Fw: New member seeks direction

2000-02-14 Thread Mike Kim

 
 -Original Message-
 From: [EMAIL PROTECTED] from Dan Melendez [mailto:[EMAIL PROTECTED]]
 Sent: Monday, February 14, 2000 11:19 AM
 To: [EMAIL PROTECTED]
 Subject: New member seeks direction
 
 
 Hello,
 I am interested in the following topics:
 
 1) Internet television(all related tech info)
 2) High speed Internet fundamentals
 3) 801.11 DS cards (11mbps)
 
 If you can refer me to some web files, I would greatly appreciate it.
 Thank you for your time and make it a great day.
 dan
 
 
 


Dear Dan

Subject : ( PayTVs +  FreeTVs + Internet ) 
Satellite Receiver PC Card 


We would like to introduce PC cards for satellite Internet/TV on PC, as an official 
PC-Card supplier of EuropeOnline etc.   For its specifications and company 
introduction, pls surf WWW.pentamedia.com


FOB Korea Prices of PC cards


satellite Internet + FTA TV + PayTV (Pent@VISION-CI)
- sample(1~5) price : U$ 300 / unit
- over 1,000 pcs : U$ 270 / unit

satellite Internet + FreeToAir TV (Pent@VISION)
- sample(1~5) price : U$ 250 / unit
- over 1,000 pcs : U$ 230 / unit

satellite Internet (Pent@NET)
- sample(1~5) price : U$ 160 / unit
- over 1,000 pcs : U$ 130 / unit
 
satellite Internet (Pent@U : USB type)
- sample(1~5) price : U$ 270 / unit
- over 1,000 pcs : U$ 200 / unit


We also do satellite internet fundamentals including IP gateway to RSMS, RF etc.   
Please let me know your requirements.



Mike KIM  /   PentaMedia Co., Ltd.
 DEVELOPER  MANUFACTURER of
 Satellite Internet / TV Receiver PC card

Email : [EMAIL PROTECTED]
Tel +82.2.3463.3164   Mobile +82.19.320.0106   Fax +82.2.3461.9486











Re: Internet SYN Flooding, spoofing attacks

2000-02-14 Thread Robert Elz

Date:Mon, 14 Feb 2000 00:37:29 -0500
From:"Donald E. Eastlake 3rd" [EMAIL PROTECTED]
Message-ID:  [EMAIL PROTECTED]

  | I think that making egress filtering a BCP, applying community
  | pressure, bringing law suites, etc., will be about as effective
  | at eliminating forged source address packets on the Internet as
  | similar measures have been in eliminating open SMTP relays...
  | 
  | They help, but not much.

I'm not sure there is a good analogy there.There's no good purpose
in sending packets with incorrect source addresses I can think of, and
stopping the practice is the basic intent of the filters.  The only
justification for not doing it is cost - and then just just becomes a
part of the cost benefit analysis - will it cost us more or less to
implement this?

On the other hand, SMTP relays are not a problem anyone cares about of
themselves - just the contrary in fact, smtp relaying can be a very useful
function to have available (eg: you're travelling with your laptop
and have a bunch of mail waiting to go - you get a connection for a
few minutes between flights, but your normal home relay is unreachable
right now - being able to pick some other friendly relay and simply park
your mail on it can be a real advantage).   The thing to be fixed there
is the unwanted spam that is also using the services of the relay, that
is, it isn't the relay that is really the issue, it is the spam, if all
the spam went away, so-one would care about relays any more (other than now
to regret that whereas previously most sites would be happy to relay mail
now far fewer are).

Further, it isn't at all clear that preventing relaying will do much,
if anything, to stop spam - certainly blocking receiving mail from relays
will currently cut the amount of spam you receive a lot - but that's
because comparatively few people do that, and so the spammers are content
to ignore them and just continue making use of the relay services that
they can latch onto.   But should everyone stop relaying, does anyone really
believe that all the spammers are simply going to decide that there is
no point continuing, and all just go away?   Really?   Even if it means
that the spammers have to send all their mail directly, they'll do it
as long as the benefit from sending spam (at least appears to) outweigh
the costs.

So, the two issues are really not much alike - in one there's no good
purpose to be served by not blocking outgoing packets with bogus source
addresses, in the other there are lots of philosphical reasons for
not stopping relaying - hence there are some of us quite willing to do one
but not the other.

