Re: abuse reporting tools

2014-11-20 Thread Paul Bennett
Inspired by this thread (and other recent similar ones about how hard
it is to report abuse in the right format to the right people), I've
decided I'm going to start work on the Perl module presumed by this
gist ...

https://gist.github.com/PWBENNETT/18970413677c5df79c6a

Reporting network abuse should be *EASY*. Say it with me ... *EASY*.

No promises, at this stage, but I thought some of you would like to
know that this project is at least in the pre-planning stages.


--
Paul W Bennett


Re: level3 issue in chicago

2014-11-20 Thread cool hand luke

fyi:

On 11/20/2014 02:42 AM, cool hand luke wrote:

On 11/19/2014 07:29 PM, David Hubbard wrote:

Appears to have been resolved after seven hours.  My ticket just says:

We isolated the routing issue and resolved it.
The issue was due to a misconfiguration on one our core routers.

Now that the issue is corrected, interestingly enough, my trace goes
from Tampa to Chicago instead of Dallas.


our issue was resolved around the same time but is apparently now
occurring again, since 0638 utc -- routing issue affecting (for us)
traffic on level3 between chicago, illinois, and cincinnati, ohio. i
imagine it's affecting other locations as well.


routing issue experienced from 06:37 - 11:02 utc.

notes from level 3:

11/20/2014 11:30:19 GMT - After investigating the issue I found that 
this circuit was affected by an outage on our network. A non-service 
affecting maintenance had unintended results causing routing problems in 
the Chicago area. All traffic through the Chicago area was affected by 
this issue. If you have any additional destinations that are still 
seeing issues please contact us as soon as possible as the issue may not 
be completely resolved yet.


/chl


Need Godaddy Contact

2014-11-20 Thread Larry Krone
I have a question that Godaddy support will not answer.

 

My son moved a word press site to Godaddy from another host.

 

Apparently, unbeknowest to him, the original wordpress site was also the
email host.

 

The mail was moved from the old server to the new server but the email was
never properly set up via the GoDaddy Cpanel

 

Question for a Godaddy Guru.  

 

if we set up the email through the cpanel, will it erase any mail currently
in the accounts on the linux wordpress machine, or even acknowledge that the
exist email is there?

 

Any help would be GREATLY appreciated and Thanks..

 

 

Larry

 



Re: Need Godaddy Contact

2014-11-20 Thread Josh Luthman
It won't do anything to another server.  You won't get copies of messages
transferred with DNS changes.

Josh Luthman
Office: 937-552-2340
Direct: 937-552-2343
1100 Wayne St
Suite 1337
Troy, OH 45373
On Nov 20, 2014 9:10 AM, Larry Krone la...@elucidations.net wrote:

 I have a question that Godaddy support will not answer.



 My son moved a word press site to Godaddy from another host.



 Apparently, unbeknowest to him, the original wordpress site was also the
 email host.



 The mail was moved from the old server to the new server but the email was
 never properly set up via the GoDaddy Cpanel



 Question for a Godaddy Guru.



 if we set up the email through the cpanel, will it erase any mail currently
 in the accounts on the linux wordpress machine, or even acknowledge that
 the
 exist email is there?



 Any help would be GREATLY appreciated and Thanks..





 Larry






Re: Need Godaddy Contact

2014-11-20 Thread Miles Fidelman

Larry Krone wrote:

I have a question that Godaddy support will not answer.


That actually seems odd - I've usually found them helpful.  But that's 
neither here nor there.  See below...


  


My son moved a word press site to Godaddy from another host.

  


Apparently, unbeknowest to him, the original wordpress site was also the
email host.

  


The mail was moved from the old server to the new server but the email was
never properly set up via the GoDaddy Cpanel

  


Question for a Godaddy Guru.

  


if we set up the email through the cpanel, will it erase any mail currently
in the accounts on the linux wordpress machine, or even acknowledge that the
exist email is there?

  


As previously noted, what you do on the GoDaddy site will have no effect 
on the other server (assuming it's not also on GoDaddy, of course).  
What will change things is propagation of DNS record changes.  For a 
period, mail will flow to both the old and new server, until the new DNS 
records get everywhere.


What I'd recommend is something like this:
- check the expiration period for the old DNS record
- monitor both sites for mail for at least the timeout on the old 
record; keep monitoring the old site until you're sure no more mail is 
getting there
- maybe, put a .forward file on the old site to catch any mail that 
leads through (but only after you're sure the old site has the updated 
DNS record! - you can't use a physical IP address for forwarding to 
GoDaddy, because everything there is via virtual hosts)
- transfer all mail from the old site to the new site (if you use IMAP, 
that's pretty easy, or tar up your mail directory)

- then decommission the old site

Miles Fidelman



--
In theory, there is no difference between theory and practice.
In practice, there is.    Yogi Berra



DDOS, IDS, RTBH, and Rate limiting

2014-11-20 Thread Pavel Odintsov
Hello, folks!

