From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from bottom.networkguild.org (bottom.networkguild.org [IPv6:2600:3c00:e000:1c6::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by lists.bufferbloat.net (Postfix) with ESMTPS id 837093CB37 for ; Thu, 22 Feb 2024 18:39:50 -0500 (EST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=iconia.com; s=bottom; t=1708645189; bh=jcr3QUmv2/IHpiVLttGhhqpnETxKHYZ9EJHncqQsy6Q=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=Ny7G5bTlCeu8QWyhkBQoaWS1jBqTbwTNnznPYZfdofh8LSEOQBXk9H63YNXBq2W2C UnYSzBljjQrlaLh+AITFg+eqjAukKudzDsbwxklWAdtGk/fdlmal2fwk+e/YsWRuD0 f0ctmBsvOusNPt0uVrc08kI+OgPXve8ndh784fRvDkoqAIvQvb1M5+d0+xq7Lw4RdT n7Ka/IN4pA/8mukFOkMxiBB2fcMGvE9mbIpKuMUZJfilZr5m9+92tHlYj5JPzQ7Tk/ XTk6YMBSgo4N3T3yRo83N+NqmkRaACH3ejXU/iP+CXbhVF+JVFSUxzVddRGDqYspRI Fc9Zg7IV1yz1g== Received: from auth (localhost [127.0.0.1]) (authenticated bits=0) by bottom.networkguild.org (8.18.1/8.18.1/Debian-1) with ESMTPSA id 41MNdmLv2200511 (version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NOT) for ; Thu, 22 Feb 2024 18:39:48 -0500 Received: by mail-yw1-f170.google.com with SMTP id 00721157ae682-607dec82853so3196007b3.3 for ; Thu, 22 Feb 2024 15:39:48 -0800 (PST) X-Gm-Message-State: AOJu0Yzor+vUmyfhcwjg01qzNt+sehhBN1DU89uECkpFbNjl/teKRKm/ QltwH+Qhe4Q00oW/ZfqVC0Y2qQIkpQ55/MDr8Nu2wBwqIgokTrFMYTbyBhC37rPdIYKmRoi/Dhm Gg6vZFwHrfV/w4DHbKN6UIyfMq+0= X-Google-Smtp-Source: AGHT+IFKyxkGDWeYiIHs+Uk44gkPPDHIHO4N3IjLz0ucYJ1ui3F2Fznc222qYh+/QDG3UgnZcwWOBqtYlh+GJBC1cqM= X-Received: by 2002:a25:9c86:0:b0:dcc:3020:e68 with SMTP id y6-20020a259c86000000b00dcc30200e68mr619519ybo.64.1708645187931; Thu, 22 Feb 2024 15:39:47 -0800 (PST) MIME-Version: 1.0 References: <5FD342B1-F329-4DDF-A0DA-6ED02B17D164@pch.net> In-Reply-To: <5FD342B1-F329-4DDF-A0DA-6ED02B17D164@pch.net> From: the keyboard of geoff goodfellow Date: Thu, 22 Feb 2024 16:39:11 -0700 X-Gmail-Original-Message-ID: Message-ID: To: =?UTF-8?Q?Network_Neutrality_is_back=21_Let=C2=B4s_make_the_technical_asp?= =?UTF-8?Q?ects_heard_this_time=21?= Content-Type: multipart/alternative; boundary="0000000000007953d5061200f548" X-Virus-Scanned: clamav-milter 1.0.3 at bottom.networkguild.org X-Virus-Status: Clean X-BitDefender-Scanner: Clean, Agent: BitDefender Milter 3.1.7 on bottom.networkguild.org, sigver: 7.96172 X-BitDefender-Spam: No (0) X-BitDefender-SpamStamp: Build: [Engines: 2.17.7.1529, Dats: 871106, Stamp: 3], Multi: [Enabled, t: (0.000028,0.017231)], BW: [Enabled, t: (0.000009)], RBL DNSBL: [Enabled, Score: 0(0), t: (0.000010)], APM: [Enabled, Score: 500, t: (0.008144,0.000308), Flags: BA7B0291; NN_BEGIN_TAG_NOT_OK; NN_LEGIT_VALID_REPLY; NN_LEGIT_SUMM_400_WORDS; NN_LEGIT_S_SQARE_BRACKETS; NN_LEGIT_MAILING_LIST_TO; NN_LEGIT_ML_MAIL_LIST_ADN], SGN: [Enabled, t: (0.051253)], URL: [Enabled, t: (0.002235)], RTDA: [Disabled], total: 0(900) X-BitDefender-CF-Stamp: none X-Spam-Status: No, score=-101.0 required=5.0 autolearn=disabled X-Spam-Report: * -100 USER_IN_WELCOMELIST User is listed in 'welcomelist_from' * -1.0 ALL_TRUSTED Passed through trusted hosts only via SMTP * 0.0 HTML_MESSAGE BODY: HTML included in message * -0.0 T_SCC_BODY_TEXT_LINE No description available. X-Spam-Checker-Version: SpamAssassin 4.0.0 (2022-12-13) on bottom.networkguild.org Subject: Re: [NNagain] Cellular outage in US hits AT&T, T-Mobile and Verizon users, Downdetector shows + Cyberattacks on hospitals are likely to increase, putting lives at risk, experts warn X-BeenThere: nnagain@lists.bufferbloat.net X-Mailman-Version: 2.1.20 Precedence: list List-Id: =?utf-8?q?Network_Neutrality_is_back!_Let=C2=B4s_make_the_technical_aspects_heard_this_time!?