Re: Gmail and SSL

2013-01-02 Thread Matthew Palmer
On Wed, Jan 02, 2013 at 07:35:49PM -0500, William Herrin wrote:
 A reputable SSL signer would have to get outed just once issuing a
 government a resigning cert and they'd be kicked out of all the
 browsers. They'd be awfully easy to catch.

I believe Honest Achmed said it best:

In any case by the time he's issued enough certificates he'll be regarded
as too big to fail by the browser vendors, so an expensive audit doesn't
really matter.

as well as

Achmed's business plan is to sell a sufficiently large number of
certificates as quickly as possible in order to become too big to fail

and

Achmed guarantees that no certificate will be issued without payment having
been received, as per the old latin proverb nil certificati sine lucre.

- Matt




Re: Gmail and SSL

2013-01-01 Thread Matthew Palmer
On Tue, Jan 01, 2013 at 12:04:16PM -0700, Keith Medcalf wrote:
 Perhaps the cheapest way to solve this is to apply thumbscrews and have
 google require the use of co-option freindly keying material by their
 victims errr customers errr users.

ITYM product.

- Matt




Re: TCP time_wait and port exhaustion for servers

2012-12-07 Thread Matthew Palmer
On Thu, Dec 06, 2012 at 08:58:10AM -0500, Ray Soucy wrote:
  net.ipv4.tcp_keepalive_intvl = 15
  net.ipv4.tcp_keepalive_probes = 3
  net.ipv4.tcp_keepalive_time = 90
  net.ipv4.tcp_fin_timeout = 30
 
 As discussed, those do not affect TCP_TIMEWAIT_LEN.
 
 There is a lot of misinformation out there on this subject so please
 don't just Google for 5 min. and chime in with a solution that you
 haven't verified yourself.
 
 We can expand the ephemeral port range to be a full 60K (and we have
 as a band-aid), but that only delays the issue as use grows.  I can
 verify that changing it via:
 
 echo 1025 65535  /proc/sys/net/ipv4/ip_local_port_range
 
 Does work for the full range, as a spot check shows ports as low as
 2000 and as high as 64000 being used.

I can attest to the effectiveness of this method, however be sure and add
any ports in that range that you use as incoming ports for services to
/proc/sys/net/ipv4/ip_local_reserved_ports, otherwise the first time you
restart a service that uses a high port (*cough*NRPE*cough*), its port will
probably get snarfed for an outgoing connection and then you're in a sad,
sad place.

- Matt

-- 
[An ad for Microsoft] uses the musical theme of the Confutatis Maledictis
from Mozart's Requiem. Where do you want to go today? is on the screen,
while the chorus sings Confutatis maledictis, flammis acribus addictis,.
Translation: The damned and accursed are convicted to the flames of hell.




Re: Finding Name Servers (not NS records) of domain name

2012-08-17 Thread Matthew Palmer
On Wed, Aug 15, 2012 at 06:10:25PM -0400, Anurag Bhatia wrote:
 Now as you would be knowing if I do regular dig with ns, it provides NS
 records. However I was able to find nameservers by digging gTLD root for
 gTLD based domains. This works for .com/net/org etc but again fails for say
 .us, .in etc. I was wondering if there's an easy way to do it rather then
 running script on thousands of domain names again  again digging registry
 specific nameservers?

I religiously use http://squish.net/dnscheck/ the moment I suspect *any*
sort of DNS hinkiness.  Verbose, but *damn* if it doesn't hand me the answer
practically every time.

- Matt




Re: job screening question

2012-07-07 Thread Matthew Palmer
On Sat, Jul 07, 2012 at 11:01:29AM -0700, JC Dill wrote:
 On 06/07/12 9:06 PM, Matthew Palmer wrote:
 Maybe it's more significant to ask what the difference between TCP and UDP 
 is.
 Yes, the difference between TCP and UDP is a much better question to ask,
 but having HR assess and act on the answer to the question is a whole hell
 of a lot harder.
 
 The best path is to have HR report the answer verbatim for the
 hiring manager to do the assessing.  Then the hiring manager can
 decide which candidates proceed to the next level of interviews.

Two problems there:

* We've already had mention made in this thread of the problems associated
  with HR attempting to record, verbatim, an answer provided by a candidate. 
  Unless all your HR phone screeners are experienced stenographers (who, I
  will note, can typically command salaries far in excess of HR associates),
  their chances of getting an accurate record of a candidate's statements is
  slim.

* If you're going to have to carefully examine each candidate's answers
  *anyway*, why not just get on the phone screen with them in the first
  place, and get HR out of the picture?  At least that way you're not
  wasting money paying for HR people, and you can do a far more in-depth
  interview because you're there, in real-time, to ask follow-up questions.

- Matt


-- 
MySQL seems to be the Windows of the database world. Broken, underspecced,  
and mainly only popular due to inertia and people who don't really know what
they're doing.
-- Peter Corlett, in the Monastery




Re: job screening question

2012-07-06 Thread Matthew Palmer
On Thu, Jul 05, 2012 at 05:01:39PM -0700, Scott Weeks wrote:
 
 
 --- ja...@thebaughers.com wrote:
 From: Jason Baugher ja...@thebaughers.com
 
 Geez, I'd be happy to find someone with a good attitude, a solid work 
 ethic, and the desire and aptitude to learn. :)
 ---
 
 
 Yeah, that.  But how do you get those folks through the HR 
 process to you, so you can decipher their skill/work ethic 
 level?  What can the HR person ask to find out if someone 
 has these qualities?  OSPF LSA type questions will not help.

Don't get HR to do that sort of screening.  They suck mightily at it.  I
lack any sort of HR department to get in the way, and I'm glad of it -- I
don't see the value in having someone who doesn't know anything about the
job get in the way of finding the right person for it.  Sure, get 'em to do
the scutwork of posting job ads, collating resumes, scheduling things and
sending the lolz no! responses, but actually filtering?  Nah, I'll do that
bit thanks.  If you have to have HR do a filter call, make it *really*
simple, like What does TCP stand for? -- sadly, you'll still probably
filter out half the applicants for a senior position...

- Matt




Re: job screening question

2012-07-06 Thread Matthew Palmer
On Sat, Jul 07, 2012 at 12:51:55PM +1200, Ben Aitchison wrote:
 On Fri, Jul 06, 2012 at 04:18:21PM +1000, Matthew Palmer wrote:
  On Thu, Jul 05, 2012 at 05:01:39PM -0700, Scott Weeks wrote:
   --- ja...@thebaughers.com wrote:
   From: Jason Baugher ja...@thebaughers.com
   
   Geez, I'd be happy to find someone with a good attitude, a solid work 
   ethic, and the desire and aptitude to learn. :)
   ---
   
   
   Yeah, that.  But how do you get those folks through the HR 
   process to you, so you can decipher their skill/work ethic 
   level?  What can the HR person ask to find out if someone 
   has these qualities?  OSPF LSA type questions will not help.
  
  Don't get HR to do that sort of screening.  They suck mightily at it.  I
  lack any sort of HR department to get in the way, and I'm glad of it -- I
  don't see the value in having someone who doesn't know anything about the
  job get in the way of finding the right person for it.  Sure, get 'em to do
  the scutwork of posting job ads, collating resumes, scheduling things and
  sending the lolz no! responses, but actually filtering?  Nah, I'll do that
  bit thanks.  If you have to have HR do a filter call, make it *really*
  simple, like What does TCP stand for? -- sadly, you'll still probably
  filter out half the applicants for a senior position...
 
 I've noticed a strong correlation between people who don't know what acronyms
 stand for, and competence.  People who don't know anything try and figure out
 what the acronym stands for - people who want to understand things see it as
 just a place holder.

[...]

 Maybe it's more significant to ask what the difference between TCP and UDP is.

Yes, the difference between TCP and UDP is a much better question to ask,
but having HR assess and act on the answer to the question is a whole hell
of a lot harder.  In many ways, *that's* the tough bit of finding a good
screening question.  Finding good interview questions *in general* isn't all
that hard.  With a good senior candidate my interview questions could just
be bringing up problems I've recently solved or am currently wrestling with,
and having a 30 minute conversation on the problem.  I'll get a very good
idea of someone's domain knowledge and problem-solving skills by doing that. 
But there's no way I can ask HR to do that, because they don't know how to
assess the answer, and as previously demonstrated (fragmented disks,
indeed), you can't have HR act as scribe and relay the answer to you,
because they'll get it wrong, and the interesting bit is the *conversation*,
not the canned single-shot answer.

That's my motivation for asking a question as inane as What does TCP stand
for? -- it has an overwhelmingly obvious answer that can be verified in a
second or two by someone who really doesn't know anything about what they're
asking.  Give a candidate 10 of those sorts of questions over the phone from
an HR drone, if they score 8-or-better (for instance) they pass and you get
to see their resume.  That is, of course, assuming your organisation is so
screwed up that they won't let you at candidates directly (which is still my
preferred option -- leave HR to do the paperwork).

- Matt

-- 
The real art of conversation is not only to say the right thing at the
right place but to leave unsaid the wrong thing at the tempting
moment. -- Dorothy Nevill




Re: F-ckin Leap Seconds, how do they work?

2012-07-03 Thread Matthew Palmer
On Mon, Jul 02, 2012 at 09:13:42AM -0700, Michael Thomas wrote:
 My centos 6/64 running 3.0 seemed to weather it too. I'm not quite
 clear on what I should be looking for to classify it as being broken though.

The problems I saw were related to programs that use futex(2) (Java, MySQL,
Chromium, in my personal experience) chewing up lots of CPU because the
futex system call wasn't quite doing what it was supposed to be doing
(waking up threads when they were OK to proceed) and instead constantly
waking the threads up, having the threads go OK, so my lock is clear and
I'm ready to go?, the kernel saying oh, no, sorry and the thread going
back to sleep again -- only to be woken up again immediately.  Sort of an
object lesson in why busy-wait locks suck.

- Matt

-- 
The main advantages of Haynes and Chilton manuals are that they cost $15,
where the factory manuals cost $100 and up, and that they will tell you how
to use two hammers, a block of wood, and a meerkat to replace special tool
no. 2-112-A-- Matt Roberds in asr.




Re: CVV numbers

2012-06-09 Thread Matthew Palmer
On Sat, Jun 09, 2012 at 02:34:03PM -0700, Scott Howard wrote:
 On Sat, Jun 9, 2012 at 12:12 PM, Wayne E Bouchard w...@typo.org wrote:
  The main weakness of CVV2 these days is form history in browsers.
  (auto complete).
 
 Any website requesting a CVV2 in a form field without the form
 history/autocomplete being disabled is in breach of PCI compliance, and
 risks losing their ability to accept credit cards.

And convenience trumps pseudo-security yet again; Chrom(ium) asks me if I want
to save my CC details when I put them in (to which I tell it not just no,
but are you *nuts*?); presumably this is on forms which include
autocomplete=off, since it happens often enough.  So I would assume that
this PCI compliance tickbox is being ignored by browsers.  Whee!

- Matt

-- 
Ruby's the only language I've ever used that feels like it was designed by a
programmer, and not by a hardware engineer (Java, C, C++), an academic
theorist (Lisp, Haskell, OCaml), or an editor of PC World (Python).
-- William Morgan




Re: Bogon list update for prefix for 5.1.0.0/19

2012-05-28 Thread Matthew Palmer
On Mon, May 28, 2012 at 04:31:34PM +0300, Evgeniy Aikashev wrote:
 We are AS21219 - PJSC Datagroup and owner of 5.1.0.0/19 block. Our
 customers have no access to some part of Internet if they use these IPs.
 Could you please update your bogon filters to permit this range.

You're probably going to go and have a stern word with the Hamachi people,
too -- they've been squatting on that space for a while now.

- Matt




Re: Industry practice for BGP costs - one time or fixed/monthly?

2012-05-26 Thread Matthew Palmer
On Sat, May 26, 2012 at 09:39:16PM -0400, Luke S. Crawford wrote:
 On Sat, May 26, 2012 at 10:06:03AM +1000, Matthew Palmer wrote:
  We pay what our providers think they can get away with.  Like most pricing
  decisions, they're not based on any technical logic, they're based on what
  the market will bear.  Feel free to turn the process around -- decide what
  the service is worth to you, tell the provider of the service that price,
  and let them decide if they want to provide it to you at that price.  Don't
  be too surprised if you get monkeys in exchange for your peanuts, though.
 
 Are you suggesting that you get worse service after you negotiate a better
 deal with a particular provider?

To a certain extent, yes.  It has been my experience (from both the service
provider and the customer point-of-view) that customers who aren't worth as
much to a supplier don't get as much love, because the cost of losing
their business to a competitor is much less (or, in some cases, would be a
net win).

However, my main point was that if you are mainly concerned about price,
rather than quality of service (or, more precisely, the value-for-money
ratio between the two), you are likely to end up with a substandard service. 
I will concede, however, that I didn't make that point particularly clear,
for which I apologise.

- Matt


-- 
Advocating Object-Oriented Programming is like advocating Pants-Oriented
Clothing.
-- Jacob Gabrielson




Re: Equinix Direct

2012-05-25 Thread Matthew Palmer
On Fri, May 25, 2012 at 08:19:10AM -0400, Tim Durack wrote:
 It does concern me that the only connectivity options are FE/GE, no
 10GE at this time. Makes me wonder about how serious the service is,
 and whether I will end up with a more congested service than simply
 getting a mix of transit providers myself.

