Re: Interesting new spam technique - getting a lot more popular.

2006-06-14 Thread Erik Haagsman

On Wed, 2006-06-14 at 05:28 +, Edward B. DREGER wrote:
> CLM> Date: Wed, 14 Jun 2006 04:46:31 + (GMT)
> CLM> From: Christopher L. Morrow
> 
> CLM> is it really that hard to make your foudry/extreme/cisco l3 switch vlan
> CLM> and subnet???
> 
> Of course not.
> 
> 
> CLM> Is this a education thing or a laziness thing?
> 
> Both.

And in some cases even a nasty fincancial thing. Billing customers extra
datatraffic due to a large amount of broadcast traffic (especially when
running badly configured Win32 servers) inside a single /23 or even /22
in one large VLAN is sadly still the case for some hosters. 


-- 
---
Erik Haagsman
Network Architect
We Dare BV
Tel: +31(0)10-7507008
Fax: +31(0)10-7507005
http://www.we-dare.nl




Re: cogent+ Level(3) are ok now

2005-11-02 Thread Erik Haagsman

On Tue, 2005-11-01 at 18:48 -0500, [EMAIL PROTECTED] wrote:
> On Tue, 01 Nov 2005 11:46:20 EST, John Payne said:

> > What am I missing? 
> 
> Obviously, the same thing that management at SBC is missing:



> He argued that because SBC and others have invested to build high-speed
> networks, they are due a return.
> 
> "There's going to have to be some mechanism for these people ... to pay for 
> the
> portion they're using. Why should they be allowed to use my pipes?" He offered
> no details how his idea could be accomplished.
> 
> For an Internet company to "expect to use these pipes free is nuts!" Whitacre
> added for good measure.



Sounds like an extremely short-sighted view of the Net and it's
economics. Claiming content providers should be charged for "using"
broadband access-pipes is fine and dandy, but coveniently forgetting
that without content there probably wouldn't be a great deal of
customers wanting broadband in the first place is a bit sloppy, no?

Erik


-- 
Erik Haagsman
Network Architect
We Dare BV
tel: +31.10.7507008
fax: +31.10.7507005

http://www.we-dare.nl



Re: multi homing pressure

2005-10-19 Thread Erik Haagsman

On Wed, 2005-10-19 at 12:03 -0400, Patrick W. Gilmore wrote:
> For the customer with an Internet "mission critical app", being tied  
> to a Tier 2 has it's own set of problems, which might actually be  
> worse than being tied to a Tier 1.

I think this is largely dependant on the specific topology and
redundancy in the Tier-2's network and the way they provide multiple
uplinks. When done well, with uplinks spread over separate physical
locations, well thought out IP adressing and de-centralised exits from
the Tier-2's network out to multiple Tier-n's, there's usually a benefit
to multi-homed connections to a Tier-2 rather than a Tier-1, with
minimum capacity and pricing being the most important ones.

-- 
---
Erik Haagsman
Network Architect
We Dare BV
Tel: +31(0)10-7507008
Fax: +31(0)10-7507005
http://www.we-dare.nl




RE: SNMP "Accounting" Software

2005-10-11 Thread Erik Haagsman

Cacti does the job graphically extremely well (best rrd front-end ever
IMO), but it has no actual reporting tools and it's all rrd based so not
extremely handy for long-term accounting and historical data. The 95%
and accumulated datatraffic ar generated by the interface, not stored in
the actual rra's itself. In terms of reporting there's nothing there
really, it's just poll -> store in rra -> graph

Erik

On Tue, 2005-10-11 at 09:32 -0700, McNamara, Colin wrote:
> I would recommend using Cacti for interface speed monitoring.
> 
> It is available at www.cacti.net
> 
>  
> 
> --Colin
> 
>  
> 
>
> __
> 
> 
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf
> Of Drew Weaver
> Sent: Tuesday, October 11, 2005 9:21 AM
> To: nanog@merit.edu
> Subject: SNMP "Accounting" Software
> 
> 
>  
> 
> We need some fairly complex SNMP accounting software (data
> center) style stuff that can monitor cisco equipment for bandwidth
> utilization and generate reports based on 95th percentile and also
> perhaps even their actual bandwidth usage (how many gigs of transfer
> they use per month, day, week.. etc) Does anyone know of anything good
> that does anything like this? It needs to be reliable? Can be open
> source, we’re using MRTG to track utilization but we need something
> that really handles “accounting” for us.
> 
>  
> 
> Thanks,
> 
> -Drew
> 
> 
-- 
---
Erik Haagsman
Network Architect
We Dare BV
Tel: +31(0)10-7507008
Fax: +31(0)10-7507005
http://www.we-dare.nl




Re: Regulatory intervention

2005-10-07 Thread Erik Haagsman

On Fri, 2005-10-07 at 13:32 -0400, Todd Vierling wrote:
> On Fri, 7 Oct 2005, Erik Haagsman wrote:
> > Ahhhthey feel they shouldn't sensor, and there I was thinking that
> > was Google's task in life. Very generous and what a great idea for new
> > laws that firmly put the blame on anyone but Google.
> 
> That wasn't my reason for citing it.  Neither Google *nor* intermediaries
> should be responsible for illegal content -- to them, it's just bits moving.
> 
> The only responsibility that *either* one should bear is the ability to
> provide an audit trail to the real culprit, no more.

Correct. Holding a dial-up ISP responsible for content on one of it's
customer's machines (or perhaps even a warez server on the other side of
the globe?) is complete nonsense. Having them provide forensic info is
another (more sensible) matter.

-- 
---
Erik Haagsman
Network Architect
We Dare BV
Tel: +31(0)10-7507008
Fax: +31(0)10-7507005
http://www.we-dare.nl




Re: Regulatory intervention

2005-10-07 Thread Erik Haagsman

On Fri, 2005-10-07 at 11:21 -0400, Todd Vierling wrote: 
> Another snippet from same article:
> 
> =
> Google will also push for laws that make ISPs and intermediaries liable for
> the content contained on their servers. Google just indexes the information,
> the search engine argued, and feels it is not its place to censor
> information contained throughout the Web.
> =
> 
> Well, isn't that "fun"?

Ahhhthey feel they shouldn't sensor, and there I was thinking that
was Google's task in life. Very generous and what a great idea for new
laws that firmly put the blame on anyone but Google.

-- 
---
Erik Haagsman
Network Architect
We Dare BV
Tel: +31(0)10-7507008
Fax: +31(0)10-7507005
http://www.we-dare.nl




Re: Regulatory intervention

2005-10-07 Thread Erik Haagsman

On Fri, 2005-10-07 at 14:56 +0100, [EMAIL PROTECTED] wrote:

> Laws only need to be enforced when there is a dispute.
> Laws and regulations, do not necessarily imply that
> enforcement action is needed. Many people and organizations
> comply with laws for reasons other than the existence of
> enforcers. For instance, an organization may feel that it
> is in the industry's best interests to comply with regulations
> and therefore it does so in order to set an example for
> its competitors and to attract customers.
> 
> Regulations also do not imply the involvement of governments.
> It is possible for industries to self-regulate such as the
> ARIN policies which are a product of the ARIN membership,
> i.e. companies who use IP addresses in their networks.

Very good point and IMHO the preferred way of dealing with these kinds
of issues without the overhead of specific legislation and often
stifling governmental intervention. The approach you outline below seems
very plausible, with a regulatory organisation of some sort driven by
the industry itself protecting both ourselves as well as our customers
from idiocy like the whole Cogent/L(3) thing. It would improve both
better interconnections and network coverage (and thus network quality
IMO) as well as more transparency in peering and interconnection
relations. Both good things for end-users and xSP's alike.

