SV: APNIC dns glitch ?

2008-06-24 Thread Martin Hannigan
 
APNIC made an announcement on an operator list this morning that is probably 
relevant to your issue:
 
+++include
 
Some services provided by APNIC were unavailable this morning due to a
disruption to our international connectivity.

This occurred between 07:00 Australian Eastern Standard Time (AEST)
and approximately 11:20 AEST.

Major services affected were:

  - www.apnic.net http://www.apnic.net/ 
  - MyAPNIC
  - email
  - Whois
  - Reverse DNS (partial)

Services provided by ns3.apnic.net http://ns3.apnic.net/  and sec3.apnic.net 
http://sec3.apnic.net/  remained
resolvable.

Unfortunately, we were not able to announce this situation when it
occurred due to the loss of connectivity.

+++end
 
 
 
--
Martin Hannigan   [EMAIL PROTECTED] mailto:[EMAIL 
PROTECTED] 
Verne Global  http://www.verneglobal.com 
http://www.verneglobal.com/ 
  Keflavik, Iceland



Fra: Danny Thomas [mailto:[EMAIL PROTECTED]
Sendt: ma 23-jun-08 22:54
Til: [EMAIL PROTECTED]
Emne: APNIC dns glitch ?



I thought I'd sent this a couple of hours ago
APNIC are aware of the problem and
things have partially recovered though the arin and ripe
name-servers still SERVFAIL

the second run of our delegation-checking script this morning
started complaining about our 203.in-addr zones and it seems
there is an issue with apnic.net

the delegation shows 4 entries spread across 3 domains which
is good, albeit all are under the same registry.

Sometimes cumin.apnic.net and innie.apnic.net. are not
reachable, or give a REFUSED response, or give a response
with no A records nor any additional section.

Unfortunately both tinnie.arin.net and ns-sec.ripe.net
return SERVFAIL, as if they had not been able to perform
a zone transfer for a while (assuming AXFR is the replication
mechanism).

I don't have ipv6 connectivity, but that's not likely to help.

I don't think this will significantly impact reverse dns
lookups as I think the dns is spread across other RIR's

seems there was a different type of issue in May
http://www.bauani.org/thinkings/2008/05/issue-with-apnic-dns-nameservers.html

Danny Thomas


# dig @I.GTLD-SERVERS.net apnic.net +norec

;  DiG 9.4.2  @I.GTLD-SERVERS.net apnic.net +norec
; (1 server found)
;; global options:  printcmd
;; Got answer:
;; -HEADER- opcode: QUERY, status: NOERROR, id: 5460
;; flags: qr; QUERY: 1, ANSWER: 0, AUTHORITY: 4, ADDITIONAL: 5

;; QUESTION SECTION:
;apnic.net. IN  A

;; AUTHORITY SECTION:
apnic.net.  172800  IN  NS  cumin.apnic.net.
apnic.net.  172800  IN  NS  ns-sec.ripe.net.
apnic.net.  172800  IN  NS  tinnie.apnic.net.
apnic.net.  172800  IN  NS  tinnie.arin.net.

;; ADDITIONAL SECTION:
cumin.apnic.net.172800  IN  A   202.12.29.59
ns-sec.ripe.net.172800  IN  A   193.0.0.196
ns-sec.ripe.net.172800  IN  2001:610:240:0:53::4
tinnie.apnic.net.   172800  IN  A   202.12.29.60
tinnie.arin.net.172800  IN  A   168.143.101.18


  dig @202.12.29.59 apnic.net any +norec

;  DiG 9.4.2  @202.12.29.59 apnic.net any +norec
; (1 server found)
;; global options:  printcmd
;; Got answer:
;; -HEADER- opcode: QUERY, status: REFUSED, id: 33930
;; flags: qr; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0



# dig @202.12.29.59 apnic.net any

;  DiG 9.4.2  @202.12.29.59 apnic.net any
; (1 server found)
;; global options:  printcmd
;; Got answer:
;; -HEADER- opcode: QUERY, status: NOERROR, id: 40744
;; flags: qr aa rd; QUERY: 1, ANSWER: 8, AUTHORITY: 0, ADDITIONAL: 0
;; WARNING: recursion requested but not available

