Route leak in Bangladesh

2015-06-30 Thread Grzegorz Janoszka


We have just received alert from bgpmon that AS58587 Fiber @ Home 
Limited has hijacked most of our (AS43996) prefixes and Hurricane 
Electric gladly accepted them.


Anybody see their prefixes hijacked as well?

--
Grzegorz Janoszka


Re: Route leak in Bangladesh

2015-06-30 Thread Randy Bush
be nice if some technical details were included


Re: Route leak in Bangladesh

2015-06-30 Thread Hank Nussbacher

At 10:27 30/06/2015 +0200, Grzegorz Janoszka wrote:

We have just received alert from bgpmon that AS58587 Fiber @ Home Limited 
has hijacked most of our (AS43996) prefixes and Hurricane Electric gladly 
accepted them.


Anybody see their prefixes hijacked as well?


Welcome to the party :-)

Not only you.

-Hank



--
Grzegorz Janoszka




Re: leap second outage

2015-06-30 Thread Dovid Bender
I read that and that at midnight local time since that's when you have the 
extra second. I know a large carrier in Israel is down. Waiting for conf. If 
it's leep second related.

--Original Message--
From: Stefan
Sender: NANOG
To: frnk...@iname.com
Cc: nanog@nanog.org
Subject: Re: leap second outage
Sent: Jun 30, 2015 23:30

This was supposed to have happened @midnight UTC, right? Meaning that we
are past that event. Under which scenarios should people be concerned about
midnight local time? Lots of confusing messages flying all over...
On Jun 30, 2015 10:13 PM, frnk...@iname.com wrote:

 We experienced our first leap second outage -- our SHE (super head end) is
 using (old) Motorola encoders and we lost those video channels.  They
 restarted all those encoders to restore service.

 Frank



Regards,

Dovid


Re: leap second outage

2015-06-30 Thread Nicholas Suan
Correct, the leap second gets inserted at midnight UTC.

Leap seconds can be introduced in UTC at the end of the months of December

 or June, depending on the evolution of UT1-TAI. Bulletin C is mailed every
 six months, either to announce a time step in UTC or to confirm that there
 will be no time step at the next possible date.

ftp://hpiers.obspm.fr/iers/bul/bulc/bulletinc.dat

On Tue, Jun 30, 2015 at 11:30 PM, Stefan netfort...@gmail.com wrote:
 This was supposed to have happened @midnight UTC, right? Meaning that we
 are past that event. Under which scenarios should people be concerned about
 midnight local time? Lots of confusing messages flying all over...
 On Jun 30, 2015 10:13 PM, frnk...@iname.com wrote:

 We experienced our first leap second outage -- our SHE (super head end) is
 using (old) Motorola encoders and we lost those video channels.  They
 restarted all those encoders to restore service.

 Frank




Sacramento Outage.

2015-06-30 Thread Larry Sheldon


Is it odd that there is no mention of this even here?

http://www.wavebroadband.com/resources/outage/service.txt
--
sed quis custodiet ipsos custodes? (Juvenal)


leap second outage

2015-06-30 Thread frnkblk
We experienced our first leap second outage -- our SHE (super head end) is
using (old) Motorola encoders and we lost those video channels.  They
restarted all those encoders to restore service.

Frank



Re: leap second outage

2015-06-30 Thread Stefan
This was supposed to have happened @midnight UTC, right? Meaning that we
are past that event. Under which scenarios should people be concerned about
midnight local time? Lots of confusing messages flying all over...
On Jun 30, 2015 10:13 PM, frnk...@iname.com wrote:

 We experienced our first leap second outage -- our SHE (super head end) is
 using (old) Motorola encoders and we lost those video channels.  They
 restarted all those encoders to restore service.

 Frank




Re: NTT-HE earlier today (~10am EDT)

2015-06-30 Thread Job Snijders
On Wed, Jul 01, 2015 at 09:36:34AM +0900, Randy Bush wrote:
  - when not using the RTR protocol but generating prefix-list
filters based on RPKI data, the devices might not support
sufficient entries.
 
 because the rpki generated acls are bigger and heavier than those in
 the irr.  and they have trans-fats.

I don't consider RPKI generated ACLs a 1 to 1 replacement for IRR based
filters. They might be used as supplement to each other. 

Kind regards,

Job


Re: NTT-HE earlier today (~10am EDT)

2015-06-30 Thread Randy Bush
 - when not using the RTR protocol but generating prefix-list
   filters based on RPKI data, the devices might not support
   sufficient entries.
 
 because the rpki generated acls are bigger and heavier than those in
 the irr.  and they have trans-fats.
 
 I don't consider RPKI generated ACLs a 1 to 1 replacement for IRR based
 filters. They might be used as supplement to each other. 

the major user puts the rpki-generated pseudo-irr in front of the others
in peval(0) order.  same number of resulting acls.  hence i do not
understand your the devices might not support sufficient entries.

randy


Re: leap second outage

2015-06-30 Thread Dovid Bender
No. Some one leaked some routes: 
https://mobile.twitter.com/Axcelx/status/616058414746202113


Regards,

Dovid

-Original Message-
From: Justin Paine jus...@cloudflare.com
Date: Tue, 30 Jun 2015 20:37:06 
To: do...@telecurve.com
Cc: Stefannetfort...@gmail.com; NANOGnanog-boun...@nanog.org; 
frnk...@iname.com; nanog@nanog.org
Subject: Re: leap second outage

Any confirmation if the AWS outage was leap second-related?


Justin Paine
Head of Trust  Safety
CloudFlare Inc.
PGP KeyID: 57B6 0114 DE0B 314D


On Tue, Jun 30, 2015 at 8:32 PM, Dovid Bender do...@telecurve.com wrote:
 I read that and that at midnight local time since that's when you have the 
 extra second. I know a large carrier in Israel is down. Waiting for conf. If 
 it's leep second related.

 --Original Message--
 From: Stefan
 Sender: NANOG
 To: frnk...@iname.com
 Cc: nanog@nanog.org
 Subject: Re: leap second outage
 Sent: Jun 30, 2015 23:30

 This was supposed to have happened @midnight UTC, right? Meaning that we
 are past that event. Under which scenarios should people be concerned about
 midnight local time? Lots of confusing messages flying all over...
 On Jun 30, 2015 10:13 PM, frnk...@iname.com wrote:

 We experienced our first leap second outage -- our SHE (super head end) is
 using (old) Motorola encoders and we lost those video channels.  They
 restarted all those encoders to restore service.

 Frank



 Regards,

 Dovid


Re: NTT-HE earlier today (~10am EDT)

2015-06-30 Thread Randy Bush
 - equipment might not support the RTR protocol to validate
   announcements against the cache validator

alcalu, cisco, juniper do

 - Legal obstacles in obtaining the anchors from all RIRs

arin has been pwned by the tea party and is best ignored.  that they do
not protect their members is their choice.  they're a bottom up policy
organization, right.  bottom of the barrel.

 - when not using the RTR protocol but generating prefix-list
   filters based on RPKI data, the devices might not support
   sufficient entries.

because the rpki generated acls are bigger and heavier than those in the
irr.  and they have trans-fats.

 I'll count not using brocade as a valid method.

you use brocade at your border?  how's that working out for you?  :)

randy


Re: Sacramento Outage.