> If the press would truly understand this event then they would
> be reporting this as a *MAJOR* flaw in the business model of 
> the largest ISPs. The absence of regulation in Internet peering
> allows this type of situation to come about. It is my opinion
> that the network and the Internet business would both be stronger
> if there was some regulation of peering and IP/MPLS network 
> interconnection. 
>
> This could be done in a couple of ways. One is to have an industry
> association develop self-regulation in conjunction with major end
> users of network services. The other would be for regulation to be
> imposed from without by some kind of interconnect or monitoring
> business like Equinix or Keynote. The analogy here is the New York
> Stock Exchange which is a 3rd party which monitors and interconnects
> the buyers and sellers of shares. In the case of Internet operators
> I don't foresee the need for an SEC equivalent unless operators
> cannot agree to disclose their peering agreements and the technical
> details of their interconnects.
> 
> A couple of good things can come out of this "open peering" model.
> One is that disclosure of the technical details, including packet
> drop, buffer consumption, and bandwidth, would lead to more reliable
> interconnects and the ability to provide quality of service SLAs 
> across provider networks. The other possible benefit is to develop
> more sophisticated interconnect variants such as MPLS VPN interconnects
> and CDN or multicast interconnects.
> 
> --Michael Dillon
> 
-- 
---
Erik Haagsman
Network Architect
We Dare BV
Tel: +31(0)10-7507008
Fax: +31(0)10-7507005
http://www.we-dare.nl




Re: Regulatory intervention (Redux: Who is a Tier 1?)

2005-10-07 Thread Erik Haagsman

On Fri, 2005-10-07 at 07:44 -0400, William Allen Simpson wrote:

> I repeat my initial assertion, to wit:
>  >> This partitioning is exactly what we predicted in many meetings when
>  >> discussi[ng] the terms of the contracts.
>  >>
>  >> Markets are inefficient for infrastructure and tend toward monopoly.
> 
> When the "internal policies" -- which in this case are not technical,
> but rather commercial advantage -- are against public policy, that is
> the realm of governments.

So we want to revert to a model where the goverment starts influencing
company policy based on what criteria...? Networks are commercial
endeavours by default, since they cost money to run and need to generate
revenue stay in existence, at least last time I checked. Unless you'd
like the entire Internet to be under governmental control I don't see
how you'd want a government to enforce any policy. This sounds very much
like trying to turn ISP's into semi-public companies, which they're not
and IMO shouldn't be.

> > One
> > network only peers with a select few, the other only on basis of
> > bandwidth profile and some with as many peers as possible. Without one
> > telling the other what to do or someone sitting behind a desk trying to
> > come up with a Grand Unified Peering Policy that everyone should adhere
> > to. Fine by me.
> > 
> I'm afraid your head-in-the-sand approach doesn't appear to be working
> well at this time.  Major network partition, affecting thousands of
> networks and tens (or hundreds) of thousands of actual people, 48 hours
> and counting.

This is definitely a bad thing but not a problem for governments to
solve. Bringing the government to the table will create more problems
than solve them.

> Moreover, I thought it might be worthwhile to check what you might have 
> posted previously, and found that you started posting on NANOG in 2004,
> during another L(3) partition. 

Glad you take an interest.

>  Methinks thou doeth protest too much.

Perhaps, but I'd like companies and market forces to solve these
problems, not governments. ISP's are free to choose (multiple) upstreams
they wish for, people are free to choose whichever ISP they want, and
SLA's and contracts *should* be there to protect people from stupidity
like this Cogent/L(3) pissing contest.

> I'm not entirely sure that you are a shill for L(3), but please explain
> your personal interest?  Especially as a Northern European posting on a
> North American operator's list?

I never knew I was Swedish, but thanks for telling me.
We've got L(3) as one of our transits, so I do take an interest. Most of
my larger upstreams are fully or partly NA based and we send quite a bit
of traffic to these parts so I *thought* I'd follow the list and pitch
in when I felt like doing so. 


-- 
---
Erik Haagsman
Network Architect
We Dare BV
Tel: +31(0)10-7507008
Fax: +31(0)10-7507005
http://www.we-dare.nl




Re: Regulatory intervention (Redux: Who is a Tier 1?)

2005-10-07 Thread Erik Haagsman

On Thu, 2005-10-06 at 12:44 -0400, William Allen Simpson wrote:
> Erik Haagsman wrote:
> > On Thu, 2005-10-06 at 11:56 -0400, William Allen Simpson wrote: 
> >>This partitioning is exactly what we predicted in many meetings when
> >>discussion the terms of the contracts.
> >>
> >>Markets are inefficient for infrastructure and tend toward monopoly.
> > 
> > 
> > How does replacing non-profit organisations (which most public IX'es
> > are) with government bodies and governmental legislation improve
> > anything...?
> > 
> Government _is_ a non-profit organization, with generally broader
> representation.
> 
> How does replacing a representative government with a smaller feudal
> organization improve anything?

The current status quo has IX's in the hands of private but open
organisations, run by it's members. Replacing govermental organisations
by now is purely hypothetical, it's already happened and in most
countries outside the US there never were government controlled IX's for
IMO very good reasons, with member's freedom to formulate their own
policies as number one.

> >>Idiot laissez-faire pseudo-libertarians forget that all markets require
> >>regulation and politics.
> > 
> > 
> > But why government regulated instead of IX member regulated...?
> > 
> Because as much as it's best not to rely on thugs with guns, I really
> don't want the thugs with guns to be private armies.

Ah yes, we want public armies with guns to rely on, just like we rely on
them at the moment regulating software patents, ISP and telco data
tapping, all those nifty little ideas that make our lives so much
better.


-- 
---
Erik Haagsman
Network Architect
We Dare BV
Tel: +31(0)10-7507008
Fax: +31(0)10-7507005
http://www.we-dare.nl




Re: Regulatory intervention (Redux: Who is a Tier 1?)

2005-10-07 Thread Erik Haagsman

On Thu, 2005-10-06 at 14:51 -0400, William Allen Simpson wrote:

> >>  Cogent, Open
> >>  Level(3), Not public
> >>  We Dare B.V., Open
> >>
> >> So, what did your member organization do to resolve this partition.  
> >> Cut off Level(3)?  Sue them?
> > 
> > 
> > That particular member organisation has a policy of not interfering with 
> > its members' peering policies.  It expects its members to send packets 
> > only to people who explicitly asked for it over the shared 
> > infrastructure (via announcements of prefixes via BGP), and to pay their 
> > bills on time.
> > 
> Arguably a very good thing.  IXs shouldn't be in the "enforcement"
> business.  That's for governments.

Exactly the reason I don't want governments anywhere near an IX. Every
network connected to an IX should be allowed to enforce it's own
internal policies when connecting with other networks *without* a
governmental body trying to enforce certain rules and regulations. One
network only peers with a select few, the other only on basis of
bandwidth profile and some with as many peers as possible. Without one
telling the other what to do or someone sitting behind a desk trying to
come up with a Grand Unified Peering Policy that everyone should adhere
to. Fine by me.

> (As you will remember, I was refuting his generalization that "private"
> organizations are somehow preferable to "public" organizations.  It has
> always been my preference to argue with specifics in hand.)

I never generalised, I merely pointed out that creating governmental
IX's has nog benefits compared to the current IX's. AMS-IX, DE-CIX,
LINX, etc. etc are open to everyone wanting to connect, that's public
enough for me, without having to be goverment controlled. 


-- 
---
Erik Haagsman
Network Architect
We Dare BV
Tel: +31(0)10-7507008
Fax: +31(0)10-7507005
http://www.we-dare.nl




Re: Regulatory intervention (Redux: Who is a Tier 1?)

2005-10-06 Thread Erik Haagsman

On Thu, 2005-10-06 at 11:56 -0400, William Allen Simpson wrote:
> J. Oquendo wrote:
> 
> > Let me be the punching bag for pondering this on NANOG... What about the
> > roles of governments building a consortium with Teir-1 NSP's where those
> > backbone Tiers are regulated and have predefined, strictly enforced
> > rulesets they'd have to follow. The irony of this is that it sounds both
> > like a nightmare and a dream.
> > 



> This partitioning is exactly what we predicted in many meetings when
> discussion the terms of the contracts.
> 
> Markets are inefficient for infrastructure and tend toward monopoly.

How does replacing non-profit organisations (which most public IX'es
are) with government bodies and governmental legislation improve
anything...?

> Idiot laissez-faire pseudo-libertarians forget that all markets require
> regulation and politics.

But why government regulated instead of IX member regulated...?


-- 
---
Erik Haagsman
Network Architect
We Dare BV
Tel: +31(0)10-7507008
Fax: +31(0)10-7507005
http://www.we-dare.nl




Re: Public Works Peering

2005-10-06 Thread Erik Haagsman

On Thu, 2005-10-06 at 10:26 -0400, J. Oquendo wrote:

> Now that I had time to marinate weird ideas even further, this is how my
> previous idea `could` work for all parties. Of course those making
> financial decisions would likely hate this idea since it would somehow
> manage to "hurt" their business in their eyes...
> 
> States (or countries) would create a massive public NAP which would be
> peered in each state. Guaranteed not to go down. Well 99.9% (snicker)
> guaranteed not to falter. This network would be funded by taxpayer dollars
> and anyone wanting to peer would pay solely enough to maintain this NAP.

