JunOS NTP - Re: OpenNTPProject.org

2014-02-18 Thread Jared Mauch
So, be careful as the Juniper solution varies depending on the platform involved. Make sure you check your devices. It took a few iterations for us to get the right filters on everything. - Jared On Feb 17, 2014, at 12:26 AM, Yucong Sun sunyuc...@gmail.com wrote: Just for the reference,

Re: Work Practices of Cyber Security Professionals

2014-02-18 Thread Valdis . Kletnieks
On Mon, 17 Feb 2014 15:27:25 +, Muhammad Adnan said: I am a university researcher who is investigating the development of new, usable tools that will improve the work practices of cyber security professionals. As a first step to achieve this goal, I am undertaking a survey to gain an

RE: OpenNTPProject.org

2014-02-18 Thread Mike Walter
For knowledge on the list. We found that our Cisco Nexus 7000s had NTP enabled on our public facing VDCs, even when the command feature ntp was not present. I had to explicitly enter no feature ntp to prevent the NTP server service from existing on our public facing 7K interfaces. Thanks,

Telia contact

2014-02-18 Thread Jay Coley
Hi, If there are any Telia engineers lurking about could you please contact me off-list regarding a routing question? Thanks! --J

Telia contact

2014-02-18 Thread Jay Coley
Hi, If there are any Telia engineers lurking about could you please contact me off-list regarding a routing question? Thanks! --J

Re: JunOS NTP - Re: OpenNTPProject.org

2014-02-18 Thread John Kristoff
On Tue, 18 Feb 2014 09:14:59 -0500 Jared Mauch ja...@puck.nether.net wrote: prefix-list ntp-servers { apply-path system ntp server *; Some people also have a 'boot-server [server]' statement. In the off chance that address is different than those listed in the server statements,

Re: JunOS NTP - Re: OpenNTPProject.org

2014-02-18 Thread Mark Tinka
On Tuesday, February 18, 2014 04:14:59 PM Jared Mauch wrote: So, be careful as the Juniper solution varies depending on the platform involved. Make sure you check your devices. It took a few iterations for us to get the right filters on everything. Indeed. In particular, different

Everyone should be deploying BCP 38! Wait, they are ….

2014-02-18 Thread Jay Ashworth
Here's a piece which uses the MIT ANA data to assert that the job is mostly done already. Unless I'm very much mistaken, it appears that a large percentage of the failed BCP 38 spoofing tests listed in that data are actually due to customer side NAT routers dropping packets... which is of

looking for feedback on virtual/dedicated server providers in latin/south america/UK

2014-02-18 Thread Carlos Kamtha
Hi, Just wondering if anyone could share some experiences with server providers specifically in argentina, columbia and costa rica, and pretty much anywhere in the UK region. Please respond offlist. Any feedback would be greatly appreciated. :) Carlos.

Re: Everyone should be deploying BCP 38! Wait, they are ....

2014-02-18 Thread Dave Bell
That article is terrible. Looking at the stats provided, only 2582 unique AS's were tested. http://www.cidr-report.org/as2.0/#General_Status has over 46k AS's currently in the routing table. This means they have tested around 5% of the AS's on the Internet. Dave On 18 February 2014 17:20, Jay

Re: Everyone should be deploying BCP 38! Wait, they are ....

2014-02-18 Thread Patrick W. Gilmore
Barry is a well respected security researcher. I'm surprised he posted this. In his defense, he did it over a year ago (June 11, 2012). Maybe we should ask him about it. I'll do that now -- TTFN, patrick On Feb 18, 2014, at 13:31 , Dave Bell m...@geordish.org wrote: That article is

Re: looking for feedback on virtual/dedicated server providers in latin/south america/UK

2014-02-18 Thread Sam Moats
I have to recommend Linode in the UK, from my experience they have their act together and their prices are reasonable. Sam Moats Circle Net On 2014-02-18 12:50, Carlos Kamtha wrote: Hi, Just wondering if anyone could share some experiences with server providers specifically in argentina,

Re: Everyone should be deploying BCP 38! Wait, they are ….

2014-02-18 Thread Larry Sheldon
On 2/18/2014 11:20 AM, Jay Ashworth wrote: Here's a piece which uses the MIT ANA data to assert that the job is mostly done already. Unless I'm very much mistaken, it appears that a large percentage of the failed BCP 38 spoofing tests listed in that data are actually due to customer side NAT

Re: Everyone should be deploying BCP 38! Wait, they are ....

