Re: vyatta for bgp

2011-09-12 Thread Dobbins, Roland
On Sep 13, 2011, at 3:34 AM, Chuck Church wrote: Is the concern over a DDOS aimed against the router itself, or just massive flows passing through? Yes, but mainly the former. ; --- Roland Dobbins rdobb...@arbor.net //

Re: vyatta for bgp

2011-09-12 Thread Dobbins, Roland
On Sep 13, 2011, at 3:43 AM, Everton Marques wrote: Would Cisco ISR G2 3925E classify as software-based router? Yes. Do you expect it to bend itself down under a few Mbps of 64-byte packets? Especially if they're directed at the router itself, at some point, sure - though the ISR2 certainly

Re: vyatta for bgp

2011-09-12 Thread Dobbins, Roland
On Sep 13, 2011, at 4:13 AM, Brent Jones wrote: A high end ASIC can handle millions/tens of millions PPS, but directed to the control plane (which is often a general purpose CPU as well, Intel or PowerPC), probably not in most scenarios. CoPP.

Re: NAT444 or ?

2011-09-11 Thread Dobbins, Roland
On Sep 11, 2011, at 4:02 PM, Leigh Porter wrote: I'd agree that, usually, distributed is better but these are not distributed networks, there is a single point (or a few large single points) of contact. The point is that these aggregations of state are quite vulnerable, and therefore they

Re: CGN and CDN (was Re: what about the users re: NAT444 or ?)

2011-09-09 Thread Dobbins, Roland
On Sep 9, 2011, at 11:06 PM, Alexander Harrowell wrote: Further, if making your hosting network IPv6 is hard, the answer is surely to give the job to a CDN operator with v6 clue. This is a good strategy for payload-type content from unitary sources which lends itself to

Re: NAT444 or ?

2011-09-09 Thread Dobbins, Roland
On Sep 10, 2011, at 12:46 PM, Mark Tinka wrote: GPRS/3G/EDGE has made many a mobile provider especially notorious. All this problematic state should be broken up into smaller instantiations and distributed as close to the access edge (RAN, wireline, etc.) as possible in order to a) reduce the

Re: DDoS - CoD?

2011-09-06 Thread Dobbins, Roland
On Sep 6, 2011, at 2:53 PM, BH wrote: Has anyone seen similar traffic before? I I've seen DDoS traffic on UDP/80 as far back as 2002 - the miscreants often don't know a lot about TCP/IP, and if something happens to work once, they incorporate it into their attack tool defaults and keep using

Re: Do Not Complicate Routing Security with Voodoo Economics

2011-09-05 Thread Dobbins, Roland
On Sep 5, 2011, at 11:51 PM, Nick Feamster wrote: If the most valuable destinations 'Most valuable', 'least expensive', 'least congested', 'most reliable', 'most responsive', 'least contractually onerous', 'most generous ratio', 'most lucrative', et. al. - all these criteria and more come

Re: Do Not Complicate Routing Security with Voodoo Economics

2011-09-04 Thread Dobbins, Roland
On Sep 4, 2011, at 5:02 PM, Randy Bush wrote: Will the benefits of security - no more YouTube incidents, etc. - be perceived as worth having one's routing at the whim of an non-operational administrative monopoly? Given recent events in SSL CA-land, how certain are we that the putative

Re: Do Not Complicate Routing Security with Voodoo Economics

2011-09-04 Thread Dobbins, Roland
On Sep 5, 2011, at 11:04 AM, Michael Schapira wrote: One crucial way in which S*BGP differs from other features is that ASes which deploy S*BGP *must* use their ability to validate paths to inform route selection (otherwise, adding security to BGP makes no sense). Origin validation path

Re: Do Not Complicate Routing Security with Voodoo Economics

2011-09-04 Thread Dobbins, Roland
On Sep 5, 2011, at 11:55 AM, Dobbins, Roland wrote: Origin validation path validation. Rather, that should read, 'Origin/path validation origin/path enforcement'. The idea of origin validation is a simple one. The idea of path validation isn't to determine the 'correctness

Re: DNS DoS ???

2011-07-31 Thread Dobbins, Roland
On Jul 31, 2011, at 9:15 AM, Jimmy Hess mysi...@gmail.com wrote: Is there an RFC specifying precisely what are considered the proper precautions? precautions should ideally be enabled in BIND by default. Not of which I'm aware. I'm happy to contribute to any efforts you or anyone else are

Re: DNS DoS ???

