BGP Update Report

2008-03-07 Thread cidr-report
BGP Update Report Interval: 04-Feb-08 -to- 06-Mar-08 (32 days) Observation Point: BGP Peering with AS2.0 TOP 20 Unstable Origin AS Rank ASNUpds % Upds/PfxAS-Name 1 - AS949894122 1.6% 76.0 -- BBIL-AP BHARTI BT INTERNET LTD. 2 - AS24731 68420

The Cidr Report

2008-03-07 Thread cidr-report
This report has been generated at Fri Mar 7 21:14:14 2008 AEST. The report analyses the BGP Routing Table of AS2.0 router and generates a report on aggregation potential within the table. Check http://www.cidr-report.org for a current version of this report. Recent Table History Date

Data Centre Migration

2008-03-07 Thread Dennis Dayman
Looking for a consultant or someone that could help a company I am working with migrate 15 racks of servers from Canada to US. Not all will be coming, but we will be re-purchasing some equipment to create a second data centre. Anyone interested or knows someone please contact me offlist.

Re: 3rd party network monitoring

2008-03-07 Thread Jason LeBlanc
One app I like a lot is Ping Plotter, but it only runs on Windows, so it isn't good for remote monitoring. We do use it for some things, however. I like the detailed traceroute / latency visualization it has. It also has a hard time with a lot (100+) nodes being monitored. SmokePing

Re: 3rd party network monitoring

2008-03-07 Thread Jason LeBlanc
My bad, you might be able to do it with PingPlotter using remote proxies that are linux. I can see using the Vixie personal colo list to find cheap vm offerings in various locations. Other option, a few could get together and share some resources to get the proxies distributed.

Re: 3rd party network monitoring

2008-03-07 Thread Jeroen Massar
Jason LeBlanc wrote: My bad, you might be able to do it with PingPlotter using remote proxies that are linux. I can see using the Vixie personal colo list to find cheap vm offerings in various locations. Other option, a few could get together and share some resources to get the proxies

Re: 3rd party network monitoring

2008-03-07 Thread Jason LeBlanc
I did look at it, it still lacks a few things, but it does cover most. It would be nice if you added some screenshots or demo pages as to what the reporting looks like. I had to dig around and find a paper on the slammer worm to see what the output looks like. Jeroen Massar wrote: Jason

Re: 3rd party network monitoring

2008-03-07 Thread Jeroen Massar
Jason LeBlanc wrote: I did look at it, it still lacks a few things, but it does cover most. It would be nice if you added some screenshots or demo pages as to what the reporting looks like. I had to dig around and find a paper on the slammer worm to see what the output looks like.

Rogue traffic commonly perceived as noise (was: Scan traffic from 121.8.0.0/16)

2008-03-07 Thread Justin Shore
Yeah, much of it is noise. However there is a a lot of coordination to much of what I'm seeing. Many of the scans stop at hosts with accessible SSH daemons and pound on them for minutes to hours. Others are more subtle. I'll see one host scan our ranges and pick out the IPs running SSH.

Customer-facing ACLs

2008-03-07 Thread Justin Shore
This question will probably get lost in the Friday afternoon lull but we'll give it a try anyway. What kind of customer-facing filtering do you do (ingress and egress)? This of course is dependent on the type of customer, so lets assume we're talking about an average residential customer.

Re: Customer-facing ACLs

2008-03-07 Thread Justin M. Streiner
On Fri, 7 Mar 2008, Justin Shore wrote: Do you block any customer-facing egress traffic at all? What about ingress? SMTP, NetBIOS, MS-SQL, common proxy ports (3128, 6588)? What ICMP types do you allow or disallow? In my previous life, I worked at a mid-sized ISP. A common practice for

Re: Customer-facing ACLs

2008-03-07 Thread Valdis . Kletnieks
On Fri, 07 Mar 2008 13:55:05 CST, Justin Shore said: I'm assuming everyone uses uRPF at all their edges already so that eliminates the need for specific ACEs with ingress/egress network verification checks. You're new here, aren't you? :) pgpck6mspgZyp.pgp Description: PGP signature

Re: Customer-facing ACLs

2008-03-07 Thread Justin Shore
[EMAIL PROTECTED] wrote: On Fri, 07 Mar 2008 13:55:05 CST, Justin Shore said: I'm assuming everyone uses uRPF at all their edges already so that eliminates the need for specific ACEs with ingress/egress network verification checks. You're new here, aren't you? :) Hopefully optimistic.

