Re: Reliable Cloud host ?

2012-02-29 Thread Bobby Mac
HP has built an Openstack based cloud.  I got a beta account and things are
surprisingly stable.
hpcloud dot com

On Wed, Feb 29, 2012 at 1:12 PM, Tei oscar.vi...@gmail.com wrote:

 related to the topic:

 http://slashdot.org/story/12/02/29/153226/microsofts-azure-cloud-suffers-major-downtime

 --
 --
 ℱin del ℳensaje.




Cisco CSS 11503 SSL and reverse DNS

2010-05-18 Thread Bobby Mac
Hi All:

Will having correct reverse DNS mapping improve SSL performance on a 11503
during peak load?  My guess is no but I don't want to pound my prod device
to find out.

-Bobby


SNMP, Static NAT and management systems including servers midwear and applications

2010-03-02 Thread Bobby Mac
Hi All:

I have been asked to extend the capabilities of my current monitoring and
management system to another division of the company.  All IP space is
rfc1918 with no public routed space in the mix.  Needless to say, and
rightfully so, the network folks won't allow me to directly attach my
management network to theirs.

I use SNMP for system level monitoring for all servers via agents on the
servers (WIN and NIX).  Static NAT will be put into place but it breaks my
SNMP gets used by the noc to validate CPU, disk util ect..  In a quick test
NAT on my own network was set up and I can receive traps and parse them fine
even with the NAT as the current trap receiver and visualization can handle
incoming traps and NAT.   I can see system IP and peer IP fulfilling the two
sides. I know I can create an simple ALG via a Apache server with Perl to
execute the SNMP get on the foreign network.  Noc folks can see data and
import it into the ticket (no blind escalations).

My question is how have others handled SNMP and static NATs without a ground
up re-architecture.  I don't want to bring in new protocols and change my
systems as they are today due to the heavy integration with provisioning,
work flow and process flows.  They have worked well to date besides the huge
sunk $ investment in software and integration.

I have been looking for a complex ALG but there doesn't seem to be much out
there and I would rather not manipulate the payload,  but map it correctly.
Any suggestions?

-Bob


SSH brute force China and Linux: best practices

2010-01-29 Thread Bobby Mac
Hola Nanog:

So after many years of a hiatus from Linux,  I recently dropped XP in favour
of Fedora.  Now that my happy windows blinders are off, I see alarming
things.  Ugly ssh brute force, DNS server IP spoofing with scans and typical
script kiddie tactics.

What are the new set of best practices for those running a NIX home
computer.  Yes I have a firewall and I do peruse my logs on a regular
basis.

BTW: ever drop a malformed  URL to alert an admin to some thing that sucks?
w3.hp.com/execs/makes/too/much/money or
www.yourbuddiesdomain.com/it/is/all/rfc/space/use/1918/when/referring/to/non/routable

Thanks,
BobbyMac


Re: Conclusion: Smart hands in NYC area and new: Tokyo

2009-08-06 Thread Bobby Mac
Semi-on topic:
In 2005 I was working with NTTcom on creating a new webhosting offering.
 NTT was going to move 16 FULL racks of net and server gear from the lab, to
the next floor which was the actual datacenter. This required (due
to weight and space issues) that every server/net device had to be unracked
and uncabled.  The crew doing physical move also did the break down of
everything.

I inquired about the down time to the lab and how long the move would take.
 I was told that it would take about 8 hours.  I was
extremely pessimistic that this would happen and voiced my concern.  The
lead server admin reassured me that everything would be perfect and that
there would be no issues.  To prove the point,  he place a screw on top of
one of the servers and stated This will be in the same place tomorrow but
in the data center.

The move was 99.99% successful.  The exception was that some one plugged
fiber into the wrong port on a DB server but the aformentioned screw was in
the same place on the server.  Absolutely AMAZING!  I'll track down which
company provided the service.

-Robert



On Thu, Aug 6, 2009 at 5:07 AM, Elmar K. Bins e...@4ever.de wrote:

 Hello altogether,

 I got a couple of freelancers and a few tips which companies
 to use. I thought I'd at least share the company recommendations,
 of which I'll have the bosses pick.

 One other thing - I'll be needing the same thing in Tokyo by the
 end of the year. If anyone has recommendations, please don't hesitate.
 I'm not shy of travelling, but I'd rather save time and money there...

 Yours,
Elmar.


 Recommended companies:

 Team Silverback (www.teamsilverback.com)
 OnForce (www.onforce.com)
 Endeavor
 Xeta
 Blackbox
 Ledcor  (www.ltscompany.com)






Visio diag automations

2009-07-17 Thread Bobby Mac
Hi All:

I have to create Visio diagrams for sales engagements for a webhosting
provider.  I use the same template based on our standard architecture but
vary the number/model/detail of the servers.  I am sick of the cut-n-paste
approach and am wondering who has automated some of these processes.  What I
would like to do is provide a standard data file (excel, csv, ect..) and
have that populate the detailed areas of the diagram.  My boss won't pay for
any software but I can use open source under XP or cygwin.