2011-07-31 Thread Dobbins, Roland
On Aug 1, 2011, at 7:42 AM, Mark Andrews wrote: Named already takes proper precautions by default. Recursive service is limited to directly connected networks by default. The default was first changed in 9.4 (2007) which is about to go end-of-life once the final wrap up release is done.

Re: DNS DoS ???

2011-07-31 Thread Dobbins, Roland
On Aug 1, 2011, at 9:22 AM, Mark Andrews wrote: And even if DNS/TCP was use by default machines can still get DoS'd because IP is spoofable. They can be DDoSed with spoofed or non-spoofed packets, and there are defenses against such attacks. Apologies if I was unclear - my point was that

Re: DNS DoS ???

2011-07-30 Thread Dobbins, Roland
On Jul 31, 2011, at 3:08 AM, Jimmy Hess wrote: A good example, would be services such as OpenDNS. One can argue a) that services like OpenDNS aren't necessarily a Good Thing when run by those who don't take the proper precautions and b) that OpenDNS in particular is run by smart, responsible

Re: DNS DoS ???

2011-07-29 Thread Dobbins, Roland
On Jul 30, 2011, at 1:51 AM, Elliot Finley wrote: my DNS servers were getting slow so I blocked recursive queries for all but my own network. This should be the standard practice. By operating an open recursor, you lend your DNS server to abuse as a contributor to DNS

Re: OOB

2011-07-26 Thread Dobbins, Roland
On Jul 26, 2011, at 8:57 PM, harbor235 wrote: My question is, is it best practice to extend an inband VPN throughout for device management functions as well? Going inband defeats the purpose of the DCN. --- Roland Dobbins

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-17 Thread Dobbins, Roland
On Jul 15, 2011, at 10:24 AM, Jimmy Hess wrote: In most cases if you have a DoS attack coming from the same Layer-2 network that a router is attached to, it would mean there was already a serious security incident that occured to give the attacker that special point to attack fr This

Re: NDP DoS attack

2011-07-17 Thread Dobbins, Roland
On Jul 17, 2011, at 4:15 PM, Florian Weimer wrote: In practice, the IPv4 vs IPv6 difference is that some vendors provide DHCP snooping, private VLANs and unicast flood protection in IPv4 land, which seems to provide a scalable way to build Ethernet networks with address validation---but

Re: in defense of lisp (was: Anybody can participate in the IETF)

2011-07-13 Thread Dobbins, Roland
On Jul 13, 2011, at 11:02 PM, Ronald Bonica wrote: - enumerate the operational problems solved by LISP Separation of locator/ID is a fundamental architectural principle which transcends transport-specific (i.e., IPv4/IPv6) considerations. It allows for node/application/services agility, and

Re: in defense of lisp (was: Anybody can participate in the IETF)

2011-07-13 Thread Dobbins, Roland
On Jul 14, 2011, at 10:49 AM, Randy Bush wrote: not to quibble but i thought 6296 was stateless. AFAICT, the translators themselves are just rewriting addresses and not paying attention to 'connections', which is all to the good. But then we get to this: - 5.2. Recommendations for

Re: [pfSense Support] Strange TCP connection behavior 2.0 RC2 (+3)

2011-06-28 Thread Dobbins, Roland
On Jun 28, 2011, at 3:52 PM, Eugen Leitl wrote: For the last couple of months i have been pulling my hair out trying to solve this problem. Sounds like TCP RTT and/or packet-loss - should be easy to determine the issue with a bit of traffic capture.

Re: Consequences of BGP Peering with Private Addresses

2011-06-21 Thread Dobbins, Roland
On Jun 15, 2011, at 12:47 PM, James Grace wrote: Are there any horrific consequences to picking up this practice? http://tools.ietf.org/html/draft-kirkham-private-ip-sp-cores-04 --- Roland Dobbins rdobb...@arbor.net //

Re: Contention/Oversubscription maths

2011-05-26 Thread Dobbins, Roland
On May 27, 2011, at 9:12 AM, valdis.kletni...@vt.edu valdis.kletni...@vt.edu wrote: What do you do on Patch Tuesday? For that matter, what do you do when the latest 'cool' YouTube video go viral, or Amazon offer the next Lady GaGa album on sale for $0.99, or people with iDevices download

Re: blocking unwanted traffic from hitting gateway

2011-05-18 Thread Dobbins, Roland
On May 18, 2011, at 7:42 PM, Rogelio wrote: This solution would need to be tied into the authentication services so authenticated users hit the gateway. So the attackers can just hammer the authentication subsystem and take it down, instead? ; By going the 'authentication' route in the

Re: Top-posting

2011-04-11 Thread Dobbins, Roland
On Apr 12, 2011, at 12:42 PM, Owen DeLong wrote: I have used Evolution and IMAP with exchange servers in the past, so, I'm not convinced this is an entirely accurate statement. And in fact, I'm posting this message in plain-text via the OSX Mail.app connected via native Exchange protocols

Re: Barracuda Networks is at it again: Any Suggestions as to an Alternative?

