Re: COVID-19 vs. our Networks

2020-03-18 Thread Dan White

On 03/18/20 09:29 -0500, Blake Hudson wrote:



On 3/17/2020 1:54 PM, Dan White wrote:

On 03/17/20 14:38 -0400, Rich Kulawiec wrote:

On Tue, Mar 17, 2020 at 08:38:28AM -0700, Mike Bolitho wrote:

That's the good news.   Here's the bad news: in about 2-3 weeks, when
our health care systems are stretched to the breaking point, there will
be a window of opportunity for adversaries to maximize the damage.


On a slightly tangential topic, we had a dictionary attack against 
customer voice accounts over night, presumably to implement toll fraud.

We were in the middle of working out work-from-home plans and were quite
distracted with other things. We managed to get on top of it quickly
once someone noticed.

Attackers taking advantage of this situation is a serious concern.

Dan, we're aware of another telco that ran into a similar fraud 
situation last week. They stood up some more restrictive ACLs to 
combat the fraud, but broke VoIP RTP in the process. 'Hit em while 
they're occupied' type of attacks I guess should be expected right 
now. As my grandmother would say: an ounce of prevention is worth a 
pound of cure.


Hey Blake,

I appreciate that. We've got two tendencies going on here at the moment:

1) Man the ship of operations. Stay alert and fix the problems that arise.
Be totally reactive, and be the "hero".

2) Increase visibility and focus on network design. Move planned upgrades
up a few weeks/months. Be proactive.

Option 2 is the better long term option, but the risk is that any change,
while short staffed is going to run the risk of unintended consequences. Basically it's 
"If it's not broke, don't fix it." and "Be very paranoid about what you touch.

--
Dan White
Network Admin Lead


Re: COVID-19 vs. our Networks

2020-03-17 Thread Dan White

On 03/17/20 14:38 -0400, Rich Kulawiec wrote:

On Tue, Mar 17, 2020 at 08:38:28AM -0700, Mike Bolitho wrote:

Anybody who works in the healthcare vertical will tell you just how
bad medical devices are to work with from an IT perspective.


Medical devices are appallingly bad to work with from an IT perspective.

They're designed and built to work in idealized environments that don't
exist, they make unduly optimistic assumptions, they completely fail to
account for hostile actors, and whenever possible they are gratuitously
incompatible to ensure vendor lock-in.

That's the good news.   Here's the bad news: in about 2-3 weeks, when
our health care systems are stretched to the breaking point, there will
be a window of opportunity for adversaries to maximize the damage.


On a slightly tangential topic, we had a dictionary attack against customer
voice accounts over night, presumably to implement toll fraud. We were in
the middle of working out work-from-home plans and were quite distracted
with other things. We managed to get on top of it quickly once someone
noticed.

Attackers taking advantage of this situation is a serious concern.

--
Dan White
Network Admin Lead


Re: AT is suspending broadband data caps for home internet customers due to coronavirus

2020-03-17 Thread Dan White

On 03/17/20 19:25 +0100, Alexandre Petrescu wrote:


Le 17/03/2020 à 19:17, Dan White a écrit :

Things have been eerily quiet where we are (Oklahoma). We're an eyeball
network and have had no noticeable changes in bandwidth usage that 
couldn't

be explained by statistical noise.

We keep game planning more and more contingency scenarios, waiting 
to jump when needed, but things have just been unexpectedly normal.


Perhaps we're behind the game in impact. I'd be curious to hear about
networks that are "ahead of us", and what the impact has been.


I am not a sysadmin of a Network, but a few hours in advance.

The bad news: I can ask you how many cases in Oklahoma?

The good news: there is news about medication.


By "ahead of us", I'm hoping to glean some operational experience from
European, or networks in larger cities with a more impactful lock
down.

We seem to be going down the same lines of lock downs, and shelf clean
outs, just a few days/weeks behind what I've been seeing in the news.

I get nervous anytime I hear a school administrator or public official
blast out "or binge-watch your favorite shows on Netflix, and of course,
wash your hands a lot!"

Fortunately the health impact has been minimal here.

--
Dan White
Network Admin Lead


Re: AT is suspending broadband data caps for home internet customers due to coronavirus

2020-03-17 Thread Dan White

Things have been eerily quiet where we are (Oklahoma). We're an eyeball
network and have had no noticeable changes in bandwidth usage that couldn't
be explained by statistical noise.

We keep game planning more and more contingency scenarios, waiting to jump
when needed, but things have just been unexpectedly normal.

Perhaps we're behind the game in impact. I'd be curious to hear about
networks that are "ahead of us", and what the impact has been.

On 03/15/20 02:30 +, John van Oppen wrote:

We are seeing the peak spread out…   we carry mostly pacific northwest 
residential networks…  we are also seeing new, slightly higher evening peaks.

From: NANOG  On Behalf Of Rishi Singh
Sent: Friday, March 13, 2020 8:25 AM
To: Jared Mauch 
Cc: nanog@nanog.org
Subject: Re: AT is suspending broadband data caps for home internet customers 
due to coronavirus

Curious if anyone here (especially at CenturyLink / AT/ Comcast) has seen any 
graphs of network traffic over time and could share details (redacted of course due 
to the sensitivity). Would love to hear if/how capacity is constrained with more 
people working form home.

On Thu, Mar 12, 2020 at 4:36 PM Jared Mauch 
mailto:ja...@puck.nether.net>> wrote:
I do worry if the broadband networks have the capacity. WFH traffic is usually 
different from regular consumer traffic. My neighbors were telling me about the 
mandatory work from home they had today and how the VPN struggled to work.

To those upgrading those things, keep at it. You will get there.

Sent from my iCar


On Mar 12, 2020, at 6:29 PM, Sean Donelan 
mailto:s...@donelan.com>> wrote:


The first data cap waiver I've seen due to coronavirus.  I expect other ISPs to 
quickly follow.

https://www.vice.com/en_us/article/v74qzb/atandt-suspends-broadband-usage-caps-during-coronavirus-crisis

AT is the first major ISP to confirm that it will be suspending all broadband 
usage caps as millions of Americans bunker down in a bid to slow the rate of 
COVID-19 expansion. Consumer groups and a coalition of Senators are now pressuring 
other ISPs to follow suit.


--
Dan White
Network Admin Lead


Re: End to End testing

2019-12-12 Thread Dan White

We've used Accedian MetroNIDs to do this.

On 12/12/19 14:53 +, Fawcett, Nick via NANOG wrote:

Anyone have any suggestions on devices that I can put at two points in the 
network to test packet loss, latency, jitter etc.  I was thinking of maybe 
engineering my own using a couple of pi's,  but the downfall is they don't have 
SFP ports.  I'm looking for something that's portable and easy to configure and 
drop in.  Thanks.

~Nick


--
Checked by SOPHOS http://www.sophos.com


--
Dan White
BTC Broadband
Network Admin Lead
Ph  918.366.0248 (direct)   main: (918)366-8000
Fax 918.366.6610email: dwh...@mybtc.com
http://www.btcbroadband.com


Re: lots of traffic starting at 3 a.m. central time

2019-10-15 Thread Dan White

Here's a graph of our eyeball network traffic (CDT):

https://ibb.co/kJQYKMq

This is an unprecedented increase in traffic for us, day or night, outside
of DDOS traffic.

Our traffic monitoring system identifies this a Akamai traffic.

On 10/15/19 15:54 +, Luke Guillory wrote:

That’s what I’m seeing as well, went  from 2.2G around 2:50AM CST to a peak

+of 16G.


https://i.imgur.com/en89kyO.png

Luke Guillory
Vice President – Technology and Innovation

From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of Phil Lavin
Sent: Tuesday, October 15, 2019 10:48 AM
To: Aaron Gould; Nanog@nanog.org
Subject: RE: lots of traffic starting at 3 a.m. central time

> Anyone else see lots of traffic coming down starting at 3 a.m. central
> time ?  all of my internet connections showed strangely larger load for a
> few early morning hours.
>
> Someone, on another list, mentioned a 70% increase in traffic to Akamai
> which seems to correlate with a new Fortnite release



--
Dan White
BTC Broadband
Network Admin Lead
Ph  918.366.0248 (direct)   main: (918)366-8000
Fax 918.366.6610email: dwh...@mybtc.com
http://www.btcbroadband.com


Re: BGP prefix filter list

2019-05-15 Thread Dan White

On 05/15/19 13:58 +, Phil Lavin wrote:

We're an eyeball network. We accept default routes from our transit
providers so in theory there should be no impact on reachability.

I'm pretty concerned about things that I don't know due to inefficient
routing, e.g. customers hitting a public anycast DNS server in the wrong
location resulting in Geolocation issues.


Ah! Understood. The default route(s) was the bit I missed. Makes a lot of
sense if you can't justify buying new routers.

Have you seen issues with Anycast routing thus far? One would assume that
routing would still be fairly efficient unless you're picking up transit
from non-local providers over extended L2 links.


We've had no issues so far but this was a recent change. There was no
noticeable change to outbound traffic levels. 


--
Dan White
BTC Broadband
Network Admin Lead
Ph  918.366.0248 (direct)   main: (918)366-8000
Fax 918.366.6610email: dwh...@mybtc.com
http://www.btcbroadband.com


Re: BGP prefix filter list

2019-05-15 Thread Dan White

On 05/15/19 13:44 +, Phil Lavin wrote:

We recently filtered out >=/24 prefixes since we're impacted by 768k day.


What kind of network are you running? Doing such prefix filtering on an
eyeball network strikes me as insane - you'd be cutting off customers from
huge swathes of the Internet (including small companies like us) that don't
have large IPv4 sequential allocations.


We're an eyeball network. We accept default routes from our transit
providers so in theory there should be no impact on reachability.

I'm pretty concerned about things that I don't know due to inefficient
routing, e.g. customers hitting a public anycast DNS server in the wrong
location resulting in Geolocation issues.

--
Dan White
BTC Broadband
Network Admin Lead
Ph  918.366.0248 (direct)   main: (918)366-8000
Fax 918.366.6610email: dwh...@mybtc.com
http://www.btcbroadband.com


Re: BGP prefix filter list

2019-05-15 Thread Dan White

We recently filtered out >=/24 prefixes since we're impacted by 768k day.
I'm attaching our lightly researched list of exceptions. I'm interested in
what others' operational experience is with filtering in this way.

Filtering /24s cut our table down to around 315K.

On 05/15/19 13:43 +0200, Baldur Norddahl wrote:

Hello

This morning we apparently had a problem with our routers not handling 
the full table. So I am looking into culling the least useful prefixes 
from our tables. I can hardly be the first one to take on that kind of 
project, and I am wondering if there is a ready made prefix list or 
similar?


Or maybe we have a list of worst offenders? I am looking for ASN that 
announces a lot of unnecessary /24 prefixes and which happens to be 
far away from us? I would filter those to something like /20 and then 
just have a default route to catch all.


Thanks,

Baldur



--
Dan White
BTC Broadband
Network Admin Lead
Ph  918.366.0248 (direct)   main: (918)366-8000
Fax 918.366.6610email: dwh...@mybtc.com
http://www.btcbroadband.com
ip prefix-list root-dns seq 1 permit 198.41.0.0/24
ip prefix-list root-dns seq 2 permit 199.9.14.0/24
ip prefix-list root-dns seq 3 permit 192.33.4.0/24
ip prefix-list root-dns seq 4 permit 199.7.91.0/24
ip prefix-list root-dns seq 5 permit 192.203.230.0/24
ip prefix-list root-dns seq 6 permit 192.5.5.0/24
ip prefix-list root-dns seq 7 permit 192.112.36.0/24
ip prefix-list root-dns seq 8 permit 198.97.190.0/24
ip prefix-list root-dns seq 9 permit 192.36.148.0/24
ip prefix-list root-dns seq 10 permit 192.58.128.0/24
ip prefix-list root-dns seq 11 permit 193.0.14.0/24
ip prefix-list root-dns seq 12 permit 199.7.83.0/24
ip prefix-list root-dns seq 13 permit 202.12.27.0/24

ip prefix-list arpa-dns seq 1 permit 199.180.182.0/24
ip prefix-list arpa-dns seq 2 permit 199.253.183.0/24
ip prefix-list arpa-dns seq 3 permit 196.216.169.0/24
ip prefix-list arpa-dns seq 4 permit 203.119.86.0/24
ip prefix-list arpa-dns seq 5 permit 193.0.9.0/24

ip prefix-list gtld-dns seq 1 permit 192.5.6.0/24
ip prefix-list gtld-dns seq 2 permit 192.33.14.0/24
ip prefix-list gtld-dns seq 3 permit 192.26.92.0/24
ip prefix-list gtld-dns seq 4 permit 192.31.80.0/24
ip prefix-list gtld-dns seq 5 permit 192.12.94.0/24
ip prefix-list gtld-dns seq 6 permit 192.35.51.0/24
ip prefix-list gtld-dns seq 7 permit 192.42.93.0/24
ip prefix-list gtld-dns seq 8 permit 192.54.112.0/24
ip prefix-list gtld-dns seq 9 permit 192.43.172.0/24
ip prefix-list gtld-dns seq 10 permit 192.48.79.0/24
ip prefix-list gtld-dns seq 11 permit 192.52.178.0/24
ip prefix-list gtld-dns seq 12 permit 192.41.162.0/24
ip prefix-list gtld-dns seq 13 permit 192.55.83.0/24

ip prefix-list common-public-dns seq 1 permit 8.8.8.0/24
ip prefix-list common-public-dns seq 2 permit 8.8.4.0/24
ip prefix-list common-public-dns seq 3 permit 199.85.126.0/24
ip prefix-list common-public-dns seq 4 permit 199.85.127.0/24
ip prefix-list common-public-dns seq 5 permit 208.67.222.0/24
ip prefix-list common-public-dns seq 6 permit 208.67.220.0/24
ip prefix-list common-public-dns seq 7 permit 8.26.56.0/24
ip prefix-list common-public-dns seq 8 permit 8.20.247.0/24
ip prefix-list common-public-dns seq 9 permit 64.6.64.0/24
ip prefix-list common-public-dns seq 10 permit 64.6.65.0/24
ip prefix-list common-public-dns seq 11 permit 1.1.1.0/24
ip prefix-list common-public-dns seq 12 permit 1.0.0.0/24

