Re: SMTP-friendly VPS provider where I can also get a BGP feed

2023-09-26 Thread Jim Shankland via NANOG
That is extremely good and important advice! It seemed much less 
pertinent back when I was in my 30's, but planning for the unexpected 
is, or should be, a key part of all our jobs.



Jim Shankland



On 9/26/23 10:01 AM, Mel Beckman wrote:
One thing you should consider about running a "family" mail server (or 
any other IT services for friends and family): that you have a clearly 
documented path of management succession. A dear friend of mine passed 
away  last year and was running just such an email server. Nobody 
really knew how to get into it for maintenance, and a couple weeks 
after he passed. it crashed, and none of us knew precisely where it 
was physically located (on the end of a VPN tunnel, it tuns out). This 
took down email for 100 of his closest friends and family members for 
several weeks. We couldn't even unlock the domain,


Personally, this has spurred me to create much better documentation 
of  my own client services, and to involve a successor unlikely to be 
traveling with me 


 -mel

*From:* NANOG  on behalf of 
Jim Shankland via NANOG 

*Sent:* Tuesday, September 26, 2023 9:46 AM
*To:* nanog@nanog.org 
*Subject:* Re: SMTP-friendly VPS provider where I can also get a BGP feed
I've been using Linode, also; works fine on the Linode end, but I still
see occasional rejections based on my Linode IP address (most recently
from outlook.com). It's nothing my specific IP is doing, but appears to
be blacklisting of an address range. And gmail randomly puts some
outgoing mail into recipients' spam folders. Trying to get an address
unblocked by a major provider works almost as well as howling into the 
wind.


Maybe I'm being stubborn to insist on continuing to run what's basically
a family mail server, but it does seem like there's a matter of
principle there: it should be possible to have an email account without
having all the emails stored by a third party. If the answer ends up
being, "Oh, just use gmail, everybody else does!" ... well, so be it, I
guess, but we should be clear that something got lost in that transition.

Jim Shankland

On 9/26/23 9:10 AM, Jay R. Ashworth wrote:
> I've run a mail server on Linode for 6 or 7 years now; no technical 
problems.

>
> End-node, Zimbra, postfix.
>
> Cheers,
> -- jra
>
> - Original Message -
>> From: "Jonathan Leist via NANOG" 
>> To: "Daniel Corbe" 
>> Cc: nanog@nanog.org
>> Sent: Tuesday, September 26, 2023 10:32:51 AM
>> Subject: Re: SMTP-friendly VPS provider where I can also get a BGP feed
>> Pretty much every popular provider blocks port 25 out by default, and
>> they'll instead try to steer customers to use a smart host. 
However, some,

>> including Linode, will unblock port 25 by request:
>> 
https://www.linode.com/docs/guides/running-a-mail-server/#sending-email-on-linode

>>
>> On Tue, Sep 26, 2023 at 6:11 AM Daniel Corbe  wrote:
>>
>>> Hey all,
>>>
>>> I apologize if this isn't the right place to post this; however, I
>>> thought maybe the NANOG community would be able to point me in the 
right

>>> direction.
>>>
>>> I'm looking for a place that I can host a mailer.  My primary use case
>>> is a Mailman-style technical discussion list; much like NANOG but
>>> software related instead of network related: READ: non-commercial in
>>> nature.
>>>
>>> I'm currently a vultr customer, but they're refusing to unblock 
port 25

>>> on my account.  I've tried explaining my use case but no matter who I
>>> talk to over there they just keep pointing me to their spam policy.
>>>
>>> Thanks!
>>> -Daniel
>>>
>>
>> --
>> Jonathan Leist
>> Staff Engineer

Re: SMTP-friendly VPS provider where I can also get a BGP feed

2023-09-26 Thread Jim Shankland via NANOG
I've been using Linode, also; works fine on the Linode end, but I still 
see occasional rejections based on my Linode IP address (most recently 
from outlook.com). It's nothing my specific IP is doing, but appears to 
be blacklisting of an address range. And gmail randomly puts some 
outgoing mail into recipients' spam folders. Trying to get an address 
unblocked by a major provider works almost as well as howling into the wind.


Maybe I'm being stubborn to insist on continuing to run what's basically 
a family mail server, but it does seem like there's a matter of 
principle there: it should be possible to have an email account without 
having all the emails stored by a third party. If the answer ends up 
being, "Oh, just use gmail, everybody else does!" ... well, so be it, I 
guess, but we should be clear that something got lost in that transition.


