RE: Ahoy, SLA boffins!

2009-07-29 Thread Andreas, Rich
Bill,
To be brief, but hopefully not too fleeting, the majority of the
standards orgs - ITU, MEF -  use packet loss to derive availability.
Loss% = the % of packets which were transmitted but not received by the
destination host.  As for availability, loss is measured across some
time period.  If during that period X% of the transmitted  packets were
NOT lost, then the network is said to be available.  Typically a 20%
figure is used, e.g. if 20% of the packets transmitted during a 5-minute
period were received then the network is said to be 100% Available for
that 5-minute time period.  Some Carriers have taken this to the extreme
to say that if at least 1 packet was successfully transmitted then the
network was 100% Available for the time period.  

Loss is a measure of the networks usability, Availability is ...??
(Meaningless??)  What utility does a network have that is Available
yet sustaining a loss rate which renders it inoperable? 

Rich
 
 
-Original Message-
From: Bill Woodcock [mailto:wo...@pch.net] 
Sent: Wednesday, July 29, 2009 12:34 AM
To: nanog
Subject: Ahoy, SLA boffins!


So I've embarked on the no-doubt-futile task of trying to interpret  
SLAs as empirically-verifiable technical specifications, rather than  
as marketing blather.  And there's something that I'm finding  
particularly puzzling:

In most SLAs, there seem to be two separate guarantees proffered: one  
concerning network availability and one concerning packet loss.   
Now, if I were to put my engineer hat on, and try to _imagine_ what  
the difference might be, I might imagine network availability to  
have something to do with layer-2 link status being presented as up,  
while packet loss would be the percentage of packets dropped.  But  
when I actually read SLAs, network availability is generally defined  
as the portion of the month that the path from the customer's local  
loop to the transit or peering routers was available to transmit  
packets.  Packet loss, on the other hand, is generally defined as the  
portion of packets which are lost while crossing that exact same piece  
of network.

Now, what am I missing here?  Is this one of those Heisenberg things,  
where network availability is the time the network _could have_  
delivered a packet _when you weren't actually doing so_, while packet  
loss is the time the network _couldn't_ deliver a packet when you  
_were_ actually doing so?

Is network availability inherently unmeasurable on a network that's  
less than 100% utilized?

Am I over-thinking this?

Seriously, though, I know there are people who don't consider SLAs to  
be fantasy-fiction, and some of them must not be innumerate, and some  
subset of those must be on NANOG, and the intersection set might be  
equal to or greater than one, right?  Can anybody explain this to me  
in a way I can translate into code, while still taking myself seriously?

 -Bill








Re: Ahoy, SLA boffins!

2009-07-29 Thread Leo Bicknell

I think the desired goal here is to separate the access SLA from
the backbone SLA.  That is, consider a simple picture:


Network Cloud--Provider Edge Router-Local Loop-Customer Router

Network availability is the % of the time the customer router and
provider edge router can communicate, and is designed to measure
if the local loop is up.  For instance, let's say the provider edge
router looses all its uplinks to the Network Cloud, your local loop
is up and functioing but you have 100% packet loss to all destinations.

The packet loss SLA kicks in on a per-destination basis.  Everything
is up and working, but the provider has a full circuit and is
dropping 20% of the packets on that link.  You catch it, you get a
credit.

I think the technical reason why these are separate has to do with
the expectations.  If my local loop is dropping 0.5% of the packets
due to errors, it is broken and must be fixed.  If some random
destination on the Internet is dropping 0.5% of the packets well,
that's a normal day in the life of the network.  Plus, if your local
loop takes errors then you get a credit.  However, if there's a
full link in the backbone but none of your packets take it, and
thus you are unaffected, you don't.

Now, having said all that, and having been one of the people who've
attempted to communicate sane, rational, technical ideas to marketing
and legal the chance that anything sane made it in the actual contract
is, well, nil.