Thanks,
Robert


Re: MX Record Theories

2009-05-28 Thread Bobby Mac
Not entirely on subject but  I thought that allowing DNS queries to
occur via TCP is mission critical for simple mail routing.  We ran across
this back in the day at @Home Network.  Firewall rules were changed to not
allow port 53 TCP.  This severely affected sending mail to large
distribution lists.  Here is what we found and forgive me if I don't go into
too much detail as it was almost 10 years a go.

If you add enough recipients to an email, each domain within the send line
needs to have an associated MX record.  DNS by default starts with UDP which
has a limit to the datagram size (64bit). A flag is placed in the
header which then requires the request to be sent via TCP (160bit V4).  Now
that single query can be split up into many different packets providing that
the request is more than the 160 bit and obviously IPV6 offers even more
information contained in a single packet.


-BobbyJim

On Tue, May 26, 2009 at 2:01 PM, valdis.kletni...@vt.edu wrote:

 On Tue, 26 May 2009 11:03:59 PDT, gb10hkzo-na...@yahoo.co.uk said:
  would be most interested to hear NANOG theories on the variety of MX
  record practices out there, namely, how come there seem to be so many
  ways employed to achieve the same goal ?

 The trick here is that it isn't always *exactly* the same goal.  There's
 multiple mail system architectures and design philosophies.

 One often overlooked but very important design point for the *large*
 providers:

 % dig aol.com mx
 ;; ANSWER SECTION:
 aol.com.2805IN  MX  15 mailin-01.mx.aol.com.
 aol.com.2805IN  MX  15 mailin-02.mx.aol.com.
 ...
 ;; WHEN: Tue May 26 14:40:41 2009
 ;; MSG SIZE  rcvd: 507

 That 507 is critically important if you want to receive e-mail from sites
 with fascist firewalls that block EDNS0 and/or TCP/53.  5 bytes left. ;)




Re: Dynamic IP log retention = 0?

2009-03-13 Thread Bobby Mac
Just wondering but the knowledge I have of DHCP is that an IP address is
assigned to the same computer (or host) and will continue to do so until the
pool of IP's is exhausted.  Once that occurs,  a new request is parsed by
the DHCP server and the oldest non-renewed lease address is checked to see
if it is live.  If no response occurs then the DHCP server assigns that IP
to the requesting host.  It's much more efficient to write once and check
that then it is to write everytime.This is done to save resources on the
DHCP server not much unlike the cache on a DNS server.  Every look up does
not travers the root servers and the auth server,  only those that have
expired cached entries.  Wouldn't it create a DOS against the DHCP server if
every host constantly required the server go through the aformentioned
process?  It does whit in DNS.  Change the expire to 2 and the ttl to 2 and
see what happens.  This did happen for boxsports dot com (what rhymes with
box? not sure of the legalities around saying the name). An SA, while
trouble shooting, did just that and about 1 month later BOOM! crap hit the
fan. It appearedd as though our DNS auth servers were being DOS'd but all
requests were legit.  The entry was not cached.

That said,  unless Covad is constantly exhausting it's pool or they mandate
that after the lease expires to give a different IP a reverse lookup would
give you the hostname of the offender which should remain accurate for some
amount of time.  No action on Covads part constitutes legal action on yoru
part...
-Bobbyjim
On Fri, Mar 13, 2009 at 8:53 AM, Joe Greco jgr...@ns.sol.net wrote:

  On Thu, Mar 12, 2009 at 8:52 PM, Joe Greco jgr...@ns.sol.net wrote:
  Well most port scanning is from compromised boxes.  Once a
  box is compromised it can be used for *any* sort of attack.
  If you really care about security you take reports of ports
  scans seriously.
  
   Yeahbut, the real problem is that port scanning is typically used as
   part of a process to infect _other_ boxes.  If you allow this sort of
   illness to spread, the patient (that is, the Internet) doesn't get
   better.
 
  Port scanning is the Internet equivelant of the common cold. They're a
 dime
  a dozen.
 
  I recommend taking some Vitamin B and D. Block, and Drop.

 No, it's more comparable to the jerk who not only doesn't stay at home
 with his cold, but actively walks around the workplace coughing and
 sneezing without covering his mouth/nose with a kleenex, spraying people.

 The reality is that it fails the if everybody did this, would it be a
 good thing test.  While some BD is common sense on the receiving end,
 this does not make it any more correct for the originating site to let it
 keep happening.  If every PC on the Internet (conservatively, let's
 assume a billion devices that are sufficiently sophisticated that they
 could be infected) were to send you a single packet per day, you'd be
 seeing over 10,000pps.  That should suggest that the behaviour is not
 something to be encouraged.

 My locking my doors does not mean it's okay for you to check if my door
 is locked.

 ... JG
 --
 Joe Greco - sol.net Network Services - Milwaukee, WI - http://www.sol.net
 We call it the 'one bite at the apple' rule. Give me one chance [and] then
 I
 won't contact you again. - Direct Marketing Ass'n position on e-mail
 spam(CNN)
 With 24 million small businesses in the US alone, that's way too many
 apples.