Re: Reverse DNS RFCs and Recommendations

2013-11-01 Thread Masataka Ohta
Mark Andrews wrote: That said it is possible to completely automate the secure assignment of PTR records. It is also possible to completely automate the secure delegation of the reverse name space. See http://tools.ietf.org/html/draft-andrews-dnsop-pd-reverse-00 It is a lot simpler and a

Re: latest Snowden docs show NSA intercepts all Google and Yahoo DC-to-DC traffic

2013-11-01 Thread Jimmy Hess
On Thu, Oct 31, 2013 at 11:26 PM, Michael Still mi...@stillhq.com wrote: [snip] Its about the CPU cost of the crypto. I was once told the number of CPUs required to do SSL on web search (which I have now forgotten) and it was a bigger number than you'd expect -- certainly hundreds. So,

RE: latest Snowden docs show NSA intercepts all Google and Yahoo DC-to-DC traffic

2013-11-01 Thread Lorell Hathcock
Until you've heard an ex-NSA guy explain to you how this is done, with a device the size of a brief-case, it can seem a little unbelievable. I had that conversation in the late '90s. -Original Message- From: Matthew Petach [mailto:mpet...@netflight.com] Sent: Thursday, October 31, 2013

large scale ipsec

2013-11-01 Thread Jan Schaumann
Hello, Who here on this list has deployed IPSec or other comparable lower layer encryption in a large scale environment, or attempted to do so? I've repeatedly heard claims that doing so is not feasible (either operationally or financially), but I have not seen any specific studies, reports,

Re: Reverse DNS RFCs and Recommendations

2013-11-01 Thread Valdis . Kletnieks
On Fri, 01 Nov 2013 16:03:56 +0900, Masataka Ohta said: It is a lot simpler and a lot more practical just to use shared secret between a CPE and a ISP's name server for TSIG generation. Hmm.. Shared secret between a CPE you don't necessarily control and your own DNS server? This *will* get

Re: large scale ipsec

2013-11-01 Thread Paul Stewart
Can you give us an idea of “large scale” in your mind? Also, site to site deployments or remote access or both? Paul On 11/1/2013, 9:38 AM, Jan Schaumann jscha...@netmeister.org wrote: Hello, Who here on this list has deployed IPSec or other comparable lower layer encryption in a large scale

Re: large scale ipsec

2013-11-01 Thread David Barak
Hi Jan, Please define quot;large scalequot;. Is that by number of endpoints, throughput, or some other metric? How big is big? David Barak

Re: large scale ipsec

2013-11-01 Thread Christopher Morrow
On Fri, Nov 1, 2013 at 10:30 AM, David Barak thegame...@yahoo.com wrote: Hi Jan, Please define large scale. Is that by number of endpoints, throughput, or some other metric? How big is big? it's fair to believe that there are 'lots' of ipsec deployments where there are ~1000 or so

Re: latest Snowden docs show NSA intercepts all Google and Yahoo DC-to-DC traffic

2013-11-01 Thread Anthony Junk
Hey expanoit, There was a small part that jumped out at me when I read the article earlier: In recent years, both of them are said to have bought or leased thousands of miles of fiber-optic cables for their own exclusive use. They had reason to think, insiders said, that their private, internal

Re: latest Snowden docs show NSA intercepts all Google and Yahoo DC-to-DC traffic

2013-11-01 Thread Randy Bush
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=truearnumber=1494884 They must be hiding their content, for fear that flaws be pointed out. it's the ieee. what they're hiding is a last century business model. randy

Re: latest Snowden docs show NSA intercepts all Google and Yahoo DC-to-DC traffic

2013-11-01 Thread Randy Bush
For encryption of traffic between datacenters;There should be very little session setup and teardown (very few public key operations); almost all the crypto load would be symmetric cryptography. trivial at 9600 baud between google datacenters

Re: Reverse DNS RFCs and Recommendations

2013-11-01 Thread William Herrin
On Fri, Nov 1, 2013 at 3:03 AM, Masataka Ohta mo...@necom830.hpcl.titech.ac.jp wrote: Mark Andrews wrote: That said it is possible to completely automate the secure assignment of PTR records. It is also possible to completely automate the secure delegation of the reverse name space. See