Marinate and weird are certainly . How is this radically different from
current public NAPs, funded by their members without profit as the main
driving force and what good would it do? Dragging governments to places
we'd normally wouldn't want them? Please let this idea rest in pieces.

Cheers,

Erik


-- 
---
Erik Haagsman
Network Architect
We Dare BV
Tel: +31(0)10-7507008
Fax: +31(0)10-7507005
http://www.we-dare.nl




Re: Hope this isnt a redundant question : Cisco IOS Netflow analysis mechanisms?

2005-09-26 Thread Erik Haagsman

On Mon, 2005-09-26 at 11:42 -0700, Will Yardley wrote:
> On Mon, Sep 26, 2005 at 02:37:00PM -0400, Drew Weaver wrote:
> 
> > We're looking for a method of actively monitoring certain
> > metrics on our network via software or a somewhat inexpensive hardware
> > solution (those metrics being which AS numbers are the highest
> > destinations for our network) and information like that which will help
> > us with capacity planning. We are looking for suggestions if anyone has
> > any real-world knowledge of anything that would tell us for example:
> > 
> > 8% of our traffic is destined to AS 2828 (XO communications) etc.
> 
> I've found ntop (along with exported flow data) fairly useful for stuff
> like this.

ntop is pretty useful but I'd go with flow-tools if you want a far more
powerful yet simple base to build a toolset on. The whole flow-
capture/flow-report/flow-nfilter tool-chain alone allows you to write
little scripts for text only reports telling you just about anything you
like as fine grained as you want in a matter of hours (or perhaps
minutes if you're a fast man-page reader and comfortable with a *nix
command-line ;-) and the output is easily parsible in any kind of
scripting language. It also comes with a patched FlowScan including
CUFlow/CampusIO/SubnetIO to work with flow-capture instead of cflowd, so
depending on your exact needs you might be able to use that out of the
box or with reasonably basic changes to the (well documented) FlowScan
perl scripts. Take the type of info you're looking for into account
before setting up exporting flows from your routers and collecting them
on a server. NetFlow V8 uses aggregation on a specific key (AS number,
source prefix, destination prefix, etc.) to decrease flow-file size, but
it's a rather lossy format compared to the detailed information inside
NetFlow V5. If you're not sure yet which metrics you'll be looking for
always collect NetFlow V5 to prevent ending up with flows that don't
contain the information you might need in the future.

Hope this helps, 

Erik


-- 
Erik Haagsman
Network Architect
We Dare BV
tel: +31.10.7507008
fax: +31.10.7507005

http://www.we-dare.nl



Re: Tools classifying network traffic to applications

2005-09-22 Thread Erik Haagsman

Google for FlowScan and CUFlow

On Thu, 2005-09-22 at 18:11 +0800, Joe Shen wrote:
> Hi,
> 
> As I know there is tools designed to analyze VoIP
> traffic, but for viewpoint of traffic management this
> is not enough. Is there tool which could classify
> network traffic to its applications?
> 
> e.g. the tools catch network traffic and recognize its
> application type automatically. If 80% of (80/tcp) is
> web browsing (tcp/80) is recognized as WEB browsing;
> if 80% of (1234/tcp) is Edonky, it is recognized as
> Edonkey application. 
> 
> Joe
> 
> Send instant messages to your online friends http://asia.messenger.yahoo.com 
-- 
---
Erik Haagsman
Network Architect
We Dare BV
Tel: +31(0)10-7507008
Fax: +31(0)10-7507005
http://www.we-dare.nl




Re: Boing Boing: Michael Lynn's controversial Cisco security presentat ion

2005-07-29 Thread Erik Haagsman

On Fri, 2005-07-29 at 19:06, Daniel Golding wrote:

> I hope the leadership at Cisco reflects on this incident and will utilize
> different tactics the next time this happens. Similarly, I hope the
> cybersecurity folks in our governments realize that, while a strong
> relationship with vendors is essential, they must recognize that vendors
> have different goals than they do.

Perhaps more importantly, ISS should try to get it's act together and
realise they let a highly skilled and motivated researcher go over
political issues that should have never influenced a true security
driven company in their decision making. 
How on earth are you gonna try to maintain the image of an independent
security company after a clear case of politics and behind-the-scenes
shennenigans like these...?

Erik

-- 
---
Erik Haagsman
Network Architect
We Dare BV
tel: +31.10.7507008
fax: +31.10.7507005
http://www.we-dare.nl






Re: OSPF -vs- ISIS

2005-06-21 Thread Erik Haagsman

On Tue, 2005-06-21 at 09:04 -0500, Dan Evans wrote:
> Can anyone point me to information on what the top N service providers
> are using for their IGP? I'm trying to build a case for switching from
> OSPF to IS-IS.

Why are you trying to build a case...? Would you already have
operational benefit from switching and are you building a case round
that and if not, why switch...? Switching IGP in a non-trivial network
isn't something you'd want to do unless you've got a clear motive and it
gives you some operational advantage...

Cheers,

-- 
---
Erik Haagsman
Network Architect
We Dare BV
Tel: +31(0)10-7507008
Fax: +31(0)10-7507005
http://www.we-dare.nl




Nortel

2005-01-14 Thread Erik Haagsman

Looking for some advice regaring Nortel Optera SW versions and SP
boards, please reply off-list (and no...not for free, hourly rate is no
prob :-)

Cheers,

-- 
---
Erik Haagsman
Network Architect
We Dare BV
tel: +31.10.7507008
fax: +31.10.7507005
http://www.we-dare.nl






Re: Proper authentication model

2005-01-13 Thread Erik Haagsman

On Wed, 2005-01-12 at 20:12, Daniel Golding wrote:
> 
> The biggest problem I've seen with dial-up OOB is reliability. You really
> need you really need to have a good series of testing scripts to ensure that
> all the phone lines are working, modems have reset properly, serial ports
> are ok, etc. Without this, reliability is low.

Although it's perhaps not as reliable as a series of dedicated cicruits
to connect various locations, I don't consider an ISDN router with it's
Ethernet port connected to a management ethernet port as an unreliable
solution. Modems and TA's perhaps, but a series of 2600's or similar
devices with basic rate interfaces on each location shouldn't be your
biggest worry at the moment you actually need them.

CHeers,

-- 
---
Erik Haagsman
Network Architect
We Dare BV
tel: +31(0)10 7507008
fax:+31(0)10 7507005
http://www.we-dare.nl




Re: Proper authentication model

2005-01-12 Thread Erik Haagsman

On Wed, 2005-01-12 at 12:37, David Gethings wrote:
> On Wed, 2005-01-12 at 12:25 +0100, Iljitsch van Beijnum wrote:
> > IPv6 is also very useful in providing non-IPv4 management.
> Well if we're offering protocols other than IP(v4) for OOB management
> then might I chip in with MPLS?

What ever happened to simple ISND or analogue dial-up with a small
router or modem attached...? Not very hi-tech en often quite slow, but
usually suffices for emergency maintenance and prolly as far apart from
the operational network as possible (provided your not using
transmission from the same telco that supplies the phone lines that is
;-)


-- 
---
Erik Haagsman
Network Architect
We Dare BV
tel: +31(0)10 7507008
fax:+31(0)10 7507005
http://www.we-dare.nl




Re: IBGP Question --- Router Reflector or iBGP Mesh

2005-01-12 Thread Erik Haagsman

On Wed, 2005-01-12 at 12:20, Iljitsch van Beijnum wrote:

> (Obviously the IGP metric will be different at the client, but the 
> client doesn't see the other routes, so it can't make a different 
> decision. The real fun starts when the next (intra-AS) hop isn't a 
> reflector client and the packet now takes a different path than the 
> reflector client thought it would take.)

Yep, policing IGP and i/eBGP route distribution correctly so traffic
flows logically through the best path over the network as seen from both
the RR clients as intra-AS hops further down the path can be a bit
challenging, though you'd want every non-RR router to be a RR client and
every RR to behave like an RR client to RR's in other clusters, so you'd
have a reasonably uniform view of the network. 

