
OK folks, nobody seems to have any ideas how to keep our little state of Vermont from falling prey to mediocrity in the internet. I thought with so many highly opinionated people I would at least get a few good or at least entertaining suggestions. How about a different angle. Can anyone aid in building capacity among a few sincere watchdog types to really learn how to map, trace and test the net here as it grows? What constitutes a basic toolkit for trace route, sniff for promiscuous mode, all the other tools to map whats happening to net traffic in a little state of 1/2 million people? What are the sources of traffic information? With there not even a single DS-3 in the state yet carrying IP it seems we just might have a prayer of doing it right, whatever that is. What would it look like if secure communications and anonomynity were designed in from the start? Is this what Sameer is doing in Bezerkeley? What machines are considered minimum requirements to use these tools? What are the essential reference works? -sw

In article <199511070141.UAA15583@maple.sover.net>, Stephen Whitaker <whitaker@sover.net> wrote:
What constitutes a basic toolkit for trace route, sniff for promiscuous mode, all the other tools to map whats happening to net traffic in a little state of 1/2 million people? What are the sources of traffic information?
It won't help, because tapping wouldn't be done at the BGP4 level, but at the switch (if with telco cooperation) or directly on the lines. *You need end-to-end encryption*. You need Kerberos or IPSEC. -- Shields.
participants (2)
-
shields@tembel.org
-
Stephen Whitaker