It depends on what you mean by serious.  As I understand it, it's not
targeted at the big end of town -- there's no way you wouldn't be going
direct to the big tier 1s yourself if you needed multiple 10GE pipes, for a
wide variety of reasons.  Instead, it's intended as a leg up for the
smaller players to get into the marketplace *without* needing to make a huge
commitment to the big tier 1s and manage far more moving parts than would
otherwise be the case.

- Matt




Re: Industry practice for BGP costs - one time or fixed/monthly?

2012-05-25 Thread Matthew Palmer
On Fri, May 25, 2012 at 09:31:11PM +0530, Anurag Bhatia wrote:
 I have been aggressively looking for deals in servers in Europe for
 anycasting. One thing which surprises me is the setup costs for BGP. Few
 providers quoted additional $50-100 which looks OK but a few of them quoted
 as high as $150 *extra every month* just for having BGP (no full routing
 table, but just default route pointing). Is there's any technical logic
 behind such heavy costs? I mean at the end of day we are all talking at
 layer 3 and thus it does not involves any hard connection/physical work.
 What other members pay for BGP setup costs?

We pay what our providers think they can get away with.  Like most pricing
decisions, they're not based on any technical logic, they're based on what
the market will bear.  Feel free to turn the process around -- decide what
the service is worth to you, tell the provider of the service that price,
and let them decide if they want to provide it to you at that price.  Don't
be too surprised if you get monkeys in exchange for your peanuts, though.

- Matt




Re: Cogent for ISP bandwidth

2012-05-14 Thread Matthew Palmer
On Mon, May 14, 2012 at 09:27:57PM -0500, Jason Baugher wrote:
 On 5/14/2012 7:30 PM, Jay Ashworth wrote:
 - Original Message -
 From: Jason Baugherja...@thebaughers.com
 I've done some searching and haven't been able to find much in the last
 3 years as to their reliability and suitability as an upstream provider.
 Really?  That surprises me; people complain about Cogent on here, roughly,
 weekly.  :-)

 Sorry, been on this list for quite some time, and I even went back
 to the archives. I don't see much there that is specific to Cogent
 doing a bad job. If I go back a few years, I find stuff about
 Cogent-Telia, Cogent-GBX, and even Cogent-HE IPv6 peering.

So when you play What's the common factor?, you get... ?  grin

We decided not to use Cogent as one of the suppliers for a recent PoP
deployment because of these sorts of games -- it's not that we'd get caught
in them (we've got three providers), but we just don't want to reward that
sort of behaviour with our money.

- Matt




Re: Squeezing IPs out of ARIN

2012-04-26 Thread Matthew Palmer
On Wed, Apr 25, 2012 at 08:31:44AM -0700, Owen DeLong wrote:
 On Apr 24, 2012, at 9:57 PM, Jack Bates wrote:
  I sometimes wonder what happens to that information; if it sits around
  in an archive somewhere in the vast digital repositories of ARIN
  awaiting someone to steal it.
 
 That's a very cynical view. I happen to know that ARIN takes the security
 of that data very seriously and I think they do a good job of protecting
 it.  If you have any reason to believe otherwise, I invite you to offer
 some form of substantiation to support such a claim.

I'm sure that if you s/ARIN/Sony/, s/ARIN/Wordpress/, or s/ARIN/RSA/ (just
to name a few), you'd have found people at some point in the past more than
willing to stand behind the resulting statement.

Just sayin'.

- Matt




Re: The day SORBS goes away ...

2012-04-07 Thread Matthew Palmer
On Sat, Apr 07, 2012 at 08:33:10PM +0300, Hank Nussbacher wrote:
 On Sat, 7 Apr 2012, Rich Kulawiec wrote:
 Clearly, this is idiotic reasoning and only when others start
 blocking their IP ranges and DNS servers will they ever wake up.

But how idiotic is it?  Do you have all Yahoo IP space and domains blocked
on your mail server?  How many mailboxes does that cover?  What percentage
of Yahoo's daily e-mail volume are you blocking, and how much of a rat's
arse do you think Yahoo cares?

I think you can see where I'm going with this.  It's only idiotic
reasoning if it doesn't work, and so far as I can see, it's working just
great -- there are effectively service providers who are too big to
fai^Wblock, and so they get away with things that everyone else would only
dream of.

They do care about the almighty buck more than the 'net, but I'd say that
almost all of us do, because almost none of us are willing to take the
plunge and block Yahoo and other giant providers of spam and other abuse. 
(For the record, I'm in this camp, too -- I'm not willing to lose my job --
my almighty buck -- for taking the step of blocking Yahoo, so I'm not any
sort of trailblazer along this path).

To anyone out there who is blocking Yahoo, and is big enough for them to
take notice, bravo to you!  Speak up, tell the world what you're doing, and
it might give the rest of us the courage and the precedent to do the same.

- Matt

-- 
A friend is someone you can call to help you move. A best friend is someone
you can call to help you move a body.




Re: last mile, regulatory incentives, etc (was: att fiber, et al)

2012-03-23 Thread Matthew Palmer
On Fri, Mar 23, 2012 at 02:18:26PM -1000, Michael Painter wrote:
 Really.  This is from the Governor's Hawaii Broadband Initiative speedtest 
 website:
 
 The indication of above average or below average is based on a
 comparison of the actual test result to the current NTIA definition
 of broadband which is 768 kbps download and 200 kbps upload. Any
 test result above the NTIA definition is considered above average,
 and any result below is considered below average.

Just one more nail in the coffin of the word average.

- Matt

-- 
I seem to have my life in reverse. When I was a wee'un, it seemed perfectly
normal that one could pick up the phone and speak to anybody else in the
world who also has a phone. Now I'm older and more experienced, I'm amazed
that this could possibly work. -- Peter Corlett, in the Monastery




Re: WW: Colo Vending Machine

2012-02-17 Thread Matthew Palmer
On Fri, Feb 17, 2012 at 05:39:34PM -0800, Owen DeLong wrote:
 In such cases, I will occasionally stop by the colo without going home to
 retrieve the laptop.  90% of the time it works out OK.  10% of the time I
 end up leaving the colo, going home, retrieving the laptop and returning
 to the colo.  Obviously, if there was a loaner laptop available for a $15
 rental in the colo as described, it would probably be worth $15 to me
 and/or my organization to avoid the delay and bother of the round-trip
 between colo and home.

As previously advised, typing passwords/phrases into such devices is...  not
recommended.  At $ORK, we've got DC tech laptops in each suite for just such
occasions, preconfigured with everything you might need (bookmarks into all
internal systems and likely wiki pages, a DC tech jabber account, etc). 
Works well, and I'm sure they've paid for themselves many times over.

- Matt

-- 
liw hut.fi has or used to have two nfs servers not-responding and
still-trying... don't know if their dns server was not-found... 4o4 would be
then a good name for the web server... endless hours of fun
aj did you get a response from 4o4? nah, it just 404ed




Re: UDP port 80 DDoS attack

2012-02-05 Thread Matthew Palmer
On Sun, Feb 05, 2012 at 06:36:13PM -0500, Ray Gasnick III wrote:
 We just saw a huge flux of traffic occur this morning that spiked one of
 our upstream ISPs gear and killed the layer 2 link on another becuase of a
 DDoS attack on UDP port 80.

Yep, we've got a customer who's been hit with it a couple of times (5Gbps
the first time, 3Gbps the second).  For hysterical raisins, we don't
actually control the network for this particular customer, but the network
provider did pretty much what you did -- blackholed the victim IP.  We've
mitigated the problem by using a full-time traffic-scrubbing service -- the
hope is that the scrubbing service will pay for all the traffic and only the
good stuff will get through.  Only time will tell if it works.  We also had
to renumber the customer, as the attacks were obviously remembering the old
IP and still knocking it off the network even after the DNS was repointed at
the scrubbing service.

- Matt

-- 
I'm tempted to try Gentoo, but then I learned that its installer is in
Python, and, well, a base Python install on my system is something like
fifty megabytes (for what?  oh, right, we NEED four XML libraries, I
forgot).  -- Dave Brown, ASR




Re: Linux Centralized Administration

2012-01-12 Thread Matthew Palmer
On Thu, Jan 12, 2012 at 04:02:49PM -0500, Paul Stewart wrote:
 Hey folks. just curious what people are using for automating updates to
 Linux boxes?
 
 Today, we manually do YUM updates to all the CentOS servers . just an
 example but a good one.  I have heard there are some open source solutions
 similar to that of Red Hat Network?

At work, we use (and built) a tool called 'tingle'
(https://github.com/anchor/tingle), which handles it all for us across our
internal and managed-for-customers infrastructures.

Personally, I don't run CentOS, but I use unattended-upgrades on my personal
herd of Debian machines, which works well enough.

- Matt

-- 
A woman in liquor production / Owns a still of exquisite construction.
The alcohol boils / Through magnetic coils.
She says that it's proof by induction.
-- http://limerickdb.com/?34




Re: Looking for a Tier 1 ISP Mentor for career advice.

2011-12-02 Thread Matthew Palmer
On Fri, Dec 02, 2011 at 05:55:23PM -0600, Robert Bonomi wrote:
 
  Scott Weeks sur...@mauigateway.com wrote:
 
  Apologies for the rapid-shot email.  It's Friday...  :-)
 
  bmann...@vacation.karoshi.com wrote:
 
  On Thu, Dec 01, 2011 at 04:35:27PM -0500, David Radcliffe wrote:
   The reason it is not more accepted is too many people still think If I 
   cannot see you you must not be working.
 
  actually, i've heard the real reason is corporate liability ...
  that said, there is an advantage for team f2f mtgs on a periodic
  basis.
 
  I don't follow.  Could you elaborate?  What is the liability?
 
 I don't know for certain, but I expect work at home' employeees fall under
 the scope of the employers Workmans Compenstation liability covrerage,
 with regard to injuries sustained on the job.

There are those who say this has already happened

http://www.news.com.au/business/telstra-forced-to-pay-costs-compensation-after-worker-dale-hargreaves-slips-while-working-at-home/story-e6frfm1i-1226081649913

Now, I'm sure the facts of the matter haven't gotten in the way of the story
there, but I'm struggling to come up with a set of circumstances which
*don't* involve an application of palm to face.

- Matt

-- 
You know you have a distributed system when the crash of a computer you’ve
never heard of stops you from getting any work done.
-- Leslie Lamport Security Engineering: A Guide to Building
   Dependable Distributed Systems




Re: Performance Issues - PTR Records

2011-11-02 Thread Matthew Palmer
On Wed, Nov 02, 2011 at 06:12:21PM -0400, David Hubbard wrote:
 From: Matt Chung [mailto:itsmemattch...@gmail.com] 
  Historically, there was no compelling reason to create PTR 
  records for our CPE however more and more applications seem
  to be dependent on it.  Although we will be assigning a
  record for each address, my question is why
  is the application (specifically HTTP) dependent on a reverse record ?
  What is the purpose?
 
 As a web host, we frequently find customers who have
 added Apache rules to their ecommerce sites to block
 undesirable traffic, such as credit card scammers, etc.
 Not knowing any better, they often do this by just
 blocking anything that ends in .in to block Indonesia
 for example.

That's even less effective than you'd naively expect, given that Indonesia's
TLD is .id...

- Matt




Re: Synology Disk DS211J

2011-09-30 Thread Matthew Palmer
On Thu, Sep 29, 2011 at 07:10:10PM -0700, Joel jaeggli wrote:
 On 9/29/11 17:46 , Robert Bonomi wrote:
  From: Nathan Eisenberg nat...@atlasnetworks.us
  Subject: RE: Synology Disk DS211J
  Date: Thu, 29 Sep 2011 21:58:23 +
 
  And this is why the prudent home admin runs a firewall device he or she 
  can trust, and has a default deny rule in place even for outgoing 
  connections.
 
  - Matt
 
 
 
  The prudent home admin has a default deny rule for outgoing HTTP to port 
  80?  I doubt it.
 
  
  No, the prudent nd knowledgable prudent home admin does not have default 
  deny
  rule just for outgoing HTTP to port 80.
  
  He has a  defult deny rule  for _everything_.  Every internal source 
  address,
  and every destination port.  Then he pokes holes in that 'deny everything'
  for specific machines to make the kinds of external connections that _they_
  need to make.
 
 Tell me how that flys with the customers in your household...

Perfectly fine.  My users know not to go plugging random devices in, and I
properly configure the firewall to account for all legitimate traffic before
the device is commissioned.

- Matt




Re: Synology Disk DS211J

2011-09-29 Thread Matthew Palmer
On Thu, Sep 29, 2011 at 12:11:48PM -0700, Jones, Barry wrote:
 A little off topic, but wanted to share... I purchased a home storage
 Synology DS1511+.  After configuring it on the home net, I did some
 captures to look at the protocols, and noticed that the DS1511+ is making
 outgoing connections to 59.124.41.242 (www) and 59.124.41.245 (port 81 
 89) on a regular basis.  These addresses are owned by Synology and Chungwa
 Telecom in Taiwan.

And this is why the prudent home admin runs a firewall device he or she can
trust, and has a default deny rule in place even for outgoing connections.

