Re: IP to authoritative CIDR webservices

2009-12-15 Thread James Raftery
On Mon, Dec 14, 2009 at 11:13:28PM -0600, William Pitcock wrote:
 Yes, but it has to be parsed, and RIRs have varying whois formats.  ARIN
 vs RIPE whois output, for example.

This is very easy to parse, though not a web service:

 ftp://ftp.ripe.net/pub/stats/ripencc/RIR-Statistics-Exchange-Format.txt


james
-- 
``It's somewhere in the Red Hat district''  --  A network engineer's
  freudian slip when talking about Amsterdam's nightlife at RIPE 38.



Re: Consumer Grade - IPV6 Enabled Router Firewalls.

2009-12-15 Thread Joakim Aronius
* Steven Bellovin (s...@cs.columbia.edu) wrote:
 
 On Dec 14, 2009, at 11:47 PM, Joel Jaeggli wrote:
  Owen DeLong wrote:
  Stable outgoing connections for p2p apps, messaging, gaming platforms
  and foo website with java script based rpc mechanisms have similar
  properties. I don't sleep soundly at night becasuse the $49 buffalo
  router I bought off an endcap at frys uses iptables, I sleep soundly
  because I don't care.
  
 Precisely.  And if you want to get picky, remember that availability is part
 of the standard definition of security.  A firewall that doesn't let me play
 Chocolate-Sucking Zombie Monsters is an attack on the availability of that
 gmae, albeit from the purest of motives.
 
 No, I'm not saying that this is good.  I am saying that in the real world, it
 *will* happen.

So what you are saying is that ease of use and service availability is priority 
one. Then what exactly are the responsibilities of the ISP and CPE manufacturer 
when it comes to security? CPEs with WiFi usually comes with the advice to 
change password etc. Is it ok to build an infrastructure relying on UPnP, write 
a disclaimer, and let the end user handle eventual problems? (I assume it is...)

/jkm



Re: Consumer Grade - IPV6 Enabled Router Firewalls.

2009-12-15 Thread Mark Newton

On 15/12/2009, at 11:19 PM, Joakim Aronius wrote:

 So what you are saying is that ease of use and service availability is 
 priority one. Then what exactly are the responsibilities of the ISP and CPE 
 manufacturer when it comes to security? CPEs with WiFi usually comes with the 
 advice to change password etc. Is it ok to build an infrastructure relying on 
 UPnP, write a disclaimer, and let the end user handle eventual problems? (I 
 assume it is...)

Hasn't essentially every ISP on the planet been doing that for years, 
only without the disclaimer?

It's not like we're talking about creating UPnP from whole cloth.  We're
discussing a replacement of like-for-like, updating existing capabilities
to support IPv6.

  - mark

--
Mark Newton   Email:  new...@internode.com.au (W)
Network Engineer  Email:  new...@atdot.dotat.org  (H)
Internode Pty Ltd Desk:   +61-8-82282999
Network Man - Anagram of Mark Newton  Mobile: +61-416-202-223








Re: IP to authoritative CIDR webservices

2009-12-15 Thread Tim Wilde
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 12/15/2009 12:18 AM, William Pitcock wrote:
 http://asn.cymru.com/
 
 Looks like their WHOIS server in verbose mode will do the trick for what
 I want, as it provides predictable output.  Thank you.

For the record, the prefix you find here will be the prefix our BGP view
(from peers around the globe) sees that IP announced as, which is not
necessarily the same as the RIR allocated prefix.  And you can find full
details of all of the access methods for this service here:

http://www.team-cymru.org/Services/ip-to-asn.html

Please make note of the notice at the top of the page regarding use in
software, applications, and devices - if we have advance notice we can
make sure we're not going to accidentally block you or your users, but
only if you get in touch with us first. :)

Thanks,
Tim Wilde

- -- 
Tim Wilde, Senior Software Engineer, Team Cymru, Inc.
twi...@cymru.com | +1-630-230-5433 | http://www.team-cymru.org/
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAksnoKMACgkQluRbRini9tg5dACePR1UW3eLF4LTQ3BkWIdy1B/+
E3IAnjTeU5TeJQkEHLKE7c+CceFyVPU+
=FmpZ
-END PGP SIGNATURE-



DNS question, null MX records

2009-12-15 Thread Eric J Esslinger
I have a domain that exists solely to cname A records to another domain's 
websites. There is no MX server for that domain, there is no valid mail sent as 
from that domain. However when I hooked it up I immediately started getting 
bounces and spam traffic attemtping to connect to the cnamed A record, which 
has no inbound mail server (It's actually hitting the firewall in front of it). 
(The domain name is actually several years old and has been sitting without dns 
for a while)

I found a reference to a null MX proposal, constructed so:
example.comINMX 0 .

Question: Is this a valid dns construct or did the proposal die? I don't want 
to cause people problems but at the same time, I don't want any of this crap to 
even attempt to deliver on this domain to any of my servers.


__
Eric Esslinger
Information Services Manager - Fayetteville Public Utilities
http://www.fpu-tn.com/
(931)433-1522 ext 165




This message may contain confidential and/or proprietary information and is 
intended for the person/entity to whom it was originally addressed. Any use by 
others is strictly prohibited.


RE: DNS question, null MX records

2009-12-15 Thread Mark Scholten
Hello,

You could use:
Local.example.com.  IN  A   127.0.0.1
Example.com.IN  MX  10  local.example.com.

This way systems shouldn't deliver it at your system.

What you did mention is something we don't allow our customers to do (if I
am correct).

