Re: more spaces in PTRs, this time totisp.net

2021-10-22 Thread Steven Champeon
on Fri, Oct 22, 2021 at 04:05:44AM +, Steven Champeon wrote:
> 
> Anyone?

FWIW, I took a look at my scans data and there's a lot of this around. Of
the 5477 PTRs with spaces, in approximately ~490 domains*, those with more
than twenty hosts with PTRs containing spaces are the following:

2178 bbox.fr (still)
 961 misc (basically, domains that don't exist, garbage rdns, etc.)
 255 yorku.ca
 203 hostforweb.com
 157 teknotel.com
 156 uncg.edu
 129 lacoe.edu
  55 is.co.mz
  52 uni-bonn.de
  41 ncsu.edu
  41 bell.ca**
  40 fuse.net
  36 dartmouth.edu
  27 gatech.edu
  26 uni-goettingen.de
  25 isu.edu
  25 csub.edu
  21 qut.edu.au

Anyone from these orgs that cares can contact me offlist for more info,
or as someone who saw the bbox.fr post did, forward to the relevant people
and ask them to do the same. FWIW, some involve leading, some involve
trailing, but most contain spaces in the labels themselves.

* FSVO "domain"
** I had a contact at bell.ca but she has since retired and they have 
apparently kept introducing more bad rDNS.

TIA,
Steve

-- 
hesketh.com/inc. v: +1(919)834-2552 f: +1(919)834-2553 w: http://hesketh.com/
Internet security and antispam hostname intelligence: http://enemieslist.com/


Re: Network visibility

2021-10-22 Thread Miles Fidelman




Seth Breidbart has the last word on this point, I think:

The Internet is "the largest equivalence class in the reflexive, 
transitive,
symmetric closure of the relationship 'can be reached by an IP packet 
from'."





The associated press can bite me.


Nice!

Miles

--
In theory, there is no difference between theory and practice.
In practice, there is.   Yogi Berra

Theory is when you know everything but nothing works.
Practice is when everything works but no one knows why.
In our lab, theory and practice are combined:
nothing works and no one knows why.  ... unknown



Re: Network visibility

2021-10-22 Thread Patrick W. Gilmore
> But I will capitalize Internet in all relevant uses.
> 
> This is an *engineering definition*, it matters that you name the right
> object, and I am one of the people who will, in fact, die on this hill.

You are not alone.


> The associated press can bite me.

While I respect and appreciate the AP (ap?) in general, in this particular 
instance, I am with you.

-- 
TTFN,
patrick


> On Oct 22, 2021, at 01:21, Jay R. Ashworth  wrote:
> - Original Message -
>> From: "Miles Fidelman" 
> 
>> Guys,
>> 
>> You guys were in grade school, some of us were there at the beginning
>> (well, in my case, 2 years after the beginning).  I can assure you that
>> folks made a big deal about what was and wasn't the Internet, and the
>> distinction between "an internet" and "the (capital I) Internet."
>> Opinions varied then, and opinions vary now.
>> 
>> But... by and large, as I understand the general zeitgeist:
>> 
>> - you're either on the Internet, or you're not - the key question is
>> whether you can send & receive IP packets from the public address space
>> (i.e., the classified segments are internets, but not part of THE
>> Internet).  There are also disagreements on where the Internet ends - at
>> the demarc, or at the IP stack in your machine (I argue the latter, but
>> that's debatable)
> 
> Seth Breidbart has the last word on this point, I think:
> 
> The Internet is "the largest equivalence class in the reflexive, transitive, 
> symmetric closure of the relationship 'can be reached by an IP packet from'."
> 
> The associated press has, in the last year or two, disparaged the 
> capitalization
> of the word Internet, proving they do not understand there's a difference.
> 
> If they won't capitalize "my" name, I won't capitalize theirs.
> 
> But I will capitalize Internet in all relevant uses.
> 
> This is an *engineering definition*, it matters that you name the right
> object, and I am one of the people who will, in fact, die on this hill.
> 
> The associated press can bite me.
> 
> Cheers,
> -- jra
> -- 
> Jay R. Ashworth  Baylink   
> j...@baylink.com
> Designer The Things I Think   RFC 2100
> Ashworth & Associates   http://www.bcp38.info  2000 Land Rover DII
> St Petersburg FL USA  BCP38: Ask For It By Name!   +1 727 647 1274


Weekly Global IPv4 Routing Table Report

2021-10-22 Thread Routing Analysis Role Account
This is an automated weekly mailing describing the state of the Internet
Global IPv4 Routing Table as seen from APNIC's router in Japan.