2015-06-30 Thread Mehmet Akcin
There has been mention to this in outages.org list

Mehmet 

 On Jun 30, 2015, at 17:37, Larry Sheldon larryshel...@cox.net wrote:
 
 
 Is it odd that there is no mention of this even here?
 
 http://www.wavebroadband.com/resources/outage/service.txt
 -- 
 sed quis custodiet ipsos custodes? (Juvenal)


Re: leap second outage

2015-06-30 Thread Josh Luthman
That is my understanding as well.  The event was about 3.5 hours ago.


Josh Luthman
Office: 937-552-2340
Direct: 937-552-2343
1100 Wayne St
Suite 1337
Troy, OH 45373

On Tue, Jun 30, 2015 at 11:30 PM, Stefan netfort...@gmail.com wrote:

 This was supposed to have happened @midnight UTC, right? Meaning that we
 are past that event. Under which scenarios should people be concerned about
 midnight local time? Lots of confusing messages flying all over...
 On Jun 30, 2015 10:13 PM, frnk...@iname.com wrote:

  We experienced our first leap second outage -- our SHE (super head end)
 is
  using (old) Motorola encoders and we lost those video channels.  They
  restarted all those encoders to restore service.
 
  Frank
 
 



Re: leap second outage

2015-06-30 Thread Jean-Francois Mezei
On 15-07-01 00:47, Harlan Stenn wrote:

 What I'm about to say may not be as stupid as it sounds:  The problems
 here aren't problems for cases where it's not a problem.  It is a
 problem where it *is* a problem.

In fairness, systems should be used to NTP making adjustments to the
system clock of a second or less.

However, in systems that expect tightly synchronized clocks, they would
want all the nodes to make the NTP adjustement at the same time.



Re: NTT-HE earlier today (~10am EDT)

2015-06-30 Thread Jared Mauch
On Tue, Jun 30, 2015 at 03:24:02AM +, Faisal Imtiaz wrote:
 Hi Jared,
 
 This is neat !, for someone who recently started working the IRR's, I can 
 tell you that it has been very difficult finding all info in one location. 
 
 What you shared is pretty neat !, and I would like to clean up the records 
 associated with our prefixes.
 
 Can you suggest some practical tips on getting older 'stale' records cleaned 
 up from the different registries ?
 (i.e. records created for us by others, in a former time-frame).

I've not found a great method as it usually involves a lot
of either happy or grumpy sounding emails to addresses that may
bounce quite a lot.  We have had good luck getting RADB to clean out
older entries.

I recently helped someone announce some IP blocks from the
NTT network and there are many crusty IRR objects that seem
impossible to clean up because the IRR is feels like first-in-never-out
input.

http://irrexplorer.nlnog.net/prefix/203.10.78.0/24

- Jared

-- 
Jared Mauch  | pgp key available via finger from ja...@puck.nether.net
clue++;  | http://puck.nether.net/~jared/  My statements are only mine.


Re: Route leak in Bangladesh

2015-06-30 Thread Matsuzaki Yoshinobu
A friend in AS58587 confirmed that this was caused by a configuration
error - it seems like related to redistribution, and they already
fixed that.

-
Matsuzaki Yoshinobu m...@iij.ad.jp
 - IIJ/AS2497  INOC-DBA: 2497*629

In message 559252e9.6030...@janoszka.pl
Date: Tue, 30 Jun 2015 10:27:21 +0200
Grzegorz Janoszka grzeg...@janoszka.pl wrote
 
 We have just received alert from bgpmon that AS58587 Fiber @
 Home Limited has hijacked most of our (AS43996) prefixes and
 Hurricane Electric gladly accepted them.
 
 Anybody see their prefixes hijacked as well?
 
 -- 
 Grzegorz Janoszka


Re: Route leak in Bangladesh

2015-06-30 Thread Matsuzaki Yoshinobu
Randy Bush ra...@psg.com wrote
 A friend in AS58587 confirmed that this was caused by a configuration
 error - it seems like related to redistribution, and they already
 fixed that.
 
 7007 all over again.  do not redistribute bgp into igp.  do not
 redistribute igp into bgp.

I also suggested them to implement BGP community based route filtering
in their outbound policy.  Any other suggestions or thoughts to
prevent such incidents in general?
-
Matsuzaki Yoshinobu m...@iij.ad.jp
 - IIJ/AS2497  INOC-DBA: 2497*629


Re: Route leak in Bangladesh

2015-06-30 Thread Mark Tinka


On 30/Jun/15 15:22, Matsuzaki Yoshinobu wrote:
 I also suggested them to implement BGP community based route filtering
 in their outbound policy.  Any other suggestions or thoughts to
 prevent such incidents in general?

- Get your downstreams to create route objects before you turn them up.
- Get your provisioning teams to validate the prefixes being
provided by your downstreams.
- Use both prefix- and AS_PATH-based filters for your downstreams.
- Use BGP communities (as you've stated).
- No exceptions.

Mark.


Re: Route leak in Bangladesh

2015-06-30 Thread Job Snijders
On Tue, Jun 30, 2015 at 10:22:38PM +0900, Matsuzaki Yoshinobu wrote:
 Randy Bush ra...@psg.com wrote
  A friend in AS58587 confirmed that this was caused by a configuration
  error - it seems like related to redistribution, and they already
  fixed that.
  
  7007 all over again.  do not redistribute bgp into igp.  do not
  redistribute igp into bgp.
 
 I also suggested them to implement BGP community based route filtering
 in their outbound policy.  Any other suggestions or thoughts to
 prevent such incidents in general?

In addition to the BGP community scheme, outbound as-path filters could
help. Most network's list of transit providers is fairly static, it
would be easiy with as-path filters to prevent announcing upstream
routes to other upstreams or peering partners.

Kind regards,

Job


Re: Route leak in Bangladesh

2015-06-30 Thread Hank Nussbacher

At 18:03 30/06/2015 +0900, Randy Bush wrote:

be nice if some technical details were included


Your prefix: xx.104.150.0/24:
Prefix Description:  
Update time:  2015-06-30 07:39 (UTC)
Detected by #peers:   8
Detected prefix: xx.104.150.0/24
Announced by: AS58587 (FIBERATHOME-BD Fiber @ Home Limited,BD)
Upstream AS:  AS6939 (HURRICANE - Hurricane Electric, Inc.,US)
ASpath:   25152 6939 58587

and another:

On Tuesday June 30th 2015 at 7:37 UTC we detected a Origin AS Change event 
for your prefix (23.44.244.0/22 Akamai)
The detected prefix: 23.44.244.0/22, was announced by AS58587 
(FIBERATHOME-BD Fiber @ Home Limited,BD) Alert description:   Origin AS 
Change

Detected Prefix: 23.44.244.0/22
Detected Origin AS:   58587
Expected Origin AS:   1680

Same Aspath of 6939 58587

-Hank



Re: Route leak in Bangladesh

2015-06-30 Thread Joe Abley



On 30 Jun 2015, at 9:41, Job Snijders wrote:

In addition to the BGP community scheme, outbound as-path filters 
could

help.


I agree, but possibly not in the case of a redistribution loop.