With kind regards,

Mark Scholten

-Original Message-
From: Eric J Esslinger [mailto:eesslin...@fpu-tn.com] 
Sent: dinsdag 15 december 2009 16:18
To: 'nanog@nanog.org'
Subject: DNS question, null MX records

I have a domain that exists solely to cname A records to another domain's
websites. There is no MX server for that domain, there is no valid mail sent
as from that domain. However when I hooked it up I immediately started
getting bounces and spam traffic attemtping to connect to the cnamed A
record, which has no inbound mail server (It's actually hitting the firewall
in front of it). (The domain name is actually several years old and has been
sitting without dns for a while)

I found a reference to a null MX proposal, constructed so:
example.comINMX 0 .

Question: Is this a valid dns construct or did the proposal die? I don't
want to cause people problems but at the same time, I don't want any of this
crap to even attempt to deliver on this domain to any of my servers.


__
Eric Esslinger
Information Services Manager - Fayetteville Public Utilities
http://www.fpu-tn.com/
(931)433-1522 ext 165




This message may contain confidential and/or proprietary information and is
intended for the person/entity to whom it was originally addressed. Any use
by others is strictly prohibited.




Re: DNS question, null MX records

2009-12-15 Thread Florian Weimer
* Eric J. Esslinger:

 I found a reference to a null MX proposal, constructed so:
 example.comINMX 0 .

I think this is quite controversal.  The best approach still seems to
be an SMTP rejecter on a dedicated IP address.

-- 
Florian Weimerfwei...@bfk.de
BFK edv-consulting GmbH   http://www.bfk.de/
Kriegsstraße 100  tel: +49-721-96201-1
D-76133 Karlsruhe fax: +49-721-96201-99



Re: DNS question, null MX records

2009-12-15 Thread Patrick W. Gilmore
On Dec 15, 2009, at 10:17 AM, Eric J Esslinger wrote:

 I have a domain that exists solely to cname A records to another domain's 
 websites. There is no MX server for that domain, there is no valid mail sent 
 as from that domain. However when I hooked it up I immediately started 
 getting bounces and spam traffic attemtping to connect to the cnamed A 
 record, which has no inbound mail server (It's actually hitting the firewall 
 in front of it). (The domain name is actually several years old and has been 
 sitting without dns for a while)
 
 I found a reference to a null MX proposal, constructed so:
 example.comINMX 0 .
 
 Question: Is this a valid dns construct or did the proposal die? I don't want 
 to cause people problems but at the same time, I don't want any of this crap 
 to even attempt to deliver on this domain to any of my servers.

It's valid.  But if you think all spammers will respect it, you're in for a 
surprise. :(

There is also a recommendation to point the MX at somewhere unroutable 
(192.2.x.x IIRC, but don't quote me on that).  This will force the spammer / 
bot to try to connect to something that does not exist and use up sockets  
resources, hopefully slowing it down.  I've also heard that pointing the MX at 
localhost is useful, for reasons that should be obvious.  The latter has the 
slight advantage of not making networks with a default route carry packets to 
the DFZ.

I'm sure some will find errors with all three suggestions.  I honestly don't 
know which is the best / worst.  Personally I'd set up a tiny mail server that 
accepted connections  feed them to /dev/null, or maybe forwarded the whole 
feed to a spam trap or DCC or the like.

-- 
TTFN,
patrick




Re: DNS question, null MX records

2009-12-15 Thread Dave Sparro

On 12/15/2009 10:17 AM, Eric J Esslinger wrote:

I found a reference to a null MX proposal, constructed so:
example.comINMX 0 .

Question: Is this a valid dns construct or did the proposal die? I don't want 
to cause people problems but at the same time, I don't want any of this crap to 
even attempt to deliver on this domain to any of my servers.
   


Pulling from my often mangled memory:

This was proposed in a draft RFC that went nowhere.
Parsing the Null MX record was implemented in at least one fairly 
popular MTA (Postfix?)
The null MX record was published by whoever got (some of?) the Excite 
@Home domain(s) after that company flamed out.  This results in the 
occasional post to various mailing lists by people wondering why they 
are queuing mail bound for said domain.


So to the point of your question, it may reduce some SMTP connection 
attempts to you, but will not likely eliminate them.


--
Dave



RE: DNS question, null MX records

2009-12-15 Thread Eric J Esslinger

I've had a couple of off-list comments already about using it as/donating it to 
a spam trap; That is a good idea and I actually thought of that.

However, the address was formerly used for email addresses for our customers 
and for our business (some 10 years ago it was registered, but has not had any 
valid dns records set for roughly 6 years), and we still deal from time to time 
with mail being sent to old addresses on that domain for various reasons 
(several dns registrations, for example, we've had to help these people go 
through the fax change system because we don't want to go to the trouble of 
setting up to receive email on this domain again)

So in any case, due to customer privacy concerns we feel we can't do that.

Also I have set the spf -all on it, for those that look for these records to 
auot-reject email from the domain.
__
Eric Esslinger
Information Services Manager - Fayetteville Public Utilities
http://www.fpu-tn.com/
(931)433-1522 ext 165



-Original Message-
From: Eric J Esslinger [mailto:eesslin...@fpu-tn.com]
Sent: Tuesday, December 15, 2009 9:18 AM
To: 'nanog@nanog.org'
Subject: DNS question, null MX records


I have a domain that exists solely to cname A records to another domain's 
websites. There is no MX server for that domain, there is no valid mail sent as 
from that domain. However when I hooked it up I immediately started getting 
bounces and spam traffic attemtping to connect to the cnamed A record, which 
has no inbound mail server (It's actually hitting the firewall in front of it). 
(The domain name is actually several years old and has been sitting without dns 
for a while)

I found a reference to a null MX proposal, constructed so:
example.comINMX 0 .

Question: Is this a valid dns construct or did the proposal die? I don't want 
to cause people problems but at the same time, I don't want any of this crap to 
even attempt to deliver on this domain to any of my servers.


__
Eric Esslinger
Information Services Manager - Fayetteville Public Utilities 
http://www.fpu-tn.com/ (931)433-1522 ext 165




This message may contain confidential and/or proprietary information and is 
intended for the person/entity to whom it was originally addressed. Any use by 
others is strictly prohibited.

