RE: dark fiber and sfp distance limitations

2010-01-04 Thread Martin, Paul
If you only want 1gig, then if the SP provides it, won't it be cheaper to simply get a 1gig circuit from them that hands off to you on a GigE port rather than pay for all the various higher spec equipment that you'd otherwise require? Paul. -Original Message- From: Kevin Hodle

Re: Does anyone have the Cyber Storm II Exercise Report?

2010-01-04 Thread Jared Mauch
On Jan 3, 2010, at 4:11 PM, Eric Brunner-Williams wrote: I'm sure someone must, but google as I have I only find fact sheets (marcom collateral) and reports to Congress. Thanks in advance! Eric These are restricted to those that have signed a Trusted Agent Agreement for participation in

Re: InterNAP FCP (again?)

2010-01-04 Thread Tom Sands
I feel your pain, as I'm a little frustrated by the stance that Internap is taking on the FCP. We've used them for many years, back when there were numerous competitors to choose from. However, now that they are pretty much the only major player they seem to care less about the results and

Re: Consumer-grade dual-homed connectivity options?

2010-01-04 Thread Vincent C Jones
Most of the SOHO router vendors (Netgear, Linksys, etc) have a model targeted at this application. When this class of dual homed router first came out several years ago, they were notoriously unreliable, but I would hope they work better by now. A search on the term ping based routing should give

Re: More ASN collissions

2010-01-04 Thread Leo Bicknell
In a message written on Thu, Dec 10, 2009 at 01:35:16PM -0500, Jared Mauch wrote: As always, good research by renesys. http://www.renesys.com/blog/2009/12/bonjour-yall-asn-split-persona.shtml http://blog.isc.org/2010/01/asn-collisions-and-human-error.html -- Leo Bicknell -

RE: Experiences with Comcast Ethernet/Transit service

2010-01-04 Thread Antonio Querubin
On Mon, 4 Jan 2010, Holmes,David A wrote: I do not know of Comcast's Ethernet services specifically, but a general problem with carrier Ethernet services that are based upon the Metro Ethernet Forum (MEF) is that PIM-snooping is not implemented for multicast traffic. The absence of

geolocation comparison

2010-01-04 Thread Bradley Huffaker
CAIDA plans to conduct a comparison of geolcocation tools for determining the location of Internet Protocal (IP) address (and other identifiers) in the summer of 2010. At this time we wish to receive feedback from interested parties on input to the comparison survey, whether they wish to

D/DoS mitigation hardware/software needed.

2010-01-04 Thread Rick Ernst
Looking for D/DoS mitigation solutions. I've seen Arbor Networks mentioned several times but they haven't been responsive to literature requests (hint, if anybody from Arbor is looking...). Our current upstream is 3x GigE from 3 different providers, each landing on their own BGP endpoint feeding

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Jeffrey Lyon
We have substantial direct experience with both RioRey and IntruGuard. RR is more plug and play while IG is more robust but both are great. Use a robust firewall such as a Netscreen in front of your mitigation tool. Best regards, Jeff On Mon, Jan 4, 2010 at 4:19 PM, Rick Ernst

RE: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Raj Singh
Rick, If you pass me your contact info I can forward it to our Arbor Sales guy who can get in touch with you. I been pretty impressed by Arbor so far. Thanks, Raj Singh    -Original Message- From: Rick Ernst [mailto:na...@shreddedmail.com] Sent: Monday, January 04, 2010 1:20 PM To:

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Rick Ernst
Several responses already, and Arbor has poked their head up. I'm going to start there and keep the other suggestions at-hand. Thanks, On Mon, Jan 4, 2010 at 1:19 PM, Rick Ernst na...@shreddedmail.com wrote: Looking for D/DoS mitigation solutions. I've seen Arbor Networks mentioned

ITU G.992.5 Annex M - ADSL2+M Questions

2010-01-04 Thread Luke Marrott
I've been looking up information on the Annex M Standard today and am unable to find any ISPs in the US offering this. Can anyone tell me if there are providers in the US using the Annex M standards and increased upstream with it, or if not is there a good reason why its not being done yet?