(We don't know that's what happened, exactly, but I thought it was worth 
mentioning.)



Joe


Re: leap second outage

2015-06-30 Thread Harlan Stenn
Joe writes:
 A leap sec causing issues. For about 40 years now, there have been
 these leap seconds to no real issue. All of these are go-forwards

No, they're all go-backwards events.  That's no big deal to things
that don't care about monotonic time, or to folks who aren't in
violation of something if their timestamps are off by a second.

What I'm about to say may not be as stupid as it sounds:  The problems
here aren't problems for cases where it's not a problem.  It is a
problem where it *is* a problem.

It's a case where one person's signal is another person's noise.

H


Re: leap second outage

2015-06-30 Thread Joe
A leap sec causing issues. For about 40 years now, there have been
these leap seconds to no real issue. All of these are go-forwards
and even MS AD (I believe) treat them as a little bump (nothing to see
here move along). So unless you have really a tight VPN (non-standard
conforming) I'd hope that nothing has happend, and if it did chances
are it's etheir coincidence or intentional.
I certainly hope I am around to collect on the
https://en.wikipedia.org/wiki/Year_2038_problem for retirement.
I think we've all seen the big to do regarding Y2K to know better
Maybe I am wrong, but...

Just my 2¢s
-Joe

On Tue, Jun 30, 2015 at 10:42 PM, Nicholas Suan ns...@nonexiste.net wrote:
 Correct, the leap second gets inserted at midnight UTC.

 Leap seconds can be introduced in UTC at the end of the months of December

  or June, depending on the evolution of UT1-TAI. Bulletin C is mailed every
  six months, either to announce a time step in UTC or to confirm that there
  will be no time step at the next possible date.

 ftp://hpiers.obspm.fr/iers/bul/bulc/bulletinc.dat

 On Tue, Jun 30, 2015 at 11:30 PM, Stefan netfort...@gmail.com wrote:
 This was supposed to have happened @midnight UTC, right? Meaning that we
 are past that event. Under which scenarios should people be concerned about
 midnight local time? Lots of confusing messages flying all over...
 On Jun 30, 2015 10:13 PM, frnk...@iname.com wrote:

 We experienced our first leap second outage -- our SHE (super head end) is
 using (old) Motorola encoders and we lost those video channels.  They
 restarted all those encoders to restore service.

 Frank





-- 
-Joe
920-530-3631


Re: leap second outage

2015-06-30 Thread Mikael Abrahamsson

On Wed, 1 Jul 2015, Jean-Francois Mezei wrote:

However, in systems that expect tightly synchronized clocks, they would 
want all the nodes to make the NTP adjustement at the same time.


This is both an operating system and application problem.

http://infiniteundo.com/post/25326999628/falsehoods-programmers-believe-about-time
http://infiniteundo.com/post/25509354022/more-falsehoods-programmers-believe-about-time

This is similar to the jiffycounter wrapping, since this doesn't happen 
that often, it's not commonly tested for. Good way is to start the jiffy 
counter so it wraps after 10 minutes of uptime. That way you'll run into 
any bugs quickly. Either we should abolish the leap second or we should 
make leap second adjustments (back and forth) on a monthly basis to 
exercise the code.


This is a hard sell though...

--
Mikael Abrahamssonemail: swm...@swm.pp.se


Re: Route leak in Bangladesh

2015-06-30 Thread Justin M. Streiner

On Tue, 30 Jun 2015, Matsuzaki Yoshinobu wrote:


Randy Bush ra...@psg.com wrote

A friend in AS58587 confirmed that this was caused by a configuration
error - it seems like related to redistribution, and they already
fixed that.


7007 all over again.  do not redistribute bgp into igp.  do not
redistribute igp into bgp.


I also suggested them to implement BGP community based route filtering
in their outbound policy.  Any other suggestions or thoughts to
prevent such incidents in general?


At a minimum, AS-PATH filtering of outgoing routes to just your ASN(s) and 
your downstream customer ASNs.  Whether this is done manually, built 
using AS-SETs from your route registry of choice, or through some other

automated means is another story.

jms


Re: Route leak in Bangladesh

2015-06-30 Thread Sandra Murphy

On Jun 30, 2015, at 10:39 AM, Justin M. Streiner strei...@cluebyfour.org 
wrote:

 On Tue, 30 Jun 2015, Matsuzaki Yoshinobu wrote:
 
 Randy Bush ra...@psg.com wrote
 A friend in AS58587 confirmed that this was caused by a configuration
 error - it seems like related to redistribution, and they already
 fixed that.
 
 7007 all over again.  do not redistribute bgp into igp.  do not
 redistribute igp into bgp.
 
 I also suggested them to implement BGP community based route filtering
 in their outbound policy.  Any other suggestions or thoughts to
 prevent such incidents in general?
 
 At a minimum, AS-PATH filtering of outgoing routes to just your ASN(s) and 
 your downstream customer ASNs.  Whether this is done manually, built using 
 AS-SETs from your route registry of choice, or through some other
 automated means is another story.
 

That sort of AS_PATH filtering would not have helped in this case.  The AS 
originated the routes, it did not propagate an upstream route.

So an AS_PATH filter to just its own AS would have passed these routes.

You would need origin validation on your outbound routes.  Job suggested prefix 
filters on outbound routes.  (If you are doing prefix filters on your inbound 
customer links, it might be excessive caution to also prefix filter customers 
prefixes on outbound links?  Or is it: you can never be too careful, 
belt-and-suspenders, measure twice, etc?)

--Sandy



signature.asc
Description: Message signed with OpenPGP using GPGMail


Re: Route leak in Bangladesh

2015-06-30 Thread Job Snijders
On Tue, Jun 30, 2015 at 09:44:12AM -0400, Joe Abley wrote:
 On 30 Jun 2015, at 9:41, Job Snijders wrote:
 In addition to the BGP community scheme, outbound as-path filters could
 help.
 
 I agree, but possibly not in the case of a redistribution loop.
 
 (We don't know that's what happened, exactly, but I thought it was worth
 mentioning.)

Joe, you are right.

In this specific situation, for a small to medium sized network, it
might be prudent to apply an outbound prefix-filter on all transit 
peering sessions and thus only allowing prefixes which actually belong
to downstream customers and the network itself.

One could generate that prefix-list based on the network's AS-SET. I
wouldn't deploy /only/ outbound prefix-filters. This method should be
viewed as complementary to other methods such as the already mentioned a
BGP community scheme.

Kind regards,

Job


Re: Route leak in Bangladesh

2015-06-30 Thread Nick Hilliard
On 30/06/2015 14:29, Mark Tinka wrote:
 - Get your downstreams to create route objects before you turn them up.
 - Get your provisioning teams to validate the prefixes being
 provided by your downstreams.
 - Use both prefix- and AS_PATH-based filters for your downstreams.
 - Use BGP communities (as you've stated).
 - No exceptions.

plus:

- fully automate ingress prefix management
- use maxprefixes with manual reenable on all ebgp sessions

I've been caught with fully automated IRR based per-session prefix
filtering where the customer put the IXP AS macro into their AS macro.

When the customer did a 7007 on this, we accepted everything that they
announced back to us, oy vey.

So you need both.

