hat tip to .gov hostmasters

2008-09-22 Thread Scott Francis

http://it.slashdot.org/article.pl?sid=08/09/22/1253201from=rss

nice to see a wholesale DNSSEC rollout underway (I must confess to  
being a little surprised at the source, too!). Granted, it's a much  
more manageable problem set than, say, .com - but if one US-controlled  
TLD can do it, hope is buoyed for a .com rollout sooner rather than  
later (although probably not much sooner :)).


/sf


PGP.sig
Description: This is a digitally signed message part


Re: hat tip to .gov hostmasters

2008-09-22 Thread Jason Frisvold
On Mon, Sep 22, 2008 at 10:34 AM, Scott Francis [EMAIL PROTECTED] wrote:
 nice to see a wholesale DNSSEC rollout underway (I must confess to being a
 little surprised at the source, too!). Granted, it's a much more manageable
 problem set than, say, .com - but if one US-controlled TLD can do it, hope
 is buoyed for a .com rollout sooner rather than later (although probably not
 much sooner :)).

I'm not much up on DNSSEC, but don't you need to be using a resolver
that recognizes DNSSEC in order for this to be useful?

 /sf


-- 
Jason 'XenoPhage' Frisvold
[EMAIL PROTECTED]
http://blog.godshell.com



Re: hat tip to .gov hostmasters

2008-09-22 Thread Florian Weimer
* Jason Frisvold:

 On Mon, Sep 22, 2008 at 10:34 AM, Scott Francis [EMAIL PROTECTED] wrote:
 nice to see a wholesale DNSSEC rollout underway (I must confess to being a
 little surprised at the source, too!). Granted, it's a much more manageable
 problem set than, say, .com - but if one US-controlled TLD can do it, hope
 is buoyed for a .com rollout sooner rather than later (although probably not
 much sooner :)).

 I'm not much up on DNSSEC, but don't you need to be using a resolver
 that recognizes DNSSEC in order for this to be useful?

Correct, you need a validating, security-aware stub resolver, or the
ISP needs to validate the records for you.

-- 
Florian Weimer[EMAIL PROTECTED]
BFK edv-consulting GmbH   http://www.bfk.de/
Kriegsstraße 100  tel: +49-721-96201-1
D-76133 Karlsruhe fax: +49-721-96201-99



Re: hat tip to .gov hostmasters

2008-09-22 Thread Simon Vallet
On Mon, 22 Sep 2008 10:52:42 -0400
Jason Frisvold [EMAIL PROTECTED] wrote:

 I'm not much up on DNSSEC, but don't you need to be using a resolver
 that recognizes DNSSEC in order for this to be useful?

You do -- and last time I checked few native resolvers actually did :
glibc doesn't, and I'd be surprised if the Windows resolver does

Simon



Re: hat tip to .gov hostmasters

2008-09-22 Thread Chris Owen

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Sep 22, 2008, at 9:59 AM, Simon Vallet wrote:


On Mon, 22 Sep 2008 10:52:42 -0400
Jason Frisvold [EMAIL PROTECTED] wrote:


I'm not much up on DNSSEC, but don't you need to be using a resolver
that recognizes DNSSEC in order for this to be useful?


You do -- and last time I checked few native resolvers actually did :
glibc doesn't, and I'd be surprised if the Windows resolver does


Chicken, meet egg.

I think the point of the original post is that one end or the other  
has to start things.  At least we have one US zone doing something on  
the server end of things.


Chris


Chris Owen ~ Garden City (620) 275-1900 ~  Lottery (noun):
President  ~ Wichita (316) 858-3000 ~A stupidity tax
Hubris Communications Inc  www.hubris.net





-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (Darwin)
Comment: Public Key: http://home.hubris.net/owenc/pgpkey.txt
Comment: Public Key ID: 0xB513D9DD

iEYEARECAAYFAkjXs30ACgkQElUlCLUT2d0SfwCbB8FQ4izN061GoQQMl3fkq+NT
ga0AoJnwGG8PfBs5PaziRB6m0NQBuZwc
=68dm
-END PGP SIGNATURE-



Re: hat tip to .gov hostmasters

2008-09-22 Thread Colin Alston
Florian Weimer wrote:
 * Jason Frisvold:
 
 On Mon, Sep 22, 2008 at 10:34 AM, Scott Francis [EMAIL PROTECTED] wrote:
 nice to see a wholesale DNSSEC rollout underway (I must confess to being a
 little surprised at the source, too!). Granted, it's a much more manageable
 problem set than, say, .com - but if one US-controlled TLD can do it, hope
 is buoyed for a .com rollout sooner rather than later (although probably not
 much sooner :)).
 I'm not much up on DNSSEC, but don't you need to be using a resolver
 that recognizes DNSSEC in order for this to be useful?
 
 Correct, you need a validating, security-aware stub resolver, or the
 ISP needs to validate the records for you.
 

In public space like .com, don't you need some kind of central
trustworthy CA?



Re: hat tip to .gov hostmasters

2008-09-22 Thread Florian Weimer
* Colin Alston:

 Correct, you need a validating, security-aware stub resolver, or the
 ISP needs to validate the records for you.

 In public space like .com, don't you need some kind of central
 trustworthy CA?

No, why would you?  You need to trust the zone operator, and you need
some trustworthy channel to exchange trust anchors at one point in
time (a significant improvement compared to classic DNS, where you
need a trustworthy channel all the time).

-- 
Florian Weimer[EMAIL PROTECTED]
BFK edv-consulting GmbH   http://www.bfk.de/
Kriegsstraße 100  tel: +49-721-96201-1
D-76133 Karlsruhe fax: +49-721-96201-99



Re: hat tip to .gov hostmasters

2008-09-22 Thread Simon Vallet
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Mon, 22 Sep 2008 10:02:21 -0500
Chris Owen [EMAIL PROTECTED] wrote:

 Chicken, meet egg.
 
 I think the point of the original post is that one end or the other  
 has to start things.  At least we have one US zone doing something on  
 the server end of things.

I totally agree on that, but wanted to point out that there still is
some work be done.

The folks at NLnet do have a nice DNSSEC implementation, though, as
well as the BIND library.

Simon
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkjXtWUACgkQccZs6oMJsYR5XQCbB6e92xTcaR2ijn0DcAALdswA
358AmQH36qg/fBRGxJIFS4Alm4sAKF9w
=7JfR
-END PGP SIGNATURE-


RE: hat tip to .gov hostmasters

2008-09-22 Thread Keith Medcalf

 Correct, you need a validating, security-aware stub resolver, or the
 ISP needs to validate the records for you.

That would defeat the entire purpose of using DNSSEC.  In order for DNSSEC to 
actually provide any improvement in security whatsoever, the ROOT ZONE (.) 
needs to be signed, and every delegation up the chain needs to be signed.  And 
EVERY resolver (whether recursive or local on host) needs to understand and 
enforce DNSSEC.

If even one delegation is unsigned or even one resolver does not enforce 
DNSSEC, then, from an actual security perspective, you will be far worse off 
than you are now.

Until such time as EVERY SINGLE DOMAIN including the root is signed and every 
single DNS Server and resolver (including the local host resolvers) understand 
and enforce DNSSEC you should realize that DNSSEC does nothing for you 
whatsoever except give the uneducated a false sense of security.

It is likely that IPv48 will be deployed long before DNSSEC is implemented.







RE: hat tip to .gov hostmasters

2008-09-22 Thread marcus.sachs
DNSSEC is not a PKI.  There are no CAs and no X.509 certificates.  It's a chain 
of trust that can be validated using public/private key pairs.  OK, that's 
oversimplification but you get the idea.

While we wait for applications to become DNSSEC-aware, if your local DNS server 
can be trusted (a big if of course) then it can proxy the DNSSEC awareness 
for you.  Since nearly everybody trusts a local DNS server to resolve queries, 
then making that server DNSSEC aware is an enormous step forward, even if the 
actual applications and operating systems on end-user computers are not fully 
DNSSEC-aware and won't be for many years to come.

Marc

-Original Message-
From: Florian Weimer [mailto:[EMAIL PROTECTED] 
Sent: Monday, September 22, 2008 11:10 AM
To: Colin Alston
Cc: nanog@nanog.org
Subject: Re: hat tip to .gov hostmasters

* Colin Alston:

 Correct, you need a validating, security-aware stub resolver, or the
 ISP needs to validate the records for you.

 In public space like .com, don't you need some kind of central
 trustworthy CA?

No, why would you?  You need to trust the zone operator, and you need
some trustworthy channel to exchange trust anchors at one point in
time (a significant improvement compared to classic DNS, where you
need a trustworthy channel all the time).

-- 
Florian Weimer[EMAIL PROTECTED]
BFK edv-consulting GmbH   http://www.bfk.de/
Kriegsstraße 100  tel: +49-721-96201-1
D-76133 Karlsruhe fax: +49-721-96201-99




Re: hat tip to .gov hostmasters

2008-09-22 Thread bmanning
On Mon, Sep 22, 2008 at 10:52:42AM -0400, Jason Frisvold wrote:
 On Mon, Sep 22, 2008 at 10:34 AM, Scott Francis [EMAIL PROTECTED] wrote:
  nice to see a wholesale DNSSEC rollout underway (I must confess to being a
  little surprised at the source, too!). Granted, it's a much more manageable
  problem set than, say, .com - but if one US-controlled TLD can do it, hope
  is buoyed for a .com rollout sooner rather than later (although probably not
  much sooner :)).
 
 I'm not much up on DNSSEC, but don't you need to be using a resolver
 that recognizes DNSSEC in order for this to be useful?
 
  /sf
 
 
 -- 
 Jason 'XenoPhage' Frisvold
 [EMAIL PROTECTED]
 http://blog.godshell.com


yes and no.  to fully trust the data from the servers you need
three things:

) signed data (this is what .gov is doing)
) a validator in the end system (this is mostly missing/not configured 
today)
) accurate trust anchors from a couple of places in the DNS namespace ##

however,

if all you start with is signed data - it becomes possible to verify the
source of the data - independently of inline DNS validation.  e.g. you 
can - with a high degree of certainty, be assured that the root zone 
you 
load is really the ORSN root and not that flaky root from 
DoC/ICANN/VSGN... :)

so naked signed data, in the absence of TA's or validators is still
useful.


## you'll need a couple of these - and how you get them and keep them up to 
date is
   still a mostly unsolved operational problem.

--bill



Re: hat tip to .gov hostmasters

2008-09-22 Thread Florian Weimer
* marcus sachs:

 While we wait for applications to become DNSSEC-aware,

Uhm, applications shouldn't be DNSSEC-aware.  Down that road lies
madness.  What should an end user do when the browser tells him,
Warning: Could not validate DNSSEC signature on www.example.com,
signature has expired.  Continue to connect?