2011-04-08 Thread Dobbins, Roland
On Apr 9, 2011, at 10:51 AM, John Palmer (NANOG Acct) wrote: My question is - does anyone have any suggestions for another e-mail appliance like the Barracuda Spam Firewall that doesn't try to charge their customers for time not used http://www.ironport.com/

Paul Baran, RIP.

2011-03-27 Thread Dobbins, Roland
http://www.networkworld.com/news/2011/032811-paul-baran-packet-switching-obit.html --- Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com The basis of optimism is sheer terror.

Re: Google security

2011-03-26 Thread Dobbins, Roland
On Mar 27, 2011, at 11:55 AM, Christopher Wolff wrote: To date the single response I've received is change your password which wasn't what I had in mind. The thing to do is to ensure that your client's machines/networks aren't compromised, and then to change the password(s) from a known

Re: The state-level attack on the SSL CA security model

2011-03-25 Thread Dobbins, Roland
On Mar 25, 2011, at 5:21 PM, Florian Weimer wrote: I can't see how a practice that is completely acceptable at the root certificate level is a danger so significant that state-secret-like treatment is called for once end-user certificates are involved. Again, I don't know enough about what

Re: The state-level attack on the SSL CA security model

2011-03-24 Thread Dobbins, Roland
On Mar 24, 2011, at 6:19 PM, Joakim Aronius wrote: Surely the value of stolen certs are higher if the public do not know that they exist. A wider swathe of interested parties would know of their existence, and their existence would be officially confirmed, which would make them more

Re: The state-level attack on the SSL CA security model

2011-03-24 Thread Dobbins, Roland
On Mar 24, 2011, at 6:41 PM, Florian Weimer wrote: Disclosure devalues information. I think this case is different, given the perception of the cert as a 'thing' to be bartered. --- Roland Dobbins rdobb...@arbor.net //

Re: The state-level attack on the SSL CA security model

2011-03-23 Thread Dobbins, Roland
On Mar 24, 2011, at 11:05 AM, Martin Millnert wrote: Announcing this high and loud even before fixes were available would not have exposed more users to threats, but less. An argument against doing this prior to fixes being available is that miscreants who didn't know about this previously

Re: Internet Edge Router replacement - IPv6 route tablesizeconsiderations

2011-03-11 Thread Dobbins, Roland
On Mar 11, 2011, at 2:33 PM, Owen DeLong wrote: There's a HUGE difference between IP unnumbered and link-local. In all honesty, at the macro level, I don't see it; if you wouldn't mind elaborating on this, I would certainly find it useful.

Re: Internet Edge Router replacement - IPv6 route tablesizeconsiderations

2011-03-11 Thread Dobbins, Roland
On Mar 12, 2011, at 11:14 AM, Jeff Wheeler wrote: Of course, I don't really mean to call Owen a liar, or foolish, or anything else. Please don't; even though I disagree with him and agree with you very strongly on this set of issues, Owen is a smart and straightforward guy, and is simply

Re: Internet Edge Router replacement - IPv6 route tablesizeconsiderations

2011-03-10 Thread Dobbins, Roland
On Mar 11, 2011, at 10:51 AM, George Bonser wrote: If you are a content provider, it doesn't make any difference if they take down the links between your routers or if they take down the link that your content farm is on. Of course, it does - you may have many content farms/instances,

Re: Internet Edge Router replacement - IPv6 routetablesizeconsiderations

2011-03-10 Thread Dobbins, Roland
On Mar 11, 2011, at 11:34 AM, George Bonser wrote: And I say taking down 10 such farms is no bigger problem than taking down 10 /64 backbone links. Yes, but the difference is in routine attacker behavior. And of course, iACLs should be protecting p2p links and loopbacks, irrespective of

Re: Internet Edge Router replacement - IPv6 route tablesizeconsiderations

2011-03-10 Thread Dobbins, Roland
On Mar 11, 2011, at 2:02 PM, Owen DeLong wrote: If you want to be truly anal about it, you can also block packets to non-existent addresses on the PtoP links. Sure, I advocate iACLs to block traffic to p2p links and loopbacks. Still, it's best not to turn routers into sinkholes in the

Re: About the different causes of multiple origin ASN(MOAS) problem

2011-03-07 Thread Dobbins, Roland
On Mar 8, 2011, at 1:32 AM, Yaoqing(Joey) Liu wrote: I'm trying to find all causes of multiple origin AS problem(MOAS) as follows, but not sure if it's complete. 1. MOAS isn't necessarily a 'problem'; it's fairly common, these days, and has been for quite some time. The actual problem

Re: TWTelecom DNS issues...