Nick





Re: Route leak in Bangladesh

2015-06-30 Thread Graham Beneke
On 30/06/2015 17:09, Job Snijders wrote:
 If you were the network causing a leak of this type, prefix filters on
 inbound facing your customers might not have prevented this.
 
 If you are a network providing transit to the leak originator mentioned
 in the above paragraph, I believe a prefix based filter could have made
 a big difference.

We seem to be assuming that this leak occurred within the context of a
customer-provider BGP relationship.

But what if this is not the case?

What if this was a peering session - perhaps via a route server at an
exchange point. max-pref on a session with a route server is an
extremely blunt (and potentially ineffective) tool for the job.

In some regions the use to route servers and the lack of clue about
anything BGP beyond one session to the route server (and one session to
transit) is scary. We place our faith in the IXP operator, that they
know best, while there may be no evidence that they do... ;-)

-- 
Graham Beneke


Re: ARIN just subdivided their last /17, /18, /19, /20, /21 and /22. Down to only /23s and /24s now. : ipv6

2015-06-30 Thread Justin M. Streiner

On Tue, 30 Jun 2015, Ricky Beam wrote:

The death of Novell NetWare (and their transitioned to IP) killed it the 
enterprise. Games adopting IP for network play killed it in the home.


Ultimately, it sucks as a WAN protocol, so the internet was built using this 
new fangled IP thing.


There are still isolated pockets of devices out there speaking IPX, 
DECnet, Appletalk, etc, but either they're not connected to the 
'Internet', or their traffic passes through other devices that encapsulate 
and de-encapsulate it in IP to allow it to be transported.


jms


Re: Route leak in Bangladesh

2015-06-30 Thread Mark Tinka


On 30/Jun/15 16:24, Job Snijders wrote:
 In this specific situation, for a small to medium sized network, it
 might be prudent to apply an outbound prefix-filter on all transit 
 peering sessions and thus only allowing prefixes which actually belong
 to downstream customers and the network itself.

I say that regardless of size, deploy the ultimate solution as the
network is only bound to grow.

It's harder for folk to undo old habits as they become more entrenched.

Mark.


Re: Route leak in Bangladesh

2015-06-30 Thread Andree Toonk
Some more data from BGPmon.net:
This affected close to 28,000 prefixes from 4,477 unique Autonomous systems.

The hijacks were originated by AS58587 and propagated via AS45796
(15,002 prefixes) and AS6939 (25,841). The AS45796 paths were only seen
via one of our peers, while the AS6939 path had a more significant
visibility.

The event started at 07:37 UTC and lasted for a few minutes.

Cheers
 Andree








.-- My secret spy satellite informs me that at 2015-06-30 3:26 AM
Matsuzaki Yoshinobu wrote:
 A friend in AS58587 confirmed that this was caused by a configuration
 error - it seems like related to redistribution, and they already
 fixed that.
 
 -
 Matsuzaki Yoshinobu m...@iij.ad.jp
  - IIJ/AS2497  INOC-DBA: 2497*629
 
 In message 559252e9.6030...@janoszka.pl
 Date: Tue, 30 Jun 2015 10:27:21 +0200
 Grzegorz Janoszka grzeg...@janoszka.pl wrote
 We have just received alert from bgpmon that AS58587 Fiber @
 Home Limited has hijacked most of our (AS43996) prefixes and
 Hurricane Electric gladly accepted them.

 Anybody see their prefixes hijacked as well?

 -- 
 Grzegorz Janoszka
 


Re: Route leak in Bangladesh

2015-06-30 Thread Job Snijders
On Tue, Jun 30, 2015 at 04:38:48PM +0200, Mark Tinka wrote:
 On 30/Jun/15 16:24, Job Snijders wrote:
  In this specific situation, for a small to medium sized network, it
  might be prudent to apply an outbound prefix-filter on all transit 
  peering sessions and thus only allowing prefixes which actually belong
  to downstream customers and the network itself.
 
 I say that regardless of size, deploy the ultimate solution as the
 network is only bound to grow.
 
 It's harder for folk to undo old habits as they become more
 entrenched.

Nothing is ever regardless of anything :-)

I would forsee issues if i'd try to add an eleven megabyte prefix-list
on all devices in the network.

Kind regards,

Job


Re: Route leak in Bangladesh

2015-06-30 Thread Job Snijders
On Tue, Jun 30, 2015 at 10:53:45AM -0400, Sandra Murphy wrote:
 That sort of AS_PATH filtering would not have helped in this case.
 The AS originated the routes, it did not propagate an upstream route.
 
 So an AS_PATH filter to just its own AS would have passed these
 routes.
 
 You would need origin validation on your outbound routes.  Job
 suggested prefix filters on outbound routes.  (If you are doing prefix
 filters on your inbound customer links, it might be excessive caution
 to also prefix filter customers prefixes on outbound links?  Or is it:
 you can never be too careful, belt-and-suspenders, measure twice,
 etc?)

I wouldn't consider it to be excessive caution to bring more safeguards
to the game, you never know when diarrhea will strike.

If you were the network causing a leak of this type, prefix filters on
inbound facing your customers might not have prevented this.

If you are a network providing transit to the leak originator mentioned
in the above paragraph, I believe a prefix based filter could have made
a big difference.

Kind regards,

Job


Re: Route leak in Bangladesh

2015-06-30 Thread Sandra Murphy

On Jun 30, 2015, at 9:41 AM, Job Snijders j...@instituut.net wrote:

 
 In addition to the BGP community scheme, outbound as-path filters could
 help. Most network's list of transit providers is fairly static, it
 would be easiy with as-path filters to prevent announcing upstream
 routes to other upstreams or peering partners.


Except that this was not a route leak per se.  The announced routes AS_PATH 
shows them as originated by the offending AS, not *propagated* by the offending 
AS. So the outbound AS_PATH did not retain the upstream portion of the path.

--Sandy




signature.asc
Description: Message signed with OpenPGP using GPGMail


Re: Route leak in Bangladesh

2015-06-30 Thread Justin M. Streiner

On Tue, 30 Jun 2015, Sandra Murphy wrote:


On Jun 30, 2015, at 10:39 AM, Justin M. Streiner strei...@cluebyfour.org 
wrote:
At a minimum, AS-PATH filtering of outgoing routes to just your ASN(s) 
and your downstream customer ASNs.  Whether this is done manually, 
built using AS-SETs from your route registry of choice, or through some 
other automated means is another story.




That sort of AS_PATH filtering would not have helped in this case.  The 
AS originated the routes, it did not propagate an upstream route.


I didn't realise they offending AS was originating those routes, rather 
than propagating the existing ones.



So an AS_PATH filter to just its own AS would have passed these routes.


That's why I suggested it as a minimum precaution.  When I worked in the 
service provider world, we did prefix + AS-PATH filtering + max-prefix, 
which was pretty effective in keeping BGP-borne madness down to a dull 
roar.  Would that stop everything?  No, but it did help a lot.  I still 
work in a BGP-speaking organization - just not one that has downstream 
BGP-speaking customers at this point.


You would need origin validation on your outbound routes.  Job 
suggested prefix filters on outbound routes.  (If you are doing prefix 
filters on your inbound customer links, it might be excessive caution to 
also prefix filter customers prefixes on outbound links?  Or is it: you 
can never be too careful, belt-and-suspenders, measure twice, etc?)


