C:US 1:1740
198.186.159/24 PSYCHO-C-186-159 C:US 1:1740
198.202.177/24 SOLNET C:US 1:1329
198.202.182/24 SOLTECH C:US 1:1329
198.206.130/24 CYBER-C-206-130 C:US 1:1333
198.206.131/24 CYBER-C-206-131 C:US 1:1333
198.207.193/24 LIIINET C:US 1:1800 2:1240
198.242.215/24 PSINET-C-242-215 C:US 1:2149 2:174
198.243.42/24 CELLULAR-NET C:US 1:209 2:210
198.252.182/24 ZILKERNET C:US 1:2149 2:174
199.0.128/24 STERLINGSOFT C:US 1:1800 2:1240
199.0.129/24 STERLINGSOFT129 C:US 1:1800 2:1240
199.0.130/24 STERLINGSOFT130 C:US 1:1800 2:1240
199.0.131/24 STERLINGSOFT131 C:US 1:1800 2:1240
199.0.132/24 NPR-C-0-132 C:US 1:1800 2:1240
199.0.133/24 NPR-C-0-133 C:US 1:1800 2:1240
199.0.134/24 NPR-C-0-134 C:US 1:1800 2:1240
199.0.135/24 NPR-C-0-135 C:US 1:1800 2:1240
199.0.137/24 SPRINT-C-0-137 C:US 1:1800 2:1240
199.2.24/24 TVIM-DOM C:US 1:1240 2:1800
199.2.61/24 DIS-C-2-61 C:US 1:1240 2:1800
199.2.62/24 DIS-C-2-62 C:US 1:1240 2:1800
199.2.63/24 DIS-C-2-63 C:US 1:1240 2:1800
199.2.64/24 DIS-C-2-64 C:US 1:1240 2:1800
199.10.144/24 LUCE-NADN C:US 1:19 2:568
199.22.0/24 HYDRO-QUEBEC-C-22-0 C:CA 1:603 2:601 3:602
199.22.2/24 HYDRO-QUEBEC-C-22-2 C:CA 1:603 2:601 3:602
199.33.229/24 BOARDWATCH-US C:US 1:1332
199.34.46/24 DIGEX-C-34-46 C:US 1:2548
199.34.47/24 DIGEX-C-34-47 C:US 1:2548
199.34.48/24 DIGEX-C-34-48 C:US 1:2548
199.34.49/24 DIGEX-C-34-49 C:US 1:2548
199.34.50/24 DIGEX-C-34-50 C:US 1:2548
199.34.51/24 DIGEX-C-34-51 C:US 1:2548
199.34.52/24 DIGEX-C-34-52 C:US 1:2548
199.34.53/24 DIGEX-C-34-53 C:US 1:2548
199.34.54/24 DIGEX-C-34-54 C:US 1:2548
199.34.55/24 DIGEX-C-34-55 C:US 1:2548
199.34.56/24 DIGEX-C-34-56 C:US 1:2548
199.34.57/24 DIGEX-C-34-57 C:US 1:2548
199.34.58/24 DIGEX-C-34-58 C:US 1:2548
199.34.59/24 DIGEX-C-34-59 C:US 1:2548
199.34.60/24 DIGEX-C-34-60 C:US 1:2548
199.34.61/24 DIGEX-C-34-61 C:US 1:2548
199.34.62/24 DIGEX-C-34-62 C:US 1:2548
199.34.63/24 DIGEX-C-34-63 C:US 1:2548
199.35.9/24 RIZ C:US 1:2551
199.97.122/24 PSINET-C-97-122 C:US 1:2149 2:174
199.97.123/24 PSINET-C-97-123 C:US 1:2149 2:174
199.97.124/24 PSINET-C-97-124 C:US 1:2149 2:174
199.97.125/24 PSINET-C-97-125 C:US 1:2149 2:174
199.97.126/24 PSINET-C-97-126 C:US 1:2149 2:174
199.97.160/24 PSINET-C-97-160 C:US 1:2149 2:174
199.97.161/24 PSINET-C-97-161 C:US 1:2149 2:174
199.114.2/24 SUBASE-PH-C-114-2 C:US 1:19 2:568
199.114.3/24 SUBASE-PH-C-114-3 C:US 1:19 2:568
199.114.4/24 SUBASE-PH-C-114-4 C:US 1:19 2:568
199.114.5/24 SUBASE-PH-C-114-5 C:US 1:19 2:568
199.114.6/24 SUBASE-PH-C-114-6 C:US 1:19 2:568
202.17.208/24 KAGONCT-NET-C-17-208 C:JP 1:1240 2:1800
202.17.209/24 KAGONCT-NET-C-17-209 C:JP 1:1240 2:1800
202.17.210/24 KAGONCT-NET-C-17-210 C:JP 1:1240 2:1800
202.17.211/24 KAGONCT-NET-C-17-211 C:JP 1:1240 2:1800
Deletions:
<none>
Expanded listing, sorted by country, then by organization:
==========================================================
Belgium
-------
Monsanto Services International, Avenue de Tervuren 270, 1150 Brussels,
BELGIUM
1:93 MIDnet
----------
161.129/16 MONEURO (BE)