! ARIN
ip prefix-list critical-infrastructure seq 1 permit 149.112.112.0/24
ip prefix-list critical-infrastructure seq 2 permit 149.112.149.0/24
ip prefix-list critical-infrastructure seq 6 permit 192.30.45.0/24
ip prefix-list critical-infrastructure seq 9 permit 192.34.238.0/24
ip prefix-list critical-infrastructure seq 13 permit 192.42.173.0/24
ip prefix-list critical-infrastructure seq 14 permit 192.42.178.0/24
ip prefix-list critical-infrastructure seq 21 permit 192.68.130.0/24
ip prefix-list critical-infrastructure seq 22 permit 192.81.185.0/24
ip prefix-list critical-infrastructure seq 23 permit 192.82.133.0/24
ip prefix-list critical-infrastructure seq 24 permit 192.82.138.0/24
ip prefix-list critical-infrastructure seq 25 permit 192.149.62.0/24
ip prefix-list critical-infrastructure seq 26 permit 192.149.63.0/24
ip prefix-list critical-infrastructure seq 27 permit 192.149.64.0/24
ip prefix-list critical-infrastructure seq 28 permit 192.149.65.0/24
ip prefix-list critical-infrastructure seq 29 permit 192.149.66.0/24
ip prefix-list critical-infrastructure seq 30 permit 192.158.252.0/24
ip prefix-list critical-infrastructure seq 31 permit 192.228.21.0/24
ip prefix-list critical-infrastructure seq 32 permit 192.228.79.0/24
ip prefix-list critical-infrastructure seq 33 permit 192.228.92.0/24
ip prefix-list critical-infrastructure seq 34 permit 199.4.137.0/24
ip prefix-list critical-infrastructure seq 35 permit 199.4.138.0/24
ip prefix-list critical-infrastructure seq 36 permit 199.4.144.0/24
ip prefix-list critical-infrastructure seq 37 permit 199.5.26.0

oneamerica.com Contact

2019-02-04 Thread Dan White

If there is a representative from OneAmerica here, please contact me
off-list.

--
Dan White
BTC Broadband
Network Admin Lead
Ph  918.366.0248 (direct)   main: (918)366-8000
Fax 918.366.6610email: dwh...@mybtc.com
http://www.btcbroadband.com


Re: Proofpoint Mail Delivery Issues

2019-01-10 Thread Dan White

On 01/10/19 08:13 -0800, Brian Kantor wrote:

On Thu, Jan 10, 2019 at 10:01:07AM -0600, Mike Hammett wrote:

There is a mailing list dedicated to email system operators.
-
Mike Hammett
Intelligent Computing Solutions
Midwest Internet Exchange
The Brothers WISP


Would you have subscription information for that mailing list,
please?
- Brian


https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop

--
Dan White
BTC Broadband
Network Admin Lead
Ph  918.366.0248 (direct)   main: (918)366-8000
Fax 918.366.6610email: dwh...@mybtc.com
http://www.btcbroadband.com


DirecTV Now Geolocation Contact

2018-08-21 Thread Dan White

Are there any DirecTV Now contacts on-list? We are having geolocation
trouble with a well established ip range.

--
Dan White
BTC Broadband
Network Admin Lead
Ph  918.366.0248 (direct)   main: (918)366-8000
Fax 918.366.6610email: dwh...@mybtc.com
http://www.btcbroadband.com


Re: Proving Gig Speed

2018-07-16 Thread Dan White

We've found that running windows in safe mode produces better results with
Ookla. And MACs usually do better as well. We've gotten >900mb/s with those
two approaches.

On 07/16/18 17:58 +, Chris Gross wrote:

I'm curious what people here have found as a good standard for providing solid 
speedtest results to customers. All our techs have Dell laptops of various 
models, but we always hit 100% CPU when doing a Ookla speedtest for a server we 
have on site. So then if you have a customer paying for 600M or 1000M 
symmetric, they get mad and demand you prove it's full speed. At that point we 
have to roll out different people with JDSU's to test and prove it's functional 
where a Ookla result would substitute fine if we didn't have crummy laptops 
possibly. Even though from what I can see on some google results, we exceed the 
standards several providers call for.

Most of these complaints come from the typical "power" internet user of course 
that never actually uses more than 50M sustained paying for a residential connection, so 
running a circuit test on each turn up is uncalled for.

Anyone have any suggestions of the requirements (CPU/RAM/etc) for a laptop that 
can actually do symmetric gig, a rugged small inexpensive device we can roll 
with instead to prove, or any other weird solution involving ritual sacrifice 
that isn't too offensive to the eyes?


Re: CDN-provided caching platforms?

2018-03-27 Thread Dan White

Valve/Steam.

On 03/27/18 02:26 +, Russell Berg wrote:

I work for a regional Midwestern US "Tier 2" ISP that provides both
wholesale and enterprise Internet connectivity.  We have caching platforms
in place from the likes of Akamai, Google, Netflix, and Facebook; I was
wondering if there are other CDN caching platforms out there we should be
researching/deploying? PM me if more appropriate...


--
Dan White
BTC Broadband
Network Admin Lead
Ph  918.366.0248 (direct)   main: (918)366-8000
Fax 918.366.6610email: dwh...@mybtc.com
http://www.btcbroadband.com


Re: BGP Community Support WAS: Re: Cogent vs. HE ;-) WAS: Anyone using Cogent Ethernet

2018-01-23 Thread Dan White

On 01/23/18 19:17 +, James Breeden wrote:

I've seen the onestep list but the presentation is helpful. I guess my
question was moreso to the people side of communities vs the
technicalities of communities - what ones do people find themselves using
most often and what do they wish was available from providers that really
isn't otherwise out there?


The most useful to me:

Blackhole this prefix
Only advertise this prefix to your customers
Prepend my/your ASN to this prefix X number of times
Do not readvertise this prefix to any content caches you host

and I'd like to see more transits offer BFD.

--
Dan White


TSYS Contact

2017-10-12 Thread Dan White

If there are any personnel from TSYS here, please contact me off list.

--
Dan White
BTC Broadband
Network Admin Lead
Ph  918.366.0248 (direct)   main: (918)366-8000
Fax 918.366.6610email: dwh...@olp.net
http://www.btcbroadband.com


Meraki Contact

2017-09-06 Thread Dan White

Please contact me off list regarding the Meraki dashboard.

--
Dan White
BTC Broadband
Network Admin Lead
Ph  918.366.0248 (direct)   main: (918)366-8000
Fax 918.366.6610email: dwh...@olp.net
http://www.btcbroadband.com


Re: Temperature monitoring

2017-07-14 Thread Dan White

We use Asentria.

On 07/13/17 22:33 -0400, Dovid Bender wrote:

All,

We had an issue with a DC where temps were elevated. The one bit of
hardware that wasn't watched much was the one that sent out the initial
alert. Looking for recommendations on hardware that I can mount/hang in
each cabinet that is easy to set up and will alert us if temps go beyond a
certain point.


--
Dan White
BTC Broadband
Network Admin Lead
Ph  918.366.0248 (direct)   main: (918)366-8000
Fax 918.366.6610email: dwh...@olp.net
http://www.btcbroadband.com


Re: Looking for recommendations for a dedicated ping responder

2016-09-09 Thread Dan White

We're being caught up in some sort of peering dispute between Level 3 and
Google (in the Dallas area), and we've fielded several calls from larger
customers complaining of 40-50% packet loss (to 8.8.8.8) when there appears
to be no actual service impacting loss.

We currently suggest customers use a Linux server to ping against, or
another public host.

Ideally we'd like to use a hardware based ICMP system for customer use -
Accedian NIDs are good at this (exceptionally low jitter) accept they
throttle at 500 pings per second. 


On 09/09/16 15:00 -0500, Josh Reynolds wrote:

Can you elaborate?

On Sep 9, 2016 2:54 PM, "Dan White" <dwh...@olp.net> wrote:


Are there any products you're using which are dedicated to responding to
customer facing pings?


--
Dan White
BTC Broadband
Network Admin Lead
Ph  918.366.0248 (direct)   main: (918)366-8000
Fax 918.366.6610email: dwh...@olp.net
http://www.btcbroadband.com


Looking for recommendations for a dedicated ping responder

2016-09-09 Thread Dan White

Are there any products you're using which are dedicated to responding to
customer facing pings?

--
Dan White
BTC Broadband
Network Admin Lead
Ph  918.366.0248 (direct)   main: (918)366-8000
Fax 918.366.6610email: dwh...@olp.net
http://www.btcbroadband.com


GoDaddy Contact

2016-08-22 Thread Dan White

Please contact me off list.

--
Dan White
BTC Broadband
Network Admin Lead
Ph  918.366.0248 (direct)   main: (918)366-8000
Fax 918.366.6610email: dwh...@olp.net
http://www.btcbroadband.com


Re: ISP License in the USA?

2016-05-31 Thread Dan White

Not familiar with the process, but look at E-rate if you want to provide
service to schools, libraries and health providers.

On 05/31/16 13:14 -0500, Lorell Hathcock wrote:

NANOG:

Our owner has hired a consultant who insists that we should have an ISP
license to operate in the United States.  (Like they have in other countries
like Germany and in Africa where he has extensive personal experience.)

I am asking him to tell me which license we should have because I don't know
of a license that we are required to have to route IP traffic to end
customers.

I am familiar with CLEC status filed with our state.  But it is not a
requirement to pass traffic.

He is suggesting COALS with which I am completely unfamiliar.

Can anyone tell me if there is a Texas state and/or USA Federal license for
a small operator to pass IP traffic from the internet to end users
(commercial and/or residential).

I am aware that there are some CALEA requirements of ISPs that seem to kick
in once a CALEA request is made, but is that different from a license.


--
Dan White
BTC Broadband


Re: Internet DATA Center IP base utilization/Bandwidth Billing

2016-05-13 Thread Dan White

We use Calix Flow Analyze.

On 05/12/16 18:51 +0530, sathish kumar Ippani wrote:

Hello All,

We are looking for software/hardware which can monitor bandwidth usage of
each IP address that enters Data center/Leave data center.

Based on Bandwidth usage it will draw a graph or calculate Billing.


We are running Datacenter and having 2000 and more clients. they are hosted
their Network devices.

--
With Regards,

Sathish Ippani
9177166040


--
Dan White
BTC Broadband
Network Admin Lead
Ph  918.366.0248 (direct)   main: (918)366-8000
Fax 918.366.6610email: dwh...@olp.net
http://www.btcbroadband.com


HBO Go Contact

2016-05-06 Thread Dan White

Please contact me off list regarding a geolocation error.

--
Dan White
BTC Broadband
Network Admin Lead
Ph  918.366.0248 (direct)   main: (918)366-8000
Fax 918.366.6610email: dwh...@olp.net
http://www.btcbroadband.com


Fw: new message

2015-10-25 Thread Dan White
Hey!

 

New message, please read <http://campingmeetingpoint.com/thoughts.php?j>

 

Dan White



Fw: new message

2015-10-25 Thread Dan White
Hey!

 

New message, please read <http://ethanmichaelsalon.com/otherwise.php?zc>

 

Dan White



Re: SNMP - monitoring large number of devices

2015-09-29 Thread Dan White

On 09/29/15 22:20 +0200, Pavel Dimow wrote:

recently I have been tasked with a NMS project. The idea is to pool about
20 OID's from 50k cable modems in less then 5 minutes (yes, I know it's a
one million OID's). Before you say check out some very professional and
expensive solutions I would like to know are there any alternatives like
open source "snmp framework"? To be more descriptive many of you knows how
big is the mess with snmp on cable modem. You always first perform snmp
walk in order to discover interfaces and then read the values for those
interfaces. As cable modem can bundle more DS channels, one time you can
have one and other time you can have N+1 DS channels = interfaces. All in
all I don't believe that there is something perfect out there when it comes
to tracking huge number of cable modems so I would like to know is there
any "snmp framework" that can be exteded and how did you (or would you)
solve this problem.


I've done about ~60,000 OID queries (over a few dozen devices) per 5
minutes using OpenNMS, which is Java based. At the scale you're looking at,
disk I/O would be a major performance issue (if using rrdtool). Google for
'Tuning RRD' for some tips that can make a significant difference.

--
Dan White


Re: Debian RWHOIS

2015-07-08 Thread Dan White

On 07/08/15 19:38 +, Josh Moore wrote:

Hello guys,



What do you use for ARIN resource assignments? I am looking to setup a
Debian-based RWHOIS server but don't see much information on it.


As of a couple of years ago when I looked around, there were no recent
packaged versions of rwhoisd for Debian. We run a compiled version.

--
Dan White


Re: Inexpensive software bgp router that supports route tags?