2011-03-02 Thread Dobbins, Roland
On Mar 3, 2011, at 2:42 AM, Wil Schultz wrote: Not a huge operational issue, but I'm sure there are some folks that this hit a little bit. As Chris indicates, it would be a big win if recursion were disabled on the authoritative servers, and instead handled by dedicated caching-only

Re: Mac OS X 10.7, still no DHCPv6

2011-02-28 Thread Dobbins, Roland
On Feb 28, 2011, at 7:35 PM, Tony Finch wrote: It ought to be possible to look at SMB or mDNS messages to get more information about what the host claims to be... We can't trust those, they're easily manipulated and/or situationally-irrelevant. Or not present at all, if the endpoint

Re: Mac OS X 10.7, still no DHCPv6

2011-02-28 Thread Dobbins, Roland
On Feb 28, 2011, at 8:40 PM, Jim Gettys wrote: Again, having a permanently known identifier being broadcast all the time is a potentially a serious security/safety issue. We already have this with MAC addresses, unless folks bother to periodically change them, do we not?

Re: Mac OS X 10.7, still no DHCPv6

2011-02-28 Thread Dobbins, Roland
On Feb 28, 2011, at 8:52 PM, Ray Soucy wrote: IPv6 is simple, elegant, and flexible. This is the first time I've ever seen 'IPv6' in the same sentence with 'simple', 'elegant', or 'flexible', unless preceded by 'not'. ;

Re: Mac OS X 10.7, still no DHCPv6

2011-02-28 Thread Dobbins, Roland
On Feb 28, 2011, at 9:01 PM, Joe Abley wrote: By embedding the MAC into the layer-3 address, the concern is that the information becomes accessible Internet-wide. Given the the toxicity of hotel networks alone, my guess is that it already is pretty much available Internet-wide, at least to

Re: Mac OS X 10.7, still no DHCPv6

2011-02-28 Thread Dobbins, Roland
On Feb 28, 2011, at 9:59 PM, Joe Abley wrote: There's no point worrying about v6-only operations if we can't get dual-stack working reliably. I think this is the most insightful, cogent, and pertinent comment made regarding IPv6 in just about any medium at any time. [Yes, I know that

Re: Mac OS X 10.7, still no DHCPv6

2011-02-28 Thread Dobbins, Roland
On Feb 28, 2011, at 10:27 PM, Owen DeLong wrote: Having a MAC address as a permanent identifier is a very different problem from having that MAC address go into a layer 3 protocol field. Given the plethora of identifiable information already frothing around in our data wakes, I'm unsure

Re: Mac OS X 10.7, still no DHCPv6

2011-02-28 Thread Dobbins, Roland
On Feb 28, 2011, at 10:27 PM, Nick Hilliard wrote: We haven't got there because I can't plug in my laptop into any arbitrary ipv6-only network and expect to be able to load up ipv6.google.com. - One day a master from another monastery came upon Abley as he was watching a young child

Re: Mac OS X 10.7, still no DHCPv6

2011-02-28 Thread Dobbins, Roland
On Feb 28, 2011, at 11:14 PM, Owen DeLong wrote: IPv6-only viability is the real goal. This is, in the long run, a transition from v4 to v6. Dual-stack is an interim stop-gap, not an end solution. I think most everyone agrees with this. However, getting experience with dual-stack is

Re: Mac OS X 10.7, still no DHCPv6

2011-02-28 Thread Dobbins, Roland
On Feb 28, 2011, at 11:15 PM, Nick Hilliard wrote: At that moment, Dobbins and Abley were enlightened. hahaha ; Hey, I think dual-stack is pretty ugly - just that it's less ugly than getting no operational experience with IPv6 at all on production networks until some point in the

Re: Mac OS X 10.7, still no DHCPv6

2011-02-28 Thread Dobbins, Roland
On Feb 28, 2011, at 9:16 PM, Leo Bicknell wrote: Those who designed IPv6 appear to have ignored the problem space. This is true of many, many aspects of IPv6. And those of us who didn't get involved in the process to try and address (pardon the pun, heh) those problems bear a burden of the