I'm author of fastnetmon, thank you for some PR for my toolkit :)

I use this tool for similar type of attacks and we do analyze all
traffic from uplinks ports using port mirroring. You can look at this
network diagram:
https://raw.githubusercontent.com/FastVPSEestiOu/fastnetmon/master/network_map.png

I tried to use netflow many years ago but it's not accurate enough and
not so fast enough and produce big overhead on middle class network
routers. It's because I wrote this tool and do every packet analyze.
It can detect attack in 2 seconds max and call BGP blackhole as quick
as thought.

It can detect three types of attacks:
1) Speed attack for certain IP (we ban every IP which exceed 1 Gbps)
2) Packet per second attack for certain IP (we ban every IP which
exceed 100 000 ppps)
3) And flow flood (very useful mode in networks with big bandwidth/pps
per client)

FastNetMon can handle 2-3 million of packets per second and ~20Gbps on
standard i7 2600 Linux box with Intel 82599 NIC.

If you need any help or suggestions you can email me directly or ask via GitHub.

Thank you!

-- 
Sincerely yours, Pavel Odintsov


Re: Level3 rwhois broken

2014-11-20 Thread Jeff Walter
It's nice to see someone is using RWHOIS. Back when I wrote the RWHOIS
daemon for HE I spoke with Mark Kosters (one of the authors of RFC 2167). I
wish I still had the emails because at the time he was shocked anyone would
create software for something that no one really uses. I seem to recall him
calling it a waste of time ;-)

That said... I'm seeing Level 3's RWHOIS down as well. And to be honest,
they're probably not monitoring it.

On Tue, Nov 18, 2014 at 11:53 PM, Suresh Ramasubramanian 
ops.li...@gmail.com wrote:

 Anybody?   Makes it a pain to perform surgical spam blocking when this
 happens :)

 suresh@samwise 01:52:24 ~ $ telnet rwhois.level3.net 4321
 Trying 209.244.1.179...

 ^C


 --
 Suresh Ramasubramanian (ops.li...@gmail.com)



Re: DDOS, IDS, RTBH, and Rate limiting

2014-11-20 Thread Roland Dobbins


On 21 Nov 2014, at 4:36, Pavel Odintsov wrote:


I tried to use netflow many years ago but it's not accurate enough and
not so fast enough and produce big overhead on middle class network
routers.


These statements are not supported by the facts.  NetFlow (and other 
varieties of flow telemetry) has been used for many years for traffic 
engineering-related analysis, capacity planning, and security purposes.  
I've never seen the CPU utilization on even a modest mid-range router 
rise above single-digits, except once due to a bug (which was fixed 
quickly).


Flow telemetry scales and provides invaluable edge-to-edge traceback 
information.  NetFlow telemetry is accurate enough to be used for all 
the purposes noted above by network operators across the world, from the 
smallest to the largest networks in the world.


There are several excellent open-source NetFlow analysis tools which 
allow folks to benefit from NetFlow analysis without spending a lot of 
money. Some of these projects have been maintained and enhanced for many 
years; their authors would not do that if NetFlow analytics weren't 
sufficient to needs.


Packet-based analysis is certainly useful, but does not scale and does 
not provide traceback information.


FastNetMon can handle 2-3 million of packets per second and ~20Gbps on 
standard i7 2600 Linux box with Intel 82599 NIC.


See the comments above with regards to scale.  This is inadequate for a 
network of any size, it does not provide traceback information, and it 
does not lend itself to broad deployment across a network of any size.


I'm sure FastNetMon is a fine tool, and it's very good of you to spend 
the time and effort to develop it and to make it available.  However, 
making demonstrably-inaccurate statements about other technologies which 
are in wide use by network operators and which have a proven track 
record in the field is probably not the best way to encourage folks to 
try FastNetMon.


---
Roland Dobbins rdobb...@arbor.net


Re: Level3 rwhois broken

2014-11-20 Thread Bryan Tong
I put together a protocol framework in Node.js

https://www.npmjs.org/package/rwhois

Its still useful for some companies.

On Thu, Nov 20, 2014 at 2:49 PM, Jeff Walter jwal...@weebly.com wrote:

 It's nice to see someone is using RWHOIS. Back when I wrote the RWHOIS
 daemon for HE I spoke with Mark Kosters (one of the authors of RFC 2167). I
 wish I still had the emails because at the time he was shocked anyone would
 create software for something that no one really uses. I seem to recall him
 calling it a waste of time ;-)

 That said... I'm seeing Level 3's RWHOIS down as well. And to be honest,
 they're probably not monitoring it.

 On Tue, Nov 18, 2014 at 11:53 PM, Suresh Ramasubramanian 
 ops.li...@gmail.com wrote:

  Anybody?   Makes it a pain to perform surgical spam blocking when this
  happens :)
 
  suresh@samwise 01:52:24 ~ $ telnet rwhois.level3.net 4321
  Trying 209.244.1.179...
 
