Re: The End-To-End Internet (was Re: Blocking MX query)

2012-09-06 Thread Måns Nilsson
Subject: Re: The End-To-End Internet (was Re: Blocking MX query) Date: Wed, Sep 
05, 2012 at 06:56:36PM -0400 Quoting William Herrin (b...@herrin.us):
 
 Thing is, spam levels *are* down a good 20% in the last couple years,
 that being about the time ISPs began doing this. More, 20% *is* in
 rough proportion the impacted customer counts on the handful of cable
 and DSL providers that implemented it.

Not here. My experience is that it is at best static, but most likely
increasing. Around here, the sad default is that it is impossible to
buy tcp/25 access except in colos and over tunnels. It does not help. It
just is a very bad precedent, it looks like you are doing something. Which
for lawyers is just as fine as efficient action.

We need to remind ourselves that this Internet thing got big simply
because it let people have computers send packets directly to other
peoples computers. There was this guy called Aesop who wrote a story
about blocking traffic on the Internet, but since the Internet wasn't
known at the time (too secret) he had to rephrase it so it became a
story about a goose that lays golden eggs.

-- 
Måns Nilsson primary/secondary/besserwisser/machina
MN-1334-RIPE +46 705 989668
I HAVE to buy a new DODGE MISER and two dozen JORDACHE JEANS because
my viewscreen is USER-FRIENDLY!!


signature.asc
Description: Digital signature


Re: The End-To-End Internet (was Re: Blocking MX query)

2012-09-06 Thread John Levine
My idealistic preference would be the ISP allows outbound port 25,
but  are highly responsive to abuse complaints;

My idealistic preference is that ISPs not let their botted customers
fill everyone's inbox with garbage.

Why do you think that blocking port 25 precludes logging what they
block, and dealing with customers whose traffic shows that they're
botted?

R's,
John



Re: RPKI Pilot Participant Notice

2012-09-06 Thread Randy Bush
 I'd wager what ARIN is going to do in said Relying Party Agreement
 is tell RPs (i.e., *relying* parties) that they ought not rely to much
 on the data for routing, and if they do and something gets hosed,
 ARIN's not at fault -- but I'll wait to read the actual agreement
 before speculating more.

that too is my *speculation*.  which would be interesting, as accurate
primary data is arin's primary responsibility.  but anyone who has
looked at any of the rirs' data seriously needed a strong stomach.

randy



Re: RPKI Pilot Participant Notice

2012-09-06 Thread John Curran
On Sep 5, 2012, at 8:24 PM, Christopher Morrow morrowc.li...@gmail.com wrote:
 
  In order to access the
 production RPKI TAL, you will first have to agree to ARIN's Relying
 Party Agreement before the TAL will be emailed to you. To request the
 TAL after the production release, follow this link:
 http://www.arin.net/public/rpki/tal/index.xhtml;

If a relying party's use of PKI infrastructure legally equated to 
acceptance of the relying party agreement (RPA), then having an 
explicit record of acceptance of the RPA would not be necessary.  

Alas, it does not appear possible to equate use of PKI certificates 
with agreement to the associated RPA (and some might argue that this 
is a feature, as some folks would not want to be legally bound to an 
agreement which they did not explicitly review and accept.)

FYI,
/John





Re: The End-To-End Internet (was Re: Blocking MX query)

2012-09-06 Thread Oliver
On Thursday 06 September 2012 14:01:50 Masataka Ohta wrote:
 All that necessary is local changes on end systems of those who
 want the end to end transparency.
 
 There is no changes on the Internet.

You're basically redefining the term end-to-end transparency to suit your own 
agenda. Globally implementing what is basically an application layer protocol 
in order to facilitate the functioning of an upper layer protocol (i.e. IPv4) 
is patent nonsense. The purpose of each layer is to facilitate the one it 
encapsulates, not the other way around.

What you advocate is not end-to-end transparency but point-to-point opacity 
hinging on a morass of hacks that constitute little more than an abuse of 
existing technologies in an attempt to fulfil an unscalable goal.

Fortunately, it is exactly that fact which makes all of your drafts and 
belligerent evangelising utterly pointless; you can continue to make noise and 
attempt to argue by redefinition all you like, the world will continue to forge 
ahead with the deployment of IPv6 and the *actual* meaning of the end-to-end 
principle will remain as it is.