Re: Mac OS X 10.7, still no DHCPv6

2011-02-28 Thread Dobbins, Roland
On Mar 1, 2011, at 7:00 AM, Owen DeLong wrote: In five years we should be just about ready to start deprecating IPv4, if not already beginning to do so. That's been said about so many things, from various legacy OSes to other protocols such as SNA and SMB/CIFS. None of those things are

Re: Mac OS X 10.7, still no DHCPv6

2011-02-28 Thread Dobbins, Roland
On Mar 1, 2011, at 12:23 PM, Mark Newton wrote: That's new, and (to my mind) threatening. We've not even begun to consider the attack vectors that'll open up. I don't think it's new at all, given the amount of information available today that you already cite, down to and including

Re: Mac OS X 10.7, still no DHCPv6

2011-02-27 Thread Dobbins, Roland
On Feb 27, 2011, at 10:22 PM, Mikael Abrahamsson wrote: Which is one of the reasons why some of us want DHCPv6 support in hosts. Also for traceback when hunting down compromised/abusive hosts. --- Roland Dobbins

Re: Mac OS X 10.7, still no DHCPv6

2011-02-27 Thread Dobbins, Roland
On Feb 28, 2011, at 10:47 AM, Steven Bellovin wrote: You really need to look at switch logs for that, even with IPv4: http://www.cs.columbia.edu/~smb/talks/arp-attack.pdf And flow telemetry, and so forth, yes. With BCP deployment in terms of anti-ARP-spoofing and DCHP snooping/source

Re: Howto for BGP black holing/null routing

2011-02-22 Thread Dobbins, Roland
On Feb 23, 2011, at 5:42 AM, David Hubbard wrote: I've seen it discussed on nanog from time to time, typically suggesting using Zebra, but could not search up a link on a step by step. https://files.me.com/roland.dobbins/dweagy

Re: And so it ends...

2011-02-03 Thread Dobbins, Roland
On Feb 3, 2011, at 9:35 PM, Scott Howard wrote: 102/8 AfriNIC2011-02whois.afrinic.net ALLOCATED 103/8 APNIC 2011-02whois.apnic.net ALLOCATED 104/8 ARIN 2011-02whois.arin.netALLOCATED 179/8 LACNIC 2011-02whois.lacnic.net ALLOCATED 185/8

Re: My upstream ISP does not support IPv6

2011-02-03 Thread Dobbins, Roland
On Feb 4, 2011, at 10:04 AM, Franck Martin wrote: Where can I get more information? There's some survey data related to this topic presented in the latest Worldwide Infrastructure Security Report, available at http://www.arbornetworks.com/report.

Re: Is NAT can provide some kind of protection?

2011-01-13 Thread Dobbins, Roland
On Jan 13, 2011, at 9:59 AM, Jack Bates wrote: The proxy capabilities of the firewall are additional security measures on top of the NAT (and definitely should be deployed for their higher security value). Not in front of servers, they shouldn't - because they have a negative security

Re: Is NAT can provide some kind of protection?

2011-01-12 Thread Dobbins, Roland
On Mar 21, 2007, at 5:41 AM, Tarig Ahmed wrote: Security guy told me is not correct to assign public ip to a server, it should have private ip for security reasons. He's wrong. Is it true that NAT can provide more security? No, it makes things worse from an availability perspective.

Re: Is NAT can provide some kind of protection?

2011-01-12 Thread Dobbins, Roland
On Jan 13, 2011, at 12:02 AM, Justin Scott wrote: The PCI-DSS comes to mind for those who deal with credit card transactions. Luckily, there are ways to 'comply' with the PCI-DSS security theater regime without placing the availability and overall security of one's public-facing servers at

Re: IPv6 - real vs theoretical problems

2011-01-08 Thread Dobbins, Roland
On Jan 9, 2011, at 12:11 AM, Sam Stickland wrote: Why do you say there is zero state at the server, but the not at the client? Because every incoming connection to the server is unsolicited - therefore, there's no pre-existing state to evaluate.

Re: NIST IPv6 document

2011-01-07 Thread Dobbins, Roland
On Jan 7, 2011, at 4:14 PM, Mark Smith wrote: Doesn't this risk already exist in IPv4? There are various vendor knobs/features to ameliorate ARP-level issues in switching gear. Those same knobs aren't viable in IPv6 due to the way ND/NS work, and as you mention, the ND stuff is

Re: Problems with removing NAT from a network

2011-01-07 Thread Dobbins, Roland
On Jan 7, 2011, at 4:02 PM, Owen DeLong wrote: No, it hasn't always been a Bad Idea. Yes, it has. There're lots of issues with embedding IP addresses directly into apps and so forth which have nothing to do with NAT.