2014-02-18 Thread James Milko
Is using data from a self-selected group even meaningful when extrapolated? It's been a while since Stats in college, and it's very likely the guys from MIT know more than I do, but one of the big things they pushed was random sampling. JM On Tue, Feb 18, 2014 at 2:11 PM, Larry Sheldon

Re: Everyone should be deploying BCP 38! Wait, they are ....

2014-02-18 Thread Jared Mauch
On Feb 18, 2014, at 1:40 PM, Patrick W. Gilmore patr...@ianai.net wrote: Barry is a well respected security researcher. I'm surprised he posted this. In his defense, he did it over a year ago (June 11, 2012). Maybe we should ask him about it. I'll do that now I'm not surprised in any

Changing the way we talk about BCP38 [Was: Re: Everyone should be deploying BCP 38! Wait, they are ....]

2014-02-18 Thread Paul Ferguson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Below: On 2/18/2014 11:22 AM, Jared Mauch wrote: On Feb 18, 2014, at 1:40 PM, Patrick W. Gilmore patr...@ianai.net wrote: Barry is a well respected security researcher. I'm surprised he posted this. In his defense, he did it over a year

HP to Cisco fiber

2014-02-18 Thread Eric J Esslinger
I've talked to HP and Cisco and neither side will commit to any kind of answer to this question, so I thought I'd ask it here: Does anyone know if a Cisco switch equipped with a 1000BASE-BX10-D SFP will connect to an HP switch equipped with a HP X122 1G SFP LC BX-U Transceiver J9143B SFP,

Re: Everyone should be deploying BCP 38! Wait, they are ....

2014-02-18 Thread Jay Ashworth
- Original Message - From: Dave Bell m...@geordish.org That article is terrible. Looking at the stats provided, only 2582 unique AS's were tested. http://www.cidr-report.org/as2.0/#General_Status has over 46k AS's currently in the routing table. This means they have tested

BCP38 filtering on Mobile IP networks

2014-02-18 Thread Jay Ashworth
I note that the MIT ANA tester is only for desktop OSs, and none of the network tools I've collected for Android have BCP38 filter testing built in. Does anyone know if there are such tools for Android and for iOS? I assume that tether testing from a PC would be useless, as the NAT

Re: HP to Cisco fiber

2014-02-18 Thread Jared Mauch
On Feb 18, 2014, at 2:44 PM, Eric J Esslinger eesslin...@fpu-tn.com wrote: I've talked to HP and Cisco and neither side will commit to any kind of answer to this question, so I thought I'd ask it here: Does anyone know if a Cisco switch equipped with a 1000BASE-BX10-D SFP will connect to

Re: Everyone should be deploying BCP 38! Wait, they are ....

2014-02-18 Thread Robert Drake
On 2/18/2014 2:19 PM, James Milko wrote: Is using data from a self-selected group even meaningful when extrapolated? It's been a while since Stats in college, and it's very likely the guys from MIT know more than I do, but one of the big things they pushed was random sampling. JM Isn't it

Re: Everyone should be deploying BCP 38! Wait, they are ....

2014-02-18 Thread Tony Tauber
I agree that Barry's post can be read in misleading ways and I seem to recall chatting about that with him at some point. As to one poster's comment about random sampling, I'm pretty sure the Spoofer project likely fell short in a number of ways (e.g. being documented in not every language). So,

Re: Everyone should be deploying BCP 38! Wait, they are ....

2014-02-18 Thread Jay Ashworth
Spybot, adaware, and MalWare bytes. I hadn't even thought of them; I was all fixated on Ookla... and why it wouldn't work. I will query those folks. Cheers, - jra On February 18, 2014 3:56:19 PM EST, Robert Drake rdr...@direcpath.com wrote: On 2/18/2014 2:19 PM, James Milko wrote: Is using

Re: Changing the way we talk about BCP38 [Was: Re: Everyone should be deploying BCP 38! Wait, they are ....]

2014-02-18 Thread Dobbins, Roland
On Feb 19, 2014, at 2:43 AM, Paul Ferguson fergdawgs...@mykolab.com wrote: This is why I am now using the phrase anti-spoofing when talking about this in public. +1 It's also more semantically correct, in many cases. ---

Fibre/Layer2 In San Jose

2014-02-18 Thread Geraint Jones
Hi I am wondering if anyone knows anyone with Fibre or L2 service between Equinix SV1 (11 Great Oaks) and CoreSite (55 S Market). It seems we need it sooner rather than later. Thanks. -- Geraint Jones Director of Systems Infrastructure Koding https://koding.com gera...@koding.com Phone

Re: Everyone should be deploying BCP 38! Wait, they are ....