Regards,
Oliver



Re: RPKI Pilot Participant Notice

2012-09-06 Thread William Herrin
On Thu, Sep 6, 2012 at 5:37 AM, John Curran jcur...@arin.net wrote:
 If a relying party's use of PKI infrastructure legally equated to
 acceptance of the relying party agreement (RPA), then having an
 explicit record of acceptance of the RPA would not be necessary.

 Alas, it does not appear possible to equate use of PKI certificates
 with agreement to the associated RPA (and some might argue that this
 is a feature, as some folks would not want to be legally bound to an
 agreement which they did not explicitly review and accept.)

John, Randy:

I'm confused. Are you saying that unlike a whois lookup, I'll need a
contract with ARIN to look up and validate someone else's RPKI
certificate?

Would you clarify which parts of RPKI I need a contract with ARIN to
do and which parts I do not?

Thanks,
Bill Herrin


-- 
William D. Herrin  her...@dirtside.com  b...@herrin.us
3005 Crane Dr. .. Web: http://bill.herrin.us/
Falls Church, VA 22042-3004



dot1q encapsulation overhead?

2012-09-06 Thread up
A while back we had a customer colocated vpn router (2911) come in and we put it
on our main vlan for initial set up and testing.  Once that was done, I created 
a
separate VLAN for them and a dot1q subinterface on an older, somewhat overloaded
2811.  I set up the IPSec Tunnel, a /30 for each end to have an IP and all the
static routes needed to make this work and it did.

However, a few days later they were complaining of slow speeds...I don't recall,
but maybe something like 5mbs when they needed 20 or so.  We had no policing on
that port.  After a lot of testing, we tried putting them back on the main, 
native
vlan and it worked fine...they got the throughput they needed.

So my question is: could the dot1q encapsulation be causing throughput issues 
on a
2811 that's already doing a lot?  I regret that I don't recall what sh proc 
cpu
output was, or if I even ran it at all.  It was kind of hectic just to get it
fixed at the time.

Well, a few months later (last week), the chicken came home to roost when their
IPSec tunnel started proxy ARP puking stuff to our side that temporarily took 
out
parts of our internal LAN.  I have requested a 2911 replacement for the 2811
because I have seen the 2811 cpu load max out a few times when passing lots of
traffic.  I am hoping it will allow us to go back to this VLAN setup again, but
I've never heard whether dot1q adds any overhead.




Re: The End-To-End Internet (was Re: Blocking MX query)

2012-09-06 Thread Andrew Sullivan
On Wed, Sep 05, 2012 at 09:39:44PM -0700, Owen DeLong wrote:
 
 Never mind the fact that all the hosts trying to reach you have no
 way to know what port to use.

Despite my scepticism of the overall project, I find the above claim a
little hard to accept.  RFC 2052, which defined SRV in an
experiment, came out in 1996.  SRV was moved to the standards track in
2000.  I've never heard an argument why it won't work, and we know
that SRV records are sometimes in use.  Why couldn't that mechanism be
used more widely? 

Best,

A

-- 
Andrew Sullivan
Dyn Labs
asulli...@dyn.com



Re: dot1q encapsulation overhead?

2012-09-06 Thread Jonathan Lassoff
On Thu, Sep 6, 2012 at 7:55 AM,  u...@3.am wrote:
 A while back we had a customer colocated vpn router (2911) come in and we put 
 it
 on our main vlan for initial set up and testing.  Once that was done, I 
 created a
 separate VLAN for them and a dot1q subinterface on an older, somewhat 
 overloaded
 2811.  I set up the IPSec Tunnel, a /30 for each end to have an IP and all the
 static routes needed to make this work and it did.

 However, a few days later they were complaining of slow speeds...I don't 
 recall,
 but maybe something like 5mbs when they needed 20 or so.  We had no policing 
 on
 that port.  After a lot of testing, we tried putting them back on the main, 
 native
 vlan and it worked fine...they got the throughput they needed.

 So my question is: could the dot1q encapsulation be causing throughput issues 
 on a
 2811 that's already doing a lot?  I regret that I don't recall what sh proc 
 cpu
 output was, or if I even ran it at all.  It was kind of hectic just to get it
 fixed at the time.