Re: large scale ipsec

2013-11-01 Thread Jan Schaumann
Christopher Morrow morrowc.li...@gmail.com wrote: One might look at MS's documentation about deploying end-to-end ipsec in their enterprise for one example of peer-to-peer ubiquitous ipsec. This is interesting and kind of what I'm looking for. Do you have a pointer to this documentation? My

Re: latest Snowden docs show NSA intercepts all Google and Yahoo DC-to-DC traffic

2013-11-01 Thread Gary Buhrmaster
On Fri, Nov 1, 2013 at 4:43 AM, Anthony Junk anthonyrj...@gmail.com wrote: ... It seems as if both Yahoo and Google assumed that since they were private circuits that they didn't have to encrypt. I actually cannot see them assuming that. Google and Yahoo engineers are smart, and taping fibres

Re: latest Snowden docs show NSA intercepts all Google and Yahoo DC-to-DC traffic

2013-11-01 Thread David Miller
On 11/01/2013 01:08 PM, Gary Buhrmaster wrote: On Fri, Nov 1, 2013 at 4:43 AM, Anthony Junk anthonyrj...@gmail.com wrote: ... It seems as if both Yahoo and Google assumed that since they were private circuits that they didn't have to encrypt. I actually cannot see them assuming that.

Weekly Routing Table Report

2013-11-01 Thread Routing Analysis Role Account
This is an automated weekly mailing describing the state of the Internet Routing Table as seen from APNIC's router in Japan. The posting is sent to APOPS, NANOG, AfNOG, AusNOG, SANOG, PacNOG, LacNOG, TRNOG, CaribNOG and the RIPE Routing Working Group. Daily listings are sent to

Re: latest Snowden docs show NSA intercepts all Google and Yahoo DC-to-DC traffic

2013-11-01 Thread Jorge Amodio
I still have some one time pads if you are good writing fast ... -J On Fri, Nov 1, 2013 at 11:26 AM, Randy Bush ra...@psg.com wrote: For encryption of traffic between datacenters;There should be very little session setup and teardown (very few public key operations); almost all the

Re: large scale ipsec

2013-11-01 Thread Christopher Morrow
On Fri, Nov 1, 2013 at 1:06 PM, Jan Schaumann jscha...@netmeister.org wrote: Christopher Morrow morrowc.li...@gmail.com wrote: One might look at MS's documentation about deploying end-to-end ipsec in their enterprise for one example of peer-to-peer ubiquitous ipsec. This is interesting and

Re: large scale ipsec

2013-11-01 Thread Scott Weeks
--- morrowc.li...@gmail.com wrote: From: Christopher Morrow morrowc.li...@gmail.com One good reason to not do link encryption is: the problem is that whackadoodle box you put outside the router! :( most often those boxes can't do light-level monitoring, loopbacks, etc... all the stuff your NOC

Re: latest Snowden docs show NSA intercepts all Google and Yahoo DC-to-DC traffic

2013-11-01 Thread berry
On 11/01/2013 01:08 PM, Gary Buhrmaster wrote: [...] Given what we now know about the breadth of the NSA operations, and the likelihood that this is still only the tip of the iceberg - would anyone still point to NSA guidance on avoiding monitoring with any sort of confidence? There has

Re: latest Snowden docs show NSA intercepts all Google and Yahoo DC-to-DC traffic

2013-11-01 Thread Mark Foster
On Sat, November 2, 2013 6:44 am, David Miller wrote: On 11/01/2013 01:08 PM, Gary Buhrmaster wrote: On Fri, Nov 1, 2013 at 4:43 AM, Anthony Junk anthonyrj...@gmail.com wrote: ... It seems as if both Yahoo and Google assumed that since they were private circuits that they didn't have to

Re: latest Snowden docs show NSA intercepts all Google and Yahoo DC-to-DC traffic

2013-11-01 Thread Phil Bedard
On 11/1/13, 1:08 PM, Gary Buhrmaster gary.buhrmas...@gmail.com wrote: On Fri, Nov 1, 2013 at 4:43 AM, Anthony Junk anthonyrj...@gmail.com wrote: ... It seems as if both Yahoo and Google assumed that since they were private circuits that they didn't have to encrypt. I actually cannot see them

Integra Telecom BGP contact

2013-11-01 Thread Joseph Jackson
Anyone from Integra Telecom who knows their BGP routing on list? I have an open ticket but can't get past the noc techs and the issue is a weird one. Thanks!