Spam is a social problem, and needs to be solved by social/legal means,
not technical ones (there is no technical difference between spam and
any other mailing list mail - it all looks the same - the only difference
is whether the recipient wanted to receive it or not.)  But we're
technocraats, all our tools are technical ones, so it is easy to see
how we grasp at any technical solution we think might help - the only
technical solution we've been able to find that seems like it might help
(a passing illusion really).  Unfortunately, the appearance of a technical
solution reduces the pressure on the social/legal types to come up with
a solution that really works - if we all would just admit that technically
there's nothing that can really be done ablut spam, and simply stopped
trying at all (allow it all through) the user pressure to get this
problem solved some other way would be much much greater...   On the other
hand, sending packets with an incorrect source address is a technical
problem - those packets don't meet the IP specs - what is supposed to be
in that field is the IP address of the sending node.   This is a problem
entirely open to a technical solution.

kre



Re: IETF Adelaide and interim meetings for APPS WGs

2000-02-14 Thread Vernon Schryver

 From: Keith Moore [EMAIL PROTECTED]

 ...
 RFC 2418 states:

Interim meetings are subject to the
same rules for advance notification, reporting, open participation,
and process, which apply to other working group meetings.

 ...
 - This applies to all face to face meetings held for the purpose 
   of conducting working group discussion and to which the working 
   group is invited, even if labelled "informal" or otherwise 
   labelled to distinguish them from official working group meetings.

I'm not a lawyer, but that sounds like it might conflict with the U.S.
Constitution's provisions concerning freedom of assembly.  It also sounds
hard to police; if some working group participants encounter each other
in an airport waiting room, are they not allowed to talk business?  What
about participants who work for the same outfit and see each other daily?

Are you going to apply the same rules to meetings of the IAB and IESG?

You could doubtless fix those modest hassles with the wording of this
demand that RFC 2418 be honored, but what is the point?  Unless you going
to slide the IETF the rest of the way into the ITU/IEEE/ANSI swamp, won't
the mailing lists continue to be the only official forums for the working
groups?  Won't the working group meetings continue to be effectively
informal, slightly more than social gatherings? 

In other words and politically correct pretense asside, the IETF is not
an international organization.  Despite its posturing, the IETF is a U.S.
or perhaps North American organization that welcomes non-U.S. participants
and occasionally spends a lot of its U.S. participants' time and money to
try to make people outside of North America feel welcome.  If the IETF
did honestly aspire to be an international organization, it would need
the characteristics of the ITU (e.g. translators and high prices for
documents).  Do you think that would be a good thing?


(I've never attended an IETF working group meeting, despite working group
participation for a lot of years.  I've never felt the lack as far as
technical things go.  I can't find words in RFC 2418 that say that the
mailing list is the authoritative forum, which strikes me as a terrible
omission or catastrophic de facto change.)


Vernon Schryver[EMAIL PROTECTED]



Re: IETF Adelaide and interim meetings for APPS WGs

2000-02-14 Thread Fred Baker

At 05:45 PM 2/14/00 -0700, Vernon Schryver wrote:
Unless you going
to slide the IETF the rest of the way into the ITU/IEEE/ANSI swamp, won't
the mailing lists continue to be the only official forums for the working
groups?  Won't the working group meetings continue to be effectively
informal, slightly more than social gatherings? 

I realize that you have not been (ahem) a regular attendee at IETF
meetings, but in my experience this has never been the case. Yes, we do
most of our work on mailing lists, and we check meeting consensus on
mailing lists before declaring it sealed in blood. But Face to Face
meetings have always been places where high bandwidth discussions take
place to clarify and progress work which is also being done on the mailing
list. They are official meetings.

So, by the way, are interim meetings, under RFC 2418. We could discuss
major initiatives which have made effective use of them  the entire SNMP
development, the development of RSVP and Diff-serv, the development of
OSPF, and many more. PPP development has happened as much at the
interoperability workshops held by Pac Bell and the PPP Consortium as they
have at IETF meetings.

Declaring an interim meeting to make progress is a Good Thing, and we don't
see a problem with that. But we need to make sure that the process is open
to all who choose to participate, and to that end the authors of RFC 2418
specified that there needed to be AD approval, sufficient notice, a strong
agenda, and minutes just as there are at the plenary meetings. Declaring an
interim meeting for the purpose of avoiding a plenary meeting is a slap in
the face to the many engineers who come from all over to the interim and
plenary meetings that we have had for lo these 14 years. They have paid
quite a bit of money and time to be intimately involved in the process. It
would be much easier, from a planning perspective, to have the meetings in
one or two spots, as the ITU does in Geneva, but we have always worked on
an ethic that says "if I am contributing to the work, the meeting must
occasionally be near me."

