Re: Who wants to be in charge of the Internet today?

2006-06-23 Thread Scott Weeks

- Original Message Follows -


From: Sean Donelan [EMAIL PROTECTED]

 The U.S. is poorly prepared for a major disruption of the
 Internet, according to a study that an influential group

Wow!  They mean the internet backbone might break?  We
better shore up that puppy and warn the tier 1 folks...  ;-)

scott



BGP Update Report

2006-06-23 Thread cidr-report

BGP Update Report
Interval: 09-Jun-06 -to- 22-Jun-06 (14 days)
Observation Point: BGP Peering with AS4637

TOP 20 Unstable Origin AS
Rank ASNUpds %  Upds/PfxAS-Name
 1 - AS25543   33646  3.0% 961.3 -- FASONET-AS ONATEL/FasoNet's 
Autonomous System
 2 - AS432314525  1.3%  11.1 -- TWTC - Time Warner Telecom, Inc.
 3 - AS17974   13545  1.2%  32.8 -- TELKOMNET-AS2-AP PT 
TELEKOMUNIKASI INDONESIA
 4 - AS912113120  1.2%  38.4 -- TTNET TTnet Autonomous System
 5 - AS15611   13049  1.2% 127.9 -- Iranian Research Organisation
 6 - AS10139   10868  1.0%  44.5 -- MERIDIAN-PH-AP Meridian Telekoms
 7 - AS175579285  0.8%  22.9 -- PKTELECOM-AS-AP Pakistan Telecom
 8 - AS702  9208  0.8%  12.3 -- AS702 MCI EMEA - Commercial IP 
service provider in Europe
 9 - AS3475 9024  0.8% 564.0 -- LANT-AFLOAT - NCTAMS LANT DET 
HAMPTON ROADS
10 - AS7018 8995  0.8%   5.9 -- ATT-INTERNET4 - ATT WorldNet 
Services
11 - AS5803 8640  0.8% 109.4 -- DDN-ASNBLK - DoD Network 
Information Center
12 - AS6198 8423  0.8%  20.4 -- BATI-MIA - BellSouth Network 
Solutions, Inc
13 - AS8452 8207  0.7%  49.4 -- TEDATA TEDATA
14 - AS4134 8105  0.7%  10.3 -- CHINANET-BACKBONE 
No.31,Jin-rong Street
15 - AS4837 7270  0.6%  25.9 -- CHINA169-BACKBONE CNCGROUP 
China169 Backbone
16 - AS4621 6925  0.6%  52.1 -- UNSPECIFIED UNINET-TH
17 - AS195486597  0.6%  14.8 -- ADELPHIA-AS2 - Adelphia
18 - AS239186118  0.5%  46.3 -- CBB-BGP-IBARAKI Connexion By 
Boeing Ibaraki AS
19 - AS337836071  0.5%  57.8 -- EEPAD
20 - AS701  6030  0.5%   6.4 -- ALTERNET-AS - UUNET 
Technologies, Inc.


TOP 20 Unstable Origin AS (Updates per announced prefix)
Rank ASNUpds %  Upds/PfxAS-Name
 1 - AS3043 2906  0.3%2906.0 -- AMPHIB-AS - Amphibian Media 
Corporation
 2 - AS210272825  0.2%2825.0 -- ASN-PARADORES PARADORES 
Autonomous System
 3 - AS260152041  0.2%2041.0 -- THINKORSWIM - Thinkorswim inc
 4 - AS398631571  0.1%1571.0 -- CROSSNET Crossnet LLC
 5 - AS353792560  0.2%1280.0 -- EASYNET EASYNET s.c.
 6 - AS368771976  0.2% 988.0 -- MWEB_AFRICA-NAMIBIA
 7 - AS25543   33646  3.0% 961.3 -- FASONET-AS ONATEL/FasoNet's 
Autonomous System
 8 - AS34378 865  0.1% 865.0 -- RUG-AS Razguliay-UKRROS Group
 9 - AS236071550  0.1% 775.0 -- ITXPRESS-AS-AP itXpress Pty 
Ltd. Network AS ISP and DSL
10 - AS19908 694  0.1% 694.0 -- HOENIGRYENY9149359000 - Hoenig 
 Co., Inc.
11 - AS4678 2732  0.2% 683.0 -- FINE CANON NETWORK 
COMMUNICATIONS INC.
12 - AS36897 591  0.1% 591.0 -- AEROSAT
13 - AS24896 579  0.1% 579.0 -- UKRINTELL-AS IntellCOM Provider 
LIR, Kiev, Ukraine Northern Nowhere
14 - AS36565 574  0.1% 574.0 -- COUNTY-OF-MONTGOMERY-PA - 
County of Montgomery
15 - AS144102832  0.2% 566.4 -- DALTON - MCM, Inc., DBA: [EMAIL 
PROTECTED]
16 - AS3475 9024  0.8% 564.0 -- LANT-AFLOAT - NCTAMS LANT DET 
HAMPTON ROADS
17 - AS9157 1045  0.1% 522.5 -- SAO-RAS SAO-RAS AS
18 - AS199821768  0.2% 442.0 -- TOWERSTREAM-PROV - Towerstream
19 - AS24308 434  0.0% 434.0 -- DAFFODILBD-AS Daffodil Online 
AS for BDIX Connection
20 - AS177834203  0.4% 420.3 -- SRILRPG-AS SRIL RPG Autonomous 
System