This message may contain confidential and/or proprietary information and is 
intended for the person/entity to whom it was originally addressed. Any use by 
others is strictly prohibited.
attachment: Eric J Esslinger.vcf

Cyclops Down?

2009-12-15 Thread sjk
Is anyone else seeing cyclops down -- or is it just me?

 mtr -c10 -r 131.179.96.253

4. osh-2828-peer.onshore.net 0.0%101.3   1.3   1.2   1.6   0.1
  5. ip65-47-181-105.z181-47-65.c  0.0%101.4   2.0   1.3   3.7   0.8
  6. ge11-1-4d0.mcr2.chicago-il.u  0.0%102.1   1.7   1.4   2.1   0.3
  7. ae1d0.mcr1.chicago-il.us.xo.  0.0%102.7  11.8   1.8  34.9  13.4
  8. 216.156.0.161.ptr.us.xo.net   0.0%10   62.2  62.3  62.0  62.8   0.3
  9. te-3-2-0.rar3.dallas-tx.us.x  0.0%10   61.1  61.8  61.0  64.2   1.0
 10. 207.88.12.46.ptr.us.xo.net0.0%10   61.6  61.6  60.7  63.8   1.1
 11. 207.88.12.158.ptr.us.xo.net   0.0%10   60.7  61.0  60.7  61.7   0.4
 12. lax-px1--xo-ge.cenic.net  0.0%10   60.5  60.8  60.4  61.4   0.4
 13. dc-lax-core1--lax-peer1-ge.c  0.0%10   61.5  61.5  61.1  62.1   0.4
 14. dc-lax-agg1--lax-core1-ge.ce  0.0%10   61.1  61.6  60.8  63.5   0.9
 15. dc-ucla--lax-agg1-ge-2.cenic  0.0%10   62.0  62.6  61.7  65.1   1.3
 16. border-2--core-1-ge.backbone  0.0%10   62.4  62.4  61.8  63.4   0.5
 17. core-1--mathsci-10ge.backbon  0.0%10   61.9  61.7  61.4  62.1   0.2
 18. ???  100.0100.0   0.0   0.0   0.0   0.0



Re: DNS question, null MX records

2009-12-15 Thread Andy Davidson
Eric J Esslinger wrote:
 I have a domain that exists solely to cname A records to another domain's 
 websites.
[...]
 I found a reference to a null MX proposal, constructed so:
 example.comINMX 0 .
[...]
 Question: Is this a valid dns construct or did the proposal die?

It's valid, but you will probably find people still try to spam to
machines on the A records, and all of the other weird and wonderful things
that spambots try to do to find a path that will deliver mail...

If there is no time that mail should appear *from* this domain name then
it's polite to set spf records as such - one of the few things spf is
always useful for :-) like this :

@   IN  TXT v=spf1 -all

... all this means in practice though is that spammers who actually bother
to check for this, will find someone else to masquerade.  But you won't
have to deal with the associated attempted bounce delivery connections...

Best wishes
Andy



Re: Is there anyone from ASPEWS on this list?

2009-12-15 Thread Michelle Sullivan

Bill Weiss wrote:

Michelle Sullivan(matt...@sorbs.net)@Mon, Dec 14, 2009 at 11:32:48AM +0100:
  


Then tell me where it says 3-5 hours and I'll correct the text.



On http://www.au.sorbs.net/cgi-bin/support , I read:
This will route any created ticket to the robot handler which will
process and delist the netblock (upto /24) within a few hours

That says the robot will delist (not schedule to delist) within a few
hours.

  


Thank you, I wasn't aware, and it will be corrected (doesn't say 
3-5hours still so I'd love to find that one).


Michelle



Re: Cyclops Down?

2009-12-15 Thread Jorge Amodio
Looks from from SATX (TWC/RoadRunner)

Jorge

On Tue, Dec 15, 2009 at 10:00 AM, sjk s...@sleepycatz.com wrote:
 Is anyone else seeing cyclops down -- or is it just me?

  mtr -c10 -r 131.179.96.253



Re: Is there anyone from ASPEWS on this list?

2009-12-15 Thread Michelle Sullivan

Kevin Stange wrote:

On 12/14/2009 04:32 AM, Michelle Sullivan wrote:
snip
  

I'm a robot writing you on behalf of the SORBS' admins. The reason
you're getting this automated response, is our desire to provide you
with consistent and fast responses. I'm prepared to correctly analyze
most of the cases appearing in the DUHL queue.


snip

This last sentence seems to be my point of contention here.  I am trying
to get a /18 removed from the DUHL and every time the robot tells me
some arbitrary ranges I did not mention explicitly are being tested
and/or not eligible for delisting.  Since the ranges not eligible are
configured the same as those that are, I can't figure this out.
Replying to the robot resulted in no response for a month, so I ended up
submitting a ticket via the ISP contact form directly, with all the
information requested, but the first time, someone just pushed my
request back to the robot and it refused ranges again.
  


This sometimes happens, particularly if the request doesn't come with an 
ASN and/or no authoritative contact (ie: not from the email used in the 
whois records for that netblock).


For what it's worth using the following syntax when sending to 
d...@support.sorbs.net can force the robot's view:


BEGIN SORBS LIST
ip.add.re.ss/mask
.
.
.
ip.add.re.ssX/mask
END SORBS LIST

Will force the robot to only look at the networks within the tags (case 
is sensitive)  Submitting ranges over /16 with this method will result 
in ticket rejection.  rDNS will be scanned in all cases, rDNS is cached 
locally for a minimum of 48 hours, so if you are rejected because some 
rDNS appears dynamic, you will need to get a human to manually rescan or 
approve for delisting, or wait 48 hours for the cache to be ignored.