-- 
Florian Weimer[EMAIL PROTECTED]
BFK edv-consulting GmbH   http://www.bfk.de/
Kriegsstraße 100  tel: +49-721-96201-1
D-76133 Karlsruhe fax: +49-721-96201-99



Re: hat tip to .gov hostmasters

2008-09-22 Thread bmanning
On Mon, Sep 22, 2008 at 11:11:40AM -0400, Keith Medcalf wrote:
 
  Correct, you need a validating, security-aware stub resolver, or the
  ISP needs to validate the records for you.
 
 That would defeat the entire purpose of using DNSSEC.  In order for DNSSEC to 
 actually provide any improvement in security whatsoever, the ROOT ZONE (.) 
 needs to be signed, and every delegation up the chain needs to be signed.  
 And EVERY resolver (whether recursive or local on host) needs to understand 
 and enforce DNSSEC.

er, no. the root zone does not need to be signed and not every 
delegation.
and only the resolvers in the path from auth servers to validators need 
to 
ensure that the DNSSEC data is retained.

if the only TA I have is for .SE (configured in my validator) and my 
resolver
passes the DNSSEC data unchanged it received from the .SE servers, then 
I can
securely trust the (short) validation chain when I look up  axfr.se.
even though -nothing else- is signed.


 
 If even one delegation is unsigned or even one resolver does not enforce 
 DNSSEC, then, from an actual security perspective, you will be far worse off 
 than you are now.

depends on your POV of course... 

 Until such time as EVERY SINGLE DOMAIN including the root is signed and every 
 single DNS Server and resolver (including the local host resolvers) 
 understand and enforce DNSSEC you should realize that DNSSEC does nothing for 
 you whatsoever except give the uneducated a false sense of security.

I think  you have unrealistic expectations.  Time will tell.
 
 It is likely that IPv48 will be deployed long before DNSSEC is implemented.

--bill



Re: hat tip to .gov hostmasters

2008-09-22 Thread bmanning
On Mon, Sep 22, 2008 at 05:24:00PM +0200, Florian Weimer wrote:
 * marcus sachs:
 
  While we wait for applications to become DNSSEC-aware,
 
 Uhm, applications shouldn't be DNSSEC-aware.  Down that road lies
 madness.  What should an end user do when the browser tells him,
 Warning: Could not validate DNSSEC signature on www.example.com,
 signature has expired.  Continue to connect?
 
 -- 
 Florian Weimer[EMAIL PROTECTED]


actually, I am really hoping that at least one API
is standardized so that applications can use DNSSEC 
data.  We never finished the discussion on fail/open
fail/closed wrt DNSSEC.

--bill



Re: hat tip to .gov hostmasters

2008-09-22 Thread Michael Thomas

Jason Frisvold wrote:

On Mon, Sep 22, 2008 at 11:02 AM, Chris Owen [EMAIL PROTECTED] wrote:
  

Chicken, meet egg.

I think the point of the original post is that one end or the other has to
start things.  At least we have one US zone doing something on the server
end of things.



Oh, agreed, absolutely.  And it's great to see.  However, neither the
slashdot blurb, nor the NetworkWorld article mention that without a
valid resolver, there is no guarantee of security.  Sure, they mention
that vendors are rolling it out and that ISPs should be following
suit, but no mention is made of the end-user's resolver at all...
  


I dunno, a few very strategically placed validating resolvers could subject
a huge amount of DNS traffic to a much higher bar were the senders so
inclined to sign their zones. But I tend to view these kinds of things much
more from an epidemiology point of view: you don't have to have 100%
eradication to control an epidemic. Same thing pretty much goes with 
internet

based attacks, IMO: when the barrier is set sufficiently high in one area,
attackers don't spend their entire time trying to break that barrier, 
they find the

next lowest barrier and move on.

  Mike



RE: hat tip to .gov hostmasters

2008-09-22 Thread Goltz, Jim (NIH/CIT) [E]
 nice to see a wholesale DNSSEC rollout underway (I must confess to
 being a little surprised at the source, too!). Granted, it's a much
 more manageable problem set than, say, .com - but if one US-controlled
 TLD can do it, hope is buoyed for a .com rollout sooner rather than
 later (although probably not much sooner :)).

It ain't done yet.

I don't speak for the hostmasters of .gov or any subdomain thereof.
But I'll believe it when I see it.

Remember, they've also mandated IPv6 support on all backbones.

--
Jim Goltz [EMAIL PROTECTED]
CIT/DCSS/HSB/ASIG
12/2216



RE: hat tip to .gov hostmasters

2008-09-22 Thread Keith Medcalf

  That would defeat the entire purpose of using DNSSEC.  In order for
 DNSSEC to actually provide any improvement in security whatsoever,
 the ROOT ZONE (.) needs to be signed, and every delegation up the
 chain needs to be signed.  And EVERY resolver (whether recursive or
 local on host) needs to understand and enforce DNSSEC.

 Either the resolver needs to enforce, or the host.  It's not necessary
 to do both.  It's also not strictly necessary that the root is signed,
 provided that there is some way to manage the trust anchors (either
 through software updates, like it is done for the browser CA list, or
 through regular DNS management at the ISP resolver).

  If even one delegation is unsigned or even one resolver does not
  enforce DNSSEC, then, from an actual security perspective, you will
  be far worse off than you are now.

 Why?

If the local resolver does not perform DNSSEC validation, then I cannot 
validate that the response is correct.  I certainly do not trust anyone else to 
verify that the information is correct and then, without any possible 
verification, simply believe that the third party did the validation.  In fact, 
I have no way of knowing that the response even came from the ISP at all 
unless the client resolver supports DNSSEC.

Just because YOU check the digital signature on an email and forward that email 
to me (either with or without the signature data), if I do not have the 
capability to verify the signature myself, I sure as hell am not going to trust 
your mere say-so that the signature is valid!

If I cannot authenticate the data myself, then it is simply untrusted and 
untrustworthy -- exactly the same as it is now.

The real problem is that the clueless (with a hidden self-aggrandizing and a 
primary motive of lining my pockets with other peoples money will convince 
the ignorant that it is more secure.  Sort of like banning toothpaste from 
carry-on baggage impoves the security of air travel, when in fact it does 
nothing more than help the idiots in charge of promulgating such polies to rip 
off (rob) other people of their money by deliberate fraud and misrepresentation.


  Until such time as EVERY SINGLE DOMAIN including the root is signed
  and every single DNS Server and resolver (including the local host
  resolvers) understand and enforce DNSSEC you should realize that
  DNSSEC does nothing for you whatsoever except give the uneducated a
  false sense of security.

 DNSSEC is totally invisible to the end user.  There won't be any
 browser icon that says it's okay to enter your PII here because the
 zone is DNSSEC-signed.  It's purely an infrastructure measure, like
 physically securing your routers.

The end-stage is secure only if at that stage you also set all DNS 
infrastructure to refuse to talk to any DNS client/server/resolver that DOES 
NOT validate and enforce DNSSEC.  Up until that point in time, there is NO 
CHANGE in the security posture from what we have today with no DNSSEC 
whatsoever.

To hold forth otherwise is to participate in deliberate fraud and 
misrepresentation of material facts.







Re: hat tip to .gov hostmasters

2008-09-22 Thread Scott Francis
On Mon, Sep 22, 2008 at 8:49 AM, Keith Medcalf [EMAIL PROTECTED] wrote:

  If even one delegation is unsigned or even one resolver does not
  enforce DNSSEC, then, from an actual security perspective, you will
  be far worse off than you are now.

 Why?

 If the local resolver does not perform DNSSEC validation, then I cannot 
 validate that the response is correct.
 I certainly do not trust anyone else to verify that the information is 
 correct and then, without any possible verification,
 simply believe that the third party did the validation.  In fact, I have no 
 way of knowing that the response even came
 from the ISP at all unless the client resolver supports DNSSEC.

 Just because YOU check the digital signature on an email and forward that 
 email to me (either with or without the
 signature data), if I do not have the capability to verify the signature 
 myself, I sure as hell am not going to trust your
 mere say-so that the signature is valid!

 If I cannot authenticate the data myself, then it is simply untrusted and 
 untrustworthy -- exactly the same as it is now.

so I guess PGP web of trust is right out, then?

(in the real world, we rarely get boolean values on security questions)
-- 
[EMAIL PROTECTED],darkuncle.net} || 0x5537F527
 http://darkuncle.net/pubkey.asc for public key



Re: Atrivo/Intercage: NO Upstream depeer

2008-09-22 Thread Paul Wall
Emil,

If you've actually shut off the RBN, you should have no problem
finding some new transit to turn up, right?

We're in a buyer's market, and there are dozens of vendors on-net at
200 Paul who'd love a piece of your business.

Drive Slow,
Paul Wall

On Sun, Sep 21, 2008 at 3:20 PM, Emil Kacperski [EMAIL PROTECTED] wrote:
 Hello,

 It's true that David from PIE disconnected our link approx 9pm or so 
 yesterday.  Things were going perfect, no complaints for a few weeks now.  
 The only thing I believe is that NTT gave lots of pressure to PIE.  For some 
 unknown reason when I tried to reach out to the security guy at NTT he 
 basically said our contract is with PIE.

 So in a time like this you really get to know who your friends are and who 
 should be avoided.

 Onward and upward!  What doesn't kill you only makes you stronger ;-).  Just 
 feel bad for the customers for which I am truly sorry for right now ;-(.

 Thanks!

 Contact: Emil Kacperski

 Company: Intercage Inc. - Atrivo

 Dedicated Servers

 San Francisco Datacenter

 E-Mail:  [EMAIL PROTECTED]

 Phone:   925-550-3947

 ICQ: 23531098







RE: hat tip to .gov hostmasters

2008-09-22 Thread Keith Medcalf

  Just because YOU check the digital signature on an email
 and forward that email to me (either with or without the
  signature data), if I do not have the capability to verify
 the signature myself, I sure as hell am not going to trust your
  mere say-so that the signature is valid!

  If I cannot authenticate the data myself, then it is simply
 untrusted and untrustworthy -- exactly the same as it is now.

 so I guess PGP web of trust is right out, then?

You are confusing validating signature with validating the holder of the 
keying material and the authorization of the holder to deploy it to create a 
non-repudiable signature, which are two entirely different and completely 
unreleated things.  (This is quite common by the way, so maybe you can be 
excused your confusion).

If there is a piece of data X signed with a cryptographically generated 
signature, and *I* verify that indeed the signature is valid, then the 
signature is valid -- that is, I can say with 100% absolute certainty that 
specific bit of keying material was used to generate a signature on something 
and that I have another bit of keying material which validates that signature.  
I am assured with very high certainty that THE DATA WAS SIGNED BY THE POSSESSOR 
OF THE SECRET KEYING MATERIAL.

