RE: Wells Fargo getting DDoSed ?

2013-04-05 Thread Ryan Finnesey
I have been having issues with their iPad App all day 

-Original Message-
From: Jayram Déshpandé [mailto:jayde...@gmail.com] 
Sent: Thursday, April 4, 2013 4:38 PM
To: nanog@nanog.org
Subject: Wells Fargo getting DDoSed ?

I observed that since morning Wells Fargo web services are either not reachable 
or are really slow.
I think they are getting DDoSed again. Any official information yet ?

Regards,
-Jay.



--
Subvert the paradigm. - C.K. Prahlad




RE: route for linx.net in Level3?

2013-04-05 Thread Adam Vitkovsky
 The older school of thought was to put all of the edge interfaces into the
IGP, and then carry all of the external routes in BGP. 
I thought people where doing it because IGP converged faster than iBGP and
in case of an external link failure the ingress PE was informed via IGP that
it has to find an alternate next-hop. 
Though now with the advent of BGP PIC this is not an argument anymore. 

adam




Re: route for linx.net in Level3?

2013-04-05 Thread Leo Bicknell
In a message written on Fri, Apr 05, 2013 at 09:32:52AM +0200, Adam Vitkovsky 
wrote:
 I thought people where doing it because IGP converged faster than iBGP and
 in case of an external link failure the ingress PE was informed via IGP that
 it has to find an alternate next-hop. 
 Though now with the advent of BGP PIC this is not an argument anymore. 

You're talking about stuff that's all 7-10 years after the decisions
were made that I described in my previous e-mail.  Tag switching
(now MPLS) had not yet been invented/deployed when the first
next-hop-self wave occured it was all about scaling both the IGP
and BGP.

In some MPLS topologies it may speed re-routing to have edge interfaces
in the IGP due to the faster convergence of IGP's.  YMMV, Batteries not
Included, Some Assembly Required.

-- 
   Leo Bicknell - bickn...@ufp.org - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/


pgp_AJVWtJwTg.pgp
Description: PGP signature


Re: Wells Fargo getting DDoSed ?

2013-04-05 Thread Christopher Morrow
On Fri, Apr 5, 2013 at 2:33 AM, Ryan Finnesey r...@finnesey.com wrote:

 I have been having issues with their iPad App all day


the boneheads doing the attacking keep calling their shots on pastebin...

http://www.reuters.com/article/2013/03/26/net-us-wellsfargo-website-attacks-idUSBRE92P14320130326

which is from the 26th, but I suspect some judicious searching on
webcrawler would get you results as well.


 -Original Message-
 From: Jayram Déshpandé [mailto:jayde...@gmail.com]
 Sent: Thursday, April 4, 2013 4:38 PM
 To: nanog@nanog.org
 Subject: Wells Fargo getting DDoSed ?

 I observed that since morning Wells Fargo web services are either not
 reachable or are really slow.
 I think they are getting DDoSed again. Any official information yet ?

 Regards,
 -Jay.



 --
 Subvert the paradigm. - C.K. Prahlad





Re: 80 km BiDi XFPs

2013-04-05 Thread Jerimiah Cole
On 04/02/2013 05:15 PM, Frank Bulk wrote:
 Is anyone aware of a reputable supplier of 80 km BiDi XFPs?  My regular
 supplier of generics doesn't have an option for us, but I would really like
 to avoid leasing additional fibers.

I'm looking at a data sheet from Transition Networks that lists 80 km
(24 dB) and longer.  I've used some of their SFPs and media converters
without trouble, but not these in particular.

http://www.transition.com/TransitionNetworks/Products2/Family.aspx?Name=TN-SFP-xxx-Simplex



Re: 80 km BiDi XFPs

2013-04-05 Thread Mihai Necsa

http://www.fiberworks.eu/Webshop/Optical-transceivers/SFP-Bi-Di-/-GPON/Gbit-Ethernet-Bi-Di-1310/1550/SFP-BiDi--125-Gbps-GigE--DDM--SM--80km-Tx-Rx1310-1550nm--26dB--LC-SFP-GE-BX80D-35-p018066.aspx

already in production for 2 links

On 04/05/2013 05:50 PM, Jerimiah Cole wrote:

On 04/02/2013 05:15 PM, Frank Bulk wrote:

Is anyone aware of a reputable supplier of 80 km BiDi XFPs?  My regular
supplier of generics doesn't have an option for us, but I would really like
to avoid leasing additional fibers.


I'm looking at a data sheet from Transition Networks that lists 80 km
(24 dB) and longer.  I've used some of their SFPs and media converters
without trouble, but not these in particular.

http://www.transition.com/TransitionNetworks/Products2/Family.aspx?Name=TN-SFP-xxx-Simplex





--
Mihai




BCP38.info

2013-04-05 Thread Jay Ashworth
Ok; I've got a Main Page up at BCP38.info, as well as some supporting
Glossary articles, and the first of a series of writeups on 38 for audiences
of different sizes and types:

  http://www.bcp38.info/index.php/Information_for_end-users

I invite comments, contributions, editing, and people telling me politely
that I'm out of my mind.  :-)

If you wanna write the articles for larger sites, that'd be great too, yeah.