TOP 20 Unstable Prefixes
Rank Prefix Upds % Origin AS -- AS Name
 1 - 203.112.154.0/24   4008  0.3%   AS17783 -- SRILRPG-AS SRIL RPG Autonomous 
System
 2 - 152.74.0.0/16  4002  0.3%   AS11340 -- Red Universitaria Nacional
 3 - 209.140.24.0/242906  0.2%   AS3043  -- AMPHIB-AS - Amphibian Media 
Corporation
 4 - 62.81.240.0/24 2825  0.2%   AS21027 -- ASN-PARADORES PARADORES 
Autonomous System
 5 - 61.0.0.0/8 2729  0.2%   AS4678  -- FINE CANON NETWORK 
COMMUNICATIONS INC.
 6 - 65.175.45.0/24 2041  0.2%   AS26015 -- THINKORSWIM - Thinkorswim inc
 7 - 198.92.192.0/212038  0.2%   AS16559 -- REALCONNECT-01 - RealConnect, 
Inc
 8 - 209.160.56.0/221877  0.1%   AS14361 -- HOPONE-DCA - HopOne Internet 
Corporation
 9 - 81.212.125.0/241597  0.1%   AS9121  -- TTNET TTnet Autonomous System
10 - 81.89.208.0/20 1571  0.1%   AS39863 -- CROSSNET Crossnet LLC
11 - 81.212.141.0/241530  0.1%   AS9121  -- TTNET TTnet Autonomous System
12 - 81.212.124.0/241509  0.1%   AS9121  -- TTNET TTnet Autonomous System
13 - 81.212.149.0/241506  0.1%   AS9121  -- TTNET TTnet Autonomous System
14 - 195.28.178.0/231280  0.1%   AS35379 -- EASYNET EASYNET s.c.
15 - 193.239.244.0/23   1280  0.1%   AS35379 -- EASYNET EASYNET s.c.
16 - 

The Cidr Report

2006-06-23 Thread cidr-report

This report has been generated at Fri Jun 23 21:44:32 2006 AEST.
The report analyses the BGP Routing Table of an AS4637 (Reach) router
and generates a report on aggregation potential within the table.

Check http://www.cidr-report.org/as4637 for a current version of this report.

Recent Table History
Date  PrefixesCIDR Agg
16-06-06186927  122948
17-06-06186942  122902
18-06-06187088  122947
19-06-06187137  123059
20-06-06187338  123220
21-06-06187505  123270
22-06-06187672  123352
23-06-06187830  123332


AS Summary
 22410  Number of ASes in routing system
  9388  Number of ASes announcing only one prefix
  1464  Largest number of prefixes announced by an AS
AS7018 : ATT-INTERNET4 - ATT WorldNet Services
  91697152  Largest address span announced by an AS (/32s)
AS721  : DISA-ASNBLK - DoD Network Information Center


Aggregation Summary
The algorithm used in this report proposes aggregation only
when there is a precise match using the AS path, so as 
to preserve traffic transit policies. Aggregation is also
proposed across non-advertised address space ('holes').

 --- 23Jun06 ---
ASnumNetsNow NetsAggr  NetGain   % Gain   Description

Table 187920   1233136460734.4%   All ASes

AS4323  1313  269 104479.5%   TWTC - Time Warner Telecom,
   Inc.
AS4134  1227  293  93476.1%   CHINANET-BACKBONE
   No.31,Jin-rong Street
AS18566  945  158  78783.3%   COVAD - Covad Communications
   Co.
AS4755   938  221  71776.4%   VSNL-AS Videsh Sanchar Nigam
   Ltd. Autonomous System
AS721   1021  318  70368.9%   DISA-ASNBLK - DoD Network
   Information Center
AS22773  665   47  61892.9%   CCINET-2 - Cox Communications
   Inc.
AS6197  1014  484  53052.3%   BATI-ATL - BellSouth Network
   Solutions, Inc
AS7018  1464  942  52235.7%   ATT-INTERNET4 - ATT WorldNet
   Services
AS19916  563   65  49888.5%   ASTRUM-0001 - OLM LLC
AS9498   677  180  49773.4%   BBIL-AP BHARTI BT INTERNET
   LTD.
AS855553   64  48988.4%   CANET-ASN-4 - Aliant Telecom
AS17488  519   46  47391.1%   HATHWAY-NET-AP Hathway IP Over
   Cable Internet
AS3602   525  104  42180.2%   AS3602-RTI - Rogers Telecom
   Inc.
AS18101  417   28  38993.3%   RIL-IDC Reliance Infocom Ltd
   Internet Data Centre,
AS15270  433   52  38188.0%   AS-PAETEC-NET - PaeTec.net -a
   division of
   PaeTecCommunications, Inc.
AS17676  489  110  37977.5%   JPNIC-JP-ASN-BLOCK Japan
   Network Information Center
AS11492  621  261  36058.0%   CABLEONE - CABLE ONE
AS4766   654  305  34953.4%   KIXS-AS-KR Korea Telecom
AS6467   393   50  34387.3%   ESPIRECOMM - Xspedius
   Communications Co.
AS22047  418   75  34382.1%   VTR BANDA ANCHA S.A.
AS812370   30  34091.9%   ROGERS-CABLE - Rogers Cable
   Inc.
AS16852  355   50  30585.9%   FOCAL-CHICAGO - Focal Data
   Communications of Illinois
AS8151   707  407  30042.4%   Uninet S.A. de C.V.
AS19262  669  374  29544.1%   VZGNI-TRANSIT - Verizon
   Internet Services Inc.
AS16814  329   48  28185.4%   NSS S.A.
AS3352   306   30  27690.2%   TELEFONICA-DATA-ESPANA
   Internet Access Network of
   TDE
AS5668   524  249  27552.5%   AS-5668 - CenturyTel Internet
   Holdings, Inc.
AS6198   511  243  26852.4%   BATI-MIA - BellSouth Network
   Solutions, Inc
AS14654  282   15  26794.7%   WAYPORT - Wayport
AS9583   909  645  26429.0%   SIFY-AS-IN Sify Limited