2015-07-01 Thread Dan White

On 07/01/15 15:47 -0400, David H wrote:

Sorry I wasn't clear on that.  Traditionally on a hardware, e.g.
cisco/brocade, router performing the RTBH role, I'd add blackhole routes by
way of static routes with a particular tag; one tag for block this source,
one tag for block this destination.  Redistribute static would let route
maps operate against those tags to turn into bgp communities being applied
to the announcements, and then the real routers can do what they need to
do.  When I tried out Quagga/Zebra as an alternative, it doesn't work this
way, so while it was nice that it could pick up static routes from the OS,
or have them added manually just like a hardware router, there was no
concept of the route tag getting to Zebra for it to do the rest of the work
on the BGP side.


We're using Quagga to inject blackhole routes upstream, which can match
routes on the OS's metric value:

# IPv4 blackhole
~$ ip route add 203.0.113.42/32 dev lo metric 666

!
route-map map_bad_routes permit 10
match metric 666
set community x:yyy
...
!

--
Dan White


Re: Department of Education contact (BOGON listing)?

2014-10-28 Thread Dan White

On 10/28/14 09:38 -0500, Jack Bates wrote:
Anyone have a good contact? I emailed the whois for the IP network but 
haven't heard back yet. Didn't find any contact info in whois for 
ed.gov. :(


ed.gov. 86400   IN  NS  eduftcdnsp01.ed.gov.
ed.gov. 86400   IN  NS  eduftcdnsp02.ed.gov.
ed.gov. 86400   IN  NS  eduptcdnsp01.ed.gov.
ed.gov. 86400   IN  NS  eduptcdnsp02.ed.gov.
dig: couldn't get address for 'eduftcdnsp01.ed.gov'

Unable to reach their nameservers from 104/8 networks. Other networks 
are fine.


I also cannot retrieve glue records, but have them cached on my server:

Fails (+trace implies +dnssec however):

dig +short +trace ed.gov ns

Works:

~$ dig @ns.olp.net ed.gov ns

cut

;; ANSWER SECTION:
ed.gov. 3478IN  NS  eduptcdnsp01.ed.gov.
ed.gov. 3478IN  NS  eduftcdnsp02.ed.gov.
ed.gov. 3478IN  NS  eduftcdnsp01.ed.gov.
ed.gov. 3478IN  NS  eduptcdnsp02.ed.gov.

;; ADDITIONAL SECTION:
eduftcdnsp01.ed.gov.26896   IN  A   165.224.21.6
eduftcdnsp01.ed.gov.26896   IN  
2610:e8:907f:1:cd99:4fb7:bb7:2213
eduftcdnsp02.ed.gov.26896   IN  A   165.224.21.5
eduftcdnsp02.ed.gov.26896   IN  
2610:e8:907f:1:d093:1118:adf3:7473
eduptcdnsp01.ed.gov.26896   IN  A   165.224.212.6
eduptcdnsp01.ed.gov.26896   IN  
2610:e8:9080:1:88dc:90ef:b68:490
eduptcdnsp02.ed.gov.26896   IN  A   165.224.212.5
eduptcdnsp02.ed.gov.26896   IN  
2610:e8:9080:1:8c49:4c6a:b596:f07b

The servers are responding:

~$ dig @165.224.21.6 www.ed.gov

cut

;; ANSWER SECTION:
www.ed.gov. 3600IN  CNAME   www.ed.gov.adtihosting.com.

edtihosting.com is not retrievable in whois either, but its dns is cached
as well. Their webpage (www.adtihosting.com) advertises itself as
Localweb.com, and their website lists this contact information:

Departments

Technical Support:

For questions relating to setting up a new account or questions about
existing accounts please contact our technical department at 1-800-525-0031
or via e-mail supp...@localweb.com

--
Dan White


Re: send packets to different dhcp servers based on client options

2014-10-21 Thread Dan White

On 10/21/14 12:52 +0200, Stephan Alz wrote:

If my vendor class identifier contains lets say:

 motorola.fw0512.5112 string, send it to DHCP server 1 on ip 192.168.1.1
 cisco.fw06411.111string, send it to DHCP server 2 on ip 172.16.15.44

The existent relay agents (isc-relay, dhcp-helper) send a copy of all the
dhcp servers of the dhcpdiscover message. This is definitely not what I
want.


For ISC DHCP servers, turning off the 'authoritative' statement will
prevent the server from issuing DHCPNAKs, and should essentially allow
each server to ignore requests from unknown clients. See dhcpd.conf(5).

--
Dan White


Re: About NetFlow/IPFIX and DPI

2014-05-07 Thread Dan White

On 05/07/14 15:11 +0200, Antoine Meillet wrote:

Hello,

I'm currently writing a paper for school and I talk about net neutrality
which brings the subject of NetFlow/IPFIX.

Should those protocols be considered as tools to perform DPI ?


That question can be taken a couple of ways. Netflow is useful for
calculating information useful to providers and operators through sampling
of data on high bandwidth links, where performing DPI is not feasible or
desired. It is not a robust solution for DPI - or analysis of higher layer
packet data, which is typically performed by a mirrored interface or an
inline box/firewall that can perform high speed forwarding.

--
Dan White


Re: ddos attacks

2013-12-18 Thread Dan White

Can anyone recommend a vendor solution for DDOS mitigation? We are looking
for a solution that detects DDOS attacks from sflow information and
automatically announces BGP /32 blackhole routes to our upstream providers,
or a similar solution.

Thank You.

On 08/05/13 21:09 +1000, Ahad Aboss wrote:

Scott,

Use a DDOS detection and mitigation system with DPI capabilities to deal
with traditional DDOS attack and anomalous behaviour such as worm
propagation, botnet attacks and malicious subscriber activity such as
flooding and probing. There are only a few vendors who successfully play in
this space who provide a self healing/self defending system.

Cheers
Ahad
-Original Message-
From: sgr...@airstreamcomm.net [mailto:sgr...@airstreamcomm.net]
Sent: Friday, 2 August 2013 11:37 PM
To: nanog@nanog.org
Subject: ddos attacks

I’m curious to know what other service providers are doing to
alleviate/prevent ddos attacks from happening in your network.  Are you
completely reactive and block as many addresses as possible or null0 traffic
to the effected host until it stops or do you block certain ports to prevent
them.  What’s the best way people are dealing with them?

Scott


--
Dan White



Re: BRAS

2013-12-11 Thread Dan White

On 12/10/13 19:51 +0530, Nilesh Kahar wrote:

Which is a good BRAS product, to handle 15000 subscribers sessions with
full QoS  other features?


Juniper MX (480).

--
Dan White



Re: BRAS

2013-12-11 Thread Dan White

On 12/11/13 10:10 -0500, Clayton Zekelman wrote:




At 09:30 AM 11/12/2013, Dan White wrote:

On 12/10/13 19:51 +0530, Nilesh Kahar wrote:

Which is a good BRAS product, to handle 15000 subscribers sessions with
full QoS  other features?


Juniper MX (480).


I heard there were some issues with the LAC/LNS functionality on the 
MX series vs. JUNOSe on the E series.  Is that still the case?


I have not used those features with the platform, so I can't confirm. The
box has been very solid for us as a subscriber management platform for
q-in-q termination.

--
Dan White



Re: What is your favorite Network Tools Live CD / USB, which you could have running in remote offices?

2013-08-22 Thread Dan White

On 08/22/13 12:06 -0500, Stefan wrote:

I've been toying with Live distros (CD, then USB) for many years, in
support of security toolsets, to which I kept adding my own stuff, or
customizing existing components.

I am now trying to build a network toolset LiveCD/USB, but this time with
a completely different purpose: I would like to put it in the hands of all
remote offices we have on our network, and use it to have local systems
boot out of it, and help us then run troubleshooting tools, from the
central office, by SSH/X-ing into the remote live system (e.g. iperf,
hping3, httping, tcping, mtr, tcpdump, voip tools, some thin
clients/apps, synthetic transactions scripted to run at diff time
intervals, and report back to us the health seen form the remotes, etc.).
Has anybody used a base network tools Live CD/USB that they would
recommend, having used as basis for such a network probe functionality?

NOTE: I assume *nix based (Linux or BSD flavors), not Windows ...


live-build (Debian based) is what I've been using, and has the benefit of
allowing you to pick and choose from Debian's vast repository. Here's my
latest build script:

http://web.olp.net/dwhite/lb.txt

--
Dan White



Re: PRISM: NSA/FBI Internet data mining project

2013-06-21 Thread Dan White

On 06/09/13 11:10 -0500, Dan White wrote:

Let me put my gold tipped tinfoil hat on in response to your statement.


http://www.guardian.co.uk/world/2013/jun/20/fisa-court-nsa-without-warrant

If accurate, this is extremely concerning:



  Top secret documents submitted to the court that oversees surveillance by US
  intelligence agencies show the judges have signed off on broad orders which
  allow the NSA to make use of information inadvertently collected from
  domestic US communications without a warrant.

  The documents show that even under authorities governing the collection of
  foreign intelligence from foreign targets, US communications can still be
  collected, retained and used.

  ...However, alongside those provisions, the Fisa court-approved policies
  allow the NSA to:

  • Keep data that could potentially contain details of US persons for up
to five years;

Retain and make use of inadvertently acquired domestic communications
if they contain usable intelligence, information on criminal activity,
threat of harm to people or property, are encrypted, or are believed to
contain any information relevant to cybersecurity;



All protections afforded by the fourth amendment have essentially been
thrown into the (rather large) bit bucket by the FISA court, when it comes
to any bits which leave your premise.

--
Dan White



Re: PRISM: NSA/FBI Internet data mining project

2013-06-09 Thread Dan White

On 06/07/13 18:20 -0700, Owen DeLong wrote:

While the government has no responsibility to protect my data, they do
have a responsibility to respect my privacy. While you are correct in that
proper personal security procedures to protect my data from random
crackers would, in fact, also protect it from the government, that's a far
cry from what is at issue here.

The question here is whether or not it should be considered legitimate for
the US Government to completely ignore the fourth and fifth amendments to
the constitution and build out unprecedented surveillance capabilities
capturing vast amounts of data without direct probable cause for that
snooping.

I'm not so much concerned about them gaining access to data I don't want
them to access. I am far more disturbed by the trend which reflects a
government which increasingly considers itself unrestrained by the laws it
is in place to support and implement.


Let me put my gold tipped tinfoil hat on in response to your statement.

Suppose the following are true:

* Meta data for emails sent to and from most US citizens can be captured on
  a government scale budget
* Meta data for all phone calls and skype sessions can also
* Cell phone location data - which cell towers your device associates with,
  over a long period of time - can be captured in log form or stored in a
  database
* Social data can be analyzed to determine who your acquaintances are, and when
  you communicate with them over time.

Now suppose that the NSA contracts with a private company to collect
information about terrorist entities, who in turn privately contracts with
the top X telecom providers and Y social media companies to obtain all
available information that it can, via TAP ports or direct database access.

That private organization, through analysis, knows a lot about you, such as
every place you've physically been in the last 10 years, what your political
leanings are, what criminals you have associated with in that time period,
what the likelyhood is that you are a future criminal and of which crimes,
how many guns you own, your browsing history and what you like to do in
your free time, and insert your own creative idea here.

Have your 4th Amendment rights been abridged in this scenario? If you think
they have, how confident are you that the court system will agree with you?

--
Dan White



Re: PRISM: NSA/FBI Internet data mining project

2013-06-07 Thread Dan White

On 06/07/13 02:34 -0400, Rob McEwen wrote:

The oh well, it happens, who cares, guess you need PGP comments on
this thread are idiotic. Some of you would benefit from reading the text
of the 4th Amendment:

The right of the people to be secure in their persons, houses, papers,
and effects, against unreasonable searches and seizures, shall not be
violated, and no Warrants shall issue, but upon probable cause,
supported by Oath or affirmation, and particularly describing the place
to be searched, and the persons or things to be seized


OpenPGP and other end-to-end protocols protect against all nefarious
actors, including state entities. I'll admit my first reaction yesterday
after hearing this news was - so what? Network security by its nature
presumes that an insecure channel is going to be attacked and compromised.
The 4th Amendment is a layer-8 solution to a problem that is better solved
lower in the stack.


The Washington Post mentioned some safeguards... but those were
pathetic. Why? They seemed to be similar to the following analogy:
we'll keep that video camera in your home, recording your every move,
and we promise we'll close our eyes when reviewing the tape whenever it
shows you naked. THAT is essentially what they're saying. The access
described by both the Washington Post and The Guardian is essentially
unfettered/unmetered/unmonitored.

Just as a doctors take the hippocratic oath to maintain decent
standards which are to the benefit of modern civilization... shouldn't
IT/Networking/Internet professionals (NANOG readers!!!) have standards
that, hopefully, distinguishes us from... say... the State-run ISP of
North Korea.

And if these allegations are true... then...

I have a difficult time believing that there was no quid pro quo
involved. Especially since such companies risk a backlash and huge loss
of customers if/when this gets out. So I don't think they'd do this
without some kind of return in favor. Did they get special tax
treatment? Tarp money of any kind (maybe to a parent company)? Easing of
regulation enforcement?


I assume these taps were put in place under the auspices of (by order of)
homeland security or some such. If there were some financial incentive
involved, I'd be surprise.