Canada
------
Canadian Forest Service, 5320-122 Street, Edmonton, AB, T2P 3G4, CANADA
1:602 CA*net in Montreal
2:601 CA*net in Toronto
3:603 CA*net in Quebec
-------------
198.161.23/24 NOFC1-NET (CA)
Hydro-Quebec, 680 Sherbrooke West, Montreal, QC, H3C 4T8, CANADA
1:603 CA*net in Quebec
2:601 CA*net in Toronto
3:602 CA*net in Montreal
-----------
199.22.0/24 HYDRO-QUEBEC-C-22-0 (CA)
199.22.2/24 HYDRO-QUEBEC-C-22-2 (CA)
Workers' Compensation Board, Box 1150, Halifax, NS, B3J 2Y2, CANADA
1:603 CA*net in Quebec
2:601 CA*net in Toronto
3:602 CA*net in Montreal
-------------
198.166.11/24 WCB-GOV-NS-CA (CA)
Estonia
-------
Estonian Forexbank, Forex Communications Ltd., 8 Ravala Ave., EE , Tallinn,
ESTONIA
1:1800 ICM-Atlantic
2:1879 EUROPE-RS
3:1133 CERN/DANTE
4:1240 ICM-Pacific
-------------
193.40.110/24 FOREX-NET (EE)
193.40.122/24 FOREX2-NET (EE)
France
------
EUTELSAT - European Telecommunications Satellite Organization, 33, avenue
du Maine, F-75755 Paris CEDEX 15,
FRANCE
1:701 Alternet
2:1800 ICM-Atlantic
--------------
193.104.224/24 FR-EUTELSAT1 (FR)
Germany
-------
Fachhochschule Aachen, DVZ, Goethestr. 1, Aachen, D-52064, GERMANY
1:293 Energy Science Network (FIX-East)
2:291 Energy Science Network (FIX-West)
----------
149.201/16 FHAC-LAN (DE)
Individual Network e.V., Koeln, Wilhelm-Ruppert-Str. 38 / C66, D-51147
Koeln, GERMANY
1:1324 ANS New York City - DNSS 35
4:1133 CERN/DANTE
--------------
193.141.106/24 DINOCO-NET (DE)
Infodata GmbH, Kaiserstr. 70, 76437 Rastatt, GERMANY
1:701 Alternet
2:1800 ICM-Atlantic
-------------
193.101.11/24 INFODATA (DE)
Multinet Services GmbH, Bretonischer Ring 7, Postfach 1163, D-85626
Grasbrunn, GERMANY
1:701 Alternet
2:1800 ICM-Atlantic
-------------
193.101.22/24 DIGI-NET (DE)
Japan
-----
Asahikawa National College of Technology, 2-2, Shunkodain, Asahikawa,
Hokkaido, 071, JAPAN
1:1240 ICM-Pacific
2:1800 ICM-Atlantic
------------
192.47.46/24 ANCTNET (JP)
Kagoshima National College of Technology, 1460-1 Shinko, Hayato-cho,
Aira-gun, Kagoshima 899-51, Hayato-cho,
Aira-gun, Kagoshima, 899-51, JAPAN
1:1240 ICM-Pacific
2:1800 ICM-Atlantic
-------------
202.17.208/24 KAGONCT-NET-C-17-208 (JP)
202.17.209/24 KAGONCT-NET-C-17-209 (JP)
202.17.210/24 KAGONCT-NET-C-17-210 (JP)
202.17.211/24 KAGONCT-NET-C-17-211 (JP)
Netherlands
-----------
SARA, Kruislaan 415, NL-1098 SJ Amsterdam, NETHERLANDS
1:1800 ICM-Atlantic
2:1133 CERN/DANTE
3:1674 CERN/DANTE
4:1240 ICM-Pacific
-----------
194.13.0/24 HENKNET (NL)
United Kingdom
--------------
Longman Cartermill, Technology Centre, North Haugh, St Andrews, Scotland,
Great Britain, UNITED KINGDOM
1:701 Alternet
2:1800 ICM-Atlantic
-------------
193.115.32/24 LCD-C-115-32 (GB)
193.115.33/24 LCD-C-115-33 (GB)
193.115.34/24 LCD-C-115-34 (GB)
193.115.35/24 LCD-C-115-35 (GB)
Minicomputer Commercial Software Limited, Thames Industrial Estate, Marlow,
Bucks SL7 1TB, Great Britain, UNITED
KINGDOM
1:701 Alternet
2:1800 ICM-Atlantic
------------
193.32.50/24 UKSECTOR-C-32-50 (GB)