- Matt




Re: Nxdomain redirect revenue

2011-09-27 Thread Matthew Palmer
On Tue, Sep 27, 2011 at 05:08:42PM -0500, Jimmy Hess wrote:
 On Tue, Sep 27, 2011 at 8:27 AM, Christopher Morrow
 morrowc.li...@gmail.com wrote:
 
  how does tls/https help here? if you get sent to the 'wrong host'
  whether or not it does https/tls is irrelevant, no? (save the case of
  chrome and domain pinning)
 
 Because the operator of the wrong hostcannot obtain a SSL
 certificate for the right host's domain from a legitimate CA.

Oh, if only 'twere true... even without control of the DNS for the domain,
there have been plenty of certificates erroneously issued.  With DNS
control, doing the necessary validation steps required for the issuance of a
certificate is child's play.

Then, of course, there's the issues with what constitutes a legitimate CA;
the list of CAs that I'd never want to trust, but which are in my browser by
default, is long and notorious.

- Matt




Re: Question on 95th percentile and Over-usage transit pricing

2011-09-22 Thread Matthew Palmer
On Thu, Sep 22, 2011 at 10:31:34AM -0700, Ryan Malayter wrote:
 On Sep 22, 12:54 am, PC paul4...@gmail.com wrote:
  An optimal solution would be a tiered system where the adjusted price only
  applies to traffic units over the price tier threshold and not retroactively
  to all traffic units.
 
 I have seen a more optimal scheme about 15 years ago. Pricing was a
 smooth function, but it was for software licensing, not networking.
 
 As I recall, their scheme went something like:
 invoice_amount = some_constant * (quantity)^0.75
 
 This seemed smart to me. It gave the customer incentives to invest
 more, but also got rid of silly discontinuities that would cause
 irrational customer and salesperson behavior.
 
 Has anyone seen something similar in the service provider world? All I
 ever see are arbitrary step functions.

I actually had this discussion quite recently with The Powers, as we have
some fairly interesting issues with the results of our newly adjusted
pricing steps.

The rationale behind sticking with the steps was everyone else does it that
way, so when customers are making comparisons they need to be able to make a
meaningful comparison and continuous functions are too hard.  Given that
we're not a market leader in network traffic, I somewhat see the logic
behind the first, and given the average customer has trouble understanding
that XGB per month at $Y/GB = $X*Y, I totally see the point on the second,
*in general*.

However, if you want it, ask for it.  Go so far as to say that you'll only
consider pricing functions that are continuous, and therefore will be making
an apples-for-apples comparison.  You'll exclude a lot of the market, simply
because the contracts can't be modified like that or the billing system
can't handle it, but I'm fairly confident that the data to create such a
function exists at every sanely-run network provider.

- Matt

-- 
For once, Microsoft wasn't exaggerating when they named it the 'Jet Engine'
-- your data's the seagull.
-- Chris Adams




Re: How long is your rack?

2011-08-15 Thread Matthew Palmer
On Mon, Aug 15, 2011 at 11:37:37AM -0400, Randy Bush wrote:
  more likely a 'shortened' url.  how anyone can click those is beyond
  me.
  I'm curious what your objection is.
 
 i have no assurance that a shortened url does not lead to a malicious
 site.  also your privacy issue, but that is secondary.

Given the rate of publicised defacements of all manner of sites (and that
injecting malware into a page is the exact same thing as a clear defacement,
from an execution point of view), a long URL gives you no greater assurance
of protection from malice.

- Matt
(Fellow hater of URL-shortening services)


-- 
I'm sorry they changed it back.  The freedom-fries thing was a proclamation
to the world that we are indeed ruled by fools and madmen, but it had the
virtue of not requiring mass numbers of people to be killed in order to make
the point. -- Brad Ferguson




Re: network issue help

2011-08-10 Thread Matthew Palmer
On Wed, Aug 10, 2011 at 07:33:53PM -0400, Stefan Fouant wrote:
 Is there an acronym for RTFM when there are a volume of manuals that need to 
 be read?

FOAD, perhaps?

- Matt

-- 
When you have a Leatherman, everything looks Leathermanipulable.
-- Nathan McCoy, in the Monastery




Re: US internet providers hijacking users' search queries

2011-08-05 Thread Matthew Palmer
On Fri, Aug 05, 2011 at 05:04:51PM -0700, Bino Gopal wrote:
 http://www.newscientist.com/article/dn20768-us-internet-providers-hijacking-users-search-queries.html

I hope more ISPs start doing this; it'll increase the take up of HTTPS.

- Matt


-- 
Part[s] of .us are the global benchmark for pumpkin being a verb.
-- Anthony de Boer




Re: US internet providers hijacking users' search queries

2011-08-05 Thread Matthew Palmer
On Fri, Aug 05, 2011 at 06:53:50PM -0600, Brielle wrote:
 Until they start MitM the ssl traffic, fake certs and all.  Didn't a
 certain repressive regime already do this tactic with facebook or some
 other major site?

Yes, there's plenty of rogue CAs.  That's an easier problem to solve (though
still difficult) than trying to stop traffic interception with plain HTTP.

- Matt

-- 
There's a term for those who fantasize that the world works in precisely the
way that produces maximum convenience for them, despite years of evidence to
the contrary.  The term is Morons.
-- Greg Andrews, in the Monastery




Re: dynamic or static IPv6 prefixes to residential customers

2011-08-03 Thread Matthew Palmer
On Wed, Aug 03, 2011 at 10:00:37AM -0700, Bill Woodcock wrote:
 Also good for customer privacy.  LE can still subpoena ISP logs, but
 e-commerce sites can't track users quite as easily.

So... you're in that alternate universe populated by people who *aren't*
constantly logged onto facebook.  Good to know.

- Matt




Re: Comcast Bussiness Class and GRE Tunnels

2011-07-27 Thread Matthew Palmer
On Wed, Jul 27, 2011 at 12:17:16PM +0300, Denys Fedoryshchenko wrote:
 I can recommend you to try to use openvpn, if you are Mikrotik
 only. At least it doesn't have fragmentation issues, as
 IPIP/GRE/PPTP has, and also it will run smoothly over NAT/SPI. Cons,
 that it is a bit more laggy, because it runs over TCP.

Au contraire, OpenVPN only runs over TCP if you explicitly tell it to;
default configuration, and widespread practice, is to run it over UDP.

- Matt




Re: Comcast Bussiness Class and GRE Tunnels

2011-07-27 Thread Matthew Palmer
On Wed, Jul 27, 2011 at 12:30:36PM +0300, Denys Fedoryshchenko wrote:
 On Wed, 27 Jul 2011 19:23:33 +1000, Matthew Palmer wrote:
 On Wed, Jul 27, 2011 at 12:17:16PM +0300, Denys Fedoryshchenko wrote:
 I can recommend you to try to use openvpn, if you are Mikrotik
 only. At least it doesn't have fragmentation issues, as
 IPIP/GRE/PPTP has, and also it will run smoothly over NAT/SPI. Cons,
 that it is a bit more laggy, because it runs over TCP.
 
 Au contraire, OpenVPN only runs over TCP if you explicitly tell it
 to;
 default configuration, and widespread practice, is to run it over
 UDP.

 On Linux, yes, it is by default configuration is UDP, but in current
 case , on Mikrotik, it is working _only_ in TCP mode, and has few
 more limitations.
 http://forum.mikrotik.com/viewtopic.php?f=1t=20537

WT*F*?  I've never understood the appeal of Microtik, and now I understand
it even less.

- Matt




Re: Address Assignment Question

2011-06-20 Thread Matthew Palmer
On Mon, Jun 20, 2011 at 09:26:30AM -0400, Steve Richardson wrote:
 Hi Jason,
 
 On Mon, Jun 20, 2011 at 9:06 AM, Jason Baugher ja...@thebaughers.com wrote:
  Did everyone miss that the customer didn't request a /24, they requested a
  /24s worth in even more dis-contiguous blocks. I can only think of one
  reason why a customer would specifically ask for that. They are concerned
  that they'll get blacklisted. They're hoping if they do, it will be a small
  block of many rather than one entire block.
 
  When customers make strange requests without giving a good explanation, I
  have to assume they're up to something.
 
  Jason
 
 They provided an explanation, describing how the IPs were going to be
 used.  Yes, part of it does have to do with being blocked, which
 *definitely* concerns me.  One thing they do say is that they need
 several IPs per block to assign to their MTAs to handle such a large
 amount of email (3 to 5 million per day).  Being primarily focused on
 layers 1 through 4, I don't have an incredible amount of experience
 with high volume email server configuration, so I have no idea if they
 are feeding me a line of BS or not.

I've worked at a company that did managed services (including the pipe and
address range) of a legitimate bulk mailer[1], and the logic provided to
you is legit, as far as it goes -- that is to say, what they're saying is
probably why they really want the space (whether it's a legitimate
justification for the allocation of IP space as per current policies is a
different matter).

Basically, what your customer wants is to evade big e-mail providers'
anti-spam measures.  From their perspective, of course, I'm sure they think
they're doing the right thing, and the people they're delivering to
really, really want this e-mail, and it's just the nasty e-mail provider
getting in the way.

As I understand it, a common technique at these big providers is to have
reputation for IP addresses by spamminess, as an element of the overall
determination of whether a particular e-mail is spam.  If an address doesn't
have a reputation (yet), then it's rate limited, to limit the damage that a
new spammer can do before the e-mail provider gets feedback (from users)
about whether the e-mail they're getting is spam or not.  This reputation
score (presumably) extends to the /24 (and probably, to a lesser extent, the
WHOIS block, but I'm not as confident about that bit).

What makes me think you're being scammed is that, for all the troubles we
had with our customer, they never needed more address space once they'd
gotten a good reputation for their initial allocation.  Maybe my customer
just didn't grow as much as yours did, so their spamcannon didn't need any
more barrels.  Still, I'm led to believe that once an IP address has good
reputation, it should be effectively unlimited, so if they need more
addresses it's because the current ones don't have real good rep...

 My feeling is that (paraphrasing here) we might get blocked
 occasionally and we need this many IPs on our MTAs because they
 can't handle the load are *not* legitimate reasons for requesting so
 many addresses.

You are correct; as far as I know ARIN doesn't take those as valid
justifications if you need to go back to them for more space, so you can't
either.

At this point they've admitted to you that they're shitting on your good
name, and setting you up for headaches down the line (dealing with
complaints from people who don't like their spam, having to clean up the IP
addresses they discard when they're useless (or they leave).  In techie
utopia, you'd be able to sting them a fairly hefty surety to cover the costs
associated with cleaning up their shit -- and then tell them that the IP
addresses they've already got are enough, and if they need more capacity, 
they should clean up the addresses they've got.

In reality, though, unless you've got management with a far more cavalier
attitude to revenue than mine did, they won't do anything to piss off a
customer who is, in their eyes, quite the cash cow.  I'm mildly surprised
that you got to evaluate their address request to the degree you have; I
predict that any attempts to actually deny them more space (let alone
extract additional compensation for their destruction of your resources)
will be overridden by management.

- Matt

[1] I use scare quotes because as far as I'm concerned, if your business
model is based on sending lots of e-mail, sooner or later you're going to be
sending spam because that's what makes you the money.  If you didn't
personally collect the addresses, you're in for a world of hurt, and if you
don't know that, you don't deserve to be in the business of bulk e-mail, and
if you do know that, then at best you're a spammer-by-proxy.


-- 
Q: Why do Marxists only drink herbal tea?
A: Because proper tea is theft.
-- Chris Suslowicz, in the Monastery




Re: ICANN to allow commercial gTLDs

2011-06-19 Thread Matthew Palmer
On Sun, Jun 19, 2011 at 08:22:17PM -0400, Jay Ashworth wrote:
 - Original Message -
  From: Paul Vixie vi...@isc.org
 
  inevitably there will be folks who register .FOOBAR and advertise it as
  http://foobar/; on a billboard and then get burned by all of the local
  foobar.this.tld and foobar.that.tld names that will get reached
  instead of their TLD. i say inevitable; i don't know a way to avoid it
  since there will be a lot of money and a lot of people involved.
 
 I think it's probably worse than that, since a lot of the companies who might
 be foolish enough to try that *are companies that make stuff that's on your
 LAN*... and what are you going to name the *one* Apple server that's on your
 LAN in your internal DNS?
 
 Of course; you're gonna call it apple.

And it only gets better from there... how many places have various cutesy
naming schemes that might include one or more trademarks (or whatever) that
someone might want as a TLD?  A naming scheme involving fruit would cover
your apple example, but I'd bet that someone, somewhere, names their
servers after fast food restaurants or brands of shoe...  and I'm confident
in predicting that there are plenty of cartoon characters that some company
or another will want to turn into a TLD.

- Matt

-- 
When all you have is a nailgun, every problem looks like a messiah.
-- Iain Chalmers, ASR




Re: unqualified domains, was ICANN to allow commercial gTLDs

2011-06-19 Thread Matthew Palmer
On Mon, Jun 20, 2011 at 02:08:18AM +, Paul Vixie wrote:
  From: David Conrad d...@virtualized.org
  Date: Sun, 19 Jun 2011 16:04:09 -1000
  
  On Jun 19, 2011, at 3:24 PM, Paul Vixie wrote:
  
   i think we have to just discourage lookups of single-token names,
   universally.
  
  How?
 
 that's a good question.  marka mentioned writing an RFC, but i expect
 that ICANN could also have an impact on this by having applicants sign
 something that says i know that my single-label top level domain name
 will not be directly usable the way normal domain names are and i intend
 to use it only to register subdomain names which will work normally.