Re: NIST IPv6 document

2011-01-07 Thread Dobbins, Roland
On Jan 7, 2011, at 9:30 PM, TJ wrote: Today (IPv4) they may not, but many recommendations for tomorrow (IPv6) are to use discrete network allocations for your infrastructure (loopbacks and PtP links, specifically) and to filter traffic destined to those at your edges ... Actually, this

Re: NIST IPv6 document

2011-01-07 Thread Dobbins, Roland
On Jan 7, 2011, at 9:23 PM, Tim Chown wrote: The main operational problem we see is denial of service caused by unintentional IPv6 RAs from hosts. Which is a whole other can of IPv6 worms, heh. ; Roland Dobbins

Re: IPv6 - real vs theoretical problems

2011-01-07 Thread Dobbins, Roland
On Jan 8, 2011, at 3:29 AM, Deepak Jain wrote: There are now years of security dogma that says NAT is a good thing, Actually, this isn't the case. There's some *security theater* dogma which makes totally unsupported claims about the supposed security benefits of NAT, but that's not quite

Re: IPv6 - real vs theoretical problems

2011-01-07 Thread Dobbins, Roland
On Jan 8, 2011, at 5:44 AM, Owen DeLong wrote: You say dogma, I say mythology. Concur 100%. Stateful inspection provides security. To clarify, stateful inspection only provides security in a context where there's state to inspect - i.e., at the southernmost end of access networks,

Re: NIST IPv6 document

2011-01-07 Thread Dobbins, Roland
On Jan 8, 2011, at 4:28 AM, Mark Smith wrote: The problem is that somebody on the Internet could send 1000s of UDP packets (i.e. an offlink traffic source) towards destinations that don't exist on the target subnet. I meant to type 'ND-triggering stuff', concur 100%.

Re: IPv6 - real vs theoretical problems

2011-01-07 Thread Dobbins, Roland
On Jan 8, 2011, at 8:54 AM, William Herrin wrote: I presume you don't intend us to conclude that a bastion host firewall provides no security benefit to the equipment it protects. If it's protecting workstations, yes, it has some positive security value - but not due to NAT. If it's

Re: NIST IPv6 document

2011-01-06 Thread Dobbins, Roland
On Jan 6, 2011, at 9:29 PM, Joe Greco wrote: Sorry, but I see this as not grasping a fundamental security concept. I see it as avoiding a common security misconception. Making a host harder to find (or more specifically to address from remote) is a worthwhile goal. As I've stated

Re: NIST IPv6 document

2011-01-06 Thread Dobbins, Roland
On Jan 6, 2011, at 11:28 PM, valdis.kletni...@vt.edu wrote: Playing devil's advocate for a moment... I don't see this as devil's advocacy, since I've said a) we're already hosed (i.e., what you said) and b), we're going to get even more hosed with IPv6. ;

Re: NIST IPv6 document

2011-01-06 Thread Dobbins, Roland
On Jan 6, 2011, at 11:48 PM, Jack Bates wrote: It is not the intentional that we should fear, but the unintentional. This is the single largest issue with IPv6 and the whole ND mess in a nutshell - unintentional DoS becomes much more likely.

Re: NIST IPv6 document

2011-01-06 Thread Dobbins, Roland
On Jan 7, 2011, at 1:20 AM, Owen DeLong wrote: You are mistaken... Host scanning followed by port sweeps is a very common threat and still widely practiced in IPv4. I know it's common and widely-practiced. My point is that if the host is security properly, this doesn't matter; and that if

Re: NIST IPv6 document

2011-01-05 Thread Dobbins, Roland
On Jan 5, 2011, at 1:15 PM, Jeff Wheeler wrote: I notice that this document, in its nearly 200 pages, makes only casual mention of ARP/NDP table overflow attacks, which may be among the first real DoS challenges production IPv6 networks, and equipmentvendors, have to resolve. They also

Re: NIST IPv6 document

2011-01-05 Thread Dobbins, Roland
On Jan 5, 2011, at 4:39 PM, Dobbins, Roland wrote: They also only make small mention of DNS- and broadcast-hinted scanning, and none at all of routing-hinted scanning. I meant to include, ' . . . and the strain that this hinted scanning will place on the DNS and routing/switching