;; QUESTION SECTION:
;apnic.net. IN  ANY

;; ANSWER SECTION:
apnic.net.  3600IN  SOA cumin.apnic.net. 
dns-admin.apnic.net. 
2008062101 3600 1800 604800 3600
apnic.net.  3600IN  NS  cumin.apnic.net.
apnic.net.  3600IN  NS  ns-sec.ripe.net.
apnic.net.  3600IN  NS  tinnie.arin.net.
apnic.net.  3600IN  NS  tinnie.apnic.net.
apnic.net.  3600IN  MX  10 kombu.apnic.net.
apnic.net.  3600IN  MX  25 karashi.apnic.net.
apnic.net.  3600IN  MX  35 fennel.apnic.net.

;; Query time: 3 msec
;; SERVER: 202.12.29.59#53(202.12.29.59)
;; WHEN: Tue Jun 24 10:35:13 2008
;; MSG SIZE  rcvd: 235



  dig @193.0.0.196 apnic.net any +norec

;  DiG 9.4.2  @193.0.0.196 apnic.net any +norec
; (1 server found)
;; global options:  printcmd
;; Got answer:
;; -HEADER- opcode: QUERY, status: SERVFAIL, id: 37668
;; flags: qr; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;apnic.net. IN  ANY




# dig @168.143.101.18 apnic.net ns

;  DiG 9.4.2  

Re: Cloud service [was: RE: EC2 and GAE means end of ip address reputation industry? (Re: Intrustion attempts from Amazon EC2 IPs)]

2008-06-24 Thread Ken Simpson
Source IP blocking makes up a large portion of today's spam arrest  
approach,
so we shouldn't discount the CPU benefits of that approach too  
quickly.


I'm not sure where today's technology is in regards for caching the  
first 1
to 10kB of a sessiononce enough information is garnered to  
block, issue

TCP RSETs.  If it's good, free the contents of the cache.



What's your interest in mopping up spam in the middle of the network?  
Usually spam is viewed as a leaf-node problem (much to the chagrin of  
receivers, actually).


Regards,
Ken

--
Ken Simpson
CEO

MailChannels - Reliable Email Delivery
http://mailchannels.com
604 685 7488 tel







Re: Techniques for passive traffic capturing

2008-06-24 Thread Ross Vandegrift
On Mon, Jun 23, 2008 at 10:00:06PM -0500, Kevin Kadow wrote:
 We started out with SPAN ports, then moved on to Netoptics taps.
 
 Lately we've been using a combination of Cisco Netflow (from remote routers),
 and native Argus flows (from local taps) where we need more details.
 
 Flows are useful to answer What happened X minutes/hours/days ago?,
 and where you do not need/want to capture full packet bodies
 (though with Argus you can choose whether to include payload data).
 
 http://qosient.com/argus/

Cool - good to know that the Netoptics gear is good.  Seems like
there's a few resounding approvals of them.

Netflow would be lovely to export from our border routers.
Unfortunately, we are somewhat married to the 6500 platform which has
absolutely awful netflow support.  Very small TCAM, export is CPU
expensive, and sampling makes both problems worse.  So a mirrored copy
of the transit link is being sent to a pmacct box for flow generation.

-- 
Ross Vandegrift
[EMAIL PROTECTED]

The good Christian should beware of mathematicians, and all those who
make empty prophecies. The danger already exists that the mathematicians
have made a covenant with the devil to darken the spirit and to confine
man in the bonds of Hell.
--St. Augustine, De Genesi ad Litteram, Book II, xviii, 37



Re: easy way to scan for issues with path mtu discovery?