The posting is sent to APOPS, NANOG, AfNOG, SANOG, PacNOG, SAFNOG
TZNOG, MENOG, BJNOG, SDNOG, CMNOG, LACNOG and the RIPE Routing WG.

Daily listings are sent to bgp-st...@lists.apnic.net

For historical data, please see http://thyme.rand.apnic.net.

If you have any comments please contact Philip Smith .

Global IPv4 Routing Table Report   04:00 +10GMT Sat 23 Oct, 2021

Report Website: http://thyme.rand.apnic.net
Detailed Analysis:  http://thyme.rand.apnic.net/current/

Analysis Summary


BGP routing table entries examined:  867554
Prefixes after maximum aggregation (per Origin AS):  329940
Deaggregation factor:  2.63
Unique aggregates announced (without unneeded subnets):  419703
Total ASes present in the Internet Routing Table: 72150
Prefixes per ASN: 12.02
Origin-only ASes present in the Internet Routing Table:   61971
Origin ASes announcing only one prefix:   25553
Transit ASes present in the Internet Routing Table:   10179
Transit-only ASes present in the Internet Routing Table:348
Average AS path length visible in the Internet Routing Table:   4.4
Max AS path length visible:  53
Max AS path prepend of ASN (265020)  50
Prefixes from unregistered ASNs in the Routing Table:   920
Number of instances of unregistered ASNs:   924
Number of 32-bit ASNs allocated by the RIRs:  37600
Number of 32-bit ASNs visible in the Routing Table:   31219
Prefixes from 32-bit ASNs in the Routing Table:  145632
Number of bogon 32-bit ASNs visible in the Routing Table:22
Special use prefixes present in the Routing Table:1
Prefixes being announced from unallocated address space:417
Number of addresses announced to Internet:   3071270144
Equivalent to 183 /8s, 15 /16s and 221 /24s
Percentage of available address space announced:   83.0
Percentage of allocated address space announced:   83.0
Percentage of available address space allocated:  100.0
Percentage of address space in use by end-sites:   99.5
Total number of prefixes smaller than registry allocations:  288266

APNIC Region Analysis Summary
-

Prefixes being announced by APNIC Region ASes:   231716
Total APNIC prefixes after maximum aggregation:   66510
APNIC Deaggregation factor:3.48
Prefixes being announced from the APNIC address blocks:  227141
Unique aggregates announced from the APNIC address blocks:92521
APNIC Region origin ASes present in the Internet Routing Table:   12039
APNIC Prefixes per ASN:   18.87
APNIC Region origin ASes announcing only one prefix:   3422
APNIC Region transit ASes present in the Internet Routing Table:   1700
Average APNIC Region AS path length visible:4.6
Max APNIC Region AS path length visible: 37
Number of APNIC region 32-bit ASNs visible in the Routing Table:   7211
Number of APNIC addresses announced to Internet:  773052288
Equivalent to 46 /8s, 19 /16s and 215 /24s
APNIC AS Blocks4608-4864, 7467-7722, 9216-10239, 17408-18431
(pre-ERX allocations)  23552-24575, 37888-38911, 45056-46079, 55296-56319,
   58368-59391, 63488-64098, 64297-64395, 131072-151865
APNIC Address Blocks 1/8,  14/8,  27/8,  36/8,  39/8,  42/8,  43/8,
49/8,  58/8,  59/8,  60/8,  61/8, 101/8, 103/8,
   106/8, 110/8, 111/8, 112/8, 113/8, 114/8, 115/8,
   116/8, 117/8, 118/8, 119/8, 120/8, 121/8, 122/8,
   123/8, 124/8, 125/8, 126/8, 133/8, 150/8, 153/8,
   163/8, 171/8, 175/8, 180/8, 182/8, 183/8, 202/8,
   203/8, 210/8, 211/8, 218/8, 219/8, 220/8, 221/8,
   222/8, 223/8,

ARIN Region Analysis Summary


Prefixes being announced by ARIN Region ASes:254633
Total ARIN prefixes after maximum aggregation:   117512
ARIN Deaggregation factor: 2.17
Prefixes being announced from the ARIN address blocks:   254543
Unique aggregates announced from the ARIN address blocks:122065
ARIN Region origin ASes present in the Internet Routing Table:18927
ARIN Prefixes per ASN:

Anybody out there from Suddenlink AS19108?

2021-10-22 Thread Adam Korab
Ping me off-list if so.  Please and thank you.