= List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 22 Feb 2024 23:39:50 -0000 --0000000000007953d5061200f548 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable if you look/see The Requisite "HUMPS" of/at all the carriers at https://downdetector.com/ it seems to be more than just AT&T being involved On Thu, Feb 22, 2024 at 2:25=E2=80=AFPM Bill Woodcock via Nnagain < nnagain@lists.bufferbloat.net> wrote: > I have not seen any credible evidence of any networks other than AT&T > being involved. > > The rumors of something to do with a SIM database don=E2=80=99t explain a= ll the > PRI trunks down, but those predated the mobile outages, so it might be tw= o > unrelated issues. > > -Bill > > > > On Feb 22, 2024, at 10:12=E2=80=AFPM, Dave Taht via Nnagain < > nnagain@lists.bufferbloat.net> wrote: > > > > =EF=BB=BFOn Thu, Feb 22, 2024 at 3:52=E2=80=AFPM David Bray, PhD via Nn= again > > wrote: > >> > >> > https://www.msn.com/en-gb/money/technology/cellular-outage-in-us-hits-at-= t-t-mobile-and-verizon-users-downdetector-shows/ar-BB1iHBMF > > > > I had feared this was the natural outgrowth of the devastating DNS > > KEYTRAP attack that was announced yesterday: > > > https://www.darkreading.com/cloud-security/keytrap-dns-bug-threatens-wide= spread-internet-outages > > > > But so far the bet on nanog is that "oops, cisco deleted the sim > database." > > > > I think they are being snarky about "the" sim database. I=C2=B4m pretty > > sure they are just being snarky... > > > >> A cellular outage in the United States was reported by AT&T, T-Mobile, > Verizon and other network users on Thursday, according to outage tracking > website Downdetector.com. > >> > >> The number of reports of AT&T outages peaked at 31,931 at around 4:30 > a.m. ET, data from Downdetector, which tracks outages by collating status > reports from sources including user-submitted errors on its platform, > showed. > >> > >> More than 800 service outages of U.S. wireless carriers Verizon and > T-Mobile were also reported on the platform. > >> > >> Verizon, T-Mobile and AT&T did not immediately reply to Reuters' > requests for comment. > >> > >> And this - I was just on a call where it's clear this is increasing: > https://www.msn.com/en-us/health/health-news/cyberattacks-on-hospitals-ar= e-likely-to-increase-putting-lives-at-risk-experts-warn/ar-BB1ihhll > >> > >> WASHINGTON (AP) =E2=80=94 Cybersecurity experts are warning that hospi= tals > around the country are at risk for attacks like the one that is crippling > operations at a premier Midwestern children's hospital, and that the U.S. > government is doing too little prevent such breaches. > >> > >> Hospitals in recent years have shifted their use of online technology > to support everything from telehealth to medical devices to patient > records. Today, they are a favorite target for internet thieves who hold > systems' data and networks hostage for hefty ransoms, said John Riggi, th= e > American Hospital Association=E2=80=99s cybersecurity adviser. > >> > >> -- > >> David Bray, PhD Principal, LeadDoAdapt Ventures, Inc. > >> Loomis Innovation Council Co-Chair & Distinguished Fellow > >> Henry S. Stimson Center, Business Executives for National Security > >> _______________________________________________ > >> Nnagain mailing list > >> Nnagain@lists.bufferbloat.net > >> https://lists.bufferbloat.net/listinfo/nnagain > > > > > > > > -- > > 40 years of net history, a couple songs: > > https://www.youtube.com/watch?v=3DD9RGX6QFm5E > > Dave T=C3=A4ht CSO, LibreQos > > _______________________________________________ > > Nnagain mailing list > > Nnagain@lists.bufferbloat.net > > https://lists.bufferbloat.net/listinfo/nnagain > > > _______________________________________________ > Nnagain mailing list > Nnagain@lists.bufferbloat.net > https://lists.bufferbloat.net/listinfo/nnagain > > --=20 Geoff.Goodfellow@iconia.com living as The Truth is True --0000000000007953d5061200f548 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
if you look/see The Requisite "HUMPS"= of/at all the carriers at=C2=A0https= ://downdetector.com/=C2=A0it seems to be more than just AT&T being = involved