Cheers,


-- 
---
Erik Haagsman
Network Architect
We Dare BV
tel: +31(0)10 7507008
fax:+31(0)10 7507005
http://www.we-dare.nl




Re: IBGP Question --- Router Reflector or iBGP Mesh

2005-01-11 Thread Erik Haagsman

On Tue, 2005-01-11 at 13:09, Daniel Roesen wrote:
> One of the main problems of route reflection is that the best path
> decision is done centrally. The best route is not seen as from the
> router making the forwarding decision, but from the route reflector's
> point of view. Depending on network topology, geographic spread end
> peering/transit topo, this might/will have significant negative effects.

This is where good use of clusters and logical network design are
necessary, but I don't think this is a route-reflector specific problem,
more a general networking problem once your network starts groing and
you start deploying a more complex edge/core based topology. I don't
think this is a reason to not use reflection as oppossed to full mesh.

Cheers,

-- 
---
Erik Haagsman
Network Architect
We Dare BV
tel: +31(0)10 7507008
fax:+31(0)10 7507005
http://www.we-dare.nl




RE: IBGP Question --- Router Reflector or iBGP Mesh

2005-01-11 Thread Erik Haagsman

On Tue, 2005-01-11 at 02:03, Eric Kagan wrote: 
> 
> Does anyone have any input on when this does make sense ?  We have 3 Main IP
> pops with upstream BGP at each and 4 internal BGP sessions.  I am looking to
> add 2 new routers so there will be about 7 sessions on each border router.

This seems to be a case where it does make sense. If you set up two
route reflectors you could do with providing each border router only two
iBGP links. You could for instance split your network into two logical
clusters with 1 route reflector each and link the two route reflectors
so they bounce routes to each other as well and provide your border
routers with BGP links to both for good redundancy and a less complex
network layout. Transition isn't that hard really, assuming your border
routers already have iBGP links to the routers that will become
reflectors it's a matter of configuring the reflectors right and making
sure the border routers are connected as route reflector clients, and
then start tearing down the remaining sessions. This isn't the only
possible option using route reflector and full/partial mesh ofcourse and
you'll have to decide what works for your network, but route reflectors
would seem to be useful in your set-up.

Cheers,


-- 
---
Erik Haagsman
Network Architect
We Dare BV
tel: +31(0)10 7507008
fax:+31(0)10 7507005
http://www.we-dare.nl




RE: IBGP Question --- Router Reflector or iBGP Mesh

2005-01-07 Thread Erik Haagsman

On Sat, 2005-01-08 at 00:20, Robert Crowe wrote:
>   Yes, an iBGP session is possible between A & C. Route Reflectors
> main purpose was to reduce the iBGP full mesh requirement, thus
> providing for BGP scalability. If you only have 3 BGP speakers then
> there is no need, unless you are expecting BGP speaker growth. I
> would address the lack of redundancy for your BGP sessions.

Correct, route reflector's main advantage is scalability and if you're
thinking to evolve into a larger network with dedicated access and core
routers, route reflectors are a far better option than full mesh, though
perhaps not from the start. 
Redundancy is a good point, since in the route reflector diagram you
have a single route reflector with single sessions to your edges. If
iBGP link A-B goes down, the rest of your network looses 1 transit ISP
and customer 1 is cut off from the rest of your network, basically
leaving him with a default route out to ISP A and the rest of your
network having to rely on transit to reach your own customer. Also
depends on the actual physical paths to the customer ofcourse
(redundant?), but seems a bit risky, while customer 2 is looking a lot
safer.

Cheers,

Erik



-- 
---
Erik Haagsman
Network Architect
We Dare BV
tel: +31.10.7507008
fax: +31.10.7507005
http://www.we-dare.nl






Re: BIND + DLZ

2004-12-01 Thread Erik Haagsman

On Wed, 2004-12-01 at 20:24, Jeroen Massar wrote:
> That is called PowerDNS with a bind-backend ;)
> 

AFAIK PowerDNS is only able to use BIND zone files as a data back-end,
not a BIND DLZ database not to mention this will make PowerDNS the DNS
server instead of BIND, which is exactly what I want to move away from. 

Cheers,

-- 
---
Erik Haagsman
Network Architect
We Dare BV
tel: +31.10.7507008
fax: +31.10.7507005
http://www.we-dare.nl






Re: BIND + DLZ

2004-12-01 Thread Erik Haagsman

And while we're on the subject...anyone know a reliable web-based admin
front-end for BIND + DLZ + PostgreSQL...? Or does everybody just roll
their own...?

On Wed, 2004-12-01 at 19:17, Micah McNelly wrote:
> Nanog,
> 
> Does anyone have information on performance numbers comparing tinydns
> vs. bind w/ dlz patch?
> 
> Hit me up off-list.
> 
> /m
-- 
---
Erik Haagsman
Network Architect
We Dare BV
tel: +31.10.7507008
fax: +31.10.7507005
http://www.we-dare.nl






Re: "Make love, not spam"....

2004-11-29 Thread Erik Haagsman
I agree and I'm surprised you even mentioned the wordt justice...since 
when is retaliating bad practices with more bad practises that are 
hardly likely to take out the real target considered a good idea..?

Erik
Paul G wrote:
spammer buys hosting account, pays with fraudulent credit card, 
spams,provider gets ddos'ed and ends up paying for all the bandwidth 
because youcan't well charge some unsuspecting grandma in alabama for 
it. i don't likethis kind of justice.

---
paul galynin
 



Re: Energy consumption vs % utilization?

2004-10-26 Thread Erik Haagsman

It's more or less the truth though. Only on rare occasions, such as the
cluster/fail-over scenario given, can you actually supply less power to
certain machines, and power use largely unrelated to their actual
utilisation. Keep an eye on your UPS load during peak hours and you'll
see the load rising when traffic and server utilisation rises, but
compared to the baseline power needed to feed servers these fluctuations
are peanuts. 
You supply a server with enough power to run...how is this waste
exactly...? If anyone is wasting anything, it's perhaps hardware
manufacturers that don't design efficiently enough, but power that you
provide and that's used (and paid for) by your customers is not wasted
IMO.

Cheers,

Erik

On Tue, 2004-10-26 at 21:07, Alex Rubenstein wrote:
> Thats an insane statement.
> 
> Are you saying, "You are only wasting money on things if you aren't 
> profitable" ?
> 
> /action shakes head.
> 
> 
> 
> On Tue, 26 Oct 2004, james edwards wrote:
> 
> >
> >>
> >> Sorry, this is somewhat OT.
> >>
> >> I'm looking for information on energy consumption vs percent utilization.
> >> In other words if your datacenter consumes 720 MWh per month, yet on
> >> average your servers are 98% underutilized, you are wasting a lot of
> >> energy (a hot topic these days). Does anyone here have any real data on
> >> this?
> >>
> >> Grisha
> >
> > It is only waste is the P & L statement is showing no profit.
> >
> 
> -- Alex Rubenstein, AR97, K2AHR, [EMAIL PROTECTED], latency, Al Reuben --
> --Net Access Corporation, 800-NET-ME-36, http://www.nac.net   --
-- 
---
Erik Haagsman
Network Architect
We Dare BV
tel: +31(0)10 7507008
fax:+31(0)10 7507005
http://www.we-dare.nl




Re: Energy consumption vs % utilization?

2004-10-26 Thread Erik Haagsman

On Tue, 2004-10-26 at 19:52, Gregory (Grisha) Trubetskoy wrote:
> In other words if your datacenter consumes 720 MWh per month, yet on 
> average your servers are 98% underutilized, you are wasting a lot of 
> energy (a hot topic these days). 

Which means you have to make sure the revenue generated by those 98%
underutilized servers covers your powerbill and other expenses,
preferrably leaving some headroom for a healthy profit margin.
As long as that's the case there's no real waste of energy, the services
people run on their servers are supposed to be worth the energy and
other costs, whether they physically fully utilize their power or not.

Cheers,
-- 
---
Erik Haagsman
Network Architect
We Dare BV
tel: +31(0)10 7507008
fax:+31(0)10 7507005
http://www.we-dare.nl




Re: Blackhole Routes

2004-09-30 Thread Erik Haagsman

On Thu, 2004-09-30 at 15:45, Robert A. Hayden wrote:
> There are mechanisms to do it using eBGP and communities as well which I'm 
> sure most on this list are more familiar with.
> 
> Think of blackholing as a way to surgically remove a specific IP from your 
> network, without having to deal with pushing ACLs into multiple entry 
> points.  At least that's what it accomplishes for us.