  ^C
 
 
  --
  Suresh Ramasubramanian (ops.li...@gmail.com)
 




-- 
eSited LLC
(701) 390-9638


USA Power Grid compromised?

2014-11-20 Thread JoeSox
Am I the only Network Admin wondering how this can happen and why its still
an issue if it was discovered in 2011?
Now I never worked in the Energy field so I am in the dark (pun intended I
guess) on how serious the Public utilities address these issues.
They should have redundant systems so they can clean (reimage, etc)
whatever is there and be done with it??

ref:
NSA chief admits China could cripple U.S. power grid, financial networks
http://www.zdnet.com/nsa-chief-admits-china-could-cripple-u-s-power-grid-financial-networks-736025/

http://abcnews.go.com/US/trojan-horse-bug-lurking-vital-us-computers-2011/story?id=26737476

--
Later, Joe


Anyone heard from Jared lately?

2014-11-20 Thread Jay Ashworth
He generally provides same-day service on email, but...

Hope all is well.

Cheers,
-- jra
Moderator @ outages
-- 
Sent from my Android phone with K-9 Mail. Please excuse my brevity.


Re: Anyone heard from Jared lately?

2014-11-20 Thread Job Snijders
On Thu, Nov 20, 2014 at 06:07:09PM -0500, Jay Ashworth wrote:
 He generally provides same-day service on email, but...
 
 Hope all is well.

Don't worry, he is alive and well. puck.nether.net is having some disk
issues hene a backlog on email.

- Job


Re: DDOS, IDS, RTBH, and Rate limiting

2014-11-20 Thread Denys Fedoryshchenko

On 2014-11-20 23:59, Roland Dobbins wrote:

On 21 Nov 2014, at 4:36, Pavel Odintsov wrote:


I tried to use netflow many years ago but it's not accurate enough and
not so fast enough and produce big overhead on middle class network
routers.


These statements are not supported by the facts.  NetFlow (and other
varieties of flow telemetry) has been used for many years for traffic
engineering-related analysis, capacity planning, and security
purposes.  I've never seen the CPU utilization on even a modest
mid-range router rise above single-digits, except once due to a bug
(which was fixed quickly).

Flow telemetry scales and provides invaluable edge-to-edge traceback
information.  NetFlow telemetry is accurate enough to be used for all
the purposes noted above by network operators across the world, from
the smallest to the largest networks in the world.

There are several excellent open-source NetFlow analysis tools which
allow folks to benefit from NetFlow analysis without spending a lot of
money. Some of these projects have been maintained and enhanced for
many years; their authors would not do that if NetFlow analytics
weren't sufficient to needs.

Packet-based analysis is certainly useful, but does not scale and does
not provide traceback information.

FastNetMon can handle 2-3 million of packets per second and ~20Gbps on 
standard i7 2600 Linux box with Intel 82599 NIC.


See the comments above with regards to scale.  This is inadequate for
a network of any size, it does not provide traceback information, and
it does not lend itself to broad deployment across a network of any
size.

I'm sure FastNetMon is a fine tool, and it's very good of you to spend
the time and effort to develop it and to make it available.  However,
making demonstrably-inaccurate statements about other technologies
which are in wide use by network operators and which have a proven
track record in the field is probably not the best way to encourage
folks to try FastNetMon.


Netflow is stateful stuff, and just to run it on wirespeed, on hardware, 
you need to utilise significant part of TCAM,

i am not talking that on some hardware it is just impossible to run it.
So everything about netflow are built on assumption that hosting or ISP 
can run it. And based on some observations, majority of small/middle 
hosting providers are using minimal,just BGP capable L3 switch as core, 
and cheapest but reliable L2/L3 on aggregation, and both are capable in 
best case to run sampled sFlow.

And last thing, from one of public papers, netflow delaying factors:
1. Flow record expiration
2. Exporting process
• Typical delay: 15-60 sec.
So for a small hosting(up to 10G), i believe, FastNetMon is best 
solution. Faster, and no significant investments to equipment. Bigger 
hosting providers might reuse their existing servers, segment the 
network, and implement inexpensive monitoring on aggregation switches 
without any additional cost again.
Ah, and there is one more huge problem with netflow vs FastNetMon - 
netflow just by design cannot be adapted to run pattern matching, while 
it is trivial to patch FastNetMon for that, turning it to mini-IDS for 
free.


---
Best regards,
Denys


RE: Level3 rwhois broken

2014-11-20 Thread Siegel, David

We decommissioned our rwhois server, but apparently we didn't get DNS cleaned 
up (which we'll do in the near future).

The closest thing we have to that is our whois server rr.level3.net, or if that 
doesn't quite meet your needs, you can contact our security department at 
ab...@level3.net.