Whilst we can dream that that will work, I don't think it'll actually last
very long in the face of determined marketing department pressure; also,
unless that agreement also says I agree to pay the additional costs borne
by any party on the Internet that result from my failure to adhere to this
agreement, it's worthless.  Are your customers going to call Sony when they
put http://sony/ into their web browser and it doesn't work?  Hell no. 
They're going to call your helpdesk, and it's going to tie up a non-trivial
amount of engineer time either renaming things or reconfiguring the client
machine to make that URL work as the user expects it to.

- Matt

-- 
It fsck's the volume or it gets the format again.
-- Don Quixote, in the Monastery




Re: The stupidity of trying to fix DHCPv6

2011-06-12 Thread Matthew Palmer
On Sun, Jun 12, 2011 at 01:04:41PM +0200, Iljitsch van Beijnum wrote:
 On 12 jun 2011, at 12:35, Daniel Roesen wrote:
 
  Could you point to any RFC which implies or explicitly states that
  DHCPv6 MUST NOT be used in absence of RA with M and/or O=1?
 
 But what's the alternative? Always run DHCPv6 even if there are no router
 advertisements or router advertisements with O=0, M=0?

That would seem to be the logical outcome, yes.

 Like I said before, that would pollute the network with many multicasts
 which can seriously degrade wifi performance.

Regardless of it's potential downsides, the issue at hand was the RFC
compliance of such a setup.  Owen DeLong contended that:

On Fri, Jun 10, 2011 at 09:12:26PM -0700, Owen DeLong wrote:
 As it currently stands, an RFC-compliant host will not attempt to solicit
 a DHCP response unless it receives an RA with the M inclusive-or O bits
 set.

Daniel was merely requesting a reference for that assertion.  If you have
one, I'm sure Daniel (and Owen) would appreciate it.

- Matt



Re: IPv6 and DNS

2011-06-12 Thread Matthew Palmer
On Sun, Jun 12, 2011 at 09:38:32AM -0300, Fabio Mendes wrote:
 2011/6/11 Matthew Palmer mpal...@hezmatt.org
  The router isn't assigning an address, it's merely telling everyone on the
  segment what the local prefix and default route is.  As such, there's no
  reason why the router should try to register a DNS entry.
 
  On the other hand, the host could (and should) register it's address with
  whatever DNS server handles it's name.  The protocol for such is already
  standardised and should be independent of IPv4/IPv6.
 
 I was thinking about something like this, it looks the natural way to go,
 but isn't too dangerous allow hosts to update entries (even if it's their
 own)  in an DNS server ?

What are the hazards and risks?

 I preferred to believe that a router would do this because routers are
 considered to be more reliable than a hosts.

Reliable, or trusted?

 Do you mind to point me out where can I find infos about this protocol that
 is being standardised ?

RFC2136.

- Matt



Re: IPv6 and DNS

2011-06-12 Thread Matthew Palmer
On Sun, Jun 12, 2011 at 08:59:50AM -0500, Jimmy Hess wrote:
 On Sat, Jun 11, 2011 at 9:04 PM, Matthew Palmer mpal...@hezmatt.org wrote:
  The router isn't assigning an address, it's merely telling everyone on the
  segment what the local prefix and default route is.  As such, there's no
  reason why the router should try to register a DNS entry.
 
 However, it would be logical to extend the DHCPv6 protocol to allow for
 registration of the workstation address in DNS by the DHCPv6 management
 server  to be requested (similar to DHCPv4).

I don't believe we were talking about DHCPv6, we were talking about SLAAC. 
And I *still* think it's a better idea for the client to be registering
itself in DNS; the host knows what domain(s) it should be part of, and hence
which names refer to itself and should be updated with it's new address.

- Matt



Re: Yup; the Internet is screwed up.

2011-06-12 Thread Matthew Palmer
On Sun, Jun 12, 2011 at 11:04:46AM -0600, Christopher J. Pilkington wrote:
 On Jun 11, 2011, at 7:07 PM, Roy wrote:
 
  On 6/11/2011 4:29 PM, Christopher Pilkington wrote:
  Options seem to be limited to HughesNet and dial for the moment, but
  things may change if I put a tower on the property. HughesNet seems to
  relax it's bandwidth cap between 2am and 7am, which is helpful, but
  still a great shift from what I'm used to at the current residence
  (15/2).
  
  
  No 3G cellphone service?
 
 3G at this location is marginal at best (stand on a hill and hold the
 phone up above your head.)
 
 That said, are there 3G radios that permit external antennas or are well
 suited to being sealed up in a weatherproof box and being placed on a
 pole/tower?

The little USB stick I just retired in favour of tethering (Huawei U160(?);
I can dig up the model number if it's important) has a tiny antenna
connection port.  I've seen people on the train with a small flat antenna
hooked up to these sorts of devices; I'd assume that there are big-ass
antennas that are much more efficient and more suitable for permanent
mounting somewhere useful.

- Matt




Re: The stupidity of trying to fix DHCPv6

2011-06-12 Thread Matthew Palmer
On Sun, Jun 12, 2011 at 08:12:02PM +0200, Iljitsch van Beijnum wrote:
 On 12 jun 2011, at 15:45, Leo Bicknell wrote:
 
  Like I said before, that would pollute the network with many multicasts 
  which can seriously degrade wifi performance.
 
  Huh?  This is no worse than IPv4 where a host comes up and sends a
  subnet-broadcast to get DHCP.
 
 The IPv4 host does this once and gets its lease. If there is no DHCPv6
 server then DHCPv6 clients would keep broadcasting forever.  Not a good
 thing.

You're not working from comparable situations.  An IPv4 network without a
DHCP server will probably have lots of IPv4 hosts banging out broadcast
packets constantly as well.

- Matt


-- 
A committee is a cul-de-sac down which ideas are lured and then quietly
strangled.
-- Sir Barnett Cocks (1907-1989) (QOTD 20 Feb 2003)




Re: IPv6 and DNS

2011-06-12 Thread Matthew Palmer
On Sun, Jun 12, 2011 at 01:46:20PM -0400, Jeff Kell wrote:
 On 6/12/2011 11:44 AM, Matthew Palmer wrote:
  I don't believe we were talking about DHCPv6, we were talking about SLAAC.
  And I *still* think it's a better idea for the client to be registering
  itself in DNS; the host knows what domain(s) it should be part of, and hence
  which names refer to itself and should be updated with it's new address.
 
 Register with what/which DNS?   If no DHCPv6 no DNS information has
 been acquired, so you're doing the magical anycast/multicast.

RFC6106, or local recursive resolver.  Also, recursive resolution is not the
same as DDNS registration with an authoritative server.

 Not a fan of self-registration, in IPv4 we have DHCP register the DDNS
 update; after all, it just handed out an address for a zone/domain that
 *it* knows for certain. 

No, it handed out *an* *address*.  Assuming that everything that wants an
address also wants the whole shebang is a whole other issue.

 The host knows what domains it should be part of ??  Perhaps a server
 or a fixed desktop, but otherwise (unless you're a big fan of
 ActiveDirectory anywhere) the domain is relative to the environment you
 just inherited. 

No it isn't.  If I want someone to talk to my laptop, and I happen to be
roadwarrioring at a client site, do I want to say hey, just hit
floozy.hezmatt.org, or do I want to have to ask someone what domain will
my laptop be registered as? and then work it out from there?

 Letting any host register itself in my domain from any address/location
 is scary as heck :) 

So don't do that, then.  Only let hosts that you want to have in your domain
register whatever their current address is.

- Matt

-- 
A polar bear is a rectangular bear after a coordinate transform.




Re: IPv6 and DNS

2011-06-12 Thread Matthew Palmer
On Mon, Jun 13, 2011 at 09:56:59AM +1000, Karl Auer wrote:
 On Mon, 2011-06-13 at 01:44 +1000, Matthew Palmer wrote:
  And I *still* think it's a better idea for the client to be
  registering itself in DNS; the host knows what domain(s) it should be
  part of, and hence which names refer to itself and should be updated
  with it's new address.
 
 Having tried that, we ended up doing it via DHCP (v4 at the time).
 
 We only had probably 15-20K hosts trying to register their names, but
 the results were sobering. At a rough estimate, one in a hundred was
 properly configured. We saw obscenities, random strings, thousand-byte
 names, empty names, invalid names, names with a hundred labels, my name
 is Andrew - you name it, it came and tried to register itself.

Why were you letting such ill-configured clients register themselves in your
DNS?

 And then there were the clients. Clients that tried as fast as they
 could to register their name dozens of times per second, clients that
 tried to register many names, clients that registered and then
 immediately deregistered their names, clients that never deregistered
 their names at all, clients that tried to register important names like
 www.ourdomain, clients that had completely broken protocol support...

Ibid.

 So we moved the job to the DHCP server, and most of the problems went
 away. The server got the desired name from the client, could check it
 for some level of sanity and could register it properly. The server
 could also deregister the names when the clients went away, or at least
 at the end of the lease period. Most hosts *did* speak the DHCP protocol
 adequately well. Instead of having to allow open slather, we could allow
 just two hosts to make TSIG-protected updates. The logs became useful
 again.

But if I come to roadwarrior in your network, I'd have to allow updates from
your DHCP server, and your DHCP server would have to be sending those
updates.  Similarly, if your clients go roadwarrioring elsewhere, the same
(or, rather, inverse) configuration would have to be done there.

 So although YMMV, I can highly recommend letting your DHCP servers do
 DDNS instead of letting the clients do it themselves. No doubt it
 depends on a multitude of factors, not least being whether you actually
 use DHCP, but in general, it worked a LOT better for us.

If you've just got a single-location, never-goes-anywhere network and client
list, sure you can just get the DHCP server to do the registration.  But if
you've got that setup, DDNS isn't needed at all -- your set of hosts,
addresses, and names is fixed sufficiently that you can just statically
allocate everything.

- Matt




Re: Yup; the Internet is screwed up.

2011-06-11 Thread Matthew Palmer
On Sat, Jun 11, 2011 at 02:34:10AM -0700, Jeroen van Aart wrote:
 Ricardo Ferreira wrote:
 Funny, how in the title refers to the Internet globally when the article is
 specific about the USA.
 
 I live in europe and we have at home 100Mbps . Mid sized city of 500k
 people. Some ISPs even spread WiFi across town so that subscribers can have
 internet access outside their homes.
 
 Though it's nice to have why would one *need* 100 Mbps at home? I
 understand the necessity of internet access and agree everyone has a
 right to it. But that necessity can be perfectly fulfilled with a
 stable internet connection of a reasonable speed (say low to mid
 range DSL speed tops).
 
 I don't regard simultaneously streaming 6 channels of TV and
 downloading the latest movie torrent in 2 minutes as a basic
 necessity, let alone essential.

Well, you probably live in a premises with only a couple of people.  A
household with the standard 2.3 kids might need to stream 4.3 TV channels,
and it'd be nice if that didn't have an adverse impact on other traffic (an
incoming SIP call or two, and useful work).

- Matt



Re: IPv6 and DNS

2011-06-11 Thread Matthew Palmer
On Sat, Jun 11, 2011 at 10:30:26PM -0300, Fabio Mendes wrote:
 Firstly, sorry if this may sound too newbie for the list. Reading the
 discussion about dhcpv6 vs RAs, this question just popped in my mind.
 
 It seems that most of IPv6 addressing for hosts will be choosed using EUI-64
 method. Considering that no one (specially endusers) will bother to memorize
 an IPv6 prefix plus a mac address, integration between DNS servers and
 routers/dhcpv6 servers will be crucial.
 
 For dhcp there is already a mechanism for updating names in the DNS server
 for dynamically assigned IPs. I suppose it will be used (use some
 modifications) for IPv6.
 
 However, I never heard of anything similar for routers (in the case of
 autoconfigured addresses).
 
 Are there any dns servers that support updates from routers ?

The router isn't assigning an address, it's merely telling everyone on the
segment what the local prefix and default route is.  As such, there's no
reason why the router should try to register a DNS entry.

On the other hand, the host could (and should) register it's address with
whatever DNS server handles it's name.  The protocol for such is already
standardised and should be independent of IPv4/IPv6.

- Matt



Re: Strongest Solar Tsunami in Years to Hit Earth Today

2011-06-10 Thread Matthew Palmer
On Fri, Jun 10, 2011 at 03:22:59PM +0300, Hank Nussbacher wrote:
 http://www.ibtimes.com/articles/159964/20110609/nasa-solar-flare-tsunami-earth-sun-radio-satellite-interference-aurora-displays-coronal-mass-ejectio.htm

Someone should tell the IB Times that Tsunami doesn't mean anything big
and destructive.  Oh, and that popup ads are *s* 1997.

- Matt



Re: The stupidity of trying to fix DHCPv6

2011-06-10 Thread Matthew Palmer
On Fri, Jun 10, 2011 at 07:53:36AM -0700, Owen DeLong wrote:
 On Jun 10, 2011, at 7:47 AM, Leo Bicknell wrote:
  In a message written on Fri, Jun 10, 2011 at 10:34:57AM -0400, Ray Soucy 
  wrote:
  Also agree that I want flexibility to use RA or DHCPv6; the
  disagreement is that RA needs to be removed or changed from IPv6.
  Don't go breaking my IPv6 stack for your own ambitions, please.
  
  I want that flexability as well, but the IETF won't deliver.
  
  The two options delivered so far are:
  
  RA's only.
 