Re: Customer-facing ACLs

2008-03-07 Thread Dan Armstrong
I would *love* to be able to run uRPF on all of our edge devices, but we use Cisco ME3400s, 3550s, 3560s and they don't support it. :-( [EMAIL PROTECTED] wrote: On Fri, 07 Mar 2008 13:55:05 CST, Justin Shore said: I'm assuming everyone uses uRPF at all their edges already so that

Re: Customer-facing ACLs

2008-03-07 Thread Robert Beverly
On Fri, Mar 07, 2008 at 01:55:05PM -0600, Justin Shore wrote: What kind of customer-facing filtering do you do (ingress and egress)? This of course is dependent on the type of customer, so lets assume we're talking about an average residential customer. ... As part of a recent measurement

Re: Customer-facing ACLs

2008-03-07 Thread Kameron Gasso
Justin M. Streiner wrote: I do recall weighing the merits of extending that to drop outbound SMTP to exerything except our mail farm, but it wasn't deployed because there was a geat deal a fear of customer backlash and that it would drive more calls into the call center. This seems to be

RE: Customer-facing ACLs

2008-03-07 Thread Tim Sanderson
We also use ingress bogon ACLs at our borders. -- Tim Sanderson, network administrator [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Justin Shore Sent: Friday, March 07, 2008 3:20 PM To: [EMAIL PROTECTED] Cc: NANOG Subject: Re:

Re: Customer-facing ACLs

2008-03-07 Thread Danny McPherson
On Mar 7, 2008, at 12:55 PM, Justin Shore wrote: This question will probably get lost in the Friday afternoon lull but we'll give it a try anyway. What kind of customer-facing filtering do you do (ingress and egress)? This of course is dependent on the type of customer, so lets

Re: Customer-facing ACLs

2008-03-07 Thread Scott Weeks
--- What kind of customer-facing filtering do you do (ingress and egress)? This of course is dependent on the type of customer, so lets assume we're talking about an average residential customer. --- From a

RE: Customer-facing ACLs

2008-03-07 Thread Frank Bulk
Same concerns here. Glad to know we're not alone. I think a transition to blocking outbound SMTP (except for one's own e-mail servers) would benefit from an education campaign, but perhaps the pain level is small enough that it can implemented without. One could start doing a subnet block a

Re: Customer-facing ACLs

2008-03-07 Thread Justin Shore
Scott Weeks wrote: fire + gasoline = religious argument on this issue that we've had *many* times in the past... ;-) I wore my flame-retardent tidy whiteys today though so I'm prepared. :-) I can understand the problem from both camps. As a tech-savvy user I don't want my provider to

Re: Customer-facing ACLs

2008-03-07 Thread Dave Pooser
To me there is no question of whether or not you filter traffic for residential broadband customers. SBC in my area (Dallas) went from wide open to outbound 25 blocked by default/opened on request. I think doing the same thing with port 22 would hardly be an undue burden on users, and would

Re: Customer-facing ACLs

2008-03-07 Thread Scott Weeks
--- [EMAIL PROTECTED] wrote: To me there is no question of whether or not you filter traffic for residential broadband customers. SBC in my area (Dallas) went from wide open to outbound 25 blocked by default/opened on request. I think doing the same thing with port 22 would hardly be an

RE: Customer-facing ACLs

2008-03-07 Thread Carpenter, Jason
That's the problem isn't it? Who decides what can and cant go through. I think the tier approach is better, a basic user account where everything is blocked and a Sysadmin type account where everything is open. If the price is different enough then only people who are going to use those extra

Re: Customer-facing ACLs

2008-03-07 Thread Dave Pooser
Might as well do TCP 20, 21 and 23, too. Woah, that slope's getting slippery! Do bots try brute force attacks on Telnet and FTP? All I see at my firewall are SSH attacks and spam. But sure, if there's a lot of Telnet abuse block 23 too; I think it's used about as rarely by normal customers as