Dave



-Original Message-
From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of Jeff Walter
Sent: Thursday, November 20, 2014 2:50 PM
To: Suresh Ramasubramanian
Cc: nanog@nanog.org
Subject: Re: Level3 rwhois broken

It's nice to see someone is using RWHOIS. Back when I wrote the RWHOIS daemon 
for HE I spoke with Mark Kosters (one of the authors of RFC 2167). I wish I 
still had the emails because at the time he was shocked anyone would create 
software for something that no one really uses. I seem to recall him calling it 
a waste of time ;-)

That said... I'm seeing Level 3's RWHOIS down as well. And to be honest, 
they're probably not monitoring it.

On Tue, Nov 18, 2014 at 11:53 PM, Suresh Ramasubramanian  ops.li...@gmail.com 
wrote:

 Anybody?   Makes it a pain to perform surgical spam blocking when this
 happens :)

 suresh@samwise 01:52:24 ~ $ telnet rwhois.level3.net 4321 Trying 
 209.244.1.179...

 ^C


 --
 Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Level3 rwhois broken

2014-11-20 Thread Suresh Ramasubramanian
Works for me, thanks.

I forgot exactly which IPs this was about right now though :)
On Fri, 21 Nov 2014 at 05:12 Siegel, David david.sie...@level3.com wrote:


 We decommissioned our rwhois server, but apparently we didn't get DNS
 cleaned up (which we'll do in the near future).

 The closest thing we have to that is our whois server rr.level3.net, or
 if that doesn't quite meet your needs, you can contact our security
 department at ab...@level3.net.

 Dave



 -Original Message-
 From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of Jeff Walter
 Sent: Thursday, November 20, 2014 2:50 PM
 To: Suresh Ramasubramanian
 Cc: nanog@nanog.org
 Subject: Re: Level3 rwhois broken

 It's nice to see someone is using RWHOIS. Back when I wrote the RWHOIS
 daemon for HE I spoke with Mark Kosters (one of the authors of RFC 2167). I
 wish I still had the emails because at the time he was shocked anyone would
 create software for something that no one really uses. I seem to recall him
 calling it a waste of time ;-)

 That said... I'm seeing Level 3's RWHOIS down as well. And to be honest,
 they're probably not monitoring it.

 On Tue, Nov 18, 2014 at 11:53 PM, Suresh Ramasubramanian 
 ops.li...@gmail.com wrote:

  Anybody?   Makes it a pain to perform surgical spam blocking when this
  happens :)
 
  suresh@samwise 01:52:24 ~ $ telnet rwhois.level3.net 4321 Trying
  209.244.1.179...
 
  ^C
 
 
  --
  Suresh Ramasubramanian (ops.li...@gmail.com)
 



Re: DDOS, IDS, RTBH, and Rate limiting

2014-11-20 Thread Roland Dobbins


On 21 Nov 2014, at 6:22, Denys Fedoryshchenko wrote:


Netflow is stateful stuff,


This is factually incorrect; NetFlow flows are unidirectional in nature, 
and in any event have no effect on processing of data-plane traffic.


and just to run it on wirespeed, on hardware, you need to utilise 
significant part of TCAM,


Again, this is factually incorrect.

i am not talking that on some hardware it is just impossible to run 
it.


This is also factually incorrect.  Some platforms/linecards do not in 
fact support NetFlow (or other varieties of flow telemetry) due to 
hardware limitations.



And last thing, from one of public papers, netflow delaying factors:
1. Flow record expiration


This is tunable.


• Typical delay: 15-60 sec.


This is an entirely subjective assessment, and does not reflect 
operational realities.  These are typically *maximum values* - and they 
are well within operationally-useful timeframes.  Also, the effect of 
NetFlow cache size and resultant FIFOing of flow records is not taken 
into account, nor is the effect on flow termination and flow-record 
export of TCP FIN or RST flags denoting TCP traffic taken into account.


So for a small hosting(up to 10G), i believe, FastNetMon is best 
solution.


This is a gross over-generalization unsupported by facts.  Many years of 
operational experience with NetFlow and other forms of flow telemetry by 
large numbers of network operators of all sizes and varieties contract 
this over-generalization.


It is generally unwise to make sweeping statements regarding operational 
impact which are not borne out by significant operational experience in 
production networks.



Faster, and no significant investments to equipment.


This statement indicates a lack of understanding of opex costs, 
irrespective of capex costs.


Bigger hosting providers might reuse their existing servers, segment 
the network, and implement inexpensive monitoring on aggregation 
switches without any additional cost again.


This statement indicates a lack of operational experience in networks of 
even minimal scale.


Ah, and there is one more huge problem with netflow vs FastNetMon - 
netflow just by design cannot be adapted to run pattern matching, 
while it is trivial to patch FastNetMon for that, turning it to 
mini-IDS for free.