-- 
   Leo Bicknell - bickn...@ufp.org - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/


pgpmHITc36X9A.pgp
Description: PGP signature


Cisco Security Advisory: Cisco IOS Software Border Gateway Protocol 4-Byte Autonomous System Number Vulnerabilities

2009-07-29 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Cisco Security Advisory: Cisco IOS Software Border Gateway Protocol
 4-Byte Autonomous System Number
 Vulnerabilities

Advisory ID: cisco-sa-20090729-bgp

http://www.cisco.com/warp/public/707/cisco-sa-20090729-bgp.shtml

Revision: 1.0
=

For Public Release 2009 July 29 1600 UTC (GMT)

Summary
===

Recent versions of Cisco IOS Software support RFC4893 (BGP Support
for Four-octet AS Number Space) and contain two remote denial of
service (DoS) vulnerabilities when handling specific Border Gateway
Protocol (BGP) updates.

These vulnerabilities affect only devices running Cisco IOS Software
with support for four-octet AS number space (here after referred to as
4-byte AS number) and BGP routing configured.

The first vulnerability could cause an affected device to reload when
processing a BGP update that contains autonomous system (AS) path
segments made up of more than one thousand autonomous systems.

The second vulnerability could cause an affected device to reload when
the affected device processes a malformed BGP update that has been
crafted to trigger the issue.

Cisco has released free software updates to address these
vulnerabilities.

No workarounds are available for the first vulnerability.

A workaround is available for the second vulnerability.

This advisory is posted at the following link:
http://www.cisco.com/warp/public/707/cisco-sa-20090729-bgp.shtml

Affected Products
=

Vulnerable Products
+--

These vulnerabilities affect only devices running Cisco IOS and 
Cisco IOS XE Software (here after both referred to as simply Cisco
IOS) with support for RFC4893 and that have been configured for 
BGP routing.

The software table in the section Software Versions and Fixes of
this advisory indicates all affected Cisco IOS Software versions that
have support for RFC4893 and are affected by this vulnerability.

A Cisco IOS software version that has support for RFC4893 will allow
configuration of AS numbers using 4 Bytes. The following example
identifies a Cisco device that has 4 byte AS number support:

Router#configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Router(config)#router bgp ?
  1-65535Autonomous system number
  1.0-XX.YY  4 Octets Autonomous system number

Or:

Router#configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Router(config)#router bgp ?
  1-4294967295  Autonomous system number
  1.0-XX.YY Autonomous system number

The following example identifies a Cisco device that has 2 byte AS
number support:

Router#configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Router(config)#router bgp ?
  1-65535  Autonomous system number

A router that is running the BGP process will contain a line in the
configuration that defines the autonomous system number (AS number),
which can be seen by issuing the command line interface (CLI) command
show running-config.

The canonical textual representation of four byte AS Numbers is
standardized by the IETF through RFC5396 (Textual Representation of
Autonomous System (AS) Numbers). Two major ways for textual
representation have been defined as ASDOT and ASPLAIN. Cisco IOS
routers support both textual representations of AS numbers. For
further information about textual representation of four byte AS
numbers in Cisco IOS Software consult the document Explaining 4-Byte
Autonomous System (AS) ASPLAIN and ASDOT Notation for Cisco IOS at
the following link:
http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6554/ps6599/white_paper_c11_516829.html
   
Cisco IOS Software with support for RFC4893 is affected by both
vulnerabilities if BGP routing is configured using either ASPLAIN or
ASDOT notation.

The following example identifies a Cisco device that is configured
for BGP using ASPLAIN notation:

router bgp 65536

The following example identifies a Cisco device that is configured
for BGP using ASDOT notation:

router bgp 1.0

To determine the Cisco IOS Software release that is running on a
Cisco product, administrators can log in to the device and issue the
show version command to display the system banner. The system banner
confirms that the device is running Cisco IOS Software by displaying
text similar to Cisco Internetwork Operating System Software or
Cisco IOS Software. The image name displays in parentheses,
followed by Version and the Cisco IOS Software release name. Other
Cisco devices do not have the show version command or may provide
different output.

The following example identifies a Cisco product that is running
Cisco IOS Software Release 12.3(26) with an installed image name of
C2500-IS-L:

Router#show version
Cisco Internetwork Operating System Software
IOS (tm) 2500 Software (C2500-IS-L), Version 12.3(26), RELEASE SOFTWARE 
(fc2

Re: Ahoy, SLA boffins!

2009-07-29 Thread Michael Dillon
 Now, having said all that, and having been one of the people who've
 attempted to communicate sane, rational, technical ideas to marketing
 and legal the chance that anything sane made it in the actual contract
 is, well, nil.