Cheers,
-- jra  
-- 
Jay R. Ashworth  Baylink   j...@baylink.com
Designer The Things I Think   RFC 2100
Ashworth  Associates http://baylink.pitas.com 2000 Land Rover DII
St Petersburg FL USA   #natog  +1 727 647 1274



Re: 80 km BiDi XFPs

2013-04-05 Thread Randy Carpenter

I'm going to guess that this is not going to meet the OP's request for an XFP, 
which would be 10GbE (and not an SFP).


thanks,
-Randy


- Original Message -
 http://www.fiberworks.eu/Webshop/Optical-transceivers/SFP-Bi-Di-/-GPON/Gbit-Ethernet-Bi-Di-1310/1550/SFP-BiDi--125-Gbps-GigE--DDM--SM--80km-Tx-Rx1310-1550nm--26dB--LC-SFP-GE-BX80D-35-p018066.aspx
 
 already in production for 2 links
 
 On 04/05/2013 05:50 PM, Jerimiah Cole wrote:
  On 04/02/2013 05:15 PM, Frank Bulk wrote:
  Is anyone aware of a reputable supplier of 80 km BiDi XFPs?  My regular
  supplier of generics doesn't have an option for us, but I would really
  like
  to avoid leasing additional fibers.
 
  I'm looking at a data sheet from Transition Networks that lists 80 km
  (24 dB) and longer.  I've used some of their SFPs and media converters
  without trouble, but not these in particular.
 
  http://www.transition.com/TransitionNetworks/Products2/Family.aspx?Name=TN-SFP-xxx-Simplex
 
 
 
 
 --
 Mihai
 
 
 
 



Re: 80 km BiDi XFPs

2013-04-05 Thread Matt Addison
How much spare margin do you have? Could you roll your own with a pair
of mismatched (C|D)WDM XFPs and a mux on each end?

Sent from my mobile device, so please excuse any horrible misspellings.

On Apr 2, 2013, at 19:16, Frank Bulk frnk...@iname.com wrote:

 Is anyone aware of a reputable supplier of 80 km BiDi XFPs?  My regular
 supplier of generics doesn't have an option for us, but I would really like
 to avoid leasing additional fibers.

 Frank





Re: public consultation on root zone KSK rollover

2013-04-05 Thread David Conrad
Brandon,

On Apr 4, 2013, at 5:35 PM, Brandon Butterworth bran...@rd.bbc.co.uk wrote:
 You do realize this requires changing validating resolver
 configuration data, right?
 
 Yes. How hard can it be (answer not required).
 
 While it's quaint that the elders of the internet meet and bless each
 new key I don't think this scales.

The point of the wildly over-engineered root key signing ceremony is to build 
trust by publicly demonstrating at every step there is no opportunity for 
intentional or accidental badness to occur without being noticed.  Compare this 
to the processes used by commercial X.509CAs when they roll their root keys 
(you might also want to look at how often they roll their keys).

 I know it's not easy but it needs to be simple and automatic for wide 
 deployment.

Even with RFC 5011 support in every validating resolver on the planet (not 
holding my breath), this requires all of those validating resolvers to accept a 
directive from the outside which instructs software to write something to 
permanent storage.  I can easily imagine some folks being a bit nervous about 
this. Particularly given it would seem some CPE developers can't figure out how 
to write DNS resolvers that can be configured to not respond to arbitrary 
external queries.

Frequency of root key rolling is actually a fairly complicated risk/benefit 
tradeoff. Frequently rolling means its more likely that the roll will be 
successful globally. However, it also increases the risk of (a) breaking DNS 
resolution for some percentage of the Internet and (b) catastrophically failing 
such that RFC 5011-style rollover will no longer work necessitating a manual 
reconfiguration of every validating resolver on the Internet. Choose wisely.

In any event, if you haven't already I would encourage you to provide comments 
at the URL Joe referenced.

Regards,
-drc




Re: 80 km BiDi XFPs

2013-04-05 Thread Jerimiah Cole
On 04/05/2013 10:39 AM, Randy Carpenter wrote:
 
 I'm going to guess that this is not going to meet the OP's request
 for an XFP, which would be 10GbE (and not an SFP).

Probably a safe guess.  Mea culpa.



Re: 80 km BiDi XFPs

2013-04-05 Thread Chuck Anderson
On Fri, Apr 05, 2013 at 10:58:49AM -0600, Jerimiah Cole wrote:
 On 04/05/2013 10:39 AM, Randy Carpenter wrote:
  
  I'm going to guess that this is not going to meet the OP's request
  for an XFP, which would be 10GbE (and not an SFP).
 
 Probably a safe guess.  Mea culpa.

Check out Integra Networks.  Their catalog lists a 10G XFP Bi-Dir
80km:

http://integranetworks.net/wp-content/uploads/2012/06/Integra-Networks-Catalog-20122.pdf

XFP-CXX-80-D (CWDM)
XFP-DXX-80-D (DWDM)



Weekly Routing Table Report

2013-04-05 Thread Routing Analysis Role Account
This is an automated weekly mailing describing the state of the Internet
Routing Table as seen from APNIC's router in Japan.

The posting is sent to APOPS, NANOG, AfNOG, AusNOG, SANOG, PacNOG, LacNOG,
TRNOG, CaribNOG and the RIPE Routing Working Group.

Daily listings are sent to bgp-st...@lists.apnic.net

For historical data, please see http://thyme.rand.apnic.net.

If you have any comments please contact Philip Smith pfsi...@gmail.com.