RE: Experiences with Comcast Ethernet/Transit service

2010-01-04 Thread Holmes,David A
PIM-snooping is not in the MEF specs, but should be if multicast is to work properly over a carrier's Ethernet service. Regardless of the specs, RFPs and other user requirements for Ethernet services should include a must have clause requiring PIM-snooping functionality. -Original

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Jeffrey Lyon
Ask them if they'd come down to $10 - 20k for a full featured model and they might make two sales, although I doubt it unfortunately. Best regards, Jeff On Mon, Jan 4, 2010 at 4:59 PM, Rick Ernst na...@shreddedmail.com wrote: Several responses already, and Arbor has poked their head up. I'm

Re: Experiences with Comcast Ethernet/Transit service

2010-01-04 Thread Jared Mauch
The Deathstar opt-e-man service says they will knee-cap you at 1Mb/s of multicast. - Jared On Jan 4, 2010, at 4:56 PM, Holmes,David A wrote: PIM-snooping is not in the MEF specs, but should be if multicast is to work properly over a carrier's Ethernet service. Regardless of the specs, RFPs

RE: ITU G.992.5 Annex M - ADSL2+M Questions

2010-01-04 Thread John Souvestre
Hi Luke. We offer it, along with bonded ADSL. We don't do it often but it is very useful sometimes. Regards, John John Souvestre - New Orleans LA -Original Message- From: Luke Marrott [mailto:luke.marr...@gmail.com] Sent: Monday, January 04, 2010 4:03 PM To:

[NANOG-announce] REMINDER: CFP for NANOG 48

2010-01-04 Thread Tom Daly
Hello Fellow NANOG'ers, As you all should know by now, NANOG 48 is coming up in February. The NANOG Program Committee has been busily recruiting, collecting, and reviewing submissions for the program, however, we still need more content. We have lined up many interesting Tracks and Panels, but

Re: DNS question, null MX records

2010-01-04 Thread Bill Stewart
On Tue, Dec 15, 2009 at 7:46 AM, Eric J Esslinger eesslin...@fpu-tn.com wrote: So in any case, due to customer privacy concerns we feel we can't do that. If you don't want to handle email for the long-obsolete customer accounts, but just don't want to send that mail to anybody else, it's pretty

RE: ITU G.992.5 Annex M - ADSL2+M Questions

2010-01-04 Thread Frank Bulk - iName.com
We offer it, but practically speaking we haven't gotten much higher than 1.5 Mbps on the upstream. Frank -Original Message- From: Luke Marrott [mailto:luke.marr...@gmail.com] Sent: Monday, January 04, 2010 4:03 PM To: nanog@nanog.org Subject: ITU G.992.5 Annex M - ADSL2+M Questions

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Dobbins, Roland
On Jan 5, 2010, at 4:25 AM, Jeffrey Lyon wrote: Use a robust firewall such as a Netscreen in front of your mitigation tool. Absolutely not - the firewall will fall over due to state-table exhaustion before the mitigation system will. Firewalls (which have no place in front of servers in

RE: dark fiber and sfp distance limitations

2010-01-04 Thread Frank Bulk - iName.com
and to add, OTDR at several wavelengths, just in case you want to do xWDM in the future. Frank -Original Message- From: ML [mailto:m...@kenweb.org] Sent: Friday, January 01, 2010 6:24 PM To: Mike Cc: nanog@nanog.org Subject: Re: dark fiber and sfp distance limitations On 1/1/2010

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Tim Eberhard
Kinda funny you state that Roland. I know of at least two very large carriers that uses Netscreens (and soon SRX's) for their DoS/DDoS mitigation. State table exhaustion on the netscreen platform is something that is very easy to protect against with some protections and hasn't been a problem for

