Re: Atrivo/Intercage: Now Only 1 Upstream

2008-09-16 Thread Paul Ferguson
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -- Paul Wall [EMAIL PROTECTED] wrote:

Cogent is keeping tabs of the Intercage/Atrivo situation in ticket
HD000789038.  Be sure to e-mail or call them referencing that
number with any information you may have to share.

AboveNet's ticket auto-responder is broken.


I don't have time to pass along intelligence to Cogent, and if I
did feel so inclined, somehow I get the feeling that I would largely
be ignored since I'm not a direct customer.

I'm more inclined to pass along the intelligence to law enforcement,
as many of us have been doing for a couple of years now.

In any event, the badness is still there. Lots of it.

- - ferg

-BEGIN PGP SIGNATURE-
Version: PGP Desktop 9.6.3 (Build 3017)

wj8DBQFIzz/jq1pz9mNUZTMRAoykAKDT0Z9j7zw8RHpO0fSjBIYdbUCTiACg3koi
F2OWk5qP+5ZsXdBbBcg6cB4=
=Mfgg
-END PGP SIGNATURE-


--
Fergie, a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 fergdawg(at)netzero.net
 ferg's tech blog: http://fergdawg.blogspot.com/





Re: confusing packet data

2008-09-16 Thread Jim Popovitch
On Tue, Sep 16, 2008 at 00:43, Hank Nussbacher [EMAIL PROTECTED] wrote:
 Are you running Skype?  Have you become a supernode?  There is now a
 registry switch in 3.0 that allows you to disable supernode functionality.

No.  Nothing is running on this host (my laptop) when initiating
etherape.  Also, etherape reports nothing until I initiate some
traffic (i.e. whois www.yahoo.com)

I suspect that Nathan is correct and I have filed a bug report with Debian.

-Jim P.



Re: confusing packet data

2008-09-16 Thread Nathan Ward

On 16/09/2008, at 4:43 PM, Hank Nussbacher wrote:

Are you running Skype?  Have you become a supernode?  There is now a  
registry switch in 3.0 that allows you to disable supernode  
functionality.



This would not cause him to see traffic to and from random addresses.  
Note that traffic is not going to his IP address, but to AND from  
addresses that are not his. That, plus the fact that there 'is'  
traffic on 240/4 and 224/4, and it sounds like a bug.


--
Nathan Ward







Re: Atrivo/Intercage: Now Only 1 Upstream

2008-09-16 Thread Paul Ferguson
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -- Paul Wall [EMAIL PROTECTED] wrote:

Cogent is keeping tabs of the Intercage/Atrivo situation in ticket
HD000789038.  Be sure to e-mail or call them referencing that
number with any information you may have to share.

AboveNet's ticket auto-responder is broken.


By the way, a lot of folks are watching all domains registered
within Atrivo/Intercage IP address space every day. Here's a few
for you to decide -- and they have been registered only in the past
few days:

undaground.biz
pillshere.net
ukrnic.info (originally registered in Intercage IP space, now
 in UkrTelecom)

This is only a fraction of a percentage of the activities.

We are watching.

- - ferg

-BEGIN PGP SIGNATURE-
Version: PGP Desktop 9.6.3 (Build 3017)

wj8DBQFIz0ozq1pz9mNUZTMRAnHeAJ4ntfwfiQaQxhTXfs89uo2I3cTJMgCfb41s
M7q+r1sgTSmGL1+vszyHYb0=
=c6jO
-END PGP SIGNATURE-



--
Fergie, a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 fergdawg(at)netzero.net
 ferg's tech blog: http://fergdawg.blogspot.com/




Re: Atrivo/Intercage: Now Only 1 Upstream

2008-09-16 Thread Hank Nussbacher

On Tue, 16 Sep 2008, Paul Ferguson wrote:


In any event, the badness is still there. Lots of it.


Not according to this:
http://www.domainnews.com/en/general/estdomains-denies-links-to-malware-distribution.html

The company also has a reliable ally in its battle against malware in a 
face of Intercage, Inc which provides company with the hosting services of 
the highest quality. But the outstanding performance of hosting services 
is not the sole reason why EstDomains, Inc appreciates this partnership so 
greatly. Intercage, Inc generously provides EstDomains, Inc specialists 
with reports regarding discovered malware vehicles. As the main database 
for additional domain name management services is located in Intercage 
Data Center, EstDomains, Inc has the perfect opportunity to get 
notifications of the slightest mark of malware presence in the shortest 
time and take measures in advance.


You really need to read the entire posting and not end up ROTFL.

-Hank



Re: confusing packet data

2008-09-16 Thread Hank Nussbacher

On Mon, 15 Sep 2008, Jim Popovitch wrote:

Are you running Skype?  Have you become a supernode?  There is now a 
registry switch in 3.0 that allows you to disable supernode functionality.


-Hank


This is something has been bugging me lately Etherape is a Linux
tool that graphs packets arriving at your host, and shows paths of
connectivity.   I captured the graphs, at the URL below, from my Linux
laptop connected to a Linksys wifi router that is hooked to a Comcast
cable modem.   Why is it that I can see packet data from IPs all over
the place?

http://picasaweb.google.com/jimpop/Public#

Any insight is much appreciated.

-Jim P.