2014-02-18 Thread Dobbins, Roland
On Feb 19, 2014, at 4:52 AM, Tony Tauber ttau...@1-4-5.net wrote: maybe we should conclude that most of the spoofing is coming from somewhere else; perhaps including colo and cloud providers. My theory - not yet backed by data - is that probably most spoofed traffic these days does in fact

spamassassin

2014-02-18 Thread Randy Bush
in the last 3-4 days, a *massive* amount of spam is making it past spamassassin to my users and to me. see appended for example. not all has dkim. clue? randy From: SmallCapStockPlays i...@smallcapstockplays.com Subject: Could VIIC be our biggest play in 2014? Check the stock today To:

Re: Work Practices of Cyber Security Professionals

2014-02-18 Thread Muhammad Adnan
Dear Valdis, 1) If you're including network admins, you should also make sure to get system admins (though you'll be more successful asking elsewhere for those). We are also targeting system admins. As I mentioned in my e-mail, targeted participants for this survey are those who perform security

Re: spamassassin

2014-02-18 Thread Private Sender
Randy Bush wrote: in the last 3-4 days, a *massive* amount of spam is making it past spamassassin to my users and to me. see appended for example. not all has dkim. clue? randy From: SmallCapStockPlays i...@smallcapstockplays.com Subject: Could VIIC be our biggest play in 2014? Check the

Re: spamassassin

2014-02-18 Thread Randy Bush
They are smart and dkim sign their messages; even though it's invalid I believe that's why it has such a low bayes score. lots of the spam getting through has no dkim It's getting marked as ham and not spam. Are you positive your definitions are still updating? sa-update has run. and it

Re: spamassassin

2014-02-18 Thread Michael Thomas
On 02/18/2014 05:52 PM, Randy Bush wrote: in the last 3-4 days, a *massive* amount of spam is making it past spamassassin to my users and to me. see appended for example. not all has dkim. It's been a while since i've been in this world, but I wonder whether bayes filters are using the

random dns queries with random sources

2014-02-18 Thread Joe Maimon
Hey all, DNS amplification spoofed source attacks, I get that. I even thought I was getting mitigation down to acceptable levels. But now this. At different times during the previous days and on different resolvers, routers with proxy turned on, etc... Thousand of queries with thousands of

Re: spamassassin

2014-02-18 Thread Suresh Ramasubramanian
DKIM serves to authenticate the source of the message. So this is a stock tip spam sent through an email service provider called icontact, and the dkim signature declares that. Just that and nothing more. Says nothing at all about the email's reputation - whether it is spam or not. --srs On

Re: spamassassin

2014-02-18 Thread Larry Sheldon
On 2/18/2014 8:42 PM, Randy Bush wrote: They are smart and dkim sign their messages; even though it's invalid I believe that's why it has such a low bayes score. lots of the spam getting through has no dkim It's getting marked as ham and not spam. Are you positive your definitions are still

Re: random dns queries with random sources

2014-02-18 Thread Mark Andrews
In message 5304201a.3040...@ttec.com, Joe Maimon writes: Hey all, DNS amplification spoofed source attacks, I get that. I even thought I was getting mitigation down to acceptable levels. But now this. At different times during the previous days and on different resolvers, routers with

Re: random dns queries with random sources

2014-02-18 Thread ML
I couldn't resolve that domain or subdomains that I tried. If that domain did respond, I'd guess it's tailored to be a large junky response. Varying the qname prevents people from using iptables to block specific queries. On 2/18/2014 10:08 PM, Joe Maimon wrote: Hey all, DNS

Re: random dns queries with random sources

2014-02-18 Thread Joe Maimon
Mark Andrews wrote: What is the purpose of this? Indirect attack on the 5kkx.com servers? 18-Feb-2014 21:45:24.982 queries: info: client 38.89.3.12#19391: query: swe.5kkx.com IN A + (66.199.132.5) I have seen dozens of different second level parts. How is this any more effective then

Re: random dns queries with random sources

2014-02-18 Thread Doug Barton
On 02/18/2014 07:08 PM, Joe Maimon wrote: Thousand of queries with thousands of source ip addresses. Pardon if I missed a memo, but how are your resolver systems receiving these thousands of very different source addresses? Doug