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread jim deleskie
What Roland said, I've seen people do this, no rules in place, still was able to kill the box (firewall) with a single CPU server. -jim On Mon, Jan 4, 2010 at 10:04 PM, Dobbins, Roland rdobb...@arbor.net wrote: On Jan 5, 2010, at 4:25 AM, Jeffrey Lyon wrote: Use a robust firewall such as a

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread kowsik
If you want to recreate D/DoS from captures (for testing purposes) you might want to check out: http://www.pcapr.net/dos This lets you validate how your mitigation solutions are holding up. K. On Mon, Jan 4, 2010 at 1:19 PM, Rick Ernst na...@shreddedmail.com wrote: Looking for D/DoS

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Dobbins, Roland
On Jan 5, 2010, at 9:17 AM, Tim Eberhard wrote: I would argue that firewalls place is in fact directly infront of servers and load balancers to protect them. The very idea of placing a stateful firewall in front of a Web/DNS/email/etc. server, in which *every single incoming packet is

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Adrian Chadd
On Tue, Jan 05, 2010, Dobbins, Roland wrote: None of the large, well-known Web properties on the Internet today - at least, the ones which stay up and running, heh - have stateful firewalls in front of them. Including prominent vendors of said stateful firewall solutions. But as you

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Jeffrey Lyon
We have such a configuration in progress, it works great without any of the issues you're proposing. Jeff On Jan 4, 2010 9:09 PM, Dobbins, Roland rdobb...@arbor.net wrote: On Jan 5, 2010, at 4:25 AM, Jeffrey Lyon wrote: Use a robust firewall such as a Netscreen in fro... Absolutely not - the

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Suresh Ramasubramanian
On Tue, Jan 5, 2010 at 8:36 AM, Jeffrey Lyon jeffrey.l...@blacklotus.net wrote: We have such a configuration in progress, it works great without any of the issues you're proposing. So .. this is interesting. The firewall would have to frontend your mail / web / whatever application .. and if

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Dobbins, Roland
On Jan 5, 2010, at 10:14 AM, Dobbins, Roland wrote: If it's a stateful firewall, and state-tracking is turned on, it's quite possible to craft sufficient pathological traffic which conforms to the firewall policies and yet which leads to state-table inspection. That should read

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Dobbins, Roland
On Jan 5, 2010, at 10:06 AM, Jeffrey Lyon wrote: We have such a configuration in progress, it works great without any of the issues you're proposing. Then you aren't testing it to destruction, heh. ; If it's a stateful firewall, and state-tracking is turned on, it's quite possible to

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Suresh Ramasubramanian
Two more options. And for Netflow device - read that to mean Arbor or its competitors. 5 Ditch the stateful firewall and exclusively use a netflow device 6. Outsource to a hosted DDoS mitigation service (Prolexic etc) On Tue, Jan 5, 2010 at 8:43 AM, Suresh Ramasubramanian ops.li...@gmail.com

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Dobbins, Roland
On Jan 5, 2010, at 10:18 AM, Suresh Ramasubramanian wrote: 5 Ditch the stateful firewall and exclusively use a netflow device NetFlow analysis is very useful for network visibility, and detection/classification/traceback. There are both open-source and commercial NetFlow collection and

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Christopher Morrow
On Mon, Jan 4, 2010 at 9:18 PM, jim deleskie deles...@gmail.com wrote: What Roland said, I've seen people do this, no rules in place, still was able to kill the box (firewall) with a single CPU server. not to pile on, but... +1 to roland here as well. I've seen more than enough folks put in a

Bonded SDSL (was RE: ITU G.992.5 Annex M - ADSL2+M Questions)

2010-01-04 Thread Michael Sokolov
Frank Bulk - iName.com frnk...@iname.com wrote: We offer it, but practically speaking we haven't gotten much higher than 1.5 Mbps on the upstream. Sorry that I'm coming into this thread late (I have just subscribed), but since I see people discussing DSL with beefy upstream, I thought I would

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Jeffrey Lyon
1. We have multiple nodes conducting DDoS scrubbing, one failing would not be catastrophic. 2. Indeed. 3. Sort of, such devices are downstream for extremely valid reasons I won't get into now. 4. Indeed, were equipped to handle substantially higher than 150kpps. I'm sure Arbor is really neat