Anyone know Wiltel's EWAN service

2008-09-16 Thread ChiYoung Joung
I have EWAN circuits of Wiltel(currently same company with Level3 you know) as 
my backbone circuit in LA.
About 2 months ago, there were some packet loss on L2 circuit, but I didn't get 
any clear answer from Level3 support center.
It became okey without any action, but now, same problem happen again.  I feel 
bored, I need your help.  
Anyone know if there are any problems of WilTel's L2 circuit on LA area ?  or 
Could anyone advice me the contact person who know well EWAN configuration of 
Wiltel ?
Frankly, I felt Level3 guys seems to be unfamiliar with EWAN circuit of Wiltel.

Best regards,
Chiyoung
=
 Chi-Young Joung
 SAMSUNG NETWORKS Inc.
 Email: [EMAIL PROTECTED]
 Tel +82 70 7015 0623, Mobile +82 17 520 9193
 Fax +82 70 7016 0031
=

Re: Internet Traffic Begins to Bypass the U.S.

2008-09-16 Thread Max Tulyev

Jean-François Mezei wrote:

Did western europe ever really have a primary route via the USA to reach
asia  ? (I realise that during the cable cuts in middle east last year,
traffic might have been rerouted via USA but this would be a temporary
situation).


Yes.
And the main issue is not technical, but economic and disorganisation 
question.


For example, we need an Internet connectivity in Kazakhstan. The path 
through TAE (www.taeint.net) or FLAG-Iran-Turkmenistan-Uzbekistan costs 
about $6000 per 1Mbit, and lot of nervous. Path through China-USA is 
said about $100-$400 per 1Mbps and easy to get comparing with first two 
ones..


Yes, Europe-Asia satellites is a good way too, and it can give less 
latency than Europe-USA-Asia in some cases. A lot of traffic to Asia and 
Middle East is going this way. But satellite is expensive, and there is 
even lack of capacity there. So Fiber around the world is cheaper in 
most cases.


--
WBR,
Max Tulyev (MT6561-RIPE, 2:463/[EMAIL PROTECTED])



ATT AS7018 turnup BGP issue

2008-09-16 Thread Erik Sundberg
Can someone from ATT with BGP configuration access please contact me
off list, the provisioning group has been having trouble turnup our
BGP session on our 2xOC3 to AS7018 since 12AM and now its 4:30AM.

Erik
[EMAIL PROTECTED]



Re: Atrivo/Intercage: Now Only 1 Upstream

2008-09-16 Thread Patrick W. Gilmore

On Sep 16, 2008, at 1:55 AM, Paul Ferguson wrote:


By the way, a lot of folks are watching all domains registered
within Atrivo/Intercage IP address space every day. Here's a few
for you to decide -- and they have been registered only in the past
few days:

undaground.biz
pillshere.net
ukrnic.info (originally registered in Intercage IP space, now
in UkrTelecom)

This is only a fraction of a percentage of the activities.

We are watching.


Not closely enough.

It seems some people in San Francisco are selling Intercage outbound  
only capacity.  (I.e. Letting them send packets and not announcing  
their ASN/prefixes to hide the fact Atrivo is a customer.)


If you find packets from Atrivo coming into your network from a  
network where you do not see a reverse path, please let the rest of us  
know so we can take appropriate action.


--
TTFN,
patrick




Creating a visual Map of a network?

2008-09-16 Thread castellan2004-nsm
I am being tasked to map a network.  In the past I have used nmap to find the 
systems on the local LAN and remote LANs (same enterprise).

This time I want to create a visual map of the LAN.  With cheops, I reasonably 
good results but cannot be documented for managers with certainty. What are 
some good tools now that will create visual maps of the networks?

What is the best way to map a network when ICMP echo has been turned off?

Thank you in advance for any help.

Subba Rao



RE: [SPAM-HEADER] - Today's Point-2Point WAN Options - Email has different SMTP TO: and MIME TO: fields in the email addresses

2008-09-16 Thread Rod Beck
Actually, it is not true that Layer 2 Ethernet is 'best effort'. 

It depends. 

There are Layer 1 Ethernet products that involve no Layer 2 switching or Layer 
2 routing, just an efficient and transparent mapping of Ethernet into 
SDH/SONET. 
And some of those products can be upgrade in 50 meg increments from 100 to 
1,000 megs. 

After you have outgrown your GigE, then you can migrate to a LAN PHY 10 GigE 
link using affordable LAN interfaces and keeping your network 'untainted' by 
SONET/SDH. 

Regards, 

Roderick S. Beck
Director of European Sales
Hibernia Atlantic
13-15, rue Sedaine, 75011 Paris
http://www.hiberniaatlantic.com
Wireless: 1-212-444-8829. 
French Wireless: 33-6-14-33-48-97.
AOL Messenger: GlobalBandwidth
[EMAIL PROTECTED]
[EMAIL PROTECTED]
``Unthinking respect for authority is the greatest enemy of truth.'' Albert 
Einstein. 



-Original Message-
From: Chris Kleban [mailto:[EMAIL PROTECTED]
Sent: Tue 9/16/2008 12:33 AM
To: nanog@nanog.org
Subject: [SPAM-HEADER] - Today's Point-2Point WAN Options - Email has different 
SMTP TO: and MIME TO: fields in the email addresses
 
Hello Nanog,

I'm currently looking into what are the options for enabling inter-datacenter 
communication.