This statement betrays a lack of understanding of NetFlow-based (and 
other flow telemetry-based) detection and classification, as well as the 
undesirability and negative operational impact of stateful IDS/'IPS' 
deployments in production networks.


You should also note that FastNetMon is far from unique; there are 
multiple other open-source tools which provide the same type of 
functionality, and none of them have replaced flow telemetry, either.


Tools such as FastNetMon supplement flow telemetry, in situations in 
which such tools can be deployed.  They do not begin to replace flow 
telemetry, and they are not inherently superior to flow telemetry.


Again, I'm sure FastNetMon is a useful tool in many circumstances.  But 
it would be a much better idea to define FastNetMon positively in terms 
of its own inherent value, rather than attempting to define it based 
upon factually incorrect negative 'comparisons' to other 
well-established, widely-used technologies which have demonstrable track 
records within the global operational community.


---
Roland Dobbins rdobb...@arbor.net


Re: DDOS, IDS, RTBH, and Rate limiting

2014-11-20 Thread Roland Dobbins


On 21 Nov 2014, at 9:19, Robert Duffy wrote:

What open-source NetFlow analysis tools would you recommend for 
quickly

detecting a DDoS attack?


I generally recommend that folks get started with something like 
nfdump/nfsen or ntop.  There are other, more sophisticated tools out 
there, but these allow one to get up and running quickly, and to gain 
valuable operational experience with which to evaluate more 
sophisticated tools, if they're needed.


---
Roland Dobbins rdobb...@arbor.net


Re: DDOS, IDS, RTBH, and Rate limiting

2014-11-20 Thread Tim Jackson
I highly recommend pmacct and it's in-memory tables. Lightweight, easy to
query and super fast.

You can also easily run multiple aggregates of traffic to find what you are
interested in, tag common interface types to easily filter traffic..

Or you can use pmacct to insert this into whatever database you want, AMQP
or MongoDB..

My current favorite is using an IMT table for DoS detection and another for
aggregates for interesting traffic types and querying this every X minutes
and inserting it into ElasticSearch. Kibana makes the most powerful netflow
dashboard ever.

--
Tim
On Nov 20, 2014 6:39 PM, Roland Dobbins rdobb...@arbor.net wrote:


 On 21 Nov 2014, at 9:19, Robert Duffy wrote:

  What open-source NetFlow analysis tools would you recommend for quickly
 detecting a DDoS attack?


 I generally recommend that folks get started with something like
 nfdump/nfsen or ntop.  There are other, more sophisticated tools out there,
 but these allow one to get up and running quickly, and to gain valuable
 operational experience with which to evaluate more sophisticated tools, if
 they're needed.

 ---
 Roland Dobbins rdobb...@arbor.net



Re: Clueful Jive Communications Contact?

2014-11-20 Thread chris
Sounds about on par with my experience so far.

We have a client who uses jive and we manage their network and when this
client opens tickets with jive, they get copy+pasted the exact same email
every time telling the client to make sure sip alg is disabled, check
firewall, etc. We have repeatedly told them that theres no filtering of
outbound traffic and we've stated many times that all their recommendations
are already in affect.

We also ran into a similar adtran situation to yours, when the customer
contacted Jive to open the first support ticket, Jive automatically started
CC-ing the IT company who is a Jive reseller and doesn't have any staff
familiar with cisco ios and insisted that they put in a adtran. The
reseller came out and dismantled the network and

I advised Jive we are applying QoS to standard VOIP ports in our base
config but I told them if there is anything outside the normal sip and rtp
ports to give it me to me to be added and they still haven't.

At one point our client got real upset and Jive started monitoring the
WAN link which is dedicated for their voice traffic only and then started
telling the customer to call the ISP. The irony here is that I'm almost
 postivie that their perceived loss is just that when the link is fully
utilized we obviously don't prioritize ICMP and also I have a hunch that
they are using more ports than the typical ones in which case that traffic
will suffer also because they will not tell me what traffic to prioritize.
This support rep now refuses to proceed until the customer calls the ISP so
we switched their voice traffic to another WAN link completely just to
demonstrate at which point the support rep said they saw loss still at
which point I explained that if we had the info necessary to QoS everything
properly their traffic should be unaffected even when there is congestion.

Which is more likely at fault:
   A) Having the exact same set of problems with 2 different diverse ISP's
   B) Their monitoring traffic being drop as expected, when link is
congested and router is applying QoS exactly as it should and dropping the
non prioritized traffic. Of course when some traffic is prioritized that
automatically means non prioritized traffic is penalized. This is exactly
how we want it.

Needless to say, the client is frustrated because support is stuck at call
isp and insist they see voice loss.

Hopefully your experience is not quite as bad but I have to say that of all
the different voice service providers we've worked with we've never spent
as much time

The contact who reached out to me was Michael Martinez (
mmarti...@getjive.com), he is a member of this list and appears to be a
network engineer managing their core network.