193.32.51/24 UKSECTOR-C-32-51 (GB)
193.32.52/24 UKSECTOR-C-32-52 (GB)
193.32.53/24 UKSECTOR-C-32-53 (GB)
193.32.54/24 UKSECTOR-C-32-54 (GB)
193.32.55/24 UKSECTOR-C-32-55 (GB)
193.32.56/24 UKSECTOR-C-32-56 (GB)
193.32.57/24 UKSECTOR-C-32-57 (GB)
193.32.58/24 UKSECTOR-C-32-58 (GB)
193.32.59/24 UKSECTOR-C-32-59 (GB)
193.32.60/24 UKSECTOR-C-32-60 (GB)
193.32.61/24 UKSECTOR-C-32-61 (GB)
193.32.62/24 UKSECTOR-C-32-62 (GB)
193.32.63/24 UKSECTOR-C-32-63 (GB)
193.32.64/24 UKSECTOR-C-32-64 (GB)
193.32.65/24 UKSECTOR-C-32-65 (GB)
193.32.66/24 UKSECTOR-C-32-66 (GB)
193.32.67/24 UKSECTOR-C-32-67 (GB)
193.32.68/24 UKSECTOR-C-32-68 (GB)
193.32.69/24 UKSECTOR-C-32-69 (GB)
193.32.70/24 UKSECTOR-C-32-70 (GB)
193.32.71/24 UKSECTOR-C-32-71 (GB)
193.32.72/24 UKSECTOR-C-32-72 (GB)
193.32.73/24 UKSECTOR-C-32-73 (GB)
193.32.74/24 UKSECTOR-C-32-74 (GB)
193.32.75/24 UKSECTOR-C-32-75 (GB)
193.32.76/24 UKSECTOR-C-32-76 (GB)
193.32.77/24 UKSECTOR-C-32-77 (GB)
193.32.78/24 UKSECTOR-C-32-78 (GB)
193.32.79/24 UKSECTOR-C-32-79 (GB)
193.32.80/24 UKSECTOR-C-32-80 (GB)
193.32.81/24 UKSECTOR-C-32-81 (GB)
United States
-------------
Academy of Natural Science, 1900 Benjamin Franklin Parkway, Philadelphia,
PA 19103-1089, USA
1:204 PSCNET Regional Network
2:1206 PSCNET Regional Network
--------------
192.204.156/24 ANSP-3 (US)
192.204.157/24 ANSP-4 (US)
Advanced Compression Technology, Inc., 685 Cochran Street, Simi Valley, CA
93065, USA
1:2149 PSINET-2
2:174 NYSERNet Regional Network / PSI
-------------
199.97.123/24 PSINET-C-97-123 (US)
Advocacy Group, 1350 I. Street, N.W. Suite 680, Washington, DC 20005, USA
1:2149 PSINET-2
2:174 NYSERNet Regional Network / PSI
-------------
199.97.125/24 PSINET-C-97-125 (US)
Affymax Research, 4001 Miranda Ave, Palo Alto, CA 94304, USA
1:200 BARRNet
2:201 BARRNet
------------
192.216.3/24 NETAFFYMAX3 (US)
Alpine Computer Systems, Inc., PO Box 6350, Holliston, MA 01746, USA
1:560 NEARnet Regional Network
--------------
198.112.202/24 ALPINECSI-1 (US)
Bay Area Regional Research Network, Pine Hall 115, Stanford, CA, USA
1:200 BARRNet
2:201 BARRNet
-------------
198.31.126/24 BARRNET-C-31-126 (US)
198.31.127/24 BARRNET-C-31-127 (US)
Bell Atlantic, 175 Park Ave., Madison, NJ 07940, USA
1:97 JvNCnet Regional Network
--------------
198.138.182/24 BELL-ATL-MDN1 (US)
198.138.183/24 BELL-ATL-MDN2 (US)
Boardwatch Magazine, 5970 South Vivian Street, Littleton, CO 80127, USA
1:1332 ANS Denver - DNSS 99
-------------
199.33.229/24 BOARDWATCH-US (US)
CICNet, Inc., CICNet, Inc. 2901 Hubbard Rd Ann Arbor, MI 48105, USA
1:266 CICNET at MERIT
2:267 CICNET at UIUC
3:1225 CICNET at Argonne Labs
------------
198.87.15/24 CICNET-C-87-15 (US)
Cellular, Inc., 5990 Greenwood Plaza Blvd., Ste 300, Englewood, CO 80111,
USA
1:209 Westnet Regional Network (Colorado Attachment) - ENSS 141
2:210 Westnet Regional Network (Utah Attachment) - ENSS 142
-------------
198.243.42/24 CELLULAR-NET (US)
Chabot-Las Positas Community College District, 25555 Hesperian Blvd.,
Hayward, CA 94545, USA