Our current solution is to use ipsec/gre tunnels traversing over the Internet. 
The specific needs the new solution must meet are:

- The ability to run end-to-end QOS.
- Dedicated bandwidth
- Support 1gbps transfer rates
- Enable communication between 3 locations


The options I have looked into so far are:

- Layer 2 Ethernet (Virtual Private Line): This service seems to be offered by 
a lot of ISPs using various networking techniques. The price point is 
attractive however packets are forwarded only at best effort across the ISP's 
network which means the quality of the service will directly reflect the ISP's 
network performance.
- Traditional Leased Line (dsX/ocX): This service seems to be more expensive 
then wavelength services however meets my needs.
- WaveLength Services (oc3-10gig): This service seems to be cheaper then 
traditional leased lines when comparing similar bandwidth. However, 
availability is limited to on-net buildings. This solution meets my needs.
- MPLS based VPN solutions: Seems to be a good point to multipoint technology 
with QOS offerings. However, the price seems to be around the same as 
wavelength services for the amount of bandwidth we require. If the number of 
data centers we were looking to connect was larger then this option would be 
more attractive. This solution meets my needs.

Based on my needs and what my options are I am leaning towards point to point 
wavelength services connecting my 3 locations in a loop like fashion.


Are there any other options I should consider?

Are my descriptions of the today's possible solutions inaccurate?

Are there any thoughts on today's pricing that differs then my findings?


Thanks
Chris Kleban









Re: Creating a visual Map of a network?

2008-09-16 Thread Colin Alston
[EMAIL PROTECTED] wrote:
 I am being tasked to map a network.  In the past I have used nmap to find the 
 systems on the local LAN and remote LANs (same enterprise).
 
 This time I want to create a visual map of the LAN.  With cheops, I 
 reasonably good results but cannot be documented for managers with certainty. 
 What are some good tools now that will create visual maps of the networks?
 
 What is the best way to map a network when ICMP echo has been turned off?
 

I've had success using Scapy (http://www.secdev.org/projects/scapy/) and
tying it into Graphviz. It can do TCP traces too and has all sorts of
built in visualisation options.

And look at the bottom here http://www.secdev.org/projects/scapy/demo.html




ATT BGP turnup issue -- FIXED

2008-09-16 Thread Erik Sundberg
This issue was finally resolved by ATT.. No need to contact me...

Thanks

Erik

RE: confusing packet data

2008-09-16 Thread Darden, Patrick S.

Or his DSL is set to bridging.
--p

-Original Message-
From: Nathan Ward [mailto:[EMAIL PROTECTED]
Sent: Tuesday, September 16, 2008 12:47 AM
To: nanog list
Subject: Re: confusing packet data


On 16/09/2008, at 4:43 PM, Hank Nussbacher wrote:

 Are you running Skype?  Have you become a supernode?  There is now a  
 registry switch in 3.0 that allows you to disable supernode  
 functionality.


This would not cause him to see traffic to and from random addresses.  
Note that traffic is not going to his IP address, but to AND from  
addresses that are not his. That, plus the fact that there 'is'  
traffic on 240/4 and 224/4, and it sounds like a bug.

--
Nathan Ward








Re: Internet Traffic Begins to Bypass the U.S.

2008-09-16 Thread Mark Prior
Jean-François Mezei wrote:

 For instance, out of Australia we have a single, old cable going West 
 out of Perth to Singapore (SEA-ME-WE3) which allows only low speed 
 circuits, 
 
 Was there any thought about building cables to singapore from darwin now
 that it has had fibre links to the rest of australia for over a decade ?

There are two old cable systems heading out from Western Australia (MMC
forgot JASURAUS).

Darwin is a monopoly zone, only Telstra have capacity into it although
others have thought about it (assuming the government stumps up some
cash). The technical issue with submarine cables out of Darwin is
avoiding the Timor Trench. It makes more sense for a lot of reasons to
head out of Perth if you want to go west.

Mark.



LoA (Letter of Authorization) for Prefix Filter Modification?

2008-09-16 Thread Rodriguez, Mauricio
Recently, one of our Transit providers has started requiring a Letter of 
Authorization for addition of any of our own Transit customers' prefixes to 
their filters.  The verbiage of the LoA basically states that the owner of the 
assignment or allocation (not necessarily our customer) allows us to advertise 
their prefixes through our service.

Is this a common practice?  Our past experience indicates that a simple request 
to a NOC or update of a routing registry usually is sufficient.

Regards,
Mauricio Rodriguez
FPL Fibernet, LLC



Re: Anyone know Wiltel's EWAN service

2008-09-16 Thread charles
La as in Los Angeles? Or Louisiana?

There we're numerous strange issues last night in Los Angeles  with T-Mobile 
that were caused by att loosing some oc12 circuits.

That could have affected other carriers I'm sure.  
--Original Message--
From: ChiYoung Joung
To: nanog
ReplyTo: [EMAIL PROTECTED]
Subject: Anyone know Wiltel's EWAN service
Sent: Sep 16, 2008 12:40 AM

I have EWAN circuits of Wiltel(currently same company with Level3 you know) as 
my backbone circuit in LA.
About 2 months ago, there were some packet loss on L2 circuit, but I didn't get 
any clear answer from Level3 support center.
It became okey without any action, but now, same problem happen again.  I feel 
bored, I need your help.  
Anyone know if there are any problems of WilTel's L2 circuit on LA area ?  or 
Could anyone advice me the contact person who know well EWAN configuration of 
Wiltel ?
Frankly, I felt Level3 guys seems to be unfamiliar with EWAN circuit of Wiltel.