Total 

Re: Who wants to be in charge of the Internet today?

2006-06-23 Thread Peter Ferrigan



At one of my old jobs, my boss honestly believed that we had a 'switch' 
that turned the entire internet off or on.  When she was having problems 
accessing her shopping sites, she'd storm in the office and say something 
like 'did you guys turn the the internet off again?'  sigh


Then again, this is the same person that tried to tell me that 768 OC-192s 
are carried on a single DS1..



- Peter

On Fri, 23 Jun 2006, Patrick W. Gilmore wrote:



On Jun 23, 2006, at 12:45 AM, Sean Donelan wrote:


I shudder to think what would happen under large scale attack if one of the 
CEOs in that room had responsibility for the correct functioning of the 
Internet.


This definitely falls into the Just Doesn't Get It category.

--
TTFN,
patrick


RE: Who wants to be in charge of the Internet today?

2006-06-23 Thread Jason Gauthier

Sounds like our typical customer service calls.

Them: Is the Internet down?
Us:   Yes, someone will turn it back on soon.
 

 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On 
 Behalf Of Peter Ferrigan
 Sent: Friday, June 23, 2006 10:04 AM
 To: nanog@merit.edu
 Subject: Re: Who wants to be in charge of the Internet today?
 
 
 
 At one of my old jobs, my boss honestly believed that we had 
 a 'switch' 
 that turned the entire internet off or on.  When she was 
 having problems accessing her shopping sites, she'd storm in 
 the office and say something like 'did you guys turn the the 
 internet off again?'  sigh
 
 Then again, this is the same person that tried to tell me 
 that 768 OC-192s are carried on a single DS1..
 
 
 - Peter
 
 On Fri, 23 Jun 2006, Patrick W. Gilmore wrote:
 
 
  On Jun 23, 2006, at 12:45 AM, Sean Donelan wrote:
 
 
  I shudder to think what would happen under large scale 
 attack if one of the 
  CEOs in that room had responsibility for the correct 
 functioning of the 
  Internet.
 
  This definitely falls into the Just Doesn't Get It category.
 
  -- 
  TTFN,
  patrick
 


Re: Who wants to be in charge of the Internet today?

2006-06-23 Thread Roy


Scott Weeks wrote:

- Original Message Follows -


From: Sean Donelan [EMAIL PROTECTED]

  

The U.S. is poorly prepared for a major disruption of the
Internet, according to a study that an influential group



Wow!  They mean the internet backbone might break?  We
better shore up that puppy and warn the tier 1 folks...  ;-)

scott


  
The levees will break and you will be flooded.  You do have an Internet 
evacuation plan don't you?  That is where you make all your lines 
outbound and move your bits to higher ground.





Re: Who wants to be in charge of the Internet today?

2006-06-23 Thread Jeff Shultz


Sean Donelan wrote:


The Business Roundtable, composed of the CEOs of 160 large U.S. companies,
said neither the government nor the private sector has a coordinated plan
to respond to an attack, natural disaster or other disruption of the
Internet. While individual government agencies and companies have their
own emergency plans in place, little coordination exists between the
groups, according to the study.

It's a matter of more clearly defining who has responsibility, said
Edward Rust Jr., CEO of State Farm Mutual Automobile Insurance Co., who
leads the Roundtable's Internet-security effort.

[...]



Thus explainith why CEOs should not be responsible for this. I wonder if 
their CIOs or other techies have ever tried to explain the concept of a 
CERT to them.


--
Jeff Shultz


Re: Who wants to be in charge of the Internet today?

2006-06-23 Thread Justin M. Streiner


On Fri, 23 Jun 2006, Jeff Shultz wrote:

Thus explainith why CEOs should not be responsible for this. I wonder if 
their CIOs or other techies have ever tried to explain the concept of a 
CERT to them.