Routing Table Report   04:00 +10GMT Sat 06 Apr, 2013

Report Website: http://thyme.rand.apnic.net
Detailed Analysis:  http://thyme.rand.apnic.net/current/

Analysis Summary


BGP routing table entries examined:  449057
Prefixes after maximum aggregation:  184025
Deaggregation factor:  2.44
Unique aggregates announced to Internet: 221630
Total ASes present in the Internet Routing Table: 43748
Prefixes per ASN: 10.26
Origin-only ASes present in the Internet Routing Table:   34414
Origin ASes announcing only one prefix:   16061
Transit ASes present in the Internet Routing Table:5792
Transit-only ASes present in the Internet Routing Table:139
Average AS path length visible in the Internet Routing Table:   4.7
Max AS path length visible:  29
Max AS path prepend of ASN ( 28730)  25
Prefixes from unregistered ASNs in the Routing Table:   368
Unregistered ASNs in the Routing Table: 137
Number of 32-bit ASNs allocated by the RIRs:   4688
Number of 32-bit ASNs visible in the Routing Table:3542
Prefixes from 32-bit ASNs in the Routing Table:   10367
Special use prefixes present in the Routing Table:   18
Prefixes being announced from unallocated address space:217
Number of addresses announced to Internet:   2628059756
Equivalent to 156 /8s, 165 /16s and 2 /24s
Percentage of available address space announced:   71.0
Percentage of allocated address space announced:   71.0
Percentage of available address space allocated:  100.0
Percentage of address space in use by end-sites:   94.4
Total number of prefixes smaller than registry allocations:  158789

APNIC Region Analysis Summary
-

Prefixes being announced by APNIC Region ASes:   107913
Total APNIC prefixes after maximum aggregation:   33314
APNIC Deaggregation factor:3.24
Prefixes being announced from the APNIC address blocks:  109122
Unique aggregates announced from the APNIC address blocks:44393
APNIC Region origin ASes present in the Internet Routing Table:4823
APNIC Prefixes per ASN:   22.63
APNIC Region origin ASes announcing only one prefix:   1227
APNIC Region transit ASes present in the Internet Routing Table:819
Average APNIC Region AS path length visible:4.8
Max APNIC Region AS path length visible: 23
Number of APNIC region 32-bit ASNs visible in the Routing Table:486
Number of APNIC addresses announced to Internet:  720399840
Equivalent to 42 /8s, 240 /16s and 109 /24s
Percentage of available APNIC address space announced: 84.2

APNIC AS Blocks4608-4864, 7467-7722, 9216-10239, 17408-18431
(pre-ERX allocations)  23552-24575, 37888-38911, 45056-46079, 55296-56319,
   58368-59391, 131072-133119
APNIC Address Blocks 1/8,  14/8,  27/8,  36/8,  39/8,  42/8,  43/8,
49/8,  58/8,  59/8,  60/8,  61/8, 101/8, 103/8,
   106/8, 110/8, 111/8, 112/8, 113/8, 114/8, 115/8,
   116/8, 117/8, 118/8, 119/8, 120/8, 121/8, 122/8,
   123/8, 124/8, 125/8, 126/8, 133/8, 150/8, 153/8,
   163/8, 171/8, 175/8, 180/8, 182/8, 183/8, 202/8,
   203/8, 210/8, 211/8, 218/8, 219/8, 220/8, 221/8,
   222/8, 223/8,

ARIN Region Analysis Summary


Prefixes being announced by ARIN Region ASes:157436
Total ARIN prefixes after maximum aggregation:79453
ARIN Deaggregation factor: 1.98
Prefixes being announced from the ARIN address blocks:   158125
Unique aggregates announced from the ARIN address blocks: 72365
ARIN Region origin ASes present in the Internet Routing Table:15598
ARIN Prefixes per ASN:10.14
ARIN Region origin ASes 

The Cidr Report

2013-04-05 Thread cidr-report
This report has been generated at Fri Apr  5 21:13:17 2013 AEST.
The report analyses the BGP Routing Table of AS2.0 router
and generates a report on aggregation potential within the table.

Check http://www.cidr-report.org for a current version of this report.

Recent Table History
Date  PrefixesCIDR Agg
29-03-13449781  257239
30-03-13449770  257289
31-03-13449591  257894
01-04-13450130  258509
02-04-13450695  258668
03-04-13450581  258807
04-04-13450741  259286
05-04-13451091  259553


AS Summary
 43856  Number of ASes in routing system
 18179  Number of ASes announcing only one prefix
  3038  Largest number of prefixes announced by an AS
AS6389 : BELLSOUTH-NET-BLK - BellSouth.net Inc.
  116943584  Largest address span announced by an AS (/32s)
AS4134 : CHINANET-BACKBONE No.31,Jin-rong Street


Aggregation Summary
The algorithm used in this report proposes aggregation only
when there is a precise match using the AS path, so as 
to preserve traffic transit policies. Aggregation is also
proposed across non-advertised address space ('holes').

 --- 05Apr13 ---
ASnumNetsNow NetsAggr  NetGain   % Gain   Description

Table 451468   259555   19191342.5%   All ASes

AS6389  3038   92 294697.0%   BELLSOUTH-NET-BLK -
   BellSouth.net Inc.
AS4766  2955  939 201668.2%   KIXS-AS-KR Korea Telecom
AS17974 2510  547 196378.2%   TELKOMNET-AS2-AP PT
   Telekomunikasi Indonesia
AS22773 2008  154 185492.3%   ASN-CXA-ALL-CCI-22773-RDC -
   Cox Communications Inc.
AS28573 2566  727 183971.7%   NET Serviços de Comunicação
   S.A.
AS18566 2068  473 159577.1%   COVAD - Covad Communications
   Co.
AS7303  1673  447 122673.3%   Telecom Argentina S.A.
AS4323  1610  401 120975.1%   TWTC - tw telecom holdings,
   inc.
AS10620 2356 1243 111347.2%   Telmex Colombia S.A.
AS4755  1732  633 109963.5%   TATACOMM-AS TATA
   Communications formerly VSNL
   is Leading ISP
AS2118  1116   83 103392.6%   RELCOM-AS OOO NPO Relcom
AS7552  1138  172  96684.9%   VIETEL-AS-AP Vietel
   Corporation
AS7029  2139 1221  91842.9%   WINDSTREAM - Windstream
   Communications Inc
AS18881  850   20  83097.6%   Global Village Telecom
AS18101 1001  172  82982.8%   RELIANCE-COMMUNICATIONS-IN
   Reliance Communications
   Ltd.DAKC MUMBAI
AS14754  952  146  80684.7%   Telgua
AS1785  1973 1200  77339.2%   AS-PAETEC-NET - PaeTec
   Communications, Inc.
AS4808  1122  362  76067.7%   CHINA169-BJ CNCGROUP IP
   network China169 Beijing
   Province Network
AS36998 1137  382  75566.4%   SDN-MOBITEL
AS13977  835  125  71085.0%   CTELCO - FAIRPOINT
   COMMUNICATIONS, INC.
AS855724   50  67493.1%   CANET-ASN-4 - Bell Aliant
   Regional Communications, Inc.
AS8151  1227  574  65353.2%   Uninet S.A. de C.V.
AS22561 1082  452  63058.2%   DIGITAL-TELEPORT - Digital
   Teleport Inc.
AS17676  733  108  62585.3%   GIGAINFRA Softbank BB Corp.
AS24560 1060  446  61457.9%   AIRTELBROADBAND-AS-AP Bharti
   Airtel Ltd., Telemedia
   Services
AS3549  1054  444  61057.9%   GBLX Global Crossing Ltd.
AS17908  793  198  59575.0%   TCISL Tata Communications
AS3356  1088  495  59354.5%   LEVEL3 Level 3 Communications
AS19262  990  403  58759.3%   VZGNI-TRANSIT - Verizon Online
   LLC
AS11830  725  147  57879.7%   Instituto Costarricense de
   Electricidad y Telecom.