One sixth or more of our contributors come from Europe. A relatively small
contingent comes from the South Pacific. Quite a large percentage come from
North America. Hence, we put about one meeting in six in Europe and most of
our meetings in North America. Is it not fair to put one meeting in 47 in
the South Pacific? And why is it not an affront to those who have
faithfully come from there, have contributed and chaired working groups
from there, to complain about doing once what they have been doing for over
a decade?



Re: Internet SYN Flooding, spoofing attacks

2000-02-14 Thread Daniel Senie

Phil Karn wrote:
 
 tomorrow demands. And, agreed,  bogus source IPs _does_ at present time
 look like nothing but the devils work. But in, say, 10 years a new flashy
 techology could be requiring that you have the ability to stamp packets with
 other IPs than your own. Unfortunately, back in year 2000, somebody put in
 
 There already are some perfectly legitimate reasons to send packets
 with "alien" IP source addresses. Mobile IP is the best example, but
 various virtual private networking schemes also do this. For example,
 I have a VPN set up over my cable modem so I can have a block of
 static IP addresses for my home network. I had to do some work to
 evade the $#@!! source IP address ingress filtering in my cable
 network. I do it by tunneling the upstream packets through a machine
 at work.

Yes, and you chose the CORRECT solution. Think about it... VPN in most
cases also means encryption, and at that probably back to a central
site.

Gabriel wrote RFC 2344 for reverse tunnels, and it does essentially what
you did.

 
 Being forced to tunnel not only increases the size of each packet, but
 also entails suboptimum routing and reliance on yet more network
 elements.  I use the new Linux policy routing mechanisms to tunnel
 only those packets that have to be tunneled, which helps. But it would
 sure be nice if I didn't have to tunnel my outbound packets at all.

Sorry. You're at the point where technology meets policy. Fact is, your
host identifier in the IP stack is the source IP address. Enforcing the
validity of that identifier has become necessary.

 
 Source address ingress filtering is one of those ideas that seems like
 a good one when you first think about it, but it just doesn't pan out.
 It interferes with some perfectly legitimate activities, it doesn't
 really stop the bad guys, and it deflects attention away from the real
 solutions.

The case for "legitimate use" of source spoofing has not been
sufficiently made. Operational reality is such that it's not
sustainable.



-- 
-
Daniel Senie[EMAIL PROTECTED]
Amaranth Networks Inc.http://www.amaranthnetworks.com



Re: Who is interested in wireless cards for the Adelaide IETF meeting?

2000-02-14 Thread Dorian Kim

On Tue, Feb 15, 2000 at 12:57:57PM +1030, Mark Prior wrote:
 The package being offered is a WaveLAN IEEE Turbo 11Mbps PC card for
 AU$276.36 (approx US$175). Drivers are available from Lucent for (at
 least) Windows 95, 98, NT, CE, 2000, MacOS and Linux.
 
 Could people that are interested please send expressions of interest
 to [EMAIL PROTECTED] so I can let Lucent know how many cards are
 needed.

I'd be interested in borrowing a pair of wavelan cards.

-dorian



Re: IETF Adelaide and interim meetings for APPS WGs

2000-02-14 Thread Vernon Schryver

 From: "Steven M. Bellovin" [EMAIL PROTECTED]

 ...
  I'm not a lawyer, but that sounds like it might conflict with the U.S.
  Constitution's provisions concerning freedom of assembly.

 (a) The U.S. constitution applies to the Federal government (and sometimes to 
 the state governments); it does not apply to private groups.

How arms-length is the connection between the IETF and the Federal
government?  No more NFS money, but what about the ITU entanglements?
Could Civil Service employees find it hard to get travel requests approved
for attending meetings of an outfit that gets carried away in its rules
and regulations on who can talk to whom?

 (b) No one ever said that these folks can't meet; they just can't do it under 
 the imprimatur of the IETF. 

I read the dictum as stronger than that.  Didn't it say something
about prohibiting meetings that are nominally not WG meetings for
the purpose of subverting RFC 2418?  That's why I quoted

} or otherwise 
}   labelled to distinguish them from official working group meetings.