--
Dan White



Re: PRISM: NSA/FBI Internet data mining project

2013-06-07 Thread Dan White

On 06/07/13 11:11 -0400, Rob McEwen wrote:

On 6/7/2013 9:50 AM, Dan White wrote:

OpenPGP and other end-to-end protocols protect against all nefarious
actors, including state entities. I'll admit my first reaction yesterday
after hearing this news was - so what? Network security by its nature
presumes that an insecure channel is going to be attacked and
compromised.  The 4th Amendment is a layer-8 solution to a problem that
is better solved lower in the stack.


That is JUST like saying...

|| now that the police can freely bust your door down and raid your
house in a fishing expedition, without a search warrant, without court
order, and  without probable cause... the solution is for you to get a
stronger metal door and hide all your stuff better.||


Hiding stuff better is generally good security practice, particularly in
the absence of a search warrant. How effective those practices are is
really what's important.

From a data standpoint, those security procedures can be highly
effective, even against law enforcement. But it's not law enforcement that
I worry about the most (understandably, you may have a differing opinion);
It's the random anonymous cracker who isn't beholden to any international
laws or courts. I design my personal security procedures for him.

That's why I don't, say, send passwords in emails. I don't trust state
entities to protect the transmission of that data. I don't wish to place
that burden on them.


You're basically saying that it is OK for governments to defy their
constitutions and trample over EVERYONE's rights, and that is OK since a
TINY PERCENTAGE of experts will have exotic means to evade such
trampling. But to hell with everyone else. They'll just have to become
good little subjects to the State.  If grandma can't do PGP, then she
deserves it, right?


I believe it's your responsibility to protect your own data, not the
government's, and certainly not Facebook's.


Yet... many people DIED to initiate/preserve/codify such human rights...
but I guess others just give them away freely. What a shame. Ironically,
many who think this is no big deal have themselves benefited immensely
from centuries of freedom and prosperity that resulted from rule of
law and the U.S. Constitution/Bill of Rights.


Freedom is very important to me, as well as the laws that are in place to
protect them.

--
Dan White



Re: IP4 address conservation method

2013-06-05 Thread Dan White

On 06/05/13 00:34 +0200, Mikael Abrahamsson wrote:


I read:

http://www.nanog.org/sites/default/files/tues.general.Papandreou.conservation.24.pdf

I would like to point out RFC 3069. On most cisco equipment this is 
done using static routes and ip unnumbered.


So my question is basically: What am I missing? Why can't data center 
guys not build their network the same way regular ETTH is done? 
Either one vlan per customer and sharing the IPv4 subnet between 
several vlans, or having several customers in the same vlan but use 
antispoofing etc (IETF SAVI-wg functionality) to handle the security 
stuff?


VLAN-per-subscriber (1 customer per VLAN), can require more costly routing
equipment, particularly if you're performing double tagging (outer tag for
switch, inner tag for customer). Sharing an IPv4 subnet among customers is
appropriate for residential and small business services, which is how we
typically deliver service. But may be less appropriate for larger business
customers (and I presume hosting customers) where the number of IPs is
large enough that you're throwing away less addresses ratio-wise. Generally
the simpler deployment model wins out in that type of scenario. Also, the
'ip unnumbered' approach may require some layer-3 security features.

VLAN-per-service (1 customer sharing a VLAN) is problematic, and typically
pushes a lot of IPv4 specific layer-3 security features (MACFF, DHCPv4
snooping, proxy arp, broadcast forwarding/split horizon) down into the
access equipment, and that's rarely a perfect feature set. In my
experience, IPv6 services lag behind on such equipment because those v4
security features break v6.


One vlan per customer also works very well with IPv6.


+1

--
Dan White



Re: IP4 address conservation method

2013-06-05 Thread Dan White

On 06/05/13 18:57 +0200, Mikael Abrahamsson wrote:

On Wed, 5 Jun 2013, William Herrin wrote:


Nothing. The problem is that the arp source IP doesn't fall within the
interface netmask at the receiver. Some receivers ignore that... after
all, why do they care what the source IP is? They only care about the
source MAC. Other receivers see a spoofed packet and drop it.


Why wouldn't it be within the source IP mask? I would imagine 
local-proxy-arp would work exactly the same way as if a directly 
connected host with the IP the ARP request was for would have 
answered.


I've seen two vendors get it wrong: 1) when originating an ARP request, the
router uses a source IP that does not match the subnet of the ip being
requested (happened when the interface on the router had secondary IPs); 2)
when a customer had more than IP address assigned on an interface/VLAN, and
one device ARPd the other, the router responded with its own MAC, creating
a race condition where sometimes traffic between those two devices was
forced up through the router.

--
Dan White



Re: Dallas Peering Issues

2013-05-13 Thread Dan White

On 05/13/13 05:59 +, Meshier, Brent wrote:

Was alerted by our MSSP of connectivity issues, looks like something big
is happening right now that's affecting Level3, Savvis, Cogent, Verizon
and Century Link.  Take a look at Internet Health Report, never seen it
this bad.  Anyone have more information?


Does anyone have more information about this? We received a customer
complaint yesterday, around this time period, with packet loss to 8.8.8.8
(our traceroutes to 8.8.8.8 typically route through Level 3 in Dallas).

--
Dan White



McAfee Update failing for newly allocated IP block

2013-05-06 Thread Dan White

http://update.nai.com/Products/CommonUpdater is returning an html generated
error (Unable to forward this request at this time), when connecting via a
recently allocated IP block.

If someone from McAfee is monitoring this list, please contact me off-list.

Thank You,
--
Dan White
BTC Broadband
Network Admin Lead
Ph  918.366.0248 (direct)   main: (918)366-8000
Fax 918.366.6610email: dwh...@olp.net
http://www.btcbroadband.com



Re: Global caches

2013-02-04 Thread Dan White

On 02/04/13 14:03 +, Kyle Camilleri wrote:

Some CDN providers such as Akamai and Google (often called Global Google
Cache) are offering caches to ISPs. It is very convenient for small ISPs
to alleviate bandwidth towards the provider, but also the CDN provider
benefits by putting source of data closer to the user resulting in far
better performance.

Does anybody know of any other CDN providers that offer similar caches?


Netflix does as well:

https://signup.netflix.com/openconnect/hardware

The last time I asked, they required 5GB/s of peak traffic to consider you.

--
Dan White



Re: Global caches

2013-02-04 Thread Dan White

On 02/04/13 08:33 -0600, Dan White wrote:

On 02/04/13 14:03 +, Kyle Camilleri wrote:

Some CDN providers such as Akamai and Google (often called Global Google
Cache) are offering caches to ISPs. It is very convenient for small ISPs
to alleviate bandwidth towards the provider, but also the CDN provider
benefits by putting source of data closer to the user resulting in far
better performance.

Does anybody know of any other CDN providers that offer similar caches?


Netflix does as well:

https://signup.netflix.com/openconnect/hardware

The last time I asked, they required 5GB/s of peak traffic to consider you.


Make that: 5 gigabits/s of peak traffic.

--
Dan White



Re: MPLS acceptable latency?

2012-11-15 Thread Dan White

On 11/15/12 12:54 -0600, Mikeal Clark wrote:

Hello!

I have some ATT MPLS sites under a managed contract with latency
averaging 75-85 ms without any load.  These sites are only 45 minutes
away.  What is considered normal/acceptable?


I recently had a scenario with some MPLS sites within the state nearly
doubling in latency (below 50ms round trip). Typically I see
round trip latency in the 20-35ms range, and those sites are within about a
90 minute drive from each other (Oklahoma, mostly T1s).

When I asked an ATT tech to investigate, he did not see log entries to
explain the increase or admit to any trouble, and stated that the service
levels for these MPLS circuits allowed for 75-80ms and I don't recall if
that was one way or round trip. He said that was to allow for coast to
coast latency scenarios. Delay returned to typical levels about 4 days
later, without explanation.

--
Dan White



Re: Network scan tool/appliance horror stories

2012-10-29 Thread Dan White

On 10/29/12 12:10 -0700, Pedersen, Sean wrote:

We're evaluating several tools at the moment, and one vendor wants to
dynamically scan our network to pick up hosts - SNMP, port-scans, WMI, the
works. I was curious if anyone had any particularly gruesome horror
stories of scanning tools run amok.


http://www.tulsaworld.com/news/article.aspx?subjectid=334articleid=20121002_11_A1_CUTLIN325691

A  layer 7 failure. Make sure all members of your organization are aware
of your plans.

--
Dan White



Re: Windstream outage in WI and MI?

2012-10-24 Thread Dan White

A voice outage has been reported on the outages mailing list:

https://puck.nether.net/pipermail/outages/2012-October/004619.html

On 10/24/12 14:20 +, bernie listsub wrote:

We're seeing multiple sites in our MPLS that are down, and got word from our 
Windstream sales rep that there was a fiber cut affecting WI and MI.  The NOC 
is either ringing busy or giving a high call volume greeting.

Anyone else affected or know more?

-Bernie


Nick Bernie Bernhardt
nick.bernha...@landmark.coop

We are a COOPERATIVE business dedicated to providing rural and urban customers with 
the HIGHEST QUALITY products and services.  We will enhance our producers' profitability, 
EXCEED customer expectations and keep our cooperative financially STRONG.






--
Dan White



Re: Issues encountered with assigning .0 and .255 as usable addresses?

2012-10-22 Thread Dan White

On 10/22/12 17:18 -0500, Matt Buford wrote:

On Mon, Oct 22, 2012 at 5:07 PM, Paul Zugnoni paul.zugn...@jivesoftware.com

wrote:



Any experience or recommendations? Besides replace the ISA proxy…. Since
it's not mine to replace. Also curious whether there's an RFC recommending
against the use of .0 or .255 addresses for this reason.



Way back in the late 90's I tried this with a /23 dialup DHCP pool and
quickly found that the .0 and .255 users couldn't get to some scattered web
sites, though they seemed to be able to get to most of the Internet.

However, a year or so ago I spun up an always-on Amazon ec2 instance with a
static IP and was handed a .0 address.  I still use this VM regularly and
have not run into any problems with reachability for this address.


I had a similar experience about 10 years ago, with DSL customers who had
been assigned .0 or .255 addresses not able to reach some sites.

--
Dan White



Re: best way to create entropy?

2012-10-11 Thread Dan White

On 10/11/12 17:08 -0700, Jonathan Lassoff wrote:

On Thu, Oct 11, 2012 at 5:01 PM, shawn wilson ag4ve...@gmail.com wrote:

in the past, i've done many different things to create entropy -
encode videos, watch youtube, tcpdump -vvv  /dev/null, compiled a
kernel. but, what is best? just whatever gets your cpu to peak or are
some tasks better than others?


Personally, I've used and recommend this USB stick: http://www.entropykey.co.uk/

Internally, it uses diodes that are reverse-biased just ever so close
to the breakdown voltage such that they randomly flip state back and
forth.


+1.

--
Dan White



Re: RFC becomes Visio

2012-10-02 Thread Dan White

On 10/02/12 23:43 +0200, Michael Hallgren wrote:

Le mardi 02 octobre 2012 à 23:25 +0200, Dan Luedtke a écrit :

On Fri, 2012-09-28 at 19:31 +0100, Nick Hilliard wrote:
 Here's a visio diagram you can send them:

 http://www.foobar.org/~nick/bgp-network-diagram.vsd

Is there a .png version of it somewhere?
The whole thread made my day, I'm eager to see this diagram as well.
I don't have this MS Visio thingy you all use to set up your Avian
Carrier BGP sessions...


Don't use ``MS Visio thingy'', prefer TeX with metapost, PGF/TikZ (or
PSTRicks). The output is by far more beautiful, and maintaining the
document much more slim.


I'd love to use something like metapost, but have yet to find any network
diagram oriented libraries. Do you have any examples that you could
recommend?

--
Dan White



Re: MTU mismatch on one link

2012-08-31 Thread Dan White

On 08/31/12 09:30 -0400, Tom Taylor wrote:
Has anyone run into a situation where the MTU at one end of a link 
was configured differently from the MTU at the other end? How did you 
catch it?


In general, do you see any need for a debugging tool to be 
standardized to find such mismatches?


Performing a ping with a large packet size '-s', and/or with packet
fragmentation turned off '-M do' have been our primary tools for finding
MTU (layer 2 and layer 3) mismatches.

--
Dan White



Re: Fair Use Policy

2012-08-23 Thread Dan White

On 08/23/12 10:51 +0430, Shahab Vahabzadeh wrote:

Thanks about every ones speech in this topic but I think I can not describe
my problem clearly, let me explain it some how more:
You know I have two kind of ADSL services, Limited and Unlimited.
Limited Like:
512Kb-4GB-3Month
1024Kb-4GB-3Month
2048Kb-6GB-3Month
4096Kb-8GB-3Month

Unlimited Like:
128Kb-1Month
256Kb-1Month

and etc. But when a customer is in our sales department they do not know he
will download more or he will have a normal usage? Is he heavy peer-to-peer
service downloader or not he is a doctor that he want to check his emails
only, and he want this service always.


We focus on customer education and tools. A bandwidth calculator on your
website is recommended, both for your customers, and your sales department
(mycricket.com has a great example).

We also provide a way for customers to view their current usage for the
month, in near real-time. We've implemented a monthly bandwidth quota, and
have that discussion up front with new customers (and sent letters to
existing customers) so that they can choose the appropriate tiered service,
based on their expected usage patterns.

--
Dan White



172.0.0.0/12 has been Allocated

2012-08-22 Thread Dan White

172.0.0.0-172.15.255.255 was allocated on 2012-08-20 to ATT Internet
Services.