1:200 BARRNet
2:201 BARRNet
------------
198.94.36/24 CHABOT5 (US)
City of Los Angeles, Department of General Services, Communications
Services Division, Room 1700, City
Hall, 200 N. Spring Street, Los
Angeles, CA 90012, USA
1:1740 CERFnet
----------
161.149/16 CITYOFLA (US)
Clinarium, Inc, 1755 Drummers Lane, Wayne, PA 19087, USA
1:1800 ICM-Atlantic
2:1240 ICM-Pacific
------------
199.0.137/24 SPRINT-C-0-137 (US)
Computer Services, Communications Technology, Ward Hall, Annapolis, MD
21402, USA
1:19 Milnet (FIX-East)
2:568 Milnet (FIX-West)
-------------
199.10.144/24 LUCE-NADN (US)
CyberGate, Inc., 662 S. Military Trail, Deerfield Beach, FL 33442, USA
1:1333 ANS Atlanta - DNSS 107
--------------
198.206.130/24 CYBER-C-206-130 (US)
198.206.131/24 CYBER-C-206-131 (US)
CycleData Corporation, 6450 Lusk Blvd Ste E104, San Diego, CA 92121, USA
1:1740 CERFnet
------------
198.51.77/24 PSYCHO-C-51-77 (US)
198.51.78/24 PSYCHO-C-51-78 (US)
198.51.79/24 PSYCHO-C-51-79 (US)
198.51.80/24 PSYCHO-C-51-80 (US)
198.51.81/24 PSYCHO-C-51-81 (US)
198.186.155/24 PSYCHO-C-186-155 (US)
198.186.156/24 PSYCHO-C-186-156 (US)
198.186.157/24 PSYCHO-C-186-157 (US)
198.186.158/24 PSYCHO-C-186-158 (US)
198.186.159/24 PSYCHO-C-186-159 (US)
Dialog Information Services, Inc., 3460 Hillview Avenue, Palo Alto, CA
94304, USA
1:1240 ICM-Pacific
2:1800 ICM-Atlantic
-----------
199.2.61/24 DIS-C-2-61 (US)
199.2.62/24 DIS-C-2-62 (US)
199.2.63/24 DIS-C-2-63 (US)
199.2.64/24 DIS-C-2-64 (US)
Digital Express Group, Inc., 6006 Greenbelt Road Suite 228, Greenbelt, MD
20770, USA
1:2548 DIGEX-AS
------------
199.34.46/24 DIGEX-C-34-46 (US)
199.34.47/24 DIGEX-C-34-47 (US)
199.34.48/24 DIGEX-C-34-48 (US)
199.34.49/24 DIGEX-C-34-49 (US)
199.34.50/24 DIGEX-C-34-50 (US)
199.34.51/24 DIGEX-C-34-51 (US)
199.34.52/24 DIGEX-C-34-52 (US)
199.34.53/24 DIGEX-C-34-53 (US)
199.34.54/24 DIGEX-C-34-54 (US)
199.34.55/24 DIGEX-C-34-55 (US)
199.34.56/24 DIGEX-C-34-56 (US)
199.34.57/24 DIGEX-C-34-57 (US)
199.34.58/24 DIGEX-C-34-58 (US)
199.34.59/24 DIGEX-C-34-59 (US)
199.34.60/24 DIGEX-C-34-60 (US)
199.34.61/24 DIGEX-C-34-61 (US)
199.34.62/24 DIGEX-C-34-62 (US)
199.34.63/24 DIGEX-C-34-63 (US)
Electric Press, Inc., Suite 204, Isaac Newton Square, Reston, VA 22091, USA
1:1327 ANS Washington D.C. - DNSS 59
------------
198.80.36/24 ANS-C-80-36 (US)
Explore Cruises and Expeditions, 400 South Elliott Road, Chapel Hill, NC
27514, USA
1:701 Alternet
2:702 Alternet
------------
198.5.222/24 EXPLORE-NET (US)
Gulf Insurance Company, 60 Executive Parkway South, Suite 300, Atlanta, GA
30329, USA
1:1333 ANS Atlanta - DNSS 107
------------
198.80.31/24 ANS-C-80-31 (US)
IDEA, 29 Dunham Road, Billerica, MA 01821, USA
1:560 NEARnet Regional Network
2:701 Alternet
--------------
198.114.224/24 IDEA-C-114-224 (US)
198.114.225/24 IDEA-C-114-225 (US)
198.114.226/24 IDEA-C-114-226 (US)
198.114.227/24 IDEA-C-114-227 (US)
Illinois Wesleyan University, P.O. Box 2900, Bloomington, IL 61702-2900,
USA
1:1225 CICNET at Argonne Labs