Jim Shankland

On 9/26/23 9:10 AM, Jay R. Ashworth wrote:

I've run a mail server on Linode for 6 or 7 years now; no technical problems.

End-node, Zimbra, postfix.

Cheers,
-- jra

- Original Message -

From: "Jonathan Leist via NANOG" 
To: "Daniel Corbe" 
Cc: nanog@nanog.org
Sent: Tuesday, September 26, 2023 10:32:51 AM
Subject: Re: SMTP-friendly VPS provider where I can also get a BGP feed
Pretty much every popular provider blocks port 25 out by default, and
they'll instead try to steer customers to use a smart host. However, some,
including Linode, will unblock port 25 by request:
https://www.linode.com/docs/guides/running-a-mail-server/#sending-email-on-linode

On Tue, Sep 26, 2023 at 6:11 AM Daniel Corbe  wrote:


Hey all,

I apologize if this isn't the right place to post this; however, I
thought maybe the NANOG community would be able to point me in the right
direction.

I'm looking for a place that I can host a mailer.  My primary use case
is a Mailman-style technical discussion list; much like NANOG but
software related instead of network related: READ: non-commercial in
nature.

I'm currently a vultr customer, but they're refusing to unblock port 25
on my account.  I've tried explaining my use case but no matter who I
talk to over there they just keep pointing me to their spam policy.

Thanks!
-Daniel



--
Jonathan Leist
Staff Engineer


Re: BKA Wiesbaden - Abteilung Cybercrime (Not sure if this is a phishing E-mail or real...)

2023-04-24 Thread Jim Shankland

On 4/24/23 9:24 AM, Niels Bakker wrote:

* na...@ve4.ca (Glen A. Pearce) [Mon 24 Apr 2023, 17:42 CEST]:

Well, I eventually had a friend open the attachment on his Linux machine


Not necessarily a safe idea:
https://www.welivesecurity.com/2023/04/20/linux-malware-strengthens-links-lazarus-3cx-supply-chain-attack/
(scroll down to "Operation DreamJob with a Linux payload", sadly no 
anchors)


The key security concern here is "don't inspect/interpret bytes in an 
attachment with an application of the attacker's choosing". cat, or even 
emacs, seem pretty safe.


For me, that's easiest to do with Linux or MacOS (terminal). But sure, 
if "open on a Linux machine" still means "point and click", then you're 
absolutely correct.


Jim Shankland



Re: DoD IP Space

2021-02-11 Thread Jim Shankland

On 2/11/21 6:29 AM, Owen DeLong wrote:



On Feb 11, 2021, at 05:55 , Izaac  wrote:

On Wed, Feb 10, 2021 at 04:04:43AM -0800, Owen DeLong wrote:

without creating partitioned networks.

Ridiculous.  Why would you establish such a criteria?  The defining
characteristic of rfc1918 networks is that they are partitioned.

The ability to recognize and exploit partitions within a network,
natural or otherwise, is the measure of competence in a network
engineer.

Stop making excuses.

Ridiculous… TCP/IP was designed to be a peer to peer system where each endpoint 
was uniquely
addressable whether reachable by policy or not.

IPv6 restores that ability and RFC-1918 is a bandaid for an obsolete protocol.

Stop making excuses and let’s fix the network.

Owen


TCP/IP wasn't designed; it evolved (OK, a slight exaggeration). The 
ISO-OSI protocol stack was designed. Many years ago, I taught a course 
on TCP/IP networking. The course was written by someone else, I was just 
being paid to present/teach it. Anyway, I vividly remember a slide with 
bullet points explaining why TCP/IP was a transitional technology, and 
would be rapidly phased out, replaced by the "standard", intelligently 
designed ISO-OSI stack. By the time I taught the course, I had to tell 
the class that every single statement on that slide was incorrect. In 
the end, evolution beat out intelligent design, by a country mile.


It was probably a couple of years later -- the year definitely started 
with a 1 -- that I first heard that IPv4 was being phased out, to be 
replaced over the next couple of years by IPv6. We've been hearing it 
ever since.


That doesn't mean that we'll be living with IPv4 forever. A peer to peer 
system where each endpoint is uniquely addressable is desirable. But in 
a world of virtual machines, load balancers, etc., the binding of an IP 
address to a particular, physical piece of hardware has long since 
become tenuous. IPv4 is evolving into a 48-bit address space for 
endpoints (32-bit host + 16-bit port). That development has extended 
IPv4's useful life by many years.