 Only sort of... This only works if you don't want to auto-configure things 
 like DNS,
 NTP, etc.
 
 I would like to see both protocols made optionally complete, so, in addition
 to fixing DHCPv6 by adding routing information options, I'd also like to
 see something done where it would be possible to add at least DNS
 servers to RA.

RFC6106... the future is nooow...

I like it, inasmuch as I don't need to run a separate DHCPv6 server on a
simple network, but that'd be equally solved by merging radvd into the DHCP
server and just running that.  The client-side configuration is annoying for
RDNSS.

- Matt



Re: Why don't ISPs peer with everyone?

2011-06-07 Thread Matthew Palmer
On Tue, Jun 07, 2011 at 10:15:48AM -0400, Drew Weaver wrote:
 -Original Message-
 From: Jon Lewis [mailto:jle...@lewis.org] 
 Sent: Tuesday, June 07, 2011 10:00 AM
 
 -snip-
 
 I manage a network that's primarily a hosting network.  There's a similar 
 hosting network at the other end of the building.  We both have multiple 
 gigs of transit.  We don't peer with each other.  Perhaps we should, 
 because the cost of the connection would be negligible (I think we already 
 have multiple fiber pairs between our suites), but looking at my sampled 
 netflow data, I'm guessing we average about 100kbit/s or less traffic in 
 each direction between us.  At that low a level, is it even worth the time 
 and trouble to coordinate setting up a peering connection, much less 
 tying up a gigE port at each end?
 -
 
 100kbit/s at 1ms is better than 100kbit/s at  1ms.

True, but the point being made is: how *much* better?  Is it enough better
to justify the cost of installing and maintaining another peering link?

- Matt

-- 
Ah, the beauty of OSS. Hundreds of volunteers worldwide volunteering their
time inventing and implementing new, exciting ways for software to suck.
-- Toni Lassila, in the Monastery



Re: blocking unwanted traffic from hitting gateway

2011-05-18 Thread Matthew Palmer
On Wed, May 18, 2011 at 09:42:03AM -0300, Rogelio wrote:
 I've got about 1000 people hammering a Linux gateway with http
 requests, but only about 150 of them are authenticated users for the
 ISP.

Are you the ISP, or someone else?  Why is the gateway caring that the
requests are HTTP?  Is it also an HTTP server (and if so, does it matter
that it's a gateway?)

 Once someone authenticates, then I want their traffic to pass through
 okay.  But if they're not an authenticated user, I would like to
 ideally block those http requests (e.g. Google updater, AV scanners,
 etc) from ever tying up my web server.

What authentication mechanism are acceptable?  HTTP at the request level,
captive portal, custom app, etc etc etc.

 Is there some sort of box I could put in front (e.g. OpenBSD pf in
 transparency mode) or maybe some sort of filter on the webserver?

What risk or problem are you actually trying to mitigate against?  Sure, you
can put all sorts of things in front of it or on it, but are you just going
to be moving the problem (whatever it may be) to another box, adding
complexity for no good reason?

 This solution would need to be tied into the authentication services
 so authenticated users hit the gateway.

You might want to mention what authentication services you're using if you
want any useful recommendation about tying into it.

- Matt

-- 
The hypothalamus is one of the most important parts of the brain, involved
in many kinds of motivation, among other functions. The hypothalamus
controls the Four F's: 1. fighting; 2. fleeing; 3. feeding; and 4. mating.
-- Psychology professor in neuropsychology intro course



Re: Yahoo and IPv6

2011-05-10 Thread Matthew Palmer
On Tue, May 10, 2011 at 11:22:54AM -0700, Owen DeLong wrote:
 On May 10, 2011, at 9:32 AM, Igor Gashinsky wrote:
  On Tue, 10 May 2011, valdis.kletni...@vt.edu wrote:
  :: On Tue, 10 May 2011 02:17:46 EDT, Igor Gashinsky said:
  ::  The time for finger-pointing is over, period, all we are all trying to 
  do 
  ::  now is figure out how to deal with the present (sucky) situation. The 
  ::  current reality is that for a non-insignificant percentage of users 
  when 
  ::  you enable dual-stack, they are gong to drop off the face of the 
  planet. 
  ::  Now, for *you*, 0.026% may be insignificant (and, standalone, that 
  number 
  ::  is insignificant), but for a global content provider that has ~700M 
  users, 
  ::  that's 182 *thousand* users that *you*, *through your actions* just 
  took 
  ::  out.. 182,000 - that is *not* insignificant
  :: 
  :: At any given instant, there's a *lot* more than 182,000 users who are 
  cut off
  :: due to various *IPv4* misconfigurations and issues.
  
  Yes, but *these* 182,000 users have perfectly working ipv4 connectivity, 
  and you are asking *me* to break them through *my* actions. Sorry, that's 
  simply too many to break for me, without a damn good reason to do so.
  
 In other words, Igor can't turn on  records generally until there are
 182,001 IPv6-only users that are broken from his lack of  records.

There may be something stupid I haven't considered about this, but wouldn't
a v6-only end user be making their DNS requests over v6 (at least to their
ISP's resolver), and if their provider was nice enough to continue that
v6ness up the chain, wouldn't it be fairly simple (to the point of I'd be
stunned if everyone wasn't already doing this) to say to
Yahoo/Google/whatever's ultra-smart whitelisting DNS servers, v6-whitelist
all v6 DNS requests?

That way, v6-only people are guaranteed to get the  records they so
badly crave, without making an excessive mess for anyone else.

I know this falls down if your v6-only-providing ISP takes your recursive
DNS requests on IPv6 and sends them out via IPv4 even if  records were
available, but why would anyone be that dumb?  Since the initial request
would come in via v6, anything whitelisting in this fashion would be sending
the  records out, so you should never have to fall back to v4 unless
someone isn't providing DNS via v6 at all, and who would willingly have
their site v6 enabled without v6 enabling the DNS?  (Yes, I'm aware of
registrars who don't accept v6 glue, but get your whacking sticks out and
keep whackin' 'til they fix it -- and kudos to gkg.net for having that
sorted *before* I put my first v6 site up).

- Matt

-- 
Ruby's the only language I've ever used that feels like it was designed by a
programmer, and not by a hardware engineer (Java, C, C++), an academic
theorist (Lisp, Haskell, OCaml), or an editor of PC World (Python).
-- William Morgan



Re: Ping - APAC Region

2011-03-29 Thread Matthew Palmer
On Tue, Mar 29, 2011 at 06:33:07PM +0100, Robert Lusby wrote:
 Looking at hosting some servers in Hong Kong, to serve the APAC region. Our
 client is worried that this may slow things down in their Australia region,
 and are wondering whether hosting the servers in an Australian data-centre
 would be a better option.
 
 Does anyone have any statistics on this?

No formal statistics, just a lot of experience.  You may be unsurprised to
learn that serving into Australia from outside Australia is slower than
serving from within Australia.  That being said, there's a fair bit less
distance for the light to travel from Hong Kong or anywhere in the region
than from the US.  That is predicated on having good direct links, which is
eye-wateringly expensive if you're used to US data costs (data going from
China to Australia via San Jose...  aaargh).  Then again, hosting within
Australia is similarly expensive, so splitting your presence isn't going to
help you any from a cost PoV.

Anyone living in this part of the world is used to everything taking a
painful amount of time to load anyway, so unless you're doing something
really latency-critical (online gaming and VoIP are the only things that
leap to mind), hosting in a good west coast DC close to the trans-pacific
links will cost you an order of magnitude less and won't have any noticeable
impact on your visitor satisfaction scores.

 Or ... does anyone know of a ping tool we can use, hosted in Australia?

No shortage of APAC looking glasses / tools listed at traceroute.org.

- Matt

-- 
FreeFrag The most secure computer in the world is one not connected to the
internet.  Thats why I recommend Telstra ADSL.
-- bash.org/?168859



Re: Mac OS X 10.7, still no DHCPv6

2011-02-27 Thread Matthew Palmer
On Sun, Feb 27, 2011 at 08:56:33AM -0500, Ray Soucy wrote:
 Mac OS X 10.7 does support RDNSS (RFC 5001) so it is able to get DNS
 server information in an IPv6-only environment.  Of course nobody else
 has implemented that yet, making Apple a special case host once
 again (I don't even think Cisco supports the option in their T series
 yet).

radvd and rdnssd work together on Linux nicely to provide RDNSS support. 
Works a treat.

- Matt



Re: quietly....

2011-02-03 Thread Matthew Palmer
On Thu, Feb 03, 2011 at 10:47:50AM -0600, Jack Bates wrote:
 On 2/3/2011 10:30 AM, Iljitsch van Beijnum wrote:
 I'm perfectly happy with an IPv6 network that only has rational
 people on it while those who insist on NAT stay behind on IPv4.
 
 I'm perfectly happy with watching the Internet go to hell; as it has
 been, and IPv6 will just escalate it. :)

I am intrigued by your ideas, and wish to subscribe to your newsletter.

Actually, I must agree that since I've stopped doing IT work professionally,
I've found myself far less emotionally invested in this kind of thing, and
far less worried about the world ending (which, let's face it, it rarely
does).  Does wonders for the blood pressure.

- Matt



Re: quietly....

2011-02-03 Thread Matthew Palmer
On Thu, Feb 03, 2011 at 12:35:46PM -0600, Jack Bates wrote:
 On 2/3/2011 12:17 PM, Owen DeLong wrote:
  Cost of application development
 
 Applications do not have to be written to support NAT (NAT66
 shouldn't find itself in the areas where it's traditionally been a
 problem). The burden should be upon the NAT device to fix any
 issues, and this will be paid for by the few that utilize NAT.

You're joking, right?

  Cost of administration
 
 If I choose to use NAPTv6, it's right to accept this cost. It
 doesn't make someone else pay more for me to administer my firewall.
 
  Cost of operations
 
 If I choose to use NAPTv6, it's right to accept this cost. It
 doesn't make someone else pay more for me to administer my firewall.

Oh wait... you're *serious*?

Have you never in your career come up against another party that says this
is how we do it, and if you want to do business with us you can do it our
way or get stuffed?  All of a sudden, their decision to use NAT and/or do
other spectacularly stupid things with their networks impacts on *me*[1],
and costs *me* money.  It doesn't work out like the optimistic utopia you're
espousing.

- Matt

[1] Is there such thing as a royal me?  There should be.



Re: quietly....

2011-02-03 Thread Matthew Palmer
On Thu, Feb 03, 2011 at 03:20:25PM -0500, Lamar Owen wrote:
 On Thursday, February 03, 2011 02:28:32 pm valdis.kletni...@vt.edu wrote:
  The only reason FTP works through a NAT is because the NAT has already
  been hacked up to further mangle the data stream to make up for the
  mangling it does.
 
 FTP is a in essence a peer-to-peer protocol, as both ends initiate TCP
 streams.  I know that's nitpicking, but it is true.

So is SMTP, by the same token.  Aptly demonstrating why the term P2P is so
mind-alteringly stupid.

- Matt



Re: quietly....

2011-02-02 Thread Matthew Palmer
On Wed, Feb 02, 2011 at 11:45:49PM -0500, Jay Ashworth wrote:
 - Original Message -
  From: Blake Dunlap iki...@gmail.com
 
  On Wed, Feb 2, 2011 at 22:34, Jay Ashworth j...@baylink.com wrote:
  
   I won't run an edge-network that *isn't* NATted; my internal machines
   have no business having publicly routable addresses. No one has *ever*
   provided me with a serviceable explanation as to why that's an
   invalid view.
 
  Quite simply, its called Tragedy of the Commons. Everyone else has to
  work harder to provide you services if you are using something which breaks
  end to end connectivity, which costs everyone else money. The protocol
  designers are making a stand against this for the good of the commons.
 
 You'll have to document everyone has to work harder to provide me services;
 this is not my first rodeo, and TTBOMK, it's *transparent* to the other end
 of any connection out of my edge network that it's NATted at my end.
 
 As for incoming connections, it's transparent to them as well -- and which 
 ones are valid targets for such connections *is a policy decision of
 mine*, not subject to external opinion.

You're thinking too small -- it's not that individual TCP connections have
problems, it's that the ability to solve a given problem using connections
and UDP packets is badly constrained by a lack of end-to-end connectivity. 
The proof is fairly obvious in the number of hacks that have been deployed
to try and get around NAT's inadequacies: Skype supernodes, STUN, all the
various conntrack helpers in netfilters, etc etc etc.

Now, if you decide that none of those applications are important to you,
sure, you can firewall them off as appropriate.  But the pervasive
deployment of NAT means that the set of problems that can be solved is
constrained, and of the problems that *can* be solved, the solutions tend to
be more complicated, harder to implement, understand, and so on, which has a
cost to the community (higher prices, less solved problems, whatever your
desired metric may be).  I think that's what Blake is getting at with his
TotC.

Of course, I'm a tiny bit of a skeptic, as I really can't see how a stateful
firewall can know which other connections / packets are related without a
lot of the same dodgy shenanigans that goes on now, but at least if you've
gotten rid of the 1-to-N address mangling a fundamental stumbling block is
removed and people can get on and solve the remaining (tractable) problems.

- Matt



Re: quietly....