--Adam


Re: IPv6 and CDN's

2021-10-22 Thread Mark Tinka




On 10/22/21 18:08, t...@pelican.org wrote:


I don't think it'll ever make money, but I think it will reduce costs.  CGNAT 
boxes cost money, operating them costs money, dealing with the support fallout 
from them costs money.  Especially in the residential space, where essentially 
if the customer calls you, ever, you just blew years' worth of margin.


The problem is accurately modelling cost reduction using native IPv6 in 
lieu of CG-NAT is hard when the folk that need convincing are the CFO's.


They are more used to "spend 1 to get 2". Convincing them to "save 2 by 
spending 1" - not as easy as one may think.


Mark.


Re: IPv6 and CDN's

2021-10-22 Thread Mark Tinka




On 10/22/21 17:45, Bryan Fields wrote:



Until IPv6 becomes provides a way to make money for the ISP, I don't see it
being offered outside of the datacenter.


It is being offered, it's just not being adopted.

We deliver an IPv6 /126 p2p and /56 or /48 onward assignment to all our 
DIA customers. No interest.


We deliver an IPv6 /125 p2p and eBGP session to all our IP Transit 
customers. 5/10 are interested.


You can only do what you can only do.

Mark.


Re: IPv6 and CDN's

2021-10-22 Thread Marco Davids via NANOG

Hi again,

Op 22-10-21 om 17:13 schreef Job Snijders:


Tl;DR


Not at all. This was a very interesting read! Thank you.

While pondering over it, I noticed that the ns[1234].fastly.net servers 
are nicely anycasted throughout the globe. If anyone could turn on IPv6 
on their authoritatives without therisk of loosing too much performance, 
I reckon it would be them... our Cloudflare. But they already did it. ;-).


> work in progress!

I have good hopes. Rumour has it that Fastly employs some very smart 
people. I'm sure we'll see nice things happening when the time is right.


--
Marco




Re: IPv6 and CDN's

2021-10-22 Thread t...@pelican.org
On Friday, 22 October, 2021 16:45, "Bryan Fields"  said:

> Until IPv6 becomes provides a way to make money for the ISP, I don't see it
> being offered outside of the datacenter.

I don't think it'll ever make money, but I think it will reduce costs.  CGNAT 
boxes cost money, operating them costs money, dealing with the support fallout 
from them costs money.  Especially in the residential space, where essentially 
if the customer calls you, ever, you just blew years' worth of margin.

My residential ISP here in the UK routes me (and every other subscriber) a /56 
without being asked.  (Their supplied CPE router just puts the first /64 on the 
LAN and refuses to process PD requests to hand out any of the other /64s, but 
baby steps...)

Cheers,
Tim.




Re: IPv6 and CDN's

2021-10-22 Thread Bryan Fields
On 10/22/21 11:13 AM, Job Snijders via NANOG wrote:
> Another aspect that flabbergasts me anno 2021 is how there *still* are
> BGP peering disputes between (more than two) major global internet service
> providers in which IPv6 is 'held hostage' as part of slow commercial
> negotiations. Surely end-to-end IPv6 connectivity should be a priority?

Even the DNS root servers are not 100% reachable via IPv6.  I would think IANA
would have some standard about reachability for root operators.

FWIW, I just was able to change my home office internet (I reside in the most
densely populated county of Florida).  The new provider sold me a dual stack
connection, however when they came to deliver it, there was no IPv6 as
promised.  After spending almost a week playing phone tag, I finally got some
one with clue.  I was told they have no support if IPv6 and no plans to ever
support IPv6 as there is no way to monetize it.

This leaves me in the same position as my prior circuit via the local cable
co. (no plans to offer IPv6) but at least it's faster than the 2 meg up cable
service.

Until IPv6 becomes provides a way to make money for the ISP, I don't see it
being offered outside of the datacenter.
-- 
Bryan Fields

727-409-1194 - Voice
http://bryanfields.net


Re: IPv6 and CDN's

2021-10-22 Thread Job Snijders via NANOG
Hi everyone, goedenmiddag Marco!

On Fri, Oct 22, 2021 at 01:40:42PM +0200, Marco Davids via NANOG wrote:
> We currently live in times where is actually fun to go IPv6-only. In my
> case, as in: running a FreeBSD kernel compiled without the IPv4-stack.

Indeed, this is fun experimentation. Shaking the (source code) trees
through excercises like these is a valuable way to identify gaps.