Total  44255128563139971.0%   Top 30 total


Possible Bogus Routes


BGP Update Report

2013-04-05 Thread cidr-report
BGP Update Report
Interval: 28-Mar-13 -to- 04-Apr-13 (7 days)
Observation Point: BGP Peering with AS131072

TOP 20 Unstable Origin AS
Rank ASNUpds %  Upds/PfxAS-Name
 1 - AS982950576  2.7%  41.6 -- BSNL-NIB National Internet 
Backbone
 2 - AS840246715  2.5%  38.5 -- CORBINA-AS OJSC Vimpelcom
 3 - AS10091   28716  1.5%  80.7 -- SCV-AS-AP StarHub Cable Vision 
Ltd
 4 - AS14754   27759  1.5%  31.8 -- Telgua
 5 - AS17974   23145  1.2%  23.4 -- TELKOMNET-AS2-AP PT 
Telekomunikasi Indonesia
 6 - AS390922559  1.2%7519.7 -- QWEST-AS-3908 - Qwest 
Communications Company, LLC
 7 - AS28573   19947  1.1%   7.6 -- NET Serviços de Comunicação S.A.
 8 - AS45271   18144  1.0%  58.5 -- ICLNET-AS-AP 5th Floor, Windsor 
Building, Off: CST Road
 9 - AS755217599  0.9%  17.5 -- VIETEL-AS-AP Vietel Corporation
10 - AS845216646  0.9%  13.8 -- TE-AS TE-AS
11 - AS10620   15720  0.8%   7.6 -- Telmex Colombia S.A.
12 - AS27947   15712  0.8%  19.8 -- Telconet S.A
13 - AS270815405  0.8% 107.7 -- Universidad de Guanajuato
14 - AS21826   14902  0.8%  53.6 -- Corporación Telemic C.A.
15 - AS269714053  0.7%  72.1 -- ERX-ERNET-AS Education and 
Research Network
16 - AS671313660  0.7%  29.1 -- IAM-AS
17 - AS702913582  0.7%   7.4 -- WINDSTREAM - Windstream 
Communications Inc
18 - AS33776   13408  0.7%  72.9 -- STARCOMMS-ASN
19 - AS453812308  0.7%  23.4 -- ERX-CERNET-BKB China Education 
and Research Network Center
20 - AS55430   12008  0.6%  80.6 -- STARHUBINTERNET-AS-NGNBN 
Starhub Internet Pte Ltd


TOP 20 Unstable Origin AS (Updates per announced prefix)
Rank ASNUpds %  Upds/PfxAS-Name
 1 - AS6629 7685  0.4%7685.0 -- NOAA-AS - NOAA
 2 - AS390922559  1.2%7519.7 -- QWEST-AS-3908 - Qwest 
Communications Company, LLC
 3 - AS194064122  0.2%4122.0 -- TWRS-MA - Towerstream I, Inc.
 4 - AS373673717  0.2%3717.0 -- CALLKEY
 5 - AS6174 5722  0.3%2861.0 -- SPRINTLINK8 - Sprint
 6 - AS5074 4504  0.2%2252.0 -- ASN-ATTELS - ATT BMGS
 7 - AS146806505  0.3%2168.3 -- REALE-6 - Auction.com
 8 - AS138974196  0.2%2098.0 -- CDC1 - Internet Brands Inc.
 9 - AS4467 2047  0.1%2047.0 -- EASYLINK3 - ATT Services, Inc.
10 - AS172935379  0.3%1793.0 -- VTXC - VTX Communications
11 - AS9950 3351  0.2%1675.5 -- PUBNETPLUS2-AS-KR DACOM
12 - AS365292492  0.1%1246.0 -- AXXA-RACKCO - Rackco.com
13 - AS410233397  0.2%1132.3 -- ARREKS-AS Agencja Rozwoju 
Regionalnego ARREKS S.A.
14 - AS198862263  0.1%1131.5 -- BOFABROKERDEALERSVCS - Bank of 
America
15 - AS46105 783  0.0% 783.0 -- HMLP-ASN - HealthCor 
Management, L.P.
16 - AS104453742  0.2% 748.4 -- HTG - Huntleigh Telcom
17 - AS329555852  0.3% 731.5 -- MURCOM - MURCOM, LLC
18 - AS52358 673  0.0% 673.0 -- YV Ingeniería y Construcción, 
C.A.
19 - AS570133972  0.2% 662.0 -- EURASIA-STAR-AS Eurasia Star 
Ltd.
20 - AS22688 645  0.0% 645.0 -- DOLGENCORP - Dollar General 
Corporation