Re: Integra Telecom BGP contact

2013-11-01 Thread Ken McIntyre
Sent you an email off list. Ken- On Nov 1, 2013, at 12:21 PM, Joseph Jackson recou...@gmail.com wrote: Anyone from Integra Telecom who knows their BGP routing on list? I have an open ticket but can't get past the noc techs and the issue is a weird one. Thanks!

Re: Reverse DNS RFCs and Recommendations

2013-11-01 Thread Mark Andrews
In message 5273525c.5060...@necom830.hpcl.titech.ac.jp, Masataka Ohta writes: Mark Andrews wrote: That said it is possible to completely automate the secure assignment of PTR records. It is also possible to completely automate the secure delegation of the reverse name space. See

The Cidr Report

2013-11-01 Thread cidr-report
This report has been generated at Fri Nov 1 21:13:38 2013 AEST. The report analyses the BGP Routing Table of AS2.0 router and generates a report on aggregation potential within the table. Check http://www.cidr-report.org for a current version of this report. Recent Table History Date

BGP Update Report

2013-11-01 Thread cidr-report
BGP Update Report Interval: 24-Oct-13 -to- 31-Oct-13 (7 days) Observation Point: BGP Peering with AS131072 TOP 20 Unstable Origin AS Rank ASNUpds % Upds/PfxAS-Name 1 - AS30693 118832 4.7% 242.0 -- EONIX-CORPORATION-AS-WWW-EONIX-NET - Eonix Corporation 2 -

Re: Reverse DNS RFCs and Recommendations

2013-11-01 Thread Masataka Ohta
valdis.kletni...@vt.edu wrote: It is a lot simpler and a lot more practical just to use shared secret between a CPE and a ISP's name server for TSIG generation. Hmm.. Shared secret between a CPE you don't necessarily control and your own DNS server? Of course. That is the very basic

Re: latest Snowden docs show NSA intercepts all Google and Yahoo DC-to-DC traffic

2013-11-01 Thread Niels Bakker
* mi...@stillhq.com (Michael Still) [Fri 01 Nov 2013, 05:27 CET]: Its about the CPU cost of the crypto. I was once told the number of CPUs required to do SSL on web search (which I have now forgotten) and it was a bigger number than you'd expect -- certainly hundreds. False:

Re: latest Snowden docs show NSA intercepts all Google and Yahoo DC-to-DC traffic

2013-11-01 Thread George Herbert
On Fri, Nov 1, 2013 at 3:26 PM, Niels Bakker niels=na...@bakker.net wrote: * mi...@stillhq.com (Michael Still) [Fri 01 Nov 2013, 05:27 CET]: Its about the CPU cost of the crypto. I was once told the number of CPUs required to do SSL on web search (which I have now forgotten) and it was a

Re: Reverse DNS RFCs and Recommendations

2013-11-01 Thread Masataka Ohta
Mark Andrews wrote: It is a lot simpler and a lot more practical just to use shared secret between a CPE and a ISP's name server for TSIG generation. No it isn't. It requires a human to transfer the secret to the CPE device or to register the secret with the ISP. Not necessarily. When

Re: latest Snowden docs show NSA intercepts all Google and Yahoo DC-to-DC traffic

2013-11-01 Thread Masataka Ohta
Anthony Junk wrote: It seems as if both Yahoo and Google assumed that since they were private circuits that they didn't have to encrypt. According to Snowden, there are government agents at key positions for managing security. When they declare the private circuits are secure, no one else in

Re: latest Snowden docs show NSA intercepts all Google and Yahoo DC-to-DC traffic

2013-11-01 Thread George Herbert
On Fri, Nov 1, 2013 at 4:01 PM, Masataka Ohta mo...@necom830.hpcl.titech.ac.jp wrote: Anthony Junk wrote: It seems as if both Yahoo and Google assumed that since they were private circuits that they didn't have to encrypt. According to Snowden, there are government agents at key