Of course they have.  Gives you minty fresh breath, right?

jms


Re: Who wants to be in charge of the Internet today?

2006-06-23 Thread Robert Boyle


At 10:04 AM 6/23/2006, you wrote:
Then again, this is the same person that tried to tell me that 768 
OC-192s are carried on a single DS1.


Now THAT is impressive compression! I don't know what your former 
company did, but they should focus on selling that compression 
technology. ;) The buffers must be enormous!


-Robert



Tellurian Networks - The Ultimate Internet Connection
http://www.tellurian.com | 888-TELLURIAN | 973-300-9211
Well done is better than well said. - Benjamin Franklin



Re: Who wants to be in charge of the Internet today?

2006-06-23 Thread Valdis . Kletnieks
On Fri, 23 Jun 2006 11:33:43 EDT, Robert Boyle said:

 Now THAT is impressive compression! I don't know what your former 
 company did, but they should focus on selling that compression 
 technology. ;) The buffers must be enormous!

Infinite compression is easy, if you use a sufficiently lossy compression
algorithm.  Ask anybody who's talked to a journalist for an hour, and ends
up as a one-sentence misquote.


pgp7ZpyNrRNAO.pgp
Description: PGP signature


Re: Who wants to be in charge of the Internet today?

2006-06-23 Thread Warren Kumari


My favorite was always the (potential) customers who would call up  
and ask Can I get the Internet in my house? -- I would always  
answer That depends, how big is your house?, but they NEVER got  
it...



On Jun 23, 2006, at 7:09 AM, Jason Gauthier wrote:



Sounds like our typical customer service calls.

Them: Is the Internet down?
Us:   Yes, someone will turn it back on soon.



-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Peter Ferrigan
Sent: Friday, June 23, 2006 10:04 AM
To: nanog@merit.edu
Subject: Re: Who wants to be in charge of the Internet today?



At one of my old jobs, my boss honestly believed that we had
a 'switch'
that turned the entire internet off or on.  When she was
having problems accessing her shopping sites, she'd storm in
the office and say something like 'did you guys turn the the
internet off again?'  sigh



Yah, I would have customers call and ask me to reboot the Internet,  
its down again...


Ok, let the customer support anecdotes flow...
W


Then again, this is the same person that tried to tell me
that 768 OC-192s are carried on a single DS1..


- Peter

On Fri, 23 Jun 2006, Patrick W. Gilmore wrote:



On Jun 23, 2006, at 12:45 AM, Sean Donelan wrote:


I shudder to think what would happen under large scale

attack if one of the

CEOs in that room had responsibility for the correct

functioning of the

Internet.

This definitely falls into the Just Doesn't Get It category.

--
TTFN,
patrick








[OT] Re: Who wants to be in charge of the Internet today?

2006-06-23 Thread Edward B. DREGER

RB Date: Fri, 23 Jun 2006 11:33:43 -0400
RB From: Robert Boyle

RB Now THAT is impressive compression! I don't know what your former company
RB did, but they should focus on selling that compression technology. ;)

Irrational numbers can be described in finite space, yet extend
indefinitely with no discernable pattern.  Perhaps said company has
found a way to map arbitrary infinite-length data streams to short,
simple representations a la digits 'x' through 'y' of pi. ;-)

(Note smiley.  This is tongue-in-cheek commentary on entropy.)


Eddy
--
Everquick Internet - http://www.everquick.net/
A division of Brotsman  Dreger, Inc. - http://www.brotsman.com/
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 785 865 5885 Lawrence and [inter]national
Phone: +1 316 794 8922 Wichita

DO NOT send mail to the following addresses:
[EMAIL PROTECTED] -*- [EMAIL PROTECTED] -*- [EMAIL PROTECTED]
Sending mail to spambait addresses is a great way to get blocked.
Ditto for broken OOO autoresponders and foolish AV software backscatter.


Re: Who wants to be in charge of the Internet today?

2006-06-23 Thread Jerry Pasker


One two three NOT IT!

Sorry, when I saw the subject, I couldn't resist.


Re: Who wants to be in charge of the Internet today?

2006-06-23 Thread Valdis . Kletnieks
On Fri, 23 Jun 2006 09:09:19 PDT, Warren Kumari said:
 Ok, let the customer support anecdotes flow...

Part of the gear I usually lug around is an old bulky pair of Kenwood KPM-410
headphones.  I've had people convinced that it's for computer security,
because when you ping the internet, you of course have to listen for the
echoes.

(It is, of course, *really* about trying to listen to Nine Inch Nails while
trapped in cubicle land... ;)



pgpzuorry0Pzx.pgp
Description: PGP signature


Re: Who wants to be in charge of the Internet today?

2006-06-23 Thread Randy Bush

this is all silly.  the answer to these is usually the folk
asking the question of who is in charge are the ones who
want to be.

randy



Weekly Routing Table Report

2006-06-23 Thread Routing Analysis Role Account

This is an automated weekly mailing describing the state of the Internet
Routing Table as seen from APNIC's router in Japan.
Daily listings are sent to [EMAIL PROTECTED]

If you have any comments please contact Philip Smith [EMAIL PROTECTED].

