Re: why IPv6 isn't ready for prime time, SMTP edition

2014-03-28 Thread Owen DeLong

On Mar 27, 2014, at 1:38 PM, Brandon Ross br...@pobox.com wrote:

 On Thu, 27 Mar 2014, Owen DeLong wrote:
 
 On Mar 27, 2014, at 11:15 AM, Barry Shein b...@world.std.com wrote:
 
 Please explain in detail where the fraud potential comes in.
 
 Spammer uses his botnet of zombie machines to send email from each of them to 
 his own domain using the user's legitimate email address as From:. Spammer 
 says it was unsolicited and keeps the full $.10/email that victim users have 
 deposited into this escrow thing.
 
 Sounds a lot more profitable than regular spam.

You say this like having a tax on running a botted computer on the internet 
would be a bad thing.

I agree that it would provide a bit of profit to the spammers for a very short 
period of time, but I bet it would get a lot of bots fixed pretty quick.

Owen




Re: ARIN board accountability to network operators (was: RE: [arin-ppml] [arin-discuss] Term Limit Proposal)

2014-03-28 Thread Owen DeLong
I, for one, would not want to start having to pay RIPE-level fees.

ARIN fees are a much better deal than RIPE fees.

Owen

On Mar 27, 2014, at 3:10 PM, Cb B cb.li...@gmail.com wrote:

 On Mar 27, 2014 3:03 PM, John Curran jcur...@istaff.org wrote:
 
 And I would welcome discussion of how ARIN (and nanog) can be more like
 RIPE - that is very much up to this community and its participation far
 more than ARIN..
 
 /John
 
 
 How about we fold ARIN into RIPE? Why not? I agree with all of Randy's
 points. I am sure RIPE can easily scale up to take on ARIN services, with
 fees being reduced for all involved due to economies of scale.
 
 CB
 
 On Mar 28, 2014, at 5:27 AM, Randy Bush ra...@psg.com wrote:
 
 john,
 
 i think your attemt to move the discussion to the arin ppml list
 exemplifies one core of the problem.  this is not about address policy,
 but arin thinks of itelf as a regulator not a registry.
 
 contrast with the ripe community and the ncc, which is not nirvana but
 is a hell of a lot better.  among other key differences, the ncc is
 engaged with the community through technical and business working
 groups.
 
 e.g. the database working group covers what you think of as whois and
 the routing registry.  the wg developed the darned irr definition and
 continues to evolve it.  consequence?  the irr is actively used in two
 regions in the world, europe and japan (which likes anything ocd:-).
 
 the routing wg works with the ops to develop routing technology such as
 route flap damping.  there is a reason that serious ops attend ripe
 meetings.  yes, a whole lot of folk with enable are engaged.
 
 for years there has been a wg on the global layer nine issues.
 
 the dns wg deals with reverse delegation, root server ops, etc.  and
 guess what, all the dns heavy techs and ops are engaged.
 
 there is a wg for discussing what services the ncc offers.  the recent
 simplification and opening of services to legacy and PI holders happened
 in the ncc services wg, it was about services not addressing policy.
 
 and this is aside from daniel's global measurement empire.  not sure it
 is a registry's job to do this, but it is a serious contribution to the
 internet.
 
 the ncc is engaged with its community on the subhects that actually
 interest operators and affect our daily lives.
 
 there is nothing of interest at an arin meeting, a bunch of junior
 wannabe regulators and vigilantes making an embarrassing mess.  i've
 even taken to skipping nanog, if ras talks i can watch the recording.
 all the cool kids will be in warsaw.  ops vote with our feet.
 
 randy
 
 




Re: Cisco Security Advisory: Cisco IOS Software SSL VPN Denial of Service Vulnerability

2014-03-28 Thread Mark Tinka
On Friday, March 28, 2014 05:48:29 AM Shrdlu wrote:

 Why? Personally, I think it's fine. It only happens (at
 most) every six months (and sometimes more like a year).

I think it's fine too.

As I'm sure you know, if you're a Cisco customer, you can 
subscribe to their internal notification services where 
you'll get this anyway.

