Re: F.ROOT-SERVERS.NET moved to Beijing?

2011-10-04 Thread Lindqvist Kurt Erik

On 3 okt 2011, at 16:30, Todd Underwood wrote:

 
 ignoring randy (and others) off-topic comments about hypocrisy, this
 situation is fundamentally a situation of bad (or different) network
 policy being applied outside of its scope.  i would prefer that china
 not censor the internet, sure.  but i really require that china not
 censor *my* internet when i'm not in china.

Most if not all European operators today force rewrite or blocking of DNS 
lookups. Belgium added a fairly large site today. There is virtually no way 
that this can be contained just inside a country. This problem is wy beyond 
root-servers, China etc. Filtering on the net is becoming common, and was 
pushed quite hard for at Interent Governance Forum last week. By Interpol and 
MPAA. 

Best regards,

- kurtis -






signature.asc
Description: Message signed with OpenPGP using GPGMail


Re: The i-root china reroute finally makes fox news. And congress.

2010-11-17 Thread Lindqvist Kurt Erik
On 16 nov 2010, at 18.08, Suresh Ramasubramanian wrote:
 
 http://www.foxnews.com/politics/2010/11/16/internet-traffic-reportedly-routed-chinese-servers/

I can detect from the report that this has anything to do with i.root? Can you 
explain that? 

Looking at the dates referred to it seem more to be related to the routing 
leaks on April 8th. Or do you have additional information? 

Best regards,

- kurtis -







PGP.sig
Description: This is a digitally signed message part


Re: The i-root china reroute finally makes fox news. And congress.

2010-11-17 Thread Lindqvist Kurt Erik
On 17 nov 2010, at 07.17, Fred Baker wrote:
 
 
 On Nov 17, 2010, at 1:08 AM, Suresh Ramasubramanian wrote:
 
 http://www.foxnews.com/politics/2010/11/16/internet-traffic-reportedly-routed-chinese-servers/
 
 I have read the article and the list, and I'm puzzled. It's pretty clear that 
 the root gets its records from a common source, and that the copies of them 
 being delivered by a given root server were different. As a result, traffic 
 intended to go place A went to place B if the TLD lookup happened to go to 
 the particular root server in question. How did an instance of the root 
 server find itself serving changed records? While there is no obvious 
 indication of who made the change or for what reason, it's unlikely it was 
 accidental.
 
 Not sure what Glenn Beck, Fox News, or Godwin's Law have to do with it. There 
 was a technical event that resulted in misrouting of traffic, and while 
 international concerns regarding it had political overtones, the technical 
 event is not a political one. If it was your traffic that had been misrouted, 
 you might have issued expressions of concern. So why respond to it with a 
 political response?
 
 Sounds to me like one of the arguments for DNSSEC deployment...

Before the rumor mill get's going based on the Renesys work again, the article 
doesn't mention DNS, it mentions re-routing of traffic. I would like to repreat 
what we have said in the past. 

As best as we can tell - no i.root-servers.net instance operated by us has 
answered incorrectly - ever. We serve the data exactly as we receive it from 
IANA. 

When I read the article I assumed it referred to the routing leaks of April 8th 
that was also discussed on Nanog. But I haven't read the report, nor has anyone 
contacted us regarding it. Renesys has though, a few weeks ago contacted us to 
get some data from us on what happened in March. 

Best regards,

- kurtis -






PGP.sig
Description: This is a digitally signed message part


Re: The i-root china reroute finally makes fox news. And congress.

2010-11-17 Thread Lindqvist Kurt Erik
On 17 nov 2010, at 15.37, Lindqvist Kurt Erik wrote:
 
 On 16 nov 2010, at 18.08, Suresh Ramasubramanian wrote:
 
 http://www.foxnews.com/politics/2010/11/16/internet-traffic-reportedly-routed-chinese-servers/
 
 I can detect from the report that this has anything to do with i.root? Can 
 you explain that? 


Apparently typing fast is not a good idea :-( I meant to say I cannot 
deduct...

 Looking at the dates referred to it seem more to be related to the routing 
 leaks on April 8th. Or do you have additional information? 
 
 Best regards,
 
 - kurtis -
 
 
 
 
 


Best regards,

- kurtis -






PGP.sig
Description: This is a digitally signed message part


Re: Feds disable movie piracy websites in raids

2010-07-01 Thread Lindqvist Kurt Erik

On 1 jul 2010, at 15.20, Patrick W. Gilmore wrote:

 n Jul 1, 2010, at 9:03 AM, Franck Martin wrote:
 
 The question is because gTLDs operations are in the USA, does it mean that 
 the USA have control over all those domain names?
 