It depends on how much automation can be done to update the 
necessary filters and AS-PATH ACLs, and how much you trust both the 
automation method and the data source for those filters.


jms


Re: GRE performance over the Internet - DDoS cloud mitigation

2015-06-30 Thread Roland Dobbins


On 1 Jul 2015, at 1:37, Dennis B wrote:


Would you like to learn more? lol


I'm quite conversant with all these considerations, thanks.

OP asserted that BGP sessions for diversion into any cloud DDoS 
mitigation service ran from the endpoint network through GRE tunnels to 
the cloud-based mitigation provider.  I was explaining that in most 
cloud mitigation scenarios, GRE tunnels are used for re-injection of 
'clean' traffic to the endpoint networks.


---
Roland Dobbins rdobb...@arbor.net


Re: ARIN just subdivided their last /17, /18, /19, /20, /21 and /22. Down to only /23s and /24s now. : ipv6

2015-06-30 Thread Stephen Satchell

On 06/30/2015 07:28 AM, Justin M. Streiner wrote:

There are still isolated pockets of devices out there speaking IPX,
DECnet, Appletalk, etc, but either they're not connected to the
'Internet', or their traffic passes through other devices that
encapsulate and de-encapsulate it in IP to allow it to be transported.


For the young (and the young at heart) those other devices were known 
as bridges back in the day.


Re: GRE performance over the Internet - DDoS cloud mitigation

2015-06-30 Thread Dennis B
Depends on what performance considerations you are trying to address,
technically.

The question is how can we guarantee the GRE/BGP performance (control
traffic) during the time between detection and mitigation?

GRE decapsulation?
IE: Hardware vs Software?
Routing of the Protocol over the internet?
IE: If the inbound path is saturated, what is the availability of the GRE
tunnel?
User-experience with GRE packet overhead?
IE: TCP Fragmentation causing PMTUD messages for reassembly?

I've worked at Prolexic for 7 years and now Akamai for 1.4 yrs, post
acquisition.

Immediately, I can think of multiple scenarios' (3) that come to mind on
how to solve any one of these categories.

Would you like to learn more? lol

DB



On Mon, Jun 8, 2015 at 7:25 AM, Roland Dobbins rdobb...@arbor.net wrote:


 On 8 Jun 2015, at 17:57, Ramy Hashish wrote:

  a BGP session has to be established over a GRE tunnel over the internet
 between the ISP/NSP/DC and the cloud scrubbing center,


 This is incorrect.

 In most cloud overlay DDoS mitigation scenarios (e.g., end-customer
 obtains service from an MSSP which isn't providing them with transit), a)
 there is no BGP relationship whatsoever between the end-customer and the
 MSSP, and b) the GRE tunnel is used strictly for re-injection of clean
 traffic (i.e., post-mitigation) to the end-customer.

 In some scenarios, DNS is also used in place of/in addition to BGP-based
 diversion.

 But GRE is used for re-injection only.

 ---
 Roland Dobbins rdobb...@arbor.net



Re: ARIN just subdivided their last /17, /18, /19, /20, /21 and /22. Down to only /23s and /24s now. : ipv6

2015-06-30 Thread Owen DeLong

 On Jun 30, 2015, at 10:03 , Stephen Satchell l...@satchell.net wrote:
 
 On 06/30/2015 07:28 AM, Justin M. Streiner wrote:
 There are still isolated pockets of devices out there speaking IPX,
 DECnet, Appletalk, etc, but either they're not connected to the
 'Internet', or their traffic passes through other devices that
 encapsulate and de-encapsulate it in IP to allow it to be transported.
 
 For the young (and the young at heart) those other devices were known as 
 bridges back in the day.

Not all of them… Some of them were “gateways” and occasionally you’d even 
encounter a “proxy”.

Owen



Re: ARIN just subdivided their last /17, /18, /19, /20, /21 and /22. Down to only /23s and /24s now. : ipv6

2015-06-30 Thread Ricky Beam
On Tue, 30 Jun 2015 10:28:13 -0400, Justin M. Streiner  
strei...@cluebyfour.org wrote:
There are still isolated pockets of devices out there speaking IPX,  
DECnet, Appletalk, etc


Indeed. I'm one of them. (rarely) ... IPX managed print server. It speaks  
IP, but cannot be managed by IP. I'd throw it away, but it functions as a  
two port serial terminal server as well. (2 parallel, 2 serial)


I don't have any true appletalk (or localtalk!) hardware anymore. But I  
know where there's a palet of them. :-)


I still have MCA token-ring cards for an RS/6000 (and the RS/6000.) I'm  
just waiting for the NCDOT to need one to recoup a wad of tax money.


or their traffic passes through other devices that encapsulate and  
de-encapsulate it in IP to allow it to be transported.


A, the internet in a box IPX-IP gateway device. God, how we hated  
those things. But some companies refused to install an IP stack, 'tho  
they'd install the IPX IP app suite. (late '90s)


Re: World's Fastest Internet™ in Canadaland

2015-06-30 Thread Jean-Francois Mezei
On 15-06-26 14:04, Hank Disuko wrote:
 Bell Canada is apparently gearing up to provide the good people of Toronto 
 with the World's Fastest Internet™.
 http://www.thestar.com/news/city_hall/2015/06/25/bell-canada-to-give-toronto-worlds-fastest-internet.html


BTW, initally, Bell limits it to 940mbps. Likely because the Sagemcom
routers it uses don't have the umph to handle higher bandwidth. (these
boxes also have the hacked VDSL modem that interfaces with the
not-so-compliant and long ago discontinued Stinger DSKAMs that Bell
continued to deploy until 2012 despite these being discontinued in 2005
and never getting full compliance with VDSL2.)

One new CPE routers are found, Bell intends to raise marketed up to
speed to 1gnps. Of course, it will br priced so that few people order it
so congestion in 32 home sectors won't be too much of a problem.

Question:


From the network operator's point of view, is there a huge difference in
network planning:

1- user spends 2 hours streaming a Netflix movie at roughly 6mbps.

2- user spends 5 minutes downloadimng that movie at 150mbps  and then is
idle for 2 hours while watching it ?

Does 2 end up requiring less total capacity because on average fewer
people use it at the same time ?


Call for presentations RIPE 71

2015-06-30 Thread Benno Overeinder
Dear colleagues,

Please find the CFP for RIPE 71 below or at
https://ripe71.ripe.net/submit-topic/cfp/.

The deadline for submissions is 13 September 2015.

Please also note that speakers do not receive any extra reduction or
funding towards the meeting fee at the RIPE Meetings.

Kind regards,

Benno Overeinder
RIPE PC Chair
https://www.ripe.net/participate/meetings/ripe-meetings/pc




Call for Presentations

A RIPE Meeting is an open event where Internet Service Providers,
network operators and other interested parties get together.  Although
the meeting is mostly technical, it is also a chance for people to meet
and network with others in their field.

RIPE 71 will take place from 16-20 November 2015 in Bucharest, Romania.

The RIPE Programme Committee (PC) is now seeking content proposals from
the RIPE community for the plenary sessions, BoFs (Birds of a Feather
sessions), panels, workshops, tutorials and lightning talks at RIPE 71.
See the full descriptions of the different presentation formats,
https://ripe71.ripe.net/submit-topic/presentation-formats/.