Routing Table Report   04:00 +10GMT Sat 24 Jun, 2006

Analysis Summary


BGP routing table entries examined:  191664
Prefixes after maximum aggregation:  105172
Unique aggregates announced to Internet:  92904
Total ASes present in the Internet Routing Table: 22516
Origin-only ASes present in the Internet Routing Table:   19587
Origin ASes announcing only one prefix:9392
Transit ASes present in the Internet Routing Table:2929
Transit-only ASes present in the Internet Routing Table: 63
Average AS path length visible in the Internet Routing Table:   3.5
Max AS path length visible:  24
Max AS path prepend of ASN (32609)   16
Prefixes from unregistered ASNs in the Routing Table: 2
Unregistered ASNs in the Routing Table:   3
Special use prefixes present in the Routing Table:0
Prefixes being announced from unallocated address space:  9
Number of addresses announced to Internet:   1543273736
Equivalent to 91 /8s, 252 /16s and 125 /24s
Percentage of available address space announced:   41.6
Percentage of allocated address space announced:   60.2
Percentage of available address space allocated:   69.1
Total number of prefixes smaller than registry allocations:   95120

APNIC Region Analysis Summary
-

Prefixes being announced by APNIC Region ASes:40985
Total APNIC prefixes after maximum aggregation:   16907
Prefixes being announced from the APNIC address blocks:   38706
Unique aggregates announced from the APNIC address blocks:18500
APNIC Region origin ASes present in the Internet Routing Table:2620
APNIC Region origin ASes announcing only one prefix:752
APNIC Region transit ASes present in the Internet Routing Table:397
Average APNIC Region AS path length visible:3.5
Max APNIC Region AS path length visible: 18
Number of APNIC addresses announced to Internet:  234437216
Equivalent to 13 /8s, 249 /16s and 58 /24s
Percentage of available APNIC address space announced: 73.3

APNIC AS Blocks4608-4864, 7467-7722, 9216-10239, 17408-18431
(pre-ERX allocations)  23552-24575, 37888-38911
APNIC Address Blocks   58/7, 60/7, 121/8, 122/7, 124/7, 126/8, 202/7
   210/7, 218/7, 220/7 and 222/8

ARIN Region Analysis Summary


Prefixes being announced by ARIN Region ASes: 98398
Total ARIN prefixes after maximum aggregation:58065
Prefixes being announced from the ARIN address blocks:72194
Unique aggregates announced from the ARIN address blocks: 26957
ARIN Region origin ASes present in the Internet Routing Table:10799
ARIN Region origin ASes announcing only one prefix:4077
ARIN Region transit ASes present in the Internet Routing Table: 989
Average ARIN Region AS path length visible: 3.3
Max ARIN Region AS path length visible:  18
Number of ARIN addresses announced to Internet:   294470400
Equivalent to 17 /8s, 141 /16s and 67 /24s
Percentage of available ARIN address space announced:  76.3

ARIN AS Blocks 1-1876, 1902-2042, 2044-2046, 2048-2106
(pre-ERX allocations)  2138-2584, 2615-2772, 2823-2829, 2880-3153
   3354-4607, 4865-5119, 5632-6655, 6912-7466
   7723-8191, 10240-12287, 13312-15359, 16384-17407
   18432-20479, 21504-23551, 25600-26591,
   26624-27647, 29696-30719, 31744-33791
   35840-36863, 39936-40959
ARIN Address Blocks24/8, 63/8, 64/5, 72/6, 76/8, 199/8, 204/6,
   208/7 and 216/8

RIPE Region Analysis Summary


Prefixes being announced by RIPE Region ASes: 38249
Total RIPE prefixes after maximum aggregation:25557
Prefixes being announced from the RIPE address blocks:35302
Unique aggregates announced from the RIPE address blocks: 23164
RIPE Region origin ASes present in the Internet Routing Table: 8177
RIPE Region origin ASes announcing only one prefix:4288
RIPE Region transit ASes present in the Internet Routing Table:1359
Average RIPE Region AS path 

Re: Who wants to be in charge of the Internet today?

2006-06-23 Thread ennova2005-nanog
Now we are all allowed the occasional fun at the management lacking a clue - but come on. The users have an expectation that their "access to the Internet" works like a utility. When you say the "power is shut off" you don't expect to expand on whether the power grid in your state had a cascading failure but people on the other coast still have power and when your "water supply is shut off" does not mean that all the people in the world can't get a drop.It just means that her "Internet is off" and as far as she is concerned the whole Internet/Power/Water supply might as well be "off"p.s768 OC-192s worth of Internet traffic can indeed be carried on a single DS1 if the "Internet is off "
 :-)- Original Message From: Peter Ferrigan [EMAIL PROTECTED]To: nanog@merit.eduSent: Friday, June 23, 2006 7:04:18 AMSubject: Re: Who wants to be in charge of the Internet today?At one of my old jobs, my boss honestly believed that we had a 'switch' that turned the entire internet off or on.When she was having problems accessing her shopping sites, she'd storm in the office and say something like 'did you guys turn the the internet off again?'sighThen again, this is the same person that tried to tell me that 768 OC-192s are carried on a single DS1..- PeterOn Fri, 23 Jun 2006, Patrick W. Gilmore wrote: On Jun 23, 2006, at 12:45 AM, Sean Donelan wrote: I shudder to think what would happen under large
 scale attack if one of the  CEOs in that room had "responsibility" for the correct functioning of the  "Internet". This definitely falls into the "Just Doesn't Get It" category. --  TTFN, patrick

Re: Who wants to be in charge of the Internet today?