The cache is web viewable and publicly accessible, please email me 
offlist to miche...@sorbs.net if you want to know where the cache is.



I understand you get a lot of traffic to your ticket system, but I have
to wonder whether a system which is so complex and large that it is near
impossible to support and keep maintained accurately is actually still
useful.  I assume you love (to some degree) helping kill spammers, but
maybe you need to solicit (screened) volunteers to expand your staffing?

  
We do, and getting technically clueful people who are trustworthy seems 
to be an issue.  We got hit by the 'trustworthy' aspect some time ago, 
and the clueful aspect is a regular problem.


I am hoping that the buy out by GFI will provide some paid 24x7 staff, 
obviously I cannot comment about where that is going any further, but we 
all know things take time  Currently I am working full time on 
processing tickets as well as other duties in relation to improving all 
systems, but I actually need to stop answering tickets completely to 
complete those other systems...  Those other systems will allow approved 
entities to access the SORBS database directly (and not just for DUHL 
requests) this system was devised in 2003, initially developed in 2004 
and promised in 2005 however with everything that has happened to me in 
the last 4 years it has been delayed, delayed and delayed yet again. 
Patience seems to be the key for all concerned as there is currently 
only one of me.


Michelle



Customer issue connecting to TWTelecom

2009-12-15 Thread Scott Wolfe
Can someone from TW Telecom contact me offlist?

I have a customer having issues connecting to a TW Telecom hosted site.

Scott Wolfe
Cybera, Inc
615-301-2346




PGP.sig
Description: PGP signature


Re: Cyclops Down?

2009-12-15 Thread Ricardo Oliveira

Hi all,

We're having an issue with an UPS here at UCLA where one of the  
Cyclops servers is connected to. It should be fixed very soon, will  
keep you posted..


Thanks,

--Ricardo

On Dec 15, 2009, at 8:00 AM, sjk wrote:


Is anyone else seeing cyclops down -- or is it just me?

mtr -c10 -r 131.179.96.253

4. osh-2828-peer.onshore.net 0.0%101.3   1.3   1.2
1.6   0.1
 5. ip65-47-181-105.z181-47-65.c  0.0%101.4   2.0   1.3
3.7   0.8
 6. ge11-1-4d0.mcr2.chicago-il.u  0.0%102.1   1.7   1.4
2.1   0.3
 7. ae1d0.mcr1.chicago-il.us.xo.  0.0%102.7  11.8   1.8   
34.9  13.4
 8. 216.156.0.161.ptr.us.xo.net   0.0%10   62.2  62.3  62.0   
62.8   0.3
 9. te-3-2-0.rar3.dallas-tx.us.x  0.0%10   61.1  61.8  61.0   
64.2   1.0
10. 207.88.12.46.ptr.us.xo.net0.0%10   61.6  61.6  60.7   
63.8   1.1
11. 207.88.12.158.ptr.us.xo.net   0.0%10   60.7  61.0  60.7   
61.7   0.4
12. lax-px1--xo-ge.cenic.net  0.0%10   60.5  60.8  60.4   
61.4   0.4
13. dc-lax-core1--lax-peer1-ge.c  0.0%10   61.5  61.5  61.1   
62.1   0.4
14. dc-lax-agg1--lax-core1-ge.ce  0.0%10   61.1  61.6  60.8   
63.5   0.9
15. dc-ucla--lax-agg1-ge-2.cenic  0.0%10   62.0  62.6  61.7   
65.1   1.3
16. border-2--core-1-ge.backbone  0.0%10   62.4  62.4  61.8   
63.4   0.5
17. core-1--mathsci-10ge.backbon  0.0%10   61.9  61.7  61.4   
62.1   0.2
18. ???  100.0100.0   0.0   0.0
0.0   0.0







RE: DNS question, null MX records *summary of on list and off list replies*

2009-12-15 Thread Eric J Esslinger
A. Use a valid domain mapped to an unroutable or loopback instead of the .
I've decided to use 127.0.0.1
B. Set spf -all, for those who bother to check that to stop inbound mail from 
your domain.
Already had that in place
C. Donate the spam to someone who would use it.
I can't donate the existing incoming email due to privacy concerns, however, 
project honeypot uses subdomains (f...@bar.example.com) for it's spam traps and 
wants unused subdomains so it's traps will be 'clean to start'. I'll see if I 
can get that done.
D. Expect some spammers to detect any MX strangeness you use and bypass it in 
favor of your A record.
Understandable, and none of the referenced records in the DNS files accept mail 
from outside, connections are silently dropped at the firewall. This is just an 
attempt to cut the mess coming in because of the A record down in size.
E. Set up an actual mail server routing all mail to /dev/null.
I'd rather just drop the traffic rather than have another service to 
maintain/secure/update


__
Eric Esslinger
Information Services Manager - Fayetteville Public Utilities
http://www.fpu-tn.com/
(931)433-1522 ext 165



-Original Message-
From: Eric J Esslinger [mailto:eesslin...@fpu-tn.com]
Sent: Tuesday, December 15, 2009 9:18 AM
To: 'nanog@nanog.org'
Subject: DNS question, null MX records


I have a domain that exists solely to cname A records to another domain's 
websites. There is no MX server for that domain, there is no valid mail sent as 
from that domain. However when I hooked it up I immediately started getting 
bounces and spam traffic attemtping to connect to the cnamed A record, which 
has no inbound mail server (It's actually hitting the firewall in front of it). 
(The domain name is actually several years old and has been sitting without dns 
for a while)

I found a reference to a null MX proposal, constructed so:
example.comINMX 0 .

Question: Is this a valid dns construct or did the proposal die? I don't want 
to cause people problems but at the same time, I don't want any of this crap to 
even attempt to deliver on this domain to any of my servers.



This message may contain confidential and/or proprietary information and is 
intended for the person/entity to whom it was originally addressed. Any use by 
others is strictly prohibited.