> It turns out that there underlying CDN's with domain names such as
> ‘l-msedge.net’ and ‘trafficmanager.net’ (Microsoft) or 'fastly.net', that
> reside on authoritative name servers that *only* have an IPv4 address.

As some observant readers noticed (hint: https://ip6.nl/#!deb.debian.org),
Fastly is working hard with select customers and friends to support IPv6
for everyone.

> I guess my question is simple: Why?
>
> Are there good architectural reason for this? Or is it just something
> that is overlooked and forgotten about?

The universal deployment of IPv6 appears to be a multi-decennial
multigenerational project. Allow me to shed some light on various
aspects.

One of the challenges faced by those wishing to deploy IPv6 (compared to
IPv4) is how from a BGP Default-Free Zone perspective, IPv4 and IPv6 are
not alike at all! The Internet's IPv6 routing topology is vastly
different from the IPv4 topology.

The above phenomenon is perfectly understandable following from the fact
that IPv4 predates IPv6 - and IP networks grow as they grow. In a
perfect world the IPv6 network would grow perfectly congruent alongside
the global IPv4 network. In this perfect world indeed IPv6 can "just be
enabled", and used whenever available!

Unfortunately the reality of the situation is far more chaotic! For
example if you look at PeeringDB's 'netixlan' table, large discrepancies
between the number of absent IPv4 entries and absent IPv6 entries are
visible:

$ curl -s https://peeringdb.com/api/netixlan | jq '.' | fgrep -c 
'"ipaddr4": null'
1286

$ curl -s https://peeringdb.com/api/netixlan | jq '.' | fgrep -c 
'"ipaddr6": null'
8160

>From the above it's implied that the density of the 'IPv4 mesh' is much
higher than the density and diversity of the 'IPv6 mesh', simply because
more operators present more IPv4 traffic-exchange opportunities to other
operators - compared to IPv6. This has performance implications.

Another aspect that flabbergasts me anno 2021 is how there *still* are
BGP peering disputes between (more than two) major global internet service
providers in which IPv6 is 'held hostage' as part of slow commercial
negotiations. Surely end-to-end IPv6 connectivity should be a priority?

Anyway, back to your question: content delivery networks who leverage
all possible technical knobs and buttons to increase performance (such
as BGP traffic engineering) might be reluctant to offer IPv6 services
"as if they are the same as IPv4". More study is required.

Tl;DR - work in progress! :-)

Kind regards,

Job

ps. Have you tried running an IPv6-only RPKI validator? About 1.4% of
RPKI VRPs appears to be 'missing' in IPv6-only environments :-/


Re: IPv6 and CDN's

2021-10-22 Thread Matthew Walster
On Fri, 22 Oct 2021, 13:03 Jens Link,  wrote:

> I ran into this some time ago with deb.debian.org on an IPv6 only Debian
> VM with a locally installed resolver. I opened a ticket which was closed
> in record time: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961296
>
> After some ranting and shouting it now works
>

I'm going to post the relevant message here:

> Sometimes I wonder why I report bugs..
>
> But your answer was the answer I was expecting. Thanks for noting.
>
> So I can summarize this as "The Debian Project doesn't care if IPv6 is
working"?

Jens, you went into that ticket looking for a fight, in a place staffed by
largely unpaid volunteers, choosing to belittle their efforts and then
attempting to shame them into action.

You even chose to mark the bug severity higher than the default, despite
you having chosen that mirror for your install.
https://www.debian.org/Bugs/Developer#severities

Marco explained to you that the mirror network has plenty of selections to
make, but you choose to make a fuss about one supported option not working
to a standard the rest of the community pretty much agrees is nowhere near
attainable at this time. Using netselect
https://packages.debian.org/stable/net/netselect to choose a reachable
mirror with the lowest latency would have easily mitigated this issue for
you.

DNS64 and NAT64 are going to be with us for a very long time, and if you
refuse to support IPv4 even through a translation layer then it is clear
you are acting against the interests of further IPv6 adoption by
associating IPv6 issues with zealotry. The apathy sometimes associated with
IPv6 support today is because of this perceived high effort low reward
nature of confrontation.

I would strongly advise you apologise to Marco for your grandstanding, and
adopt a more constructive way of furthering your ideology. The NANOG code
of conduct clearly states:

https://www.nanog.org/about/code-conduct/

> In the spirit of mutual respect and collaboration, NANOG does not
tolerate any unwelcome behavior, including but not limited to:
> * Aggressively pushing your own services, products, or causes.
> [...]