2006-06-23 Thread Steven Champeon

on Fri, Jun 23, 2006 at 11:23:44AM -0700, [EMAIL PROTECTED] wrote:
 The users have an expectation that their access to the Internet
 works like a utility. When you say the power is shut off you don't
 expect to expand on whether the power grid in your state had a
 cascading failure but people on the other coast still have power and
 when your water supply is shut off does not mean that all the people
 in the world can't get a drop.
 
 It just means that her Internet is off and as far as she is
 concerned the whole Internet/Power/Water supply might as well be off

Yep.

I eventually just trained myself into hearing my Internet access when
I heard the Internet from someone who doesn't know what the Internet
is.

e.g.,

 s/Is the Internet down?/Is my Internet access down?/

YMMV,
Steve

-- 
hesketh.com/inc. v: +1(919)834-2552 f: +1(919)834-2553 w: http://hesketh.com/
antispam news, solutions for sendmail, exim, postfix: http://enemieslist.com/
rambling, amusements, edifications and suchlike: http://interrupt-driven.com/


RE: key change for TCP-MD5

2006-06-23 Thread Barry Greene (bgreene)

 

 If DOS is such a large concern, IPSEC to an extent can be 
 used to mitigate against it. And IKEv1/v2 with IPSEC is not 
 the horribly inefficient mechanism it is made out to be. In 
 practice, it is quite easy to use.

IPSEC does nothing to protect a network device from a DOS attack. You
know that.

DOS prevention on a network device needs to happen before the TCP/Packet
termination - not the Key/MD5/IPSEC stage. The signing or encrypting of
the BGP message protects against Man in the Middle and replay attacks -
not DOS attacks. Once a bad packet gets terminated, your DOS stress on
the router kicks in (especially on ASIC/NP routers). The few extra CPU
cycles it takes for walking through keys or IPSEC decrypt are irrelevant
to the router's POV. You SOL if a miscreant can get a packet through
your classification  queuing protections on the router and have it
terminated. 

The key to DOS mitigation on a network device is to have many fields in
the packet to classify as possible before the TCP/Packet termination.
The more you have to classify on, the more granular you can construct
your policy. This is one of the reasons for GTSM - which adds one more
field (the IP packet's TTL) to the classification options. 

Yes Jared - our software does the TTL after the MD5, but the hardware
implementations does the check in hardware before the packet gets punted
to the receive path. That is exactly where you need to do the
classification to minimize DOS on a router - as close to the point where
the optical-electrical-airwaves convert to a IP packet as possible.


RE: key change for TCP-MD5

2006-06-23 Thread Bora Akyol

 

 -Original Message-
 From: Barry Greene (bgreene) [mailto:[EMAIL PROTECTED] 
 Sent: Friday, June 23, 2006 11:50 AM
 To: Bora Akyol; Ross Callon; nanog@merit.edu
 Subject: RE: key change for TCP-MD5
 
  
 
  If DOS is such a large concern, IPSEC to an extent can be used to 
  mitigate against it. And IKEv1/v2 with IPSEC is not the horribly 
  inefficient mechanism it is made out to be. In practice, it 
 is quite 
  easy to use.
 
 IPSEC does nothing to protect a network device from a DOS 
 attack. You know that.
 

Barry

The validity of your statement depends tremendously on how IPSEC is
implemented.

Bora



Re: key change for TCP-MD5

2006-06-23 Thread Todd Underwood



On Fri, Jun 23, 2006 at 11:49:33AM -0700, Barry Greene (bgreene) wrote:

 Yes Jared - our software does the TTL after the MD5, but the hardware
 implementations does the check in hardware before the packet gets punted
 to the receive path. That is exactly where you need to do the
 classification to minimize DOS on a router - as close to the point where
 the optical-electrical-airwaves convert to a IP packet as possible.

i'm not that bright, so maybe i'm missing something, but i've heard
this claim from cisco people before and never understood it.

just to clarify:  you're saying that doing the (expensive) md5 check
before the (almost free) ttl check makes sense because that
*minimizes* the DOS vectors against a router?  can someone walk me
through the logic here using small words?  i am obviously not able to
follow this due to my distance from the
optical-electrical-airwaves. 

t.


-- 
_
todd underwood +1 603 643 9300 x101
renesys corporationchief of operations  security 
[EMAIL PROTECTED]   
http://www.renesys.com/blog/todd.shtml


Re: key change for TCP-MD5

2006-06-23 Thread Valdis . Kletnieks
On Fri, 23 Jun 2006 13:35:20 PDT, Bora Akyol said:

 The validity of your statement depends tremendously on how IPSEC is
 implemented.