Nothing more can be determined from the signature.

You now want to confuse the issue by associating the keying material with a 
person or entity.  That problem is entirely outside the purview of the 
exercize and completely irrelevant.  (I certainly do not trust that any 
certificate issued by a so-called Certificate Authority (other than myself) was 
issued to the entity it is purported to be issued to, nor that the key is 
properly kept secret, nor anything else.

The mathematical validity of the signature is beyond question.  Associating 
that signature to anything other than a mere statement that this data was 
signed by the possessor of the secret key corresponding to the public key that 
I have is a personal judgement call.






Re: hat tip to .gov hostmasters

2008-09-22 Thread Edward Lewis

At 15:30 + 9/22/08, [EMAIL PROTECTED] wrote:


data.  We never finished the discussion on fail/open
fail/closed wrt DNSSEC.


And I'd bet a dollar we never will finish that discussion.
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

Never confuse activity with progress.  Activity pays more.



Re: hat tip to .gov hostmasters

2008-09-22 Thread bmanning
 
 The end-stage is secure only if at that stage you also set all DNS 
 infrastructure to refuse to talk to any DNS client/server/resolver that DOES 
 NOT validate and enforce DNSSEC.  Up until that point in time, there is NO 
 CHANGE in the security posture from what we have today with no DNSSEC 
 whatsoever.
 
 To hold forth otherwise is to participate in deliberate fraud and 
 misrepresentation of material facts.
 
 

so you are a fail/closed proponent.
a fail/open approach would have failure of DNSSEC-based validation 
behave
just like the DNS of today.  The use of Trust Anchors and signed 
islands
allow one to find golden threads of validated chains in the dns 
fabric ...
e.g. incremental rollout vs flag day.

--bill



Re: hat tip to .gov hostmasters

2008-09-22 Thread bmanning
On Mon, Sep 22, 2008 at 12:06:57PM -0400, Edward Lewis wrote:
 At 15:30 + 9/22/08, [EMAIL PROTECTED] wrote:
 
  data.  We never finished the discussion on fail/open
  fail/closed wrt DNSSEC.
 
 And I'd bet a dollar we never will finish that discussion.
 -- 
 -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
 Edward Lewis+1-571-434-5468
 NeuStar
 
 Never confuse activity with progress.  Activity pays more.


taken.   (never is a -very- long time)

--bill



Re: hat tip to .gov hostmasters

2008-09-22 Thread bmanning
On Mon, Sep 22, 2008 at 12:14:53PM -0400, Keith Medcalf wrote:
 
   If I cannot authenticate the data myself, then it is simply 
  untrusted and untrustworthy -- exactly the same as it is now.
 
  so I guess PGP web of trust is right out, then?
 
[elided]
 
 If there is a piece of data X signed with a cryptographically generated 
 signature, and *I* verify that indeed the signature is valid, then the 
 signature is valid -- that is, I can say with 100% absolute certainty that 
 specific bit of keying material was used to generate a signature on something 
 and that I have another bit of keying material which validates that 
 signature.  I am assured with very high certainty that THE DATA WAS SIGNED BY 
 THE POSSESSOR OF THE SECRET KEYING MATERIAL.
 
 Nothing more can be determined from the signature.
 


let me understand this ... your use of the pronoun I in these contexts
is in reference to your corporal being i.e. meatspace and not a software
application running on some computer.

--bill



Re: hat tip to .gov hostmasters

2008-09-22 Thread Kevin Oberman
 Date: Mon, 22 Sep 2008 11:42:33 -0400
 From: Goltz, Jim (NIH/CIT) [E] [EMAIL PROTECTED]
 
  nice to see a wholesale DNSSEC rollout underway (I must confess to
  being a little surprised at the source, too!). Granted, it's a much
  more manageable problem set than, say, .com - but if one US-controlled
  TLD can do it, hope is buoyed for a .com rollout sooner rather than
  later (although probably not much sooner :)).
 
 It ain't done yet.
 
 I don't speak for the hostmasters of .gov or any subdomain thereof.
 But I'll believe it when I see it.

I am pretty sure that you will see it. Unlike things like the IPv6
requirement, there are no waivers available for this. '.gov' must be
signed early next year and all zones delegated from the '.gov' GTLD must
be signed in early 2010. I doubt that many will sign until '.gov' is
signed, so you won't see much change for a few months.

Now, if the DOC people responsible for root would just catch a clue, we
could get that signed and have DNSSEC actually usable (except for
Mr. Metcalf) in a significant part of the US network before I retire.

 Remember, they've also mandated IPv6 support on all backbones.

Yes, and the goal, relatively insignificant that it was, was met. It was
not a requirement that anyone actually use IPv6, only that the agency
backbone networks be able to carry IPv6. In fact, the wording was such
that doing proper routing was not even really needed.  

Our backbone has offered IPv6 as a production service since 2002, so it
was a non-effort for us. Most other agency backbones were pretty trivial
to make IPv6 capable.

The problem is that only the backbone currently needs IPv6. No facility
network or end host needs it, No network service needs it. No IPv6
packets, even routing updates, need to be delivered in any useful
way. It was a pretty trivial goal and was met with very little effort.
-- 
R. Kevin Oberman, Network Engineer
Energy Sciences Network (ESnet)
Ernest O. Lawrence Berkeley National Laboratory (Berkeley Lab)
E-mail: [EMAIL PROTECTED]   Phone: +1 510 486-8634
Key fingerprint:059B 2DDF 031C 9BA3 14A4  EADA 927D EBB3 987B 3751


pgp2Nyla9XDdl.pgp
Description: PGP signature


Re: hat tip to .gov hostmasters

2008-09-22 Thread David Conrad

On Sep 22, 2008, at 7:56 AM, Florian Weimer wrote:

I'm not much up on DNSSEC, but don't you need to be using a resolver
that recognizes DNSSEC in order for this to be useful?


Yes, and you also need the trust anchors for the zones you want to  
validate configured.



Correct, you need a validating, security-aware stub resolver, or the
ISP needs to validate the records for you.


Slight clarification: you need a validating, security-aware resolver,  
whether that resolver is local (e.g., running on the same machine  
issuing the DNS queries) or remote (e.g., your ISP's resolver).  Note  
that, for good or ill, you are trusting the operator of the resolver  
and the communication channel between the resolver and the application  
making the DNS requests.


A validating, security-aware _stub_ resolver, typically linked into  
the program issuing the DNS requests and thus would be the ultimate in  
'local', would have the ability to validate the response and supply  
feedback to the application with minimum vulnerability to MITM  
attacks.  The downside is the added complexity of the code to the  
validation and to handle validation failures.


Regards,
-drc





Re: hat tip to .gov hostmasters

2008-09-22 Thread David Conrad

On Sep 22, 2008, at 8:11 AM, Keith Medcalf wrote:

Correct, you need a validating, security-aware stub resolver, or the
ISP needs to validate the records for you.


That would defeat the entire purpose of using DNSSEC.  In order for  
DNSSEC to actually provide any improvement in security whatsoever,  
the ROOT ZONE (.) needs to be signed, and every delegation up the  
chain needs to be signed.


The root does not need to be signed to provide security improvement.   
If you have configured the (say) .SE trust anchor in your validating  
resolver, you greatly reduce the chances that any lookup for a name  
in .SE can be spoofed.  The downside of not having the root signed is  
that you need to maintain multiple trust anchors.


And EVERY resolver (whether recursive or local on host) needs to  
understand and enforce DNSSEC.


I personally believe it is more-or-less safe to trust communications  
local to the machine.  As such, running a validating resolver on your  
local host would suffice.  Having a stub resolver also validate in  
this scenario would be overkill.


If even one delegation is unsigned or even one resolver does not  
enforce DNSSEC, then, from an actual security perspective, you will  
be far worse off than you are now.


In what way?  I'm running a validating resolver on my laptop (using  
the signed root zone and trust anchor available from ns.iana.org so I  
only have to deal with one trust anchor).  If someone tries to spoof a  
name in the root, .SE, .BG, .PR, .BR, .CZ, their efforts will fail.   
How is this worse off than before I configured my resolver?


Until such time as EVERY SINGLE DOMAIN including the root is signed  
and every single DNS Server and resolver (including the local host  
resolvers) understand and enforce DNSSEC you should realize that  
DNSSEC does nothing for you whatsoever except give the uneducated a  
false sense of security.


If this were true, DNSSEC would be a complete waste of time.   
Fortunately, it isn't true.


Regards,
-drc




Re: hat tip to .gov hostmasters

2008-09-22 Thread Stephen Sprunk

Kevin Oberman wrote:

Date: Mon, 22 Sep 2008 11:42:33 -0400
From: Goltz, Jim (NIH/CIT) [E] [EMAIL PROTECTED]

Remember, they've also mandated IPv6 support on all backbones.



Yes, and the goal, relatively insignificant that it was, was met. It was not a requirement that anyone actually use IPv6, only that the agency backbone networks be able to carry IPv6. In fact, the wording was such that doing proper routing was not even really needed.  


Our backbone has offered IPv6 as a production service since 2002, so it was a non-effort 
for us. Most other agency backbones were pretty trivial to make IPv6 capable.

The problem is that only the backbone currently needs IPv6. No facility network 
or end host needs it, No network service needs it. No IPv6 packets, even 
routing updates, need to be delivered in any useful way. It was a pretty 
trivial goal and was met with very little effort.
  


They mandated that all products, not just hardware, support IPv6.  
However, all that the requirement turned out to be, in practice, is that 
all products be software upgradeable to IPv6.  My employer is still 
selling stuff by the truckload to the USG because the hardware itself is 
IPv6 capable (just like it's OSI or DECnet capable), but we haven't 
written a single line of IPv6 code yet because customers aren't actually 
demanding it and we have other, more profitable, things to spend 
developers' limited time on.


For vendors whose hardware needs to change for IPv4, like core routers, 
this is a big deal; for the rest of us, it was a non-event once we read 
the fine print.


S



RE: hat tip to .gov hostmasters

2008-09-22 Thread Robert Bonomi
 Subject: RE: hat tip to .gov hostmasters
 Date: Mon, 22 Sep 2008 11:49:50 -0400
 From: Keith Medcalf [EMAIL PROTECTED]
  
 If I cannot authenticate the data myself, then it is simply untrusted and u=
 ntrustworthy -- exactly the same as it is now.

Speak for yourself, John applies.

In the real world, there are cases where data that one is unable to 
authenticate by ones self *is* treated as fully trusted.  Because someone
with the authority to declare it to be that, by fiat, has done so.

There may be a common chain of command, and someone higher in the chain
has declared that various inferiors shall(i.e. 'must') trust the work
of other inferiors within the organization, for example.

Or, it may be a contractually-delegated trust.