2011-02-02 Thread Matthew Palmer
On Thu, Feb 03, 2011 at 12:23:54AM -0500, Jay Ashworth wrote:
 - Original Message -
  From: Matthew Palmer mpal...@hezmatt.org
  Now, if you decide that none of those applications are important to
  you,
  sure, you can firewall them off as appropriate. But the pervasive
  deployment of NAT means that the set of problems that can be solved is
  constrained, and of the problems that *can* be solved, the solutions
  tend to
  be more complicated, harder to implement, understand, and so on, which
  has a
  cost to the community (higher prices, less solved problems, whatever
  your
  desired metric may be). I think that's what Blake is getting at with
  his TotC.
 
 Perhaps.  I'm not sure that the collective importance of that difficulty
 outweighs the collective danger of making all nodes of the Internet *as it
 presently exists* publicly routable.

Well, technically, nodes aren't routable, addresses are... and I don't even
see any danger in the mere existence of a valid route to a host.  The danger
exists when that host is not sufficiently secured (be it via firewall,
sensible configuration, whatever).

 I don't know whether it's occurred to people that if you make every node
 on the present day Internet routable, then *you've made every node on the
 present day Internet routable*; the number of machines subject to 
 more or less direct attack goes up (by a jackleg estimate I've just now
 made up) by between 3 and 5 orders of magnitude.
 
 I make jackleg estimates all the time; I don't believe I've ever had to 
 say 5 orders of magnitude.

I'm willing to bet you're being deeply optimistic (pessimistic?) with that
estimate; if your estimate were accurate, it would mean that for every
publically addressed device there are between 1,000 and 100,000 privately
addressed nodes.  I *really* don't think that's plausible.

At any rate, I think the days of severely broken IP stacks and
spectacularly insecure by default OS installations are largely behind us;
the security battle for the client endpoint has moved to client-initiated
attacks, which are unhindered by NAT, firewalling, or any other
layer-respecting network security device.

  Of course, I'm a tiny bit of a skeptic, as I really can't see how a
  stateful
  firewall can know which other connections / packets are related
  without a
  lot of the same dodgy shenanigans that goes on now, but at least if
  you've
  gotten rid of the 1-to-N address mangling a fundamental stumbling
  block is
  removed and people can get on and solve the remaining (tractable)
  problems.
 
 That is problematic as well, isn't it?

It is, but at least it's a problem that has a hope of being solved.

 It speaks directly to the attack-surface comment I just made in another reply.

I can't see how.

- Matt

-- 
For once, Microsoft wasn't exaggerating when they named it the 'Jet Engine'
-- your data's the seagull.
-- Chris Adams



Re: Bogons

2011-01-28 Thread Matthew Palmer
On Fri, Jan 28, 2011 at 12:35:43PM -0800, Jacob Broussard wrote:
 Static bogons are the bane of my existence...  The pain of trying to explain
 to someone for MONTHS that they haven't updated their reference, with
 traceroutes to back it up, and they continue to say that it has something to
 do with my network.

THey're right -- your network is using an address range they've chosen to
configure their equipment not to accept... grin

- Matt



Re: Is NAT can provide some kind of protection?

2011-01-15 Thread Matthew Palmer
On Sat, Jan 15, 2011 at 06:24:01PM -0500, Brandon Ross wrote:
 On Sat, 15 Jan 2011, Owen DeLong wrote:

 I really doubt this will be the case in IPv6.

 I really hope you are right, because I don't want to see that either,  
 however...

 Why do you suppose they did that before with IPv4?  Sure you can make the 
 argument NOW that v4 is in scarce supply, but 10 years ago it was still  
 the case.

The finest raisins of all: hysterical raisins.

Widespread consumer internet access was dialup, with Trumpet or equivalent.
The concept of home networks was, at best, for the uber, *uber* nerds
(like most people on this list).  The idea that an average home user would
*ever* need more than one IP was ludicrous, so your basic dialup account
provided one IP (although I recall being able to ask for more, for free, if
I needed them).  Then it became a value add to have more than one IP, and
then NAT came along because the hackers at home had networks, and then the
hackers at home went into IT and used consumer-grade ISPs, and so they
deployed NAT in the enterprise, and then those people became the standards
writers for PCI DSS...

- Matt



Re: AS Numbers from a common 32-bit pool.

2010-12-20 Thread Matthew Palmer
On Mon, Dec 20, 2010 at 02:49:49PM +0200, Heinrich Strauss wrote:
 I'm kinda fearing this in South Africa, as we have a few large  
 incumbents who aren't really driving -NG versions of protocols.

 They also have a prove to us it's broken, and we may look at it in a  
 few months' time-attitude towards it. :O

That would be why 32-bit ASNs have been requestable for the last couple of
years(?); you could have been prodding providers with it doesn't work, fix
it for a while now.

- Matt

-- 
For once, Microsoft wasn't exaggerating when they named it the 'Jet Engine'
-- your data's the seagull.
-- Chris Adams



Re: ipfix/netflow/sflow generator for Linux

2010-12-06 Thread Matthew Palmer
On Mon, Dec 06, 2010 at 02:15:10PM -0500, Thomas York wrote:
 I've had the best luck with ipcad. The only thing that seems to not work
 with it is that it doesn't correctly give the interface number in the flow
 information. It refers to all interfaces as interface 65535. I've tried the
 config option for ipcad to map an interface directly to an SNMP interface
 ID, but that option of the config file seems to be ignored.
 
 Ntop functionally does exactly what I need, but it's extremely buggy. It
 segfaults after a few minutes, regardless of Linux distro or Ntop version.
 So..any ideas on what I can do to get good flow information from our Linux
 routers?

Fix ipcad to send the interface number.

- Matt

-- 
Just because we work at a University doesn't mean we're surrounded by smart
people.
-- Brian Kantor, in the monastery



Re: IPv6 Routing table will be bloated?

2010-10-26 Thread Matthew Palmer
On Tue, Oct 26, 2010 at 05:48:13PM -0400, Randy Carpenter wrote:
 Someone who Randy didn't attribute wrote:
  I think APNIC has a policy that defines the minimum IPv6 allocation
  based on your current IPv4 allocation/usage. This would fix the
  problem?
 It would be nice as a start, but does not really take into consideration 
 future expansion needs.
 
 I would think that you could draw some parallels, though.
 
 Something like:
 
 v4 /16 ~ v6 /32
 v4 /12 ~ v6 /28
 v4 /8 ~ v6 /24
 
 I know it we don't want to equate v4 and v6, but it may help as a guideline 
 for the size of the customer base.

I don't think it's a particularly good metric, either, because it doesn't
take into account the conversion rate of IPv4 to IPv6 addresses, which is
wildly different in different networks.

Fer instance, $JOB[-1] is a colo/hosting business, with a fair chunk of IPv4
allocated, and the standard IPv6 /32.  I did the initial IPv6 address plan,
and I'm pretty confident in saying that they'll *never* need any more than
that /32 of IPv6, because their business model means that they pack their
/64s relatively (hah!) densely (typically there's at least one /24 of IPv4
per /64 of IPv6).  However, anyone doing network access is likely to be
replacing an IPv4 /32 with an IPv6 /48, which results in a lot more address
space usage.

Direct conversion between IPv4 and IPv6 will either result in many places
being starved of IPv6 (very bad, as the OP of this thread pointed out), or
space will be massively overallocated (also, not real hot).

- Matt



Re: DHS and NSA getting married?

2010-10-22 Thread Matthew Palmer
On Fri, Oct 22, 2010 at 11:32:38AM -0400, Christopher Morrow wrote:
 On Fri, Oct 22, 2010 at 11:08 AM, Steven Bellovin s...@cs.columbia.edu 
 wrote:
 
         In the words of a former Justice Department official involved with 
  critical infrastructure protection, ?I have seen too many situations where 
  government officials claimed a high degree of confidence as to the source, 
  intent, and scope of an attack, and it turned out they were wrong on every 
  aspect of it. That is, they were often wrong, but never in doubt.?
 
 this happens with non-cyber things as well... all the time. Point
 being: cyber-attack follows down the path of 'send the people that
 deal with attacks to deal with this'.

For non-cyber things, that would be the police almost every time.  We
don't send a squad of marines out after every mugger (although it'd have an
interesting deterrent effect...)

- Matt



Re: network name 101100010100110.net

2010-10-17 Thread Matthew Palmer
On Sun, Oct 17, 2010 at 08:07:41AM +0200, Per Carlson wrote:
 On 17 Oct 2010 06:47, Day Domes daydo...@gmail.com wrote:
  I have been tasked with coming up with a new name for are transit data
  network.  I am thinking of using 101100010100110.net does anyone see
  any issues with this?

 Technically, no.
 
 But you probably fancy annoying people. I wouldn't imaging anyone typing
 that right on the first attempt.

And imagine answering the phones...

- Matt



Re: Did Internet Founders Actually Anticipate Paid,

2010-09-21 Thread Matthew Palmer
On Tue, Sep 21, 2010 at 09:31:07AM -0700, George Bonser wrote:
  Yes they are -- content providers aren't getting their connections to
  the
  Internet for free (and if they are, how can I get me some of that?).
 
 Maybe I wasn't clear.  Traffic is moving away from transit to direct
 peering at private exchanges in many cases.  [Citation needed]

   If the ISPs are directly peering with the content provider at
   some IX, the content provider gets what amounts to a free ride to
 the
   end user.
  
  Say wha?  ISPs don't *have* to peer at an IX; if they think that it's
  cheaper to buy transit from someone than it is to peer, they're more
  than
  capable of doing so.
 
 Transit would have to get extremely cheap to compete with exchange
 peering.  I don't see it getting that low any time soon.

So it *is* cheaper to peer than to buy transit.  Take the money you save
from not buying transit and put it towards upgrading your core.

- Matt

-- 
Generally the folk who love the environment in vague, frilly ways are at
odds with folk who love the environment next to the mashed potatoes.
-- Anthony de Boer, in a place that does not exist



Re: Other NOGs around the world?

2010-08-22 Thread Matthew Palmer
On Mon, Aug 23, 2010 at 12:42:03AM +1000, Karl Auer wrote:
 On Sun, 2010-08-22 at 10:17 -0400, Marshall Eubanks wrote:
  On Aug 22, 2010, at 9:52 AM, Rogelio wrote:
   What other network operator groups are there around the world (besides 
   NANOG)?
 
 AusNOG. At a bit of a low S:N right now.
 
 We have been leading up to a Federal election, with two big tech issues
 involved - a new national broadband network and Internet censorship.
 These two topics have rather dominated discussions of late.

Politics on an operational list?  NEVAH!

- Matt



Re: Numbering nameservers and resolvers

2010-08-17 Thread Matthew Palmer
On Mon, Aug 16, 2010 at 06:08:02AM -0700, Owen DeLong wrote:
 On Aug 16, 2010, at 6:03 AM, Chris Adams wrote:
  Once upon a time, Patrick W. Gilmore patr...@ianai.net said:
  1) Use different prefixes.  A single prefix going down should not kill
  your entire network.  (Nameservers and resolvers being unreachable
  breaks the whole Internet as far as users are concerned.)
  
  How do you do this in the IPv6 world, where I get a single /32?  Will
  others accept announcements of two /33s to better handle things like
  this?
 
 The better solution is to trade secondary services with some other
 provider. Sure, it's a bit of a pain keeping up with the new zones
 to be added and old zones to be removed back and forth, but, it's
 a great way to have your authoritative servers truly diverse and
 independent.

At $JOB[3], where I was responsible for this sort of thing, a small amount
of shell scripting behind inetd on the master[1], and slightly more shell
scripting behind cron on the secondaries[2], and all our problems were
solved for all time.

- Matt

[1] Read /etc/named/zones/* mangled the (standardised) filenames to get a
list of the zones, and dumped it on stdout, which went out on a high port
that inetd was listening on.

[2] nc to the master on the relevant high port, read the list and write out
an automated named.conf fragment.  Also use a bit of md5sum to detect when
the list changed, so we know when to reload named on the slave.

[3] Subscript, not footnote.



Re: Cost of transit and options in APAC

2010-08-11 Thread Matthew Palmer
On Wed, Aug 11, 2010 at 12:53:18PM -0700, Joel Jaeggli wrote:
 On 8/11/10 12:29 PM, Franck Martin wrote:
  Nice to see this change
  
  APAC has been obliged to pay the cost to peer with the US (long
  distance links are expensive). Now that US wants to peer with Asia,
  pricing may become more balanced...
 
 I think the question is more like why am I being quoted $100 A megabit
 in India for transit in India? Not why am I being charged for for the
 transport cost across the pacific.

Because the percentage of traffic that actually stays in India, as compared
to that which transits the Pacific, is miniscule.  If you're asking for
enough bandwidth / throwing enough money around, I'm sure you could get an
Indian-only deal, but you'd need to make it worth the while for the provider
to setup the config, given that either way they'll be getting your money,
and you won't be using a lot of transpacific traffic.  Note also that it's
unlikely that the provider will be getting a differentiated rate from their
upstreams for internal traffic, and you may have to settle for peering-only
access (if your chosen provider is connected to any peering points).

- Matt

-- 
Ruby's the only language I've ever used that feels like it was designed by a
programmer, and not by a hardware engineer (Java, C, C++), an academic
theorist (Lisp, Haskell, OCaml), or an editor of PC World (Python).
-- William Morgan



Re: Google wants your Internet to be faster

2010-08-09 Thread Matthew Palmer
On Mon, Aug 09, 2010 at 12:18:12PM -0700, Zaid Ali wrote:
 The devil is always in the details. The Network management piece is quite
 glossed over and gives a different perception in the summary. You can't
 perform the proposed network management piece without deep packet inspection
 which violates every users privacy.