Re: Is there anyone from ASPEWS on this list?

2009-12-15 Thread Kevin Stange
On 12/15/2009 10:17 AM, Michelle Sullivan wrote:
 Bill Weiss wrote:
 Michelle Sullivan(matt...@sorbs.net)@Mon, Dec 14, 2009 at 11:32:48AM
 +0100:
  

 Then tell me where it says 3-5 hours and I'll correct the text.
 

 On http://www.au.sorbs.net/cgi-bin/support , I read:
 This will route any created ticket to the robot handler which will
 process and delist the netblock (upto /24) within a few hours

 That says the robot will delist (not schedule to delist) within a few
 hours.

   
 
 Thank you, I wasn't aware, and it will be corrected (doesn't say
 3-5hours still so I'd love to find that one).
 

There is this text I see, which seems to disagree with the robot's
behavior in my case (from the Dynamic IP FAQ):

The Regional Internet Registry (RIR) Point of Contact (PoC) can request
a listing or delisting of any address in their space. The only time this
will be refused is when the netblock information in the RIR or in the
reverse DNS naming clearly indicates the addresses are dynamically
assigned (e.g. 0.1.pool.example.com). 

I'm sending my request from our PoC and it's not taking my word for it
like is claimed here (since the reverse DNS certainly doesn't imply the
ranges are dynamic).  If you don't consider this part of the policy
anymore, you might want to clear that up in the FAQ.

-- 
Kevin Stange
Chief Technology Officer
Steadfast Networks
http://steadfast.net
Phone: 312-602-2689 ext. 203 | Fax: 312-602-2688 | Cell: 312-320-5867



signature.asc
Description: OpenPGP digital signature


Re: Consumer Grade - IPV6 Enabled Router Firewalls.

2009-12-15 Thread Owen DeLong


On Dec 15, 2009, at 4:49 AM, Joakim Aronius wrote:


* Steven Bellovin (s...@cs.columbia.edu) wrote:


On Dec 14, 2009, at 11:47 PM, Joel Jaeggli wrote:

Owen DeLong wrote:
Stable outgoing connections for p2p apps, messaging, gaming  
platforms

and foo website with java script based rpc mechanisms have similar
properties. I don't sleep soundly at night becasuse the $49 buffalo
router I bought off an endcap at frys uses iptables, I sleep soundly
because I don't care.

Precisely.  And if you want to get picky, remember that  
availability is part
of the standard definition of security.  A firewall that doesn't  
let me play
Chocolate-Sucking Zombie Monsters is an attack on the availability  
of that

gmae, albeit from the purest of motives.

No, I'm not saying that this is good.  I am saying that in the real  
world, it

*will* happen.


So what you are saying is that ease of use and service availability  
is priority one. Then what exactly are the responsibilities of the  
ISP and CPE manufacturer when it comes to security? CPEs with WiFi  
usually comes with the advice to change password etc. Is it ok to  
build an infrastructure relying on UPnP, write a disclaimer, and let  
the end user handle eventual problems? (I assume it is...)


/jkm


Personally, I think that CPE should come up relatively braindead  
except on the interior wired ethernet
interfaces and require creating an SSID and suggesting creating a  
password (regardless of whether
TKIM, WEP, WPA, etc, at least something) before enabling any  
wireless.  It should require the user
to create their own administrative password before being able to  
enable any other features on the box.


If CPE manufacturers did this, it would remove a great many  
vulnerabilities in the world without making

it particularly harder for the average end-user.


Owen




Re: DNS question, null MX records

2009-12-15 Thread Tony Finch
On Tue, 15 Dec 2009, Florian Weimer wrote:
 * Eric J. Esslinger:

  I found a reference to a null MX proposal, constructed so:
  example.comINMX 0 .

 I think this is quite controversal.

My impression from discussions on various IETF lists is that most people
think it is a good idea, it is already reasonably widely implemented, but
no-one has the time and persistence to push a spec through to publication.

Tony.
-- 
f.anthony.n.finch  d...@dotat.at  http://dotat.at/
GERMAN BIGHT HUMBER: SOUTHWEST 5 TO 7. MODERATE OR ROUGH. SQUALLY SHOWERS.
MODERATE OR GOOD.



Re: DNS question, null MX records

2009-12-15 Thread Daniel Senie
I disagree. There was considerable concern with a misuse of a mechanism and its 
effect on various systems. That, from discussion on the IETF mailing list I was 
on when it was discussed there. There was no rough consensus that I could see.


On Dec 15, 2009, at 2:09 PM, Tony Finch wrote:

 On Tue, 15 Dec 2009, Florian Weimer wrote:
 * Eric J. Esslinger:
 
 I found a reference to a null MX proposal, constructed so:
 example.comINMX 0 .
 
 I think this is quite controversal.
 
 My impression from discussions on various IETF lists is that most people
 think it is a good idea, it is already reasonably widely implemented, but
 no-one has the time and persistence to push a spec through to publication.
 
 Tony.
 -- 
 f.anthony.n.finch  d...@dotat.at  http://dotat.at/
 GERMAN BIGHT HUMBER: SOUTHWEST 5 TO 7. MODERATE OR ROUGH. SQUALLY SHOWERS.
 MODERATE OR GOOD.




Cogent $1500 GigE

2009-12-15 Thread Babak Pasdar
Dear List,

I am getting a big push from Cogent on their full GigE for $1.50 per circuit.  
What are your experiences with Cogent in general?  If on the fence, how would 
you use their service for this deal to make sense?