2:267 CICNET at UIUC
3:266 CICNET at MERIT
--------------
198.178.132/24 IWU (US)
J. Rizzo, 1470 Rhode Island, San Francisco, CA 94107, USA
1:2551 NETCOM
-----------
199.35.9/24 RIZ (US)
Kaskaskia College, 27210 College Road, Centralia, IL 62801, USA
1:1225 CICNET at Argonne Labs
2:266 CICNET at MERIT
3:267 CICNET at UIUC
-------------
192.217.33/24 KASKASKIA (US)
Lawrence Livermore National Lab, PO Box 5509 L-561, Livermore, CA 94550,
USA
1:291 Energy Science Network (FIX-West)
2:293 Energy Science Network (FIX-East)
3:200 BARRNet
4:201 BARRNet
-------------
192.12.133/24 LLNL-TUE (US)
Long Island Information, Inc., 639 Concord Avenue, Williston Park, NY
11596, USA
1:1800 ICM-Atlantic
2:1240 ICM-Pacific
--------------
198.207.193/24 LIIINET (US)
Medical Computer Systems, 1729 21st Street NW, Washington, DC 20009, USA
1:701 Alternet
2:702 Alternet
------------
198.5.223/24 MCSP-NET (US)
Microcomputer Business Systems Associates, 14439 Robert I Walker Blvd,
Austin, TX 78728, USA
1:1240 ICM-Pacific
2:1800 ICM-Atlantic
--------------
198.151.210/24 MBSA (US)
Monsanto, 700 Chesterfield Village Parkway, Chesterfield, MO 63998, USA
1:93 MIDnet
----------
164.144/16 MONLAN (US)
NCR, 1700 S. Patterson Blvd, Dayton, OH 45479, USA
1:2149 PSINET-2
2:174 NYSERNet Regional Network / PSI
----------
135.137/16 NCRWIN13 (US)
National Public Radio, 2025 M Street NW, Washington, DC 20036, USA
1:1800 ICM-Atlantic
2:1240 ICM-Pacific
------------
199.0.132/24 NPR-C-0-132 (US)
199.0.133/24 NPR-C-0-133 (US)
199.0.134/24 NPR-C-0-134 (US)
199.0.135/24 NPR-C-0-135 (US)
National Weather Service, Western Region Headquarters, PO Box 11188 Fed
Bldg., Salt Lake City, UT 84147-0188,
USA
1:210 Westnet Regional Network (Utah Attachment) - ENSS 142
2:209 Westnet Regional Network (Colorado Attachment) - ENSS 141
--------------
198.177.182/24 WRH (US)
Naval Air Propulsion Center, 1440 Parkway Ave, Trenton, NJ 08628, USA
1:19 Milnet (FIX-East)
2:568 Milnet (FIX-West)
------------
192.133.5/24 NAPCNET (US)
Naval Western Oceanography Center, Box 113, Pearl Harbor, HI 96860-5050,
USA
1:19 Milnet (FIX-East)
2:568 Milnet (FIX-West)
------------
198.97.80/24 NWOCUNCLS (US)
Netsys, Inc., 1750 S. Telegraph Road, Suite 202, Bloomfield Hills, MI
48302, USA
1:2149 PSINET-2
2:174 NYSERNet Regional Network / PSI
-------------
199.97.126/24 PSINET-C-97-126 (US)
Onondaga Community College, Syracuse, NY 13215, USA
1:2149 PSINET-2
2:174 NYSERNet Regional Network / PSI
--------------
198.242.215/24 PSINET-C-242-215 (US)
Openvision, Inc., 7133 Koll Center Parkway, Pleasanton, CA 94566, USA
1:1740 CERFnet
---------
166.98/16 OV (US)
Performance Systems International, Inc, 165 Jordan Road, Troy, NY 12180,
USA
1:2149 PSINET-2
2:174 NYSERNet Regional Network / PSI
-------------
199.97.124/24 PSINET-C-97-124 (US)
Performance Systems International, Inc., 510 Huntmar Park Drive, Herndon,
VA 22070, USA
1:2149 PSINET-2
2:174 NYSERNet Regional Network / PSI
-------------
199.97.160/24 PSINET-C-97-160 (US)