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Bill Blackford
A lot of this has to do with scaling the environment. I've had plenty of asa's and even netscreens fall over from state-table and session limitations. I've also seen a hosts fill up the connection table prior to a firewall being affected. I'm not familiar with the specs and anyone can chime in,

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Suresh Ramasubramanian
With these safeguards in place - and with flow devices being part of the mix somewhere .. what you propose is quite reasonable. There's still the question of whether an application that receives a lot of new / untrusted traffic - a mail or web server - would benefit from having a stateful

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Dobbins, Roland
On Jan 5, 2010, at 11:05 AM, Jeffrey Lyon wrote: I'm sure Arbor is really neat but I disagree that any DDoS appliance is a standalone solution. I disagree with this proposition, too. S/RTBH and/or flow-spec are great DDoS mitigation tools which don't require any further investment beyond

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Christopher Morrow
On Mon, Jan 4, 2010 at 11:20 PM, Dobbins, Roland rdobb...@arbor.net wrote: On Jan 5, 2010, at 11:05 AM, Jeffrey Lyon wrote: I'm sure Arbor is really neat but I disagree that any DDoS appliance is a standalone solution. I disagree with this proposition, too. S/RTBH and/or flow-spec are

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Dobbins, Roland
On Jan 5, 2010, at 11:41 AM, Christopher Morrow wrote: (note I think Roland may have been party to some of the presenations I linked in this... Yes, sir, and thanks for posting those links! You and Barry and Tim Battles and Sean Donelan and Danny McPherson and Don Smith and Steve Bellovin

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Suresh Ramasubramanian
On Tue, Jan 5, 2010 at 10:35 AM, Rick Ernst na...@shreddedmail.com wrote: I'm interested in seeing products (including software) that already have the development (anomaly detection, trends/reports, etc.)  work done so I can spend my cycles elsewhere. This might fit the bill -

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Dobbins, Roland
On Jan 5, 2010, at 12:05 PM, Rick Ernst wrote: A solution preferably that integrates with NetFlow and RTBH. An in-line solution obviously requires an appliance, or at least special/additional hardware. The key is to not be inline all the time, but only inline *when needed*. This

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Rick Ernst
On Mon, Jan 4, 2010 at 9:08 PM, Dobbins, Roland rdobb...@arbor.net wrote: On Jan 5, 2010, at 12:05 PM, Rick Ernst wrote: A solution preferably that integrates with NetFlow and RTBH. An in-line solution obviously requires an appliance, or at least special/additional hardware. The key

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Suresh Ramasubramanian
On Tue, Jan 5, 2010 at 10:38 AM, Dobbins, Roland rdobb...@arbor.net wrote: Additional mitigation would be  via manual or automatic RTBH or security/abuse@ involvement with upstreams. Automagic is generally bad, as it can be gamed. ... and manual wont scale in ddos -- Suresh

RE: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Stefan Fouant
-Original Message- From: Christopher Morrow [mailto:morrowc.li...@gmail.com] Sent: Monday, January 04, 2010 11:41 PM The original poster seemed to be asking about appliance based solutions, so your pointed remarks about Roland aside he was actually answering the question. I wonder

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Dobbins, Roland
On Jan 5, 2010, at 12:19 PM, Suresh Ramasubramanian wrote: ... and manual wont scale in ddos Actually, it can and does. ; I'm referring to the employment and selection of situationally-appropriate tools, mind. The tools themselves must of necessity perform their work in a largely

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Dobbins, Roland
On Jan 5, 2010, at 12:19 PM, Rick Ernst wrote: I'd argue just the opposite. If your monitoring/mitigation system changes dependent on the situation (normal vs under attack), you are adding complexity to the system. What mode is the system in right now? Is this customer having

RE: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Stefan Fouant
-Original Message- From: Rick Ernst [mailto:na...@shreddedmail.com] Sent: Tuesday, January 05, 2010 12:19 AM I'd argue just the opposite. If your monitoring/mitigation system changes dependent on the situation (normal vs under attack), you are adding complexity to the system.