If 113 million packets all show up at once, you're going to get DoS'ed,
whether or not you have IPSEC enabled.


pgpRRK8AbWIKX.pgp
Description: PGP signature


Re: key change for TCP-MD5

2006-06-23 Thread Richard A Steenbergen

On Fri, Jun 23, 2006 at 04:43:29PM -0400, Todd Underwood wrote:
 
 On Fri, Jun 23, 2006 at 11:49:33AM -0700, Barry Greene (bgreene) wrote:
 
  Yes Jared - our software does the TTL after the MD5, but the hardware
  implementations does the check in hardware before the packet gets punted
  to the receive path. That is exactly where you need to do the
  classification to minimize DOS on a router - as close to the point where
  the optical-electrical-airwaves convert to a IP packet as possible.
 
 i'm not that bright, so maybe i'm missing something, but i've heard
 this claim from cisco people before and never understood it.
 
 just to clarify:  you're saying that doing the (expensive) md5 check
 before the (almost free) ttl check makes sense because that
 *minimizes* the DOS vectors against a router?  can someone walk me
 through the logic here using small words?  i am obviously not able to
 follow this due to my distance from the
 optical-electrical-airwaves. 

As I parsed Barry's post, he was saying that Cisco currently does the 
wrong thing today, but that some day when they actually support doing the 
check in hardware, that will be the right place to do it. (aka duh :P)

Obviously in a perfect world, you don't want to do the expensive MD5 check 
anywhere sooner than the last possible moment before you declare the data 
valid and add it to the socket buffer. I assume that the reason they can't 
do the check sooner in software is they lack a mechanism to tell the IP or 
even TCP input code we want to discard these packets if they are less 
than TTL x. They probably can't make that decision until the packet gets 
validated by TCP and makes it all the way to BGP code.

But, they should still be able to do all of the TCP layer checks which 
don't require outside information, such as matching the segment to a 
proper TCB by ip/port/seq #, before doing the MD5 calculation. This makes 
DoS against MD5 where you don't know the full L4 port #'s and the seq # 
pretty impossible on its own, without needing to involve the TTL hack.

-- 
Richard A Steenbergen [EMAIL PROTECTED]   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)


RE: key change for TCP-MD5

2006-06-23 Thread Bora Akyol

Assumptions, assumptions.

If your IPSEC is being done in hardware and you have appropriate QoS
mechanisms
in your network, you will probably not be able to pass your best effort
traffic but the rest should be OK.

Can we get back to the regularly scheduled programming
instead of throwing big numbers around?
 
Barry had a point, if you do IPSEC stupidly, it does not protect you.
If you pay attention to detail, it does help. It is not the panacea.

For the purpose of securing BGP, I think IPSEC is easy to configure (at
least on IOS which is what I'm used to), and will do the job. And for
this application, I don't see why cert's can't be used either.

Regards

Bora


 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
 Sent: Friday, June 23, 2006 1:46 PM
 To: Bora Akyol
 Cc: Barry Greene (bgreene); Ross Callon; nanog@merit.edu
 Subject: Re: key change for TCP-MD5
 
 On Fri, 23 Jun 2006 13:35:20 PDT, Bora Akyol said:
 
  The validity of your statement depends tremendously on how IPSEC is 
  implemented.
 
 If 113 million packets all show up at once, you're going to 
 get DoS'ed, whether or not you have IPSEC enabled.
 



Re: key change for TCP-MD5

2006-06-23 Thread Richard A Steenbergen

On Fri, Jun 23, 2006 at 05:01:00PM -0400, Richard A Steenbergen wrote:
 
 Obviously in a perfect world, you don't want to do the expensive MD5 check 
 anywhere sooner than the last possible moment before you declare the data 
 valid and add it to the socket buffer. I assume that the reason they can't 
 do the check sooner in software is they lack a mechanism to tell the IP or 
 even TCP input code we want to discard these packets if they are less 
 than TTL x. They probably can't make that decision until the packet gets 
 validated by TCP and makes it all the way to BGP code.

Actually I take that back, it should be easy enough to configure a minimum 
TTL requirement on the TCB through a socket interface. Obviously they're 
doing something to pass the IP TTL data outside of its normal in_input() 
function (or whatever passes for such on IOS), so if you've got that data 
avilable in the tcp_input() code you should be able to do the check after 
you find your TCB but before the MD5 check, yes?

Since there hasn't been an IOS source code leak in a while, does someone 
from Cisco who actually knows how this is implemented want to comment so 
we can stop guessing? :)

-- 
Richard A Steenbergen [EMAIL PROTECTED]   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)


Re: key change for TCP-MD5

2006-06-23 Thread Roland Dobbins



On Jun 23, 2006, at 2:02 PM, Bora Akyol wrote:


If your IPSEC is being done in hardware and you have appropriate QoS
mechanisms in your network, you will probably not be able to pass  
your best effort

traffic but the rest should be OK.


Unless the DoS is within the IPSEC tunnel and crowds out the good  
traffic.


;

Your original post seemed to imply that IPSEC is an anti-DoS  
mechanism, as does the statement 'If you pay attention to detail, it  
does help.'  IPSEC is not an anti-DoS mechanism at all, it's  
important to be clear about that.