199.97.161/24 PSINET-C-97-161 (US)
Realistic Technologies, 22 Drake Road, Mendham, NJ 07945, USA
1:2149 PSINET-2
2:174 NYSERNet Regional Network / PSI
-------------
199.97.122/24 PSINET-C-97-122 (US)
Research Institute of America, 117 East Stevens Avenue, Valhalla, NY 10595,
USA
1:1324 ANS New York City - DNSS 35
------------
198.80.56/24 RIAPUB-NET1 (US)
SOLTECH SYSTEMS CORPORATION, 1180 Sam Rittenberg Blvd Suite 310,
CHARLESTON, SC 29407, USA
1:1329 ANS Greensboro - DNSS 75
--------------
198.202.177/24 SOLNET (US)
198.202.182/24 SOLTECH (US)
SUBASE Pearl Harbor, Naval Submarine Base, Pearl Harbor, Information
Systems Division, Pearl Harbor, HI
96860-6500, USA
1:19 Milnet (FIX-East)
2:568 Milnet (FIX-West)
------------
199.114.2/24 SUBASE-PH-C-114-2 (US)
199.114.3/24 SUBASE-PH-C-114-3 (US)
199.114.4/24 SUBASE-PH-C-114-4 (US)
199.114.5/24 SUBASE-PH-C-114-5 (US)
199.114.6/24 SUBASE-PH-C-114-6 (US)
San Jose Unified School District, 250 Stockton, San Jose, CA 95126, USA
1:2150 CSUNET-SW
2:200 BARRNet
3:201 BARRNet
----------
143.254/16 SJUSDNET (US)
SeaBeam Instruments, Inc., 141 Washington Street, East Walpole, MA
02032-1155, USA
1:560 NEARnet Regional Network
2:701 Alternet
--------------
198.114.229/24 SEABEAM-C-114-229 (US)
198.114.230/24 SEABEAM-C-114-230 (US)
198.114.231/24 SEABEAM-C-114-231 (US)
South Dakota State Government, South Dakota State University, Computing
Services, Administration 123, Box 2201,
Brookings, SD 57007, USA
1:93 MIDnet
----------
164.154/16 SD-NET (US)
Sterling Software SYD, 1800 Alexander Bell Drive, Reston, VA 22091, USA
1:1800 ICM-Atlantic
2:1240 ICM-Pacific
------------
199.0.128/24 STERLINGSOFT (US)
199.0.129/24 STERLINGSOFT129 (US)
199.0.130/24 STERLINGSOFT130 (US)
199.0.131/24 STERLINGSOFT131 (US)
Syntax Systems, Inc., 840 S 333rd ST, Federal Way, WA 98003, USA
1:1240 ICM-Pacific
2:1800 ICM-Atlantic
-------------
198.145.84/24 WDN-C-145-84 (US)
Syracuse City Schools, 735 Harrison St., Syracuse, NY 13210, USA
1:2149 PSINET-2
2:174 NYSERNet Regional Network / PSI
------------
198.36.16/24 SCSDNET16 (US)
TVI Management, 2480 Sand Hill Road, Menlo Park, CA 94125, USA
1:1240 ICM-Pacific
2:1800 ICM-Atlantic
-----------
199.2.24/24 TVIM-DOM (US)
Tennessee Dept. of Environment & Conservation, 401 Church Street,
Nashville, TN 37243, USA
1:279 SURANET Regional Network (Georgia Tech)
2:86 SURANET Regional Network (College Park)
-------------
198.78.184/24 TDEC (US)
The Folger Shakespear Library, P.O. BOX 2240, Amherst, MA 01002-5000, USA
1:560 NEARnet Regional Network
2:701 Alternet
--------------
198.114.152/24 FOLGER (US)
The Outpost, 11 Bicentennial Drive, Lexington, MA 02173, USA
1:560 NEARnet Regional Network
2:701 Alternet
--------------
192.207.127/24 OUTPOST (US)
U.S. Small Business Association, OIRM - Suite 400, 409 Third Street, SW,
Washington, DC 20416, USA
1:701 Alternet
2:702 Alternet
----------
165.110/16 SBAWAN (US)
University of North Carolina, Chapel Hill, NC 27599, USA
1:81 CONCERT
------------
198.86.40/24 UNC-OUTR (US)