Or, any of a number of other possibilities.

Admittedly, in any of those scenarios, the 'strength' of trust is somewhat
weaker than if it was self-verified, but it _is_ far above your claim of
'untrusted and untrustworthy'.

 The end-stage is secure only if at that stage you also set all DNS infrastr=
 ucture to refuse to talk to any DNS client/server/resolver that DOES NOT va=
 lidate and enforce DNSSEC.  Up until that point in time, there is NO CHANGE=
  in the security posture from what we have today with no DNSSEC whatsoever.

FALSE TO FACT.

One does not have a _guarantee_ of 'accurate' data without end-to-end 
enforcement, this is true.

Even _with_ end-to-end DNSSEC enforcement, one does not have such a guarantee.

All it accomplishes is to make the insertion of bogus data harder.  Not 
'impossible', just 'harder'.

If a local non-DNSSEC resolver consults _only_ a DNSSEC-aware server on an 
immediately adjacent network, it takes only a moderate 'extension of trust'
to  (a) the local network operator, (b) the adjacent network operator, and
(c) the DNSSEC-aware server operator, to have a reasonable degree of 
trust in the accuracy of the data the local reslover has.  This 'trust'
involves the physical integrity of the networks -- that a host on -those-
networks will not be allowed to spoof a source address of the DNSSEC-aware
server; and the use of ingress-filtering on _source_ addresses -- to prevent
any 'external' network/machine from spoofing it either.  Beyond that, it is
just a matter of 'trusting' a proper implementation on the server itself.

_IF_ the anti-spoofing provisions are in place, and 'downstream' (non-aware)
DNS resolvers (which consult -only- the 'aware' server) are under the same 
administrative control as the DNSSEC-aware one, *THEN* there is zero effective 
difference in the trust level for an answer obtained from the 'non-aware'
system as one obtained from the 'aware' one.

 To hold forth otherwise is to participate in deliberate fraud and misrepres=
 entation of material facts.

This really sounds like someone who has a financial interest in promulgating
FUD.  grin





RE: hat tip to .gov hostmasters

2008-09-22 Thread Lindley James R
To digress on IPv6 momentarily.

The airline magazine engineering memorandum* from OMB left two terms
undefined in the mandate; backbone network and IPv6 compatible.  The
Intra-agency IPv6 Federal Working Group wisely defined backbone
network as (paraphrasing) the wire exiting the first publicly-reachable
network perimeter router and entering the router next in the line of
traffic and all devices attached to that wire between those two points
as follows:

{Internet}-|router|-connecting wire---IPV6-[firewall, IDS,
etc.]-IPV6--connecting wire-|next router in line|-NO IPV6-...

NIST is still working on compatible.

*Airline Magazine Engineering Memorandum:  a mandate issued by an
executive who can.  The memorandum has four characteristics; 1) It
mandates a technology not well understood by either the issuer or the
recipient of the memo, 2) it sets a date certain by which the technology
must be implemented, 3) it provides no funding, and 4, it contains one
or more undefined terms whose exact meanings are absolutely crucial to
actual implementation of the mandate.  Source of the inspiration that
originally convinced the issuing executive that they actually understood
the scope and technology of the mandate is inherent in the title of this
paragraph.

JimL
James R Lindley
Senior Computer Engineer
Advanced Technical Analysis Team
IT Security Architecture and Engineering
Internal Revenue Service
An unquenchable thirst for Pierian waters.

-Original Message-
From: Kevin Oberman [mailto:[EMAIL PROTECTED] 
Sent: Monday, September 22, 2008 12:54
To: Goltz, Jim (NIH/CIT) [E]
Cc: nanog@nanog.org
Subject: Re: hat tip to .gov hostmasters 

 Date: Mon, 22 Sep 2008 11:42:33 -0400
 From: Goltz, Jim (NIH/CIT) [E] [EMAIL PROTECTED]
 
  nice to see a wholesale DNSSEC rollout underway (I must confess to 
  being a little surprised at the source, too!). Granted, it's a much 
  more manageable problem set than, say, .com - but if one 
  US-controlled TLD can do it, hope is buoyed for a .com rollout 
  sooner rather than later (although probably not much sooner :)).
 
 It ain't done yet.
 
 I don't speak for the hostmasters of .gov or any subdomain thereof.
 But I'll believe it when I see it.

I am pretty sure that you will see it. Unlike things like the IPv6
requirement, there are no waivers available for this. '.gov' must be
signed early next year and all zones delegated from the '.gov' GTLD must
be signed in early 2010. I doubt that many will sign until '.gov' is
signed, so you won't see much change for a few months.

Now, if the DOC people responsible for root would just catch a clue, we
could get that signed and have DNSSEC actually usable (except for Mr.
Metcalf) in a significant part of the US network before I retire.

 Remember, they've also mandated IPv6 support on all backbones.

Yes, and the goal, relatively insignificant that it was, was met. It was
not a requirement that anyone actually use IPv6, only that the agency
backbone networks be able to carry IPv6. In fact, the wording was such
that doing proper routing was not even really needed.  

Our backbone has offered IPv6 as a production service since 2002, so it
was a non-effort for us. Most other agency backbones were pretty trivial
to make IPv6 capable.

The problem is that only the backbone currently needs IPv6. No facility
network or end host needs it, No network service needs it. No IPv6
packets, even routing updates, need to be delivered in any useful way.
It was a pretty trivial goal and was met with very little effort.
--
R. Kevin Oberman, Network Engineer
Energy Sciences Network (ESnet)
Ernest O. Lawrence Berkeley National Laboratory (Berkeley Lab)
E-mail: [EMAIL PROTECTED]   Phone: +1 510 486-8634
Key fingerprint:059B 2DDF 031C 9BA3 14A4  EADA 927D EBB3 987B 3751



favourite XFP supplier?

2008-09-22 Thread Joe Abley

Hi all,

Anybody have a preferred supplier for 10GE XFPs, multimode and  
singlemode?


These are to be installed in Force10 and Juniper hardware in Toronto,  
so a Canadian supplier would be fabulous although I won't hold my  
breath.



Joe



RE: Atrivo/Intercage

2008-09-22 Thread Tom Sparks (Applied Operations)
Just to add my $0.02 to this discussion and a disclaimer - I've known 
Emil for years, I've seen his shop and even the controversy.
200 Paul is a small community, and most of the folks in there know
eachother, I've been in there since 2001 or so.

Intercage is not a big shop, there are very few people involved in running
it and I have a very hard time believing the accusations made by some
of the folks around. I also don't believe Intercage was complicit in any
net-crime; Thats not to say it didn't exist, but more along the lines
of they got lost in the noise of running a business. I'd guess that
given the server volume they've got, abuse emails are less than one percent
of all the email they get in a week. From what I've seen, the bulk of their
customer base is webhosters, Unix Shell providers and some video/audio
streamers. Were I to venture a guess on the number of folks reselling
those webservers, its probably on the order of thousands...

Any time I've had an issue with one of Atrivo's customers, it only took
one email to get it dealt with, or I got Emil on IM or on the phone and
it was taken care of. 

My experience with being on the other end of abuse@, I'd say a good
60-75% of the complaints I saw coming in were bogus. Either people
complaining about their ZoneAlarm's going off, people complaining
about bounced emails with spam and a bunch of automated stuff that was
always wrong. The legit complaints were not always easy to deal with
either since a good 20-30% of them were unclear on what was actually wrong
until you spent some time digging.

Basically is what it boils down to for me - its easy to blame
an NSP/ISP/Hoster for what their clients do, it takes real dedication to
find out whats *actually* going on.

-- 
Tom Sparks
(415) 367-7328x1001



Re: Atrivo/Intercage

2008-09-22 Thread Drew Linsalata


On Sep 22, 2008, at 4:33 PM, Tom Sparks (Applied Operations) wrote:



Intercage is not a big shop, there are very few people involved in  
running

it




I have no dog in this fight, but I would comment on the small shop  
issue as it relates to handling abuse complaints.


I own a small colo/hosting shop too.  We don't have many employees.   
If we had to deal with so many abuse complaints that things were  
getting lost in the noise, I'd have to seriously examine my AUP and  
associated enforcement policies, add staff to handle abuse issues, or  
both.  Being small isn't an excuse.  In fact, a small shop that runs a  
clean network should be far better at handling abuse issues than the  
larger players could ever hope to be.










Re: Atrivo/Intercage

2008-09-22 Thread Patrick W. Gilmore

On Sep 22, 2008, at 4:33 PM, Tom Sparks (Applied Operations) wrote:


Basically is what it boils down to for me - its easy to blame
an NSP/ISP/Hoster for what their clients do, it takes real  
dedication to

find out whats *actually* going on.


Tom,

Atrivo is not just a spammer, and Intercage has _not_ taken care of  
problems - unless you count moving IP addresses around as taking care  
of things.  I'm sure the people downloading child pr0n or hosting  
virus / CC servers were very inconvenienced from having to change a  
hostname.  Pardon me if I am incredulous.  And not because we were not  
dedicated in trying to find out what was *actually* going on.  Try  
reading up on your friend before accusing the community of not doing  
due diligence.


And don't give me any BS about not reading his abuse@ mail.


Eventually ignorance (willful ignorance?) in the service of evil  
becomes indistinguishable from malice.


Basically, THAT is what it boils down to for me, and apparently  
everyone else as well.


--
TTFN,
patrick




Re: Atrivo/Intercage

2008-09-22 Thread Tom Sparks (Applied Operations)
On Mon, Sep 22, 2008 at 04:48:16PM -0400, Drew Linsalata wrote:
 I have no dog in this fight, but I would comment on the small shop  
 issue as it relates to handling abuse complaints.
 
 I own a small colo/hosting shop too.  We don't have many employees.   
 If we had to deal with so many abuse complaints that things were  
 getting lost in the noise

Perhaps I should clarify - Abuse complaints being a small percentage
of normal requests for service (IE: I need a new hdd, an OS reinstalled)
I would agree that anyone beseiged in abuse requests should take a
machete to the offending customer's cables :)

-- 
Tom Sparks
(415) 367-7328x1001



Re: Atrivo/Intercage

2008-09-22 Thread Christopher Morrow
So... apparently AS27595 is back on the air, with aspath's like:

6461 23342 27595
6539 23342 27595
8075 23342 27595

23342 == UnitedLayer, Tom isn't that you or is that another Tom I'm remembering?

-Chris



Re: Atrivo/Intercage

2008-09-22 Thread Tom Sparks (Applied Operations)
On Mon, Sep 22, 2008 at 05:17:42PM -0400, Christopher Morrow wrote:
 So... apparently AS27595 is back on the air, with aspath's like:
 6461 23342 27595
 6539 23342 27595
 8075 23342 27595
 
 23342 == UnitedLayer, Tom isn't that you or is that another 
 Tom I'm remembering?