 Can we trust solely the USA for such control?
 
 This will come back with a vengeance in the JPA negotiations, ICANN, etc...

JPA discussions are concluded and replaced with the AoC. The discussion on the 
renewal of the IANA contract I suspect will be a recurring theme in IGF in 
Villnius. 

 Yeah, because if the domains were housed in another country than the USofA, 
 that country's court system  law enforcement surely wouldn't feel any sort 
 of authority over the machines on their sovereign soil.  It's just the evil 
 USA that would dare to think in such a fashion.  Oh, wait

If you look at the . level i.e ICANN my understanding is that if it was a 
treaty or UN organization that does not apply. However as we are talking gTLD 
level you are indeed right. 

 Is it possible the law enforcement officers went through the standard due 
 process for the country in which they operate, Just Like Any Other Law 
 Enforcement Agency Would?  Nahh, no way we could consider that.  It wouldn't 
 allow us to bang on the US and make hollow threats about future negotiations.
 
 
 It's fun to bang on the US, but let's try to keep even a hint of reality  
 perspective in our rants.  Please?



Best regards,

- kurtis -






PGP.sig
Description: This is a digitally signed message part


AAAA being added for i.root-servers.net

2010-06-17 Thread Lindqvist Kurt Erik

All,

This is to inform you that, we (Netnod/Autonomica, operators of 
i.root-servers.net) have been notified by IANA that on our request an  
record will be added to the root-zone with serial number 2010061700.

Best regards,

- kurtis -

---
Kurt Erik Lindqvist, CEO
kur...@netnod.se, Direct: +46-8-562 860 11, Switch: +46-8-562 860 00
Please note our new address:
Franzéngatan 5  | SE-112 51 Stockholm | Sweden



PGP.sig
Description: This is a digitally signed message part


Please report issues with i.root-servers.net

2010-06-12 Thread Lindqvist Kurt Erik


All,

Renesys has since a few days had a blog post at 
http://www.renesys.com/blog/2010/06/two-strikes-i-root.shtml. On the 9th I 
urged them to provide us with any data if they are seeing incorrect responses 
from NAY i.root-servers.net instance, and share that with n...@netnod.se. I 
have so far received a single email from Renesys on friday morning CET time. 
That email did not contain any data or further information. I asked to share 
that email with the Nanog list as Renesys will apparently share some results on 
studies of the i.root-servers.net in Beijing. I have no insight into what these 
findings, and Renesys did not respond to my request to see them before hand. 

As of today Renesys have updated their blog post with data that seems to 
indicate that they have seen incorrect responses from an i.root-servers.net 
instance. This is the first report of such responses since we re-activated our 
anycast node in Beijing, and we only saw this by monitoring the comments field 
to he blog post. At the time of re-activating the node we did test from all 
locations we could find and queried the i.root-servers.net node in Beijing, and 
we did not see any incorrect responses. 

Now, I would request that you all *please* report operational issues with 
i.root-servers.netm or in case you see any behavior you do not expect to 
n...@netnod.se. 

Unfortunately noone from us will attend the upcoming Nanog meeting, and I can't 
from the agenda see when the presentation is due. I am happy to answer any 
questions directly though, and I will try and read Renesys results as soon as 
they are published. In the mean time, as we are dealing what is potentially an 
operational problem, please report any issues to us. 

To provide some background, I will share some of my responses to the Renesys 
email on friday - although I admit they are taken out of context I think they 
do provide some general background information that might be worth sharing. 

---
As I wrote in my response to your blogpost, the node in China has ALWAYS been 
globally reachable (what ever that means. In our terminology it means we are 
not exporting the prefixes with no-export, so the prefixes propagates as far as 
our peers advertise them). 
---
As to the above, many countries tamper with DNS responses so I have no way of 
assuring anyone that a packet that traverses many countries, many regulations 
and many networks owners are ever tampered with. In the case where queries to 
our node in Beijing was seen to respond with incorrect responses, we have 
obviously been in discussions with our hosts for the node in Beijing and they 
have as we understand it been in discussions with many of the networks in 
China. What we understand from these discussions, the occurrence of these 
incorrect responses for queries sent to i.root-servers.net was a mistake. I 
have no insight into why or how the mistake happened, but we have been assured 
it won't be possible for it to happen again. That said - let me again stress 
that neither we nor anyone else, can assure that packets on the Internet does 
not get tampered with along the path. What we can do is to deploy mechanisms 
that will detect this tampering at the application layer, for example DNSSEC. 
---

Kurt Erik Lindqvist
CEO Netnod





PGP.sig
Description: This is a digitally signed message part