TOP 20 Unstable Prefixes
Rank Prefix Upds % Origin AS -- AS Name
 1 - 202.41.70.0/2410026  0.5%   AS2697  -- ERX-ERNET-AS Education and 
Research Network
 2 - 112.110.82.0/237688  0.4%   AS45271 -- ICLNET-AS-AP 5th Floor, Windsor 
Building, Off: CST Road
 3 - 112.110.84.0/227686  0.4%   AS45271 -- ICLNET-AS-AP 5th Floor, Windsor 
Building, Off: CST Road
 4 - 192.58.232.0/247685  0.4%   AS6629  -- NOAA-AS - NOAA
 5 - 151.118.18.0/247543  0.4%   AS3909  -- QWEST-AS-3908 - Qwest 
Communications Company, LLC
 6 - 151.118.255.0/24   7508  0.4%   AS3909  -- QWEST-AS-3908 - Qwest 
Communications Company, LLC
 7 - 151.118.254.0/24   7508  0.4%   AS3909  -- QWEST-AS-3908 - Qwest 
Communications Company, LLC
 8 - 12.139.133.0/245379  0.3%   AS14680 -- REALE-6 - Auction.com
 9 - 194.63.9.0/24  4217  0.2%   AS1273  -- CW Cable and Wireless Worldwide 
plc
10 - 216.183.32.0/194146  0.2%   AS17293 -- VTXC - VTX Communications
11 - 69.38.178.0/24 4122  0.2%   AS19406 -- TWRS-MA - Towerstream I, Inc.
12 - 41.75.40.0/21  3717  0.2%   AS37367 -- CALLKEY
13 - 58.184.229.0/243347  0.2%   AS9950  -- PUBNETPLUS2-AS-KR DACOM
14 - 206.105.75.0/242861  0.1%   AS6174  -- SPRINTLINK8 - Sprint
15 - 208.16.110.0/242861  0.1%   AS6174  -- SPRINTLINK8 - Sprint
16 - 115.170.128.0/17   2762  0.1%   AS4847  -- CNIX-AP China Networks 
Inter-Exchange
17 - 2.93.235.0/24  2636  0.1%   AS8402  -- CORBINA-AS OJSC Vimpelcom
18 - 12.79.224.0/19 2325  0.1%   AS5074  -- ASN-ATTELS - 

Re: public consultation on root zone KSK rollover

2013-04-05 Thread Randy Bush
 rant 

 The point of the wildly over-engineered root key signing ceremony is
 to build trust by publicly demonstrating at every step there is no
 opportunity for intentional or accidental badness to occur without
 being noticed.

at some point, long passed, the more pomp, the less safe i feel.  there
is protecting against technical/engineering threats and protecting
against layer 8 through 11.  through complexity, it compromises the
technical protection to go overboard on the lawyer defense.

from this bottom feeder's pov, icann, verisign, doc, ... are too often
the layer 8 through 11 threat than part of the engineering solution.

 In any event, if you haven't already I would encourage you to provide
 comments at the URL Joe referenced.

definitely.  after all, commenting on icann insanities has had such
serious beneficial effect for the good of the internet in the past.

randy



Re: public consultation on root zone KSK rollover

2013-04-05 Thread David Conrad
Randy,

On Apr 6, 2013, at 7:10 AM, Randy Bush ra...@psg.com wrote:
 at some point, long passed, the more pomp, the less safe i feel.  

Have you actually watched/participated in a root key signing ceremony?  Pomp is 
not the term I would use. 

 there
 is protecting against technical/engineering threats and protecting
 against layer 8 through 11.  through complexity, it compromises the
 technical protection to go overboard on the lawyer defense.

Technical protection like those that protected Diginotar's customers?  The 
elaborate root key signing ceremony is designed to ensure all aspects of root 
key management are open, transparent, and can be audited by anyone. While I'd 
agree that it is non-technical, the technical/engineering part is the easy bit. 
Protecting against insiders, laziness, and stupidity is _far_ harder.

 In any event, if you haven't already I would encourage you to provide
 comments at the URL Joe referenced.
 
 definitely.  after all, commenting on icann insanities has had such
 serious beneficial effect for the good of the internet in the past.

I can guarantee that providing comments are infinitely more likely to have an 
impact than stomping off in a huff :)

Regards,
-drc




30% packet loss between cox.net and hetzner.de, possibly at tinet.net

2013-04-05 Thread Constantine A. Murenin
Hello,

There has been at least a 25% packet loss between hetzner.de and cox.net 
in the last couple of hours.

Tried contacting hetzner.de, but they said it's not on their network.  
This has already happened a couple of days ago, too (strangely, on April 1), 
but then was good for the rest of the week -- no problems whatsoever.

I wouldn't really care about this, if not for ssh:  
it just doesn't work on such huge loss.

No other routes or networks seem affected.

Any advice?