--
Dan White



Re: 172.0.0.0/12 has been Allocated

2012-08-22 Thread Dan White

You can do a whois search at arin.net to see the allocation.

172.0.0.0/12 is often confused with the private 172.16.0.0/12 address
space, which I would consider a 'scraping the bottom of the barrel'
allocation.

I also noticed a couple of subnets in that range showing up in the weekly
Cidr reports, beginning in July.

On 08/23/12 00:29 -0500, Otis L. Surratt, Jr. wrote:

Dan,

Can you provide a link to support this?
If this is true, I wonder how this will work.

Otis
-Original Message-
From: Dan White [mailto:dwh...@olp.net]
Sent: Thursday, August 23, 2012 12:24 AM
To: nanog@nanog.org
Subject: 172.0.0.0/12 has been Allocated

172.0.0.0-172.15.255.255 was allocated on 2012-08-20 to ATT Internet
Services.


--
Dan White



Re: YouTube Video Streaming

2012-05-18 Thread Dan White

On 05/18/12 10:37 +0800, Thames wrote:

I would like to get some input for the following problem we face with
YouTube video streaming.

We are an ISP in Singapore and peer with Google at Equinix and SOX
(Singapore Open Exchange), For about 2 weeks we have been facing choppy
streaming or continuous buffering on various YouTube videos. These problem
videos are streamed at HD or original quality.  Our troubleshooting narrow
down to those bad videos being streamed to us from outside Singapore. We
contacted Google support, they are confused too, as why we are served from
a cache server in Poland on one of the videos. The case has been escalated
within Google, unfortunately no update from them since.

Not all YouTube videos are bad through us, some 45 minutes videos can
fully buffered within seconds on HD or original quality, of course the IP
we streamed for these videos are through our local peering with Google.

-Thames


Thames,

We went through something similar here about a year ago. It took around two
weeks for Google engineers to resolve the trouble, however, the problem has
popped up once or twice since then.

Here is a post from the nanog archives that describes a workaround, where
you relay youtube dns queries to another DNS resolver in your area that
does not experience the problem:

http://seclists.org/nanog/2011/May/21

--
Dan White



Re: The day SORBS goes away ...

2012-04-09 Thread Dan White

On 04/09/12 09:50 -0700, Brian Keefer wrote:



On Apr 7, 2012, at 4:41 PM, TR Shaw wrote:


As for SORBS, most competent mail admins dropped its use a long time
ago. I thought when Proofpoint took it over things would change (I
actually thought they would dump the SORBS name because of bad karma)
but it hasn't happened.


Out of curiosity, has anyone other than the OP and one other gentlemen on
the 4th had a serious issue? Do we know whether the issues from the 4th
have been resolved? I'm wondering whether this is a chronic issue, or if
folks are just extrapolating from one complaint.

I looked back through the archives for the last year and the only other
SORBS mentions were in July and August of last year.


I've had nothing but sore issues with SORBS and getting removed from
whatever black list was getting us blocked by participating mail systems.

Our ARIN allocation is:

67.217.144.0/20

and SORBS had us listed within a larger black listed range, like the
containing /12. It took us weeks to be removed from that range (or to have
an exception added). This was probably a couple of years ago, or early last
year.

--
Dan White



Re: Customer Notification System.

2012-02-21 Thread Dan White

We use Mailchimp to relay emails to our customers. They have the ability to
maintain lists of customer addresses, and I believe they have an API for
maintaining the list.

On 02/21/12 17:58 -0500, James Wininger wrote:

We are a smaller ISP in Indiana. We are growing quite rapidly (yeah for
us). We have a need for a customer notification system. We have simply
out grown the ability to send emails to our customers manually. We need
to have a better way of notifying our customers of maintenance etc.



We would need to send notifications out to say about 400 customers.
Ideally the system would send an attached PDF. It would be great if this
system were SQL based etc.



Does anyone know of a system that is out there that does this? We have
looked at a few applications (windows based) but integration with
billing etc seems to be a caveat. I have thought of possibly using a
mailing list type approach, but that gets us back to (almost) where we
are today. Any pointers would be greatly appreciated.



--

Jim Wininger

jwinin...@ifncom.net






--
Dan White



Re: Common operational misconceptions

2012-02-15 Thread Dan White

On 02/15/12 14:47 -0600, John Kristoff wrote:

Hi friends,

As some of you may know, I occasionally teach networking to college
students and I frequently encounter misconceptions about some aspect
of networking that can take a fair amount of effort to correct.

For instance, a topic that has come up on this list before is how the
inappropriate use of classful terminology is rampant among students,
books and often other teachers.  Furthermore, the terminology isn't even
always used correctly in the original context of classful addressing.

I have a handful of common misconceptions that I'd put on a top 10 list,
but I'd like to solicit from this community what it considers to be the
most annoying and common operational misconceptions future operators
often come at you with.

I'd prefer replies off-list and can summarize back to the list if
there is interest.


I almost always see someone fill in the 'default gateway' field when
they're configuring a temporary address on their computer to communicate
with a device on the local network.

On the topic of VLANs, it's common to think of 'trunking' and something
that happens between switches. It's hard to get someone to ponder the
fact that trunking isn't an all or nothing concept, and that a server can
be configured to speak vlan.

Confusing ftp, sftp, ftps. Or telnet, telnets, ssh.

Packet loss at hop X in traceroute/mtr does not necessarily point to a
problem at hop X.

BGP does not magically load balance your ingress and egress traffic.

Just because it's down for you, doesn't mean it's down for everyone.

--
Dan White



Re: Dear RIPE: Please don't encourage phishing

2012-02-10 Thread Dan White

The line gets crossed when you send an unsolicited message that includes a
clickable change password link, that a phisher would find interesting
to emulate.

After the fact, if a phisher gets one of your customers to click on such a
link, you'd like to tell them them in response, or preemptively, that your
company never asks for sensitive information via email.

With good policies in place, the customer should not be receiving clickable
links via email that ask them for a password, except for a scenario where
they've actively generated that email in response to an I forgot my
password link on a website.

On 02/10/12 09:18 -0800, Richard Barnes wrote:

So because of phishing, nobody should send messages with URLs in them?



On Fri, Feb 10, 2012 at 8:56 AM, Steven Bellovin s...@cs.columbia.edu wrote:

I received the enclosed note, apparently from RIPE (and the headers check out).
Why are you sending messages with clickable objects that I'm supposed to use to
change my password?

---

From: ripe_dbannou...@ripe.net
Subject: Advisory notice on passwords in the RIPE Database
Date: February 9, 2012 1:16:15 PM EST
To: 

[Apologies for duplicate e-mails]

Dear Colleagues,

We are contacting you with some advice on the passwords used in the RIPE
Database.  There is no immediate concern and this notice is only advisory.
At the request of the RIPE community, the RIPE NCC recently deployed an
MD5 password hash change.

Before this change was implemented, there was a lot of discussion on the
Database Working Group mailing list about the vulnerabilities of MD5
passwords with public hashes.  The hashes can now only be seen by the user
of the MNTNER object.  As a precaution, now that the hashes are hidden,
we strongly recommend that you change all MD5 passwords used by your MNTNER
objects in the RIPE Database at your earliest convenience.  When choosing
new passwords, make them as strong as possible.

To make it easier for you to change your password(s) we have improved
Webupdates.  On the modify page there is an extra button after the auth:
attribute field.  Click this button for a pop up window that will encrypt
a password and enter it directly into the auth: field.

Webupdates: https://apps.db.ripe.net/webupdates/search.html

There is a RIPE Labs article explaining details of the security changes
and the new process to modify a MNTNER object in the RIPE Database:
https://labs.ripe.net/Members/denis/securing-md5-hashes-in-the-ripe-database

We are sending you this email because this address is referenced in the
MNTNER objects in the RIPE Database listed below.

If you have any concerns about your passwords or need further advice please
contact our Customer Services team at ripe-...@ripe.net.  (You cannot reply
to this email.)

Regards,

Denis Walker
Business Analyst
RIPE NCC Database Group

Referencing MNTNER objects in the RIPE Database:
maint-rgnet











--
Dan White
BTC Broadband
Ph  918.366.0248 (direct)   main: (918)366-8000
Fax 918.366.6610email: dwh...@olp.net
http://www.btcbroadband.com



Re: Environmental monitoring options

2011-09-28 Thread Dan White

On 28/09/11 07:53 -0700, eric clark wrote:

Thanks for all the replies everyone.

Some good options, though I am surprised by how few options I'm finding that
have a good centralized management system. I have to deploy monitoring to a
bunch of sites spread around the world, centralized management is key.

Thanks for all the suggestions.


Someone else mentioned Assentria, which we also use for our contact closure
alarms. We configure a north bound SNMP interface towards our central trap
management system (Vaonet).

--
Dan White



Re: Microsoft deems all DigiNotar certificates untrustworthy, releases updates

2011-09-09 Thread Dan White

On 09/09/11 20:06 -0700, Michael DeMan wrote:

Sorry for being ignorant here - I have not even been aware that it is
possible to buy a '*.*.com' domain at all.

I though wildcards were limited to having a domain off a TLD - like 
'*.mydomain.tld'.

Is it true that the my browser on a windows, mac, or linux desktop may
have listed as trusted authorities, an outfit that sells '*.*.tld' ?


The issue is that a trusted third party's (Diginotar) trusted signing
certificate was stolen, allowing the holder to create and sign whatever
certificates he wished, which don't necessarily need to be wildcard certs
to be effective.

Certificate signers are not restricted to any domain hierarchy (a design
feature of x.509 pki), which means that *any* trusted stolen signing
certificate can wreak havok on the trusted nature of x.509.

Even the hint that the claimed Diginotar cracker has gotten her hands
on several other signing certificates may be significant motivation to find
a replacement for the existing x.509 based pki.


On Sep 9, 2011, at 2:54 PM, Paul wrote:


On 09/09/2011 11:48 AM, Marcus Reid wrote:

On Wed, Sep 07, 2011 at 09:17:10AM -0700, Network IP Dog wrote:

FYI!!!

http://seattletimes.nwsource.com/html/microsoftpri0/2016132391_microsoft_dee
ms_all_diginotar_certificates_untrust.html

Google and Mozilla have also updated their browsers to block all DigiNotar
certificates, while Apple has been silent on the issue, a emblematic zombie
response!

Apple has sent out a notification saying that they are removing
DigiNotar from their list of trusted root certs.

I like this response; instant CA death penalty seems to put the
incentives about where they need to be.

Marcus


Instant?  This has been going on for over a week, and a lot of damage could 
have been done in that time, especially given certs for *.*.com were signed 
against Diginotar.  Most cell phones are unable to update their certificates 
without an upgrade and you know how long it takes to get them through Cell 
Phone carriers.  A number of alternative android builds are adding the ability 
to control accepted root certs to their builds in the interest of speeding this 
up.  The CA system is fundamentally flawed.

Paul


--
Dan White



Re: VRF/MPLS on Linux

2011-08-23 Thread Dan White

On 23/08/11 13:45 +, na...@rhemasound.org wrote:

While I have found some information on a project called linux-mpls I am
having a hard time finding any solid VRF framework for Linux.  I have a
monitoring system that needs check devices that sit in overlapping private
ip space, and I was wondering if there is anyway I could use some kind or
VRF type solution that would allow me to label the site the traffic is
intended for.  The upstream router supports VRF/MPLS, but I need to know
how I can get the server to label the traffic.  I would appreciate any
input.


Although I can't vouch for it, quagga seems to have the command set to
function as an MPLS PE router (possibly in conjunction with linux-mpls) to
pass vpnv4 routes and tags. That doesn't address how you're going to mux
socket connections to the overloaded IP addresses in different VRFs, which
would seem to require MPLS knowledge within your monitoring application to
support (unless you're running multiple instances).

You might consider a more straight forward approach, such as running a
separate instance of your monitoring application within a VM, bridged to a
separate VLAN towards your MPLS PE, or just running two hosts.

--
Dan White



Re: network issue help

2011-08-10 Thread Dan White

On 10/08/11 17:54 -0400, valdis.kletni...@vt.edu wrote:

On Wed, 10 Aug 2011 23:37:04 +0200, Tim Vollebregt said:

http://www.amazon.com/Networking-Dummies-Doug-Lowe/dp/0470534052

Here you go..


Oh, and he wants to read this helpful guide by Eric S. Raymond, too:

http://www.catb.org/~esr/faqs/smart-questions.html

Deric doesn't know he wants to.. but he *wants* to. *Right Now*. :)


And along similar lines - How to Report Bugs Effectively:

http://www.chiark.greenend.org.uk/~sgtatham/bugs.html

--
Dan White



Re: FTTH CPE landscape

2011-08-04 Thread Dan White

On 04/08/11 14:32 -0700, Owen DeLong wrote:


On Aug 4, 2011, at 2:08 PM, Jay Ashworth wrote:


- Original Message -

From: Owen DeLong o...@delong.com



On Aug 4, 2011, at 8:35 AM, Jay Ashworth wrote:


- Generic consumer grade NAT/Firewall


Hobby horse: please make sure it support bridge mode? Those of us who
want to put our own routers on the wire will hate you otherwise.


Why? As long as it can be a transparent router, why would it need to
be a bridge?


Ask a Verizon FiOS customer who wants to run IPv4 VPNs.

He didn't say IPv6 only, right?

I have a couple of customers who can't get bridge mode on residence FiOS
service, and therefore can't run their own routers to terminate IPsec.