On Thu, Feb 22, 2024 at 2:25=E2=80=AFPM Bill Woodcock via N= nagain <nnagain@lists.b= ufferbloat.net> wrote:
I have not seen any credible evidence of any networks other t= han AT&T being involved.=C2=A0

The rumors of something to do with a SIM database don=E2=80=99t explain all= the PRI trunks down, but those predated the mobile outages, so it might be= two unrelated issues.

=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 -Bill


> On Feb 22, 2024, at 10:12=E2=80=AFPM, Dave Taht via Nnagain <nnagain@lists.= bufferbloat.net> wrote:
>
> =EF=BB=BFOn Thu, Feb 22, 2024 at 3:52=E2=80=AFPM David Bray, PhD via N= nagain
> <nnagain@lists.bufferbloat.net> wrote:
>>
>> https://www.msn.com/en-gb/money/te= chnology/cellular-outage-in-us-hits-at-t-t-mobile-and-verizon-users-downdet= ector-shows/ar-BB1iHBMF
>
> I had feared this was the natural outgrowth of the devastating DNS
> KEYTRAP attack that was announced yesterday:
> https://www.darkreading.com/cloud-security/keytrap-dns-bug-threatens-wides= pread-internet-outages
>
> But so far the bet on nanog is that "oops, cisco deleted the sim = database."
>
> I think they are being snarky about "the" sim database. I=C2= =B4m pretty
> sure they are just being snarky...
>
>> A cellular outage in the United States was reported by AT&T, T= -Mobile, Verizon and other network users on Thursday, according to outage t= racking website Downdetector.com.
>>
>> The number of reports of AT&T outages peaked at 31,931 at arou= nd 4:30 a.m. ET, data from Downdetector, which tracks outages by collating = status reports from sources including user-submitted errors on its platform= , showed.
>>
>> More than 800 service outages of U.S. wireless carriers Verizon an= d T-Mobile were also reported on the platform.
>>
>> Verizon, T-Mobile and AT&T did not immediately reply to Reuter= s' requests for comment.
>>
>> And this -=C2=A0 I was just on a call where it's clear this is= increasing: https://www.msn.com/en= -us/health/health-news/cyberattacks-on-hospitals-are-likely-to-increase-put= ting-lives-at-risk-experts-warn/ar-BB1ihhll
>>
>> WASHINGTON (AP) =E2=80=94 Cybersecurity experts are warning that h= ospitals around the country are at risk for attacks like the one that is cr= ippling operations at a premier Midwestern children's hospital, and tha= t the U.S. government is doing too little prevent such breaches.
>>
>> Hospitals in recent years have shifted their use of online technol= ogy to support everything from telehealth to medical devices to patient rec= ords. Today, they are a favorite target for internet thieves who hold syste= ms' data and networks hostage for hefty ransoms, said John Riggi, the A= merican Hospital Association=E2=80=99s cybersecurity adviser.
>>
>> --
>> David Bray, PhD Principal, LeadDoAdapt Ventures, Inc.
>> Loomis Innovation Council Co-Chair & Distinguished Fellow
>> Henry S. Stimson Center, Business Executives for National Security=
>> _______________________________________________
>> Nnagain mailing list
>> Nnagain@lists.bufferbloat.net
>> https://lists.bufferbloat.net/listinfo/nnagai= n
>
>
>
> --
> 40 years of net history, a couple songs:
> https://www.youtube.com/watch?v=3DD9RGX6QFm5E<= br> > Dave T=C3=A4ht CSO, LibreQos
> _______________________________________________
> Nnagain mailing list
> Nna= gain@lists.bufferbloat.net
> https://lists.bufferbloat.net/listinfo/nnagain


_______________________________________________
Nnagain mailing list
Nnagain@= lists.bufferbloat.net
https://lists.bufferbloat.net/listinfo/nnagain



--
Geoff.Goodfellow@iconia.com
living as The Truth is True

--0000000000007953d5061200f548--