# mtr --report{,-wide,-cycles=60} --order SRL BGAWV 
ip68-97-XX-XXX.ok.ok.cox.net ; date
HOST: xx  Snt   Rcv Loss%   Best Gmean  
 Avg  Wrst StDev
  1.|-- static.33.203.4.46.clients.your-server.de6060  0.0%0.5   
1.1   1.5   3.8   1.1
  2.|-- hos-tr3.juniper2.rz13.hetzner.de 6060  0.0%0.2   
0.4   3.4  46.2   9.8
  3.|-- hos-bb2.juniper4.rz2.hetzner.de  6060  0.0%2.7   
3.0   3.6  38.1   4.8
  4.|-- r1nue1.core.init7.net6060  0.0%2.8   
4.9   6.0  13.3   3.9
  5.|-- r1nue2.core.init7.net6060  0.0%2.9   
3.9   4.6  13.8   3.1
  6.|-- r1fra2.core.init7.net6060  0.0%5.7   
7.6   8.2  17.3   3.8
  7.|-- r1fra1.core.init7.net6060  0.0%5.9   
8.2   8.9  17.1   3.9
  8.|-- xe-4-2-2.fra23.ip4.tinet.net 6060  0.0%5.9   
6.4   7.1  38.2   5.2
  9.|-- xe-3-0-0.dal33.ip4.tinet.net 6039 35.0%  165.8 
169.7 170.1 226.3  13.1
 10.|-- cox-communications-gw.ip4.tinet.net  6047 21.7%  159.0 
162.3 162.6 207.9  10.4
 11.|-- mtc3dsrj01-ae1.0.rd.ok.cox.net   6046 23.3%  163.1 
166.1 166.3 196.3   8.0
 12.|-- 68.12.14.1   6049 18.3%  161.3 
161.6 161.6 161.9   0.1
 13.|-- COX-68-12-10-114-static.coxinet.net  6040 33.3%  162.5 
162.8 162.8 163.1   0.1
 14.|-- COX-68-12-10-114-static.coxinet.net  6044 26.7%  162.5 
162.8 162.8 163.2   0.1
 15.|-- ip68-97-XX-XXX.ok.ok.cox.net 6043 28.3%  170.9 
173.5 173.5 179.5   1.5
Fri Apr  5 16:21:56 PDT 2013

% mtr --report{,-wide,-cycles=60} --order SRL BGAWV 
static.88-198-xx-xx.clients.your-server.de ; date
HOST: xx   Snt   Rcv Loss%   Best Gmean 
  Avg  Wrst StDev
  1.|-- 192.168.  6060  0.0%1.0   
1.9   2.5  14.0   2.5
  2.|-- 10.0.x.x  6060  0.0%1.3   
2.3   2.6   7.6   1.6
  3.|-- 10.6.0.1  6060  0.0%8.9  
13.7  14.3  38.6   5.1
  4.|-- COX-68-12-10-113-static.coxinet.net   6060  0.0%9.6  
14.1  15.6  97.2  11.9
  5.|-- COX-68-12-10-2-static.coxinet.net 6060  0.0%   10.1  
14.9  15.4  31.2   4.3
  6.|-- 68.1.5.1616060  0.0%   55.8  
61.8  62.1  93.1   6.6
  7.|-- nyk-s2-rou-1001.US.eurorings.net  6060  0.0%   55.7  
63.6  64.8 162.4  16.7
  8.|-- nntr-s1-rou-1101.FR.eurorings.net 6060  0.0%  149.5 
168.7 169.7 213.1  19.3
  9.|-- kehl-s2-rou-1103.DE.eurorings.net 6047 21.7%  147.2 
151.6 151.6 161.6   3.3
 10.|-- ffm-s1-rou-1102.DE.eurorings.net  6060  0.0%  144.1 
148.9 149.1 174.2   6.4
 11.|-- nbg-s1-rou-1001.DE.eurorings.net  6060  0.0%  147.1 
156.2 157.3 290.9  22.4
 12.|-- kpn-gw.hetzner.de 6048 20.0%  173.8 
178.9 179.0 198.2   5.1
 13.|-- hos-bb2.juniper2.rz13.hetzner.de  6043 28.3%  173.4 
179.6 179.9 230.1  11.8
 14.|-- hos-tr4.ex3k11.rz13.hetzner.de6048 20.0%  176.9 
181.9 181.9 198.9   4.4
 15.|-- static.88-198-xx-xx.clients.your-server.de6037 38.3%  173.2 
177.0 177.0 186.6   3.4
Fri  5 Apr 2013 16:22:51 PDT



The huge packet loss even extends to the regular cox.net web-site, it seems:

# mtr --report{,-wide,-cycles=60} --order SRL BGAWV cox.net ; date
HOST: xx  Snt   Rcv Loss%   Best Gmean  
 Avg  Wrst StDev
  1.|-- static.33.203.4.46.clients.your-server.de6060  0.0%0.5   
1.2   1.7   5.6   1.4
  2.|-- hos-tr1.juniper1.rz13.hetzner.de 6060  0.0%0.2   
0.3   2.1  29.3   6.0
  3.|-- hos-bb2.juniper4.rz2.hetzner.de  6060  0.0%2.7   
3.5   5.8  62.5  10.1
  4.|-- r1nue1.core.init7.net6060  0.0%2.8   
4.2   5.2  13.5   3.8
  5.|-- r1nue2.core.init7.net6060  0.0%2.9   
4.7   6.0  28.7   5.0
  6.|-- r1fra2.core.init7.net6060  0.0%5.7   
7.4   8.1  15.9   3.6
  7.|-- r1fra1.core.init7.net6060  0.0%5.9   
7.6   8.1  16.8   3.2
  8.|-- xe-4-2-2.fra23.ip4.tinet.net 6060  0.0%5.9   
6.4   7.1  36.2   5.6
  

Re: 30% packet loss between cox.net and hetzner.de, possibly at tinet.net

2013-04-05 Thread Denys Fedoryshchenko

On 2013-04-06 04:32, Constantine A. Murenin wrote:

Hello,

There has been at least a 25% packet loss between hetzner.de and 
cox.net

in the last couple of hours.

Tried contacting hetzner.de, but they said it's not on their network.
This has already happened a couple of days ago, too (strangely, on 
April 1),

but then was good for the rest of the week -- no problems whatsoever.

I wouldn't really care about this, if not for ssh:
it just doesn't work on such huge loss.