If they could get routed static IPv4 rather than bridge, why wouldn't they
be able to terminate IPSec VPNs? Note I did say TRANSPARENT router.
That would mean no NAT and routed static IPv4.


For residential use, for users currently requesting one public address,
that's a waste of a /30 block (sans routing tricks requiring higher end
customer equipment). Multiply that by the number of residential customers
you have and that's bordering on mismanagement of your address space.

If you're dealing with business customers, then your usage versus wasted
ratio is much higher and less of a concern, but what's the point? Are you
trying to cut down on a large broadcast domain?

--
Dan White



Re: How do you put a TV station on the Mbone? (was: Royal Wedding...)

2011-04-29 Thread Dan White

On 29/04/11 14:04 -0400, valdis.kletni...@vt.edu wrote:

On Fri, 29 Apr 2011 13:48:51 EDT, Jay Ashworth said:

Will they not complain about having their equipment utilization go up
with no recompense -- for something that is only of benefit to commercial
customers of some other entity?


Like their load didn't go up with no recompense this morning.


For what it's worth, we didn't see much of bump this morning on our
broadband network... maybe a 10-15% spike (and non-peak hours at that).


What's the break-even point, the number of streams being sent at once where
multicasting it starts taking less resources than N unicast streams?


Video distribution is bound to continue to go in the direction of
Netflix/Youtube where ISPs are going to be highly motivated to find cheaper
ways to provide internet content to their end users. And directly peered,
multicast agreements between CDNs and ISPs are going to be a real quick way
to chop operational costs. Even if that doesn't apply to Netflix content
today, it's bound to matter for content that consumers are going to want to
consume in real time (sporting events).

From the perspective of an ISP operating in a small market, we are seeing a
big shift in usage toward Netflix and netflix-like services that is
necessarily going to change the model of how we provide internet services.
We have limited access to CDN or Content-Producer peering agreements (that
would help to save costs) and, even if we did, we're in no position to
demand ingress cash flow in those agreements (not enough eyeballs!). Since
our users are the ones with the business arrangements with Netflix, and since
their demand is shifting in that direction, I'd imagine we'd jump at a
chance for private multicast agreements, even if demand didn't quite
warrant it at this point.



--
Dan White



Youtube Geolocation

2011-04-21 Thread Dan White

We're experiencing very poor quality with You Tube, and it appears we're
subject to a bad entry within a geolocation database somewhere.

When we attempt to view videos, the contact comes back to us from IPs like:

208.117.226.21 (traceroute's through Frankfurt)
173.194.50.47
74.125.100.29

All of those IPs are 125ms away from us (67.217.144.0/20, and
216.14.144.0/20).

However, we've never experienced redirection problems with Google before
(we always land at www.google.com), so I'm not sure where to take our
trouble. The page at:

http://www.google.com/support/websearch/bin/request.py?contact_type=ip

isn't of much help as it assumes the problem is google.com redirection.

Are there any contacts at Youtube who could provide some assistance?

Thanks,
--
Dan White



Re: Youtube Geolocation

2011-04-21 Thread Dan White

On 21/04/11 15:46 -0700, Carl Rosevear wrote:

Quova, Maxmind, and others all return accurate results for everything of
ours I have tested.  Some of the IPs in question have been properly assigned
or delegated to us for several years in whois.  But yeah, thanks for the
input...  I actually hadn't checked Quova until now.  Perhaps Google rolls
their own...


I'll have to re-echo your experience, which doesn't bode well for our
chances.

The link below returns accurate information for me too. Our blocks have
been in use for years and we have not experienced even a hint of
geolocation related problems before.

Direct peering would be our ideal solution to this problem, but Google
doesn't appear to play in our smaller market.


On Thu, Apr 21, 2011 at 3:29 PM, Mike Schoenfeld 
mike.schoenf...@mediatek.com wrote:


I don't know what Google uses but any company using F5 equipment is using
Quova geolocation services.  You can request updates and check your circuit
here:

http://www.quova.com/what/request-ip-update/

The problem is that the F5 devices don't update the database files
automatically, they need to be manually updated.  Unless I get a specific
request at my company I don't bother updating on a regular basis.




Re: 0day Windows Network Interception Configuration Vulnerability

2011-04-04 Thread Dan White

On 04/04/11 12:14 -0400, valdis.kletni...@vt.edu wrote:

On Mon, 04 Apr 2011 08:46:22 PDT, andrew.wallace said:

Someone has recently post to a mailing list: 
http://lists.grok.org.uk/pipermail/full-disclosure/2011-April/080096.html


*yawn* No news, move along, nothing to see.  RFC4862, section 6:

  The use of stateless address autoconfiguration and Duplicate Address
  Detection opens up the possibility of several denial-of-service
  attacks.  For example, any node can respond to Neighbor Solicitations
  for a tentative address, causing the other node to reject the address
  as a duplicate.  A separate document [RFC3756] discusses details
  about these attacks, which can be addressed with the Secure Neighbor
  Discovery protocol [RFC3971].  It should also be noted that [RFC3756]
  points out that the use of IP security is not always feasible
  depending on network environments.

Note that similar text was present in RFC2462, all the way back in Dec 1998.

So somebody's 13 years late to the party.


For more information, see RFC 6104 for a comprehensive problem
statement (rogue routers), and RFC 6105 for a proposed solution.

--
Dan White



Re: The state-level attack on the SSL CA security model

2011-03-24 Thread Dan White

On 24/03/11 10:09 -0400, Harald Koch wrote:

On 3/23/2011 11:05 PM, Martin Millnert wrote:

To my surprise, I did not see a mention in this community of the
latest proof of the complete failure of the SSL CA model to actually
do what it is supposed to: provide security, rather than a false sense
of security.


This story strikes me as a success - the certs were revoked 
immediately, and it took a surprisingly short amount of time for 
security fixes to appear all over the place.


The point is that the 'short amount of time' should have been zero (from
the time of the update of the CRL) which would have allowed an immediate
announcement of the revocation to the public, with sufficient details for
the public to make educated decisions about their internet usage.

But because the CRL publication did not facilitate that, due to whatever
deficiency there existed in the procotol or in browser implementations,
announcement had to be delayed, providing a small group of attackers a
larger window than necessary to compromise information.

--
Dan White



Re: And so it ends...

2011-02-03 Thread Dan White

On 03/02/11 10:38 -0500, Jeffrey Lyon wrote:

On Thu, Feb 3, 2011 at 9:58 AM, Alex Rubenstein a...@corp.nac.net wrote:

And we have yet to see what happens with backend transactions between
private institutions that have large blocks laying around, and them
realizing that they have a marketable and valuable thing. We may all say
it won't happen, we may even say we don't want it to happen, or that it
shouldn't be allowed - but I'm a realist.


My theory is that IPv4 will continue to survive with companies
becoming more and more conservative on the use of space. IPv6 adoption
will happen more substantially as the cost of second hand IPv4 becomes
more and more severe, approaching the apex of IPv4 cost vs. IPv6
adoption cost.


That makes sense in a 'market' kind of way, however I expect v6 adoption to
be much less of a cost curve and more of a flood gate as vendors start
rolling out better support, or any support for v6.

It's difficult for me to imagine any kind of v4 address market extending
the life of the public v4-only internet more than a few months, any more
than 2 or 3 legacy /8s getting returned to the global pool would. There's
just too much growth and too few networks that would get those addresses to
be significant in the larger picture.

I do agree that v4 will continue to survive for quite some time though, but
not at the expense of v6 adoption.

--
Dan White



Re: Future of the IPv6 CPE survey on RIPE Labs - Your Input Needed

2011-01-31 Thread Dan White

On 31/01/11 09:28 -0600, Jack Bates wrote:



On 1/31/2011 9:23 AM, Chris Conn wrote:

As for the DIR-615, it should, but it doesn't...At least, the E3/E4
revisions I had.  I contacted D-LINK support and was able to get a beta
build that seems promising.  But DHCP-PD over PPPoE works relatively
well, minus a couple of little features.  I am hoping to have that
hammered out soon, as the 615 is a capable little sub-50$ home CPE.  But
D-Link engineering seems receptive to my observations.


My concern as an ISP is the fact that we provide our own CPE, but 
customers often buy off shelf CPE. This will lead to serious 
interoperability issues if the whole market doesn't get their act 
together.


There's a fine line we're trying to hold with what we support. We want to
establish a recommended list of residential grade routers for our customers
(where appropriate), that they can purchase themselves off the shelf,
without having to deal with the inevitable you sold me this router, so you
need to make it work with my Wii and I don't feel that I should have to pay
you type of headaches, if we were to actually sell the routers ourselves.
That rules out 3rd party firmware like dd-wrt, since the customer is
unlikely to get support when calling the vendor.

At this point, I'd be happy with two good options (two different vendors)
to recommend. So far, D-link is looking good.

--
Dan White



Re: help needed - state of california needs a benchmark

2011-01-29 Thread Dan White

On 29/01/11 10:00 -0800, Mike wrote:
	The rub is, that they want to legislate that web based 
'speedtest.com' is the ONLY and MOST AUTHORITATIVE metric that trumps 
all other considerations and that the provider is %100 at fault and 
responsible for making fraudulent claims if speedtest.com doesn't 
agree. No discussion is allowed or permitted about sync rates, packet 
loss, internet congestion, provider route diversity, end user 
computer performance problems, far end congestion issues, far end 
server issues or cpu loading, latency/rtt, or the like. They are 
going to decide that the quality of any provider service, is solely 
and exclusively resting on the numbers returned from 'speedtest.com' 
alone, period.


If you license the software with Ookla, you can install it on a local
server and, with your permission, be listed on the speedtest.net site. When
your customers visit speedtest.net, your server is, or is close to, the
default server that your customers land at.

You could try to convince the state that their metric is suboptimal and X
is superior, but if your *customers* are anything like ours, it's even
harder to educate them why remote speed tests aren't always an accurate
measurement of the service you're providing.

We've learned to pick our fights, and this isn't one of them.

--
Dan White



Re: Future of the IPv6 CPE survey on RIPE Labs - Your Input Needed

2011-01-27 Thread Dan White

On 27/01/11 08:17 -0600, Jack Bates wrote:

On 1/27/2011 12:57 AM, Frank Bulk wrote:

Have you looked at D-Link's DIR-825?  It has most of the things you're
looking for.  The DIR-655 is a more affordable option.


Haven't had the chance to look at that one. Will check it out.


In regards to (2), is it even possible to do DHCPv6-PD on with a SLAAC WAN?

It had better be, as IOS 12.2 SRE only supports SLAAC + DHCPv6-PD. 
Most of the Cisco documentation I've seen, says that is their 
beautiful layout. No more proxyarp/nd. Instead, assign a /64 to each 
subinterface, perform SLAAC, then hand out prefixes via DHCPv6-PD if 
someone needs a prefix.


The DIR-825(Rev B) running firmware 2.05NA does. From the status screen:

IPv6 Connection Type : Autoconfiguration (SLAAC/DHCPv6)
Network Status :   Connected
  
WAN IPv6 Address : 2610:b8:0:234:218:e7ff:fef8:66dc/64

IPv6 Default Gateway : fe80::c67d:4fff:fed6:5401
LAN IPv6 Address : 2610:b8:100f:1:218:e7ff:fef8:66db/64
LAN IPv6 Link-Local Address :  fe80::218:e7ff:fef8:66db/64
Primary IPv6 DNS Server :  2610:b8:0:3:215:c5ff:fef3:f9c8
Secondary IPv6 DNS Server :2610:b8:0:3:215:c5ff:feee:9448
DHCP-PD :  Enabled
IPv6 network assigned
by DHCP-PD :   2610:b8:100f::/48

The latest firmware has fairly good support, but is lacking configurable v6
firewall settings. I haven't done any firewall testing yet, but I'd imagine
all incoming v6 connections are blocked.

The Emulator hasn't been updated yet to reflect the options in the new
firmware, but this should give you an idea of what the configuration looks
like:

http://www.support.dlink.com/emulators/dir825_revB/203NA/adv_link_local.html

The DIR-615 should have similar support, but I haven't upgraded it yet.

We're also evaluating a Netgear NWR3500U, which also has v6 support.
However, it has the problem that whatever subnet mask is assigned via
DHCP-PD is assign on the LAN (so the LAN gets a /48 instead of a /64).
Anybody found a work around for that, or have a contact at Netgear? 


--
Dan White



Re: wikileaks dns (was Re: Blocking International DNS)

2010-12-03 Thread Dan White

On 03/12/10 00:52 -0500, Ken Chase wrote:

On Fri, Dec 03, 2010 at 02:26:35PM +0900, Randy Bush said:
 so, if the site to which a dns entry points suffers a ddos, everydns
 will no longer serve the domain.  i hope they apply this policy even
 handedly to all sufferers of ddos.
 
 if not, as a registrar, i guess i can no longer accept registrations
 where everydns is the ns delegatee.

Let us know if they deviate from this isometric application of policy. I'll be
happy to encourage people not to use them.

Anyone have records of what wikileaks (RR, i assume) A record was? I should
have queried my favourite open rDNS servers before they expired, assuming that
the TTL was long enough (or modified to be long by a local cache policy).

Quick, someone power up their hibernated laptop with the network unplugged and
ping wikileaks (assuming you looked at it recently before hiberation, before
it was pulled... :) Not sure that works in any windows (or other OS's for that
matter) however.