This is Google we're talking about here, though.

- Matt


-- 
MySQL seems to be the Windows of the database world. Broken, underspecced,  
and mainly only popular due to inertia and people who don't really know what
they're doing.
-- Peter Corlett, in the Monastery



Re: 33-Bit Addressing via ONE bit or TWO bits ? does NANOG care?

2010-07-30 Thread Matthew Palmer
On Thu, Jul 29, 2010 at 11:38:56PM -0400, Atticus wrote:
 What world do live in? Yes, we extend the life of IPv4 by increasing the
 numeric range. As for only needing port 80, I'm not really sure where
 you've been for the last decade or so. There's are hundreds of services
 using different ports, and tunneling them all makes absolutely no sense.
 Yes, we don't really need 65k ports, but stealing bits in the header from
 them is the most ridiculous thing I've heard yet.

Fark, Tom, he's gone straight past the hook, line, and sinker, and taken it
all the way up to the second line guide.  Better get the big pliers.

- Matt



Re: Addressing plan exercise for our IPv6 course

2010-07-25 Thread Matthew Palmer
On Mon, Jul 26, 2010 at 06:24:04AM +0200, Jens Link wrote:
 Owen DeLong o...@delong.com writes:
  The correct answer is No, you don't have to configure rules, you just need
  one rule supplied by default which denies anything that doesn't have a
  corresponding outbound entry in the state table and it works just like NAT
  without the address mangling.
 
 They used NAT as an excuse not to let some applications to the
 outside. 

That's OK, if it's NAT unfriendly, chances are it requires deep packet
inspection to make the state tables do the right thing anyway.

- Matt

-- 
Skippy was a wallaby. ... Wallabies are dumb and not very trainable...  The
*good* thing...is that one Skippy looks very much like all the rest,
hence...one-shot Skippy and plug-compatible Skippy.  I don't think they
ever had to go as far as belt-fed Skippy  -- Robert Sneddon, ASR



Re: Mikrotik OC-3 Connection

2010-07-03 Thread Matthew Palmer
On Sat, Jul 03, 2010 at 05:12:14PM -0700, Majdi S. Abbas wrote:
 On Sat, Jul 03, 2010 at 07:32:48PM -0400, Scott Berkman wrote:
  I really wouldn't use the word legacy to describe SONET and OC-3's.
 
   It's around 25 years old (work started in 1985, first standards
 published in 1988) and we now have a ratified 100G Ethernet standard.
 
   Much of it is being used to transport subrate links, some of
 which are derived from even older transport standards.
 
   If not legacy, what word WOULD you use?

Legacy (adj.): A pejorative term used in the computer industry meaning it
works.

- Matt

-- 
Apparently if you are aware that the From: field can be, and often is,
forged, you are overqualified to write antivirus software.
-- Jamie Zawinski, http://www.jwz.org/gruntle/virus.html



Re: Inquiries to Acquire IPs

2010-07-02 Thread Matthew Palmer
On Fri, Jul 02, 2010 at 04:40:07PM -0500, Aaron Wendel wrote:
 I sent an inquiry in to ARIN yesterday for a certain ASN that was available
 and was told that management won't allow them to issue requested numbers. :(

That's easy, then... Can I have any of ASN 0 to $DESIRED-1 or $DESIRED+1 to
65535... since they can't issue a number that's requested, the one you want
is the only one left.

- Matt
(Back into my hole)



Re: Finland makes broadband access a legal right

2010-07-01 Thread Matthew Palmer
On Fri, Jul 02, 2010 at 12:14:42AM +0100, Matthew Walster wrote:
 On 1 July 2010 23:17, William Herrin b...@herrin.us wrote:
  In 1996 a certain inventor of the Internet decided that the universal
  service fund needed to pay for PCs in rural schools (the E-Rate
  program) instead of improving rural communications...
 
 As someone who's always been in the tech field, the amount spent on
 ICT in schools has always shocked and appalled me.

Don't get me started on ICT in schools.  Please.

- Matt

-- 
Igloo I remember going to my first tutorial in room 404. I was most upset
when I found it.



Re: eur.army.mil net ops contact?

2010-05-19 Thread Matthew Palmer
On Wed, May 19, 2010 at 06:11:34PM +0530, Suresh Ramasubramanian wrote:
 There's this old joke - spread across multiple countries around the
 world - about there being three ways to do something ..
 
 1. The right way
 2. The wrong way
 3. The army way

I know it as 3. The railway, and boy ain't it the truth...

- Matt



Re: [Re: http://tools.ietf.org/search/draft-hain-ipv6-ulac-01]

2010-04-25 Thread Matthew Palmer
On Mon, Apr 26, 2010 at 08:20:33AM +0930, Mark Smith wrote:
 On Sun, 25 Apr 2010 13:21:16 -0400
 Richard Barnes richard.bar...@gmail.com wrote:
 
  Moreover, the general point stands that Mark's problem is one of bad
  ISP decisions, not anything different between IPv4/RFC1918 and IPv6.
 
 My example, although a bit convoluted to demonstrate a point, is about
 robustness against Internet link failure. I don't think people's
 internal connectivity should be dependent on their Internet link being
 available and being assigned global address space. That's what the
 global only people are saying.
 
 (how is the customer going to access the CPE webserver to enter ISP
 login details when they get the CPE out of the box, if hasn't got
 address space because it hasn't connected to the ISP ...)

I've been using IPv6 for about 18 seconds, and even *I* know the answer to
that one -- the link-local address.

- Matt

-- 
You are capable, creative, competent, careful.  Prove it.
-- Seen in a fortune cookie



Re: ARIN IP6 policy for those with legacy IP4 Space

2010-04-08 Thread Matthew Palmer
On Thu, Apr 08, 2010 at 02:56:15PM -0400, Dorn Hetzel wrote:
 Well, yeah, but that is a separate problem.  Anyone for an
 announced-prefix-tax ? :)

Just add announced prefixes to the settlement charges, alongside bits
transferred...

- Matt

-- 
A friend is someone you can call to help you move. A best friend is someone
you can call to help you move a body.



Re: log parsing tool?

2010-02-23 Thread Matthew Palmer
On Mon, Feb 22, 2010 at 04:15:22PM -0600, fedora fedora wrote:
 Anyone has good recommendations for an open-sourced log parsing and
 analyzing application? It will be used to work with syslog-ng and other
 general syslog and application logs.
 
 I have been looking at swatch and logwatch, but would like to find out if
 there are other good choices, thanks

SEC does seem to be the gold standard in advanced log correlation beyond
that available in grep | mail type systems such as logwatch.  However it
is incredibly arcane, and despite reading a lot of documentation for it I've
never really been able to wrap my head around it.

A colleague has started to write a SEC-like tool with (I hope) a more
approachable mental model; take a look at http://github.com/rodjek/grok.  I
must (embarrasedly) admit I haven't looked at it yet, but he claims that he
reimplemented sshd_sentry (the fail2ban equivalent we use) in two lines of
rules, which seems like a nice (basic) demonstration.

- Matt



Re: BIRD vs Quagga

2010-02-16 Thread Matthew Palmer
On Tue, Feb 16, 2010 at 07:47:13PM +, Thomas Mangin wrote:
 (with a domino's effect as well).

Your routes processed in 30 minutes or it's free?

- Matt
(Yeah, I know, back in my hole...)



Re: 192.255.103.x

2010-02-11 Thread Matthew Palmer
On Thu, Feb 11, 2010 at 07:27:38PM -0800, Hector Herrera wrote:
 On Thu, Feb 11, 2010 at 6:08 PM, Matthew Palmer mpal...@hezmatt.org wrote:
  On Thu, Feb 11, 2010 at 05:30:11PM -0800, Hector Herrera wrote:
  I'm trying to diagnose an issue with 192.255.103.x
 
  As far as I can tell from IANA, the block 192/8 is allocated to ARIN.
  ARIN does not have a record of 192.255.103 being allocated to anybody.
 
  Here is the issue ... the customer insists that is the correct IP and
  for a few hours yesterday, it was actually working. ?Their satellite
  phone can reach it, but we can't see it advertised today from any
  networks.
 
  Smells to me like their satphone provider could be doing something dodgy.
  More info would be handy: what your customer's relationship to that IP block
  is, and what they think should be available at that IP block.
 
 According to the customer the IP is at their home network.  They are
 in town for a certain large event *cough*fiverings*cough* and they
 keep insisting (and their home IT department indicates the IP is
 valid).
 
 The customer is now claiming this IP is part of a hidden and
 secret block of IPs ... How can you have hidden IPs?

Pfft, that's just code for we picked a block at random.  See also: 1/8.

 I think I'm just going to chalk this one up to a made up IP block that
 is probably statically routed by their satphone provider.

Indeed.

- Matt



Re: Connectivity problems to google via openDNS

2010-02-09 Thread Matthew Palmer
On Tue, Feb 09, 2010 at 09:56:23AM -0800, Jay Hennigan wrote:
 Mark wrote:
 Hello nanog,

 Just wondering if anyone is experiencing the same problem with google  
 and openDNS on their end or knows what's going on there with openDNS.  
 The problem just occurred about 20 minutes ago.

 Don't do that then.

 OpenDNS is a form of censorware and almost certainly hijacking queries  
 to Google (and numerous other sites), redirecting to its own servers.

It's also got some spectacularly odd failure modes.  I was helping a
customer diagnose a problem yesterday where when they attempted to connect
to one server by name, they were reliably getting another server on the same
network.  Turned out that the DNS responses from OpenDNS (they were in a
cafe somewhere with free wireless that was using OpenDNS) were giving
slightly wrong addresses -- like the real address for example.com was
192.0.2.12, and OpenDNS was giving the response that example.com was at
192.0.2.16 (another server in the same cluster, hence the insane confusion). 
No wildcarding or recent DNS changes at our end, either -- it was just
OpenDNS screwing things up *somehow*.

Never, ever use OpenDNS is my recommendation.

- Matt



Re: Enhancing automation with network growth

2010-01-21 Thread Matthew Palmer
On Wed, Jan 20, 2010 at 10:52:39PM -0500, Erik L wrote:
  One thing that would take a major load off would be if my MRTG system
  could simply update its config/index files for itself, instead of me
  having to  do it on each and every port change.
  
  Can anyone offer up ideas on how you manage any automation in this
  regard for their infrastructure gear traffic graphs? 
  (Commercial options
  welcome, off-list, but we're as small as our budget is).
 
 Not sure how you're doing your graphs currently, but have you considered 
 Cacti?

If automating MRTG config is hard, automating Cacti config is about as close
to impossible as one can get without popping around to the Augean stables.

- Matt



Re: 1/8 and 27/8 allocated to APNIC

2010-01-21 Thread Matthew Palmer
On Thu, Jan 21, 2010 at 08:22:57PM -0500, Jon Lewis wrote:
 On Thu, 21 Jan 2010, George Bonser wrote:

 Some of that water is dirtier than the rest.  I wouldn't want to be the
 person who gets 1.2.3.0/24

 The whole /8 should be fun.

 http://en.wikipedia.org/wiki/AnoNet

  To avoid addressing conflict with the internet itself, the range
  1.0.0.0/8 is used. This is to avoid conflicting with internal networks
  such as 10/8, 172.16/12 and 192.168/16, as well as assigned Internet
  ranges. In the event that 1.0.0.0/8 is assigned by IANA, anoNet could
  move to the next unassigned /8, though such an event is unlikely, as
  1.0.0.0/8 has been reserved since September 1981.

 I thought there was some other group that had been squatting in 1/8,  
 something about radio and peer to peer...but not AnoNet (at least that  
 name was totally unfamiliar)...but this was all I could find with a quick 
 google.

Yeah, they're not the only bunch of idiots who think that unallocated
means free for all.  I'm reliably informed that Hamachi uses 5/8 (for the
same reasons as this AnoNet bunch).  There's probably others out there.  Fun
times ahead for moron-fac^Wcustomer-facing support personnel.

- Matt



Re: Default Passwords for World Wide Packets/Lightning Edge Equipment

2010-01-13 Thread Matthew Palmer
On Wed, Jan 13, 2010 at 12:55:00PM -0500, Matt Simmons wrote:
 That would be excellent for both the administrator, and anyone walking
 down the row with a wand in their pocket.

So... someone has a list of the barcodes on all my equipment.  ONOES! 
Without access to the asset database that backs it, I'm not sure what damage
they're going to do.  It's not as though one of my core switches is going to
try and get through airport security with it.

- Matt



Re: Default Passwords for World Wide Packets/Lightning Edge Equipment

2010-01-06 Thread Matthew Palmer
On Wed, Jan 06, 2010 at 08:41:14PM -0500, Joel Esler wrote:
 On Wed, Jan 6, 2010 at 8:26 PM, Steven Bellovin s...@cs.columbia.edu wrote:
  On Jan 6, 2010, at 6:24 PM, Jeffrey I. Schiller wrote:
   An option I saw years ago (I forgot on whose equipment) was a default
   password which was a function of the equipment's serial number. So you
   had to have the algorithm and you needed the serial number which was not
   related to the MAC. So if you didn't have physical access, you were not
   in a good position to learn the password.
  
   I suspect this was a support nightmare for the vendor and I bet they
   went to a more standard (read: the same) factory password.
  
   At the end of the day, minimizing support costs for the vendor (not to
   mention likely annoyance for the customer) trumps providing default
   security for the folks who won't change the default password.
 
