Re: [atlas] Probe operator notifications

2020-12-10 Thread Gert Doering
Hi,

On Thu, Dec 10, 2020 at 04:31:48PM -0500, Edward Lewis wrote:
> I do get the ???your probe went off-line??? notices.  I would like ???your 
> probe came back on-line??? notices as well.  If we had those, I may have 
> noticed it stayed down after the last message I saw.

Yes, please!!

I have voiced the wish for "back on-line notice" like two years ago, and
was told "it's complicated"... well... doesn't have to be millisecond-
accurate, but if it saves me driving to a remote location, a few minutes
delay are not that bad.

Gert Doering
-- NetMaster
-- 
have you enabled IPv6 on something today...?

SpaceNet AG  Vorstand: Sebastian v. Bomhard, Michael Emmer
Joseph-Dollinger-Bogen 14Aufsichtsratsvors.: A. Grundner-Culemann
D-80807 Muenchen HRB: 136055 (AG Muenchen)
Tel: +49 (0)89/32356-444 USt-IdNr.: DE813185279


signature.asc
Description: PGP signature


Re: [atlas] Probe operator notifications

2020-12-10 Thread Colin Johnston
I said it would be useful for probe up messages five years ago

Col

> On 10 Dec 2020, at 21:31, Edward Lewis  wrote:
> 
> (Seeing the thread about DNS intercepted probes reminded me to send this:)
> 
> For 5 or so years running I have a probe operating in my garage (behind my 
> home’s NAT and using the ISP’s NXDOMAIN rewriting, non-DNSSEC handling 
> recursive server) a run-of-the-mill home cable set up.
> 
> When I got my November report, it said I’d been down the last half of 
> November.  That was news to me.  I then down'd/up’d it and it reconnected and 
> seems to be on-line again.
> 
> I do get the “your probe went off-line” notices.  I would like “your probe 
> came back on-line” notices as well.  If we had those, I may have noticed it 
> stayed down after the last message I saw.
> 
> Ed
> 
> 
> 




[atlas] Probe operator notifications

2020-12-10 Thread Edward Lewis
(Seeing the thread about DNS intercepted probes reminded me to send this:)

For 5 or so years running I have a probe operating in my garage (behind my 
home’s NAT and using the ISP’s NXDOMAIN rewriting, non-DNSSEC handling 
recursive server) a run-of-the-mill home cable set up.

When I got my November report, it said I’d been down the last half of November. 
 That was news to me.  I then down'd/up’d it and it reconnected and seems to be 
on-line again.

I do get the “your probe went off-line” notices.  I would like “your probe came 
back on-line” notices as well.  If we had those, I may have noticed it stayed 
down after the last message I saw.

Ed





Re: [atlas] Probes suffering DNS interception?

2020-12-10 Thread Ray Bellis



On 10/12/2020 17:59, Massimo Candela wrote:
> 
> On 10/12/2020 18:36, Stephane Bortzmeyer wrote:
> 
>> I disagree. The point of RIPE Atlas probes is to test the Internet AS
>> IT IS, not as we would like it to be. 
> 
> +1

Fair enough - I was mostly asking if there was such a policy, rather
than necessarily proposing that this should be the policy.

> If you have a way to automatically discover such probes, it would be
> useful to release the code on the github atlas community contrib.
I don't have a fully automated way (yet), but I do have a list of
regexes that appear to match all known correct variants of the various
RSO's hostname.bind strings with no false positives being returned from
the currently active Atlas probes:

  'a':  /^(?:rootns-|nnn1-)([a-z]{3})\d$/,
  'b':  /^b\d-([a-z]{3})$/,
  'c':  /^([a-z]{3})\d[a-z]\.c\.root-servers\.org$/,
  'd':  /^([a-z]{4})\d\.droot\.maxgigapop\.net$/,
  'e':  /^(?:[a-z]\d+)\.([a-z]{3}[a-z]?)\.eroot$/,
  'f':  /^([a-z]{3})(?:\d[a-z]|\.cf)\.f\.root-servers\.org$/,
  'g':  /^groot-?-(.*?)-.*?(\.net)?$/,
  'h':  /^\d+\.([a-z]{3})\.h\.root-servers\.org$/,
  'i':  /^s\d\.([a-z]{3})$/,
  'j':  /^(?:rootns-(?:el)?|nnn1-)([a-z]{3})\d$/,
  'k':  /^.*?\.([a-z]{2}-[a-z]{3})\.k\.ripe\.net$/,
  'l':  /^[a-z]{2}\.([a-z]{2}-[a-z]{3})\.l\.root$/,
  'm':  /^m-([a-z]{3})(-[a-z]+)?-\d$/

Ray






Re: [atlas] Probes suffering DNS interception?

2020-12-10 Thread Massimo Candela





On 10/12/2020 18:36, Stephane Bortzmeyer wrote:


I disagree. The point of RIPE Atlas probes is to test the Internet AS
IT IS, not as we would like it to be. 


+1

If you have a way to automatically discover such probes, it would be 
useful to release the code on the github atlas community contrib.



Ciao,
Massimo



Re: [atlas] Probes suffering DNS interception?

2020-12-10 Thread Stephane Bortzmeyer
On Thu, Dec 10, 2020 at 05:29:46PM +,
 Ray Bellis  wrote 
 a message of 20 lines which said:

> Is there any RIPE policy about whether nodes that are subject to DNS
> interception should be excluded from results (or maybe even dropped
> altogether) ?

I disagree. The point of RIPE Atlas probes is to test the Internet AS
IT IS, not as we would like it to be. (Otherwise, I would drop the
probes behind NAT…)

> While these probes are perhaps still useful for ping and traceroute
> tests, they are effectively useless for DNS related tests other than as
> a proxy measure for how prevalent that practise actually is.

Which is an important use.

> If there was a heuristic that could be applied on the probe itself or
> within the RIPE data collector that tagged the probe as having "bad DNS"
> that would help a lot.

Adding a tag is indeed a good idea, but not excluding or dropping
these probes.



Re: [atlas] Probes suffering DNS interception?

2020-12-10 Thread Jared Mauch



> On Dec 10, 2020, at 12:29 PM, Ray Bellis  wrote:
> 
> Is there any RIPE policy about whether nodes that are subject to DNS
> interception should be excluded from results (or maybe even dropped
> altogether) ?
> 
> While these probes are perhaps still useful for ping and traceroute
> tests, they are effectively useless for DNS related tests other than as
> a proxy measure for how prevalent that practise actually is.
> 
> For the visualisation I've just been building based on the Root System's
> "hostname.bind" data returned by Atlas it was pretty difficult to figure
> out how to exclude those probes on the client side.
> 
> If there was a heuristic that could be applied on the probe itself or
> within the RIPE data collector that tagged the probe as having "bad DNS"
> that would help a lot.

I think this is valuable, you can get an idea of what part of the population is 
being tampered with either by bad NETGEAR devices or otherwise.  It’s clear you 
need to design something to measure for this, but I don’t think they should be 
automatically excluded.

There are providers that do strange things like TTL lengthening which are 
problematic, but you often can’t see these non-compliant resolvers without a 
much more in-depth investigation.  (No, I’m not talking about serve-stale 
either, that I think is a fine behavior).

- Jared




[atlas] Probes suffering DNS interception?

2020-12-10 Thread Ray Bellis
Is there any RIPE policy about whether nodes that are subject to DNS
interception should be excluded from results (or maybe even dropped
altogether) ?

While these probes are perhaps still useful for ping and traceroute
tests, they are effectively useless for DNS related tests other than as
a proxy measure for how prevalent that practise actually is.

For the visualisation I've just been building based on the Root System's
"hostname.bind" data returned by Atlas it was pretty difficult to figure
out how to exclude those probes on the client side.

If there was a heuristic that could be applied on the probe itself or
within the RIPE data collector that tagged the probe as having "bad DNS"
that would help a lot.

cheers,

Ray Bellis
Director of DNS Operations, ISC.