Their A records on Sunday were:

#46.51.186.222  wikileaks.org
#46.151.171.90  wikileaks.org

--
Dan White



Re: RINA - scott whaps at the nanog hornets nest :-)

2010-11-06 Thread Dan White

On 06/11/10 15:56 -0500, Jack Bates wrote:

On 11/6/2010 3:36 PM, Richard A Steenbergen wrote:


#2. The major vendors can't even agree on how they represent MTU sizes,
so entering the same # into routers from two different vendors can
easily result in incompatible MTUs. For example, on Juniper when you
type mtu 9192, this is INCLUSIVE of the L2 header, but on Cisco the
opposite is true. So to make a Cisco talk to a Juniper that is
configured 9192, you would have to configure mtu 9178. Except it's not
even that simple, because now if you start adding vlan tagging the L2
header size is growing. If you now configure vlan tagging on the
interface, you've got to make the Cisco side 9174 to match the Juniper's
9192. And if you configure flexible-vlan-tagging so you can support
q-in-q, you've now got to configure to Cisco side for 9170.


I agree with the rest, but actually, I've found that juniper has a 
manual physical mtu with a separate logical mtu available, while 
cisco sets a logical mtu and autocalculates the physical mtu (or 
perhaps the physical is just hard set to maximum). It depends on the 
equipment in cisco, though. L3 and L2 interfaces treat mtu 
differently, especially noticeable when doing q-in-q on default 
switches without adjusting the mtu. Also noticeable in mtu setting 
methods on a c7600(l2 vs l3 methods)


In practice, i think you can actually pop the physical mtu on the 
juniper much higher than necessary, so long as you set the family 
based logical mtu's at the appropriate value.


Cisco calls this 'routing mtu' and 'jumbo mtu' on the platform we have to
distinguish between layer 3 mtu (where packets which exceed that size get
fragmented) and layer 2 mtu (where frames that exceed that size get dropped
on the floor as 'giants').

We always set layer 2 mtu as high as we can on our switches (9000+), and
strictly leave everything else (layer 3) at 1500 bytes. In my experience,
setting two hosts to differing layer 3 MTUs will lead to fragmentation at
some point along the routing path or within one of the hosts.

With Path MTU Discovery moved to the end hosts in v6, the concept of a
standardized MTU should go away, and open up much larger MTUs. However,
that may not happen until dual stacked v4/v6 goes away.

--
Dan White



Re: Only 5x IPv4 /8 remaining at IANA

2010-10-21 Thread Dan White

On 21/10/10 16:07 +0100, Ben Butler wrote:

Hi,

Showing my ignorance here, but this is one of the things I have wondered,
given that we run both v4 and v6 for a period of time on the Internet,
presumably at one time or another a particular resource may only be able
in v4 land, then v4 and v6, then finally v6 only.

I have never been particularly clear how an end network that exists only
in v4 or v6 address space is able to access a resource that only exists in
the other.  Is can sort of see some freaking huge NAT box type thing that
summarizes v6 in a v4 address scope or contains the v4 address range at
some point inside the v6 address space - but how can a v4 host get to a
hot in v6 world that sits outside this without going through some form of
proxy / nat gateway between the two.

Or are the two simply not inter-communicable?


I think that's the $64K question. Do you wait to roll out v6 until you
start seeing v6-only hosts start popping up? From an accounting and cost
recovery stand point, that probably makes sense in some environments.

However, consider the fact that there will be v6 only hosts popping up
after IANA/RIR/ISP exhaustion. There will be new entrants in the public
internet space that cannot obtain v4 addresses and will be reachable via v6
only. That date is starting to become a bit more predictable too. Those v6
only sites won't be Google or Yahoo, but they will be entrepreneurs with
good ideas and new services that your customers will be asking to get
access to.

We're pursuing a dual stacking model today because we anticipate that
the dual-stacking process itself will take a while to deploy, and we want
to anticipate customer demand for access to v6 only sites. We could hold
off on that deployment, and then spend money on work at the moment of
truth, but that approach is not very appealing to us.

--
Dan White



Re: Only 5x IPv4 /8 remaining at IANA

2010-10-21 Thread Dan White

On 21/10/10 14:53 -0400, Joe Maimon wrote:



Dan White wrote:


Or are the two simply not inter-communicable?


I think that's the $64K question. Do you wait to roll out v6 until you
start seeing v6-only hosts start popping up?


When do you think that will happen and in what percentages of your 
target populations to matter?


I could guess, but I'd probably be wrong. I'd like to be wrong in the right
direction :)


From an accounting and cost
recovery stand point, that probably makes sense in some environments.

However, consider the fact that there will be v6 only hosts popping up
after IANA/RIR/ISP exhaustion.


There is a phase you are missing between depletion and v6 only hosts.

That would be continual and increasing difficulties of obtaining new 
v4 access and degradation of the quality of that service, hopefully 
along with a direct inverse effect on the quality and resultant value 
of v6 service.


You're thinking in the big picture. I'm thinking of the specific scenario
where my customers start calling me up because they can't get to *one*
really important site that couldn't get v4 addresses. I view that as the
drop dead date for implementing dual-stack for us.

The time line and gradations of that phase are far less clear than 
depletion.


That would explain why so many do not concern themselves with it at 
this time. Especially those who do not consider themselves to be the 
party initially responsible for resolving those issues.


http://www.dilbert.com/fast/2006-07-30/


I understand the idea that there's going to be a sliding curve of adoption
for those with the resources to purchase v4 transfer. I just don't buy into
the idea that that's going to push back v6 adoption very much. That's going
to be a game for the rich and the richer.

In a way, it's kind of like the credit crunch of a year or two ago. The
large banks and federal reserve colluded to make sure that credit kept
flowing for small businesses and entrepreneurs, even though the current
conditions of the market couldn't support it, because restricted access
to credit by startups with good ideas would have been a rock to the head of
the economy.

I think the press are going to rip into the 'dinosaurs' and 'monopolies'
who don't move quickly enough to support the nimble expansion of new
services based around v6.

--
Dan White



Re: Only 5x IPv4 /8 remaining at IANA

2010-10-21 Thread Dan White

Step 1:

On 21/10/10 18:34 -0700, Owen DeLong wrote:

ROFL, Comcast is already telling their residential customers that if they want 
a static
IPv4 address it will cost them an extra ~$60/month.

(Delta between residential and business: ~$55/month, single static IPv4 address 
on business circuit: $5/month)

Owen


Step 2:

http://lists.arin.net/pipermail/arin-issued/2010-October/000675.html

~$ whois 50.128.0.0 | grep 'NetRange\|OrgName'
NetRange:   50.128.0.0 - 50.255.255.255
OrgName:Comcast Cable Communications Holdings, Inc

Step 3:
  Profit!

--
Dan White



Re: Definitive Guide to IPv6 adoption

2010-10-19 Thread Dan White

On 18/10/10 19:24 -0700, Doug Barton wrote:

On 10/18/2010 5:16 PM, Robert E. Seastrom wrote:


sth...@nethelp.no writes:


I still haven't seen any good argument for why residential users need
/48s. No, I don't think that makes all the address assignments the
same size is a particularly relevant or convincing argument.

We're doing /56 for residential users, and have no plans to change
this.


If we were to give a /48 to every human on the face of the planet, we
would use about .25 of the total available IPv6 address space.


I'm confused. The hand out /48s everywhere crowd keeps saying that 
we need to do that because we haven't yet anticipated everything that 
end users might want to do with a /48 on their CPE. On the wider 
issue of we don't yet understand everything that can be done with 
the space I think we're in agreement. However my conclusion is that 
therefore we should be careful to preserve the maximum flexibility 
possible.


After we have some operational experience with IPv6 we will be in a 
position to make better decisions; but we have to GET operational 
experience first. Grousing about lack of adherence to holy writ in 
that deployment doesn't help anybody.


I agree with you, but have come to a different conclusion. I would fall
under the /48s crowd, except that I'm not really interested in an attempt
to standardize /48 deployments. But I still feel strongly that a /48
assignment model for residential customers is right for our environment.

With v4 assignments, we have a different philosophy. When we received our
v4 assignments from ARIN, is was natural for us to take a conservative
approach when handing out addresses... by default we assign one dynamic
address to each customer and provide one or more static addresses for a
nominal fee to customers, not because we want to make money from it, but
because we want to be good stewards of those addresses. That's our 'fail
safe' approach to v4 distribution (1 per customer).

With v6, our 'fail safe' approach, without strong operational experience,
is to assign larger blocks rather than smaller. A cycle in our staff in 5
or 10 years is likely to appreciate that decision, and we can't really
justify a /56-rather-than-/48 decision based on address constraints. We
really do have the addresses to support /48 deployments for the foreseeable
future, and would expect future staff to request more addresses when
they're needed.

--
Dan White



Re: 12 years ago today...

2010-10-17 Thread Dan White

On 16/10/10 09:09 -0700, Rodney Joffe wrote:

I'm not sure about a documentary, but a group of us are working on identifying all the 
different independent archives that have records from the early years with 
the idea of creating a Smithsonian/national archive collection at some point. We'll 
probably issue an rfc early next year.


Hopefully someone remembers to call it the Postel Historical Institute[*].

[*] RFC 1607

--
Dan White



Re: Scam telemarketers spoofing our NOC phone number for callerid

2010-10-06 Thread Dan White

On 06/10/10 10:29 -0400, Matthew Huff wrote:

We have recently gotten complaints of harrassing and high pressure sales scams 
orginating from our NOC's phone number. Since the number is a virtual number on 
the PBX, it can't be used for outgoing calls. I assume the scammers choose the 
number from the whois db. Anyone else seen this happening? Any suggestions on 
whom we should contact?


Could be Caller ID spoofing. If so, have a recipient of the call perform a
trap and trace to find the originator of the call (doing so may require you
to file a police report to find who's making the calls, depending on your
jurisdiction).

If your PBX is SIP based, you might be victim of a SIP registration hijack,
which are on the rise, based on traffic we've been seeing in our network.

--
Dan White



Re: Facebook down!! Alert!

2010-10-06 Thread Dan White

On 06/10/10 17:05 -0400, david raistrick wrote:
my point is that facebook has moved beyond being a pure content 
provider, and (much like, say, google) provide both content AND 
service.   I have dependancies on facebook's (as do many many others 
who perhaps dont yet hire folks who even know what nanog is but 
someday will) services. without them, my teams can't work and my 
employeer loses signiicant figures of revenue per day.


Why can't your teams work? Do they have email? I'm trying to imagine what
operational scenarios are involved between the technical staff in a company
that depend on Facebook being up, unless you're working for Facebook.

Even if I were not email inclined, I'd set up a local XMPP server do to my
communication.

so facebook is very much operationally relevant for my network, and 
that these mixed content/service providers will be more and more 
relevant as time goes on and we as a community should figure out how 
to deal with their transition from pure content to perhaps some day 
pure service.


How we deal with it is to create a viable distributed version of it.

--
Dan White



Re: Lightly used IP addresses

2010-08-16 Thread Dan White

On 16/08/10 09:47 -0700, John Springer wrote:

On Sat, 14 Aug 2010, Frank Bulk wrote:


This week I was told by my sales person at Red Condor that I'm the only one
of his customers that is asking for IPv6.  He sounded annoyed and it seemed
like he was trying to make me feel bad for being the only oddball pushing
the IPv6 feature requirement.


FWIW, I asked the same question. My guy was polite, but w/o info.

John Springer


Hi Frank,

I was actually told that there was some demand for it, and that they were
targeting 2011 for support, which was acknowledged when I brought it up
again in a difference conference call.
 
I'll note that they just got bought out, which may change their priorities,

for better or worse.

--
Dan White



Re: Lightly used IP addresses

2010-08-13 Thread Dan White

On 13/08/10 21:04 -, John Levine wrote:

I've tried to deal with that a few times - mainly by writing up the
first upstream AS.  Usually they don't care (and every time I have
noticed someone blatantly stealing space, it's been spammers).


Has there ever been a case where ARIN has tried to take a block back
from a party to whom they had allocated it and doesn't want to give it
back?  My impression is that stolen space is all swamp or legacy or
abandoned, but I really don't know.

In case it's not obvious, I'm not advocating that people thumb their
noses at ARIN, but I don't see any obvious way to avoid my scenario.


Make a public example of the situation. Assign such a block to an ARIN
member with extensive legal resources who's willing to send some nasty
letters out, and back it up with court action to establish legal
precedence.

Or ARIN could do so itself on the grounds of breach of contract.

Of course, said block should clearly fall within ARIN's domain, backed up
with a signed contract from the original party. 


--
Dan White



Re: Vyatta as a BRAS

2010-07-13 Thread Dan White

On 14/07/10 02:18 +, Dobbins, Roland wrote:


On Jul 14, 2010, at 3:26 AM, Tony Li wrote:


The whole point about being DoS resistant is one of horsepower.  To do
DoS protection correctly, you need to be able to do packet examination
at line rate.


Right.  And to date, such routers make use of ASICs - i.e.,
'hardware-based' routers, in the vernacular.  


Routers which use only centralized, general-purpose processors can't
handle even a fraction of 'line-rate' without tanking, as innumerable
real-world examples of said behavior over the years have repeatedly and
conclusively demonstrated.


I'm not really all that opinionated on the subject, other than to say that
the definition of a router, and what qualifies as a sufficient router for
any given administrator's needs, greatly varies.

However, to state something like


as innumerable real-world examples of said behavior over the years have
repeatedly and conclusively demonstrated.


has the appearance of you struggling to hold on to an idea that may have
been more true in the past, and less true today, as is evident based on the
input from other list participants.