There is pain associated with continuing to make IPv4 work. And there is 
pain associated with transitioning to IPv6. IPv6 will be adopted when 
the pain of the former path is much larger than the pain of the latter 
path. Saying "RFC-1918 is a bandaid for an obsolete protocol" is using a 
normative, rather than empirical, definition of "obsolete". In the 
empirical sense, things are obsolete when people stop using them. Tine 
will tell when that happens.


Jim Shankland





Re: all major US carriers received text messages overnight that appear to have been sent around Valentine's Day 2019

2019-11-08 Thread Jim Shankland

On 11/8/19 10:34 AM, Kain, Becki (.) wrote:


Esp on Valentine’s day.  Of all the days that clear communication is 
important.  I’d be very interested in their reasoning for why these 
messages were not sent and held.



Roses are red,
Violets are blue,
Hope we're still together
When this reaches you.

(Sorry, it's Friday afternoon. I'll show myself out.)

Jim


**



Re: syn flood attacks from NL-based netblocks

2019-08-17 Thread Jim Shankland

On 8/17/19 3:16 PM, Damian Menscher wrote:
On Fri, Aug 16, 2019 at 3:05 PM Jim Shankland <mailto:na...@shankland.org>> wrote:


I'm seeing slow-motion (a few per second, per IP/port pair) syn flood
attacks ostensibly originating from 3 NL-based IP blocks:
88.208.0.0/18 <http://88.208.0.0/18>
, 5.11.80.0/21 <http://5.11.80.0/21>, and 78.140.128.0/18
<http://78.140.128.0/18> ("ostensibly" because ... syn flood,
and BCP 38 not yet fully adopted).

Is anybody else seeing the same thing? Any thoughts on what's
going on?
Or should I just be ignoring this and getting on with the weekend?


This appears to be a TCP amplification attack.  Similar to UDP 
amplification (DNS, NTP, etc) you can get some amplification by 
sending a SYN packet with a spoofed source, and watching your victims 
receive multiple SYN-ACK retries. It's a fairly weak form of attack 
(as the amplification factor is small), but if the victim's gear is 
vulnerable to high packet rates it may be effective.


That thought crossed my mind, but it seems to me that the weak 
amplification factor, plus the broadly distributed set of forged source 
addresses (within the blocks cited above), would make the attack 
ineffective -- the whole point of DDoS being to focus a broadly 
distributed set of (illegitimately obtained) source resources on a 
narrow set of destination targets. Attacking 2 /18 blocks plus a /21 
block in parallel with a weak-amplification attack doesn't look like a 
successful DDoS strategy to me.


Jim

The victim (or law enforcement) could identify the true source of the 
attack by asking transit providers to check their netflow to see where 
it enters their networks.


Damian





Re: syn flood attacks from NL-based netblocks

2019-08-16 Thread Jim Shankland

On 8/16/19 3:50 PM, Emille Blanc wrote:

Have been seeing these at $DAYJOB off and on for the past week.
First logged events began for on 2019-08-04, at approx 1500hrs PST.

Impact for us has been negligible, but some older ASA's were having trouble 
with the scan volume and their configured log levels which has since been 
remedied.


Thanks for the various responses. The pattern I (and apparently quite a 
few others) are seeing differs from an ordinary probe in that it is 
repeated a few times per second (if somebody wants to know who has a 
visible ssh server on port 22, and what version of sshd is running, they 
don't have to hit it multiple times per second). It differs from a SYN 
flood DoS attack in that its rate is too low to be effective. And it 
differs from both a port probe and a SYN flood attack (or somebody 
"learning how to use nmap") in that it is targeting a broad set of 
destinations in parallel; if source addresses are forged, they are from 
a fairly narrow set of source IPs.


The atypical pattern seems noteworthy in itself. Not a crisis, but not 
quite routine, either.


Jim



syn flood attacks from NL-based netblocks

2019-08-16 Thread Jim Shankland

Greetings,

I'm seeing slow-motion (a few per second, per IP/port pair) syn flood 
attacks ostensibly originating from 3 NL-based IP blocks: 88.208.0.0/18 
, 5.11.80.0/21, and 78.140.128.0/18 ("ostensibly" because ... syn flood, 
and BCP 38 not yet fully adopted).