Yep, same Tom, I was one of the founders of UnitedLayer.
I haven't been there since 2006, so its not my doing.

I also noticed AS paths like this:
*  69.22.162.0/23  701 2914 32335 6461 23342 27595 i

I'm not sure whats going on there, but I'm thinking someone needs some help :)

-- 
Tom Sparks
(415) 367-7328x1001



XO Outage

2008-09-22 Thread Justin Sharp

We are seeing some issues w/ XO/Savvis peering..

Trace from XO to Savvis IP space (64.75.10.151)

Keys:  Help   Display mode   Restart statistics   Order of fields   quit

Packets   Pings
Host  
Loss%   Snt   Last   Avg  Best  Wrst StDev
1. scrubbed 
  
0.0% 60.6   0.5   0.4   0.6   0.1
2. 
ip65-44-114-97.z114-44-65.customer.algx.net 
0.0% 61.3   1.3   1.2   1.4   0.1

3. ???


Trace from Savvis to XO IP space (65.44.114.97)

1. scrubbed 
  
0.0%380.4   0.4   0.3   0.5   0.1
2. 
64.41.199.129   
0.0%371.0  24.0   0.6 330.2  80.4
3. 
hr1-ge-7-47.santaclarasc5.savvis.net
0.0%370.7   1.4   0.6  27.3   4.4
4. 
er1-te-1-0-0.sanjose3equinix.savvis.net 
0.0%370.7   5.2   0.6 140.3  23.2
5. 
cr1-tenge-0-7-5-0.sanfrancisco.savvis.net   
2.7%372.9   4.0   2.6  16.6   2.5
6. 
cr2-pos-0-0-3-3.dallas.savvis.net   
0.0%37   42.6  43.1  42.3  51.4   1.4
7. 
dpr1-ge-4-0-0.dallasequinix.savvis.net  
0.0%37   43.1  44.8  42.9  76.9   6.7
8. 
er1-te-2-1.dallasequinix.savvis.net 
0.0%37   43.3  49.2  42.8 233.6  31.6
9. 
208.175.175.90  
0.0%37   43.0  42.8  42.6  43.6   0.2
10. 
65.106.1.102   
75.0%37   43.5  46.5  43.4  62.9   6.3
11. 
65.106.1.101
0.0%37   43.4  47.8  43.2 112.3  12.5
12. 
65.106.0.41 
0.0%37   57.5  65.1  57.1 177.3  21.0
13. 
65.106.1.73 
0.0%37   57.4  66.5  57.1 162.1  24.2

14. ???

Trying to call into XO and they aren't even taking calls, they mention 
something about network issues in Spokane. Any ideas as to what is going 
on/ETA to fix?


--Justin




Re: favourite XFP supplier?

2008-09-22 Thread Adam Rothschild
On 2008-09-22-15:01:35, Joe Abley [EMAIL PROTECTED] wrote:
 Anybody have a preferred supplier for 10GE XFPs, multimode and  
 singlemode?

Fluxlight (www.fluxlightinc.com) is good source for 10GBASE-SR and LR
XFPs.  They tend to keep an inventory, often able to ship on the day
of order; their web store works; they run a reputable shop, and are
fully understanding of I'll need a tracking number ASAP, otherwise
the facility you're sending them to might reject the shipment -- all
in all, a real win.

If you have a Dell Premier account, you might want to check there, as
they usually have XFPs listed at steep discount...

If you're looking for exotics, such as ZR-D (DWDM), going with a
Finisar reseller is a safe bet.  I've had particularly good dealings
with Cube Optics AG.  (Fair warning: these are tougher to source on
short notice.)

HTH,
-a



Re: XO Outage

2008-09-22 Thread mike newton
yeah, we noticed it as well.  looks like they're back now.  i noticed
their routes drop off at about 14:16 PT and come back just after 14:30 PT.

+m


Justin Sharp wrote:
 We are seeing some issues w/ XO/Savvis peering..

 Trace from XO to Savvis IP space (64.75.10.151)

 Keys:  Help   Display mode   Restart statistics   Order of fields   quit
   
  
 Packets   Pings
 Host  

 Loss%   Snt   Last   Avg  Best  Wrst StDev
 1. scrubbed
  
 0.0% 60.6   0.5   0.4   0.6   0.1
 2.
 ip65-44-114-97.z114-44-65.customer.algx.net   
  
 0.0% 61.3   1.3   1.2   1.4   0.1
 3. ???


 Trace from Savvis to XO IP space (65.44.114.97)

 1. scrubbed
   

 0.0%380.4   0.4   0.3   0.5   0.1
 2.
 64.41.199.129 
  
 0.0%371.0  24.0   0.6 330.2  80.4
 3.
 hr1-ge-7-47.santaclarasc5.savvis.net  
  
 0.0%370.7   1.4   0.6  27.3   4.4
 4.
 er1-te-1-0-0.sanjose3equinix.savvis.net   
  
 0.0%370.7   5.2   0.6 140.3  23.2
 5.
 cr1-tenge-0-7-5-0.sanfrancisco.savvis.net 
  
 2.7%372.9   4.0   2.6  16.6   2.5
 6.
 cr2-pos-0-0-3-3.dallas.savvis.net 
  
 0.0%37   42.6  43.1  42.3  51.4   1.4
 7.
 dpr1-ge-4-0-0.dallasequinix.savvis.net
  
 0.0%37   43.1  44.8  42.9  76.9   6.7
 8.
 er1-te-2-1.dallasequinix.savvis.net   
  
 0.0%37   43.3  49.2  42.8 233.6  31.6
 9.
 208.175.175.90
  
 0.0%37   43.0  42.8  42.6  43.6   0.2
 10.
 65.106.1.102  
 
 75.0%37   43.5  46.5  43.4  62.9   6.3
 11.
 65.106.1.101  
  
 0.0%37   43.4  47.8  43.2 112.3  12.5
 12.
 65.106.0.41   
  
 0.0%37   57.5  65.1  57.1 177.3  21.0
 13.
 65.106.1.73   
  
 0.0%37   57.4  66.5  57.1 162.1  24.2
 14. ???

 Trying to call into XO and they aren't even taking calls, they mention
 something about network issues in Spokane. Any ideas as to what is
 going on/ETA to fix?

 --Justin






Re: XO Outage

2008-09-22 Thread Mike Lyon
Also seeing some issues with XO out here:

Tracing route to yahoo.com [68.180.206.184]
over a maximum of 30 hops:

  1 2 ms 1 ms 1 ms  10.100.20.1
  2 2 ms 1 ms 2 ms  sjcisr01-int.wyse.com [10.100.1.15]
  3 3 ms 2 ms 2 ms  132.237.245.1
  4 3 ms 3 ms 2 ms  207.88.3.37.ptr.us.xo.net [207.88.3.37]
  5 7 ms 3 ms 3 ms  p3-0-0.mar2.fremont-ca.us.xo.net [207.88.80.181]

  616 ms 5 ms 3 ms  p4-0-0.rar2.sanjose-ca.us.xo.net [65.106.5.137]

  712 ms14 ms11 ms  p6-0-0.rar1.la-ca.us.xo.net [65.106.0.17]
  817 ms11 ms11 ms  p0-0-0d0.rar2.la-ca.us.xo.net [65.106.1.50]
  944 ms50 ms52 ms  p6-0-0.rar1.dallas-tx.us.xo.net [65.106.0.13]
 10 *** Request timed out.
 1144 ms44 ms44 ms  207.88.12.150.ptr.us.xo.net [207.88.12.150]
 1253 ms85 ms52 ms  206.111.5.42.ptr.us.xo.net [206.111.5.42]
^C



On Mon, Sep 22, 2008 at 2:35 PM, Justin Sharp [EMAIL PROTECTED] wrote:
 We are seeing some issues w/ XO/Savvis peering..

 Trace from XO to Savvis IP space (64.75.10.151)

 Keys:  Help   Display mode   Restart statistics   Order of fields   quit

Packets   Pings
 Host
  Loss%   Snt   Last   Avg  Best  Wrst StDev
 1. scrubbed
  0.0% 60.6   0.5   0.4   0.6   0.1
 2. ip65-44-114-97.z114-44-65.customer.algx.net
   0.0% 61.3   1.3   1.2   1.4   0.1
 3. ???


 Trace from Savvis to XO IP space (65.44.114.97)

 1. scrubbed
  0.0%380.4   0.4   0.3   0.5   0.1
 2. 64.41.199.129
   0.0%371.0  24.0   0.6 330.2  80.4
 3. hr1-ge-7-47.santaclarasc5.savvis.net
0.0%370.7   1.4   0.6  27.3   4.4
 4. er1-te-1-0-0.sanjose3equinix.savvis.net
   0.0%370.7   5.2   0.6 140.3  23.2
 5. cr1-tenge-0-7-5-0.sanfrancisco.savvis.net
   2.7%372.9   4.0   2.6  16.6   2.5
 6. cr2-pos-0-0-3-3.dallas.savvis.net
   0.0%37   42.6  43.1  42.3  51.4   1.4
 7. dpr1-ge-4-0-0.dallasequinix.savvis.net
0.0%37   43.1  44.8  42.9  76.9   6.7
 8. er1-te-2-1.dallasequinix.savvis.net
   0.0%37   43.3  49.2  42.8 233.6  31.6
 9. 208.175.175.90
0.0%37   43.0  42.8  42.6  43.6   0.2
 10. 65.106.1.102
   75.0%37   43.5  46.5  43.4  62.9   6.3
 11. 65.106.1.101
0.0%37   43.4  47.8  43.2 112.3  12.5
 12. 65.106.0.41
 0.0%37   57.5  65.1  57.1 177.3  21.0
 13. 65.106.1.73
 0.0%37   57.4  66.5  57.1 162.1  24.2
 14. ???

 Trying to call into XO and they aren't even taking calls, they mention
 something about network issues in Spokane. Any ideas as to what is going
 on/ETA to fix?

 --Justin






Re: Atrivo/Intercage

2008-09-22 Thread Christopher Morrow
On Mon, Sep 22, 2008 at 5:25 PM, Tom Sparks (Applied Operations)
[EMAIL PROTECTED] wrote:
 On Mon, Sep 22, 2008 at 05:17:42PM -0400, Christopher Morrow wrote:
 So... apparently AS27595 is back on the air, with aspath's like:
 6461 23342 27595
 6539 23342 27595
 8075 23342 27595

 23342 == UnitedLayer, Tom isn't that you or is that another
 Tom I'm remembering?

 Yep, same Tom, I was one of the founders of UnitedLayer.
 I haven't been there since 2006, so its not my doing.


yup, didn't particularly mean it was 'your doing' (even if you were
there) but that perhaps (if you were still there) you might be able to
influence the ops folks some... if you thought it worthy.