That's the part that I don't see as enforcable or wise, although I
sympathize with the motivation.


 ...
 The point is that some things are better accomplished in a high-bandwidth 
 environment.  

Yes, that's often true, but the talk of "high-bandwidth" has always been
exaggerated.  As I've said, I've never attended an IETF meeting, but
I've read an awful lot of minutes over the last dozen years.  I haven't
read many that showed evidence effective use of that high bandwidth.
(Perhaps I'm too unimpressed by simply letting people have their say
before continuing with what was inevitable.)

   ...   If the IETF
  did honestly aspire to be an international organization, it would need
  the characteristics of the ITU (e.g. translators and high prices for
  documents). ...

 I'm afraid I don't follow the logic of your penultimate sententce.  The 
 current schedule has about 1 meeting out of 3 outside of North America.

The locations of meetings do not make the IETF international any more than
Congressional junkets do the same for Congress.  (That there is no need
to specify which congress I'm talking about is emblematic of the reality
that contradicts the politically correct posturing.)

The U.N. and the ITU are international organizations.  I've attended
as many meetings of them as of the IETF, so maybe my distinct
impression that they do things differently than the IETF is mistaken.
Let's see, how many RFC's are not in English?  How many WG meetings
or mailinglists?

That the IETF is de facto an U.S. outfit is not by itself a bad thing.
There are and for centuries have been many organizations in many places
that are not really international, but that welcome distant participants.
It is bad to refuse to call a "digging implement adapted for being pushed
into the ground with the foot" a spade.


] From [EMAIL PROTECTED] Mon Feb 14 18:54:53 2000

]...   Yes, we do
] most of our work on mailing lists, and we check meeting consensus on
] mailing lists before declaring it sealed in blood. But Face to Face
] meetings have always been places where high bandwidth discussions take
] place to clarify and progress work which is also being done on the mailing
] list. They are official meetings.

"High-bandwidth" does not need official sanction.  You can have productive
technical discussions without any official sanction, and usually better
without the burdens of officialness.  What is the difference between
"official but nothing is signed in blood" and "where things are signed in
blood"?  If nothing can be finally decided (i.e. signed in blood), what
is the substance, of "official" besides ensuring that accountants accept
expense reports?

] So, by the way, are interim meetings, under RFC 2418. We could discuss
] major initiatives which have made effective use of them  the entire SNMP
] development, the development of RSVP and Diff-serv, the development of
] OSPF, and many more. PPP development has happened as much at the
] interoperability workshops held by Pac Bell and the PPP Consortium as they
] have at IETF meetings.

Those are good examples of the distinction between engineering and official
meetings.  The PPP development I saw at Pac Bell's San Ramon facility was
a matter individuals talking semi-privately.  The semi-formal discussions
at the ends of the days announced but did not decide anything.  Note also
that at least some of those meetings did not have any IETF sanction.

I wonder if the uglier parts of the SNMP saga would not have come out far
better without one or two of the official IETF WG meetings.


]   ...  Declaring an
] interim meeting for the purpose of avoiding a plenary meeting is a slap in
] the face ...

That's certainly true, but I don't see how you're going to 

Re: Who is interested in wireless cards for the Adelaide IETF meeting?

2000-02-14 Thread Dorian Kim

On Mon, Feb 14, 2000 at 10:31:16PM -0500, Dorian Kim wrote:
 I'd be interested in borrowing a pair of wavelan cards.

*sigh*

apologies for not watching the cc: line. 

-dorian



Re: IETF Adelaide and interim meetings for APPS WGs

2000-02-14 Thread Keith McCloghrie

 Let's see, how many RFC's are not in English?  How many WG meetings
 or mailinglists?
 
 That the IETF is de facto an U.S. outfit is not by itself a bad thing.

You seem to be making the assumption that the English language is the
property of the USA.  Perhaps, you have forgotten that the English
language was spoken in a quite a lot of the world before the USA existed.

Keith.



Re: Internet SYN Flooding, spoofing attacks

2000-02-14 Thread Anders Feder

Robert Elz [EMAIL PROTECTED] wrote:
I'm not sure there is a good analogy there.There's no good purpose
in sending packets with incorrect source addresses I can think of, and
stopping the practice is the basic intent of the filters.