Please join the rest of us in advocating for IPv6 adoption, rather than the
current bullying tactics you seem to be choosing that wins the battle and
loses the war. We are all friends* here. You can be a great asset in this
effort we should all seek.

M


*FSVO friends, obvs.


Re: DOJ files suit to enforce FCC penalty for robocalls

2021-10-22 Thread Dovid Bender
We have telco's registered in the US, Cyprus and Israel. Lately I'm Europe
we have been getting emails from people using protonmail. The conversation
dies one we ask for business registration documents.

On Thu, Oct 21, 2021, 16:14 Aaron C. de Bruyn via NANOG 
wrote:

> My normal test for this is to register a new domain name and leave my
> whois info public.
>
> Over the span of 1-2 weeks I will usually get 50-100 calls from people
> with a certain accent asking for a  mispronunciation of my name and if I
> need a website developed.  Then I forward them over to my spam recording
> line.
>
> I registered a handful of new domains this week, and I've had less than 5
> calls so far.
>
> -A
>
>
> On Thu, Oct 21, 2021 at 12:13 PM Michael Thomas  wrote:
>
>>
>> On 10/21/21 10:57 AM, Sean Donelan wrote:
>> >
>> > The multi-million dollar fines announced with great fanfaire by the
>> > Federal Communication Commission are almost never collected. The FCC
>> > doesn't have enforcement authority to collect fines. The FCC usually
>> > withholds license renewals until penalties are paid. If the violator
>> > doesn't have any FCC licenses (or doesn't care), the FCC is powerless.
>> >
>> > The FCC refers uncollected penalties to the Department of Justice. In
>> > the past, DOJ didn't prioritize uncollected penalties and most fines
>> > were never enforced.
>> >
>> >
>> > The Department of Justice Files Suit to Recover $9.9 Million
>> > Forfeiture Penalty for Nearly 5,000 Illegally Spoofed Robocalls
>> >
>> >
>> https://www.justice.gov/opa/pr/department-justice-files-suit-recover-forfeiture-penalty-nearly-5000-illegally-spoofed
>> >
>>
>> So has any of the STIR/SHAKEN stuff that was mandated made any
>> difference on the ground yet? I assume this is different than what you
>> posted about though.
>>
>> Mike
>>
>>


Re: Questions about IRR best practices

2021-10-22 Thread Rubens Kuhl
> 2. On the ARIN side, when ARIN-NONAUTH goes away next year, does that do away 
> with our ability to do proxy route objects? Do we need to require all of our 
> BGP customers to set up their own IRRs?

Not only ARIN. LACNIC and TC (the two IRRs covering the LAC region, TC
for Brazil, LACNIC for Mexico and other Latin American countries) have
strict non-proxy policies, and there is no -NONAUTH scape route.

> 3. On the RADb side, if we're turning up a new customer that doesn't have an 
> IRR, and another ISP already has a proxy registration for that customer, is 
> it sufficient for us to add that customer's AS to our customer AS-SET?

The problem with that is all of sudden the covering object could disappear.


Rubens


Re: Questions about IRR best practices

2021-10-22 Thread Job Snijders via NANOG
Dear Lee,

*ring ring* - "IRR/RPKI helpdesk how may I help you today?" :-)

On Fri, Oct 22, 2021 at 08:25:10AM -0500, Lee Fawkes wrote:
> I have a couple of questions about best practices for Internet Routing
> Registries. I'm able to find lots of documentation about *how* to do
> things, but not a lot of documentation about when I *should* do things. I
> work for a medium-sized ISP in the US, and we are currently using both RADb
> and the ARIN IRR. We peer all over the place, but my main concern is how
> Cogent and Hurricane Electric build prefix filters from our IRRs.
> 
> 1. Netflix is asking us to add the AS of a downstream customer of one of
> our customers to our customer AS-SET. We have a direct relationship with
> this organization's provider, but not with this organization itself. Is
> this appropriate?

Another way to satisfy this request is to ask the organization's
provider to create an AS-SET (preferably RIR-operatored IRR such as
ARIN, RIPE, etc), and then reference their AS-SET on your own AS-SET.
IRR AS-SETs permit both referencing AS Numbers and AS-SETs as 'members:'.

> 2. On the ARIN side, when ARIN-NONAUTH goes away next year, does that
> do away with our ability to do proxy route objects? Do we need to
> require all of our BGP customers to set up their own IRRs?

The industry trend (very noticable the last 3 years) is that the ability
to create proxy route object registrations is slowly fading away.

At at first glance proxy registrations seem better than 'no
registration', the downside is that anyone can create proxy
registrations for any prefix: proxies are not very safe!