Hope this helps or if you are still evaluating Jive maybe this experience
will help give you an idea of what to expect

chris

On Thu, Nov 20, 2014 at 9:07 PM, Sean Sinay smsi...@gmail.com wrote:

 Would also appreciate the clueful contact as I have the same experience
 with going through the normal support escalation. Primarily interested in
 the networking folk who are intimately familiar with the Adtran CPE they
 ship to customers. The 'Engineers' shipped two devices with no gateways
 configured..

 On Sat, Nov 8, 2014 at 11:24 AM, chris tknch...@gmail.com wrote:

 Thanks to all replies off-list. Contact has been made with all the right
 people in the right places. It really is amazing to see how active the
 nanog community is and all the great players involved.

 Chris

 On Fri, Nov 7, 2014 at 6:24 PM, chris tknch...@gmail.com wrote:

  Sorry for the noise but If anyone from Jive Communications is on the
 list
  or if anyone has any clueful technical contacts please contact me
 offlist.
 
  I have a very frustrated mutual customer we provide network services to
  who utilizes Jive for their voice and we can see that there is
 intermittent
  reachability problems and all attempts  to go through normal support
 with
  the information we have provided are going nowhere.
 
  Thanks
  chris
 





Re: DDOS, IDS, RTBH, and Rate limiting

2014-11-20 Thread Data Zone
What happens when someone spoofs legitimate hosts that your customers use?

On Thu, Nov 20, 2014 at 3:36 PM, Pavel Odintsov pavel.odint...@gmail.com
wrote:

 Hello, folks!

 I'm author of fastnetmon, thank you for some PR for my toolkit :)

 I use this tool for similar type of attacks and we do analyze all
 traffic from uplinks ports using port mirroring. You can look at this
 network diagram:

 https://raw.githubusercontent.com/FastVPSEestiOu/fastnetmon/master/network_map.png

 I tried to use netflow many years ago but it's not accurate enough and
 not so fast enough and produce big overhead on middle class network
 routers. It's because I wrote this tool and do every packet analyze.
 It can detect attack in 2 seconds max and call BGP blackhole as quick
 as thought.

 It can detect three types of attacks:
 1) Speed attack for certain IP (we ban every IP which exceed 1 Gbps)
 2) Packet per second attack for certain IP (we ban every IP which
 exceed 100 000 ppps)
 3) And flow flood (very useful mode in networks with big bandwidth/pps
 per client)

 FastNetMon can handle 2-3 million of packets per second and ~20Gbps on
 standard i7 2600 Linux box with Intel 82599 NIC.

 If you need any help or suggestions you can email me directly or ask via
 GitHub.

 Thank you!

 --
 Sincerely yours, Pavel Odintsov



Re: Clueful Jive Communications Contact?

2014-11-20 Thread Sean Sinay
Would also appreciate the clueful contact as I have the same experience
with going through the normal support escalation. Primarily interested in
the networking folk who are intimately familiar with the Adtran CPE they
ship to customers. The 'Engineers' shipped two devices with no gateways
configured..

On Sat, Nov 8, 2014 at 11:24 AM, chris tknch...@gmail.com wrote:

 Thanks to all replies off-list. Contact has been made with all the right
 people in the right places. It really is amazing to see how active the
 nanog community is and all the great players involved.

 Chris

 On Fri, Nov 7, 2014 at 6:24 PM, chris tknch...@gmail.com wrote:

  Sorry for the noise but If anyone from Jive Communications is on the list
  or if anyone has any clueful technical contacts please contact me
 offlist.
 
  I have a very frustrated mutual customer we provide network services to
  who utilizes Jive for their voice and we can see that there is
 intermittent
  reachability problems and all attempts  to go through normal support with
  the information we have provided are going nowhere.
 
  Thanks
  chris
 



Re: DDOS, IDS, RTBH, and Rate limiting

2014-11-20 Thread Robert Duffy
Roland, you seem to have a lot of experience with these kinds of tools.
What open-source NetFlow analysis tools would you recommend for quickly
detecting a DDoS attack?

On Thu, Nov 20, 2014 at 5:12 PM, Roland Dobbins rdobb...@arbor.net wrote:


 On 21 Nov 2014, at 6:22, Denys Fedoryshchenko wrote:

  Netflow is stateful stuff,


 This is factually incorrect; NetFlow flows are unidirectional in nature,
 and in any event have no effect on processing of data-plane traffic.

  and just to run it on wirespeed, on hardware, you need to utilise
 significant part of TCAM,


 Again, this is factually incorrect.

  i am not talking that on some hardware it is just impossible to run it.


 This is also factually incorrect.  Some platforms/linecards do not in fact
 support NetFlow (or other varieties of flow telemetry) due to hardware
 limitations.