Why is this syn flood different from all other syn floods? Well ...

1. Rate seems too slow to do any actual damage (is anybody really 
bothered by a few bad SYN packets per second per service, at this 
point?); but


2. IPs/port combinations with actual open services are being targeted 
(I'm seeing ports 22, 443, and 53, just at a glance, to specific IPs 
with those services running), implying somebody checked for open 
services first;


3. I'm seeing this in at least 2 locations, to addresses in different, 
completely unrelated ASes, implying it may be pretty widespread.


Is anybody else seeing the same thing? Any thoughts on what's going on? 
Or should I just be ignoring this and getting on with the weekend?


Jim




Re: Email security: PGP/GPG & S/MIME vulnerability drop imminent

2018-05-15 Thread Jim Shankland

On 5/15/18 2:34 AM, Rich Kulawiec wrote:

On Mon, May 14, 2018 at 01:47:50PM +0530, Suresh Ramasubramanian wrote:

TL;DR = Don't use HTML email [snip]

That's enough right there.  HTML markup in email is used exclusively
by three kinds of people: (1) ignorant newbies who don't know any
better (2) ineducable morons who refuse to learn (3) spammers.
There are no exceptions.

Which category best describes my wonderful, intelligent (but decidedly 
non-technical), 84-year-old mother-in-law, who has been using email for 
a couple of decades (thus certainly not a "newbie"), and is definitely 
not a spammer. Do you have any advice for how I break it to her that 
she's an ineducable moron? You know, since there are no exceptions and all.


Jim



Re: Are any of you starting to get AI robocalls?

2018-04-04 Thread Jim Shankland

On 4/4/18 7:44 AM, Sean Pedersen wrote:

Yep. Add it to the list of IRS scams, fake arrest warrants, credit repair, free 
vacations, etc. The rate of calls has increased dramatically in the past year, especially 
with the "neighborhood scam" where they spoof their CLID to a local area code 
and prefix +  through  and blast you with calls, trying to trick you into 
thinking it's someone local and thus important or legitimate.

Let me also put in a good word for the Jolly Roger Telephone Co. 
(http://www.jollyrogertelco.com). Don't just defend, fight back.


Jim



Re: Zayo zColo Xcon Pricing

2018-03-09 Thread Jim Shankland

On 3/7/18 9:00 AM, Ian Mock wrote:

Everything is negotiable. NRC on a cross-connect is ridiculous. The cost to
run should be made up with the amount they're charging monthly. I wouldn't
pay more than $200/mo for copper.

Actually, as a reflection of the provider's cost, NRC for a 
cross-connect makes more sense than a recurring cost. After all, there's 
labor involved in setting up the cross-connect, but once it's in, it 
pretty much just sits there.


The fallacy here, though, is assuming that rational pricing bears some 
relation to the vendor's cost to provide the good or service. Actual 
price is based on what the market will bear. Sharing pricing information 
on NANOG likely helps consumers by increasing market transparency (which 
is why vendors love to block such sharing via NDA). Much as I sympathize 
with the sentiment, though, "ridiculous" is meaningless in this context. 
It may even be construed as positive, as in: "Awesome, we're making 
ridiculous profits on all these copper cross-connects." :-)


Jim



Re: PCIe adapters supporting long distance 10GB fiber?

2017-06-20 Thread Jim Shankland

On 6/20/17 8:15 AM, Baldur Norddahl wrote:

The real question here is: will my NIC support other SFP+ modules than the
few options carried by the NIC vendor?

For example Intel claims the Intel NICs can only accept SFP+ modules by
Intel. They probably do not make optics themselves and only have few
options available. And indeed if you put in a third party optic it will be
rejected.

The last I looked -- and it's been a few years, so it might no longer be 
true -- the check for this was in the driver software, which is 
open-sourced. The check was even guarded by an ifdef so that it was 
easily disabled. If you disabled the check, you got a hyperventilating 
syslog warning saying you were taking your life into your hands by using 
unapproved equipment. That warning could then be ignored while it 
receded into rotated and, eventually, expunged log history.


As I said, that was a few years ago, so would need to be reconfirmed.

Jim



Re: IoT security, was Krebs on Security booted off Akamai network

2016-10-09 Thread Jim Shankland

On 10/9/16 11:30 AM, valdis.kletni...@vt.edu wrote:

On Sun, 09 Oct 2016 18:05:20 -, Mel Beckman said:

I don't know why it's "sub optimal" to use the cloud from an isolated network. 
Can you elaborate?