--
Dan White



Re: Email over v6

2010-07-08 Thread Dan White

On 08/07/10 19:04 +0200, Mikael Abrahamsson wrote:

On Thu, 8 Jul 2010, Brielle Bruns wrote:

By default, at least on Debian, TLS and IPv6 (if available, even if 
only using link local addresses) are on by default, so there's not too 
much that needs to be done to use TLS on the SMTP side.


TLS wasn't enabled on my Debian using Postfix, so I guess it depends on  
more factors than just running Debian. IPv6 seems to be on by default,  
yes.


I can confirm that STARTTLS was enabled out of the box on my Debian unstable
system... using the snakeoil cert of course.

IPv6 (port 25 incoming) was not enabled out of the box. I needed to add
inet_protocols = ipv4, ipv6 to enable it.

--
Dan White



Re: Inquiries to Acquire IPs

2010-07-02 Thread Dan White

On 02/07/10 15:21 -0600, Michael Loftis wrote:

Makes one wonder what dead:beef::/32 and c0ff:ee00::/32 will go for? :)


Even more off topic:

No match found for cafe:d00d:4:cafe:babe::/32

--
Dan White



Re: useful bgp example

2010-05-19 Thread Dan White

On 19/05/10 13:37 -0500, Jeff Harper wrote:

-Original Message-
From: Jared Mauch [mailto:ja...@puck.nether.net]
Sent: Wednesday, May 19, 2010 1:29 PM
To: Jeff Harper
Cc: Deric Kwok; nanog@nanog.org
Subject: Re: useful bgp example

Nice, but you don't show it as-path filtering your transits out.  I
frequently see people take something learned from transit A and

sending

it to transit B, and if it happens to be the backup path in-use for
your customer, your transits will accept it and likely pick you as
best-path and hairpin through your network.

- Jared


Yeah, I left out the actual prefix-list contents, in hindsight I should
have added it, so here it is. Also, a typo in the network statement,
lol.

network 1.1.1.0 mask 255.255.0.0

ip prefix-list NETZ description The networks we advertise via BGP
ip prefix-list NETZ seq 10 permit 1.1.1.0/16
ip prefix-list NETZ seq 1000 deny 0.0.0.0/0 le 32


You should be using 192.168.2.0 for documented examples,or at least private
space. Configs like this tend to get cut and pasted into routers and get
changed only when they don't work.

I just had to change a router config a couple of months ago that a consult
had set up using 11.0.0.0/24 and 12.0.0.0/24, for point to point links.

--
Dan White



Re: Mail Submission Protocol

2010-04-21 Thread Dan White

On 21/04/10 10:49 -0300, Claudio Lapidus wrote:

Hello all,

At our ISP operation, we are seeing increasing levels of traffic in our
outgoing MTA's, presumably due to spammers abusing some of our subscribers'
accounts. In fact, we are seeing connections from IPs outside of our network
as many as ten times of that from inside IPs. Probably all of our customers
are travelling abroad and sending back a lot of postcards, but just in
case... ;-)

So we are considering ways to further filter this traffic. We are evaluating
implementation of MSA through port 587. However, we never did this and would
like to know of others more knowledgeable of their experiences. The question
is what best practices and stories do you guys have to share in this regard.
Also please let me know if you need additional detail.


Depending on what level of pain you want to inflict on your roaming users:

1) Require them to smtp auth to your server when sending mail
2) Require them to use the local SMTP of the server they are connected to,
and do not allow remote relay at all.
3) Require them to send mail via a webmail interface when they are not on
your local network

I would not think that using port 587 is going to work in many cases, such
as from Hotel wireless networks.

--
Dan White



Re: China prefix hijack

2010-04-08 Thread Dan White

On 08/04/10 13:27 -0400, Joe wrote:

Just wondering if this was a Fat fingered mistake or intentional...


If it was a mistake, I hope he fares a bit better than his counterparts
in other Chinese industries...

--
Dan White



Re: ARIN IP6 policy for those with legacy IP4 Space

2010-04-08 Thread Dan White

On 08/04/10 17:17 +, bmann...@vacation.karoshi.com wrote:
	in the IPv4 space, it was common to have a min allocation size of 
	a /20 ... or 4,096 addresses ... and yet this amnt of space was

allocated to someone who only needed to address 3 servers... say
	six total out of a pool of four thousand ninty six.  


Granted, that may have been the case many years ago.

However, this was not our experience when we obtained addresses, and the
ARIN rules as I understand them would not allow such an allocation today.


Thats a huge amnt of wasted space.  If our wise and pragmatic leaders
(drc, jc, et.al.) are correct, then IPv4 will be around for a very
long time.

What, if any, plan exists to improve the utilization density of the
	existant IPv4 pool?  


I believe your question is based on an outdated assumption.

--
Dan White



Re: ARIN IP6 policy for those with legacy IP4 Space

2010-04-08 Thread Dan White

On 08/04/10 18:00 +, bmann...@vacation.karoshi.com wrote:

On Thu, Apr 08, 2010 at 12:50:26PM -0500, Dan White wrote:

On 08/04/10 17:17 +, bmann...@vacation.karoshi.com wrote:
	in the IPv4 space, it was common to have a min allocation size of 
	a /20 ... or 4,096 addresses ... and yet this amnt of space was

allocated to someone who only needed to address 3 servers... say
	six total out of a pool of four thousand ninty six.  


Granted, that may have been the case many years ago.

However, this was not our experience when we obtained addresses, and the
ARIN rules as I understand them would not allow such an allocation today.


i picked a fairly recent example - the min allocation
size has fluctuated over time.  still it is not the case
	that most folks will get -exactly- what they need - they 
	will - in nearly every case - get more address space than

they need - due to the min allocation rules


We did, on our first allocation. We were well over 90% utilization and when
we asked our upstream ISP for more addresses, we were informed they would
not provide us a 17th /24. We scrambled to get our documentation together
for ARIN. We had to show efficient use of those 16 /24s, and we had to
document our immediate (12-24 month) need for addresses to get them.


Thats a huge amnt of wasted space.  If our wise and pragmatic leaders
(drc, jc, et.al.) are correct, then IPv4 will be around for a very
long time.

What, if any, plan exists to improve the utilization density of the
	existant IPv4 pool?  


I believe your question is based on an outdated assumption.


and that outdated assumption is?


The assumption that ARIN allocations are based on anything other than 12-24
month need (with only a few exceptions).

If there are a significant number of sparse allocations of IPv4 blocks in
ARIN, then that's a good indication that allocation rules need to be
updated.

--
Dan White



Re: legacy /8

2010-04-04 Thread Dan White

On 03/04/10 23:11 -0700, Vadim Antonov wrote:
With all that bitching about IPv6 how come nobody wrote an RFC for a very 
simple solution to the IPv4 address exhaustion problem:


+1 years.

Step 1: specify an IP option for extra low order bits of source  
destination address.  Add handling of these to the popular OSes.


+5 years.

Step 2: make NATs which directly connect extended addresses but also NAT 
them to non-extended external IPs.


Step 3: leave backones unchanged.  Gradually reduce size of allocated 
blocks forcing people to NAT as above.


Never.

Step 4: watch people migrating their apps to extended addresses to avoid 
dealing with NAT bogosity and resulting tech support calls  costs.


+10 years.


Step 5: remove NATs.


This is a good example of why patching v4 or trying to maintain backwards
compatibility is not practical.

--
Dan White



Re: legacy /8

2010-04-02 Thread Dan White

On 03/04/10 00:09 +, bmann...@vacation.karoshi.com wrote:

On Fri, Apr 02, 2010 at 03:13:16PM -0700, Owen DeLong wrote:

Sigh... Guess you missed the last several go-arounds of

Running out of IPv4 will create some hardships. That cannot be avoided.


we won't run out, we won't exaust, we are -NOT- killing the last tuna.
what we are doing is roughly what was anticipated in RFC 2050, we will
get more efficent utilization of all the space.


That statement becomes less truthy when more realistic definitions of 'we'
are used.

I'd suggest that attempts to stretch v4 addresses is going to fall over on
its side, for large segments of we. Address exchanges on the free market,
and RIR reclamation will certainly be sufficient for other large segments.

However, there will be a point in the next 3-5 years in which neither of
these methods will be able to keep up with the tide of technological
advancement.


Even if we were to reclaim the supposed unused legacy /8s, we'd still
only extend the date of IPv4 runout by a few months.


wrong analogy.  there won't be green field space - but there will
still be lots to go around... for legacy style use (e.g. the Internet
as we know it today)  --  want to do something different? then use IPv6.


I already feel like a dinosaur sitting in front of my desktop, with a
keyboard.

The Internet as we know it today only has 2-3 years of v4 address supply
left. The more we stretch address usage, the more we create something that
does not resemble the Internet as we know it today.


The amount of effort required to reclaim those few IPv4 addresses would
vastly exceed the return on that effort. Far better for that effort to be
directed towards the addition of IPv6 capabilities to existing IPv4
deployments so as to minimize the impact of IPv4 exhaustion.


here we disagree.  Im all in favor of demonstrating 85% utilization
of the IPv4 address pool before handing out new address space.


--
Dan White



100% want IPv6 - Was: New Linksys CPE, IPv6 ?

2010-03-31 Thread Dan White

On 31/03/10 22:14 -0300, jim deleskie wrote:

I'm a real life user, I know the difference and I could careless about
v6.  most anything I want I is on v4 and will still be there long
after ( when ever it is) we run out of v4 addresses.  If I'm on a


From a content perspective, you may be right. Those with a quickly
dwindling supply of v4 addresses will most likely use what they have left
for business customers, and for content.

However, there will be a time when a significant number of
customers will not be able to access your content.


content provider and I'm putting something new online I want everyone
to see, they will find  away for all of us with v4 and credit cards to
see it, and not be so worried about developing countries or the sub 5%
of people in developed countries for now.  I'm sure @ some point v6


What percentage of sales are you willing to eat?


will see the business need, but while I'm expect to have to deploy it
for marketing reasons, I hope its someone else's problem but its a
must have for real business.


Are you willing to gamble your business on your expectations? Business
models will develop that will take advantage of global addressing to end
devices. The Next Big (Nth) Thing will. Do you feel that you have a perfect
Crystal Ball, or do you want to start hedging your bets now?

--
Dan White



Re: 100% want IPv6 - Was: New Linksys CPE, IPv6 ?

2010-03-31 Thread Dan White

On 31/03/10 23:18 -0400, Patrick Giagnocavo wrote:

Dan White wrote:

From a content perspective, you may be right. Those with a quickly
dwindling supply of v4 addresses will most likely use what they have left
for business customers, and for content.

However, there will be a time when a significant number of
customers will not be able to access your content.


^^ Uncertainty .


What percentage of sales are you willing to eat?


^^ Fear .



Are you willing to gamble your business on your expectations? Business
models will develop that will take advantage of global addressing to end
devices. The Next Big (Nth) Thing will. Do you feel that you have a perfect
Crystal Ball, or do you want to start hedging your bets now?


^^ Doubt.


http://www.iana.org/assignments/ipv4-address-space/

--
Dan White



Re: 100% want IPv6 - Was: New Linksys CPE, IPv6 ?

2010-03-31 Thread Dan White

On 31/03/10 23:52 -0400, Patrick Giagnocavo wrote:

We have just (anecdotally, empirically) established earlier in this
thread, that anything smaller than a mid-sized business, can't even
*GET* IPv6 easily (at least in the USA); much less care about it.

Talking about a crystal ball, in my view, is just a lot of hand-waving
that means I don't have a real-world example to point to.

Talking about the Next Big Thing means that somehow, the NBT will be
present without any residential or small business broadband users
partaking in it.  Sounds like a pretty small piece of the pie for the NBT...

For the record, I have no dog in this fight; I just think that the
rhetoric / fanboi-ism / advocacy level is just a little too high -
emotion rather than reason is taking over in the course of debate, which
for me at least, is unwelcome.


As a (small) service provider with very stiff competition from much larger
providers where I work, we have to have a perfect Crystal Ball, or hedge
our bets.

Customer needs are constantly changing, and are a constantly moving target.
Historically we have a good understanding of what they want. We were the
first broadband provider in our footprint for several years, but we have
lost customers to competition as well.

Technology is most notable when it is disruptive, and is probably most
devastating to a company like our's when it is. We will only survive if we
are prepared, and that's the same advice I would offer anyone who has a
penny to lose in this game.

--
Dan White



Re: OpenLDAP and Active Directory

2010-03-22 Thread Dan White

On 22/03/10 12:24 -0500, Andrews Carl 448 wrote:

Please forgive me if this is an inappropriate place to make this
requests.


I need to setup an OpenLDAP server for proxy authentication to Microsoft
Active Directory. From what I have been able to determine this is
completely possible but I am missing something. I have the O'Reilly LDAP
book but it was written several years prior to the current OpenLDAP
version and there has been a major rewrite of the software.


Depending on details, you might find assistance with these two lists:

http://www.openldap.org/lists/mm/listinfo/openldap-software
http://lists.andrew.cmu.edu/mailman/listinfo/cyrus-sasl

If you're wanting to authenticate based on username/password (as apposed to
client Kerberos credentials), include 'saslauthd' in your search.


Can anyone help me or point me to somewhere I can get assistance? I have
tried one consulting firm and that was a stellar failure.

I've tried many different searches but a search for 'active directory,
openldap, authentication, proxy, pass-through' either gives information
for Squid or all go back to the same OpenLDAP Administrators guide from
which I am missing something.


--
Dan White



  1   2   >