Best regards,
Chiyoung
=
 Chi-Young Joung
 SAMSUNG NETWORKS Inc.
 Email: [EMAIL PROTECTED]
 Tel +82 70 7015 0623, Mobile +82 17 520 9193
 Fax +82 70 7016 0031
=

Sent via BlackBerry from T-Mobile

Re: LoA (Letter of Authorization) for Prefix Filter Modification?

2008-09-16 Thread Jon Lewis

On Tue, 16 Sep 2008, Rodriguez, Mauricio wrote:

Recently, one of our Transit providers has started requiring a Letter of 
Authorization for addition of any of our own Transit customers' prefixes 
to their filters.  The verbiage of the LoA basically states that the 
owner of the assignment or allocation (not necessarily our customer) 
allows us to advertise their prefixes through our service.


Is this a common practice?  Our past experience indicates that a simple 
request to a NOC or update of a routing registry usually is sufficient.


It's not unheard of.  Most providers don't require it, but I have run into 
a few who do.  It's a minor PITA compared to the web interfaces some 
providers make you use to request filter updates.



--
 Jon Lewis   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_



Re: Atrivo/Intercage: Now Only 1 Upstream

2008-09-16 Thread *Hobbit*
So in cases like this where the community appears to agree that there's
a consistently bad apple, what's preventing everyone from simply
nullrouting the netblocks in question and imposing the death penalty?

Sorry if this seems naive, but if no legitimate purpose is shown it
seems like the obvious thing to do.  Maybe they could still *send*
packets, but nothing would ever get back to them.

_H*



Re: LoA (Letter of Authorization) for Prefix Filter Modification?

2008-09-16 Thread Christian Koch
I dont mind, i think it is another good step towards 'good filtering'
but...i think the PITA part is
downstream 'clueless' customers, who may need an explanation on prefix
hijacking and the state
of the internet today, and that these are all just combined efforts to
minimize the risk of accepting allocations
that don't belong to you.


Christian




On Tue, Sep 16, 2008 at 9:56 AM, Jon Lewis [EMAIL PROTECTED] wrote:
 On Tue, 16 Sep 2008, Rodriguez, Mauricio wrote:

 Recently, one of our Transit providers has started requiring a Letter of
 Authorization for addition of any of our own Transit customers' prefixes to
 their filters.  The verbiage of the LoA basically states that the owner of
 the assignment or allocation (not necessarily our customer) allows us to
 advertise their prefixes through our service.

 Is this a common practice?  Our past experience indicates that a simple
 request to a NOC or update of a routing registry usually is sufficient.

 It's not unheard of.  Most providers don't require it, but I have run into a
 few who do.  It's a minor PITA compared to the web interfaces some providers
 make you use to request filter updates.


 --
  Jon Lewis   |  I route
  Senior Network Engineer |  therefore you are
  Atlantic Net|
 _ http://www.lewis.org/~jlewis/pgp for PGP public key_





RE: LoA (Letter of Authorization) for Prefix Filter Modification?

2008-09-16 Thread Randy Epstein
Is this a common practice?  Our past experience indicates that a simple
request to a NOC or update of a routing registry usually is sufficient.

Regards,
Mauricio Rodriguez
FPL Fibernet, LLC

Cogent AFAIK have been doing this for years.  Not many others require this
unless there is a serious question over the request.

Randy




Re: LoA (Letter of Authorization) for Prefix Filter Modification?

2008-09-16 Thread Jon Lewis

On Tue, 16 Sep 2008, Christian Koch wrote:


I dont mind, i think it is another good step towards 'good filtering'
but...i think the PITA part is
downstream 'clueless' customers, who may need an explanation on prefix
hijacking and the state
of the internet today, and that these are all just combined efforts to
minimize the risk of accepting allocations
that don't belong to you.


IMO, it's just an illusion of added security and is really just CYA for 
the provider.  When I fax TWTelecom an LOA that a customer faxed to me, 
how does TWTelecom verify the authenticity of that LOA?  I doubt they try. 
I suspect it's just filed, and will only be pulled out if the 
advertisement is challenged by some 3rd party.


--
 Jon Lewis   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_



Re: LoA (Letter of Authorization) for Prefix Filter Modification?

2008-09-16 Thread Christian Koch
good point... :)

On Tue, Sep 16, 2008 at 10:24 AM, Jon Lewis [EMAIL PROTECTED] wrote:
 On Tue, 16 Sep 2008, Christian Koch wrote:

 I dont mind, i think it is another good step towards 'good filtering'
 but...i think the PITA part is
 downstream 'clueless' customers, who may need an explanation on prefix
 hijacking and the state
 of the internet today, and that these are all just combined efforts to
 minimize the risk of accepting allocations
 that don't belong to you.

 IMO, it's just an illusion of added security and is really just CYA for the
 provider.  When I fax TWTelecom an LOA that a customer faxed to me, how does
 TWTelecom verify the authenticity of that LOA?  I doubt they try. I suspect
 it's just filed, and will only be pulled out if the advertisement is
 challenged by some 3rd party.

 --
  Jon Lewis   |  I route
  Senior Network Engineer |  therefore you are
  Atlantic Net|
 _ http://www.lewis.org/~jlewis/pgp for PGP public key_




Re: Re: Anyone know Wiltel's EWAN service

2008-09-16 Thread 정치영
Sorry, it is Los Angeles.