Re: NIST IPv6 document

2011-01-05 Thread Dobbins, Roland
On Jan 5, 2011, at 7:21 PM, Jeff Wheeler wrote: please explain why this is in any way better than operating the same LAN with a subnet similar in size to its existing IPv4 subnets, e.g. a /120. Using /64s is insane because a) it's unnecessarily wasteful (no lectures on how large the space

Re: NIST IPv6 document

2011-01-05 Thread Dobbins, Roland
On Jan 6, 2011, at 1:02 AM, TJ wrote: if you are permitting external hosts the ability to scan your internal network in an unrestricted fashion DCN aside, how precisely does one define 'internal network' in, say, the context of the production network of a broadband access SP, or

Re: NIST IPv6 document

2011-01-05 Thread Dobbins, Roland
On Jan 6, 2011, at 1:14 AM, Jeff Wheeler wrote: A stateful firewall on every router interface has been suggested already on this thread. It is unrealistic. It isn't just unrealistic, it's highly undesirable, since it represents an huge DoS state vector.

Re: NIST IPv6 document

2011-01-05 Thread Dobbins, Roland
On Jan 6, 2011, at 8:57 AM, Joe Greco wrote: The switch from IPv4 to IPv6 itself is such a change; it renders random trolling through IP space much less productive. And renders hinted trolling far more productive/necessary, invariably leading to increased strain on

Re: Problems with removing NAT from a network

2011-01-05 Thread Dobbins, Roland
On Jan 6, 2011, at 9:38 AM, ML wrote: At least not without some painful rebuilds of criticals systems which have these IPs deeply embedded in their configs. They shouldn't be using IP addresses in configs, they should be using DNS names. Time to bite the bullet and get this fixed prior to

Re: NIST IPv6 document

2011-01-05 Thread Dobbins, Roland
On Jan 6, 2011, at 10:08 AM, Joe Greco wrote: Packing everything densely is an obvious problem with IPv4; we learned early on that having a 48-bit (32 address, 16 port) space to scan made port-scanning easy, attractive, productive, and commonplace. I don't believe that host-/port-scanning

Re: NIST IPv6 document

2011-01-05 Thread Dobbins, Roland
On Jan 6, 2011, at 10:42 AM, George Bonser wrote: It will be a problem if people learn they can DoS routers by doing it by maxing out the neighbor table. I understand this - that's a completely separate issue from the supposed benefits of sparse addressing for endpoint host security. I

Re: NIST IPv6 document

2011-01-05 Thread Dobbins, Roland
On Jan 6, 2011, at 11:16 AM, George Bonser wrote: I thought the entire notion of actually getting to a host was orthogonal to the discussion as that wasn't the point. It wasn't about exploitation of anything on the host, the discussion was about the act of scanning a network itself being

Re: ARIN and the RPKI (was Re: AltDB?)

2011-01-05 Thread Dobbins, Roland
On Jan 6, 2011, at 11:16 AM, Randy Bush wrote: actually, the formal rpki-based origin-validation stuff is measured to take *less* cpu, a lot less, than ACLs On the platforms which really matter in terms of rPKI, ACLs are handled in hardware, so this is pretty much a wash. Concur on all

Re: NIST IPv6 document

2011-01-05 Thread Dobbins, Roland
On Jan 6, 2011, at 12:17 PM, Joe Greco wrote: If you don't understand the value of such an increase in magnitude, I can count as well as you can, I assure you. I invite you to switch all your ssh keys to 56 bit. The difference is that if someone compromises/brute-forces one of my ssh keys,

Re: NIST IPv6 document

2011-01-05 Thread Dobbins, Roland
On Jan 6, 2011, at 12:54 PM, Joe Greco wrote: Generally speaking, security professionals prefer for there to be more roadblocks rather than fewer. The soi-disant security 'professionals' who espouse layering unnecessary multiple, inefficient, illogical, and iatrogenic roadblocks in

Re: NIST IPv6 document

2011-01-05 Thread Dobbins, Roland
On Jan 6, 2011, at 1:26 PM, Joe Greco wrote: A bunch of very smart people have worked on IPv6 for a very long time, and justification for /64's was hashed out at extended length over the period of years. Very smart people can and do come up with bad ideas, and IPv6 is a textbook example of

Re: NIST IPv6 document

2011-01-05 Thread Dobbins, Roland
On Jan 6, 2011, at 2:03 PM, Matthew Petach wrote: I think what people are trying to say is that it doesn't matter whether or not your host is easily findable or not, if I can trivially take out your upstream router. That's part of it - the other part is that the host will be found,