 Well, a few months later (last week), the chicken came home to roost when 
 their
 IPSec tunnel started proxy ARP puking stuff to our side that temporarily took 
 out
 parts of our internal LAN.  I have requested a 2911 replacement for the 2811
 because I have seen the 2811 cpu load max out a few times when passing lots of
 traffic.  I am hoping it will allow us to go back to this VLAN setup again, 
 but
 I've never heard whether dot1q adds any overhead.

It's small, but plain 802.1Q adds in a 4-byte (32-bit) header after
the normal Ethernet header and before the actual Ethernet payload.

That tag has to go somewhere. :p

Also, I'm not privy to the details of your IPSec Tunnel, but that
can introduce additional overhead as well.

I'm not sure about your specific 2811/2911 and IOS combination (to
know if this feature is there or not), but you might also consider
setting ip tcp adjust-mss and ip mtu values on your tunnel
interfaces to signal the true maximum-transportable-size of the
various traffic types over the tunnel.

I've also been bit by this bug before
(http://networknerd.wordpress.com/2010/06/11/cisco-ipsec-mtu-bug/)
that affects the MTU calculations of tunnels, for which the source
address is specified by an interface, after a reboot. Worth knowing
about.

Cheers,
jof



Are people still building SONET networks from scratch?

2012-09-06 Thread Will Orton
We've run into an issue with a customer that has been confounding us for a few 
months as we try to design what they need.

The customer has a location in the relative middle of nowhere that they are 
trying to build a protected OC3 to. Ultimately, their traffic on it will be 
packet data (IP/ethernet, not channelized/voice). But they seem to be 
absolutely 100% set on the idea that they build with Cisco ONS boxes and that 
they run and control the D1-D12 bytes in order to manage protection switching 
on the OC3 (and have their DCC channel for management).

Since this is the middle of nowhere, we are having to piece it together from a 
few runs of dark fiber here and there and lit services from about 3 other 
providers to get from the desired point A to the desired point B. The issues 
we seem to be hitting are:

-We seem to be unable to find anyone who sells lit OC3 with D1-D12 
transparency for the client. Sometimes we can get D1-D3, but that's it.

-lit OC3/12/48 is ridiculously expensive comapred to 1g ethernet waves or 10g 
waves (choice LAN/WAN ethernet or OC192)

10g waves are cheap enough that we have entertained the idea of buying them and 
putting OC-192/muxponders on the ends to provide the OC-3, but even then I'm 
having trouble finding boxes that will do D1-D12 transparency for client OC-3. 
Building the whole thing on dark fiber so that we could specify the exact 
equipment on every hop isn't going to happen, as the protect path is about 
1000 miles and the geography is such that we don't really have a market for all 
the other wasted capacity there would be on that path.

Having much more experience with ethernet/packet/MPLS setups, we are trying to 
get the client to admit that 1g/10g waves running ethernet with QoS would be as 
good as or better in terms of latency, jitter, and loss for their packet data. 
So far they will barely listen to the arguments. And then going the next leap 
and showing them that we could work towards 50ms protection switching with 
MPLS/BFD/etc packet-based protocols is another stretch.


Am I missing something here that my customer isn't, or is it the other way 
around? 

-Will



Re: Are people still building SONET networks from scratch?

2012-09-06 Thread james jones
On the surface this makes me want to cry.  I could be missing something as
well.

On Thu, Sep 6, 2012 at 12:38 PM, Will Orton w...@loopfree.net wrote:

 We've run into an issue with a customer that has been confounding us for a
 few
 months as we try to design what they need.

 The customer has a location in the relative middle of nowhere that they are
 trying to build a protected OC3 to. Ultimately, their traffic on it will be
 packet data (IP/ethernet, not channelized/voice). But they seem to be
 absolutely 100% set on the idea that they build with Cisco ONS boxes and
 that
 they run and control the D1-D12 bytes in order to manage protection
 switching
 on the OC3 (and have their DCC channel for management).

 Since this is the middle of nowhere, we are having to piece it together
 from a
 few runs of dark fiber here and there and lit services from about 3 other
 providers to get from the desired point A to the desired point B. The
 issues
 we seem to be hitting are:

 -We seem to be unable to find anyone who sells lit OC3 with D1-D12
 transparency for the client. Sometimes we can get D1-D3, but that's it.