Best Regards,

Babak

--
Babak Pasdar
President  CEO | Certified Ethical Hacker
Bat Blue Corporation | Integrity . Privacy . Availability
(p) 212.461.3322 x3005 | (f) 212.584. | (w) www.BatBlue.com

Receive Bat Blue's Daily Security Intelligence Report
Bat Blue's AS: 25885 |  BGP Policy |  Peering Policy 
Bat Blue's Legal Notice

Reducing IT Security Budget, Burden  Risk - Video | Article


Re: Cogent $1500 GigE

2009-12-15 Thread Seth Mattinen

Babak Pasdar wrote:

Dear List,

I am getting a big push from Cogent on their full GigE for $1.50 per circuit.  
What are your experiences with Cogent in general?  If on the fence, how would 
you use their service for this deal to make sense?



$1.50 per meg. ;) I'd probably take it just because I could at that 
price. The downsides with Cogent is that they occasionally get into 
peering spats that might hurt you if you aren't multihomed, and no 
usable IPv6 (if that matters to you). I hadn't looked into it any 
further because I'm not located anywhere Cogent is to give it a serious 
look.


~Seth



Re: Cogent $1500 GigE

2009-12-15 Thread Patrick W. Gilmore
On Dec 15, 2009, at 3:53 PM, Seth Mattinen wrote:
 Babak Pasdar wrote:
 Dear List,
 I am getting a big push from Cogent on their full GigE for $1.50 per 
 circuit.  What are your experiences with Cogent in general?  If on the 
 fence, how would you use their service for this deal to make sense?
 
 $1.50 per meg. ;) I'd probably take it just because I could at that price. 
 The downsides with Cogent is that they occasionally get into peering spats 
 that might hurt you if you aren't multihomed, and no usable IPv6 (if that 
 matters to you). I hadn't looked into it any further because I'm not located 
 anywhere Cogent is to give it a serious look.

I'm pretty sure the system at $DAY_JOB is better at pushing bits near, but not 
quite over, the hard limit of a link than any other out there.  And I am dead 
certain I could not get 1000 Mbps out of a GigE without serious packet loss.

Even assuming 900 Mbps (good luck), you're at $1.66/Mbps.  Most people do 50%, 
so that would be $3/Mbps.  Still probably a good price for 500 Mbps.  But how 
much OpEx do you have to spend to ensure that link stays below 1 Gbps 24/7/365?

And if you only have 100 Mbps, though, it doesn't look so good.

-- 
TTFN,
patrick




Root zone DNSSEC deployment web site and technical status update

2009-12-15 Thread Matt Larson
The root zone DNSSEC deployment team is pleased to announce a new web
site with information about the project, http://www.root-dnssec.org.
The site serves as a repository for documentation and information
about deploying DNSSEC in the root zone, including technical status
updates.  The first status update is available on the site and is
included below, as well.  Additional documentation will be posted as
it becomes available.  Important announcements and future status
updates will appear in the site's RSS feed,
http://www.root-dnssec.org/rss.

The design team welcomes your feedback: you can reach the entire team
at roots...@icann.org.

On behalf of the root zone DNSSEC deployment team,

Matt Larson

--

Status Update, December, 2009

This is the first of a series of technical status updates intended to
inform a technical audience on the progress of deploying DNSSEC in the
root zone of the DNS.

RESOURCES

Details of the project, including documentation published to date, can
be found at http://www.root-dnssec.org/.

We'd like to hear from you. If you have feedback for us, please send
it to roots...@icann.org.

DOCUMENTATION

This project involves the creation of a large volume of documentation,
individual components of which will be released as they have completed
internal review. The following documents are expected to be released
as drafts before the end of December 2009:

* Root Zone DNSSEC Deployment Plan
* Root Zone Trust Anchor Publication

DEPLOYMENT STATUS

Several root server operators have started testing a lightweight
packet capture tool designed to provide a full record of priming
queries received over the period covering DNSSEC deployment in the
root zone. We hope this data collection will be in full production on
all root servers before the end of December, providing baseline data
which will allow the reaction of the system as a whole to deployment
events to be observed.

On 2009-12-01, the first pre-production KSR exchange between ICANN and
VeriSign and the signing of the root zone within VeriSign's production
infrastructure commenced. The signing, validation, measurement and
monitoring infrastructure will now be subject to full internal
testing.

PLANNED DEPLOYMENT SCHEDULE

2009-12-01: KSR exchange, root zone signing begins, internal to
VeriSign and ICANN; generation of DURZ

Week of 2010-01-11: L starts to serve DURZ

Week of 2010-02-08: A starts to serve DURZ

Week of 2010-03-01: M, I start to serve DURZ

Week of 2010-03-22: D, K, E start to serve DURZ

Week of 2010-04-12: B, H, C, G, F start to serve DURZ

Week of 2010-05-03: J starts to serve DURZ

2010-07-01: Distribution of validatable, production, signed root zone;
publication of root zone trust anchor.

(Please note that this schedule is tentative and subject to change
based on testing results or other unforeseen factors.)



Re: Cogent $1500 GigE

2009-12-15 Thread leen

On 12/15/2009 09:53 PM, Seth Mattinen wrote:

Babak Pasdar wrote:

Dear List,

I am getting a big push from Cogent on their full GigE for $1.50 per 
circuit.  What are your experiences with Cogent in general?  If on 
the fence, how would you use their service for this deal to make sense?




$1.50 per meg. ;) I'd probably take it just because I could at that 
price. The downsides with Cogent is that they occasionally get into 
peering spats that might hurt you if you aren't multihomed, and no 
usable IPv6 (if that matters to you). I hadn't looked into it any 
further because I'm not located anywhere Cogent is to give it a 
serious look.


~Seth




Hi Seth/List,

Maybe I'm to harsh, but I just don't think of them as a full-transit. 
That makes it a lot easier to make a decision about adding them.


We need atleast 2 full-transits and then possible add them to get the 
price down on a good part of the traffic.


On the IPv6-side they have IPv6 in Amsterdam (where we are fairly 
close), but they don't even have full-transit in the 'normal' situation 
(think: HE).