I don't know whether our circuit is ralative to ATT oc12

=
 Chi-Young Joung
 SAMSUNG NETWORKS Inc.
 Email: [EMAIL PROTECTED]
 Tel +82 70 7015 0623, Mobile +82 17 520 9193
 Fax +82 70 7016 0031
=

--- Original Message ---
Sender : [EMAIL PROTECTED][EMAIL PROTECTED] 
Date   : 2008-09-16 22:44 (GMT+09:00)
Title  : Re: Anyone know Wiltel's EWAN service

La as in Los Angeles? Or Louisiana?

There we're numerous strange issues last night in Los Angeles  with T-Mobile 
that were caused by att loosing some oc12 circuits.

That could have affected other carriers I'm sure.  
--Original Message--
From: ChiYoung Joung
To: nanog
ReplyTo: [EMAIL PROTECTED]
Subject: Anyone know Wiltel's EWAN service
Sent: Sep 16, 2008 12:40 AM

I have EWAN circuits of Wiltel(currently same company with Level3 you know) as 
my backbone circuit in LA.
About 2 months ago, there were some packet loss on L2 circuit, but I didn't get 
any clear answer from Level3 support center.
It became okey without any action, but now, same problem happen again.  I feel 
bored, I need your help.  
Anyone know if there are any problems of WilTel's L2 circuit on LA area ?  or 
Could anyone advice me the contact person who know well EWAN configuration of 
Wiltel ?
Frankly, I felt Level3 guys seems to be unfamiliar with EWAN circuit of Wiltel.

Best regards,
Chiyoung
=
 Chi-Young Joung
 SAMSUNG NETWORKS Inc.
 Email: [EMAIL PROTECTED]
 Tel +82 70 7015 0623, Mobile +82 17 520 9193
 Fax +82 70 7016 0031
=

Sent via BlackBerry from T-Mobile



IPv6 Penetration Survey: Your Participation Requested

2008-09-16 Thread Member Services
The American Registry for Internet Numbers (ARIN), in cooperation with  
the Cooperative Association for Internet Data Analysis (CAIDA), is  
conducting a new survey to gather data regarding current and future use  
of IPv6.


We have expanded the scope of the survey to seek IPv6 penetration data 
from around the world. We cordially invite and encourage all  
organizations in the AfriNIC, APNIC, ARIN, LACNIC, and RIPE NCC regions  
to participate in the survey so we can establish a comprehensive view of 
present IPv6 penetration and future plans for IPv6 deployment. The  
survey opened on 8 September and remains available until 17:00 EDT on  1 
October. The results of the survey will be presented and discussed at  
the ARIN XXII Public Policy and Members Meeting to be held in Los  
Angeles, CA 15-17 October 2008. Additionally, the summary results will  
be shared with all the RIRs for further distribution within their  
respective regions. The survey data will support ongoing research.


The survey is composed of 22 questions that can be answered in a  few 
minutes. This is a secure survey and all data will be presented in  
summary form only, and kept confidential between ARIN and CAIDA. When  
you complete the survey you will be entered in a drawing for prizes,  
one raffle per RIR region. You must provide your contact information to  
win.


Please take a few moments to complete the survey located at:

https://www.surveymonkey.com/s.aspx?sm=loMM8qu18yFoKyi0rTUpQg_3d_3d

Regards,

Member Services
American Registry for Internet Numbers (ARIN)



Re: community real-time BGP hijack notification service

2008-09-16 Thread Gadi Evron

On Fri, 12 Sep 2008, Kevin Oberman wrote:

Looks interesting, but it only takes a fairly short list of ASNs for a
prefix. For our big CIDR blocks, we have WAY too many ASNs to enter them
all, so it's pretty useless for me. I need to be able to enter at very
least a dozen ASes and I suspect may folks have a LOT more then that.



We made many fixes over the last few days, as well as added a few more 
feeds. Any volunteers to give us more feeds? :)


One of the fixes is that you can add many more ASs now, which should 
resolve your previous issues.


Please let us know if you find any other problems or think of 
any suggestions, big and small.


Gadi.



For now, I'll enter some shorter pieces from the block, but I'm most
concerned with the pieces that are not currently assigned, so are
available for hijack. I have added the larger, unassigned blocks. I'll
start adding assigned bits and pieces as well as unassigned pieces, but
being able to put all valid origin ASes in the list for the full blocks
would be a lot nicer.
--
R. Kevin Oberman, Network Engineer
Energy Sciences Network (ESnet)
Ernest O. Lawrence Berkeley National Laboratory (Berkeley Lab)
E-mail: [EMAIL PROTECTED]   Phone: +1 510 486-8634
Key fingerprint:059B 2DDF 031C 9BA3 14A4  EADA 927D EBB3 987B 3751





Re: Creating a visual Map of a network?

2008-09-16 Thread Bill Woodcock
  On Tue, 16 Sep 2008 [EMAIL PROTECTED] wrote:
 This time I want to create a visual map of the LAN.

Intermapper.

http://dartware.com/network_monitoring_products/intermapper/index.html

-Bill




Re: LoA (Letter of Authorization) for Prefix Filter Modification?