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Suresh Ramasubramanian
On Tue, Jan 5, 2010 at 10:52 AM, Dobbins, Roland rdobb...@arbor.net wrote: I'm referring to the employment and selection of situationally-appropriate tools, mind.  The tools themselves must of necessity perform their work in a largely automated fashion once they're employed, which is what I

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Adrian Chadd
On Tue, Jan 05, 2010, Stefan Fouant wrote: Almost all of the scalable DDoS mitigation architectures deployed in carriers or other large enterprises employ the use of an offramp method. These devices perform a lot better when you can forward just the subset of the traffic through as opposed to

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Rick Ernst
I think you, Roland, and I are all agreeing on the same argument. The (my) confusion entered with the statement of, The key is to not be inline all the time, but only inline *when needed*. I inferred a topological or physical path change from that. Redirecting traffic (which is really just an

RE: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Stefan Fouant
-Original Message- From: Suresh Ramasubramanian [mailto:ops.li...@gmail.com] Sent: Tuesday, January 05, 2010 12:19 AM On Tue, Jan 5, 2010 at 10:38 AM, Dobbins, Roland rdobb...@arbor.net wrote: Additional mitigation would be via manual or automatic RTBH or security/abuse@

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Dobbins, Roland
On Jan 5, 2010, at 12:39 PM, Adrian Chadd wrote: I mean, I assume that there's checks and balances in place to limit then number of routes being injected into the network so one doesn't overload the tables, but what's the behaviour if/when this limit is reached? Does mitigation cease being

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Dobbins, Roland
On Jan 5, 2010, at 12:39 PM, Stefan Fouant wrote: The trick is to try to automate as much around the process as possible - I've worked in environments where just making little changes to incident handling response methods reduced the time to mitigate an attack from hours to minutes, all

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Dobbins, Roland
On Jan 5, 2010, at 12:39 PM, Rick Ernst wrote: I think you, Roland, and I are all agreeing on the same argument. GMTA. ; --- Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com Injustice is relatively easy

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Dobbins, Roland
On Jan 5, 2010, at 11:57 AM, Dobbins, Roland wrote: You and Barry and Tim Battles and Sean Donelan and Danny McPherson and Don Smith and Steve Bellovin and Jared Mauch and John Kristoff and a lot of other folks too numerous to mention . . . including Paul Vixie, Darrel Lewis, Ryan

RE: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Hank Nussbacher
On Tue, 5 Jan 2010, Stefan Fouant wrote: Almost all of the scalable DDoS mitigation architectures deployed in carriers or other large enterprises employ the use of an offramp method. These devices perform a lot better when you can forward just the subset of the traffic through as opposed to

RE: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Stefan Fouant
-Original Message- From: Hank Nussbacher [mailto:h...@efes.iucc.ac.il] Sent: Tuesday, January 05, 2010 1:02 AM On Tue, 5 Jan 2010, Stefan Fouant wrote: Almost all of the scalable DDoS mitigation architectures deployed in carriers or other large enterprises employ the use of an

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Darren Bolding
I actually agree with most of this, but want to correct a clearly inadvertent error below, and make a couple of points. PCI DSS does not require a Web application firewall. It requires that OR an independent audit of all code within PCI scope by a third party. If a WAF is used, it only need be

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Dobbins, Roland
On Jan 5, 2010, at 2:38 PM, Darren Bolding wrote: * Defense in depth. You've never had a host that received external traffic ever accidentally have iptables or windows firewall turned off? Even when debugging a production outage or on accident? Again, policy should be enforced via

Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Dobbins, Roland
On Jan 5, 2010, at 2:38 PM, Darren Bolding wrote: PCI DSS does not require a Web application firewall. http://searchsoftwarequality.techtarget.com/news/article/0,289142,sid92_gci1313797,00.html Since no business is going to allow an external 'code review' (if it's even possible, given that