--
Roland Dobbins [EMAIL PROTECTED] // 408.527.6376 voice

 Everything has been said.  But nobody listens.

   -- Roger Shattuck





Re: key change for TCP-MD5

2006-06-23 Thread Iljitsch van Beijnum


On 24-jun-2006, at 0:43, Owen DeLong wrote:

Why couldn't the network device do an AH check in hardware before  
passing

the
packet to the receive path?  If you can get to a point where all  
connections

or traffic TO the router should be AH, then, that will help with DOS.


If you care that much, why don't you just add an extra loopback  
address, give it an RFC 1918 address, have your peer talk BGP towards  
that address and filter all packets towards the actual interface  
address of the router?


The chance of an attacker sending an RFC 1918 packet that ends up at  
your router is close to zero and even though the interface address  
still shows up in traceroutes etc it is bullet proof because of the  
filters.


(This works even better with IPv6 link local addresses, those are  
guaranteed to be unroutable.)


Re: key change for TCP-MD5

2006-06-23 Thread Patrick W. Gilmore


On Jun 23, 2006, at 7:17 PM, Iljitsch van Beijnum wrote:

On 24-jun-2006, at 0:43, Owen DeLong wrote:

Why couldn't the network device do an AH check in hardware before  
passing

the
packet to the receive path?  If you can get to a point where all  
connections

or traffic TO the router should be AH, then, that will help with DOS.


If you care that much, why don't you just add an extra loopback  
address, give it an RFC 1918 address, have your peer talk BGP  
towards that address and filter all packets towards the actual  
interface address of the router?


The chance of an attacker sending an RFC 1918 packet that ends up  
at your router is close to zero and even though the interface  
address still shows up in traceroutes etc it is bullet proof  
because of the filters.


Why is this better than using the TTL hack?  Which is easier to  
configure, and at least as secure.


--
TTFN,
patrick


Re: Who wants to be in charge of the Internet today?

2006-06-23 Thread Michael . Dillon

 The Business Roundtable, composed of the CEOs of 160 large U.S. 
companies,
 said neither the government nor the private sector has a coordinated 
plan
 to respond to an attack, natural disaster or other disruption of the
 Internet. While individual government agencies and companies have their
 own emergency plans in place, little coordination exists between the
 groups, according to the study.

I don't believe that this is entirely true. I think that
there is a lot of coordination between companies at an
industry level, for instance the automotive industry or
the financial services industry. This coordination doesn't
get much visibility outside of the industry concerned
but that doesn't mean that it isn't there. In fact, I
strongly suspect that visibility of this coordination
does not often reach the CEO level in these companies
because much of the coordination is between specialist
groups within the companies. Does your CEO know that
you participate in NANOG?

One might even venture to suggest that there is no
point in coordinating emergency plans between companies
who have little or no direct business relationships
unless it is at a metropolitan level, i.e. New York
area businesses, Los Angeles area businesses. After 
all, why should NY businesses plan for earthquakes
and why should LA plan for a hurricane?

--Michael Dillon



Re: Who wants to be in charge of the Internet today?

2006-06-23 Thread Jake Khuon

### On Fri, 23 Jun 2006 09:09:19 -0700, Warren Kumari [EMAIL PROTECTED]
### casually decided to expound upon Jason Gauthier [EMAIL PROTECTED]
### the following thoughts about Re: Who wants to be in charge of the
### Internet today?:

WK My favorite was always the (potential) customers who would call up  
WK and ask Can I get the Internet in my house? -- I would always  
WK answer That depends, how big is your house?, but they NEVER got  
WK it...

They have the Internet on computers now!? - Homer Simpson


--
/*===[ Jake Khuon [EMAIL PROTECTED] ]==+
 | Packet Plumber, Network Engineers /| / [~ [~ |) | | --- |
 | for Effective Bandwidth Utilisation  / |/  [_ [_ |) |_| N E T W O R K S |
 +=*/


Multihomed to 2 ISPs - Load Balance?

2006-06-23 Thread John Smith

Hi Fellow Nanogers:
 
I searched the archives and could not find anything that really matches with my 
requirement. I have been stalking this mailing list since quite some time and 
its extremely rare that i post.
 
We are multihomed and connected to the Internet via two upstream providers. The 
initial idea was to get more bandwidth and redundancy. Now, we're past this 
stage and want to try out something different.
 
Please note that we also provide transit services to a few downstream providers.
 
We wish to load balance the traffic for a block/range of IP addresses that we 
learn via BGP4 from our two upstream providers. The problem is that my favorite 
vendor does not let me install ECMP routes in case of routes learnt from 
extrnal BGP peers. Assuming that we are able to install EBGP ECMP routes, how 
do we advertise this information to our downstream peers? As far as my working 
knowledge of BGP4 goes, it wouldnt let me do this.
 
I wish to understand how other network operators do this?
 
You can, if you wish, send me a message offline and i will collate all the 
information that i receive and send out a consolidated reply for the benefit of 
others to this mailing list.
 
Thanks,
John