Proposals for plenary sessions, BoFs, panels, workshops and tutorials
must be submitted for full consideration no later than 13 September
2015.  Proposals submitted after this date will be considered depending
on the remaining available space in the programme.

The PC is looking for presentations covering topics of network
engineering and operations, including but not limited to:

- IPv6 deployment
- Managing IPv4 scarcity in operations
- Commercial transactions of IPv4 addresses
- Data centre technologies
- Network and DNS operations
- Internet governance and regulatory practices
- Network and routing security
- Content delivery
- Internet peering and mobile data exchange

Submissions

RIPE Meeting attendees are quite sensitive to keeping presentations
non-commercial, and product marketing talks are strongly discouraged.
Repeated audience feedback shows that the most successful talks focus on
operational experience, research results, or case studies.  For example,
presenters wishing to describe a commercial solution should focus on
the underlying technology and not attempt a product demonstration.

Presenters should indicate how much time they will require. In general,
the time allocated for the different presentation formats is as follows:

- Plenary presentations: 20-25 minutes presentation with
  5-10 minutes discussion
- Tutorials: up to two hours (Monday morning)
- Workshops: one hour (during evening sessions) to two hours
  (Monday morning)
- BoFs: approximately one hour
- Lightning talks: 10 minutes

The following general requirements apply:

- Proposals must be submitted using the meeting submission system,
  https://ripe71.ripe.net/submit-topic/submission-form/.

- Lightning talks should also be submitted using the meeting submission
  system (https://ripe71.ripe.net/submit-topic/submission-form/) and
  can be submitted any time up to and including the meeting week. The
  allocation of lightning talks will be announced on short notice---in
  some cases on the same day but often one day prior to the time slot
  allocated.

- Presenters who propose a panel or BoF are encouraged to include
  speakers from several (perhaps even competing) companies and/or a
  neutral facilitator.

- All presentation proposals will only be considered by the PC if they
  contain at least draft presentation slides (slides may be updated
  later on). For panels, proposals must contain a clear description, as
  well as the names of invited panellists, presenters and moderators.

- Due to potential technical issues, presenters/panellists should be
  physically present at the RIPE Meeting.

If you have any questions or requests concerning content submissions,
please email pc [at] ripe [dot] net.


-- 
Benno J. Overeinder
NLnet Labs
http://www.nlnetlabs.nl/


Re: GRE performance over the Internet - DDoS cloud mitigation

2015-06-30 Thread Dennis B
Roland,

Agreed, Ramy's scenario was not truly spot on, but his question still
remains. Perf implications when cloud security providers time to
detect/mitigate is X minutes. How stable can GRE transports and BGP
sessions be when under load?

In my technical opinion, this is a valid argument, which deems wide
opinion. Specifically, use-cases about how to apply defense in depth
logically in the DC vs Hybrid vs Pure Cloud.

Good topic, already some back-chatter personal opinions from Nanog lurkers!

Regards,

Dennis B.


On Tue, Jun 30, 2015 at 2:45 PM, Roland Dobbins rdobb...@arbor.net wrote:


 On 1 Jul 2015, at 1:37, Dennis B wrote:

  Would you like to learn more? lol


 I'm quite conversant with all these considerations, thanks.

 OP asserted that BGP sessions for diversion into any cloud DDoS mitigation
 service ran from the endpoint network through GRE tunnels to the
 cloud-based mitigation provider.  I was explaining that in most cloud
 mitigation scenarios, GRE tunnels are used for re-injection of 'clean'
 traffic to the endpoint networks.

 ---
 Roland Dobbins rdobb...@arbor.net



Re: Route leak in Bangladesh

2015-06-30 Thread Suresh Ramasubramanian
I have sent this to a contact at another Bangladeshi ISP that should be able to 
reach the right person for this ASAP.

 On 30-Jun-2015, at 1:57 pm, Grzegorz Janoszka grzeg...@janoszka.pl wrote:
 
 We have just received alert from bgpmon that AS58587 Fiber @ Home Limited has 
 hijacked most of our (AS43996) prefixes and Hurricane Electric gladly 
 accepted them.
 
 Anybody see their prefixes hijacked as well?



Re: NTT-HE earlier today (~10am EDT)

2015-06-30 Thread Randy Bush
 NTT's customer Sofia Connect leaked our routes to NTT.  NTT accepted
 these routes instead of properly filtering their customer
 announcements.  As a network of non-trivial size, announcing over
 75,000 customer routes which is nearly 15% of the IPv4 routing table,
 we'd expect the common courtesy of having our ASN included in their
 customer facing AS-PATH filters, as we extend this same courtesy to
 other networks of this size (such as AS2914).

sometimes the goddesses have a sense of humor

At Tue, 30 Jun 2015 10:27:21 +0200, Grzegorz Janoszka wrote:
 We have just received alert from bgpmon that AS58587 Fiber @ Home 
 Limited has hijacked most of our (AS43996) prefixes and Hurricane 
 Electric gladly accepted them.

randy


Re: Route leak in Bangladesh

2015-06-30 Thread Randy Bush
 A friend in AS58587 confirmed that this was caused by a configuration
 error - it seems like related to redistribution, and they already
 fixed that.

7007 all over again.  do not redistribute bgp into igp.  do not
redistribute igp into bgp.

randy


Re: World's Fastest Internet™ in Canadaland

2015-06-30 Thread Baldur Norddahl
On 30 June 2015 at 22:32, Jean-Francois Mezei jfmezei_na...@vaxination.ca
wrote:

 BTW, initally, Bell limits it to 940mbps.


940 Mbps is what speedtest.net will give you on a linespeed 1 Gbps
connection. That sounds more like marketing people trying to understand
overhead.

Regards,

Baldur


Re: Thoughts On Cheap Chinese xDSL Testers

2015-06-30 Thread Joshua Zukerman
There are some downsides with the Colt-250+ units (as I have one almost
daily to do installs for a CLEC).

1. The Colts require 4 high amperage AA batteries. I used to purchase
Duracell Ultra batteries which worked, but life span was a couple of weeks
to maybe a month and now I cannot seem to find them in stores. I now use
Lithium batteries and they seem to last a few months now.
2. They will only sync up for 100 Seconds max. Not helpful when you're
trying to diagnose a flapping circuit.
3. They won't stay sync'd up on circuits with Occam DSLAMs. They randomly
drop after a few seconds. Not a condition of the circuit. Some type of
incompatibility with Occams.
4. As others said, not a Layer 3 or 2 (I think).
5. Does not provide any additional details like Far end errors, Near end
Errors, FEC/HEC, etc.

On the plus side:
1. They boot up really quick, as quick as you can press 2 buttons you can
start a test. (my understanding is Sunrise units take a couple of minutes
to bootup)
2. Relatively lightweight.
3. Can use regular 6p4c line cords in case you lose the nice
Angled-Bed-of-Nails/6p4c test cable it comes with (like I accidentally did).
4. Can be purchased for cheap on eBay. I got mine years ago for less than
$150.00

On Mon, Jun 29, 2015 at 9:23 PM, Robert Glover robe...@garlic.com wrote:

 The local ILEC (Verizon) use Colt 250+.  They are pretty cool.  They do
 not do layer 3 like the meter you referenced.
 I'm actually looking for a cost-effective meter that does ADSL+ / VDSL2 /
 e.SHDSL.  it's easy to find one that does the first two, but not all three.