 I also noticed AS paths like this:
 *  69.22.162.0/23  701 2914 32335 6461 23342 27595 i

 I'm not sure whats going on there, but I'm thinking someone needs some help :)


yea I suspect that's a history route (or PIE re-opened the links
between PIE/Atrivo). Or... Abovenet  PIE  NTT aren't filtering their
customers in a way that keeps PIE form providing transit to NTT for
Abovenet :( (NTT says loud and long they filter based on IRR data, PIE
might not have updated their IRR info?)

wierd though.



Re: XO Outage

2008-09-22 Thread Justin Sharp
Seems like Savvis/XO routes have been restored, albeit through an 
unusual Dallas route (usually takes an XO Los Angeles route)..


1. scrubbed 
  
0.0%   2040.4   0.7   0.3   7.0   0.9
2. 
ip65-44-114-97.z114-44-65.customer.algx.net 
0.0%   2041.8   1.8   1.1   8.4   1.2
3. 
ip65-46-48-29.z48-46-65.customer.algx.net   
0.0%   2043.3   6.3   2.8  96.4   9.0
4. 
p6-0-0-0.mar1.saltlake-ut.us.xo.net 
0.5%   2048.1  14.4   3.1 161.0  26.3
5. 
p4-1-0-0.rar1.denver-co.us.xo.net   
0.0%   204   15.5  25.6  15.3 191.4  26.7
6. 
p0-0-0d0.rar2.denver-co.us.xo.net   
0.0%   204   16.2  22.4  16.1 129.2  14.4
7. 
p1-0-0.rar2.dallas-tx.us.xo.net 
0.0%   204   45.3  38.3  29.9 201.3  21.3
8. 
te-3-4-0.rar3.dallas-tx.us.xo.net  
66.0%   204   30.3  34.2  29.6 116.2  11.6
9. 
207.88.12.146.ptr.us.xo.net 
0.0%   204   33.1  32.7  29.4 106.7   8.5
10. 
208.175.175.89  
0.0%   204   29.8  35.7  29.5 195.4  20.0
11. 
dpr1-ge-2-0-0.dallasequinix.savvis.net  
0.0%   204   34.3  33.8  29.6 115.2  10.5
12. 
cr2-tengige0-7-5-0.dallas.savvis.net
1.5%   204   30.2  33.3  29.7  68.6   5.4
13. 
cr2-loopback.sfo.savvis.net 
0.0%   203   75.1 209.8  74.0 3270. 493.7
14. 
er1-te-2-0-1.sanjose3equinix.savvis.net 
0.0%   203   71.8  75.6  71.7 219.5  11.7
15. 
hr1-te-2-0-0.santaclarasc5.savvis.net   
0.0%   203   72.1  75.5  72.0 194.0   9.4
16. 
216.34.2.226
0.0%   203   72.3 105.4  72.1 723.7 102.5
17. 
64.41.199.140  
28.6%   203   77.5  74.9  72.0 183.1   9.7
18. scrubbed 
   
0.0%   203   73.8  76.0  72.4 207.9  11.3


Hop 8 looks busy..

--Justin

Mike Lyon wrote:

Also seeing some issues with XO out here:

Tracing route to yahoo.com [68.180.206.184]
over a maximum of 30 hops:

  1 2 ms 1 ms 1 ms  10.100.20.1
  2 2 ms 1 ms 2 ms  sjcisr01-int.wyse.com [10.100.1.15]
  3 3 ms 2 ms 2 ms  132.237.245.1
  4 3 ms 3 ms 2 ms  207.88.3.37.ptr.us.xo.net [207.88.3.37]
  5 7 ms 3 ms 3 ms  p3-0-0.mar2.fremont-ca.us.xo.net [207.88.80.181]

  616 ms 5 ms 3 ms  p4-0-0.rar2.sanjose-ca.us.xo.net [65.106.5.137]

  712 ms14 ms11 ms  p6-0-0.rar1.la-ca.us.xo.net [65.106.0.17]
  817 ms11 ms11 ms  p0-0-0d0.rar2.la-ca.us.xo.net [65.106.1.50]
  944 ms50 ms52 ms  p6-0-0.rar1.dallas-tx.us.xo.net [65.106.0.13]
 10 *** Request timed out.
 1144 ms44 ms44 ms  207.88.12.150.ptr.us.xo.net [207.88.12.150]
 1253 ms85 ms52 ms  206.111.5.42.ptr.us.xo.net [206.111.5.42]
^C



On Mon, Sep 22, 2008 at 2:35 PM, Justin Sharp [EMAIL PROTECTED] wrote:
  

We are seeing some issues w/ XO/Savvis peering..

Trace from XO to Savvis IP space (64.75.10.151)

Keys:  Help   Display mode   Restart statistics   Order of fields   quit

   Packets   Pings
Host
 Loss%   Snt   Last   Avg  Best  Wrst StDev
1. scrubbed
 0.0% 60.6   0.5   0.4   0.6   0.1
2. ip65-44-114-97.z114-44-65.customer.algx.net
  0.0% 61.3   1.3   1.2   1.4   0.1
3. ???


Trace from Savvis to XO IP space (65.44.114.97)

1. scrubbed
 0.0%380.4   0.4   0.3   0.5   0.1
2. 64.41.199.129
  0.0%371.0  24.0   0.6 330.2  80.4
3. hr1-ge-7-47.santaclarasc5.savvis.net
   0.0%370.7   1.4   0.6  27.3   4.4
4. er1-te-1-0-0.sanjose3equinix.savvis.net
  0.0%370.7   5.2   0.6 140.3  23.2
5. cr1-tenge-0-7-5-0.sanfrancisco.savvis.net
  2.7%372.9   4.0   2.6  16.6   2.5
6. cr2-pos-0-0-3-3.dallas.savvis.net
  0.0%37   42.6  43.1  42.3  51.4   1.4
7. dpr1-ge-4-0-0.dallasequinix.savvis.net

Re: XO Outage

2008-09-22 Thread Zaid Ali

I am seeing it on my end also:

traceroute: Warning: www.cnn.com has multiple addresses; using 
157.166.224.25

traceroute to www.cnn.com (157.166.224.25), 64 hops max, 40 byte packets
 1  hq-rtr1.genius.local (64.244.66.1)  0.891 ms  0.429 ms  0.449 ms
 2  ip65-46-253-157.z253-46-65.customer.algx.net (65.46.253.157)  1.856 
ms  2.860 ms  1.881 ms
 3  p3-0-0.mar2.fremont-ca.us.xo.net (207.88.80.181)  16.922 ms  2.041 
ms  2.013 ms
 4  p4-3-0.rar2.sanjose-ca.us.xo.net (65.106.5.161)  2.637 ms  2.192 ms 
 2.823 ms
 5  p6-0-0.rar1.la-ca.us.xo.net (65.106.0.17)  10.308 ms  10.258 ms 
10.386 ms
 6  207.88.13.22.ptr.us.xo.net (207.88.13.22)  10.931 ms  10.535 ms 
10.037 ms

 7  *^C


Justin Sharp wrote:

We are seeing some issues w/ XO/Savvis peering..

Trace from XO to Savvis IP space (64.75.10.151)

Keys:  Help   Display mode   Restart statistics   Order of fields   quit

Packets   Pings
Host  
Loss%   Snt   Last   Avg  Best  Wrst StDev
1. scrubbed 
  
0.0% 60.6   0.5   0.4   0.6   0.1
2. 
ip65-44-114-97.z114-44-65.customer.algx.net 
0.0% 61.3   1.3   1.2   1.4   0.1

3. ???


Trace from Savvis to XO IP space (65.44.114.97)

1. scrubbed 
  
0.0%380.4   0.4   0.3   0.5   0.1
2. 
64.41.199.129   
0.0%371.0  24.0   0.6 330.2  80.4
3. 
hr1-ge-7-47.santaclarasc5.savvis.net
0.0%370.7   1.4   0.6  27.3   4.4
4. 
er1-te-1-0-0.sanjose3equinix.savvis.net 
0.0%370.7   5.2   0.6 140.3  23.2
5. 
cr1-tenge-0-7-5-0.sanfrancisco.savvis.net   
2.7%372.9   4.0   2.6  16.6   2.5
6. 
cr2-pos-0-0-3-3.dallas.savvis.net   
0.0%37   42.6  43.1  42.3  51.4   1.4
7. 
dpr1-ge-4-0-0.dallasequinix.savvis.net  
0.0%37   43.1  44.8  42.9  76.9   6.7
8. 
er1-te-2-1.dallasequinix.savvis.net 
0.0%37   43.3  49.2  42.8 233.6  31.6
9. 
208.175.175.90  
0.0%37   43.0  42.8  42.6  43.6   0.2
10. 
65.106.1.102   
75.0%37   43.5  46.5  43.4  62.9   6.3
11. 
65.106.1.101
0.0%37   43.4  47.8  43.2 112.3  12.5
12. 
65.106.0.41 
0.0%37   57.5  65.1  57.1 177.3  21.0
13. 
65.106.1.73 
0.0%37   57.4  66.5  57.1 162.1  24.2

14. ???

Trying to call into XO and they aren't even taking calls, they mention 
something about network issues in Spokane. Any ideas as to what is going 
on/ETA to fix?


--Justin







Re: Atrivo/Intercage

2008-09-22 Thread Christopher Morrow
On Mon, Sep 22, 2008 at 5:48 PM, Christopher Morrow
[EMAIL PROTECTED] wrote:
 On Mon, Sep 22, 2008 at 5:25 PM, Tom Sparks (Applied Operations)
 [EMAIL PROTECTED] wrote:
 I also noticed AS paths like this:
 *  69.22.162.0/23  701 2914 32335 6461 23342 27595 i

 I'm not sure whats going on there, but I'm thinking someone needs some help 
 :)


 yea I suspect that's a history route (or PIE re-opened the links
 between PIE/Atrivo). Or... Abovenet  PIE  NTT aren't filtering their
 customers in a way that keeps PIE form providing transit to NTT for
 Abovenet :( (NTT says loud and long they filter based on IRR data, PIE
 might not have updated their IRR info?)

 wierd though.


actually, I think PIE sees this route from 6461 and passes it along
probably because they didn't update the filters on their sessions when
they dropped the links to 27595 :( Also they didn't update the IRR
data to remove this set of prefixes.

bummers.



Re: Atrivo/Intercage

2008-09-22 Thread Tom Sparks (Applied Operations)
On Mon, Sep 22, 2008 at 05:50:58PM -0400, Christopher Morrow wrote:
 actually, I think PIE sees this route from 6461 and passes it along
 probably because they didn't update the filters on their sessions when
 they dropped the links to 27595 :(

Has anyone actually confirmed that the link is dropped with PIE?