 -lit OC3/12/48 is ridiculously expensive comapred to 1g ethernet waves or
 10g
 waves (choice LAN/WAN ethernet or OC192)

 10g waves are cheap enough that we have entertained the idea of buying
 them and
 putting OC-192/muxponders on the ends to provide the OC-3, but even then
 I'm
 having trouble finding boxes that will do D1-D12 transparency for client
 OC-3.
 Building the whole thing on dark fiber so that we could specify the exact
 equipment on every hop isn't going to happen, as the protect path is
 about
 1000 miles and the geography is such that we don't really have a market
 for all
 the other wasted capacity there would be on that path.

 Having much more experience with ethernet/packet/MPLS setups, we are
 trying to
 get the client to admit that 1g/10g waves running ethernet with QoS would
 be as
 good as or better in terms of latency, jitter, and loss for their packet
 data.
 So far they will barely listen to the arguments. And then going the next
 leap
 and showing them that we could work towards 50ms protection switching with
 MPLS/BFD/etc packet-based protocols is another stretch.


 Am I missing something here that my customer isn't, or is it the other way
 around?

 -Will




Re: Are people still building SONET networks from scratch?

2012-09-06 Thread Nick Hilliard
On 06/09/2012 17:38, Will Orton wrote:
 The customer has a location in the relative middle of nowhere that they are 
 trying to build a protected OC3 to.

Not sure if I see the problem here.  Show them the bill for an OC3 service,
and then show them the bill for the equivalent ethernet service.  This
usually works for me.  If they want to pay for OC3 when there's no
compelling reason to, who are you to argue?

Nick




Re: The End-To-End Internet (was Re: Blocking MX query)

2012-09-06 Thread William Herrin
On Thu, Sep 6, 2012 at 11:14 AM, Andrew Sullivan asulli...@dyn.com wrote:
 RFC 2052, which defined SRV in an
 experiment, came out in 1996.  SRV was moved to the standards track in
 2000.  I've never heard an argument why it won't work, and we know
 that SRV records are sometimes in use.  Why couldn't that mechanism be
 used more widely?

Hi Andrew,

Because the developer of the next killer app knows exactly squat about
the DNS and won't discover anything about the DNS that can't be had
via getaddrinfo() until long after its too late redefine the protocol
in terms of seeking SRV records. Leaving SRV out of getaddrinfo()
means that SRVs will be no more than lightly used for the duration of
the current networking API. The last iteration of the API survived
around 20 years of mainstream use so this one probably has another 15
to go.

Also there are efficiency issues associated with seeking SRVs first
and then addresses, the same kind of efficiency issues with reverse
lookups that lead high volume software like web servers to not do
reverse lookups. But those pale in comparison to the first problem.

Regards,
Bill Herrin


-- 
William D. Herrin  her...@dirtside.com  b...@herrin.us
3005 Crane Dr. .. Web: http://bill.herrin.us/
Falls Church, VA 22042-3004



Re: The End-To-End Internet (was Re: Blocking MX query)

2012-09-06 Thread Andrew Sullivan
On Thu, Sep 06, 2012 at 01:49:06PM -0400, William Herrin wrote:

 the DNS and won't discover anything about the DNS that can't be had
 via getaddrinfo() until long after its too late redefine the protocol
 in terms of seeking SRV records.

Oh, sure, I get that.  One of the problems I've had with the end to
end NAT argument is exactly that I can't see how it's any more
deployable than IPv6, for exactly this reason.  But the claim upthread
was (I thought) that the application _can't_ know about this stuff,
not that it's hard today.  Because of the 20-year problem, I think now
would be an excellent time to start thinking about how to make usable
all those nice features we already have in the DNS.  Maybe by the time
I die, we'll have a useful system!

Best,

Andrew living in constant, foolish, failed hope Sullivan

-- 
Andrew Sullivan
Dyn Labs
asulli...@dyn.com



Re: Are people still building SONET networks from scratch?

2012-09-06 Thread Christopher Morrow
On Thu, Sep 6, 2012 at 1:00 PM, Nick Hilliard n...@foobar.org wrote:
 On 06/09/2012 17:38, Will Orton wrote:
 The customer has a location in the relative middle of nowhere that they are
 trying to build a protected OC3 to.

 Not sure if I see the problem here.  Show them the bill for an OC3 service,
 and then show them the bill for the equivalent ethernet service.  This
 usually works for me.  If they want to pay for OC3 when there's no
 compelling reason to, who are you to argue?

(remember, of course, to pad that bill by 8% so you profit more on the
more expensive link... go telecom think!)