  And last thing, from one of public papers, netflow delaying factors:
 1. Flow record expiration


 This is tunable.

  • Typical delay: 15-60 sec.


 This is an entirely subjective assessment, and does not reflect
 operational realities.  These are typically *maximum values* - and they are
 well within operationally-useful timeframes.  Also, the effect of NetFlow
 cache size and resultant FIFOing of flow records is not taken into account,
 nor is the effect on flow termination and flow-record export of TCP FIN or
 RST flags denoting TCP traffic taken into account.

  So for a small hosting(up to 10G), i believe, FastNetMon is best solution.


 This is a gross over-generalization unsupported by facts.  Many years of
 operational experience with NetFlow and other forms of flow telemetry by
 large numbers of network operators of all sizes and varieties contract this
 over-generalization.

 It is generally unwise to make sweeping statements regarding operational
 impact which are not borne out by significant operational experience in
 production networks.

  Faster, and no significant investments to equipment.


 This statement indicates a lack of understanding of opex costs,
 irrespective of capex costs.

  Bigger hosting providers might reuse their existing servers, segment the
 network, and implement inexpensive monitoring on aggregation switches
 without any additional cost again.


 This statement indicates a lack of operational experience in networks of
 even minimal scale.

  Ah, and there is one more huge problem with netflow vs FastNetMon -
 netflow just by design cannot be adapted to run pattern matching, while it
 is trivial to patch FastNetMon for that, turning it to mini-IDS for free.


 This statement betrays a lack of understanding of NetFlow-based (and other
 flow telemetry-based) detection and classification, as well as the
 undesirability and negative operational impact of stateful IDS/'IPS'
 deployments in production networks.

 You should also note that FastNetMon is far from unique; there are
 multiple other open-source tools which provide the same type of
 functionality, and none of them have replaced flow telemetry, either.

 Tools such as FastNetMon supplement flow telemetry, in situations in which
 such tools can be deployed.  They do not begin to replace flow telemetry,
 and they are not inherently superior to flow telemetry.

 Again, I'm sure FastNetMon is a useful tool in many circumstances.  But it
 would be a much better idea to define FastNetMon positively in terms of its
 own inherent value, rather than attempting to define it based upon
 factually incorrect negative 'comparisons' to other well-established,
 widely-used technologies which have demonstrable track records within the
 global operational community.

 ---
 Roland Dobbins rdobb...@arbor.net




-- 
Regards,
Rob


Robert Duffy
eSecureData.com Inc.
1478 Hartley Ave.
Coquitlam, BC V3K 7A1
T: (800) 620-1985
F: (800) 620-1986

This communication is intended for the use of the recipient to which it is
addressed, and may contain confidential, personal and or privileged
information. Please contact the sender immediately if you are not the
intended recipient of this communication, and do not copy, distribute, or
take action relying on the contents herein. Any communication received in
error, or subsequent reply, should be deleted or destroyed.


Re: DDOS, IDS, RTBH, and Rate limiting

2014-11-20 Thread Robert Duffy
I've been using NTOP for couple of years.  I'm mostly looking for something
that can quickly detect DDoS attacks in a datacenter environment.  Thanks
for the suggestions.  Ill check them out.

On Thu, Nov 20, 2014 at 6:50 PM, Tim Jackson jackson@gmail.com wrote:

 I highly recommend pmacct and it's in-memory tables. Lightweight, easy to
 query and super fast.

 You can also easily run multiple aggregates of traffic to find what you are
 interested in, tag common interface types to easily filter traffic..

 Or you can use pmacct to insert this into whatever database you want, AMQP
 or MongoDB..

 My current favorite is using an IMT table for DoS detection and another for
 aggregates for interesting traffic types and querying this every X minutes
 and inserting it into ElasticSearch. Kibana makes the most powerful netflow
 dashboard ever.

 --
 Tim
 On Nov 20, 2014 6:39 PM, Roland Dobbins rdobb...@arbor.net wrote:

 
  On 21 Nov 2014, at 9:19, Robert Duffy wrote:
 
   What open-source NetFlow analysis tools would you recommend for quickly
  detecting a DDoS attack?
 
 
  I generally recommend that folks get started with something like
  nfdump/nfsen or ntop.  There are other, more sophisticated tools out
 there,
  but these allow one to get up and running quickly, and to gain valuable
  operational experience with which to evaluate more sophisticated tools,
 if
  they're needed.
 
  ---
  Roland Dobbins rdobb...@arbor.net
 




-- 
Regards,
Rob


Robert Duffy
eSecureData.com Inc.
1478 Hartley Ave.
Coquitlam, BC V3K 7A1
T: (800) 620-1985
F: (800) 620-1986

This communication is intended for the use of the recipient to which it is
addressed, and may contain confidential, personal and or privileged
information. Please contact the sender immediately if you are not the
intended recipient of this communication, and do not copy, distribute, or
take action relying on the contents herein. Any communication received in
error, or subsequent reply, should be deleted or destroyed.