We do have peering with HE, so that's atleast something. But I don't yet 
know what else they are missing.


That's how I see them.

Have a nice day.




Need to contact someone with Verisign

2009-12-15 Thread Scott M. Likens
Hi,

Long story short I am a customer of 1and1.com for the domain 
adappsolutions.com, we moved our datacenter roughly 60-days ago and updated our 
records with 1and1.  

However it is now December 15th and when I go here, 

http://registrar.verisign-grs.com/cgi-bin/whois?whois_nic=ns2.adappsolutions.comx=0y=0type=nameserver

I see it pointing to the incorrect address, as well as ns1.adappsolutions.com

I have updated all the records I can find on 1and1.com and still there does not 
seem to be a way for this update to occur?

So if someone can contact me off list, so I can get this addressed ASAP that 
would be wonderful.

Thanks,

Sincerely,

Scott M. Likens




ADMIN: List FAQ/Monthly Post.

2009-12-15 Thread NANOG Mail List Committee
This 100-line document contains 62% of what you need to know to avoid
annoying 10,000 people in your email to the NANOG list. It also contains
pointers to another 23%. Please take 5 minutes to read it before
you post [again].

General Information
===

About NANOG:http://www.nanog.org/about/
NANOG News: http://www.nanog.org/
NANOG lists and AUP:http://www.nanog.org/mailinglist/
NANOG List FAQ: http://www.nanog.org/mailinglist/listfaqs/

To Subscribe or Unsubscribe from the list:
http://mailman.nanog.org/mailman/listinfo/nanog

To contact the list's admins:   adm...@nanog.org


Posting Policy
==

The NANOG list has over 10,000 subscribers so it is very easy for a 
thread to have scores of posts while being off-topic and only of 
interest to only a small proportion of subscribers. Please consider 
before each post if your email will be of interest to the majority of 
members or might alternatively be emailed directly the people of 
interest or posted to another forum.

Please read the FAQ and AUP policy before posting for more details.


Especially the following are discouraged:

* Is a certain site down? Other Outages not affecting half the Internet.

  Please use http://downforeveryoneorjustme.com/ or a similar site.
  Please post to the Outages mailing list: http://wiki.outages.org

* Spam 

  Please use SPAM-L - http://spam-l.com/mailman/listinfo

* Contacting People

  * http://puck.nether.net/netops/
  * http://www.peeringdb.com
  * Please try other methods of contacting sites before you post to 
NANOG. Saying something like I tried calling 213-555- but no 
answer shows you _have_ tried alternative methods first.

* Political Issues

  * Topics such as ICANN policy, Government Policy or Law changes that 
do not have short term Operational impact should be avoided.

* Operation topics with more specific lists

  * DNS - http://lists.oarci.net/mailman/listinfo/dns-operations
  * Email - http://www.mailop.org/

* NANOG Mailing list policy 

  Please use the nanog-futures list or contact adm...@nanog.org
  

Please also avoid
=

* Sending posts to the list relevant to only one or two people on this list,
  such as tests or traceroutes in response to another post for comparison
  to those originally posted.

* Jokes, Puns, amusing observations, spelling corrections.

Other NANOG related lists
=

* NANOG-futures - for discussion of the evolution of NANOG, including
  organizational structure, policies and procedures, and agendas for
  NANOG meetings. Such topics aren't appropriate for the main NANOG
  mailing list. 

  http://mailman.nanog.org/mailman/listinfo/nanog-futures

* nanog-attendee - For discussion of venue-specific issues relevant
  to attendees of the current NANOG physical meeting.

  http://mailman.nanog.org/mailman/listinfo/nanog-attendee

* nanog-announce - For announcements of NANOG meetings an other 
  Important NANOG related announcements. Low traffic and all posts are 
  also sent to main list.

  http://mailman.nanog.org/mailman/listinfo/nanog-announce


Other Mailing Lists
===

Information about related lists:

http://www.nanog.org/mailinglist/listfaqs/otherlists.php




Re: DNS question, null MX records

2009-12-15 Thread Douglas Otis

On 12/15/09 8:06 AM, Andy Davidson wrote:

Eric J Esslinger wrote:

I have a domain that exists solely to cname A records to another domain's 
websites.

[...]

I found a reference to a null MX proposal, constructed so:
example.comINMX 0 .

[...]

Question: Is this a valid dns construct or did the proposal die?


It's valid, but you will probably find people still try to spam to
machines on the A records, and all of the other weird and wonderful things
that spambots try to do to find a path that will deliver mail...


SRV records documented the hostname . as representing no service. 
However, errors made by non-RFC-compliant clients still generate a fair 
amount of root traffic attempting to resolve A records for ..  The MX 
record never defined a hostname . to mean no service so it would be 
unwise to expect email clients will interpret this as a special case 
meaning no service as well.  One might instead consider using:


example.com.IN MX 0 192.0.2.0
IN MX 10 192.0.2.1
...
IN MX 90 192.0.2.9

where 192.0.2.0/24 represents a TEST-NET block.

This should ensure traffic will not hit the roots or your servers. 
Assuming a sender tries all of MX addresses listed, they may still 
attempt to resolve A records for example.com.  This MX approach will 
affect those failing to validate email prior to acceptance, and, of 
course, spammers.


-Doug




Re: Need to contact someone with Verisign

2009-12-15 Thread Scott M. Likens
Hi,

Thank you for everyone who responded, I have contacted someone and hope to have 
it resolved.

Thanks again,

Scott M. Likens





Re: DNS question, null MX records

2009-12-15 Thread Mark Andrews

In message 4b284376.3000...@mail-abuse.org, Douglas Otis writes:
 On 12/15/09 8:06 AM, Andy Davidson wrote:
  Eric J Esslinger wrote:
  I have a domain that exists solely to cname A records to another domain's 
 websites.
  [...]
  I found a reference to a null MX proposal, constructed so:
  example.comINMX 0 .
  [...]
  Question: Is this a valid dns construct or did the proposal die?
 