And perhaps more importantly, when using eBGP blackholing communities,
without DDoS traffic hitting your ingress bandwidth from your upstreams.
ACL's can only filter traffic that's already at your edge, whereas
blackholing allows your upstream to filter it for you throughout his
network, reducing the risk of congested links.

Cheers,

-- 
---
Erik Haagsman
Network Architect
We Dare BV
tel: +31(0)10 7507008
fax:+31(0)10 7507005
http://www.we-dare.nl




RE: Cisco moves even more to china.

2004-09-24 Thread Erik Haagsman

Hi Joseph,

On Fri, 2004-09-24 at 13:19, Joseph wrote:
>   Your perception of Americans I think is very skewed by the media.
> You obviously did not read my post and wanted take a cheap shot.

Although this is hardly the place to discuss this, I never said
Americans, I said "we". I'm Dutch, and we've got an equal amount of
people whining about the same problems, thinking we'll be invaded and
robbed from jobs because Poland joins the EU and Philips and CMG
out-source to China and India. It's the same everywhere in the Western
world, and my message was not intended as an attack on either an
invidual or one country and it's people. 
I realise this is very generalising, but the majority of the people in
all our countries couldn't care less if we rob the rest of the world
blind, until there's a slight possibility they might actually be
affected themselves. 

>   Hmmm. I had no idea there were only 2 networking companies, 1
> database and 1 OS. =) With the rich competitive nature of the market I
> will continue to support companies which conform to a baseline of
> ethical business practice for all workers worldwide. 

I would like to do the same, but the fact of the matter is that in some
key areas there's not much choice, especially when it comes to
hardware...unless I've missed something I haven't seen an Open-Source
carrier-grade routing system that can rival C or J's, and just about any
commercial hardware manufacturer in the world has a production plant in
one third world country or another, or at least uses loads of low-priced
parts (memory, IC's etc.) that are manufactured in those same places.
There's no escaping it if you're working in networking and IT.

Kind regards,

-- 
---
Erik Haagsman
Network Architect
We Dare BV
tel: +31(0)10 7507008
fax:+31(0)10 7507005
http://www.we-dare.nl




RE: Cisco moves even more to china.

2004-09-24 Thread Erik Haagsman

On Fri, 2004-09-24 at 03:53, Joseph wrote:
> Its time for all American Tech workers to stand up and let our voices
> be heard.

Perhaps it's time instead to make sure you're good at what you do and
try to be on the forefront of tech, rather than whining about how all
those bad people from abroad are stealing your job. It's largely our own
fault labour pricing in large outsourcing countries like India are so
low, and now it's coming back to bite some of us.

>  We as world citizens need to come to grips with the fact that we must
> compete with workers internationally but we should be doing so on FAIR
> playing field. 

Strangely people only start calling for a level, fair playing field when
they feel something's threatening their own little piece of the cake. If
most companies and governments we're happy to work for wouldn't have
been undermining other people's economies for ages, we wouldn't have
this problem and we would have a more or less fair playing field. But
now practices that we still are making money of is making our companies
stronger, but our workforce weaker, so in the long term probably our
overall economy will be weaker. Anyone else see the irony here..?

> Don't Support Outsourcing, Don't buy from companies that outsource US
> jobs.

Hmm...let me see now, no Juniper, no Cisco, no Oracle, no Microsoft,
basically not a single vendor left...ah yes, we should just stop working
completely and dismantle the Internet, that might just do the trick.

Cheers,

Erik

-- 
---
Erik Haagsman
Network Architect
We Dare BV
tel: +31(0)10 7507008
fax:+31(0)10 7507005
http://www.we-dare.nl




Re: Cisco moves even more to china.

2004-09-23 Thread Erik Haagsman

On Fri, 2004-09-24 at 02:29, Dan Mahoney, System Admin wrote:
> I've always personally taken anyone who said "but I'm an MCSE" with a 
> grain of salt.  I've had equal respect for the A-plus and Net-Plus 
> certifications, which are basically bought.

I take most certifications with a grain of salt, including degrees,
unless someone clearly demonstrates he know's what he's talking about,
is able to make intelligent decisions and learns new techniques quickly.
In which case a certification is still just an add-on ;-)

> I used to have more trust in the /CC../ certifications but I find I may be 
> laughing those off too quite soon.

The vendor's introductory certs (CCNA, CCNP, JNCIA, JNCIS) don't say
anything about a candidate, except exactly that ("I got the cert"). CCIE
and JNCIE are still at least an indicator someone was at a certain level
at the time of getting the certification, but are still no substitute
for experience and a brain in good working order. It's too bad there
aren't better "general" (non-vendor specific) certs, since what often
lacks is general understanding of network architecture and protocols. 
You can teach anyone the right commands for Vendor X and they'll prolly
get a basic config going on a few nodes, but when troubleshooting time
comes it's useless without good knowledge of the underlying technology,
which none of the vendor certs teach very well (IMHO anyway ;-)

Cheers,

Erik



-- 
---
Erik Haagsman
Network Architect
We Dare BV
tel: +31.10.7507008
fax: +31.10.7507005
http://www.we-dare.nl






Re: Cisco moves even more to china.

2004-09-23 Thread Erik Haagsman

Hmm..we're flooded by CCNA's and CCNP's that often hardly know how logon
to a router as it is, so this will probably add a lot more, a bit like
the MCSE craze a few years ago ;-)
When they say training thousands of students, they're not talking
thousands of CCIE-level specialists that actually know what they're
doing. 
If anything it looks like we should feel sorry for people working
production for Cisco since it looks like production will be completely
based in China in the not too far future.

Cheers,

Erik

On Fri, 2004-09-24 at 01:49, Nicole wrote:
> 
>  Lovely, Just lovely. Just heard On CNN, Lou Dobbs. (but can't find it on
> their site)
> 
>  During a Beijing news conference John Chambers (Cisco CEO) Says "We believe in
> giving something back and truly becoming a Chineese company."  "China will
> become the IT center or the world" "China will become the largest economy in the
> world."
> 
>  CNN Reports: Cisco is investing 32 Million into Changi and is training
> 10's of thousands of Chineese university students in Cisco technology.
> 
> 
>  So.. I guess we will be cranking out those H1b's...Plan to kiss your raises
> and or jobs bye bye to some specialized cheap imported Cisco trained networking
> person from China. 
> 
> 
>  *SIGH*
> 
> 
>   Nicole
> 
> 
> --
>  |\ __ /|   (`\
>  | o_o  |__  ) )   
> //  \\ 
>   -  [EMAIL PROTECTED]  -  Powered by FreeBSD  -
> --
>  "The term "daemons" is a Judeo-Christian pejorative.
>  Such processes will now be known as "spiritual guides"
>   - Politicaly Correct UNIX Page
> 
>  Opportunity is missed by most people because it is dressed in overalls and
> looks like work.
>- Thomas Edison
> 
>  "Microsoft isn't evil, they just make really crappy operating systems."
>- Linus Torvalds
-- 
---
Erik Haagsman
Network Architect
We Dare BV
tel: +31.10.7507008
fax: +31.10.7507005
http://www.we-dare.nl






Re: Log Analizing tool for Cisco and Juniper router (switch)

2004-09-21 Thread Erik Haagsman

Check last week's thread about Open Source NMS tools, there's quite a
few messages there with references to log analyzers and similar tools.

Cheers,

Erik

On Tue, 2004-09-21 at 16:49, Joe Shen wrote:
> Hi,
> 
> 
> We want to analize log from Cisco and Juniper Router
> and switch periodically.
> 
> We have set up a Solaris box to collect all those log
> generated by Juniper router ,Cisco Router , cisco
> L2/L3 switch. But, we found log file format diverse
> greatly even between Cisco products.
> 
> Is there any good tool for this? 
> 
> Thanks
> 
> Joe
> 
> __
> Do You Yahoo!?
> Log on to Messenger with your mobile phone!
> http://sg.messenger.yahoo.com
-- 
---
Erik Haagsman
Network Architect
We Dare BV
tel: +31(0)10 7507008
fax:+31(0)10 7507005
http://www.we-dare.nl




Re: Today's Internet

2004-06-09 Thread Erik Haagsman

On Wed, 2004-06-09 at 09:07, John Obi wrote:
> Are we part of the Today's Internet mess?
> 
> http://www.internetnews.com/bus-news/article.php/3365491

That guy should stick to writing SciFi...he's seems to be very good at
it.