Re: NIST IPv6 document

2011-01-05 Thread Dobbins, Roland
On Jan 6, 2011, at 2:42 PM, Joel Jaeggli wrote: icmp6 rate limiting both reciept and origination is not rocket science. But it's *considerably* more complex and has far more potential implications than ICMP rate-limiting in IPv4 (which in and of itself is more complex and has more

Re: NIST IPv6 document

2011-01-05 Thread Dobbins, Roland
On Jan 6, 2011, at 1:51 PM, Joe Greco wrote: There are numerous parallels between physical and electronic security. Let's just concede that for a moment. I can't, and here's why: 1. In the physical world, attackers run a substantial risk of being caught, and of tangible, severe

Re: The tale of a single MAC

2011-01-02 Thread Dobbins, Roland
On Jan 3, 2011, at 10:31 AM, Lynda wrote: My guess is that you'll never find it on Google, since it happened around 1993-4 or so. I remember that there were several high-profile instances of duplicate MAC addresses being burnt into NICs during the 1990s - once every 2-3 years, IIRC. And

Re: The tale of a single MAC

2011-01-01 Thread Dobbins, Roland
On Jan 2, 2011, at 10:33 AM, Graham Wooden wrote: What are the odds, that HP would dup’d them and that both would eventually end up at my shop? There may be some setting you're overlooking or a bug which needs an update to fix, or you may simply have purchased HP ProLiant *cases*, rather

Re: Over a decade of DDOS--any progress yet?

2010-12-13 Thread Dobbins, Roland
On Dec 14, 2010, at 2:04 AM, Bill Bogstad wrote: A single data point on current DDOS traffic levels. In the 2009 Arbor WWISR, the largest attack reported was 49gb/sec. We're currently wrapping up the 2010 WWISR, and the largest attack report was considerably larger.

Re: Over a decade of DDOS--any progress yet?

2010-12-13 Thread Dobbins, Roland
On Dec 14, 2010, at 2:40 AM, Jeffrey Lyon jeffrey.l...@blacklotus.net wrote: The only larger ones that i've seen were in company's marketing collateral vs. real life. Here's a link to last year's Report (previous editions may be downloaded, as well): http://www.arbornetworks.com/report The

Re: Over a decade of DDOS--any progress yet?

2010-12-10 Thread Dobbins, Roland
On Dec 11, 2010, at 5:51 AM, Joel Jaeggli wrote: Paying for DOS mitigation you rarely if ever use is quite expensive. Some operators offer 'Clean Pipes' commercial DDoS mitigation services; they have various fee models, and they charge their end-customers for it. It's positioned as a form

Re: [Operational] Internet Police

2010-12-09 Thread Dobbins, Roland
On Dec 10, 2010, at 1:19 AM, Michael Smith wrote: front lines of this cyberwar? Warfare isn't the correct metaphor. Espionage/covert action is the correct metaphor. --- Roland Dobbins rdobb...@arbor.net //

Re: [Operational] Internet Police

2010-12-09 Thread Dobbins, Roland
On Dec 10, 2010, at 10:01 AM, Robert E. Seastrom wrote: cyber-intifada was the proper trope, but so far it has failed to grow legs. The problem is that non-ironic use of the appellation 'cyber-' is generally inversely proportional to actual clue, so it should be avoided at all costs. ;

Re: Over a decade of DDOS--any progress yet?

2010-12-08 Thread Dobbins, Roland
On Dec 8, 2010, at 5:58 PM, bmann...@vacation.karoshi.com wrote: actually, botnets are an artifact. claiming that the tool is the problem might be a bit short sighted. with the evolution of Internet technologies (IoT) i suspect botnet-like structures to become much more prevelent and

Re: Over a decade of DDOS--any progress yet?

2010-12-08 Thread Dobbins, Roland
On Dec 8, 2010, at 7:28 PM, Arturo Servin wrote: One big problem (IMHO) of DDoS is that sources (the host of botnets) may be completely unaware that they are part of a DDoS. I do not mean the bot machine, I mean the ISP connecting those. The technology exists to detect and classify

Re: Over a decade of DDOS--any progress yet?

2010-12-08 Thread Dobbins, Roland
On Dec 8, 2010, at 10:04 PM, Thomas Mangin wrote: So IIMHO the best way is still a good router with some basic QOS to protect BGP on the link. iACLs and GTSM are your friends. ; --- Roland Dobbins rdobb...@arbor.net //

<    1   2   3   4   5   6   >