2008-06-24 Thread Ingo Flaschberger

Dear Patrick,

Does anyone know of an easy way to scan for issues with path mtu 
discovery along a hop path?  E.g. if you think someone is ICMP 
black-holing along a route, or even on the endpoint host, could you use 
some obscure nmap flag to find out for sure, and also to identify the 
offending hop/router/host?  What tool would you use to test for this, 
and how would you do such a test?  Is there any probing tool that does 
checks like this automatically?


Seems to me this happens often enough that someone has probably already 
figured it out, so I am trying not to reinvent the wheel.  All I can 
think of would be to handcraft packets of steadily increasing sizes and 
look for replies from each hop on the route (which would be laborious at 
best).  Google has not been kind to my researches so far.


If you have a cisco router:
ping
Protocol [ip]:
Target IP address: x.x.x.x
Repeat count [5]:
Datagram size [100]: 1500
Timeout in seconds [2]: 1
Extended commands [n]: y
Source address or interface:
Type of service [0]:
Set DF bit in IP header? [no]: yes
Validate reply data? [no]: yes
Data pattern [0xABCD]:
Loose, Strict, Record, Timestamp, Verbose[none]:
Sweep range of sizes [n]: y
Sweep min size [36]:
Sweep max size [18024]: 1500
Sweep interval [1]:

Kind regards,
Ingo Flaschberger




Re: Techniques for passive traffic capturing

2008-06-24 Thread Ross Vandegrift
On Tue, Jun 24, 2008 at 01:19:03PM +1200, Nathan Ward wrote:
 I see little point in aggregating tapped traffic, unless you have only  
 a small amount of it and you're doing it to save cost on monitoring  
 network interfaces - but is that saved cost still a saving when you  
 factor in the cost of the extra 3750s in the middle? I'd guess no.

Thanks for all the info Nathan - lots of good leads in your email.
Let me include some more information.

The problem is finding a way to multiplex that traffic from the
optical tap to multiple things that want to peek at it.  The
remote-span trick solves that, as well as integrating media
converters.  3750 is nice since you can stack em up and mix/match the
SFP and copper ports.

For example - we have an FCP box from Internap.  It wants to see
mirrored traffic so it can watch for TCP setup problems and try to
find blackholes.  It takes 10G feeds of aggregated transit links.

Then, we want to do some passive IDS analysis.  But snort can only
really only handle 600-800Mbps before it starts saturating CPU
(not multithreaded...) - so one collector per gigE transit seems
logical.

We'd like to generate flow data out of our forwarding plane since
we use 6500s to pull in border transit links.  The Netflow on those
boxes is terrible.  pmacct does a much better job, but it needs to see
all the traffic out of band.

 Note that for a single GE link, you'd need 2GE of remote span backhaul  
 (one GE in each direction).

We're mostly a content network, very few eyeballs.  Our ingress
traffic is negligable compared to egress, which makes the problem
easier.

 Matrix switches aren't useful for your case, as you're talking about  
 monitoring for trending etc. I think. Matrix switches are good when  
 you have lots of links, and want to be able to switch between them. Is  
 the cost of matrix switch ports worth the saving in GE interfaces on  
 PCs?

I guess what made me look at them is their ability to multiplex the
stream of data.  Take it from an optical tap, spit the same data out
of multiple ports.

The remote-span trick seems to do the same thing, so I'm wondering
where the gotcha is.  If there's an advantage to using something like
the Matrix switches, I'd love to know that now.

 The above is based on the assumption you're using PCs for monitoring,  
 the economics of aggregating tap traffic may make more sense if you're  
 using some fancy monitoring platform.

Yea - the fact that we have both makes the aggregation method look
good.  The FCP takes 10G aggregated feeds.  The PCs will want single
gig views of the transit links.

 If you find that you need lots of GE interfaces per PC or something,  
 and are saturating the PCI bus, look at DAG cards from Endace. They're  
 designed for passive monitoring, and will send you only headers and do  
 BPF in hardware. I looked at these for a similar project, but didn't  
 bother as it was cheaper to buy more PC chassis' and commodity GE  
 cards. They can do 10GE monitoring, so if you need several 10GE's per  
 chassis I'd recommend these.