  Original message 
 From: Lyndon Nerenberg lyn...@orthanc.ca
 Date: 06/29/2015  5:50 PM  (GMT-08:00)
 To: North American Network Operators' Group nanog@nanog.org
 Subject: Thoughts On Cheap Chinese xDSL Testers

 I've been poking around looking for an inexpensive xDSL circuit tester to
 do some measurements on my home DSL line, in opposition to the telco. $2K+
 is not in the budget, so I'm curious about the accuracy of the $300 Chinese
 units kicking around eBay (e.g. the ST332B).  Anyone out there have
 experience with them?  Are they even remotely close to accurate?

 --lyndon

 ​




-- 
Joshua Zukerman
President
Snow Pond Technology Group Inc.
www.snowpondtech.com


Re: NTT-HE earlier today (~10am EDT)

2015-06-30 Thread Mike Leber

I was thinking that when I posted yesterday.

These were announcements from a peer, not customer routes.

We are lowering our max prefix limits on many peers as a result of this.

We are also going towards more prefix filtering on peers beyond bogons 
and martians.


Mike.

On 6/30/15 2:19 AM, Randy Bush wrote:

NTT's customer Sofia Connect leaked our routes to NTT.  NTT accepted
these routes instead of properly filtering their customer
announcements.  As a network of non-trivial size, announcing over
75,000 customer routes which is nearly 15% of the IPv4 routing table,
we'd expect the common courtesy of having our ASN included in their
customer facing AS-PATH filters, as we extend this same courtesy to
other networks of this size (such as AS2914).

sometimes the goddesses have a sense of humor

At Tue, 30 Jun 2015 10:27:21 +0200, Grzegorz Janoszka wrote:

We have just received alert from bgpmon that AS58587 Fiber @ Home
Limited has hijacked most of our (AS43996) prefixes and Hurricane
Electric gladly accepted them.

randy




Re: ARIN just subdivided their last /17, /18, /19, /20, /21 and /22. Down to only /23s and /24s now. : ipv6

2015-06-30 Thread james machado
On Tue, Jun 30, 2015 at 1:43 PM, Ricky Beam jfb...@gmail.com wrote:
 On Tue, 30 Jun 2015 10:28:13 -0400, Justin M. Streiner
 strei...@cluebyfour.org wrote:

 There are still isolated pockets of devices out there speaking IPX,
 DECnet, Appletalk, etc


 Indeed. I'm one of them. (rarely) ... IPX managed print server. It speaks
 IP, but cannot be managed by IP. I'd throw it away, but it functions as a
 two port serial terminal server as well. (2 parallel, 2 serial)

 I don't have any true appletalk (or localtalk!) hardware anymore. But I know
 where there's a palet of them. :-)

 I still have MCA token-ring cards for an RS/6000 (and the RS/6000.) I'm just
 waiting for the NCDOT to need one to recoup a wad of tax money.

 or their traffic passes through other devices that encapsulate and
 de-encapsulate it in IP to allow it to be transported.


 A, the internet in a box IPX-IP gateway device. God, how we hated
 those things. But some companies refused to install an IP stack, 'tho they'd
 install the IPX IP app suite. (late '90s)

But how much memory you could save if you only ran IPX.  Adding the IP
stack would take you below 500K and then you would have programs that
just wouldn't run.  QEMM could only do so much.


Re: NTT-HE earlier today (~10am EDT)

2015-06-30 Thread Tore Anderson
* Mike Leber

 I was thinking that when I posted yesterday.
 
 These were announcements from a peer, not customer routes.
 
 We are lowering our max prefix limits on many peers as a result of this.
 
 We are also going towards more prefix filtering on peers beyond bogons 
 and martians.

Hi Mike,

You're not mentioning RPKI here. Any particular reason why not?

If I understand correctly, in today's leak the origin AS was
changed/reset, so RPKI ought to have saved the day. (At least Grzegorz'
day, considering that 33 of AS43996's prefixes are covered by ROAs.)

Tore

  At Tue, 30 Jun 2015 10:27:21 +0200, Grzegorz Janoszka wrote:
  We have just received alert from bgpmon that AS58587 Fiber @ Home
  Limited has hijacked most of our (AS43996) prefixes and Hurricane
  Electric gladly accepted them.


Re: NTT-HE earlier today (~10am EDT)

2015-06-30 Thread Jared Mauch
We have been pushing large configurations to devices. You can check my slides 
from the London IEPG meeting. 

When 96% of your config is prefix filters we are sure trying.

I ask others to encourage your vendors to make this a priority as we have faced 
a number of issues in this area and have been waiting quite some time for 
vendor resolution. 

Jared Mauch

 On Jun 30, 2015, at 5:26 PM, Mike Leber mle...@he.net wrote:
 
 
 
 On 6/30/15 3:02 PM, Tore Anderson wrote:
 * Mike Leber
 
 I was thinking that when I posted yesterday.
 
 These were announcements from a peer, not customer routes.
 
 We are lowering our max prefix limits on many peers as a result of this.
 
 We are also going towards more prefix filtering on peers beyond bogons
 and martians.
 Hi Mike,
 
 You're not mentioning RPKI here. Any particular reason why not?
 
 If I understand correctly, in today's leak the origin AS was
 changed/reset, so RPKI ought to have saved the day. (At least Grzegorz'
 day, considering that 33 of AS43996's prefixes are covered by ROAs.)
 
 Yes, we will incorporate RPKI into how we build our prefix filters for peers 
 as we improve our tools.
 
 Currently this will involve some amount of prefix list compression due to the 
 limits of current hardware and the need to still have BGP converge.
 
 As Job Snijders said, I would forsee issues if i'd try to add an eleven 
 megabyte prefix-list on all devices in the network..
 
 Mike.


RE: Route leak in Bangladesh

2015-06-30 Thread Adam Datacenter - NOC
Yes, we have seen one of our prefixes hikacked. We contacted to Fiberathome and 
they told us the issue has been solved.

Greetings.
Ferran.

-Mensaje original-
De: NANOG [mailto:nanog-boun...@nanog.org] En nombre de Grzegorz Janoszka
Enviado el: martes, 30 de junio de 2015 10:27
Para: nanog@nanog.org
Asunto: Route leak in Bangladesh


We have just received alert from bgpmon that AS58587 Fiber @ Home 
Limited has hijacked most of our (AS43996) prefixes and Hurricane 
Electric gladly accepted them.

Anybody see their prefixes hijacked as well?

-- 
Grzegorz Janoszka



Re: NTT-HE earlier today (~10am EDT)

2015-06-30 Thread Mike Leber



On 6/30/15 3:02 PM, Tore Anderson wrote:

* Mike Leber


I was thinking that when I posted yesterday.

These were announcements from a peer, not customer routes.

We are lowering our max prefix limits on many peers as a result of this.

We are also going towards more prefix filtering on peers beyond bogons
and martians.

Hi Mike,

You're not mentioning RPKI here. Any particular reason why not?