"In his early days at Intel, Andy Grove was approached by an employee who
suggested the company start work on a personal computer based on its chips.
Skeptical, he asked what a personal computer might do. The employee,
searching for a good example, said it could be used to store recipes. Grove
thought about the millions he'd have to spend on research, development, and
marketing, then considered the imperfect but steady quality of an
alphabetized loose-leaf binder. He finally passed on the idea and decided to
concentrate on the lucrative business of supplying chips for traffic
lights."

It is rarely very easy to see what requirements the future will bring and
particularly in this business you can't be sure what the technology of
tomorrow demands. And, agreed,  bogus source IPs _does_ at present time
look like nothing but the devils work. But in, say, 10 years a new flashy
techology could be requiring that you have the ability to stamp packets with
other IPs than your own. Unfortunately, back in year 2000, somebody put in
IP filters at all ISPs and now, 10 years after, these filters is so
integrated a part
of the ISP software that reprogramming would cost a fortune.
Also consider the size of the group of Internet users that send out packets
with incorrect source IPs. Using IP filters would be like illegalizing
coffee because a fraction of the people on the earth is allergic to
caffeine.

- Anders Feder







Re: Internet SYN Flooding, spoofing attacks

2000-02-14 Thread Charles E. Perkins

Robert Elz wrote:

 There's no good purpose
 in sending packets with incorrect source addresses I can think of, and
 stopping the practice is the basic intent of the filters.

Mobile IP would like to send out packets with the mobile node's
home address, while it is attached to a network in a foreign
domain.  The home address is likely to look "incorrect" from
the standpoint of such a filter.

Plus I don't think the gain is worth the pain.  I'd rather see
a technology that actually solves the problem instead of swatting
at gnats with a sledge hammer.

What if routers could preferentially keep track of things like SYN
packets and so on for a few seconds, and we had some traceback management
software and security associations with our neighbors enough to do
some automatic detection?

It might cost 2% more for the memory buffers, geez I don't know.

Regards,
Charlie P.



Re: Internet SYN Flooding, spoofing attacks

2000-02-14 Thread Phil Karn

tomorrow demands. And, agreed,  bogus source IPs _does_ at present time
look like nothing but the devils work. But in, say, 10 years a new flashy
techology could be requiring that you have the ability to stamp packets with
other IPs than your own. Unfortunately, back in year 2000, somebody put in

There already are some perfectly legitimate reasons to send packets
with "alien" IP source addresses. Mobile IP is the best example, but
various virtual private networking schemes also do this. For example,
I have a VPN set up over my cable modem so I can have a block of
static IP addresses for my home network. I had to do some work to
evade the $#@!! source IP address ingress filtering in my cable
network. I do it by tunneling the upstream packets through a machine
at work.

Being forced to tunnel not only increases the size of each packet, but
also entails suboptimum routing and reliance on yet more network
elements.  I use the new Linux policy routing mechanisms to tunnel
only those packets that have to be tunneled, which helps. But it would
sure be nice if I didn't have to tunnel my outbound packets at all.

Source address ingress filtering is one of those ideas that seems like
a good one when you first think about it, but it just doesn't pan out.
It interferes with some perfectly legitimate activities, it doesn't
really stop the bad guys, and it deflects attention away from the real
solutions.

In the case of MS-DOS (Multiple Source-Denial of Service) attacks like
the ones we saw last week, we need to deploy better inter-router
mechanisms to deal with congestion by moving the packet drop points as
far upstream as possible toward the senders. And if these mechanisms
can work for deliberate flooding attacks, they'll also deal with
non-deliberate congestion.

Phil



Re: Internet SYN Flooding, spoofing attacks

2000-02-14 Thread Paul Ferguson

At 03:41 PM 02/14/2000 -0800, Charles E. Perkins wrote:

Mobile IP would like to send out packets with the mobile node's
home address, while it is attached to a network in a foreign
domain.  The home address is likely to look "incorrect" from
the standpoint of such a filter.

If I'm not mistaken (although my coauthor has tracked the mobile
ip cruft more than have I), there is some notion of a tunneling
mechanism from the first-hop mobile ip gateway, such that the
bogon source is really never seen in that fashion (as a bogon).

Again, I admit complete ignorance of mobile ip cruft.

Plus I don't think the gain is worth the pain.  I'd rather see
a technology that actually solves the problem instead of swatting
at gnats with a sledge hammer.

Well, right now, you get swatted. Figure out a better way, and
you'll stop getting swatted.