I disagree.

If someone takes the trouble to publish a technical document describing a
sane technical way to measure a network SLA, and they also provide code
for measuring/calculating the SLA, then there is a good chance that the
industry will pick it up.

Look at 95th percentile billing. Dave Rand at Abovenet thought it up,
probably to
simplify the billing process and keep billing overhead costs down. Then UUNet
picked it up and suddenly just about everyone was offering a 95th percentile
billing model.

-- Michael Dillon



RE: OT: Voice Operators' Group forming

2009-07-29 Thread Hiers, David
 
Hi All,

We're making progress...

I registered the domains voiceops.org and voiceops.net.  No matter what the 
final name becomes, at least we've got some domains that aren't too hard on the 
eyes.

Some noble souls have already volunteered to host it on a proper mailman server.

Nothing is set up yet, but it's coming together.



Thanks,



David Hiers




-Original Message-
From: Charles Wyble [mailto:char...@thewybles.com] 
Sent: Tuesday, July 28, 2009 3:17 PM
To: nanog@nanog.org
Subject: Re: OT: Voice Operators' Group forming



jamie wrote:
 puck.nether.net http://puck.nether.net.

Right. That's what I meant.

 
 way to volunteer someone else's box :-)

Good point. My apologies.

Google groups then. :)




This message and any attachments are intended only for the use of the addressee 
and may contain information that is privileged and confidential. If the reader 
of the message is not the intended recipient or an authorized representative of 
the intended recipient, you are hereby notified that any dissemination of this 
communication is strictly prohibited. If you have received this communication 
in error, please notify us immediately by e-mail and delete the message and any 
attachments from your system.



RE: Ahoy, SLA boffins!

2009-07-29 Thread Holmes,David A
We use the BRIX active measurement system (BRIX now owned by EXFO) which
gathers round trip time, packet loss, and jitter randomly every minute
24x7x365 for our major backbone links to calculate SLAs. Network
Availability can be measured empirically using BRIX calculated values
of packet loss, and expressed in terms of #9's, which BRIX will also
calculate over any time period for which BRIX historical data is being
kept. BRIX historical data is kept on an embedded Oracle data base. BRIX
usually runs on a Solaris SMP server.   

-Original Message-
From: Bill Woodcock [mailto:wo...@pch.net] 
Sent: Tuesday, July 28, 2009 9:34 PM
To: nanog
Subject: Ahoy, SLA boffins!


So I've embarked on the no-doubt-futile task of trying to interpret SLAs
as empirically-verifiable technical specifications, rather than as
marketing blather.  And there's something that I'm finding particularly
puzzling:

In most SLAs, there seem to be two separate guarantees proffered: one  
concerning network availability and one concerning packet loss.   
Now, if I were to put my engineer hat on, and try to _imagine_ what the
difference might be, I might imagine network availability to have
something to do with layer-2 link status being presented as up,  
while packet loss would be the percentage of packets dropped.  But when
I actually read SLAs, network availability is generally defined as the
portion of the month that the path from the customer's local loop to the
transit or peering routers was available to transmit packets.  Packet
loss, on the other hand, is generally defined as the portion of packets
which are lost while crossing that exact same piece of network.

Now, what am I missing here?  Is this one of those Heisenberg things,
where network availability is the time the network _could have_
delivered a packet _when you weren't actually doing so_, while packet
loss is the time the network _couldn't_ deliver a packet when you
_were_ actually doing so?

Is network availability inherently unmeasurable on a network that's
less than 100% utilized?

Am I over-thinking this?

Seriously, though, I know there are people who don't consider SLAs to be
fantasy-fiction, and some of them must not be innumerate, and some
subset of those must be on NANOG, and the intersection set might be
equal to or greater than one, right?  Can anybody explain this to me in
a way I can translate into code, while still taking myself seriously?

 -Bill







Re: Ahoy, SLA boffins!

2009-07-29 Thread William Herrin
On Wed, Jul 29, 2009 at 12:34 AM, Bill Woodcockwo...@pch.net wrote:
 Am I over-thinking this?