2008-09-16 Thread Joe Greco
 On Tue, 16 Sep 2008, Christian Koch wrote:
  I dont mind, i think it is another good step towards 'good filtering'
  but...i think the PITA part is
  downstream 'clueless' customers, who may need an explanation on prefix
  hijacking and the state
  of the internet today, and that these are all just combined efforts to
  minimize the risk of accepting allocations
  that don't belong to you.
 
 IMO, it's just an illusion of added security and is really just CYA for 
 the provider.  When I fax TWTelecom an LOA that a customer faxed to me, 
 how does TWTelecom verify the authenticity of that LOA?  I doubt they try. 
 I suspect it's just filed, and will only be pulled out if the 
 advertisement is challenged by some 3rd party.

How do you verify the authenticity of anything?  This is a common problem
in the Real World, and is hardly limited to LoA's.

How do you prove that what was on Pages 1 to (N-1) of an N page contract
contained the words you think they said?  I knew a guy, back in the early
days, who habitually changed the SLA's in his contracts so that he could
cancel a contract for virtually no reason at all ... the folly of mailing
around contracts as .doc files in e-mail.  But even failing that, it's
pretty trivial to reprint a document, so where do you stop, do you use
special paper, special ink, watermarking of documents, initial each page,
all of the above, etc?

Look at what people are willing to go through with paper checks to
increase the chances of authenticity.  Google Abagnale.

The real world already has ways of dealing with fraud and forgery, and
while the paper is certainly CYA for the provider, it does provide an
actual trail back that can probably be followed to some party.  To refer
to it as an illusion is only vaguely true.  It is an illusion in that
it will not prevent all cases of hijacking.  Of course.  However, it is
another step that makes it significantly more difficult for someone to 
just start announcing random bits of IP space.

It's just like physical security, in many ways.  Given a sufficiently
determined attacker, any door can be broken.  Wood door?  May require
only my boot.  Steel door?  Prybar.  Bank vault?  Explosives.  Etc.
The thing is, as you increase the level of protection, the ease of
countermeasures typically decreases (I wear my boots almost 100% of
the time, I may have a prybar nearby, but I am unlikely to be carrying
explosives at any time.)

So let's not trivialize improvements such as LoA's which reduce the ease
of hijackings, eh.

... JG
-- 
Joe Greco - sol.net Network Services - Milwaukee, WI - http://www.sol.net
We call it the 'one bite at the apple' rule. Give me one chance [and] then I
won't contact you again. - Direct Marketing Ass'n position on e-mail spam(CNN)
With 24 million small businesses in the US alone, that's way too many apples.



Re: Creating a visual Map of a network?

2008-09-16 Thread Mr. James W. Laferriere

Hello Subba ,

On Tue, 16 Sep 2008, [EMAIL PROTECTED] wrote:


I am being tasked to map a network.  In the past I have used nmap to find the 
systems on the local LAN and remote LANs (same enterprise).
This time I want to create a visual map of the LAN.  With cheops, I reasonably 
good results but cannot be documented for managers with certainty. What are 
some good tools now that will create visual maps of the networks?

nmap can do this now ,  so I've been told .


What is the best way to map a network when ICMP echo has been turned off?
Thank you in advance for any help.
Subba Rao


Hth,  JimL
--
+--+
| James   W.   Laferriere | SystemTechniques | Give me VMS |
| NetworkSystem Engineer | 2133McCullam Ave |  Give me Linux  |
| [EMAIL PROTECTED] | Fairbanks, AK. 99701 |   only  on  AXP |
+--+



Re: Atrivo/Intercage: Now Only 1 Upstream

2008-09-16 Thread Paul Vixie
[EMAIL PROTECTED] (*Hobbit*) writes:

 So in cases like this where the community appears to agree that there's
 a consistently bad apple, what's preventing everyone from simply
 nullrouting the netblocks in question and imposing the death penalty?

http://www.spamhaus.org/drop/ seems to have atrivo on it.

 Sorry if this seems naive, but if no legitimate purpose is shown it
 seems like the obvious thing to do.  Maybe they could still *send*
 packets, but nothing would ever get back to them.

legitimacy is in the mind of the beholder of course.
-- 
Paul Vixie



Procedure to Change Nameservers

2008-09-16 Thread Crist Clark
This should be easy. But sometimes things that seem like they
should be easy are not.

I want to change the nameservers for a bunch of domains. Really,
all I want to do is change the IP address, but it seems easier
just to change both the name and IP to avoid any possibility of
confusion. However, I am not physically moving the services.
These are the same physical servers, just an additional IP address
assigned to the appropriate interface. I want to do this the
right way.

Here's what I want to do. Am I doing anything wrong? (Am I being
way too careful?) For the example, let's use the names, old-dns1,
new-dns1, old-dns2, and new-dns2. I think you can guess what they
mean.

1) Add new-dns1 and new-dns2 to the NS records for a domain. (Possible
problem: I have NS records in my authorative DNS for the zone that
are not in the hints at the gTLD server level. But that's not really
a problem, right? They are not lame servers.)

2) Change the NAMESERVER entries at the registrar from old-dns1 to
new-dn1 and old-dns2 to new-dns2.

3) Wait for the change to be reflected in the gTLD servers.

4) Wait for the TTL on the records to expire.

5) Wait a little bit longer just to be safe (maybe do some query
logging to see who still is using the old ones).

6) Remove old-dns1 and old-dns2 NS records from the zone.

7) Wait for the TTL on the records to expire.

8) Wait a bit longer.