- paul



Re: IETF Adelaide and interim meetings for APPS WGs

2000-02-14 Thread Steven M. Bellovin

In message [EMAIL PROTECTED], Vernon Schryver writes
:

 I'm not a lawyer, but that sounds like it might conflict with the U.S.
 Constitution's provisions concerning freedom of assembly.

(a) The U.S. constitution applies to the Federal government (and sometimes to 
the state governments); it does not apply to private groups.
(b) No one ever said that these folks can't meet; they just can't do it under 
the imprimatur of the IETF. 

  It also sounds
 hard to police; if some working group participants encounter each other
 in an airport waiting room, are they not allowed to talk business?  What
 about participants who work for the same outfit and see each other daily?
 
 Are you going to apply the same rules to meetings of the IAB and IESG?

??  I'll let the IESG speak for itself.  The IAB does not meet physically 
except at IETF meetings.  Instead, we have monthly conference calls.  We do 
hold workshops (which is expressly provided for in RFC 1601); the last such 
workshop was in Utrecht.  Not all IAB members attend all workshops; a number of 
outsiders are invited.
 
 You could doubtless fix those modest hassles with the wording of this
 demand that RFC 2418 be honored, but what is the point?  Unless you going
 to slide the IETF the rest of the way into the ITU/IEEE/ANSI swamp, won't
 the mailing lists continue to be the only official forums for the working
 groups?  Won't the working group meetings continue to be effectively
 informal, slightly more than social gatherings? 

The point is that some things are better accomplished in a high-bandwidth 
environment.  
 
 In other words and politically correct pretense asside, the IETF is not
 an international organization.  Despite its posturing, the IETF is a U.S.
 or perhaps North American organization that welcomes non-U.S. participants
 and occasionally spends a lot of its U.S. participants' time and money to
 try to make people outside of North America feel welcome.  If the IETF
 did honestly aspire to be an international organization, it would need
 the characteristics of the ITU (e.g. translators and high prices for
 documents).  Do you think that would be a good thing?
 

I'm afraid I don't follow the logic of your penultimate sententce.  The 
current schedule has about 1 meeting out of 3 outside of North America.

--Steve Bellovin




Who is interested in wireless cards for the Adelaide IETF meeting?

2000-02-14 Thread Mark Prior

Lucent will be making available 802.11 DS wireless technology for the
forthcoming meeting in Adelaide. They have offered a similar deal to
Nortel at the last meeting where IETFers can loan a card for the
duration of the meeting and/or buy a card. They would like to get some
idea of how many people attending the meeting would like to take up
this offer so they can ensure they have sufficent stocks to meet the
demand.

The package being offered is a WaveLAN IEEE Turbo 11Mbps PC card for
AU$276.36 (approx US$175). Drivers are available from Lucent for (at
least) Windows 95, 98, NT, CE, 2000, MacOS and Linux.

Could people that are interested please send expressions of interest
to [EMAIL PROTECTED] so I can let Lucent know how many cards are
needed.

Thanks,
Mark.



Re: Internet SYN Flooding, spoofing attacks

2000-02-14 Thread Daniel Senie

"Charles E. Perkins" wrote:
 
 Robert Elz wrote:
 
  There's no good purpose
  in sending packets with incorrect source addresses I can think of, and
  stopping the practice is the basic intent of the filters.
 
 Mobile IP would like to send out packets with the mobile node's
 home address, while it is attached to a network in a foreign
 domain.  The home address is likely to look "incorrect" from
 the standpoint of such a filter.

Mobile IP took advantage of a convenient occurrence of the Internet as
it was, believing all routing would occur based on destination address
only. That is no longer a valid assumption. In response to this changing
world, the Mobile IP folks went back to the drawing board and created
RFC 2344. I suggest folks go implement it. Tunnels are the topologially
correct answer when you're trying to do something like Mobile IP.

Mobile IP also took advantage of directed broadcast in the original
designs, though it is less clear whether anyone actually implemented
using it. See the discussion on this topic in RFC 2644 for more details
on that.

 
 Plus I don't think the gain is worth the pain.  I'd rather see
 a technology that actually solves the problem instead of swatting
 at gnats with a sledge hammer.

Routing based on source and destination address in combination is
already a possible approach for traffic shaping and firewalling
purposes.

 
 What if routers could preferentially keep track of things like SYN
 packets and so on for a few seconds, and we had some traceback management
 software and security associations with our neighbors enough to do
 some automatic detection?