-- 
---
Erik Haagsman
Network Architect
We Dare BV
tel: +31(0)10 7507008
fax:+31(0)10 7507005
http://www.we-dare.nl




nanog@merit.edu

2004-06-04 Thread Erik Haagsman


> True, but no-one is saying the entire network should be done in one fell
> swoop. Eventually, larger companies WILL have to replace outdated
> components and when they do they can replace them and at the same time
> make sure ACL's or uBRF

uRPF even..weird typo

>  or whatever you use is in place. And before
> that, you could at least make sure your newer equipment that CAN easily
> take ACLs is properly configured. Currently most larger companies do
> neither, always pointing out the cost of doing a huge network wide
> upgrade that in actuality no-one is expecting them to do. Even if only a
> percentage of a large ISP's network (especially xDSL and HFC services)
> is properly configured, it'll save a lot of grief, cutting maintenance
> cost for the ISP itself as well as causing less headaches for other
> companies. And over time you just gradually update parts where you're
> replacing equipment that's at the end of it's lifecycle anyway.
> 
> 
> Cheers,
-- 
---
Erik Haagsman
Network Architect
We Dare BV
tel: +31(0)10 7507008
fax:+31(0)10 7507005
http://www.we-dare.nl




nanog@merit.edu

2004-06-04 Thread Erik Haagsman

On Thu, 2004-06-03 at 21:10, Jeff Aitken wrote:
> You missed what I was getting at.  You asserted that only very small
> ISPs (i.e., those using 36xx-class hardware) are subject to ACL
> problems.  There are many large-ish ISPs still stuck with some
> amount of obsolete hardware. 

OK, sorry about the confusion...I see where your going now.

>  My point was that while it's easy for
> someone whose network consists of 10 routers to say "well gee,
> upgrade already" it's not that easy when your network includes
> hundreds or thousands of components that need to be upgraded or
> replaced, to the tune of several million dollars.

True, but no-one is saying the entire network should be done in one fell
swoop. Eventually, larger companies WILL have to replace outdated
components and when they do they can replace them and at the same time
make sure ACL's or uBRF or whatever you use is in place. And before
that, you could at least make sure your newer equipment that CAN easily
take ACLs is properly configured. Currently most larger companies do
neither, always pointing out the cost of doing a huge network wide
upgrade that in actuality no-one is expecting them to do. Even if only a
percentage of a large ISP's network (especially xDSL and HFC services)
is properly configured, it'll save a lot of grief, cutting maintenance
cost for the ISP itself as well as causing less headaches for other
companies. And over time you just gradually update parts where you're
replacing equipment that's at the end of it's lifecycle anyway.


Cheers,

-- 
---
Erik Haagsman
Network Architect
We Dare BV
tel: +31(0)10 7507008
fax:+31(0)10 7507005
http://www.we-dare.nl




nanog@merit.edu

2004-06-03 Thread Erik Haagsman

On Wed, 2004-06-02 at 19:32, Jeff Aitken wrote:
> On Wed, Jun 02, 2004 at 06:00:38PM +0200, Erik Haagsman wrote:
> > Only very small ISPs relying on 36xx's or multilayer switching instead
> > of larger, more powerful might be still valid cases where ACL's are a
> > problem. 
> 
> Interesting assertion.  Care to support it?

It's not unusual for smaller ISP's and small hosting companies to rely
on low-spec equipment that can just deal with normal traffic flows, but
start falling apart when a traffic spike hits and access lists are
present. As an example, take a lower end IronCore Foudry switch with a
management II or III and make a comparison between the impact a DoS has
with and without access lists present. Altough it's still 
depending on exact network topology and the type of traffic, it's
usually a difference of night and day performance wise, and the absence
or presence of access-lists can mean the difference between keeping the
network running while under attack and having it fall over, especially
since all access list handling is taken care of by the CPU. This isn't
the case for anyone anywhere that uses this type of equipment, but I can
understad smaller networks with smaller budgets and equipment running
close to their max hesitance to put access lists and filtering polcies
in place. On the other hand, the smaller the network, the smaller the
amount of actual filters needed, so you might wonder if that's even a
reason not to filter.

Cheers,


-- 
---
Erik Haagsman
Network Architect
We Dare BV
tel: +31(0)10 7507008
fax:+31(0)10 7507005
http://www.we-dare.nl




nanog@merit.edu

2004-06-02 Thread Erik Haagsman


On Wed, 2004-06-02 at 17:25, Jon R. Kibler wrote:
> The sad fact is that simple ingress and egress filtering would 
> eliminate the majority of bogus traffic on the Internet -- including 
> (D)DoS attacks.

Couldn't agree more. It would probably cut hacked zombies (and that way
spam) by at least as much as DDoS traffic, in general we'd all have far
less problems if ISP's would stick to simple solutions where they're
needed. Although there are DoS's coming from valid IP's, 99 out of a 100
of these valid IP's are zombies hacked by using spoofed IP's so the
hacker isn't traceable. Good filtering will make this a lot harder to
pull off.

> Why no filtering by ISPs? "Because it takes resources and only benefits
> the other guy" -- unless your network is the one under attack.

And this is exactly the kind of ignorant thinking that prevents us from
solving the spam and DoS problems, while the exact same people can't
stop complaining about the spammers and script-kiddies ruining their
lunch.

> Maintenance of the ACLs should not be the issue. A single ACL for each
> subnet would be all that would be required for egress filtering. About
> 30 ACLs on an inbound border router would be required for ingress 
> filtering. Keeping the ingress ACLs current is a brain-dead task -- just
> subscribe to the bogon mailing list at cymru.com.

If maintenance of ACLs was a problem for large ISPs, they'd be out of
business since that would imply they don't have the staff to keep their
networks running, let alone well enough to actually have customers on
it. I've probably heard the argument about the money it would cost and
the staff it would take a million times, but the fact is that if every
ISP did it's filtering, you'll see the need for troubleshooting,
spamfiltering, recovering from hackers, and mitigating DoS attacks drop
enormously. I'm 100% sure this would lead to lower maintenance costs,
not the other way around.

> ACLs have had a bad reputation for greatly slowing down routers. That
> may have been true in the past, but properly written ACLs do not seem
> to have a significant impact on most new routers. Yes, they may cut
> peak through-put a few percent -- but if you are running that close to
> the edge, it is time to upgrade anyway.

Only very small ISPs relying on 36xx's or multilayer switching instead
of larger, more powerful might be still valid cases where ACL's are a
problem. But those aren't the ISPs generating 80% of all useless
traffic, it's the big boys that have plenty of hardware to burn that
refuse to do anything about it.

> IMHO, there is absolutely no excuse for not doing ingress and egress
> filtering.

Hear hear


-- 
---
Erik Haagsman
Network Architect
We Dare BV
tel: +31(0)10 7507008
fax:+31(0)10 7507005
http://www.we-dare.nl




Re: OT: Looking for Ethernt/Optical Device

2004-06-01 Thread Erik Haagsman

What you could try is use the Cisco CWDM-MUX-4 and it's pluggable optics
that can be fit into any GBIC 802.3z compliant slot. It's just an OADM
with 4 or 8 wavelengths that delivers GigE to any box with pluggable
GBICs provided you use the right optics and it's quite a bit cheaper
than using ONS stuff. That said, CWDM doesn't get you much further than
80 kilometres, above that DWDM is your only option, and a hell of a lot
more expensive.