Ah the Endace gear looks really interesting.  Thanks for the pointer!

-- 
Ross Vandegrift
[EMAIL PROTECTED]

The good Christian should beware of mathematicians, and all those who
make empty prophecies. The danger already exists that the mathematicians
have made a covenant with the devil to darken the spirit and to confine
man in the bonds of Hell.
--St. Augustine, De Genesi ad Litteram, Book II, xviii, 37



Re: easy way to scan for issues with path mtu discovery?

2008-06-24 Thread Justin Shore

Darden, Patrick S. wrote:


Hi all,

Does anyone know of an easy way to scan for issues with path mtu discovery 
along a hop path?  E.g. if you think someone is ICMP black-holing along a 
route, or even on the endpoint host, could you use some obscure nmap flag to 
find out for sure, and also to identify the offending hop/router/host?  What 
tool would you use to test for this, and how would you do such a test?  Is 
there any probing tool that does checks like this automatically?

Seems to me this happens often enough that someone has probably already figured 
it out, so I am trying not to reinvent the wheel.  All I can think of would be 
to handcraft packets of steadily increasing sizes and look for replies from 
each hop on the route (which would be laborious at best).  Google has not been 
kind to my researches so far.


Take a look at tracepath.

http://www.google.com/search?hl=enq=tracepathbtnG=Google+Search

I haven't done much of anything with it but it may be of use to you.

Justin



RE: Cloud service [was: RE: EC2 and GAE means end of ip address reputation industry? (Re: Intrustion attempts from Amazon EC2 IPs)]

2008-06-24 Thread Frank Bulk - iNAME
For the reason you stated, much to the chagrin of receivers.  Easier to
sell a service to customers downstream if it's being done in the network,
without MX changing.

Frank

-Original Message-
From: Ken Simpson [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, June 24, 2008 8:38 AM
To: [EMAIL PROTECTED]
Cc: 'Christopher Morrow'; nanog@nanog.org
Subject: Re: Cloud service [was: RE: EC2 and GAE means end of ip address
reputation industry? (Re: Intrustion attempts from Amazon EC2 IPs)]

 Source IP blocking makes up a large portion of today's spam arrest
 approach,
 so we shouldn't discount the CPU benefits of that approach too
 quickly.

 I'm not sure where today's technology is in regards for caching the
 first 1
 to 10kB of a sessiononce enough information is garnered to
 block, issue
 TCP RSETs.  If it's good, free the contents of the cache.


What's your interest in mopping up spam in the middle of the network?
Usually spam is viewed as a leaf-node problem (much to the chagrin of
receivers, actually).

Regards,
Ken

--
Ken Simpson
CEO

MailChannels - Reliable Email Delivery
http://mailchannels.com
604 685 7488 tel








RE: easy way to scan for issues with path mtu discovery?

2008-06-24 Thread Frank Bulk - iNAME
Look at mturoute: http://www.elifulkerson.com/projects/mturoute.php

Frank

-Original Message-
From: Darden, Patrick S. [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, June 24, 2008 9:28 AM
To: nanog@nanog.org
Subject: easy way to scan for issues with path mtu discovery?

Hi all,

Does anyone know of an easy way to scan for issues with path mtu discovery
along a hop path?  E.g. if you think someone is ICMP black-holing along a
route, or even on the endpoint host, could you use some obscure nmap flag to
find out for sure, and also to identify the offending hop/router/host?  What
tool would you use to test for this, and how would you do such a test?  Is
there any probing tool that does checks like this automatically?

Seems to me this happens often enough that someone has probably already
figured it out, so I am trying not to reinvent the wheel.  All I can think
of would be to handcraft packets of steadily increasing sizes and look for
replies from each hop on the route (which would be laborious at best).
Google has not been kind to my researches so far.

I appreciate any help!
--Patrick Darden





Comcast

2008-06-24 Thread Edward A. Trdina III
Anyone from Comcast on-list?  I'm getting hit with phishing emails that
have a link to a Wachovia look alike page that's hosted on a comcast HSI
account in South Bend Indiana.(At least thats what the SWIP says).
 