Re: Are people still building SONET networks from scratch?

2012-09-06 Thread Will Orton
On Thu, Sep 06, 2012 at 06:00:37PM +0100, Nick Hilliard wrote:
 Not sure if I see the problem here.  Show them the bill for an OC3 service,
 and then show them the bill for the equivalent ethernet service.  This
 usually works for me.  If they want to pay for OC3 when there's no
 compelling reason to, who are you to argue?
 
 Nick
 


Yes, of course the response is, figure out how to make the OC3 cheaper. :) 
So we're rapidly approaching a response of you've engineered yourself into 
a corner, take it or leave it.

I just can't see how to get OC3 D1-D12 tunneled through without doing it as 
a mix of OC-48 and dark fiber for the entire path and specifying lots of 
complicated boxes just to get those bytes through. That cost is an order of 
magnitude more than just buying OC3 from multiple carriers (who can't tunnel 
D1-D12), which is a magnitude more than buying mpls-based gig-e or gig-e 
wave.

I wasn't around (well, I was just a T1/DS3 customer) when all the OC3/12/48 
SONET networks were built 10-15 years ago. I suppose they were all built 
directly on the fiber (maybe with WDM but no layer1.5-2 muxing) and the 
provider was always the one who handled protection switching?

I've considered using J's PE-4CHOC3-CE-SFP (OC3 emulated SAToP), then I 
could do it all with gig-e underneath. Does anyone make a cheaper OC3 
circuit emulation module or box? Most likely the customer wouldn't believe 
such a thing is possible and we'd have to put something in the contract 
allowing them SLA credit if their OC3 suffers too many timing slips or 
something.


-Will



Re: The End-To-End Internet (was Re: Blocking MX query)

2012-09-06 Thread Owen DeLong

On Sep 6, 2012, at 08:14 , Andrew Sullivan asulli...@dyn.com wrote:

 On Wed, Sep 05, 2012 at 09:39:44PM -0700, Owen DeLong wrote:
 
 Never mind the fact that all the hosts trying to reach you have no
 way to know what port to use.
 
 Despite my scepticism of the overall project, I find the above claim a
 little hard to accept.  RFC 2052, which defined SRV in an
 experiment, came out in 1996.  SRV was moved to the standards track in
 2000.  I've never heard an argument why it won't work, and we know
 that SRV records are sometimes in use.  Why couldn't that mechanism be
 used more widely? 
 

If browsers started implementing it, it could.

I suppose the more accurate/detailed statement would be:

Without modifying every client on the internet, there is no way for the
clients trying to reach you to reliably be informed of this port number
situation.

If you're going to touch every client, it's easier to just do IPv6.

Owen




CLEC's in Ottawa area?

2012-09-06 Thread chris
Hello,

I have a client in the ottawa ontario canada area who is looking at DSL for
a secondary connection. I am pretty unfamiliar with the state of telecom
industry in Canada, I googled around and found this rather lengthy list of
CLEC's.

http://support.crtc.gc.ca/tlcmlsts/default.aspx?indx=33lang=e

Does anyone have any good experiences with any of these carriers that
service the Ottawa they could share?

Also would be an added plus if they supported MLPPP as the client mentioned
they were concerned with the lower speeds of DSL, so we would love to do
two circuits with MLPPP if possible

thanks!
chris


Re: CLEC's in Ottawa area?

2012-09-06 Thread Peter Kristolaitis
I recommend TekSavvy (www.teksavvy.com) as a DSL reseller pretty much 
anywhere in Ontario (and any other provinces they can get service in).  
Not sure why they're not on that CLEC list, but they're a pretty big 
(and awesome) provider up here.  For bonus points, if you have to call 
their support line, you get someone who actually knows something about 
networking.   We have some DSL lines through them at work, and my 
personal home cable connection is through them as well.


- Pete


On 12-09-06 02:33 PM, chris wrote:

Hello,

I have a client in the ottawa ontario canada area who is looking at DSL for
a secondary connection. I am pretty unfamiliar with the state of telecom
industry in Canada, I googled around and found this rather lengthy list of
CLEC's.

http://support.crtc.gc.ca/tlcmlsts/default.aspx?indx=33lang=e

Does anyone have any good experiences with any of these carriers that
service the Ottawa they could share?