No other routes or networks seem affected.

Any advice?


Doesnt looks like tinet for me.
I have colo in Europe and it is connected over tinet and mtr to 
static.33.203.4.46.clients.your-server.de is clean
visp-probe ~ # mtr --report{,-wide,-cycles=60} --order SRL BGAWV 
static.33.203.4.46.clients.your-server.de
HOST: visp-probe  Snt   Rcv Loss%   
Best Gmean   Avg  Wrst StDev
  1.|-- X.X.X.X  6060  0.0%
0.1   0.9   6.1  50.7  11.7
  2.|-- r1fra1.core.init7.net6060  0.0%
1.0   2.6   3.9  12.8   3.6
  3.|-- r1fra3.core.init7.net6060  0.0%
1.0   2.2   3.2  12.0   3.2
  4.|-- r1nue2.core.init7.net6060  0.0%
3.7   5.3   6.0  15.5   3.7
  5.|-- r1nue1.core.init7.net6060  0.0%
3.9   5.8   6.5  15.3   3.6
  6.|-- gw-hetzner.init7.net 6060  0.0%
3.9   5.1   8.1  89.6  15.2
  7.|-- hos-bb2.juniper2.rz13.hetzner.de 6060  0.0%
6.1   7.7  10.4  74.9  14.8
  8.|-- static.33.203.4.46.clients.your-server.de6060  0.0%
6.5   7.7   7.8  13.1   1.4




---
Denys Fedoryshchenko, Network Engineer, Virtual ISP S.A.L.



RE: 80 km BiDi XFPs

2013-04-05 Thread Frank Bulk
Thank you -- this is the first hit I've received.  Thanks for all the others
who offered help, but all the other pointers led to 40 km or 60 km products,
1G SFPs, or stand-alone passive muxes.

Frank

-Original Message-
From: Chuck Anderson [mailto:c...@wpi.edu] 
Sent: Friday, April 05, 2013 12:15 PM
To: nanog@nanog.org
Subject: Re: 80 km BiDi XFPs

On Fri, Apr 05, 2013 at 10:58:49AM -0600, Jerimiah Cole wrote:
 On 04/05/2013 10:39 AM, Randy Carpenter wrote:
  
  I'm going to guess that this is not going to meet the OP's request
  for an XFP, which would be 10GbE (and not an SFP).
 
 Probably a safe guess.  Mea culpa.

Check out Integra Networks.  Their catalog lists a 10G XFP Bi-Dir
80km:

http://integranetworks.net/wp-content/uploads/2012/06/Integra-Networks-Catal
og-20122.pdf

XFP-CXX-80-D (CWDM)
XFP-DXX-80-D (DWDM)






RE: Speedtest Results speedtest.net vs Mikrotik bandwidth test

2013-04-05 Thread Frank Bulk
Here's a 39-page report that might differ with your perspective: 
http://mitas.csail.mit.edu/papers/Bauer_Clark_Lehr_Broadband_Speed_Measurements.pdf

And another report: 
http://www.netforecast.com/Reports/NFR5103_comScore_ISP_Speed_Test_Accuracy.pdf

Frank

-Original Message-
From: Mike [mailto:mike-na...@tiedyenetworks.com] 
Sent: Wednesday, April 03, 2013 4:08 PM
To: nanog@nanog.org
Subject: Re: Speedtest Results speedtest.net vs Mikrotik bandwidth test

snip

These speedtests are pure unscientific bs and I'd love to see them 
called out on the carpet for it.

Mike-






Re: 30% packet loss between cox.net and hetzner.de, possibly at tinet.net

2013-04-05 Thread Constantine A. Murenin
On 2013-W14-6 05:04 +0300, Denys Fedoryshchenko wrote:
 On 2013-04-06 04:32, Constantine A. Murenin wrote:
 Hello,
 
 There has been at least a 25% packet loss between hetzner.de and
 cox.net
 in the last couple of hours.
 
 Tried contacting hetzner.de, but they said it's not on their network.
 This has already happened a couple of days ago, too (strangely, on
 April 1),
 but then was good for the rest of the week -- no problems whatsoever.
 
 I wouldn't really care about this, if not for ssh:
 it just doesn't work on such huge loss.
 
 No other routes or networks seem affected.
 
 Any advice?
 
 Doesnt looks like tinet for me.

Might have been eurorings.net, as your Amazon EC2 to Hetzner 
traceroute seemed to suggest?


This loss was apparent even with their own main websites:


cox.net from a hetzner.de node:

# mtr --report{,-wide,-cycles=60} --order SRL BGAWV cox.net ; date
...
  3.|-- hos-bb2.juniper4.rz2.hetzner.de  6060  0.0%2.7   
3.5   5.8  62.5  10.1
  4.|-- r1nue1.core.init7.net6060  0.0%2.8   
4.2   5.2  13.5   3.8
  5.|-- r1nue2.core.init7.net6060  0.0%2.9   
4.7   6.0  28.7   5.0
  6.|-- r1fra2.core.init7.net6060  0.0%5.7   
7.4   8.1  15.9   3.6
  7.|-- r1fra1.core.init7.net6060  0.0%5.9   
7.6   8.1  16.8   3.2
  8.|-- xe-4-2-2.fra23.ip4.tinet.net 6060  0.0%5.9   
6.4   7.1  36.2   5.6
  9.|-- xe-9-0-0.was14.ip4.tinet.net 6043 28.3%  142.3 
145.0 145.2 190.0   9.6
 10.|-- cox-communications-gw.ip4.tinet.net  6048 20.0%  124.8 
129.6 130.2 176.6  13.2
 11.|-- dukedsrj02-ge210.0.rd.at.cox.net 6045 25.0%  137.7 
141.2 141.6 194.7  11.6
 12.|-- 68.1.15.238  6049 18.3%  138.1 
138.7 138.7 140.0   0.4
 13.|-- 68.99.123.4  6036 40.0%  140.4 
140.9 140.9 141.6   0.3
 14.|-- ww2.cox.com  6044 26.7%  140.6 
140.9 140.9 141.8   0.3
Fri Apr  5 18:19:21 PDT 2013


hetzner.de from a cox.net node:

...
  5.|-- COX-68-12-8-132-static.coxinet.net 6060  0.0%   11.6  15.3  
15.8  35.1   4.9
  6.|-- 68.1.5.161 6060  0.0%   55.7  59.8  
60.0  95.8   5.3
  7.|-- nyk-s2-rou-1001.US.eurorings.net   6060  0.0%   55.8  63.8  
64.9 139.4  14.7
  8.|-- nntr-s1-rou-1101.FR.eurorings.net  6060  0.0%  149.8 154.1 
154.1 171.9   4.3
  9.|-- kehl-s2-rou-1103.DE.eurorings.net  6060  0.0%  147.2 152.8 
153.1 206.1   8.7
 10.|-- ffm-s1-rou-1102.DE.eurorings.net   6060  0.0%  143.3 147.7 
147.7 177.2   5.0
 11.|-- nbg-s1-rou-1001.DE.eurorings.net   6060  0.0%  147.3 153.8 
154.0 211.1  10.0
 12.|-- kpn-gw.hetzner.de  6044 26.7%  173.3 177.6 
177.6 184.5   2.7
 13.|-- hos-bb2.juniper3.rz2.hetzner.de6042 30.0%  170.3 175.1 
175.2 203.1   5.6
 14.|-- hos-tr4.ms-ex3k2.rz1.hetzner.de6044 26.7%  171.9 175.9 
175.9 185.4   2.8
 15.|-- www.hetzner.de 6042 30.0%  170.4 175.1 
175.2 187.0   4.1
Fri  5 Apr 2013 17:38:11 PDT

...
  5.|-- COX-68-12-8-132-static.coxinet.net 6060  0.0%   11.3  14.2  
14.5  33.6   3.3
  6.|-- 68.1.5.161 6060  0.0%   56.2  61.1  
61.8 135.6  11.6
  7.|-- nyk-s2-rou-1001.US.eurorings.net   6060  0.0%   56.0  60.6  
61.0 121.1   8.7
  8.|-- nntr-s1-rou-1101.FR.eurorings.net  6058  3.3%  150.1 153.5 
153.5 166.3   2.8
  9.|-- kehl-s2-rou-1103.DE.eurorings.net  6029 51.7%  147.5 152.0 
152.1 170.8   5.3
 10.|-- ffm-s1-rou-1102.DE.eurorings.net   6028 53.3%  143.7 148.4 
148.6 186.7   8.0
 11.|-- nbg-s1-rou-1001.DE.eurorings.net   6060  0.0%  147.2 151.8 
151.9 178.2   4.7
 12.|-- kpn-gw.hetzner.de  6045 25.0%  172.7 177.0 
177.0 197.4   4.0
 13.|-- hos-bb2.juniper3.rz2.hetzner.de6041 31.7%  170.4 176.5 
176.6 190.9   6.2
 14.|-- hos-tr4.ms-ex3k2.rz1.hetzner.de6050 16.7%  171.8 175.6 
175.6 183.1   2.8
 15.|-- www.hetzner.de 6047 21.7%  170.5 174.2 
174.3 188.8   3.2
Fri  5 Apr 2013 19:22:36 PDT



But it has since subsided:

...
  3.|-- hos-bb2.juniper4.rz2.hetzner.de  6060  0.0%2.7   
2.9   3.4  41.4   5.0
  4.|-- r1nue1.core.init7.net6060  0.0%2.8   
5.2   6.3  12.4   3.8
  5.|-- r1nue2.core.init7.net6060  0.0%2.9   
4.0   4.7  14.0   3.2
  6.|-- r1fra2.core.init7.net6060  0.0%5.7   
7.7   8.4  17.0   3.9
  7.|-- r1fra1.core.init7.net6060  0.0%5.9   
8.7   9.3  17.1   3.7
  8.|-- xe-4-2-2.fra23.ip4.tinet.net 6060  0.0%5.9   
6.1   6.2  15.0   1.3
  9.|-- xe-9-0-0.was14.ip4.tinet.net 6060  0.0%   

ICMP Redirect on Resolvers

2013-04-05 Thread Shahab Vahabzadeh
Hello everybody,
I have two DNS Server (resolver) running on FreeBSD 9.0, I always see in
console messages like this:

icmp redirect from 192.168.140.36: 192.168.179.80 = 192.168.140.254

and lots of messages like this, mostly ip addresses not belong to me, and
some times these resolvers stop working.
My question is what are these messages? why they only shown in console of
these servers not others? And are they cause the problems like stopping
working for server/services?
Thanks

-- 
Regards,
Shahab Vahabzadeh, Network Engineer and System Administrator

Cell Phone: +1 (415) 871 0742
PGP Key Fingerprint = 8E34 B335 D702 0CA7 5A81  C2EE 76A2 46C2 5367 BF90


Re: ICMP Redirect on Resolvers

2013-04-05 Thread Tony Finch
On 6 Apr 2013, at 06:36, Shahab Vahabzadeh sh.vahabza...@gmail.com wrote:

 I have two DNS Server (resolver) running on FreeBSD 9.0, I always see in
 console messages like this:
 
 icmp redirect from 192.168.140.36: 192.168.179.80 = 192.168.140.254

You probably configured the wrong default router address or netmask.

Tony.
--
f.anthony.n.finch  d...@dotat.at  http://dotat.at/