  The MyFi apparently does this.  According to
  http://www.nytimes.com/2009/05/07/technology/personaltech/07pogue.htmlThe 
  network password is printed right there on the bottom of the MiFi
  itself.

 At least it's not .
 
 But yes, my Mifi *had* the password on the bottom.

As long as the passwords are reasonably secure (ie not generated to a simple
pattern that can be easily brute forced) and they can be changed, I'd
consider that to be pretty reasonable security.  As has been mentioned in
this thread already, if someone's got physical access to your equipment
you're dead in the water, security wise, so having the device-specific
factory default password on the equipment is far more secure than having a
single factory default password, whilst being *far* more user friendly than
a hash-the-serial-number approach -- or even a prompt for a password before
I'll do anything (which, I agree, is the most secure, but is still not very
usable).

For the record, all of my personal networking gear has the admin credentials
(and whatever else I need to get into them, like IP addresses, etc) written
on it.  I don't trust myself to remember those over the years, and assuming
that anything else is going to be working when I *need* to get into them
seems awfully optimistic.

- Matt



Re: Default Passwords for World Wide Packets/Lightning Edge Equipment

2010-01-06 Thread Matthew Palmer
On Wed, Jan 06, 2010 at 10:45:32PM -0600, Joe Greco wrote:
  On Wed, Jan 6, 2010 at 7:19 PM, Dobbins, Roland rdobb...@arbor.net wrote:
   Which goes to show that they just really don't get it when it comes to 
   security. ?Maybe they  should look here at all the entries for 'default 
   credentials':
  
  Roland, this isn't the home wi-fi market we're talking about.  Anyone
  that's going to buy one of these puppies is going to have a clue about
  putting their password in. 
 
 You apparently missed the recent thread on NANOG where this guy was asking
 for some help with Default Passwords for World Wide Packets/Lightning Edge
 Equipment ...  apparently not everyone has the clue you expect them to.

To be fair, he was just asking about factory resetting the device because
the current password was unknown, then reconfiguring the device (I'm willing
to be generous and assume that the reconfiguration included setting a new,
secure password).

- Matt



Re: Smartcard and non-password methods (was Re: Password repository)

2009-11-21 Thread Matthew Palmer
On Sat, Nov 21, 2009 at 04:06:48PM -0500, Jeffrey Lyon wrote:
 I was pretty excited about this post until I found out that myvidoop
 only works on older version of FF.

I can only find something about the plugin not working on FF 3.5, but I
don't use the plugin since I only use it as an OpenID endpoint.  I can't
imagine how the main site wouldn't work in FF 3.5 -- it's just a bit of
javascripty fluff.

- Matt



Re: Smartcard and non-password methods (was Re: Password repository)

2009-11-21 Thread Matthew Palmer
On Sat, Nov 21, 2009 at 04:58:27PM -0500, Jeffrey Lyon wrote:
 So it works as a standalone password vault also?

I don't know.  My only experience with it has been as an OpenID
endpoint/provider/whatever, and it was on that basis that I replied
originally.

- Matt



Re: What DNS Is Not

2009-11-20 Thread Matthew Palmer
On Fri, Nov 20, 2009 at 09:49:14AM +1030, Andrew Cox wrote:
 As a follow up to this, one of the large Australian ISP's has just  
 introduced a DNS redirection service for all home customers.

 /The BigPond-branded landing page provides BigPond customers with  
 organic search results, sponsored links, display advertisements and  
 intelligent recommendations, all derived from the invalid domain input -  
 much more helpful and friendly than a nasty 404 page error./

*Facepalm*  Maybe my browser's just doing something wrong, but when was the
last time you got a nasty 404 page error for an NXDOMAIN response?

- Matt
*mumblemumble*journalists*mumblemumble*



Re: DreamHost admin contacts

2009-10-13 Thread Matthew Palmer
On Tue, Oct 13, 2009 at 01:34:47PM -0700, Brandon Galbraith wrote:
 Have had great luck (no outages) with Rackspace Mail (formerly
 Mailtrust). Quite affordable as well.

It's definitely luck that's kept you outage free -- my former employer
outsourced all their customer e-mail services to Mailtrust, and had no end
of problems with it.  They're on my avoid with extreme prejudice list.

- Matt



Re: 32-bit AS numbers

2009-10-10 Thread Matthew Palmer
On Fri, Oct 09, 2009 at 12:05:57PM -0400, Kevin Loch wrote:
 Greg Hankins wrote:

 We also started a Wiki with content based on the presentation that has
 more updated information, including a current list of vendor support.
 If you see a vendor missing, let us know and we can update the list.
 Or better yet, create an account and add some content yourself :-).

 http://as4.cluepon.net/index.php/Main_Page

 While it's good to see support _finally_ in 2.2SX, I still don't see it
 in 12.2SR (for rsp720).  It's almost like Cisco has no idea how
 many of these things are actually used on the Internet.

Or, more plausibly, they know exactly how many there are out there, and how
much they'd be able to make if everyone were forced to upgrade.

- Matt



Re: Data Center testing

2009-08-27 Thread Matthew Palmer
On Wed, Aug 26, 2009 at 03:32:42PM +, Dylan Ebner wrote:
 I always love it when I get an outage report from my ISP's or datacenter
 and they say an unexpected issue or unforseen issue caused the
 problem.

Well, at least it's better than yeah, we knew about it, but didn't think it
was worth worrying about.

- Matt



Re: Using twitter as an outage notification

2009-07-05 Thread Matthew Palmer
On Sun, Jul 05, 2009 at 11:01:43AM +0100, Roland Perry wrote:
[snow day notifications]
 Unfortunately, the number of students polling the website for news means  
 it can't cope with the traffic. I don't believe they can justify paying  
 more for better web hosting, just to manage this once-a-year half hour  
 event.

There are web hosting providers whose 18c/year hosting plans can't handle a
few thousand requests to a static page over a period of maybe 15 minutes
without falling over?  The mind boggles.

- Matt



Re: Where to buy Internet IP addresses

2009-05-01 Thread Matthew Palmer
On Sat, May 02, 2009 at 09:40:23AM +1000, Mark Andrews wrote:
 
 In message 49fb4661.8090...@west.net, Jay Hennigan writes:
  LEdouard Louis wrote:
   Optimum Online business only offer 5 static IP address.
   
   Where can I buy a block of Internet IP address for Business? How much
   does it cost?
  
  Only five?  Really?  Our basic residential users get 18 quintillion 
  addresses, and business users get 65536 times that many.  Tell them you 
  need a few more.  :-)
 
   Actually residential users do.  One /64 is not enough.  On
   can argue about whether a /56 or a /48 is appropriate for
   residential users but a single /64 isn't and residential
   ISP's should be planning to hand out more than a single /64
   to their customers.

How many home users (or even small businesses) have more than one subnet at
the moment (behind NAT, presumably)?  As a percentage of subscribers, what
does that equate to?

Handing out an IPv6 /56 to a DSL or cable customer should be handled much
the same way as giving them an IPv4 /29 is today -- ask, and it shall be
provided, but it's wasteful[1] to do so by default.

- Matt

[1] Just because we've got a lot of it, doesn't mean we should be pissing it
up against the wall unnecessarily.  A motto for network engineers and
economists alike.


-- 
[M]ost of the other people here [...] drive cars that they have personally
built (starting with iron ore, charcoal, and a Malaysian turn-signal tree)
[...] but I wimp out on all of those points.  Sometimes there are advantages
to paying somebody else to do it for you.  -- Matt Roberds, in the Monastery



Re: Important New Requirement for IPv4 Requests

2009-04-21 Thread Matthew Palmer
On Tue, Apr 21, 2009 at 02:51:11PM -0700, Jo Rhett wrote:
 On Apr 21, 2009, at 1:58 PM, David Hubbard wrote:
 Raising the price won't help; there's already a huge amount
 of wasted address space by web hosts selling IP addresses
 to customers who need them solely for 'seo purposes' rather

 It's a common request we see.  We refuse it, and point them to the  
 Google documentation that shows that unique IPs don't help or hurt their 
 SEO standings.

Then they come back with a request for IPs for SSL certificates, which is a
valid technical justification.  BTDT.  People will find a way to do the
stupid thing they want to do.

- Matt



Re: Important New Requirement for IPv4 Requests

2009-04-21 Thread Matthew Palmer
On Tue, Apr 21, 2009 at 04:41:46PM -0700, Jo Rhett wrote:

 On Apr 21, 2009, at 4:22 PM, Ken A wrote:
 Chris Adams wrote:
 Once upon a time, Jo Rhett jrh...@netconsonance.com said:
 Since  virtual web hosting has no technical justification for IP  
 space, I  refuse it.
 SSL and FTP are techincal justifications for an IP per site.

 Right. Also, monthly bandwidth monitoring/shaping/capping are more  
 easily done using one ip per hosted domain, or ftp site, or whatever. 
 Otherwise you are parsing logs or using 3rd party apache modules.

 *Shrug* I've been doing IP allocations for 14 years and that's never  
 been mentioned to me.

Oh, you lucky, lucky person.  We've got a couple of customers at the day job
that constantly come back to us for more IP addresses for bandwidth
accounting purposes for their colo machine(s).  Attempts at education are
like talking to a particularly stupid brick wall.

- Matt



Re: Important New Requirement for IPv4 Requests

2009-04-21 Thread Matthew Palmer
On Tue, Apr 21, 2009 at 08:24:38PM -0400, Ricky Beam wrote:
 On Tue, 21 Apr 2009 18:40:30 -0400, Chris Adams cmad...@hiwaay.net wrote:
 SSL and FTP are techincal justifications for an IP per site.

 No they aren't.  SSL will work just fine as a name-based virtual host 
 with any modern webserver / browser. (Server Name Indication (SNI) 
 [RFC3546, sec 3.1])

I encourage my competitors to do this.  You only have to get one noisy
curmudgeon who can't get to your customer's SSL website because IE 5.0 has
worked fine for them for years to make it a completely losing strategy to
try deploying this everywhere.  Since you can't predict in advance which
sites are going to be accessed by said noisy curmudgeon, you don't bother
deploying it anywhere, to be on the safe side.

 FTP?  Who uses FTP these days?  Certainly not consumers.  Even Cisco  
 pushes almost everything via a webserver. (they still have ftp servers,  
 they just don't put much on them these days.)

A depressingly large number of people use FTP.  Attempts to move them onto
something less insane are fruitless.  Even when the tools support it (and
plenty of web design tools don't appear to do anything other than FTP),
we've always done it that way and it works fine and if we have to change
something we'll move to another hosting company rather than click a
different button in our program.

Business imperatives trump technical considerations, once again.  And, for
the record, we're moving toward IPv6, so we're *trying* to be part of the
solution, in our own small way.

- Matt



Re: Is whois.apnic.net down?

2009-02-10 Thread Matthew Palmer
On Tue, Feb 10, 2009 at 09:48:21AM -0700, Dale Carstensen wrote:
 I get Connection timed out on whois commands to it.
 
 Sorry to attempt to answer my own question, but maybe it's the fires
 in Australia, as the last traceroute hop is a Brisbane.telstra.net
 domain name.

Brisbane's about 2000km north of the major fires.  Instead, they're
recovering from a cyclone.

Gotta love this country.

- Matt

-- 
Talk about unlucky. D'you know, if I fell in a barrel of tits I'd come out
sucking me thumb.
-- Seen on the 'net:
 http://thelawwestofealingbroadway.blogspot.com/2006/01/bang-to-rights.html



Re: v6 DSL / Cable modems [was: Private use of non-RFC1918 IP space

2009-02-09 Thread Matthew Palmer
On Mon, Feb 09, 2009 at 09:27:59PM -0500, TJ wrote:
The SOX auditor ought to know better.  Any auditor that
requires NAT is incompenent.
 
  Sadly, there are many audit REQUIREMENTS explicitly naming NAT and
  RFC1918 addressing ...
 
 SOX auditors are incompetent. I've been asked about anti-virus software on
 UNIX servers and then asked to prove that they run UNIX.
 
 Fair enough, but my point was that it isn't the auditors' faults in _all_
 cases.
 When the compliance explicitly requires something they are required to check
 for it, they don't have the option of ignoring or waving requirements ...
 and off the top of my head I don't recall if it is SOX that calls for
 RFC1918 explicitly but I know there are some that do.

Considering that RFC1918 says nothing about IPv at all, could that be a
blocker for deployment in general?  That'd also make for an interesting
discussion re: other legacy protocols (IPX, anyone?)...

- Matt

-- 
I tend to think of solution as just a pretentious term for thingy. 
Doing that word substitution in my head makes IT marketing literature
somewhat more tolerable.
-- lutchann, in http://lwn.net/Articles/124703/



Re: Private use of non-RFC1918 IP space

2009-02-03 Thread Matthew Palmer
On Wed, Feb 04, 2009 at 11:57:36AM +1100, Skeeve Stevens wrote:
 OK.
 
 Following myself up, and referencing a link someone else gave me in regards
 to IPv6
 
 http://en.wikipedia.org/wiki/Private_network
 
 Has the entry:
 
 Private use of other reserved addresses
 
 Several other address ranges, in addition to the official private ranges,
 are reserved for other or future uses, including 1.0.0.0/8 and 2.0.0.0/8[1].
 In recent years, large companies have begun to use this address space
 internally.

[citation required]

- Matt



  1   2   >