  It's valid, but you will probably find people still try to spam to
  machines on the A records, and all of the other weird and wonderful things
  that spambots try to do to find a path that will deliver mail...
 
 SRV records documented the hostname . as representing no service. 
 However, errors made by non-RFC-compliant clients still generate a fair 
 amount of root traffic attempting to resolve A records for ..  The MX 
 record never defined a hostname . to mean no service so it would be 
 unwise to expect email clients will interpret this as a special case 
 meaning no service as well.  One might instead consider using:
 
 example.com.  IN MX 0 192.0.2.0
   IN MX 10 192.0.2.1
   ...
   IN MX 90 192.0.2.9

Which will expand to:

example.com.IN MX 0 192.0.2.0.example.com.
IN MX 10 192.0.2.1.example.com.

IN MX 90 192.0.2.9.example.com.

MX records DO NOT take IP addresses.
 
 where 192.0.2.0/24 represents a TEST-NET block.
   
 This should ensure traffic will not hit the roots or your servers. 
 Assuming a sender tries all of MX addresses listed, they may still 
 attempt to resolve A records for example.com.  This MX approach will 
 affect those failing to validate email prior to acceptance, and, of 
 course, spammers.
 
 -Doug

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org



Re: DNS question, null MX records *summary of on list and off list replies*

2009-12-15 Thread Phil Vandry
On Tue, 15 Dec 2009 11:51:29 -0600, Eric J Esslinger wrote:
 B. Set spf -all, for those who bother to check that to stop inbound
 mail from your domain.

You might as well also add a DKIM ADSP policy with dkim=discardable.
Similar to your SPF policy, it announces that no unsigned mail (or
no mail at all in your case) should come from this domain. But DKIM
does not suffer from the problems SPF causes with email forwarding
(see recent NANOG thread on that topic).

-Phil



Re: Arrogant RBL list maintainers

2009-12-15 Thread Rich Kulawiec
[ Note: you're not talking about the RBL.  You're talking about
a DNSBL or RHSBL, which are generic terms.  The RBL is a specific
DNSBL and, as far as I know, does not have a listing policy related
to this discussion. ]

On Wed, Dec 09, 2009 at 03:18:47PM +, Sven Olaf Kamphuis wrote:
 because they just assume that working, rfc compliant, reverse dns that
 just-so-happens to be automatically generated would indicate dynamic ip
 space.. 

It has long since become a best practice in mail server operations to
pre-emptively blacklist all such space on sight.  This is common knowledge
among everyone who's kept pace with the field, and is an entirely
appropriate reaction to what's sometimes called the rise of the zombies.

Real mail servers have non-generic, matching forward and reverse DNS
with real hostnames.  The farther hostnames move from that, the more
problems can be expected.

Nobody particularly likes this, as the work necessary in compiling such
lists is onerous.  But it is one of the most effective (in terms of FP and
FN rates as well as resource costs) anti-spam measures available.

---Rsk



Re: Arrogant RBL list maintainers

2009-12-15 Thread Adam Armstrong

On 09/12/2009 15:18, Sven Olaf Kamphuis wrote:

a84-22-xx-xx.cb3rob.net. as it's RFC complient and we cannot be fucked to
 
haha. and what precisely did you expect? that's not really what most 
people would consider valid reverse dns for a mail relay. (operational 
practice often beats RFC where they exist, and more often than not fills 
in where they don't).


personally, i'd recommend not being a dick and setting valid 
*meaningful* reverse dns for things relaying mail.


(i also notice that in later replies you claim that they're breaking eu 
data laws, but you seem to have bleeted on enough about how you think 
data is something that should be in the public domain, so you can 
download movies, err i mean, be like totally free man.)


adama.



Re: Arrogant RBL list maintainers

2009-12-15 Thread James Hess
On Tue, Dec 15, 2009 at 11:30 PM, Adam Armstrong li...@memetic.org wrote:
 personally, i'd recommend not being a dick and setting valid *meaningful*
 reverse dns for things relaying mail.

Many sites don't use names that will necessarily be meaningful to an outsider.
Sometimes the non-meaningful name is the actual hostname and the
_only_ name that machine is known by,  even if the name appears
generic or contains an IP.   Host naming is a matter of local
network policy, and the RFCs that pertain to hostnames specify syntax
requirements only.

Some sites might want to avoid  certain meaningful   RDNS entries
since  spammers, hackers, and other abusive users that scan IP ranges
can utilize the  RDNS to facilitate their activities.  All
reverse DNS information is in the hands of the enemy.

For example, when spammers'  IP scanning efforts  find that an IP
address  reverses to   mail.example.com   the spammer will  know
to try   @example.come-mail addresses for  their dictionary-based
brute-force spamming.

On the other hand,  if the MTA's  IP reverses  to   something like
a152.x.example.net.

As is common for many domains.
Spammers coming in  by  scanning  large ranges of IPs,  have no
pointer to report  the  mailserver they discovered  is  @example.com
 inbound  (or outbound) mail.

Since the RDNS domain is different, and in fact generic,  which  helps
avoid  assisting the spammer  in identifying the IP as an  inbound
mail server.


--
-J



Re: Arrogant RBL list maintainers

2009-12-15 Thread Suresh Ramasubramanian
Security by obscurity, in this day and age? :)

On Wed, Dec 16, 2009 at 11:42 AM, James Hess mysi...@gmail.com wrote:
 As is common for many domains.
 Spammers coming in  by  scanning  large ranges of IPs,  have no
 pointer to report  the  mailserver they discovered  is �...@example.com
  inbound  (or outbound) mail.

 Since the RDNS domain is different, and in fact generic,  which  helps
 avoid  assisting the spammer  in identifying the IP as an  inbound
 mail server.



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)