The recommendation is that each and every IP resource holder creates IRR
and/or RPKI objects themselves, or delegates the authority to do so to
their service provider.

These days everyone wants to see firm cryptographic proof!

> 3. On the RADb side, if we're turning up a new customer that doesn't have
> an IRR, and another ISP already has a proxy registration for that customer,
> is it sufficient for us to add that customer's AS to our customer AS-SET?

Technically this is likely to work, but the downside is that you end up
with a hard dependency on another ISP's proxy registration. If for
whatever reason that registration lapses (failure to pay bills, M, who
knows) ... you might end up with a hard to troubleshoot situation where
it is not immediately clear "it was working yesterday, but not today?!".

The best course of action is to ensure that objects are either managed
by yourself, or by the customer, so the responsibilities and object
ownership are clear to everyone involved.

> I've been getting around the fact that RADb doesn't allow multiple
> proxy registrations by registering proxy route objects in
> ARIN-NONAUTH, but that won't be an option much longer, and I can't
> really experiment with our customers' route objects to see what works.

A great tool to gain some insight into various IRR/BGP/RPKI data sources
and what the registration status of various objecst might mean can be
found at this awesome tool: https://irrexplorer.nlnog.net/

Follow up questions welcome!

Kind regards,

Job


Questions about IRR best practices

2021-10-22 Thread Lee Fawkes
 Good morning Operators;

I have a couple of questions about best practices for Internet Routing
Registries. I'm able to find lots of documentation about *how* to do
things, but not a lot of documentation about when I *should* do things. I
work for a medium-sized ISP in the US, and we are currently using both RADb
and the ARIN IRR. We peer all over the place, but my main concern is how
Cogent and Hurricane Electric build prefix filters from our IRRs.

1. Netflix is asking us to add the AS of a downstream customer of one of
our customers to our customer AS-SET. We have a direct relationship with
this organization's provider, but not with this organization itself. Is
this appropriate?

2. On the ARIN side, when ARIN-NONAUTH goes away next year, does that do
away with our ability to do proxy route objects? Do we need to require all
of our BGP customers to set up their own IRRs?

3. On the RADb side, if we're turning up a new customer that doesn't have
an IRR, and another ISP already has a proxy registration for that customer,
is it sufficient for us to add that customer's AS to our customer AS-SET?

I've been getting around the fact that RADb doesn't allow multiple proxy
registrations by registering proxy route objects in ARIN-NONAUTH, but that
won't be an option much longer, and I can't really experiment with our
customers' route objects to see what works.

Thanks!
-Lee Fawkes


Re: Providing IPv4 Services in an IPv6 Backbone

2021-10-22 Thread Mark Tinka




On 10/22/21 15:19, Jason Iannone wrote:

Thanks for sharing. Maybe I have blinders on, but LDPv6 and the v6 SR 
flavors don't have much use if v4 CE sites aren't supported.


Indeed. If your goal is an IPv6-only network with IPv6-only services, 
then Nokia may have an answer for you.


But if you want IPv4-as-a-Service over an IPv6-only network (4PE or 
4VPE), then I'd recommend beating up the vendors.


I'd start with Nokia, since by all accounts, they seem to be leading the 
charge at this point.


Mark.


Re: Providing IPv4 Services in an IPv6 Backbone

2021-10-22 Thread Jason Iannone
Thanks for sharing. Maybe I have blinders on, but LDPv6 and the v6 SR
flavors don't have much use if v4 CE sites aren't supported.

Jason


On Fri, Oct 22, 2021 at 12:56 AM Mark Tinka  wrote:

>
>
> On 10/21/21 21:18, Jason Iannone wrote:
>
> >
> > Hi all,
> >
> > Have there been any gap closures on RFC7439? I am particularly
> > interested in 4PE, 4VPE, and other MPLS enabled services like L3VPN,
> > NG-MVPN, E-Line, E-LAN, and EVPN. Does Juniper have an
> > "ipv4-tunneling" mpls keyword?
>
> I posted this here earlier this month:
>
> https://mailman.nanog.org/pipermail/nanog/2021-October/215609.html
>
> Unaware of any other vendor who claims to have solved this problem.
>
> Mark.
>


Re: IPv6 and CDN's

2021-10-22 Thread Lukas Tribus
Hello,

client side IPv6-only is one thing, but IPv6-only recursive DNS
resolution is probably so niche that content providers and CDN's do
not particularly care at this point in time.