Cheers,

-- 
---
Erik Haagsman
Network Architect
We Dare BV
tel: +31(0)10 7507008
fax:+31(0)10 7507005
http://www.we-dare.nl


On Tue, 2004-06-01 at 17:30, Michael Smith wrote:
>  
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
> 
> Hello All:
> 
> I'm wondering if anyone has seen a good and cheap(er) solution for
> providing multiple Gigabit Ethernet circuits over single pair of
> fiber.  I'm looking for a way to do CWDM or DWDM that's cheaper than
> putting in a Cisco 15454 or 15327.  I'm only going to be doing 2 GigE
> circuits between two switches, so I don't need to plan for future
> growth.
> 
> If anyone knows of a magic box that will do the above I would love to
> hear about it.
> 
> Thanks,
> 
> Mike
> 
> - --
> Michael K. SmithNoaNet
> 206.219.7116 (work) 866.662.6380 (NOC)
> [EMAIL PROTECTED]  http://www.noanet.net
> 
> -BEGIN PGP SIGNATURE-
> Version: PGP 8.0.3
> 
> iQA/AwUBQLyiVJzgx7Y34AxGEQIDewCfR8JQG2jqbxsBopUE6u3FUnfiX3UAoODx
> 41QL7T1eyK1EQ4ZMnVJU+l2p
> =hDVT
> -END PGP SIGNATURE-




Re: Port 5000

2004-05-18 Thread Erik Haagsman

It is a worm:

http://www.internetwk.com/breakingNews/showArticle.jhtml?articleID=20301309

Erik

On Tue, 2004-05-18 at 15:15, Geo. wrote:
> We are seeing many customers here probing port 5000 across the network. It
> appears to be some new worm or something but I've had no luck yet in
> figuring out what it is except to say norton AV detects nothing yet.
> 
> Anyone have a clue?
> 
> http://isc.incidents.org/port_details.php?isc=b4827221b7f45feeb0c12bc5040cab
> c9&port=5000&repax=1&tarax=2&srcax=2&percent=N&days=10&Redraw=Submit+Query
> 
> the jump in traffic is obvious.
> 
> Geo.
-- 
---
Erik Haagsman
Network Architect
We Dare BV
tel: +31(0)10 7507008
fax:+31(0)10 7507005
http://www.we-dare.nl




Re: Anti-Spam Router -- opinions?

2004-04-07 Thread Erik Haagsman

On Wed, 2004-04-07 at 14:25, Dave Howe wrote:
> I think 10 is a bit low.

It is, although it's more of an example value than a practical one.
You'd have to get some statistics on average e-mail use from your mail
servers and tune the value accordingly.

> I am not really an abnormal email user - but I tend to block answer a lot
> of emails, and send them as fast as I type them - so I can easily send
> 20-30 emails in the first hour, then maybe an hour slack, then another
> dozen or so - depending on inbound traffic and what arguments are ongoing
> on my mailing lists at the time.

Same here, but this pattern of e-mail burst - slack - burst etc. could
be quite easily implemented in the way described, as long as you have
some accurate statistics to use as baseline values and adjust the actual
operational values accordingly.

> Ok, I could in theory use web forums, usenet (probably also subject to
> your rate limiting) or whatever for this, but tbh I don't think I can in
> practice - if the discussion is on a mailing list, at best I would have to
> sign that list to a web mail account and reply that way, and as an average
> user I don't see why should I make life awkward for myself like that just
> to make life easier for admins (and I *am* an admin, so I have to look at
> both sides of the coin here)

Agree, it should be transparent to the user, but again that's where
accurate figures come in, and ofcourse the whole system could be as
fine-grained as you like, with further limits and slack on subnet level,
or by dividing into departments/organisations each with their own limits
on different levels (although keeping it as simple as possible would
ofcourse be preferred).

> I notice you are limiting by
> smtp session, and a spammer could easily send 100 emails each going to 100
> recipients in a single session.

Yep, that's the main problem, limiting the amount of recipients as well
as SMTP connections seems to be impractical although perhaps not
impossible. An average user nor running a mailing-list will not
realisticly send many e-mails to >100 recipients, and when they do it's
often internal distribution lists within the same domain, so limiting
recipients to a sensible value might not be as hard as it sounds.
It also depends on where you want the limiter. When limiting connections
between the user and his outgoing SMTP server you run into the recipient
problem, so you might be better of limiting outgoing connections from
your SMTP server, since multiple recipients will result in multiple
outgoing connections from the sending server, althoug this does make
coming up with accurate values for the actual base-line limits harder.
It would probably require a pretty painful initial setup where the
provider tracks e-mail statistics over a period of time and either bases
a general limiting value on a good analysis or tweaks the limits on a
per customer basis, making the initial setup very labour intensive, but
perhaps better in the long term. Instead of automatic blocking you might
put in a system where the admin gets alarmed by unusually high activity
above the initial limit+slack and the mail is cached but not sent out
before admin intervention, allowing the admin to decide whether it's
malicious mail traffic or not without disrupting normal service for the
user, apart from occasional delivery delay.


Regards,

-- 
---
Erik Haagsman
Network Architect
We Dare BV
tel: +31(0)10 7507008
fax:+31(0)10 7507005
http://www.we-dare.nl




Re: Anti-Spam Router -- opinions?

2004-04-07 Thread Erik Haagsman

On Wed, 2004-04-07 at 13:18, [EMAIL PROTECTED] wrote:
> If any of your user connections is the origin of more than
> 5 SMTP sessions in a single day, send an email to the 
> registered contact at that site with a little statistical
> summary of the activity. No blocking of sessions, just a
> note saying that we noticed you sent x number of emails
> today. Give the user some action such as a URL that they
> can do if they believe that this is abnormal.

Why not use a more detailed time-interval based approach only blocking
further SMTP connections for say an hour if a user made more than x
connects in an y amount of time and automatically resetting the counters
and block afterwards..? 
On top of the x/hour you could make the mechanism less of a burden by
putting in an option that would allow connections to be "saved" for a
maximum of two or three hours, so when someone comes into his office in
the morning he can safely pour out his start-of-the-day e-mail flow
without being bothered by the rigid 10 e-mails/hour since there wouldn't
have been any connections in the few hours before coming into the office
and he might be able to send 20 or 30 e-mails in the first hour before
the counters are reset. 
 Spammers can only work when making enormous amounts  of connections
each hour, so limiting a normal user to 10 connections per hour with
some extra slack after two or three connectionless hours, with an hour
blocking penalty if the user goes over shouldn't pose a problem to Joe
Average and will definitely keep spammers at bay without the added
administrative overhead of sending user's mail statistics. 

Ofcourse as you mentioned, mailinglists and certain users making extreme
use of e-mail should always have the possibility of registering for more
connections, but when done correctly this could be a more or less hassle
free way of controlling mail connection rates without burdening 99% of
all users.

Regards,



-- 
---
Erik Haagsman
Network Architect
We Dare BV
tel: +31(0)10 7507008
fax:+31(0)10 7507005
http://www.we-dare.nl




Re: Problems with .de abuse

2004-03-24 Thread Erik Haagsman

On Wed, 2004-03-24 at 16:57, Paul G wrote:
> slightly OT, but it is a sad day when operators stop being responsible
> neighbours and start responding to abuse reports only when their
> {willy,peering} is on the line.

It is...and persistently trying a host of SNMP communitie strings on a
neighbour's router interfaces doesn't make it any better :-)


-- 
Erik Haagsman
Network Architect
We Dare BV
tel: +31(0)10-7507008
fax: +31(0)10-7507005
http://www.we-dare.nl



Re: Problems with .de abuse

2004-03-24 Thread Erik Haagsman


> I sent the abuse email 2 days ago and got no response.  After 2 more days
> of this, I finally just tried to call that number, and it's bogus (or at
> least not working).  Does anyone have a clue who this is and/or how to
> actually get ahold of someone there (preferably one who speaks or
> reads/writes English)?

Try and reach them at [EMAIL PROTECTED] or try and contact their admin
Jens Rosenboom at [EMAIL PROTECTED]
I know it's not the regular channel, but  and we peer with them at
DE-CIX and had similar problems a while back with IP's from their range
scanning and trying out SNMP communities on our boxes. They responded on
an e-mail sent to their peering address and we haven't had any further
scans since, although your complaint seems to disrepute them further.

Cheers,


-- 
Erik Haagsman
Network Architect
We Dare BV
tel: +31(0)10-7507008
fax: +31(0)10-7507005
http://www.we-dare.nl



Re: Firewall opinions wanted please

2004-03-17 Thread Erik Haagsman

On Wed, 2004-03-17 at 21:44, Bruce Pinsky wrote:
> Everything I've ever read about security (network or otherwise) suggests
> that a layered approach increases effectiveness.  I certainly don't trust a
> firewall appliance as my only security device, so I also do prudent things
> like disable ports and applications that are not in use on my network and
> enforce authentication and authorization for access to legitimate services.

