RE: Silicon-germanium routers?

2006-06-21 Thread Tony Li
I also suspsect that the community is not ready to transition to liquid-cooled systems. I rather assumed 'at room temperature' implied a standard heat sink and fan. Perhaps there's not enough information in that article to draw a conclusion from. There are a few bits that folks

Re: Silicon-germanium routers?

2006-06-21 Thread Lyndon Nerenberg
On Jun 20, 2006, at 11:11 PM, Tony Li wrote: The breakthrough that we're looking for is a high speed, high density, low power transistor that can be commercially scaled with good yield. Not there quite yet. In comparison to early-80s ECL, how do you think the scaling curve might match? I

Re: key change for TCP-MD5

2006-06-21 Thread Jared Mauch
On Tue, Jun 20, 2006 at 05:18:20PM -0700, Randy Bush wrote: The added cost for CPU-bound systems is that they have to try (potentially) multiple keys before getting the **right** key but in real life this can be easily mitigated by having a rating system on the key based on the

Re: key change for TCP-MD5

2006-06-21 Thread Randy Bush
The added cost for CPU-bound systems is that they have to try (potentially) multiple keys before getting the **right** key but in real life this can be easily mitigated by having a rating system on the key based on the frequency of success. This mitigates the effect of authenticating valid

RE: key change for TCP-MD5

2006-06-21 Thread Ross Callon
At 04:23 PM 6/20/2006 -0700, Bora Akyol wrote: ...The DOS is a concern whether you have a valid key or not, correct? Yes, People who do NOT have a valid key can certainly launch DOS attacks. I can DOS the router with fake packets that it needs to verify as long as I want. Yes, but the

Re: key change for TCP-MD5

2006-06-21 Thread Ross Callon
At 07:29 PM 6/20/2006 -0400, Richard A Steenbergen wrote: On Tue, Jun 20, 2006 at 05:06:27PM -0400, Ross Callon wrote: ...I'd still like someone to explain why we're wasting man hours, CPU time, filling up our router logs, and potentially making DoS easier, for an attack that doesn't exist

RE: key change for TCP-MD5

2006-06-21 Thread Randy Bush
All the multiple keys do is to decrease the cost of the DOS. Yes let's try to remember that, in reality, this is all about allowing two bgp peers to move to a new key without having the operators on the phone to keep the bgp session from resetting. i.e., o it will be uncommon that there is

Re: key change for TCP-MD5

2006-06-21 Thread David Barak
--- Ross Callon [EMAIL PROTECTED] wrote: Another potential attack is an attempt to insert information into a BGP session, such as to introduce bogus routes, or to even become a man in the middle of a BGP session. One issue that worries me about this is that if this allows routing to

insane over-regulation - what not to do

2006-06-21 Thread Randy Bush
just so one can see how deep in a hole things can go if no grownups are present, look at what ghana is about to do to kill the goose that laid the golden egg http://rip.psg.com/~randy/ghana-insanity.pdf randy

RE: insane over-regulation - what not to do

2006-06-21 Thread Randy Whitney
Could you be more specific? Are you talking about Part VIII DOMAIN NAME REGISTAR or something else? rsw. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Randy Bush Sent: Wednesday, June 21, 2006 12:59 PM To: [EMAIL PROTECTED] Subject: insane

Re: Tor and network security/administration

2006-06-21 Thread Todd Vierling
On 6/20/06, Lionel Elie Mamane [EMAIL PROTECTED] wrote: You don't do your financial transactions over HTTPS? If you do, by the very design of SSL, the tor exit node cannot add any HTTP header. That would be a man-in-the-middle attack on SSL. Which, for an anonymizing network, could be a

RE: insane over-regulation - what not to do

2006-06-21 Thread Jerry Pasker
Could you be more specific? Are you talking about Part VIII DOMAIN NAME REGISTAR or something else? rsw. I like Part XIII, Subsecton 115. Thing. myself. -Jerry

Re: insane over-regulation - what not to do

2006-06-21 Thread Valdis . Kletnieks
On Wed, 21 Jun 2006 12:21:34 CDT, Jerry Pasker said: I like Part XIII, Subsecton 115. Thing. myself. Actually, that serves a very important purpose - it codifies the concept that a string of ones and zeros can represent something with actual value. If it wasn't there, a defendant could argue

RE: insane over-regulation - what not to do

2006-06-21 Thread Randy Bush
Could you be more specific? Are you talking about Part VIII DOMAIN NAME REGISTAR or something else? the whole thing as a piece. it looks to be a, likely well-meaning, attempt by a gang of bureaucrats and a fancy consultant to put the universe in a glass jar and preserve it. from end user, to

RE: insane over-regulation - what not to do

2006-06-21 Thread Bill Woodcock
On Wed, 21 Jun 2006, Randy Whitney wrote: Could you be more specific? Are you talking about Part VIII DOMAIN NAME REGISTAR or something else? Not presuming to answer for Randy, just for myself: This follows one of the typical failure-modes of technical legislation, which is

Re: Tor and network security/administration

2006-06-21 Thread Lionel Elie Mamane
On Wed, Jun 21, 2006 at 01:14:52PM -0400, Todd Vierling wrote: On 6/20/06, Lionel Elie Mamane [EMAIL PROTECTED] wrote: You don't do your financial transactions over HTTPS? If you do, by the very design of SSL, the tor exit node cannot add any HTTP header. That would be a man-in-the-middle

Comcast.net, Usa.net, Verizon

2006-06-21 Thread Elijah Savage
Are there anyone on the list from these organizations that could possibly put me in contact with the postmasters please? Thank you