On the other hand, there is probably no good reason to run
authoritative DNS servers without IPv6 connectivity.


Lukas


Re: IPv6 and CDN's

2021-10-22 Thread Marco Davids via NANOG

On second thoughts...

I seem to have been confused by the 'no  records for fastly.net' (as 
a DNS-purist: that should have said "ns[1234].fastly.net" instead, to 
make it relevant). ;-)


I ran into this some time ago with deb.debian.org 


Right.

So please ignore:


Just for the record; your issue is slightly different:

You wrote:

"deb.debian.org is a CNAME for debian.map.fastly.net. There are no  
records for fastly.net so any DNS querys from an IPv6 only resolver will 
not work."



--
Marco


Re: IPv6 and CDN's

2021-10-22 Thread Mark Tinka




On 10/22/21 14:03, Jens Link wrote:


I don't think it was overlooked or forgotten. More along

"We have always done it this way", "We had problems enabling IPv6 (ages
ago)" or something else you can find on https://ipv6excuses.com/.


I think it's a combination of both... they tried back in the day, it 
broke, and they "parked" it for later.


When Marketing and The World were happy to see that 
www.insert-favorite-content-url-here.com had  and IPv6 PTR records, 
who cared whether boring, little-known FQDN's were remembered or not.


And then, all the engineers moved on to some other gig, where they did 
better because, why not?


Mark.


Re: IPv6 and CDN's

2021-10-22 Thread Marco Davids via NANOG

Hi Jens,

Op 22-10-21 om 14:03 schreef Jens Link:


I ran into this some time ago with deb.debian.org on an IPv6 only Debian
VM with a locally installed resolver. I opened a ticket which was closed
in record time: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961296


Just for the record; your issue is slightly different:

You wrote:

"deb.debian.org is a CNAME for debian.map.fastly.net. There are no  
records for fastly.net so any DNS querys from an IPv6 only resolver will 
not work."


At the moment debian.map.fastly.net has an -record though.

The thing is; the authoritative name servers of fastly.net are only 
willing to hand out that -record via IPv4. So it still doesn't work 
with the (locally installed) IPv6-only resolver ;-)


Cheers,

--
Marco


Re: IPv6 and CDN's

2021-10-22 Thread Jens Link
Marco Davids via NANOG  writes:

> It turns out that there underlying CDN's with domain names such as
> ‘l-msedge.net’ and ‘trafficmanager.net’ (Microsoft) or 'fastly.net',
> that reside on authoritative name servers that *only* have an IPv4
> address.

Fastly does have IPv6 enabled authoritative DNS server but it looks like
it's not the default.

I ran into this some time ago with deb.debian.org on an IPv6 only Debian
VM with a locally installed resolver. I opened a ticket which was closed
in record time: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961296

After some ranting and shouting it now works but a couple of days
ago I ran in the same problem while trying to install something via
pip. fles.pythonhosted.org is also using fastly. 

> I guess my question is simple: Why?

I'm asking myself the same question.

> Are there good architectural reason for this? Or is it just something
> that is overlooked and forgotten about?

I don't think it was overlooked or forgotten. More along 

"We have always done it this way", "We had problems enabling IPv6 (ages
ago)" or something else you can find on https://ipv6excuses.com/.

Jens
-- 

| Delbrueckstr. 41| 12051 Berlin, Germany   | +49-151-18721264 |
| http://blog.quux.de | jabber: jensl...@quux.de| ---  | 



IPv6 and CDN's

2021-10-22 Thread Marco Davids via NANOG

Hi!

We currently live in times where is actually fun to go IPv6-only. In my 
case, as in: running a FreeBSD kernel compiled without the IPv4-stack.


A few years back doing such thing was mostly disappointing, but nowadays 
is actually quite doable and entertaining.


So, the other day I decided to take this experiment to the next level by 
disconnecting my local resolver from IPv4 as well.


Then things started to break. LinkedIn, Bing, Openstreetmap... Although 
they all work great on IPv6-only, now they no longer did.


It turns out that there underlying CDN's with domain names such as 
‘l-msedge.net’ and ‘trafficmanager.net’ (Microsoft) or 'fastly.net', 
that reside on authoritative name servers that *only* have an IPv4 address.


I guess my question is simple: Why?

Are there good architectural reason for this? Or is it just something 
that is overlooked and forgotten about?


I would love to find out!

Thank you.

--
Marco

This is also fun by the way. Look at that nice banner on 
https://clintonwhitehouse2.archives.gov/ :-)


Re: more spaces in PTRs, this time totisp.net

2021-10-22 Thread Mark Andrews
\032 is space. Go read STD13 aka RFC 1034 and RFC 1035. 