So, you'd prefer to have the routers on the Internet be stateful
devices? Somehow, I thought we really didn't want to go there. There are
known issues with some equipment which does fast switching based on
setting up "flows." A design that several folks have come up with relies
on a general purpose processor to program "flow" information into a
silicon-assisted fabric. Such implementations suffer greatly at the
hands of a DoS attack, where flows are coming in at extremely high rate.
State isn't necessarily the answer.

 
 It might cost 2% more for the memory buffers, geez I don't know.

The memory cost isn't the issue. You're going to pay more for a lot of
ASICs to be doing that operation at wire speed. The work to do what you
suggest adds considerably more complexity than doing filtering at wire
speeds in ASICs (a capability which is available on products shipping
today).

-- 
-
Daniel Senie[EMAIL PROTECTED]
Amaranth Networks Inc.http://www.amaranthnetworks.com



RE: Internet SYN Flooding, spoofing attacks

2000-02-14 Thread Eliot Lear

Steve,

Let's be clear: a DOS attack is something the end point itself can do
very little to prevent, since it usually fails or succeeds upstream of
that end point.  Therefore, the end point relies on its upstream ISPs to
"do the right thing" and indeed, each of those ISPs relies on other ISPs
to similarly filter.  Each point can mitigate the damage to the point
where in sum these attacks become ineffective.  Each RPF check can
remove bad packets.  Each violated ACL can remove and LOG the bad
packets.  These are the best controls available today.  Shall we not use
them?

Also, we raise the bar from some kid injecting packets to someone
breaking into an ISP, a more difficult challenge (at least a level 3
attack on my Dungeons and Dragons guide of Hackers ;-).


- Original Message -
From: Stephen Kent [EMAIL PROTECTED]
Newsgroups: cisco.external.ietf
Sent: Saturday, February 12, 2000 1:55 PM
Subject: Re: Internet SYN Flooding, spoofing attacks


 Paul,

 
 When one suggests that a first tier ISP would not need to filter
 traffic from down stream providers, because IF they do the
filtering,
 then the problem will not arise via those links, one is suggesting
 precisely this sort of model.
 
 You're approaching this from the wrong perspective, in my opinion.
 
 There is no assumption implied that RFC2267 filtering is needed --
 it is required. What good is it if one or two or 300 people do
 it, and another 157,000 do not?
 
 Well, there is a little good, but the more people that do it, the
 better off we all are.
 
 The bottom line here is that RFC2267-style filtering (or unicast
 RPF checks, or what have you) stops spoofed source address packets
 from being transmitted into the Internet from places they have no
 business being originated from to begin with.
 
 In even the worst case, those conscientious network admins that
 _do_ do it can say without remorse that they are doing their part,
 and can at least be assured that DoS attacks using spoofed source
 addresses are not being originated from their customer base.
 
 And this is a Bad Thing?

 it is a bad thing if one bases defenses on the assumption that ALL
 the access points into the Internet will perform such filtering, and
 will do it consistently.  Even if all ISPs, and down stream providers
 performed the filtering, there is no guarantee that attackers could
 not circumvent the filter controls, either through direct attack on
 the routers, or through indirect attack on the management stations
 used to configure them.  I'm just saying that while edge filtering is
 potentially useful, it would not be a good idea to assume that it
 will be effective.

 
 Edge filtering would often be helpful, but it is not a panacea, as
 pointed out by others in regard to the current set of attacks, nor
is
 the performance impact trivial with most current routers.
 
 It is negligible at the edge in most cases, but you really need to
 define "edge" a little better. In some cases, it is very low speed
 links, in others it is an OC-12.

 In talking with the operations folks at GTE-I, they expressed concern
 over the performance hit for many of their edge routers, based on the
 number of subscribers involved and other configuration
 characteristics.

 
 Because
 most routers are optimized for transit traffic forwarding, the
 ability to filter on the interface cards is limited, as I'm sure you
 know.
 
 No, I don't know that at all. _Backbone_routers_ are optimized for
 packet forwarding -- I do know that.

 I would state that devices that examine IP headers and make routing
 decisions entirely on interface cards are optimized for traffic
 forwarding, vs. firewall-style devices that focus on header
 examination and ACL checking, and which typically do this by passing
 a packet through a general purpose processor, vs. in I/O interfaces.
 But, these are just generalizations.

 
   Also, several of the distributed DoS attacks we are seeing do
 not use fake source addresses from other sites, so simple filtering
 of the sort proposed in 2267 would not be effective in these cases.
 