The SLA's I've looked at promise me that if their service is hard down
for a week (with no ambiguity whatsoever) they'll credit my bill for
upwards of 2% of the $50k/year or so I spend on the Internet
connection for my mutli-million dollar online service.

So yeah, you're overthinking it. When they start coupling those SLAs
with some sort of serious business loss insurance, then paying
attention to the SLA and carefully examining what constitutes failure
may make some kind sense at a technical level.

Regards,
Bill Herrin


-- 
William D. Herrin  her...@dirtside.com  b...@herrin.us
3005 Crane Dr. .. Web: http://bill.herrin.us/
Falls Church, VA 22042-3004



Re: Ahoy, SLA boffins!

2009-07-29 Thread JC Dill

William Herrin wrote:

On Wed, Jul 29, 2009 at 12:34 AM, Bill Woodcockwo...@pch.net wrote:
  

Am I over-thinking this?



The SLA's I've looked at promise me that if their service is hard down
for a week (with no ambiguity whatsoever) they'll credit my bill for
upwards of 2% of the $50k/year or so I spend on the Internet
connection for my mutli-million dollar online service.
  


I'm really surprised anyone considers this an SLA, or anything special 
in a business contract.  I automatically expect to get a credit of 
1.923% if the service were not provided for a period of 168 hours, no 
questions asked and no SLA required. 

When service is simply not provided, there's nothing special about not 
having to pay for it.  I don't know of any business where you can have a 
contract that requires you to pay your monthly/annual fee for services 
when said services are not provided.  If you have a housekeeping or lawn 
service that is supposed to come once a week, and you have an annual 
contract with them for this service at $50/week, and they miss a week 
(provide no service) you don't pay them anyway for that missed week.  
You don't need an SLA in your contract with them to have this right to 
withhold payment for the period of time when the services are not 
provided *at all*.


An SLA comes into play when a service is degraded below the quality you 
contracted for.  What credit do they give you when you have 168 hours of 
degraded service, e.g. 50% of the service level you specified in your 
RFQ?  That's where your SLA comes in.  The SLA specifies at what point 
your service is considered degraded (how much below the contracted 
service level, and how long of a time period is required before it is 
considered below grade) and what $credit you may receive when you are 
provided some service, but not to the level specified in your contract.


jc




Re: Ahoy, SLA boffins!

2009-07-29 Thread William Herrin
On Wed, Jul 29, 2009 at 4:19 PM, JC Dilljcdill.li...@gmail.com wrote:
 William Herrin wrote:
 The SLA's I've looked at promise me that if their service is hard down
 for a week (with no ambiguity whatsoever) they'll credit my bill for
 upwards of 2% of the $50k/year or so I spend on the Internet
 connection for my mutli-million dollar online service.

 An SLA comes into play when a service is degraded below the quality you
 contracted for.  What credit do they give you when you have 168 hours of
 degraded service, e.g. 50% of the service level you specified in your RFQ?
  That's where your SLA comes in.  The SLA specifies at what point your
 service is considered degraded (how much below the contracted service
 level, and how long of a time period is required before it is considered
 below grade) and what $credit you may receive when you are provided some
 service, but not to the level specified in your contract.

Hi JC,

Perhaps you miss my point: what the ISP is offering to pay me as a
result of a failure to deliver adequate service is so much less than
my loss for the same as to render the payment meaningless. I'm gonna
terminate the contract for nonperformance and hire someone who can get
the job done long before its worth my time to chase you for an
SLA-based service credit. And we both know it. The only way I ever
chase you for an SLA credit is I'm playing the blame game instead of
doing my job for my customers.

Regards,
Bill Herrin


-- 
William D. Herrin  her...@dirtside.com  b...@herrin.us
3005 Crane Dr. .. Web: http://bill.herrin.us/
Falls Church, VA 22042-3004



Re: OT: Voice Operators' Group forming

2009-07-29 Thread Jason LeBlanc

Brandon Butterworth wrote:

NAVOG  works for me.



I'd prefer Voice Operators' Group Online Network

brandon

  

*claps*



Re: OT: Voice Operators' Group forming

2009-07-29 Thread Chris Meidinger

On 29.07.2009, at 22:52, Jason LeBlanc wrote:


Brandon Butterworth wrote:

NAVOG  works for me.