Why should something out in the cloud have any part of the communication,
other than perhaps telling your cellphone the current address of your widget?

(And *that* should probably have a standardized protocol/service rather than
every vendor rolling their own.  Hello, IETF?)

And even *that* can be bypassed if you cellphone is able to talk to your
home network directly.


A fair question, if it's intended rhetorically. If not, then the short 
answer is: because monetizing your personal information is a large 
(possibly dominant) part of the IoT business model, today.


Rampant security holes don't necessarily perturb that model excessively 
-- though goodness knows they should, and maybe eventually they will. In 
the meantime, we have what Zeynep Tufekci has called the "Internet of 
Hacked Things" (anybody want to help get the acronym IoHT into general 
currency?).


Jim




Re: John McAfee: Massive DDoS attack on the internet was from smartphone botnet on popular app

2015-12-12 Thread Jim Shankland

Also, this jumped out at me:

"The problem with the recent attack is that the originating IP addresses 
were evenly distributed within the IPV4 universe," McAfee says. "This is 
virtually impossible using spoofing."


Am I missing something, or is an even distribution of originating IP 
addresses virtually impossible *without* using spoofing?


Jim





Re: Galaxy S6 is IPv6 on all US National Mobile carriers

2015-04-13 Thread Jim Shankland

On 4/13/15 8:17 PM, Joe Klein wrote:

Was in a meeting over 4 years ago, where the people from Verizon were
claiming they would be rolling out IPv6 for FIOS in the following years.
Still waiting.

C
For those of us of a certain age, I'm wondering: what was the year when 
you first heard that the entire Internet was going to be switching over 
to IPv6 Real Soon Now?


I distinctly remember my first time (who ever forgets?). I'm a little 
hazy on the exact year, but I know it started with a 1.


Jim




Re: scaling linux-based router hardware recommendations

2015-01-27 Thread Jim Shankland

On 1/26/15 11:33 PM, Pavel Odintsov wrote:

Hello!

Looks like somebody want to build Linux soft router!) Nice idea for
routing 10-30 GBps. I route about 5+ Gbps in Xeon E5-2620v2 with 4
10GE cards Intel 82599 and Debian Wheezy 3.2 (but it's really terrible
kernel, everyone should use modern kernels since 3.16 because buggy
linux route cache). My current processor load on server is about:
15%, thus I can route about 15 GE on my Linux server.


I looked into the promise and limits of this approach pretty intensively 
a few years back before abandoning the effort abruptly due to other 
constraints. Underscoring what others have said: it's all about pps, not 
aggregate throughput. Modern NICs can inject packets at line rate into 
the kernel, and distribute them across per-processor queues, etc. 
Payloads end up getting DMA-ed from NIC to RAM to NIC. There's really no 
reason you shouldn't be able to push 80 Gb/s of traffic, or more, 
through these boxes. As for routing protocol performance (BGP 
convergence time, ability to handle  multiple full tables, etc.): that's 
just CPU and RAM.


The part that's hard (as in can't be fixed without rethinking this 
approach) is the per-packet routing overhead: the cost of reading the 
packet header, looking up the destination in the routing table, 
decrementing the TTL, and enqueueing the packet on the correct outbound 
interface. At the time, I was able to convince myself that being able to 
do this in 4 us, average, in the Linux kernel, was within reach. That's 
not really very much time: you start asking things like will the entire 
routing table fit into the L2 cache?


4 us to think about each packet comes out to 250Kpps per processor; 
with 24 processors, it's 6Mpps (assuming zero concurrency/locking 
overhead, which might be a little bit of an ... assumption). With 
1500-byte packets, 6Mpps is 72 Gb/s of throughput -- not too shabby. But 
with 40-byte packets, it's less than 2 Gb/s. Which means that your Xeon 
ES-2620v2 will not cope well with a DDoS of 40-byte packets. That's not 
necessarily a reason not to use this approach, depending on your 
situation; but it's something to be aware of.


I ended up convincing myself that OpenFlow was the right general idea: 
marry fast, dumb, and cheap switching hardware with fast, smart, and 
cheap generic CPU for the complicated stuff.