 
Thanks!
 
Ed


XO contact

2008-06-24 Thread Zaid Ali
Can someone from XO who handles this neighbor 65.46.253.157 help me  
out with a BGP session going down? This is the second time within a  
week where a misconfiguration of an ACL on XO end is bringing down my  
BGP session with you and its frustrating to go through the normal tech  
support chain.


Zaid



Re: Level3 IPv6 availability?

2008-06-24 Thread Craig Pierantozzi
Level 3 provides best effort IPv6 support with no SLA to current 
Internet customers. As mentioned IPv6 is currently being provided 
via tunnels to the customer's existing router.

There is a simple service agreement addendum and form to fill 
out for relevant config bits.

Sorry you get such a response from people that should know. *sigh*

regards
-Craig (Level 3 architecture)

* Jay Hennigan was thought to have said:

 Is anyone at Level3 who is familiar with IPv6, or anyone who is a Level3 
 IPv6 customer lurking here?  We are a Level3 BGP customer and our 
 contacts are giving us a deer-in-the-headlights stare when we want to 
 bring up our /32, claiming that they don't do IPv6 at all.  Not native, 
 not tunneled, zip, nada.
 
 Yet, I see lots of AS3356 in the ipv6 routing tables, and there's this 
 from three years ago...
 



Re: Level3 IPv6 availability?

2008-06-24 Thread Brandon Butterworth
  Is anyone at Level3 who is familiar with IPv6, or anyone who is a Level3 
  IPv6 customer lurking here?  We are a Level3 BGP customer and our 
  contacts are giving us a deer-in-the-headlights stare when we want to 
  bring up our /32, claiming that they don't do IPv6 at all.  Not native, 
  not tunneled, zip, nada.
 
 We've recently brought up IPv6 with Level3. It's done as an IPv6IP tunnel to
 their nearest IPv6 router. I may be able to dig out the form you need...

See http://www.bogons.net/dl/level3_ipv6.doc

brandon



Re: easy way to scan for issues with path mtu discovery?

2008-06-24 Thread Bill Owens
On Tue, Jun 24, 2008 at 10:28:12AM -0400, Darden, Patrick S. wrote:
 
 
 Hi all,
 
 Does anyone know of an easy way to scan for issues with path mtu discovery 
 along a hop path?  E.g. if you think someone is ICMP black-holing along a 
 route, or even on the endpoint host, could you use some obscure nmap flag to 
 find out for sure, and also to identify the offending hop/router/host?  What 
 tool would you use to test for this, and how would you do such a test?  Is 
 there any probing tool that does checks like this automatically?
 
 Seems to me this happens often enough that someone has probably already 
 figured it out, so I am trying not to reinvent the wheel.  All I can think of 
 would be to handcraft packets of steadily increasing sizes and look for 
 replies from each hop on the route (which would be laborious at best).  
 Google has not been kind to my researches so far.

scamper is the best tool I've found:

http://www.wand.net.nz/scamper/

Bill.



Re: EC2 and GAE means end of ip address reputation industry? (Re:

2008-06-24 Thread Valdis . Kletnieks
On Tue, 24 Jun 2008 00:03:20 -, Paul Vixie said:
 [EMAIL PROTECTED] writes:
 
  One could argue that the botnets for rent business model is in more
  widespread use than either EC2 or gridserver...
  
  I'm unclear whether that statement needs a smiley or not...
 
 i'd say that since EC2 won't be shut down when it's found out about, that
 you need a smiley.  widespread use is too narrow a term.  none of us
 expects white-hat e-commerce business to move into rented botnets, and

Umm.. Paul?  Take a reality check here - nobody actually *cares* where
white-hat services come from.

Which is bigger, the RBN or EC2's yearly revenues?

 rented botnets aren't all going to be in the same address space or ASN.

Hey - it ain't much of a cloud if it's all in one ASN.   :)


pgp9V8HKVUMAN.pgp
Description: PGP signature