 Also they didn't update the IRR data to remove this set of prefixes.

Looks like they've got all kindsa stuff in there...

-- 
Tom Sparks
(415) 367-7328x1001



Re: InterCage, Inc. (NOT Atrivo)

2008-09-22 Thread Justin Shore

Patrick W. Gilmore wrote:
There is no law or even custom stopping me from asking you to prove you 
are worthy to connect to my network.  


There may not be a law preventing you from asking him for proof of 
legitimate customers, but there is a law preventing him from answering 
you.  Google for CPNI and red flag.


Justin




YAY! Re: Atrivo/Intercage: NO Upstream depeer

2008-09-22 Thread Mark Foo
On Sun, Sep 21, 2008 at 12:46:54PM -0700, Emil Kacperski wrote:
 Hey James,

 That's the worst part in all this, so many been with me for years!? I just
put my fate into companies I shouldn't have.

Emil:

Yes, they have been with you for years -- it's quite unfortunate, such great
customers.

Take those customers who steal identity from the public -- did you get a
cut, or just the hosting fees?

Next, move to those who host trojans, rogue antivirus, bill people for fake
software
(and keep billing them), etc. Oh, and the ad-ware, despite being a lower
security risk, it was
some of the most hated stuff out there.

I'd say you have put your fate into companies you shouldn't have -- not just
your fate but your business.
This is the logical result (actually, this is just the start). I'm surprised
it took so long.

You can't wash away years of malicious activity by simply claiming innocence
and disconnecting
some of your worst offenders.

Male parta male dilabuntur.


For the NANOG folks who apparently don't understand what is going on and are
so
easily socially engineered by these claims of innocence -- do a little
research:

http://www.google.com/search?hl=enq=intercage+malware
http://www.google.com/search?hl=enq=atrivo+malware


Here's some research for you:
Complaints on Intercage/Atrivo from 2003:
Re: The in-your-face hijacking example
http://www.irbs.net/internet/nanog/0305/0038.html


From 2006:
More super rogue anti-spyware
http://updates.zdnet.com/tags/intercage.com.html

Be on the lookout for another new supposed anti-spyware program that might
be hijacking desktops any day now.
This one is called PestTrap and it.s a clone of SpySheriff. SpySheriff was
one of the top 10 rogue anti-spyware apps of 2005,
coming in at number 2.

PestTrap site is hosted at IP address 69.50.167.173 which belongs to an ISP
in California, InterCage, Inc., formerly know
n as Atrivo.  Note the nameservers are mail.atrrivo.com and pavel.atrivo.com
.

OrgName:InterCage, Inc.
OrgID:  INTER-359
Address:1955 Monument Blvd.
   Address:#236
City:   Concord
StateProv:  CA
PostalCode: 94520
Country:US

Not surprisingly, SpySheriff.com (link to whois) is hosted at InterCage, and
we have SpyTrooper.com on the same
IP address, 69.50.170.82. The other domain on the IP is Spy-Sheriff.com.
This IP is also currently blacklisted.

InterCage, Inc. INTERCAGE-NETWORK-GROUP (NET-69-50-160-0-1)
  69.50.160.0 - 69.50.191.255
William Lu STANDARDSHELLS (NET-69-50-170-0-1)
  69.50.170.0 - 69.50.170.255

The Intercage.com (link to site) home page is white and blank except for .
in the upper left corner.  Now, that seems odd to me.
An ISP with a blank homepage? Google searches for Intercage.com and
Intercage, Inc. bring up all kinds of interesting links.
A Google search for Atrivo produces even more  fascinating information like
this and this.  More on this one later.


Re: hat tip to .gov hostmasters

2008-09-22 Thread Mark Andrews
In article [EMAIL PROTECTED] you write:
* marcus sachs:

 While we wait for applications to become DNSSEC-aware,

Uhm, applications shouldn't be DNSSEC-aware.  Down that road lies
madness.  What should an end user do when the browser tells him,
Warning: Could not validate DNSSEC signature on www.example.com,
signature has expired.  Continue to connect?

The application just rejects the answer.  Trys again a
couple of times then reports failure.  This is no different
to the application talking to the validating resolver a
couple of time and then reporting failure.

The advantage of having the application do it is that you
don't need to secure the connection between the validating
resolver and the application.

Mark



Re: InterCage, Inc. (NOT Atrivo)

2008-09-22 Thread Patrick W. Gilmore
That does not stop me from asking.  Also, I've never seen a viable,  
legit biz that didn't have at least a couple customers who were  
willing to let their name be used.


--
TTFN,
patrick

iPhone 3-J
(That's 3-Jezuz for the uninitiated.)

On Sep 22, 2008, at 18:00, Justin Shore [EMAIL PROTECTED] wrote:


Patrick W. Gilmore wrote:
There is no law or even custom stopping me from asking you to prove  
you are worthy to connect to my network.


There may not be a law preventing you from asking him for proof of  
legitimate customers, but there is a law preventing him from  
answering you.  Google for CPNI and red flag.


Justin





prefix hijack by ASN 8997

2008-09-22 Thread Scott Weeks



I am hoping to confirm a short-duration prefix hijack of 72.234.0.0/15 (and 
another of our prefixes) by ASN 8997 (OJSC North-West Telecom in Russia) in 
using ASN 3267 (Russian Federal University Network) to advertise our space to 
ASN 3277 (Regional University and Scientific Network (RUSNet) of North-Western 
and Saint-Petersburg Area of Russia).

Is that what I'm seeing when I go to bgplay.routeviews.org/bgplay, put in 
prefix 72.234.0.0/15 and select the dates: 

22/9/2008  9:00:00   and   22/9/2008  15:00:00

If so, am I understanding it correctly if I say ASN 3267 saw a shorter path 
from ASN 8997, so refused the proper announcement from ASN 36149 (me) it 
normally hears from ASN 174 (Cogent).

If the above two are correct, would it be correct to say only the downstream 
customers of ASN 3267 were affected?

scott



Re: InterCage, Inc. (NOT Atrivo)

2008-09-22 Thread Valdis . Kletnieks
On Mon, 22 Sep 2008 17:00:35 CDT, Justin Shore said:

 There may not be a law preventing you from asking him for proof of 
 legitimate customers, but there is a law preventing him from answering 
 you.  Google for CPNI and red flag.

Hmm... I'm not sure how Yes, XYZ is a customer of mine qualifies as
a red flag question for identity theft.  I'm also not sure how XYZ is
a customer qualifies as CPNI, which (according to the first few pages of
Google hits) comprises things like calling/billing records.

http://www.privacyalerts.org/phone-records.html says:
For clarity, a record in this section is the same thing as a call log or a
text log. A phone record typically includes: date, time, sender geographic
location, recipient phone number, recipient geographic location, and duration
of call. A text record includes: date, time, and recipient phone number.

Nope. Doesn't seem like xyz is a customer qualifies there...

http://www.ipbusinessmag.com/articles.php?issue_id=63article_id=387 says:

Space does not permit an extended review of the FTC rules here, but they apply
to creditors who maintain ongoing accounts with customers for repeated
transactions. Cell phone accounts are offered by the rules as one example of a
covered account which is subject to the rules. If a business maintains such
covered accounts it must comply with the new rules to prevent identity theft
of its account holders.

Hmm... xyz is a customer doesn't seem to run afoul of that either.

Feel free to enlighten me about what I missed here?



pgpNGkggWH3um.pgp
Description: PGP signature


Re: prefix hijack by ASN 8997

2008-09-22 Thread Christian Koch
I received a phas notification about this today as well...

I couldn't find any relevant data confirming the announcement of one
of my /19 blocks, until a few minutes ago when i checked the route
views bgplay (ripe bgplay turns up nothing) and can now see 8997
announcing and quickly withdrawing my prefix




On Mon, Sep 22, 2008 at 9:06 PM, Scott Weeks [EMAIL PROTECTED] wrote:



 I am hoping to confirm a short-duration prefix hijack of 72.234.0.0/15 (and 
 another of our prefixes) by ASN 8997 (OJSC North-West Telecom in Russia) in 
 using ASN 3267 (Russian Federal University Network) to advertise our space to 
 ASN 3277 (Regional University and Scientific Network (RUSNet) of 
 North-Western and Saint-Petersburg Area of Russia).

 Is that what I'm seeing when I go to bgplay.routeviews.org/bgplay, put in 
 prefix 72.234.0.0/15 and select the dates:

 22/9/2008  9:00:00   and   22/9/2008  15:00:00

 If so, am I understanding it correctly if I say ASN 3267 saw a shorter path 
 from ASN 8997, so refused the proper announcement from ASN 36149 (me) it 
 normally hears from ASN 174 (Cogent).

 If the above two are correct, would it be correct to say only the downstream 
 customers of ASN 3267 were affected?

 scott





Re: prefix hijack by ASN 8997

2008-09-22 Thread Scott Weeks

--Scott Weeks [EMAIL PROTECTED] wrote: ---

 I am hoping to confirm a short-duration prefix hijack
snip
-

--- [EMAIL PROTECTED] wrote: ---
From: Christian Koch [EMAIL PROTECTED]

I couldn't find any relevant data confirming the announcement of one
of my /19 blocks, until a few minutes ago when i checked the route
views bgplay (ripe bgplay turns up nothing) and can now see 8997
announcing and quickly withdrawing my prefix
-


At what time did you see it?

scott



Re: prefix hijack by ASN 8997

2008-09-22 Thread Christian Koch
about 09:30 UTC per rviews




On Mon, Sep 22, 2008 at 9:31 PM, Scott Weeks [EMAIL PROTECTED] wrote:

 --Scott Weeks [EMAIL PROTECTED] wrote: ---

 I am hoping to confirm a short-duration prefix hijack
 snip
 -

 --- [EMAIL PROTECTED] wrote: ---
 From: Christian Koch [EMAIL PROTECTED]

 I couldn't find any relevant data confirming the announcement of one
 of my /19 blocks, until a few minutes ago when i checked the route
 views bgplay (ripe bgplay turns up nothing) and can now see 8997
 announcing and quickly withdrawing my prefix
 -


 At what time did you see it?

 scott





Re: prefix hijack by ASN 8997

2008-09-22 Thread Jim Popovitch
On Mon, Sep 22, 2008 at 21:06, Scott Weeks [EMAIL PROTECTED] wrote:

 I am hoping to confirm a short-duration prefix hijack of 72.234.0.0/15 (and 
 another of our
 prefixes) by ASN 8997 (OJSC North-West Telecom in Russia) in using ASN 3267
 (Russian Federal University Network) to advertise our space to ASN 3277 
 (Regional
 University and Scientific Network (RUSNet) of North-Western and 
 Saint-Petersburg
 Area of Russia).