 Again, you're missing the point.
 
 If attackers are limited to launching DoS attacks using traceable
 addresses, then not only can their zombies be traced  found, but
 so can their controller (the perpetrator himself). Of this, make no
 mistake.

 Not necessarily. The traffic from a controller to the clients may be
 sufficiently offset in time as to make tracing back to the controller
 hard.  I agree that tracing to the traffic sources (or at least to
 the sites where the traffic sources are) would be easier if edge
 filtering were in place, and if it were not compromised.

 
 Finally, I am aware of new routers for which this sort of filtering
 would be child's play, but they are not yet deployed.  One ought not
 suggest that edge filtering is not being applied simply because of
 laziness on the part of ISPs.
 
 Steve, you said that -- I didn't. I think ISP's will do what their
 customers 

RE: Proposal: reclassify RFC2549, 1149 as historical

2000-02-14 Thread mark.paton

I would tend to agree with Lloyd

Regards

Mark Paton CEO/DIR. Internet Network Eng
Mercury Network Systems Limited
+44 585 649051
http://www.mnsl.org

"Mercury Network Systems - The Unstoppable Force"

This e-mail is intended only for the addressee
named above. As this e-mail may contain
confidential or privileged information if you are
not, or suspect that you are not, the named
addressee or the person responsible for delivering
the message to the named addressee, please
telephone us immediately. Please note that we
cannot guarantee that this message or any
attachment is virus free or has not been
intercepted and amended. The views of the author
may not necessarily reflect those of the Company.


-Original Message-
From: Lloyd Wood [mailto:[EMAIL PROTECTED]]
Sent: 14 February 2000 21:26
To: [EMAIL PROTECTED]
Subject: Proposal: reclassify RFC2549,
1149 as historical


I move we reclassify RFC2549 and RFC1149
as historical.

Evidence to support this: 'end of an era'
according to
http://www.telegraph.co.uk/et?ac=000111464
113065pg=/et/00/2/14/wpig14.html
below.

In particular, I don't think the QoS
additions have ever been fully
field tested; the WFQ proposal leads to
observable instances of
dropped tails during measurement.

L.

don't you just hate thinking about
sending yourself valentines?

[EMAIL PROTECTED]PGPhttp://www.ee.sur
rey.ac.uk/Personal/L.Wood/


ELECTRONIC TELEGRAPH, ISSUE 1725

Monday 14 February 2000

Spread of radio switches off political pigeon post
By Jon Stock in New Delhi

MORE than 600 Indian police carrier
pigeons face early retirement
after officials decided to replace them
with radios.

The decision to ground the birds before
Wednesday's state assembly
elections in Orissa, eastern India, marks
the end of an era. They
previously played a unique role in
India's electoral process.

They last saw active duty during last
year's general election, when
they carried messages to and from
far-flung polling booths in the
remote Orissa districts of Koraput and
Dhenkanal. The messages
detailed the law and order situation
during polling. The pigeons are
kept in 28 lofts throughout the state and
will now become showpieces
used solely for ceremonial purposes,
according to Baikunthanath Das,
Superintendent of Police (Signals), who
looks after them.

Their demise has been caused by what he
called the advent of new
technology. He said: "Even the most
remote interior areas now have VHF
radios."

The service was the only one of its kind
in India. It was started in
1946 during British rule by the state
police's Signal Establishment,
which bought more than 1,000 pigeons from
the Indian Army after the
Second World War.



BEGIN:VCARD
VERSION:2.1
N:Paton;Mark.;J.S;;
FN:Mark. J.S Paton
ORG:Mnsl;Consultancy
TITLE:Network Design / Support
TEL;WORK;VOICE:+44 0585 649051
TEL;CELL;VOICE:+44 (0585) 649051
ADR;WORK;ENCODING=QUOTED-PRINTABLE:;Basingstoke;Willow Cottage=0D=0AReading Road;Mattingley;Hampshire;RG27 8JU;=
United Kingdom
LABEL;WORK;ENCODING=QUOTED-PRINTABLE:Basingstoke=0D=0AWillow Cottage=0D=0AReading Road=0D=0AMattingley, Hampshire=
 RG27 8JU=0D=0AUnited Kingdom
URL:
URL:http://www.mnsl.org
EMAIL;PREF;INTERNET:[EMAIL PROTECTED]
REV:19990422T133901Z
END:VCARD