My expertise, such as it ever was, is a bit stale at this point, and my 
figures might be a little off. But I think the general principle 
applies: think about the minimum number of x86 instructions, and the 
minimum number of main memory accesses, to inspect a packet header, do a 
routing table lookup, and enqueue the packet on an outbound interface. I 
can't see that ever getting reduced to the point where a generic server 
can handle 40-byte packets at line rate (for that matter, line rate is 
increasing a lot faster than speed of generic server these days).


Jim





Re: Major California Faults Ready To Rupture | IFLScience

2014-10-19 Thread Jim Shankland

On 10/19/14 2:03 AM, Eliot Lear wrote:

This was my recollection as well.  Many corporate PBXes failed, and as
it happened, for some reason, the mobile towers functioned with excess
capacity, to the point where I had a line coming out of my car.  Best
form of communication into and out of the region during the crisis was
the Internet.  No surprise.  That's what it was designed for.


So I guess heartbeat.belkin.com stayed up?

Jim



Re: best practice for advertising peering fabric routes

2014-01-15 Thread Jim Shankland

On 1/14/14, 8:41 PM, Patrick W. Gilmore wrote:

I repeat: NEVER EVER EVER put an IX prefix into BGP, IGP, or even static route. 
An IXP LAN should not be reachable from any device except those directly 
attached to that LAN. Period.



So ... RFC1918 addresses for the IXP fabric, then?

(Half kidding, but still )

Jim Shankland




Re: Mikrotik Cloud Core Router and BGP real life experiences?

2013-12-27 Thread Jim Shankland

On 12/27/13 6:40 AM, matt kelly wrote:

They can not handle a full routing table. The load balancing doesn't work.
They can not properly reassemble fragmented packets, and therefore drop all
but the first piece. They can not reliably handle traffic loads over
maybe 200 Mbps, we needed 4-6 Gbps capacity. They can not hold a gre tunnel
connection.


Can't say anything about MicroTik specifically, but I've used Linux as a 
routing platform for many years, off and on, and took a reasonably close 
look at performance about a year ago, in the previous job, using 
relatively high-end, but pre-Sandy Bridge, generic hardware.  We were 
looking to support ca. 8 x 10 GbE ports with several full tables, and 
the usual suspects wanted the usual 6-figure amounts for boxes that 
could do that (the issue being the full routes -- 8 x 10 GbE with 
minimal routing is a triviality these days).


Routing table size was completely not an issue in our environment; we 
were looking at a number of concurrent flows in the high-5 to 
low-6-digit range, and since Linux uses a route cache, it was that 
number, rather than the number of full tables we carried, that was 
important. Doing store-and-forward packet processing, as opposed to 
cut-through switching, took about 5 microseconds per packet, and 
consumed about that much CPU time. The added latency was not an issue 
for us; but at 5 us, that's 200Kpps per CPU.  With 1500-byte packets, 
that's about 2.4 Gb/s total throughput; but with 40-byte packets, it's 
only 64 Mb/s (!).


But that's per CPU.  Our box had 24 CPUs (if you count a hyperthreaded 
pair as 2), and this work is eminently parallelizable.  So a theoretical 
upper bound on throughput with this box would have been 4.8 Mpps -- 57.6 
Gb/s with 1500-byte packets, 1.5 Gb/s with 40-byte packets.


The Linux network stack (plus RSS on the NICs) seemed to do quite a good 
job of input-side parallelism - but we saw a lot of lock contention on 
the output side. At that point, we abandoned the project, as it was 
incidental to the organization's mission. I think that with a little 
more work, we could have gotten within, say, a factor of 2 of the limits 
above, which would have been good enough for us (though surely not for 
everybody). Incrementally faster hardware would have incrementally 
better performance.


OpenFlow, which marries cheap, fast, and dumb ASICs with cheap, slower, 
and infinitely flexible generic CPU and RAM, seemed, and still seems, 
like the clearly right approach. At the time, it didn't seem ready for 
prime time, either in the selection of OpenFlow-capable routers or in 
the software stack. I imagine there's been some progress made since. 
Whether the market will allow it to flourish is another question.


Below a certain maximum throughput, routing with generic boxes is 
actually pretty easy.  Today, I'd say that maximum is roughly in the 
low-single-gigabit range. Higher is possible, but gets progressively 
harder to get right (and it's not a firm bound, anyway, as it depends on 
traffic mix and other requirements). Whether it's worth doing really 
depends on your goals and skill. Most people will probably prefer a 
canned solution from a vendor. People who grow and eat their own food 
surely eat better, and more cheaply, than those who buy at the 
supermarket; but it's not for everybody.