Also would be an added plus if they supported MLPPP as the client mentioned
they were concerned with the lower speeds of DSL, so we would love to do
two circuits with MLPPP if possible

thanks!
chris





Re: The End-To-End Internet (was Re: Blocking MX query)

2012-09-06 Thread valdis . kletnieks
On Thu, 06 Sep 2012 11:14:58 -0400, Andrew Sullivan said:

 Despite my scepticism of the overall project, I find the above claim a
 little hard to accept.  RFC 2052, which defined SRV in an
 experiment, came out in 1996.  SRV was moved to the standards track in
 2000.  I've never heard an argument why it won't work, and we know
 that SRV records are sometimes in use.  Why couldn't that mechanism be
 used more widely?

My PS3 may want to talk to the world, but I have no control over Comcast's DNS.



pgprKXFEYZ1RQ.pgp
Description: PGP signature


Re: Are people still building SONET networks from scratch?

2012-09-06 Thread Christopher Morrow
On Thu, Sep 6, 2012 at 2:12 PM, Will Orton w...@loopfree.net wrote:
 . I suppose they were all built
 directly on the fiber (maybe with WDM but no layer1.5-2 muxing) and the
 provider was always the one who handled protection switching?

or protection at the optical layer isn't as predictable for all
aspects as L3 'protection' is...

or something.



Re: The End-To-End Internet (was Re: Blocking MX query)

2012-09-06 Thread Fred Baker (fred)
It would be really nice if people making statements about the end to end 
principle would talk about the end to end principle.

http://web.mit.edu/Saltzer/www/publications/endtoend/endtoend.pdf

The abstract of the paper states the principle:

This paper presents a design principle that helps guide
placement of functions among the modules of a distributed
computer system. The principle, called the end-to-end
argument, suggests that functions placed at low levels of a
system may be redundant or of little value when compared
with the cost of providing them at that low level. Examples
discussed in the paper include bit error recovery, security
using encryption, duplicate message suppression, recovery
from system crashes, and delivery acknowledgement. Low level
mechanisms to support these functions are justified only as
performance enhancements.

One of the authors of the paper has since restated it in a way that is 
significantly less useful, which is that the only place anything intelligent 
should be done in a network is in the end system. If you believe that argument, 
then WiFi networks should not retransmit lost packets (and as a result would 
become far less useful) and the Internet should not use routing protocols - it 
should only use source routing. So, yes, I think the Rise of the Stupid 
Network is a very interesting paper and site, but needs to be handled 
carefully.

The argument argues for simplicity and transparency; when a function at a lower 
layer does something an upper layer - not just the application, but any 
respectively higher and lower layers - it can be difficult to debug the 
behavior. However, it is not a hard-and-fast the network should never do 
things that the end system doesn't expect; the paper makes it clear that there 
is a trade-off, and if the trade-off makes sense (retransmitting at the link 
layer in addition to the end to end retransmission in the case of WiFi) it 
doesn't preclude the behavior. It merely suggests that one think about such 
things (retransmitting in LAPB turned out to be a bad idea way back when). 
Complexities of various types are unavoidable; to quote a fourteenth century 
logician, a satisfactory syllogism contains no unnecessary complexity.

Yes, I think that stateful network address translation violates the end to end 
principle. But it doesn't violate it because everyone can't talk with everyone 
directly; it violates it because a change is made in a packet that subverts an 
end system's intent and as a result randomly breaks things (for example, an 
ICMP packet-too-large response has to be specially handled by the NAT to make 
PMTU work). I would argue that a network-imposed policies like traffic filters 
violate the end to end principle no more than network-imposed routing 
(including not-routing) policies do. If you can't get somewhere or a given 
address isn't instantiated with a host, that's not particularly surprising. 
What might be surprising and difficult to diagnose would be something that 
sometimes allows packets through and sometimes doesn't without any clear reason.