Re: Tor and network security/administration

2006-06-21 Thread Kevin Day
On Jun 21, 2006, at 12:43 PM, Lionel Elie Mamane wrote: If the proxy is not at the Tor exit node, how can the tor network enforce the addition of the this connection went through tor HTTP header that Kevin Day was asking for? Fundamentally, if you rely on a program sitting on the user's

Re: insane over-regulation - what not to do

2006-06-21 Thread David W. Hankins
On Wed, Jun 21, 2006 at 10:36:04AM -0700, Randy Bush wrote: the whole thing as a piece. it looks to be a, likely well-meaning, attempt by a gang of bureaucrats and a fancy consultant to put the universe in a glass jar and preserve it. from end user, to net operations, to infrastructure, to

Re: insane over-regulation - what not to do

2006-06-21 Thread Randy Bush
That's going to be fun to watch. from the outside, not from the inside randy

Re: Tor and network security/administration

2006-06-21 Thread Todd Vierling
On 6/21/06, Lionel Elie Mamane [EMAIL PROTECTED] wrote: Here's where your misunderstanding is evident. The filtering proxy is not at the Tor exit node; it's at the *entry*. If the proxy is not at the Tor exit node, how can the tor network enforce the addition of the this connection went

Re: Tor and network security/administration

2006-06-21 Thread Todd Vierling
On 6/21/06, Kevin Day [EMAIL PROTECTED] wrote: Failing that, having an exit node look at HTTP headers back from the server that contained a X-No-Anonymous header to say that the host at that IP shouldn't allow Tor to use it would work. What's to stop one or more exit node operators from

Re: Tor and network security/administration

2006-06-21 Thread Jeremy Chadwick
On Wed, Jun 21, 2006 at 05:02:47PM -0400, Todd Vierling wrote: If the point of the technology is to add a degree of anonymity, you can be pretty sure that a marker expressly designed to state the message Hi, I'm anonymous! will never be a standard feature of said technology. That's a pretty

Re: Tor and network security/administration

2006-06-21 Thread Steve Atkins
On Jun 21, 2006, at 2:53 PM, Jeremy Chadwick wrote: On Wed, Jun 21, 2006 at 05:02:47PM -0400, Todd Vierling wrote: If the point of the technology is to add a degree of anonymity, you can be pretty sure that a marker expressly designed to state the message Hi, I'm anonymous! will never be a

Re: Tor and network security/administration

2006-06-21 Thread Kevin Day
On Jun 21, 2006, at 4:08 PM, Todd Vierling wrote: On 6/21/06, Kevin Day [EMAIL PROTECTED] wrote: Failing that, having an exit node look at HTTP headers back from the server that contained a X-No-Anonymous header to say that the host at that IP shouldn't allow Tor to use it would work.

Global Crossing/Ashburn - Anyone have RFO or ETA insight?

2006-06-21 Thread John Curran
Folks - Since sometime early this morning, some traffic through Global Crossing in Ashburn has been experiencing packet loss and varying latency consistent with congestion. Global crossing's NOC confirms there is an multiple customer issue, but can't/won't/doesn't-know anything with respect

Re: Global Crossing/Ashburn - Anyone have RFO or ETA insight?

2006-06-21 Thread Randy Bush
Since sometime early this morning, some traffic through Global Crossing in Ashburn has been experiencing packet loss and varying latency consistent with congestion. Global crossing's NOC confirms there is an multiple customer issue, but can't/won't/doesn't-know anything with respect to

Re: Internet 2010 - Predictions for 2010 from a Content Forum and NANOG 37 in San Jose

2006-06-21 Thread William B. Norton
Wow - so many private messages surrounding this. I'll summarize and group the comments across the predictions below, but first answer some of the questions I received. One suggestion was to bury these in a timevault to be opened at NANOG in 2010. Another suggestion was to bury these where I

RE: key change for TCP-MD5

2006-06-21 Thread Bora Akyol
Another potential attack is an attempt to insert information into a BGP session, such as to introduce bogus routes, or to even become a man in the middle of a BGP session. One issue that worries me about this is that if this allows routing to be compromised, then I can figure out how

Re: Global Crossing/Ashburn - Anyone have any SYMPTOMS?

2006-06-21 Thread Randy Bush
john: on ops channel, gx senior eng says: o gx backbone crew knows of no multi-cust outage o gx noc knows of nomulti-cust outage so i very much doubt anyone on this list will have an eta for something no one seems to know about. maybe, rather than a public slam with no content, post some

RE: key change for TCP-MD5

2006-06-21 Thread Randy Bush
This one is hard to pull off. I think the general conclusion a couple years ago in the study that Sean Convery and Matt Franz did was that it was less work to try to own the router or buy your own AS ;) this is the you don't have to run faster than the lion, you just have to run faster than

Re: Global Crossing/Ashburn - Anyone have any SYMPTOMS?

2006-06-21 Thread John Curran
Randy - I actually intentionally didn't post the details or ticket number, as I was looking for other folks already involved (once their NOC said it was a multiple customer issue with the ar2.dca2 router). If you're also affected or engaged on the problem, let me know. Thanks! /John

Re: key change for TCP-MD5

2006-06-21 Thread Richard A Steenbergen
On Wed, Jun 21, 2006 at 05:55:21PM -0700, Randy Bush wrote: when low-hanging fruit is unavailable, or when they see a really cool way to exploit the higher fruit, it would be prudent to have done something about it. who cares about openly recursive dns servers? there are easier ways to

Re: Tor and network security/administration

2006-06-21 Thread Matthew Sullivan
Jeremy Chadwick wrote: On Wed, Jun 21, 2006 at 05:02:47PM -0400, Todd Vierling wrote: If the point of the technology is to add a degree of anonymity, you can be pretty sure that a marker expressly designed to state the message Hi, I'm anonymous! will never be a standard feature of said