9) Turn off DNS services at old-dns1 and old-dns2 (i.e. take out
the firewall rules that allow queries to those addresses).

10) ...

11) Profit.

Not really too bad. At least we don't have to send in host
record templates anymore.

B¼information contained in this e-mail message is confidential, intended
only for the use of the individual or entity named above. If the reader
of this e-mail is not the intended recipient, or the employee or agent
responsible to deliver it to the intended recipient, you are hereby
notified that any review, dissemination, distribution or copying of this
communication is strictly prohibited. If you have received this e-mail
in error, please contact [EMAIL PROTECTED] 



Re: Procedure to Change Nameservers

2008-09-16 Thread Mike Lewinski

Crist Clark wrote:


9) Turn off DNS services at old-dns1 and old-dns2 (i.e. take out
the firewall rules that allow queries to those addresses).

10) ...


10 ) Use one of the various sanity checking sites to validate some 
subset of your hosted domain configurations.


We used to like http://www.dnsstuff.com a lot, but they've gone 
commercial. It's still a great service and possibly worth the money (I 
bought a membership but will be comparing it with the other free 
offerings in the coming months before our renewal is up to see if 
there's really enough value add).


Free sites that perform similar DNS configuration checks that I know of 
are:


http://dnssy.com
http://www.intodns.com

Mike



Re: Procedure to Change Nameservers

2008-09-16 Thread Joe Maimon



Crist Clark wrote:

This should be easy. But sometimes things that seem like they
should be easy are not.

I want to change the nameservers for a bunch of domains. Really,
all I want to do is change the IP address, but it seems easier
just to change both the name and IP to avoid any possibility of
confusion. However, I am not physically moving the services.
These are the same physical servers, just an additional IP address
assigned to the appropriate interface. I want to do this the
right way.


Use a /32 routed to a host loopback interface. No reason to tie this to 
the network ethernet topology.


Route it here, route it there, route it through the load balancer, route 
it dynamically, route it here AND there.


Everything critical should be done that way. So much easier.

Make a clear distinction between the names in the NS and corresponding 
records and hostnames you use on the network. They should never 
correspond. That way you will never need/want to change them.


Keep the old addresses queryable for at least as long as your TTL was 
before the change. Maybe twice that. What does it cost you?


If you can do that, make the changes all at once or however suits your 
fancy, so long as what you put in works when you put it in.


if you keep the glue rec names/A the same as the zones NS records, there 
will be less bogus-lint complaints from things like dnsstuff, but you 
dont actually have to, as long as both sets work equally well.





RE: LoA (Letter of Authorization) for Prefix Filter Modification?

2008-09-16 Thread Skywing
It is only a good audit trail if the audit log can be trusted, though.  Given 
how secure things like faxes are, well, that's a thing for another day, I 
suppose.

Very few things out there in today's interconnected world really provide hard 
security, instead of security theatre/CYA/minor deterrants/keeping honest 
people honest.

That is not to say that these things have zero inherent value, at least in my 
mind, but they are not IMO to be confused with high security (as in military 
grade versus making a few clever [socially engineered] phone calls).

Even so, much of the modern day business world relies on these things to some 
degree or another.

- S

-Original Message-
From: Joe Greco [EMAIL PROTECTED]
Sent: Tuesday, September 16, 2008 11:15
To: Jon Lewis [EMAIL PROTECTED]
Cc: Rodriguez Mauricio [EMAIL PROTECTED]; nanog@nanog.org nanog@nanog.org
Subject: Re: LoA (Letter of Authorization) for Prefix Filter Modification?


 On Tue, 16 Sep 2008, Christian Koch wrote:
  I dont mind, i think it is another good step towards 'good filtering'
  but...i think the PITA part is
  downstream 'clueless' customers, who may need an explanation on prefix
  hijacking and the state
  of the internet today, and that these are all just combined efforts to
  minimize the risk of accepting allocations
  that don't belong to you.

 IMO, it's just an illusion of added security and is really just CYA for
 the provider.  When I fax TWTelecom an LOA that a customer faxed to me,
 how does TWTelecom verify the authenticity of that LOA?  I doubt they try.
 I suspect it's just filed, and will only be pulled out if the
 advertisement is challenged by some 3rd party.

How do you verify the authenticity of anything?  This is a common problem
in the Real World, and is hardly limited to LoA's.

How do you prove that what was on Pages 1 to (N-1) of an N page contract
contained the words you think they said?  I knew a guy, back in the early
days, who habitually changed the SLA's in his contracts so that he could
cancel a contract for virtually no reason at all ... the folly of mailing
around contracts as .doc files in e-mail.  But even failing that, it's
pretty trivial to reprint a document, so where do you stop, do you use
special paper, special ink, watermarking of documents, initial each page,
all of the above, etc?

Look at what people are willing to go through with paper checks to
increase the chances of authenticity.  Google Abagnale.

The real world already has ways of dealing with fraud and forgery, and
while the paper is certainly CYA for the provider, it does provide an
actual trail back that can probably be followed to some party.  To refer
to it as an illusion is only vaguely true.  It is an illusion in that
it will not prevent all cases of hijacking.  Of course.  However, it is
another step that makes it significantly more difficult for someone to
just start announcing random bits of IP space.