Jim Shankland




Re: If you're on LinkedIn, and you use a smart phone...

2013-10-25 Thread Jim Shankland
Well, this concerned me at first, but then I read the description of how 
it's done 
(http://engineering.linkedin.com/mobile/linkedin-intro-doing-impossible-ios):


We understand that operating an email proxy server carries great 
responsibility.
We respect the fact that your email may contain very personal or 
sensitive
information, and we will do everything we can to make sure that it 
is safe.


I find this completely reassuring.  I'd expand on that, but I have to go 
buy a used car now.


Jim Shankland



Re: PacketShader

2010-08-23 Thread Jim Shankland

Mark Smith wrote:

On Mon, 23 Aug 2010 05:59:43 -0400
valdis.kletni...@vt.edu wrote:

I missed that, and that answers the was it a GigaBytes verses Gigabits
error question. Nothing new here by the looks of it - people in this
thread were getting those sorts of speeds a year ago out of PC hardware
under Linux -

http://lkml.org/lkml/2009/7/15/234

I have achieved a collective throughput of 66.25 Gbit/s.

We've achieved 70 Gbps aggregate unidirectional TCP performance from
one P6T6 based system to another.


Very nice, but doing this with 1514-byte packets is the low-hanging
fruit.  (9K packets?  That's the fruit that falls off the tree and
into your basket while you're napping :-).)  The more interesting limit:
how many 40-byte packets per second can you shovel into this system
and still have all of them come out the other end?

Jim Shankland



Re: black listing of web traffic

2010-02-09 Thread Jim Shankland

Andrey Gordon wrote:

Can't find my IP on any of the black lists. Don't have any proxies. Sites
that behave poorly are consistent. That is to say that facebook.com,
apple.com would always come up without an issue, but cnn.com,
forever21.com(i know, don't ask, students),
store.apple.com would consistently take forever to come up.

Just wanted to check of rate-limiting web clients is a common practice
nowdays in the industry. If it's not, it's probably an unlikely cause of my
troubles...


Other things you might want to check out include whether your NAT
gateway is well-behaved in the presence of PMTU discovery, TCP
timestamps, and ECN.  The web sites your students are having trouble
with may share some property that, correctly or not, is interacting
poorly with your NAT implementation.

(I remain astonished at the number of big name web sites out there
that send out their content with the DF bit set, then drop the
fragmentation required ICMP packets they get back on the floor.)

Jim Shankland



Re: Revisiting the Aviation Safety vs. Networking discussion

2009-12-24 Thread Jim Shankland

Eddy Martinez wrote:

On Dec 24, 2009, at 10:09 AM, Randy Bush wrote:


I _do_ create action plans and _do_ quarterback each step and _do_
slap down any attempt to deviate.

imagine a network engineering culture where the concept of 'attempt to
deviate' just does not occur.


I find the thought of *any* culture in which attempts to deviate
just do not occur a little unnerving.

Jim Shankland

http://blog.oliver-gassner.de/archives/225-Guenter-Eich,-Traeume.html



Re: Cogent Considerations [was: Re: Cogent Haiku v2.0]

2009-01-12 Thread Jim Shankland

Adam Young wrote:

I wouldn't take my word for it but truthfully, you get what you pay for.
 Given you have other, more reliable transit, adding Cogent may be ok.
I wouldn't rely on it for anything serious though.


That has not been my experience.  Peering wars have been an issue, but
aside from that, they've been fine.  (This is transit in San Francisco
at the gigabit-plus level.)

Jim Shankland



Re: [Fwd:] Nvidia NICs with duplicate mac addresses

2008-09-05 Thread Jim Shankland

The Nvidia NIC on the Asus motherboard on my desktop computer
spontaneously changed its MAC maybe a year ago from 00:13:d4:fe:04:ee
to 00:0b:e0:f0:00:ed.  It can still be overridden in software,
but the default MAC address -- the one stored in ROM -- simply
made a one-time, spontaneous, permanent change.

Nvidia NICs ... as my mother said, if you can't say anything nice,
don't say anything at all.  So the rest is silence.

Jim Shankland



Re: IP Fragmentation

2008-08-20 Thread Jim Shankland

Leo Bicknell wrote:

In a message written on Wed, Aug 20, 2008 at 09:43:44PM +0530, Glen Kent wrote:

Do transit routers in the wild actually get to do IP fragmentation
these days? [...]