That they consolidate the most critical bug information and 
push it out to the typical operational mailing lists a 
couple of times a year is not such a problem, I'd say. For 
some, this could be the only way they find out.

Mark.


signature.asc
Description: This is a digitally signed message part.


Re: why IPv6 isn't ready for prime time, SMTP edition

2014-03-28 Thread Owen DeLong

On Mar 27, 2014, at 10:31 PM, Barry Shein b...@world.std.com wrote:

 
 On March 27, 2014 at 12:14 o...@delong.com (Owen DeLong) wrote:
 
 On Mar 27, 2014, at 11:15 AM, Barry Shein b...@world.std.com wrote:
 
 
 On March 26, 2014 at 22:25 o...@delong.com (Owen DeLong) wrote:
 
 Actually, a variant on that that might be acceptable… Make e-postage a 
 deposit-based thing. If the recipient has previously white-listed you or 
 marks your particular message as “desired”, then you get your postage 
 back. If not, then your postage is put into the recipients e-postage 
 account to offset the cost of their emails.
 
 Thoughts?
 
 It's a fine idea but too complicated.
 
 Look, the (paper) post office doesn't say oh, you WANTED that mail,
 ok, then we'll return the cost of postage to the sender!
 
 Why? Because if they did that people would game the system, THEY'D
 SPAM!
 
 How would they benefit from that?
 
 From what, being able to send free paper mail? I think that would be
 considered a benefit by most junk mail advertisers. But see next...
 
 SPAM — Pay, say $0.10/message.
 Then Claim you wanted the SPAM, get your $0.10/message back for each SPAM 
 you sent to yourself.
 Or, claim you didn’t want the SPAM and get $0.05/message for each message 
 you received while the
 original provider keeps the other $0.05.
 
 And it would take way too much bookkeeping and fraud identification etc.
 
 Please explain in detail where the fraud potential comes in.
 
 By my interpretation, you’d have to somehow get more back than you deposited 
 (not really possible) in order to profit from sending SPAM this way.
 
 Well, it's advertising, so they do.
 
 Advertising is a valuable commodity.  Free advertising is particularly
 valuable, ROI with I close to zero.

But it’s only free if you send it to yourself and then approve it. Any message 
you send to someone else who doesn’t want it isn’t free.

 So offering to not charge you because you wanted that mail makes no
 sense, right?

But this isn’t a charge for the post office and by the time you’re connected to 
the internet, the cost of receiving the mail and transporting it and the sender 
sending it is pretty much sunk by some arguments.

This is an effort to provide a financial disincentive for spamming.

 
 Let's take a deep breath and re-examine the assumptions:
 
 Full scale spammers send on the order of one billion msgs per day.
 
 Which means if I gave your account 1M free msgs/day and could
 reasonably assure that you can't set up 1,000 such accts then you
 could not operate as a spammer.
 
 Not sure how you enforce these user account requirements or how you avoid 
 duplicative accounts.
 
 If you want to attach e-postage you have to go get some and that can
 be a contract which says you don't do that, if you have multiple
 accounts you split it among your accounts or buy more. And if you do
 what you describe you understand that it is criminal fraud. Click
 Agree [ ] before proceeding, or similar.

Because spammers are all on the up and up and never commit fraud in order to 
send their SPAM, right?

 Who can't operate with 1M msgs/day?
 
 Well, maybe Amazon or similar.
 
 But as I said earlier MAYBE THEY SHOULD PAY ALSO!
 
 I, for one, don’t want my Amazon prices increased by a pseudo-tax on the 
 fact that they do a large volume of email communications with their 
 customers. They have enough problems trying to get IPv6 deployed without 
 adding this to their list of problems.
 
 That assumes that spam is free for them, and you. Including free as
 in stealing your time”.

No, it assumes that most of the messages I get from Amazon are NOT SPAM.

The vast majority of messages I get from Amazon are order confirmations, 
shipping status reports, etc. Messages related to transactions I have conducted 
with them. Yes, I get a little bit of SPAM from them and I wouldn’t mind seeing 
them forced to pay me for those messages, but I certainly don’t want to see 
them paying for every message they send.

 We really need to get over the moral component of spam content (and
 senders' intentions) and see it for what it is: A free ride anyone
 would take if available.
 