Good point...and that's exactly why in some cases, especially in SOHO
and SMB oriented products, both hardware as well as software vendors can
be part of the security problem by advertising their products as the
definite solution to all security holes. Truely securing even a single
server or host connected to the Internet entails a lot more than just
blocking a few ports, let alone securing a network. By marketing "the
perfect solution" to no-too-clueful admins the actual security holes
only get bigger and harder to track.

-- 
---
Erik Haagsman
Network Architect
We Dare BV
tel: +31.10.7507008
fax: +31.10.7507005
http://www.we-dare.nl






Re: Firewall opinions wanted please

2004-03-17 Thread Erik Haagsman

On Wed, 2004-03-17 at 21:02, Petri Helenius wrote:
> No, the applications should accept only authorized connections. If that 
> would be the case, there would be no need to filter at packet level.

No, since this would be assuming that each application is perfect and
there's no such thing as buffer overflows and other software bugs
(including those in authentication routines). A firewall is an extra
line of defence in preventing malicious packets from reaching the
destination app and the more people have one the better (although I'm
not sure whether grandma would be too bothered)
It's not bulletproof (and could potentially contain a gut itself) but it
provides additional security, regardless of authenticaion of
connections.



-- 
---
Erik Haagsman
Network Architect
We Dare BV
tel: +31.10.7507008
fax: +31.10.7507005
http://www.we-dare.nl






Re: Replacement for a Extreme Black Diamond 6808

2004-03-16 Thread Erik Haagsman


On Tue, 2004-03-16 at 04:59, Tom (UnitedLayer) wrote:
> 
> Are you using it for L2 only, or L2+L3?
> I hear decent things about using them for L2 only, and using J or C boxes
> for the L3 portion.

Yep...that's the way we do it as well, L2 on the BD6808's and L3 on J
boxes although we started out using the BD's for part of our Layer3
traffic as well. They just gave too many problems, so if you can do your
L3 on a router and use them strictly for L2 traffic. We also run Foundry
switches, and if you absolutely need to do some L3 (OSPF/iBGP) on your
switches your better of using Foundry switches with an M4 blade, their
L3 code is much more mature than Extreme's, but when it comes to raw
performance try to avoid those scenarios and just let the BD do Layer2.
Their L3 might be crap, but they scream at L2.

Cheers,

-- 
Erik Haagsman
Network Architect
We Dare BV
tel: +31(0)10-7507008
fax: +31(0)10-7507005
http://www.we-dare.nl



Re: How relable does the Internet need to be?

2004-03-05 Thread Erik Haagsman

Please...I'm not a browser

On Sat, 2004-03-06 at 02:57, John Curran wrote:
> > The question in all cases is what is the level of service acceptable
> > to regulators and emergency services coordinators? Clearly there are
> > problems of both power and call routing which must be addressed.
> > It's unlikely NANOG is the forum for specifying standards in this
> > area. It is similarly unlikely the IETF is the appropriate body,
> > though it may be a place to figure out how to meet the requirements
> > specifications of some other body.
> 
> 
> Active discussion ongoing:
> <http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-243851A1.pdf>
> 
> /John
-- 
---
Erik Haagsman
Network Architect
We Dare BV
tel: +31.10.7507008
fax: +31.10.7507005
http://www.we-dare.nl






Re: UUNet Offer New Protection Against DDoS

2004-03-03 Thread Erik Haagsman

Hi Paul,


> correct. from our pov, it is gone. given that 'solving the problem' is not
> always possible, this is almost as good as it gets in the real world.

Fully agree, and this is basically the way it should be: a customer
shouldn't be concerned about the carrier solving the problem or not, as
long as service isn't interrupted the carrier is doing the job he's
promised to do in his SLA

> we tend to get small ddos (a few hundred megs) that are more of an annoyance
> than anything else, at least before they hit the customer-in-question 's
> faste handoff.

This is a bit more problematic IMHO. A "small DoS" is very
geographically dependent and very "supporting party" dependent: in Ghana
with BT as the only provider running over DS3, a few hundred megs means
the entire network is cut-off for ages :-)
I know this is NANOG and bandwidth is a simple commodity, but even in
our parts of the western world bandwidth can be hard to come by and a
few hundred megs might be a bigger deal to a smaller NSP's network.

> . in other news, noone has solved the perpetuum mobile problem either.
> as a carrier, your job is to solve the problem for the customer. this
> includes staying up afterwards.

Hehe...sadly this perpetuum mobile keeps on running and running (which
is what it's supposed to do literally :-) but you're completely right:
cutomers should always come first and "hiding" the problem is our only
option at the moment. I'm still waiting for that press-release though
:-)

Regards,

Erik

> 
> paul
-- 
---
Erik Haagsman
Network Architect
> > I haven't seen any major press-releases on actually solving the problem
> > instead of hiding it... (granted...I haven't put out one either :-)
> 
We Dare BV
tel: +31.10.7507008
fax: +31.10.7507005
http://www.we-dare.nl






Re: UUNet Offer New Protection Against DDoS

2004-03-03 Thread Erik Haagsman

On Wed, 2004-03-03 at 09:26, Paul G wrote:
> cant speak for them, but this would be my preferred first step. next step
> is, of course, an attempt to filter on {source, unique characteristics, what
> have you} and removing the blackhole.

What most people seem to forget is that neither of these steps actually
counter the DoS...they merely make the DoS as invisible as possible to
customers while the traffic keeps hitting the carrier in question. For
the large carriers this is only a minor inconvenience. 
For smaller carriers or for co-location facilities/NSP's that are
relying on not-so-clueful carriers (read: carriers not supporting any
kind of communities with possible lack of pro-active network management
and/or bad communications) this is a BIG problem. Even though they might
take the heat off the targeted customer, they could be in for a rough
ride themselves as the DoS keeps going and going.
I haven't seen any major press-releases on actually solving the problem
instead of hiding it... (granted...I haven't put out one either :-)

Cheers,


-- 
---
Erik Haagsman
Network Architect
We Dare BV
tel: +31.10.7507008
fax: +31.10.7507005
http://www.we-dare.nl






RE: Converged Networks Threat (Was: Level3 Outage)

2004-02-25 Thread Erik Haagsman

On Wed, 2004-02-25 at 20:16, Bora Akyol wrote:
> This train of thought works well for only accidental failures,
> unfortunately
> if you have an adversary that is bent on disturbing communications
> and damaging the critical infrastructure of a country, physical faith
> sharing 
> makes things less robust than they need to be. By the way, no
> disagreement
> from me on any of the points you make. Keeping it simple and robust is
> definitely
> a good first step. Having diverse paths in the fiber infrastructure is
> also necessary.

I don't think faith sharing prevents us from having diverse paths, since
this is where redundancy comes in. Even if all services run over the
same fibre paths, there isn't any problem as long as there's a
sufficient number of alternative paths in case any of the paths goe
down. 

Cheers,

-- 
---
Erik Haagsman
Network Architect
We Dare BV
tel: +31.10.7507008
fax: +31.10.7507005
http://www.we-dare.nl






RE: possible L3 issues

2004-02-24 Thread Erik Haagsman

C&W seems to be doing fine towards Microsoft, are you still experiencing
problems...?

Cheers,

Erik

On Tue, 2004-02-24 at 00:23, Arjan Lugtenberg wrote:
> Here at planet (AS8737) we also having problems reaching
> msn/hotmail/messenger.
> 
> Seems that C&W are also having problems reaching microsoft??
> 
> regards,
> 
> Arjan
> 
> -Original Message-
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of
> [EMAIL PROTECTED]
> Sent: maandag 23 februari 2004 23:53
> To: [EMAIL PROTECTED]
> Subject: possible L3 issues
> 
> 
> 
> anyone else seeing high latency via L3 , especially the west coast ?
> - Keith
-- 
Erik Haagsman
Network Architect
We Dare BV
tel: +31(0)10-7507008
fax: +31(0)10-7507005
http://www.we-dare.nl



Re: Good network sniffer?

2004-01-12 Thread Erik Haagsman

tcpdump + Ethereal for *nix, best tool in de biz if you ask me...and
free too.

Cheers,

Erik

On Mon, 2004-01-12 at 21:48, Borger, Ben wrote:
> Hi Nanog, 
>  
> Can anyone recommend a good network monitor that can replay captured
> packets?  Windows or *nix.  Free is great, commercial is ok too.
> 
> TIA,
> 
> Ben
>