It's just like physical security, in many ways.  Given a sufficiently
determined attacker, any door can be broken.  Wood door?  May require
only my boot.  Steel door?  Prybar.  Bank vault?  Explosives.  Etc.
The thing is, as you increase the level of protection, the ease of
countermeasures typically decreases (I wear my boots almost 100% of
the time, I may have a prybar nearby, but I am unlikely to be carrying
explosives at any time.)

So let's not trivialize improvements such as LoA's which reduce the ease
of hijackings, eh.

... JG
--
Joe Greco - sol.net Network Services - Milwaukee, WI - http://www.sol.net
We call it the 'one bite at the apple' rule. Give me one chance [and] then I
won't contact you again. - Direct Marketing Ass'n position on e-mail spam(CNN)
With 24 million small businesses in the US alone, that's way too many apples.




Re: LoA (Letter of Authorization) for Prefix Filter Modification?

2008-09-16 Thread Joe Greco
 It is only a good audit trail if the audit log can be trusted, though.  Given 
 how secure things like faxes are, well, that's a thing for another day, I 
 suppose.
 
 Very few things out there in today's interconnected world really provide 
 hard security, instead of security theatre/CYA/minor deterrants/keeping 
 honest people honest.
 
 That is not to say that these things have zero inherent value, at least in my 
 mind, but they are not IMO to be confused with high security (as in military 
 grade versus making a few clever [socially engineered] phone calls).
 
 Even so, much of the modern day business world relies on these things to some 
 degree or another.

As I said, there are already ways to deal with these issues.
Unfortunately, most of them are reactive in nature.  Despite that fact, I
would much prefer to see a LoA, which will have some significant deterrent
value, rather than nothing at all.

The security of faxes has very little to do with it.  If twtelecom finds
that Jon Lewis over at Atlantic.net is sending in LoA's that turn out to
be fraudulent, it is very likely that the level of scrutiny for future
LoA's will suddenly increase, maybe involving calls to ARIN, the contact
information for the organization in question, etc., to try to further
determine the authenticity.  On the flip side, if Jon has sent in a hundred
LoA's, and none have ever been questioned, the level of scrutiny is likely
to be reasonably low.  Risk assessment in this environment isn't *that*
rough, and worrying about whether or not the trail can be audited/
authenticated, security of faxes, etc., may be excessively paranoid.

We do not have an Internet that is designed with hard security in mind,
so worrying about the easily attacked portions is certainly worthwhile, but
let's be thoughtful, rather than obsessive, about it.

... JG
-- 
Joe Greco - sol.net Network Services - Milwaukee, WI - http://www.sol.net
We call it the 'one bite at the apple' rule. Give me one chance [and] then I
won't contact you again. - Direct Marketing Ass'n position on e-mail spam(CNN)
With 24 million small businesses in the US alone, that's way too many apples.



Re: Atrivo/Intercage: Now Only 1 Upstream

2008-09-16 Thread Valdis . Kletnieks
On Tue, 16 Sep 2008 12:47:26 -, *Hobbit* said:
 So in cases like this where the community appears to agree that there's
 a consistently bad apple, what's preventing everyone from simply

what's preventing everyone?

Geez Hobbit, I *know* you've been around long enough to know better than that :)

We can't get a clear majority of providers to do BCP38, you expect them to
apply a null route?  And then to know to *remove* it once the problem withers
up? ;)



pgpoJMzfeFvF3.pgp
Description: PGP signature


Re: Atrivo/Intercage: Now Only 1 Upstream

2008-09-16 Thread *Hobbit*
   you expect them to apply a null route?

Well, I *have* been talking somewhat idealistically here and
there with this crop of questions, but frankly I thought in the
2 or 3 years I was ignoring the list that the NETWORK OPERATORS
ostensibly in custody of the intertubes would have pulled things
together a little better and grown enough of a pair to firmly
state this crap stops here and now and make it happen.

I do see pockets of good progress and research here and there
and have gotten a lot of good feedback from people, but the big
picture [as I watch my logs roll by] is pretty grim.  Especially
when the big players don't play at all.  I've been around long
enough to have a good idea of what *can* be done, but totally lost
sight of any sensible reason why it *isn't*.  Besides quarterly
revenue, which is pretty short-sighted.

Fortunately, I still have the luxury of being able to have my
mailsystems tell cpe-*.rr.com and pool-*.verizon.net and
c-24-*.comcast.net, along with large swaths of offshore IP
space, to take a powder.  Hundreds of times a day.  But it's
still their trash flying onto my tiny little lawn, and shouldn't
be my job to sweep up.  I mentally extend that picture to the
millions of recipients who possibly aren't able to implement
unusual and/or draconian filtering, and wonder how anybody
ever gets any productive work done.

_H*



Re: Atrivo/Intercage: Now Only 1 Upstream

2008-09-16 Thread Matthew Moyle-Croft


On 16/09/2008, at 10:17 PM, *Hobbit* wrote:

So in cases like this where the community appears to agree that  
there's

a consistently bad apple, what's preventing everyone from simply
nullrouting the netblocks in question and imposing the death penalty?


Dunno - but something did occur to me this morning on the drive into  
work:


Maybe there's another approach to this problem.  Maybe, rather than  
having the antispam/virus vendors do non-real world lab tests we could  
get them all to donate some kit to whomever is the unlucky transit- 
provider du jour and see how well it works providing a nice clean feed  
and who's better at it?  ;-)


MMC
--
Matthew Moyle-Croft Internode/Agile Peering and Core Networks