If I understand correctly, in today's leak the origin AS was
changed/reset, so RPKI ought to have saved the day. (At least Grzegorz'
day, considering that 33 of AS43996's prefixes are covered by ROAs.)


Yes, we will incorporate RPKI into how we build our prefix filters for 
peers as we improve our tools.


Currently this will involve some amount of prefix list compression due 
to the limits of current hardware and the need to still have BGP converge.


As Job Snijders said, I would forsee issues if i'd try to add an eleven 
megabyte prefix-list on all devices in the network..


Mike.


Re: NTT-HE earlier today (~10am EDT)

2015-06-30 Thread Job Snijders
On Wed, Jul 01, 2015 at 12:02:40AM +0200, Tore Anderson wrote:
  I was thinking that when I posted yesterday.
  
  These were announcements from a peer, not customer routes.
  
  We are lowering our max prefix limits on many peers as a result of this.
  
  We are also going towards more prefix filtering on peers beyond bogons 
  and martians.
 
 You're not mentioning RPKI here. Any particular reason why not?
 
 If I understand correctly, in today's leak the origin AS was
 changed/reset, so RPKI ought to have saved the day. (At least
 Grzegorz' day, considering that 33 of AS43996's prefixes are covered
 by ROAs.)

This assessment is correct, however there might be some constraints in
play with regard to RPKI, which are not really related to RPKI itself,
which prohibit meaningful deployment. I've seen a few obstacles myself:

- equipment might not support the RTR protocol to validate
  announcements against the cache validator
- Legal obstacles in obtaining the anchors from all RIRs
- when not using the RTR protocol but generating prefix-list filters
  based on RPKI data, the devices might not support sufficient
  entries.

Would be good if other people share obstacles, and possibly, the methods
they used to overcome those. I'll count not using brocade as a valid
method.

Kind regards,

Job


Re: NTT-HE earlier today (~10am EDT)

2015-06-30 Thread Job Snijders
On Tue, Jun 30, 2015 at 03:32:42PM -0700, Ca By wrote:
 It is NTT that would have mitigated this issue if they deployed and
 enforcer rpki, right?

No, NTT deploying RPKI would not have helped in yesterday's issue.

But, RPKI could've made a difference in today's Bangladesh leak, even if
RPKI validation was not implemented by the direct upstream with
propagated the leak.

Kind regards,

Job


Re: NTT-HE earlier today (~10am EDT)

2015-06-30 Thread Job Snijders
On Tue, Jun 30, 2015 at 05:40:03PM -0500, Jared Mauch wrote:
 We have been pushing large configurations to devices. You can check my
 slides from the London IEPG meeting. 

These are the slides: http://iepg.org/2014-03-02-ietf89/ietf89_iepg_jmauch.pdf

 When 96% of your config is prefix filters we are sure trying.
 
 I ask others to encourage your vendors to make this a priority as we
 have faced a number of issues in this area and have been waiting quite
 some time for vendor resolution. 

I'd like to add, that our average router config, since then has grown
with an extra 100k lines compared to those 2013 statistics. 

Kind regards,

Job


Re: NTT-HE earlier today (~10am EDT)

2015-06-30 Thread Randy Bush
 As Job Snijders said, I would forsee issues if i'd try to add an eleven 
 megabyte prefix-list on all devices in the network..

and that is why i stopped peering with HE.  i run origin validation;
issue roas please.

randy


Call for presentations EPF 10

2015-06-30 Thread Arnold Nipper
Call for Presentations
European Peering Forum 10

AMS-IX, DE-CIX, LINX, Netnod and guest IXP Equinix, are happy to host
the 10th European Peering Forum (EPF) in Madrid, Spain from the 21st
till the 23th of September 2015. The event will welcome up to 250
peering managers and coordinators from networks connected to the host
Internet exchanges. Besides an interesting topical agenda, the three-day
event accommodates room for attendees to meet on a one-to-one basis to
discuss bilateral peering business opportunities.

The programme committee will be looking for presentations and lightning
talks related to peering and technical topics of interconnection. Your
presentation should address

 * Interconnection Automation
 * Regional Peering
 * Interconnection and Peering Internet Governance and Regulatory Topics
 * Economic and Product Trends
 * Peering/Interconnection Strategy
 * Interesting findings about peering
 * 100GE


Submissions
===

Presentations must be of a non-commercial nature. Product or marketing
heavy talks are strongly discouraged.

Submissions of  presentations should be made to the programme committee
epf...@peering-forum.eu. Please include:

 * Author's name and e-mail
 * Presentation title
 * Abstract
 * Slides (if available)
 * Time requested

Deadlines
=

Presentation Abstract Deadline   2015-07-20 12:00 UTC
Final Selection of Speakers  2015-07-31
Presentation Slides Submission Deadline  2015-09-04 12:00 UTC

-- 
Arnold Nipper
CTO/COO and Co-Founder

DE-CIX Management GmbH | Lindleystrasse 12 | 60314 Frankfurt am Main |
Germany | www.de-cix.net | Phone +49 69 1730902 22 |
Mobile +49 172 2650958 | Fax +49 69 4056 2716 |
arnold.nip...@de-cix.net | Geschaeftsfuehrer Harald A. Summa |
Registergericht AG Koeln HRB 51135







signature.asc
Description: OpenPGP digital signature


Re: NTT-HE earlier today (~10am EDT)

2015-06-30 Thread Ca By
On Tuesday, June 30, 2015, Mike Leber mle...@he.net wrote:



 On 6/30/15 3:02 PM, Tore Anderson wrote:

 * Mike Leber

  I was thinking that when I posted yesterday.

 These were announcements from a peer, not customer routes.

 We are lowering our max prefix limits on many peers as a result of this.

 We are also going towards more prefix filtering on peers beyond bogons
 and martians.

 Hi Mike,

 You're not mentioning RPKI here. Any particular reason why not?

 If I understand correctly, in today's leak the origin AS was
 changed/reset, so RPKI ought to have saved the day. (At least Grzegorz'
 day, considering that 33 of AS43996's prefixes are covered by ROAs.)


 Yes, we will incorporate RPKI into how we build our prefix filters for
 peers as we improve our tools.

 Currently this will involve some amount of prefix list compression due to
 the limits of current hardware and the need to still have BGP converge.

 As Job Snijders said, I would forsee issues if i'd try to add an eleven
 megabyte prefix-list on all devices in the network..

 Mike.


It is NTT that would have mitigated this issue if they deployed and
enforcer rpki, right?


Re: OK, Google. Time to dial back the AI hype.

2015-06-30 Thread John Levine
Is the WSJ a wholly owned subsidiary of GOOG?  It looks to me like a WSJ 
journalist said that.

If you read the paper, which is linked from the article and takes
about five minutes, you'll find that article is cheap clickbait and
has approximately nothing to do with the topic of the paper.  As far
as I can tell, none of the people in the lengthy slashdot thread
bothered to do that.

ObNANOG: it's about a text chat app that can be loaded with various
text databases.  The first couple of examples use a tech support
database and the examples are impressively close to the kind of tech
support one gets from offshore script readers.  

The example quoted in the WSJ used a database of movie subtitles, so
it's not surprising that it reads like a bad movie script.

R's,
John