PSI as transit carrier

I've been approached by PSI who seem to be taking a rather aggressive
approach at selling their transit service as an alternative to the 3 major
players in Canada (Sprint Canada, UUNet and Teleglobe). Their pricing is
very aggressive but I'm just a router nazi and care more about knowing what
the service is like and wether or not PSI is as well connected as the
aforementioned competitors. Should I spend the money and buy from them or
just peer with them, and get all their local and customer routes at only the
price of a local loop?

Anyone out there use them? Comments?

Regards,

Jason A. Lixfeld
Senior Network Engineer
Look Communications Inc.

Couple of facts to be considered:

PSIX - Last Trade 1 15/32

http://news.cnet.com/news/0-1004-200-3724237.html

http://news.cnet.com/news/0-1005-200-3417237.html

andy

With the recent turmoil that washed over PSI, would it be a
good choice to trust them with your transit?

but, if you can get a good deal, why not?

just do your standard DD and you shouldnt have a problem.

Christian

I'm surprised this hasn't come up in NANOG yet...

On a university list many sites are reporting large amounts of traffic
appearing to come from 209.67.50.203 to their DNS servers. The
administrator of the source IP (spoofed of course) is the victim of a
brutal DoS attack. The traffic is UDP/DNS queries that are appear to be
going directly to available DNS servers (as opposed to random hosts).
Most sites are reporting on the order of 6 or more packets per second to
their DNS servers. The victim has apparently seen upwards of 90 Mb/s of
traffic coming back in to them. Does anyone here have anymore
information on this attack?

John

John Kristoff wrote:

On a university list many sites are reporting large amounts of traffic
appearing to come from 209.67.50.203 to their DNS servers. The
administrator of the source IP (spoofed of course) is the victim of a
brutal DoS attack. The traffic is UDP/DNS queries that are appear to be
going directly to available DNS servers (as opposed to random hosts).
Most sites are reporting on the order of 6 or more packets per second to
their DNS servers. The victim has apparently seen upwards of 90 Mb/s of
traffic coming back in to them. Does anyone here have anymore
information on this attack?

In general, this attack method is known. There is some information
about it documented at:

  Denial of Service Attacks Using Nameservers
  The CERT Division | Software Engineering Institute

Regards,
Kevin