Re: random dns queries with random sources

2014-02-18 Thread Warren Bailey
Totally was trying to figure out how to ask the same thing. How exactly are you the POC in this situation? lol On 2/18/14, 7:35 PM, Doug Barton do...@dougbarton.us wrote: On 02/18/2014 07:08 PM, Joe Maimon wrote: Thousand of queries with thousands of source ip addresses. Pardon if I missed a

Re: random dns queries with random sources

2014-02-18 Thread Dobbins, Roland
On Feb 19, 2014, at 10:08 AM, Joe Maimon jmai...@ttec.com wrote: What is the purpose of this? Resource-exhaustion attack against the recursive DNS? --- Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com

Re: random dns queries with random sources

2014-02-18 Thread Dobbins, Roland
On Feb 19, 2014, at 10:32 AM, Joe Maimon jmai...@ttec.com wrote: How is this any more effective then sending it direct? If they're attacking the authoritative DNS servers for 5kkx.com, just reflecting gives them indirection and presumably makes traceback harder for 5kkx.com (at least, in the

Re: random dns queries with random sources

2014-02-18 Thread Christopher Morrow
On Tue, Feb 18, 2014 at 10:44 PM, Dobbins, Roland rdobb...@arbor.net wrote: On Feb 19, 2014, at 10:08 AM, Joe Maimon jmai...@ttec.com wrote: What is the purpose of this? Resource-exhaustion attack against the recursive DNS? so... i could be nuts, but in the example joe clipped, the resolved

Re: random dns queries with random sources

2014-02-18 Thread Dobbins, Roland
On Feb 19, 2014, at 10:44 AM, Dobbins, Roland rdobb...@arbor.net wrote: Resource-exhaustion attack against the recursive DNS? Fat-finger, sorry - should also state 'Or against the authoritative servers for 5kkx.com?' ---

Re: random dns queries with random sources

2014-02-18 Thread Christopher Morrow
On Tue, Feb 18, 2014 at 10:47 PM, Christopher Morrow morrowc.li...@gmail.com wrote: On Tue, Feb 18, 2014 at 10:44 PM, Dobbins, Roland rdobb...@arbor.net wrote: On Feb 19, 2014, at 10:08 AM, Joe Maimon jmai...@ttec.com wrote: What is the purpose of this? Resource-exhaustion attack against

Re: random dns queries with random sources

2014-02-18 Thread George Herbert
Right. Nonzero chances that you (Joe's site) are the target... Also, check if you have egress filtering of spoofed addresses below these DNS resources, between them and any user objects. You could be sourcing the spoofing if not... On Tue, Feb 18, 2014 at 7:44 PM, Dobbins, Roland

Re: random dns queries with random sources

2014-02-18 Thread Joe Maimon
Doug Barton wrote: On 02/18/2014 07:08 PM, Joe Maimon wrote: Thousand of queries with thousands of source ip addresses. Pardon if I missed a memo, but how are your resolver systems receiving these thousands of very different source addresses? Doug Thousands of queries _from_ thousands

Re: random dns queries with random sources

2014-02-18 Thread Joe Maimon
Dobbins, Roland wrote: On Feb 19, 2014, at 10:08 AM, Joe Maimon jmai...@ttec.com wrote: What is the purpose of this? Resource-exhaustion attack against the recursive DNS? On anything that is going to stay open, not even close.

Re: spamassassin

2014-02-18 Thread Private Sender
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 2/18/2014 7:10 PM, Suresh Ramasubramanian wrote: DKIM serves to authenticate the source of the message. So this is a stock tip spam sent through an email service provider called icontact, and the dkim signature declares that. Just that and

Re: random dns queries with random sources

2014-02-18 Thread Dobbins, Roland
On Feb 19, 2014, at 10:48 AM, Christopher Morrow morrowc.li...@gmail.com wrote: apologies. both chl.net and chl.com ... which appear to be parts of ttec ... which is joe. Premature send - I meant to add 'Or against the authoritative servers for 5kkx.com?' We've been seeing a spate of

Re: random dns queries with random sources

2014-02-18 Thread Doug Barton
On 02/18/2014 07:59 PM, Joe Maimon wrote: Doug Barton wrote: On 02/18/2014 07:08 PM, Joe Maimon wrote: Thousand of queries with thousands of source ip addresses. Pardon if I missed a memo, but how are your resolver systems receiving these thousands of very different source addresses? Doug

Re: spamassassin

2014-02-18 Thread Suresh Ramasubramanian
I would not advise that. Plenty of things can render a dkim sig invalid. Not all of them are evidences of malice. You might be well advised to check for a DMARC record (which asserts policy using a combination of DKIM and SPF) and if there's a reject there, feel free to trash the email if