I suspect everyone on this list will agree that the KISS principle, aka 
end-to-end, is pretty important, and get irritated with vendors (cough) that 
push them towards complex solutions. A host directly sending mail to a remote 
MTA is not automatically a bad actor for any reason related to KISS. There are 
two issues, however, that you might think about. My employer tells me that they 
discard about 98% of email traffic headed to me; a study of my own email 
history says that the email from outside that passes that filter and which is 
what I expect to receive comes through less than 1000 immediate SMTP 
predecessors to the first Cisco MTA; running the same survey on my junk folder 
(which is only 30 days, not 18 years) has about 5000 SMTP predecessors, the 
1000 and the 5000 are disjoint sets. So an SMTP connection to a remote MTA is 
not a bad thing automatically, but it raises security eyebrows - and should - 
because it is similar to how spam and other attacks are transmitted. In 
addition, at least historically, in many cases those MUAs directly connecting 
to remote MTAs try or tried to use them as open relays, and it was difficult 
for the relay to authenticate random systems. Having an MUA give its traffic to 
a first hop MTA using SSL or some other form of service 
authentication/authorization improves the security of the service. That can be 
overcome using S/MIME, of course, given a global PKI, but DKIM depends on the 
premise that the originator has somehow been authenticated and shown to be 
authorized to send email.

On Sep 4, 2012, at 11:22 AM, Jay Ashworth wrote:

 - Original Message -
 From: Owen DeLong o...@delong.com
 
 I am confused... I don't understand your comment.
 
 It is regularly alleged, on this mailing list, that NAT is bad *because it 
 violates the end-to-end principle of the Internet*, 

Re: The End-To-End Internet (was Re: Blocking MX query)

2012-09-06 Thread Mark Andrews

In message 85250.1346959...@turing-police.cc.vt.edu, valdis.kletni...@vt.edu 
writes:
 --==_Exmh_1346959671_1993P
 Content-Type: text/plain; charset=us-ascii
 
 On Thu, 06 Sep 2012 11:14:58 -0400, Andrew Sullivan said:
 
  Despite my scepticism of the overall project, I find the above claim a
  little hard to accept.  RFC 2052, which defined SRV in an
  experiment, came out in 1996.  SRV was moved to the standards track in
  2000.  I've never heard an argument why it won't work, and we know
  that SRV records are sometimes in use.  Why couldn't that mechanism be
  used more widely?
 
 My PS3 may want to talk to the world, but I have no control over Comcast's 
 DNS.

What point are you trying to make?  Comcast's servers support SRV as do all
general purpose name servers.  For HTTP at least you need to be backwards
compatible so there is no reason not to add SRV support.

 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.12 (GNU/Linux)
 Comment: Exmh version 2.5 07/13/2001
 
 iQIVAwUBUEj5NwdmEQWDXROgAQL/fRAAjHmAtVBMjQAybs2TWrzWMcE6e9k6A7Av
 LvOXJAS1leKr0tyg0lG4+IwuMCN5bV3+V8F7+bWAfQFSBIj9aH5ymSuxdO/LJVoj
 TdPRSRzTcPCL0mmIB5LbBdrDgi/PcruLdGDgOiLiLPhUkXnRJ+OmzR2WmAh4jgOz
 dVLb0ugujqbmqm7tzgxeiC0yzF9EiL3RQAZwzZI9Tcbnh0rELMHWBhgGeIO5KbA9
 4iCh79MkrPXr4uONVQrCmbNBuqcziGIekKDGCpSUqwynzbc7NK00+Xhhkz2inNOn
 m7v73JFKzLd3AAjBenv3Yqz9hIwUGT4D9kW6Kof5Ah5SmzLY1ZOKpi+08M6i6SS/
 I54neNmQ7lLuO9p7EsGpRTfUN1MOMEYXo8yOFTNQI7FDWCXNhWz/MjE3wxmXQYeA
 jBd8EE7m0QGuM6l/AhaS9BRXdZUXn8KK5E4N5YubJonLIuTzkTXuHmhFOB3Khlrl
 rHfl84sf8TdeDuxlJZs4PLdfRJooknNjSqLYfyfH0UeK3mSjlY3rpjcAZbSZsMdy
 vUDO0hU1C6FNFCXdkwRVZUtHxFX+l1sOtk76bt4s7NiWhwwGxwrykvk66qPa3YsH
 nyIWS7SsX245hy7dayKMKpYIByaAO6E7uVWzhgOobRMe3omP911BE30D2KYLXFvn
 wVqujobWuC4=
 =o0nz
 -END PGP SIGNATURE-
 
 --==_Exmh_1346959671_1993P--
 
 
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org



CAIDA's AS-rank project

2012-09-06 Thread Matthew Luckie

Hello,

We have been working on refreshing the data and algorithms behind 
CAIDA's as-rank project.  We have published AS-relationships and 
AS-rankings computed for June 2012.  We are currently seeking further 
validation of our rankings and relationship inferences.


http://as-rank.caida.org/

The core of the algorithm is the inference of business relationships. 
Over the past two years we have received a significant amount of ground 
truth from operators through the corrections facility provided within 
AS-rank: in particular we obtained 1200 p2p relationships as a result 
of our previous algorithm that assigned many more customer/provider 
(c2p) relationships than ASes had in reality.  Our intuition is that 
network owners are a lot more concerned when we infer a provider 
relationship that is actually a peer relationship, but are less 
motivated to validate other inferences.