Vertex Pharmaceuticals Incorporated, 40 Allston Street, Cambridge, MA
02139, USA
1:560 NEARnet Regional Network
2:701 Alternet
--------------
198.114.232/24 VPHARM-2 (US)
Zilker Internet Park, 1106 Clayton Lane, Suite 500W, Austin, TX 78723, USA
1:2149 PSINET-2
2:174 NYSERNet Regional Network / PSI
--------------
198.252.182/24 ZILKERNET (US)
==========================================================
The configuration reports which reflect today's update will be
available for anonymous ftp on nic.merit.edu by 08:00 EST :
configuration reports --
nic.merit.edu:nsfnet/announced.networks:
as-as.now as-gw.now ans_core.now country.now net-comp.now
nets.doc nets.tag.now nets.unl.now
NSS routing software configuration files --
nic.merit.edu:nsfnet/backbone.configuration:
nss<NSS number>.t3p
Information is also avaiable through the PRDB whois server. Type
"whois -h prdb.merit.edu help" for details.
--------------------------------------------------------------------------
REPORT CHANGES: (Updated 1/4/94)
CIDRIZATION: On January 4, we converted all Policy Routing DataBase
(PRDB) output, including this report, to CIDR notation. All occurrences
of network numbers ("x.x.x") on output have been replaced by aggregate
notation ("x.x.x/len"). The previous formats for ans_core.now, country.now,
or net-comp.now, now in the files ans_core.old, country.old, and net-comp.old
in the nic.merit.edu: nsfnet/announced.networks directory. These ".old"
files will be discontinued on March 1.
TRANSITION TO GATED: During January, the "routed" routing software on
the backbone will be replaced by "gated". Gated configuration files are
considerably different than routed configuration files. When that
transition is made, gated configuration files will replace routed files
on the nic.merit.edu:nsfnet/backbone.configuration directory.
The archived discussion list "db-disc(a)merit.edu" exists for discussion of
PRDB issues. Send a message to "db-disc-request(a)merit.edu" to subscribe.
--Dale Johnson (dsj(a)merit.edu)
--------------------------------------------------------------------------
Please send all requests for configuration changes to nsfnet-admin(a)merit.edu
using the NSFNET configuration forms. The forms are available on-line
from the nic.merit.edu machine. Use ftp and the anonymous login to get on the
machine. Do a "cd nsfnet/announced.networks" and get the files template.net,
template.net.README, template.gate, and template.as.
In order to more efficiently process your requests, we have moved to a
system which requires the use of template.net (NACR) version 7.0
*******************************
--Steve Widmayer Merit/NSFNET skw(a)merit.edu
--Enke Chen Merit/NSFNET enke(a)merit.edu
--Steven J. Richardson Merit/NSFNET sjr(a)merit.edu
1
0
Hans-Werner,
> Thanks, Rich! I think this is good text. May be the NANOG would just
> replace the names and essentially adopt the same text? I assume that's
> also what you had in mind?
Certainly worth considering, eh?
--Richard
1
0