Re: random dns queries with random sources

2014-02-18 Thread Joe Maimon
Doug Barton wrote: On 02/18/2014 07:59 PM, Joe Maimon wrote: Are you running open resolvers? Yes If so, please stop doing that, No it's widely known to be a bad idea for over a decade now, At this point, doing anything on the internet is a bad idea. and you are providing the

Re: random dns queries with random sources

2014-02-18 Thread Joe Maimon
George Herbert wrote: Right. Nonzero chances that you (Joe's site) are the target... Also, check if you have egress filtering of spoofed addresses below these DNS resources, between them and any user objects. You could be sourcing the spoofing if not... It seems to me that the

Re: random dns queries with random sources

2014-02-18 Thread Dobbins, Roland
On Feb 19, 2014, at 12:44 PM, Joe Maimon jmai...@ttec.com wrote: Get back to me when the same cant be done with auth servers. There are ways to deal with it on authoritative servers, like RRL. --- Roland Dobbins

Re: random dns queries with random sources

2014-02-18 Thread Dobbins, Roland
On Feb 19, 2014, at 12:48 PM, Joe Maimon jmai...@ttec.com wrote: What I cant figure out is what is the target and how this attack method is any more effective then the others. The target appears to be the authoritative servers for the domain in question, yes? The attacker may consider it

Re: random dns queries with random sources

2014-02-18 Thread Owen DeLong
On Feb 18, 2014, at 9:48 PM, Joe Maimon jmai...@ttec.com wrote: George Herbert wrote: Right. Nonzero chances that you (Joe's site) are the target... Also, check if you have egress filtering of spoofed addresses below these DNS resources, between them and any user objects. You could

Re: random dns queries with random sources

2014-02-18 Thread Joe Maimon
Dobbins, Roland wrote: On Feb 19, 2014, at 12:44 PM, Joe Maimon jmai...@ttec.com wrote: Get back to me when the same cant be done with auth servers. There are ways to deal with it on authoritative servers, like RRL. There are ways to deal with it on resolvers as well, like RRL and IDS

Re: random dns queries with random sources

2014-02-18 Thread Joe Maimon
Dobbins, Roland wrote: On Feb 19, 2014, at 12:48 PM, Joe Maimon jmai...@ttec.com wrote: What I cant figure out is what is the target and how this attack method is any more effective then the others. The target appears to be the authoritative servers for the domain in question, yes? I

Re: random dns queries with random sources

2014-02-18 Thread Dobbins, Roland
On Feb 19, 2014, at 1:07 PM, Joe Maimon jmai...@ttec.com wrote: There are ways to deal with it on resolvers as well, like RRL and IDS and iptables None of these things work well for recursive resolvers; they cause more problems than they solve.

Re: spamassassin

2014-02-18 Thread Randy Bush
as i said, much of the crap coming through, 10-20 times normal, does not have dkim. i suggest that focusing on dkim is a red herring. and yes, i know how dkim works. If that is the case, there must be someway to configure to reject if the dkim signature is invalid. 5.0-0.8 is a large valus,

Re: random dns queries with random sources

2014-02-18 Thread Joe Maimon
Owen DeLong wrote: On Feb 18, 2014, at 9:48 PM, Joe Maimon jmai...@ttec.com wrote: This assumes several facts not in evidence: 1. It is an attack. 2. It is deliberate 3. There is a target 4. It is more effective than others On what do you base those assumptions? To

Re: random dns queries with random sources

2014-02-18 Thread Joe Maimon
Dobbins, Roland wrote: On Feb 19, 2014, at 1:07 PM, Joe Maimon jmai...@ttec.com wrote: There are ways to deal with it on resolvers as well, like RRL and IDS and iptables None of these things work well for recursive resolvers; they cause more problems than they solve. Whatever I am

Re: spamassassin

2014-02-18 Thread Daniel Staal
--As of February 19, 2014 9:52:57 AM +0800, Randy Bush is alleged to have said: in the last 3-4 days, a *massive* amount of spam is making it past spamassassin to my users and to me. see appended for example. not all has dkim. clue? --As for the rest, it is mine. The spamassassin list

Re: spamassassin

2014-02-18 Thread Randy Bush
A fix should be in the rules update today or tomorrow - or you can rescore it to the same as BAYES_99 (someplace in the 3 range by default, I believe). That's what used to catch that mail: it used to mean 99-100%, and now means 99-99.9%. trying the copy 99-999 now. thanks! randy