I'd prefer Voice Operators' Group Online Network

brandon



*claps*


Imagine the poetry you have to listen to when _those_ guys put you on  
hold...




Re: Subnet Size for BGP peers.

2009-07-29 Thread Nathan Ward

On 30/07/2009, at 7:59 AM, Jim Wininger wrote:

I have a question about the subnet size for BGP peers. Typically  
when we


turn up a new BGP customer we turn them up on a /29 or a /30. That  
seems to


be the norm.


We connect to many of our BGP peers with ethernet. It would be a  
simple


matter to allocate a /24 for connectivity to the customer on a  
shared link.


This would help save on some address space.


My question is, is this in general good or bad idea? Have others  
been down


this path and found that it was a bad idea? I can see some of the  
pothols on


this path (BGP session hijacking, incorrectly configured customer  
routers


etc). These issues could be at least partially mitigated. Are there  
larger


issues when doing something like this or is it a practical idea?



What is your access network? Do you have a switch port per customer?
If so, look in to private VLANs on Cisco, or whatever similar feature  
exists for your vendor.


--
Nathan Ward




RE: Subnet Size for BGP peers.

2009-07-29 Thread Paul Stewart
/29's here for everyone great for troubleshooting and any future
additions typically required...;)

-Original Message-
From: Jim Wininger [mailto:jbot...@gmail.com]
Sent: July 29, 2009 4:00 PM
To: nanog@nanog.org
Subject: Subnet Size for BGP peers.

I have a question about the subnet size for BGP peers. Typically when we

turn up a new BGP customer we turn them up on a /29 or a /30. That seems
to

be the norm.


We connect to many of our BGP peers with ethernet. It would be a simple

matter to allocate a /24 for connectivity to the customer on a shared
link.

This would help save on some address space.


My question is, is this in general good or bad idea? Have others been
down

this path and found that it was a bad idea? I can see some of the
pothols on

this path (BGP session hijacking, incorrectly configured customer
routers

etc). These issues could be at least partially mitigated. Are there
larger

issues when doing something like this or is it a practical idea?

--

Jim Wininger

--
Jim Wininger
jbot...@gmail.com






The information transmitted is intended only for the person or entity to which 
it is addressed and contains confidential and/or privileged material. If you 
received this in error, please contact the sender immediately and then destroy 
this transmission, including all attachments, without copying, distributing or 
disclosing same. Thank you.



Re: Subnet Size for BGP peers.

2009-07-29 Thread Benjamin Billon
Imagine two of your clients are competitors, they probably don't want to 
be on the same IP range. And yes, when you sell your service to several 
customers, you don't want one of them blowing up all the other's SLA.


IXs use /24, as far as I know, and peers connected there can usually use 
md5 password if they want to. But in that case, some troubles like arp 
broadcast storm could happen, coming from any of the connected network.


I guess it's not the same level of service, but I agree, many /30 or /29 
are a big loss of addresses.


It reminds me GLBP with two gateways: on 10.0.0.0/29, you got
10.0.0.0 : network
10.0.0.7 : broadcast
10.0.0.1 : gw1
10.0.0.2 : gw2
10.0.0.6 : virtual gw
only 3, 4 and 5 for other equipments.

Who knows any other good way to lose IP addresses?


Jim Wininger a écrit :

I have a question about the subnet size for BGP peers. Typically when we

turn up a new BGP customer we turn them up on a /29 or a /30. That seems to

be the norm.


We connect to many of our BGP peers with ethernet. It would be a simple

matter to allocate a /24 for connectivity to the customer on a shared link.

This would help save on some address space.


My question is, is this in general good or bad idea? Have others been down

this path and found that it was a bad idea? I can see some of the pothols on

this path (BGP session hijacking, incorrectly configured customer routers

etc). These issues could be at least partially mitigated. Are there larger

issues when doing something like this or is it a practical idea?