Yes.

A GigE jumbo frames host (9120) to a standard POS interface (4420)
to a DS3 customer (1500) happens, and the GigE-POS and POS-DS3
routers must both do fragmentation.


From the application (as opposed to network operator) point of view,
the big problem with fragmentation is that if you lose one fragment
in transit, all the fragments eventually get discarded, even if they've
made it all the way to the destination.  This hurts performance and
wastes resources.  So you may be better off not sending those jumbo
frames in the first place.

If your packet loss rate, end-to-end, is epsilon, and epsilon is so
small that even several times epsilon is negligible, then maybe you
don't care.  But you're clearly now relying on a higher standard of
performance from the network fabric than you otherwise would be.

Way back when, before my beard was gray, Sun came out with the Sun-4
servers, based on the new SPARC architecture.  These were then widely
deployed as NFS servers for Sun-3 desktops.  The default NFS blocksize
was 8K, the default (maybe only) transport was UDP.  Sun-3 would make
a read request, Sun-4 would send an 8K+ UDP response, which would
get fragmented into a burst of 6 IP fragments, Sun-3 would get
the first 3 or 4 before falling behind (this was, after all, the
blistering fast 10 megabit Ethernet) and dropping a fragment.
Eventually, the reassembly would time out, all the received fragments
would get discarded, NFS would resend ... lather, rinse, repeat.
Setting the NFS read and write sizes to 1460 fixed this by avoiding
fragmentation.

This concludes today's presentation from the history channel.

Jim Shankland



Re: ICANN opens up Pandora's Box of new TLDs

2008-06-28 Thread Jim Shankland

Phil Regnauld wrote:

Requirement ?  What requirement ?  There's no requirement for
reverse DNS for email in any RFC.


As a practical matter, I've found that sending out email from a
host without rDNS doesn't work:  too many sites bounce the mail.

It will not come as news to anyone on this list that the world
of SMTP is hardly well-defined or well-regulated in practice.
Like Rowlf the dog, we can't live with it, we can't live without
it, but we're stuck until something better comes along:

http://www.youtube.com/watch?v=1vvV9LjBsNw

Jim Shankland



Security gain from NAT (was: Re: Cool IPv6 Stuff)

2007-06-04 Thread Jim Shankland

Owen DeLong [EMAIL PROTECTED] writes:
 There's no security gain from not having real IPs on machines.
 Any belief that there is results from a lack of understanding.

This is one of those assertions that gets repeated so often people
are liable to start believing it's true :-).

*No* security gain?  No protection against port scans from Bucharest?
No protection for a machine that is used in practice only on the
local, office LAN?  Or to access a single, corporate Web site?

Shall I do the experiment again where I set up a Linux box
at an RFC1918 address, behind a NAT device, publish the root
password of the Linux box and its RFC1918 address, and invite
all comers to prove me wrong by showing evidence that they've
successfully logged into the Linux box?  When I last did this,
I got a handful of emails, some quite snide, suggesting I was
some combination of ignorant, stupid, and reckless; the Linux
box for some reason remained unmolested.

Jim Shankland


Security gain from NAT (was: Re: Cool IPv6 Stuff)

2007-06-04 Thread Jim Shankland

[EMAIL PROTECTED] writes:

 On Mon, 04 Jun 2007 11:32:39 PDT, Jim Shankland said:
  *No* security gain?  No protection against port scans from Bucharest?
  No protection for a machine that is used in practice only on the
  local, office LAN?  Or to access a single, corporate Web site?
 
 Nope. Zip. Zero. Ziltch.  Nothing over and above what a good properly
 configured stateful *non*-NAT firewall should be doing for you already.

Thanks for the clarification, Owen and Valdis.  We are, of course,
100% in agreement that it is stateful inspection that provides
(a measure of) security, and that stateful inspection can be had
without NAT.

But NAT *requires* stateful inspection; and the many-to-one, port
translating NAT in common use all but requires affirmative steps
to be taken to relay inbound connections to a designated, internal
host -- the default ends up being to drop them.  All this can be
done without NAT, but with NAT you get it for free.

I can't pass over Valdis's statement that a good properly configured
stateful firewall should be doing [this] already without noting
that on today's Internet, the gap between should and is is
often large.

If what you meant to say is that NAT provides no security benefits
that can't also be provided by other means, then I completely
agree.

Jim Shankland