-- 
Mark Andrews

> On 22 Oct 2021, at 16:40, Owen DeLong via NANOG  wrote:
> 
> \032 is not a space.
> 
> Decimal 32 (0x20, \040) is a space.
> \032 is a Ctrl-Z (26 decimal, 0x1a)
> 
> Owen
> 
> 
>> On Oct 21, 2021, at 22:14 , Mel Beckman  wrote:
>> 
>> Typo I’d say. DB-drive  DNS servers, which don’t keep their entries in 
>> traditional PTR-record text format, can fall victim to this. Rather than 
>> parse the text every times, they just spit out whatever is in the table 
>> column, even if it has embedded spaces. I’ve seen this happen in SnitchDNS. 
>> 
>> -mel via cell
>> 
 On Oct 21, 2021, at 9:08 PM, Steven Champeon  wrote:
>>> 
>>> 
>>> Anyone?
>>> 
>>> 1.179.154.11:1-179-180.11.cisp.totisp.\\ net
>>> 
>>> dig -x 1.179.154.11
>>> 
>>> 11.154.179.1.in-addr.arpa. 7200INPTR
>>> 1-179-180.11.cisp.totisp.\032net.
>>> 
>>> -- 
>>> hesketh.com/inc. v: +1(919)834-2552 f: +1(919)834-2553 w: 
>>> http://hesketh.com/
>>> Internet security and antispam hostname intelligence: 
>>> http://enemieslist.com/
> 


Re: more spaces in PTRs, this time totisp.net

2021-10-22 Thread Ray Bellis



On 22/10/2021 06:39, Owen DeLong via NANOG wrote:
> \032 is not a space.
> 
> Decimal 32 (0x20, \040) is a space.
> \032 is a Ctrl-Z (26 decimal, 0x1a)


In DNS zone files (and dig's presentation format) backslashed numbers
are in decimal, not octal - RFC 1035, §5.1.

Ray



Re: more spaces in PTRs, this time totisp.net

2021-10-22 Thread t...@pelican.org
On Friday, 22 October, 2021 06:39, "Owen DeLong via NANOG"  
said:

> \032 is not a space.
> 
> Decimal 32 (0x20, \040) is a space.
> \032 is a Ctrl-Z (26 decimal, 0x1a)

So, someone trying to "undo" in a GUI editor, or a failed attempt to exit 'vi'?

Cheers,
Tim.




Fort - Now Available as a FreeBSD Port

2021-10-22 Thread Mark Tinka
For those who run FreeBSD, the Fort RPKI validator is now available in 
the ports tree:


https://www.freshports.org/net/fort/

Many thanks to Toni Kalombo for submitting and maintaining the port, and 
to Philip Paeps to committing it.


I've also sent a note to the Fort developers to update the installation 
information for FreeBSD.


Mark.

Re: more spaces in PTRs, this time totisp.net

2021-10-22 Thread Mel Beckman
Owen,

Ah, so a cross-base typo!  :)

-mel via cell

> On Oct 21, 2021, at 10:40 PM, Owen DeLong  wrote:
> 
> \032 is not a space.
> 
> Decimal 32 (0x20, \040) is a space.
> \032 is a Ctrl-Z (26 decimal, 0x1a)
> 
> Owen
> 
> 
>> On Oct 21, 2021, at 22:14 , Mel Beckman  wrote:
>> 
>> Typo I’d say. DB-drive  DNS servers, which don’t keep their entries in 
>> traditional PTR-record text format, can fall victim to this. Rather than 
>> parse the text every times, they just spit out whatever is in the table 
>> column, even if it has embedded spaces. I’ve seen this happen in SnitchDNS. 
>> 
>> -mel via cell
>> 
 On Oct 21, 2021, at 9:08 PM, Steven Champeon  wrote:
>>> 
>>> 
>>> Anyone?
>>> 
>>> 1.179.154.11:1-179-180.11.cisp.totisp.\\ net
>>> 
>>> dig -x 1.179.154.11
>>> 
>>> 11.154.179.1.in-addr.arpa. 7200INPTR
>>> 1-179-180.11.cisp.totisp.\032net.
>>> 
>>> -- 
>>> hesketh.com/inc. v: +1(919)834-2552 f: +1(919)834-2553 w: 
>>> http://hesketh.com/
>>> Internet security and antispam hostname intelligence: 
>>> http://enemieslist.com/
>