  




Re: Dan Kaminsky

2009-07-29 Thread andrew.wallace
--- On Wed, 7/29/09, Scott Weeks sur...@mauigateway.com wrote:

 From: Scott Weeks sur...@mauigateway.com
 Subject: Re: Fwd: Dan Kaminsky
 To: andrew.wallace andrew.wall...@rocketmail.com
 Date: Wednesday, July 29, 2009, 10:10 PM


 --- andrew.wall...@rocketmail.com
 wrote:

 http://www.leetupload.com/zf05.txt
 --


 This one is off line:


 Site Temporarily Unavailable
 We apologize for the inconvenience. Please contact the
 webmaster/ tech support immediately to have them rectify
 this.

 error id: bad_httpd_conf


 scott



Dan Kaminsky mirrors:

http://r00tsecurity.org/files/zf05.txt

http://antilimit.net/zf05.txt

Much thanks,

Andrew





Re: Fwd: Dan Kaminsky

2009-07-29 Thread Randy Bush
 LAS VEGAS — Two noted security professionals were targeted this week
 by hackers who broke into their web pages, stole personal data and
 posted it online on the eve of the Black Hat security conference.

boring.

randy



Re: Fwd: Dan Kaminsky

2009-07-29 Thread Andrew D Kirch
Randy Bush wrote:
 LAS VEGAS — Two noted security professionals were targeted this week
 by hackers who broke into their web pages, stole personal data and
 posted it online on the eve of the Black Hat security conference.
 

 boring.

 randy

   
Two noted security professionals, and Kevin Mitnick, whom no one gives a
damn about, were targeted...

FTFY

Andrew D Kirch



Re: Fwd: Dan Kaminsky

2009-07-29 Thread Randy Bush
 LAS VEGAS — Two noted security professionals were targeted this week
 by hackers who broke into their web pages, stole personal data and
 posted it online on the eve of the Black Hat security conference.
 boring.
 Two noted security professionals, and Kevin Mitnick, whom no one gives a
 damn about, were targeted...

Ettore Bugatti, maker of the finest cars of his day, was once asked why
his cars had less than perfect brakes.  He replied something like, Any
fool can make a car stop.  It takes a genius to make a car go.

so i am not particularly impressed by news of children making a car
stop.

randy



Re: Subnet Size for BGP peers.

2009-07-29 Thread Barton F Bruce


- Original Message - 
From: Jim Wininger jbot...@gmail.com

To: nanog@nanog.org
Sent: Wednesday, July 29, 2009 3:59 PM
Subject: Subnet Size for BGP peers.


I have a question about the subnet size for BGP peers. Typically when we

turn up a new BGP customer we turn them up on a /29 or a /30. That seems 
to


be the norm.



We connect to many of our BGP peers with ethernet. It would be a simple


So what is wrong with a /31? We use /30s but if you are short on IP space, 
look at using /31 rather than /30 links. Cuts your space usage in half.


If I remember correctly, the BIG problem with using /31s when they first 
became legal was to decide if the customer still gets the higher numbered 
IP address (or you the lower one), or if you still get the ODD number. No 
kidding, it is a problem for some!


Where you are on ethernet, use a seperate 802.1q vlan per customer and have 
your switch give the customer untagged packets. If you have downstreams in 
your COLO, and either free or as a paid service, offer to setup private 
vlans in your switch for any pair or group of customers that need to also 
connect to each other privately for whatever they are doing. In that latter 
case, they will be getting tagged packets but their routers or switches 
should have no problem dealing with them.


We don't charge for physical crossconnects, so this has saved us having to 
do physical crossconnects between customers, and has saved customers router 
ports.








Re: Subnet Size for BGP peers.

2009-07-29 Thread Mikael Abrahamsson

On Thu, 30 Jul 2009, Benjamin Billon wrote:


Who knows any other good way to lose IP addresses?


I know how to not lose them:

int lo30
ip address 192.168.0.1 255.255.255.0

int gi2.10
encap dot1q 10
desc cust 1
ip address unnumbered lo30

int gi2.11
encap dot1q 11
desc cust 2
ip address unnumbered lo30

ip route 192.168.0.2 255.255.255.255 gi2.10
ip route 192.168.0.3 255.255.255.255 gi2.11

etc. Now you can have one customer per vlan but still have them share the 
same IP subnet. This works with vlan interfaces as well.


I don't remember if you have to do local-proxy-arp or not, but if you're 
running bgp you could always do next-hop-self to be sure it hops via the 
gateway.


--
Mikael Abrahamssonemail: swm...@swm.pp.se