RE: Customer-facing ACLs

2008-03-07 Thread Scott Weeks
--- [EMAIL PROTECTED] wrote: That's the problem isn't it? Who decides what can and cant go through. I think the tier approach is better, a basic user account where everything is blocked and a Sysadmin type account where everything is open. If the price is different enough then only people

RE: Customer-facing ACLs

2008-03-07 Thread Paul Ferguson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Scott Weeks [EMAIL PROTECTED] wrote: We need to take this off-line. All long timers are groaning, rolling their eyes and putting this in their kill file. Try convincing your product managers to create a new product just to appease 'sysadmin

Re: Customer-facing ACLs

2008-03-07 Thread Justin Shore
Scott Weeks wrote: We need to take this off-line. All long timers are groaning, rolling their eyes and putting this in their kill file. Are the long-timers groaning and ignoring this thread? I certainly hope not. It's threads like these that need the benefit of their experience the

Re: Customer-facing ACLs

2008-03-07 Thread Andy Dills
On Fri, 7 Mar 2008, Dave Pooser wrote: Might as well do TCP 20, 21 and 23, too. Woah, that slope's getting slippery! Do bots try brute force attacks on Telnet and FTP? All I see at my firewall are SSH attacks and spam. But sure, if there's a lot of Telnet abuse block 23 too; I think

Re: Customer-facing ACLs

2008-03-07 Thread Adrian Chadd
On Fri, Mar 07, 2008, Justin Shore wrote: Scott Weeks wrote: We need to take this off-line. All long timers are groaning, rolling their eyes and putting this in their kill file. Are the long-timers groaning and ignoring this thread? I certainly hope not. It's threads like these that

Re: Customer-facing ACLs

2008-03-07 Thread Dave Pooser
Just straight up blocking outbound ports (with the debatable exception of port 25) seems heavy handed and too slanted toward admin convenience over customer satisfaction. It's a slippery slope because unlike with spam, people who are affected by brute force attacks have some degree of

Re: Customer-facing ACLs

2008-03-07 Thread Mark Foster
Blocking port 25 outbound for dynamic users until they specifically request it be unblocked seems to me to meet the no undue burden test; so would port 22 and 23. Beyond that, I'd probably be hesitant until I either started getting a significant number of abuse reports about a certain flavor of

Re: Customer-facing ACLs

2008-03-07 Thread Joel Jaeggli
Dave Pooser wrote: To me there is no question of whether or not you filter traffic for residential broadband customers. SBC in my area (Dallas) went from wide open to outbound 25 blocked by default/opened on request. I think doing the same thing with port 22 would also people who do real

RE: Customer-facing ACLs

2008-03-07 Thread Frank Bulk
The last few spam incidents I measured an outflow of about 2 messages per second. Does anyone know how aggressive Telnet and SSH scanning is? Even if it was greater, it's my guess there are many more hosts spewing spam than there are running abusive telnet and SSH scans. Frank -Original

Re: Customer-facing ACLs

2008-03-07 Thread Joel Jaeggli
Frank Bulk wrote: The last few spam incidents I measured an outflow of about 2 messages per second. Does anyone know how aggressive Telnet and SSH scanning is? Even if it was greater, it's my guess there are many more hosts spewing spam than there are running abusive telnet and SSH scans.

Re: Customer-facing ACLs

2008-03-07 Thread Dave Pooser
Port 22 outbound? And 23? Telnet and SSH _outbound_ cause that much of a concern? I can only assume it's to stop clients exploited boxen being used to anonymise further telnet/ssh attempts - but have to admit this discussion is the first i've heard of it being done 'en masse'. On one test

Re: Customer-facing ACLs

2008-03-07 Thread Mark Foster
On Sat, 8 Mar 2008, Dave Pooser wrote: Port 22 outbound? And 23? Telnet and SSH _outbound_ cause that much of a concern? I can only assume it's to stop clients exploited boxen being used to anonymise further telnet/ssh attempts - but have to admit this discussion is the first i've heard