Re: latest Snowden docs show NSA intercepts all Google and Yahoo DC-to-DC traffic

2013-11-01 Thread Randy Bush
Anyone familiar with secure organizations there are such things? we should be more cautious with absolutes, usually :)

Re: latest Snowden docs show NSA intercepts all Google and Yahoo DC-to-DC traffic

2013-11-01 Thread George Herbert
On Fri, Nov 1, 2013 at 4:37 PM, Randy Bush ra...@psg.com wrote: Anyone familiar with secure organizations there are such things? we should be more cautious with absolutes, usually :) Nothing is absolute, but there are certainly white organizations which have no attempt to be secure, and

Re: latest Snowden docs show NSA intercepts all Google and Yahoo DC-to-DC traffic

2013-11-01 Thread Jason Biel
-- According to Snowden, there are government agents at key positions for managing security. - And zero documented proof. I'll just go ahead and put my tinfoil hat on for the remainder of this thread. On Fri, Nov 1, 2013 at 6:37 PM, Randy Bush

Re: latest Snowden docs show NSA intercepts all Google and Yahoo DC-to-DC traffic

2013-11-01 Thread Randy Bush
And zero documented proof. I'll just go ahead and put my tinfoil hat on for the remainder of this thread. http://www.antipope.org/charlie/blog-static/2013/10/spook-century.html

Re: Reverse DNS RFCs and Recommendations

2013-11-01 Thread Mark Andrews
In message 52743027.7050...@necom830.hpcl.titech.ac.jp, Masataka Ohta writes: Mark Andrews wrote: It is a lot simpler and a lot more practical just to use shared secret between a CPE and a ISP's name server for TSIG generation. No it isn't. It requires a human to transfer the

Re: Reverse DNS RFCs and Recommendations

2013-11-01 Thread Mark Andrews
In message 20131102002035.963ba96d...@rock.dv.isc.org, Mark Andrews writes: In message 52743027.7050...@necom830.hpcl.titech.ac.jp, Masataka Ohta write s: Mark Andrews wrote: It is a lot simpler and a lot more practical just to use shared secret between a CPE and a ISP's name

Re: Reverse DNS RFCs and Recommendations

2013-11-01 Thread Masataka Ohta
Mark Andrews wrote: It is a lot simpler and a lot more practical just to use shared secret between a CPE and a ISP's name server for TSIG generation. No it isn't. It requires a human to transfer the secret to the CPE device or to register the secret with the ISP. Not necessarily. When

RE: Reverse DNS RFCs and Recommendations

2013-11-01 Thread Alex Rubenstein
Not necessarily. When the CPE is configured through DHCP (or PPP?), the ISP can send the secret. Which can be seen, in many cases, by other parties Who can see the packets sent from the local ISP to the CPE directly connected to the ISP? The NSA, FBI, CIA, DHS. Or, the ISP, the ISP's

Re: latest Snowden docs show NSA intercepts all Google and Yahoo DC-to-DC traffic

2013-11-01 Thread Harry Hoffman
That's with a recommendation of using RC4. Head on over to the Wikipedia page for SSL/TLS and then decide if you want rc4 to be your preference when trying to defend against a adversary with the resources of a nation-state. Cheers, Harry Niels Bakker niels=na...@bakker.net wrote: *

Re: Reverse DNS RFCs and Recommendations

2013-11-01 Thread Masataka Ohta
(2013/11/02 10:48), Alex Rubenstein wrote: Not necessarily. When the CPE is configured through DHCP (or PPP?), the ISP can send the secret. Which can be seen, in many cases, by other parties Who can see the packets sent from the local ISP to the CPE directly connected to the ISP? The

Re: latest Snowden docs show NSA intercepts all Google and Yahoo DC-to-DC traffic

2013-11-01 Thread Mike Lyon
So even if Goog or Yahoo encrypt their data between DCs, what stops the NSA from decrypting that data? Or would it be done simply to make their lives a bit more of a PiTA to get the data they want? -Mike On Nov 1, 2013, at 19:08, Harry Hoffman hhoff...@ip-solutions.net wrote: That's with a

RE: Reverse DNS RFCs and Recommendations

2013-11-01 Thread Alex Rubenstein
we cannot assume that the connection between isp and cpe is a single entity. a typical example will be the guy who run the dslam and the guy who run the bras belong to two different companies in market which mandate open access. ... which is very, very common.