Multi-homing with multiple ASNs

2014-11-20 Thread Curtis L. Parish
Greetings,

We have recently added a second ISP  (third if you count I2).  Our first ISP 
is actually a private state network that peers with two Tier 1 providers.  We 
own an AS number and our IP space but at the last minute learned our state 
network is advertising our network using two different ASNs (neither ours) so 
they can load balance their connections.If you hit the right looking glass 
server you can see our network advertised by three different ASNs.We were 
told by the new ISP that this is a problem but the state network says it is not.

Looking for opinions and words of wisdom on this split advertising issue.

Thanks
curtis


Curtis Parish
Senior Network Engineer
Middle Tennessee State University



Re: DDOS, IDS, RTBH, and Rate limiting

2014-11-20 Thread Avi Freedman

 Netflow is stateful stuff, and just to run it on wirespeed, on hardware, 
 you need to utilise significant part of TCAM,

Cisco ASRs and MXs with inline jflow can do hundreds of K flows/second
without affecting packet forwarding.

 i am not talking that on some hardware it is just impossible to run it.
 So everything about netflow are built on assumption that hosting or ISP 
 can run it. And based on some observations, majority of small/middle 
 hosting providers are using minimal,just BGP capable L3 switch as core, 
 and cheapest but reliable L2/L3 on aggregation, and both are capable in 
 best case to run sampled sFlow.

Actually, sFlow from many vendors is pretty good (per your points about flow 
burstiness and delays), and is good enough for dDoS detection.  Not for 
security forensics, or billing at 99.99% accuracy, but good enough for
traffic visibility, peering analytics, and (d)DoS detection.

snip

 So for a small hosting(up to 10G), i believe, FastNetMon is best 
 solution. Faster, and no significant investments to equipment. Bigger 
 hosting providers might reuse their existing servers, segment the 
 network, and implement inexpensive monitoring on aggregation switches 
 without any additional cost again.

It can be useful to have a 10G network monitoring box of course...

And with the right setup you can run FastNetMon or other tools in
addition to generating flow that can be of use for other purposes
as well...

 Ah, and there is one more huge problem with netflow vs FastNetMon - 
 netflow just by design cannot be adapted to run pattern matching, while 
 it is trivial to patch FastNetMon for that, turning it to mini-IDS for 
 free.

It's true, having a network tap can be useful for doing PCAP-y stuff.

But taps can be difficult or at least time consuming for people to
put in at scale.  Even, we've seen, for folks with 10G networks.
Often because they can get 90% of what they need for 4 different
business purposes from just flow :)

 Best regards,
 Denys

Avi Freedman| Your flow has something to show you; can you see it?|
CEO, CloudHelix | (avi at cloudhelix dot com) | my name one word on skype |



Re: DDOS, IDS, RTBH, and Rate limiting

2014-11-20 Thread Paul S.

WANguard from andrisoft has worked well on this for us.

It supports flow telemetry and mirrored ports both (We use flows 
strictly), and does what it says it does.


No complaints.

On 11/21/2014 午後 12:00, Robert Duffy wrote:

I've been using NTOP for couple of years.  I'm mostly looking for something
that can quickly detect DDoS attacks in a datacenter environment.  Thanks
for the suggestions.  Ill check them out.

On Thu, Nov 20, 2014 at 6:50 PM, Tim Jackson jackson@gmail.com wrote:


I highly recommend pmacct and it's in-memory tables. Lightweight, easy to
query and super fast.

You can also easily run multiple aggregates of traffic to find what you are
interested in, tag common interface types to easily filter traffic..

Or you can use pmacct to insert this into whatever database you want, AMQP
or MongoDB..

My current favorite is using an IMT table for DoS detection and another for
aggregates for interesting traffic types and querying this every X minutes
and inserting it into ElasticSearch. Kibana makes the most powerful netflow
dashboard ever.

--
Tim
On Nov 20, 2014 6:39 PM, Roland Dobbins rdobb...@arbor.net wrote:


On 21 Nov 2014, at 9:19, Robert Duffy wrote:

  What open-source NetFlow analysis tools would you recommend for quickly

detecting a DDoS attack?


I generally recommend that folks get started with something like
nfdump/nfsen or ntop.  There are other, more sophisticated tools out

there,

but these allow one to get up and running quickly, and to gain valuable
operational experience with which to evaluate more sophisticated tools,

if

they're needed.

---
Roland Dobbins rdobb...@arbor.net








Re: DDOS, IDS, RTBH, and Rate limiting

2014-11-20 Thread Roland Dobbins

On 21 Nov 2014, at 12:08, Paul S. wrote:

 WANguard from andrisoft has worked well on this for us.

I believe the thread was focusing on open-source tools.

---
Roland Dobbins rdobb...@arbor.net