Yep, saw this for 69.61.0.0/17 GlobalCompass (my upstream) this AM:

SEQUENCE_NUMBER: 1222091638
TYPE: last-hop
BGP-UPDATE-TIME: 1222075864
PHAS-DETECT-TIME: 1222091637
PHAS-NOTIFY-TIME: 1222091637
PREFIX: 69.61.0.0/17
SET: 3561,3267,3356,3491
GAINED: 3267  - Russian Federal University Network
LOST:

SEQUENCE_NUMBER: 1222091638
TYPE: origin
BGP-UPDATE-TIME: 1222075864
PHAS-DETECT-TIME: 1222091637
PHAS-NOTIFY-TIME: 1222091637
PREFIX: 69.61.0.0/17
SET: 8997,22653
GAINED: 8997 - OJSC North-West Telecom, St.-Petersburg, Russia
LOST:

SEQUENCE_NUMBER: 1222096125
TYPE: origin
BGP-UPDATE-TIME: 1222076569
PHAS-DETECT-TIME: 1222092415
PHAS-NOTIFY-TIME: 1222096124
PREFIX: 69.61.0.0/17
SET: 22653   - GlobalCrossing
GAINED:
LOST: 8997

-Jim P.



Re: duplicate packet

2008-09-22 Thread John Jensen
She'd have to actually specify -b to ping a broadcast address, and if
she did, she would only get replies back from the hosts on that
subnet, not duplicate replies from the same IP.

On Wed, Sep 10, 2008 at 5:11 AM, Sebastian Abt [EMAIL PROTECTED] wrote:
 * chloe K wrote:
 When I ping the ip, I get the duplicate

 64 bytes from 192.168.0.95: icmp_seq=1 ttl=63 time=0.344 ms
 64 bytes from 192.168.0.95: icmp_seq=1 ttl=63 time=0.401 ms (DUP!)

 What's your netmask?  Is 192.168.0.95 your net's broadcast address?

 sebastian

 --
 SABT-RIPE   PGPKEY-D008DA9C





Re: prefix hijack by ASN 8997

2008-09-22 Thread Justin Shore
Looking up some of my prefixes in PHAS and BGPPlay, I too see my 
prefixes being advertised by 8997 for a short time.  It looks like it 
happened around 1222091563 according to PHAS.


Was this a mistake or something else?

Justin


Christian Koch wrote:

I received a phas notification about this today as well...

I couldn't find any relevant data confirming the announcement of one
of my /19 blocks, until a few minutes ago when i checked the route
views bgplay (ripe bgplay turns up nothing) and can now see 8997
announcing and quickly withdrawing my prefix




On Mon, Sep 22, 2008 at 9:06 PM, Scott Weeks [EMAIL PROTECTED] wrote:



I am hoping to confirm a short-duration prefix hijack of 72.234.0.0/15 (and another of 
our prefixes) by ASN 8997 (OJSC North-West Telecom in Russia) in using ASN 
3267 (Russian Federal University Network) to advertise our space to ASN 3277 (Regional 
University and Scientific Network (RUSNet) of North-Western and Saint-Petersburg Area of 
Russia).

Is that what I'm seeing when I go to bgplay.routeviews.org/bgplay, put in 
prefix 72.234.0.0/15 and select the dates:

22/9/2008  9:00:00   and   22/9/2008  15:00:00

If so, am I understanding it correctly if I say ASN 3267 saw a shorter path 
from ASN 8997, so refused the proper announcement from ASN 36149 (me) it 
normally hears from ASN 174 (Cogent).

If the above two are correct, would it be correct to say only the downstream 
customers of ASN 3267 were affected?

scott








Re: prefix hijack by ASN 8997

2008-09-22 Thread Hank Nussbacher

On Mon, 22 Sep 2008, Scott Weeks wrote:

I too spotted this via PHAS for a large number of prefixes, but have not 
received alerts from IAR, Watchmy.Net nor does RIPE RIS show this hijack: 
http://www.ris.ripe.net/perl-risapp/risearch.html I would have expected 
with so many RRC boxes that RIPE RIS would have caught it.  I had thought 
it was a false positive from PHAS but now that you and others have seen it 
- I guess it is for real.


-Hank





I am hoping to confirm a short-duration prefix hijack of 72.234.0.0/15 (and another of 
our prefixes) by ASN 8997 (OJSC North-West Telecom in Russia) in using ASN 
3267 (Russian Federal University Network) to advertise our space to ASN 3277 (Regional 
University and Scientific Network (RUSNet) of North-Western and Saint-Petersburg Area of 
Russia).

Is that what I'm seeing when I go to bgplay.routeviews.org/bgplay, put in 
prefix 72.234.0.0/15 and select the dates:

22/9/2008  9:00:00   and   22/9/2008  15:00:00

If so, am I understanding it correctly if I say ASN 3267 saw a shorter path 
from ASN 8997, so refused the proper announcement from ASN 36149 (me) it 
normally hears from ASN 174 (Cogent).

If the above two are correct, would it be correct to say only the downstream 
customers of ASN 3267 were affected?

scott





Re: prefix hijack by ASN 8997

2008-09-22 Thread Hank Nussbacher

On Mon, 22 Sep 2008, Christian Koch wrote:

Strange that RIPE RIS search doesn't show it:
http://www.ris.ripe.net/perl-risapp/risearch.html
but yet you say BGPlay does show it.

-Hank


I received a phas notification about this today as well...

I couldn't find any relevant data confirming the announcement of one
of my /19 blocks, until a few minutes ago when i checked the route
views bgplay (ripe bgplay turns up nothing) and can now see 8997
announcing and quickly withdrawing my prefix




On Mon, Sep 22, 2008 at 9:06 PM, Scott Weeks [EMAIL PROTECTED] wrote:




I am hoping to confirm a short-duration prefix hijack of 72.234.0.0/15 (and another of 
our prefixes) by ASN 8997 (OJSC North-West Telecom in Russia) in using ASN 
3267 (Russian Federal University Network) to advertise our space to ASN 3277 (Regional 
University and Scientific Network (RUSNet) of North-Western and Saint-Petersburg Area of 
Russia).

Is that what I'm seeing when I go to bgplay.routeviews.org/bgplay, put in 
prefix 72.234.0.0/15 and select the dates:

22/9/2008  9:00:00   and   22/9/2008  15:00:00

If so, am I understanding it correctly if I say ASN 3267 saw a shorter path 
from ASN 8997, so refused the proper announcement from ASN 36149 (me) it 
normally hears from ASN 174 (Cogent).

If the above two are correct, would it be correct to say only the downstream 
customers of ASN 3267 were affected?

scott








Re: prefix hijack by ASN 8997

2008-09-22 Thread Christian Koch
At first glance this morning not seeing any data between the gain and
lost alerts from phas and inability to find a route in any of the many
collectors and route servers out there I had thought it was a possibly
a fat finger mistake by 8997 or a false positive.

After locating the data in bgplay/rviews, and noticing how many more
people this occured to I'm leaning towards 2 possible scenarios:

1 - bgp misconfigurations leading to leaks
 (Depends on the overall scale of how many other prefixes were
possibly announced)

2 - 8997 began announcing prefixes as an experiment to test the
waters for potential real hijacks in future...

'geography' hints towards #2

Or both theories could be way off :)

I'd be interested to know if Renesys collected any data that might
give some better insight to this...

Christian



On 9/23/08, Justin Shore [EMAIL PROTECTED] wrote:
 Looking up some of my prefixes in PHAS and BGPPlay, I too see my
 prefixes being advertised by 8997 for a short time.  It looks like it
 happened around 1222091563 according to PHAS.

 Was this a mistake or something else?

 Justin


 Christian Koch wrote:
 I received a phas notification about this today as well...

 I couldn't find any relevant data confirming the announcement of one
 of my /19 blocks, until a few minutes ago when i checked the route
 views bgplay (ripe bgplay turns up nothing) and can now see 8997
 announcing and quickly withdrawing my prefix




 On Mon, Sep 22, 2008 at 9:06 PM, Scott Weeks [EMAIL PROTECTED]
 wrote:


 I am hoping to confirm a short-duration prefix hijack of 72.234.0.0/15
 (and another of our prefixes) by ASN 8997 (OJSC North-West Telecom in
 Russia) in using ASN 3267 (Russian Federal University Network) to
 advertise our space to ASN 3277 (Regional University and Scientific
 Network (RUSNet) of North-Western and Saint-Petersburg Area of Russia).

 Is that what I'm seeing when I go to bgplay.routeviews.org/bgplay, put
 in prefix 72.234.0.0/15 and select the dates:

 22/9/2008  9:00:00   and   22/9/2008  15:00:00

 If so, am I understanding it correctly if I say ASN 3267 saw a shorter
 path from ASN 8997, so refused the proper announcement from ASN 36149
 (me) it normally hears from ASN 174 (Cogent).

 If the above two are correct, would it be correct to say only the
 downstream customers of ASN 3267 were affected?

 scott





-- 
Sent from my mobile device



Re: prefix hijack by ASN 8997

2008-09-22 Thread Christian Koch
Bgplay on routeviews, not the ripe one :)

Christian



On 9/23/08, Hank Nussbacher [EMAIL PROTECTED] wrote:
 On Mon, 22 Sep 2008, Christian Koch wrote:

 Strange that RIPE RIS search doesn't show it:
 http://www.ris.ripe.net/perl-risapp/risearch.html
 but yet you say BGPlay does show it.

 -Hank

 I received a phas notification about this today as well...

 I couldn't find any relevant data confirming the announcement of one
 of my /19 blocks, until a few minutes ago when i checked the route
 views bgplay (ripe bgplay turns up nothing) and can now see 8997
 announcing and quickly withdrawing my prefix




 On Mon, Sep 22, 2008 at 9:06 PM, Scott Weeks [EMAIL PROTECTED]
 wrote:



 I am hoping to confirm a short-duration prefix hijack of 72.234.0.0/15
 (and another of our prefixes) by ASN 8997 (OJSC North-West Telecom in
 Russia) in using ASN 3267 (Russian Federal University Network) to
 advertise our space to ASN 3277 (Regional University and Scientific
 Network (RUSNet) of North-Western and Saint-Petersburg Area of Russia).

 Is that what I'm seeing when I go to bgplay.routeviews.org/bgplay, put
 in prefix 72.234.0.0/15 and select the dates:

 22/9/2008  9:00:00   and   22/9/2008  15:00:00

 If so, am I understanding it correctly if I say ASN 3267 saw a shorter
 path from ASN 8997, so refused the proper announcement from ASN 36149
 (me) it normally hears from ASN 174 (Cogent).

 If the above two are correct, would it be correct to say only the
 downstream customers of ASN 3267 were affected?

 scott





-- 
Sent from my mobile device