Re: latest Snowden docs show NSA intercepts all Google and Yahoo DC-to-DC traffic

2013-11-01 Thread Masataka Ohta
George Herbert wrote: Anyone familiar with secure organizations will realize this as the internal witch hunt problem. No hunting necessary to fire those agents who are hired at the request of NSA/CIA. It is also reasonable to fire those who are hired by the agents, recursively.

Re: latest Snowden docs show NSA intercepts all Google and Yahoo DC-to-DC traffic

2013-11-01 Thread Harry Hoffman
So, I'm not sure if I'm being too simple-minded in my response. Please let me know if I am. The purpose of encrypting data is so others can't read your secrets. If you use a simple substitution cipher it's pretty easy to derive the set of substitution rules used. Stronger encryption algorithms

Re: latest Snowden docs show NSA intercepts all Google and Yahoo DC-to-DC traffic

2013-11-01 Thread Mike Lyon
So the latter, PITA, reason then... -Mike On Nov 1, 2013, at 19:32, Harry Hoffman hhoff...@ip-solutions.net wrote: So, I'm not sure if I'm being too simple-minded in my response. Please let me know if I am. The purpose of encrypting data is so others can't read your secrets. If you use

Re: latest Snowden docs show NSA intercepts all Google and Yahoo DC-to-DC traffic

2013-11-01 Thread Lyndon Nerenberg
On Nov 1, 2013, at 7:18 PM, Mike Lyon mike.l...@gmail.com wrote: So even if Goog or Yahoo encrypt their data between DCs, what stops the NSA from decrypting that data? Or would it be done simply to make their lives a bit more of a PiTA to get the data they want? Markhov chain text generators

Re: latest Snowden docs show NSA intercepts all Google and Yahoo DC-to-DC traffic

2013-11-01 Thread Randy
Big Brother is always watching and Big Brother has way more resources than network-operators in this list! (good discussion all the same) a) politics is the last-resort for scoundrels b) power corrupts and absolute-power(FBI, CIA, NSA, DHS..etc,) corrupts-absolutely. I speak from

Re: latest Snowden docs show NSA intercepts all Google and Yahoo DC-to-DC traffic

2013-11-01 Thread joel jaeggli
On Nov 1, 2013, at 7:06 PM, Harry Hoffman hhoff...@ip-solutions.net wrote: That's with a recommendation of using RC4. it’s also with 1024 bit keys in the key exchange. Head on over to the Wikipedia page for SSL/TLS and then decide if you want rc4 to be your preference when trying to defend

RE: latest Snowden docs show NSA intercepts all Google and Yahoo DC-to-DC traffic

2013-11-01 Thread John Souvestre
Money. The better the encryption the more it costs to crack. With forward security you can even protect against your private key leaking. In short, you can raise the stakes and make it economically unfeasible for even the NSA. John     John Souvestre - New Orleans LA - (504) 454-0899

Re: Reverse DNS RFCs and Recommendations

2013-11-01 Thread Jimmy Hess
On Fri, Nov 1, 2013 at 9:19 PM, Alex Rubenstein a...@corp.nac.net wrote: a typical example will be the guy who run the dslam and the guy who run the bras belong to two different companies in market which mandate open access. ... which is very, very common. It's also a troublesome

Re: Reverse DNS RFCs and Recommendations

2013-11-01 Thread Mark Andrews
In message 527459c4.5000...@necom830.hpcl.titech.ac.jp, Masataka Ohta writes: Mark Andrews wrote: It is a lot simpler and a lot more practical just to use shared secret between a CPE and a ISP's name server for TSIG generation. No it isn't. It requires a human to transfer the secret

Re: latest Snowden docs show NSA intercepts all Google and Yahoo DC-to-DC traffic

2013-11-01 Thread Randy Bush
Head on over to the Wikipedia page for SSL/TLS and then decide if you want rc4 to be your preference when trying to defend against a adversary with the resources of a nation-state. i got hit with the clue bat on this one. we have kinda settled on allowing rc4 for smtp as the least preferred.