We have validated our algorithm against available ground truth and find 
our relationship inferences have a 99.1% positive predictive value (PPV) 
for c2p and 94.7% for p2p for the validation data we have available. 
Because customer cone computation depends on the accuracy of our c2p 
inferences, we are reasonably confident in our computed rankings.


We are now soliciting further feedback in any shape and form offered. 
The as-rank website provides the ability for operators to submit 
corrections through the right-most corrections button on an individual 
ASes information page, and relationships ground-truth is solicited 
through that channel, if at all possible.  Other feedback, on or 
off-list, would also be appreciated.


If you are curious as to why a particular relationship was inferred, 
please get in contact with me.  Some ASes have advised of a particular 
business relationship in the past, but when I drill down into the data 
it turns out they have a misconfiguration and are leaking routes to a 
peer.  At a minimum, this might be a useful sanity check for some ASes 
who may be providing free transit without realising it.  In the future, 
we plan to annotate each relationship with examples as to why it was 
inferred the way it was, but we have not yet got that far yet.


Thanks,

Matthew Luckie
CAIDA



Re: CLEC's in Ottawa area?

2012-09-06 Thread Andrew Sullivan
On Thu, Sep 06, 2012 at 02:33:35PM -0400, chris wrote:
 Also would be an added plus if they supported MLPPP as the client mentioned
 they were concerned with the lower speeds of DSL, so we would love to do
 two circuits with MLPPP if possible

I can second the recommendation of Teksavvy (http://teksavvy.com).
I've been very happy with them, even though I sometimes have periods
of painful outage due to the woeful shape of the copper plant in my
neighbourhood.  (Bell is sure not the company I knew growing up.
Bureaucratic and monopolistic still, yes, but the wires are now in
terrible shape.)

Also, Teksavvy will do MLPPP.  Look under add ons on the Teksavvy
site.
(e.g. http://teksavvy.com/en/residential/internet/dsl/high-speed-dsl-25).
Looks like it's $4.00 a month.

Note that, in some areas, there's no copper, so you need to check.
Bell has been known to remove the copper where they installed their
fibre to the customer premises.  I think this is within the bounds of
the CRTC rules, but I haven't been bothered to check.  

Note that in some markets, Teksavvy also offers service over cable, so
that might be another option.  (You said that it was for redundancy,
though, so the cable might be in use already.)

Best,

A

-- 
Andrew Sullivan
Dyn Labs
asulli...@dyn.com



Re: The End-To-End Internet (was Re: Blocking MX query)

2012-09-06 Thread valdis . kletnieks
On Fri, 07 Sep 2012 08:30:12 +1000, Mark Andrews said:
 In message 85250.1346959...@turing-police.cc.vt.edu, 
 valdis.kletni...@vt.edu writes:
  My PS3 may want to talk to the world, but I have no control over Comcast's 
  DNS.

 What point are you trying to make?  Comcast's servers support SRV as do all
 general purpose name servers.  For HTTP at least you need to be backwards
 compatible so there is no reason not to add SRV support.

Sure, Comcast's servers will happily support an SRV entry for my PS3.

However, Comcast's business processes don't support a way for me to request
said SRV record be listed.  Heck, I don't even get a static IP with my current 
service
package. ;)

Now *I* have the technical chops to talk to the guys at dyndns.org or other
providers and get an SRV entry created under some domain name pointing back at
my IP address.  However, Joe Sixpack doesn't really have that option.  And
unless you figure out a scalable and universal way for Joe Sixpack's Xbox or 
PS3 or
whatever to request an SRV entry saying that the PS3 wants to do service
foobar on port 34823, you can't use SRV like that.

A better proposal would probably be having the NAT itself run a 'portmap' type 
service
on a well known port like 111.  Except that still doesn't do a very good job of
disambiguating two instances of foobar behind a NAT...



pgpAscas1weY8.pgp
Description: PGP signature