 I disagree. I see it as a form of theft of service that only immoral thieves 
 would take if available.
 
 How can it be a theft of service if we're not charging anything?

I didn’t authorize the spammer to use my computer, systems, disk, network, etc. 
They simply did so without my authorization. If I had a cost effective way to 
identify them, track them down, and hold them accountable for this, I would 
gladly do so.

 Well, if they use others' resources it's a theft of those resources,
 such as botnets, is that what you mean?

Botnets, my mail server, my disk storage, my network, etc. where my mail is 
processed… All of the above.

 But by morality I mean that we tend to define spam in terms of
 generally agreed to be undesirable email content such as questionable
 herbal cures or other apparent fraud or 

Re: ARIN board accountability to network operators (was: RE: [arin-ppml] [arin-discuss] Term Limit Proposal)

2014-03-28 Thread Daniel Karrenberg




 On 27.03.2014, at 22:27, Randy Bush ra...@psg.com wrote:
 
 ...and this is aside from daniel's global measurement empire.  not sure it
 is a registry's job to do this, but it is a serious contribution to the
 internet. ...

there is the  'measurement analysis and tools' working group 
http://www.ripe.net/ripe/groups/wg/mat guiding this work, and it even has an 
'out-of-area' co-chair to emphasize the *globalness* of our empire ;-) :-) :-) 
:-) :-) :-)

seriously: the ripe ncc was not conceived as a registry but as an association 
of operators where they can organise common activities that require neutrality, 
expertise and common funding. so whether it is a 'registry job' is irrelevant 
in our context as long as the community agrees it is useful and the membership 
of the association agrees to fund it with their fees. the huge overlap between 
community at large and paying membership keeps this consistent. 

daniel 

--
Sent from a hand held device.

Re: Why IPv6 isn't ready for prime time :-)

2014-03-28 Thread Timothy Morizot
On Mar 27, 2014 8:01 PM, Tim Durack tdur...@gmail.com wrote:

 NANOG arguments on IPv6 SMTP spam filtering.

 Deutsche Telecom discusses IPv4-IPv6 migration:

 https://ripe67.ripe.net/presentations/131-ripe2-2.pdf

 Facebook goes public with their IPv4-IPv6 migration:


http://www.internetsociety.org/deploy360/blog/2014/03/facebooks-extremely-impressive-internal-use-of-ipv6/

 If you haven't started, you've got some work to do.

Indeed. Having been deeply involved leading the technical side of our
transition at my organiati


Re: IPv6 isn't SMTP

2014-03-28 Thread Blake Hudson


Barry Shein wrote the following on 3/27/2014 6:32 PM:

On March 27, 2014 at 14:16 bl...@ispn.net (Blake Hudson) wrote:
  
   Barry Shein wrote the following on 3/27/2014 2:06 PM:
   
   
I suppose the obvious question is: What's to stop a spammer from
putting a totally legitimate key into their spam?
   
   It's entirely likely that a spammer would try to get a hold of a key due
   to its value or that someone you've done business with would share keys
   with a business partner . But ideally you'd authorize each sender with
   a unique key (or some sort of pair/combination). So that 1) you can tell
   who the spammer sourced the key from and 2) you can revoke the
   compromised key's authorization to send you subsequent email messages.
  
   There's probably some way to generate authorization such that each
   sender gets a unique key or a generic base is in some way salted or
   combined with information from the individual you're giving your
   authorization to such that the result is both unique and identifiable.

Ok, this is a form of whitelisting with some authentication using
public key technology.

Sure. But is this really the problem you run into much? Someone
impersonating a sender you consider whitelisted?

I'm sure it happens.

But at a systems level I think most of us are talking about the much
more nefarious non-stop fire-hose of pure sewage.

Some white list, but for many that runs too great a risk of rejecting
serendipity, that great job offer from someone who was impressed by a
post you made on NANOG, etc.

So we get Challenge-Response etc as a workaround, which also has
problems.

Well, whatever, SPAM IS A BIG SUBJECT and there are a lot of
perspectives.

P.S. I always figured the problem you describe could be very trivially
solved by just agreeing to stick some word in the header like:

  X-PassCode: swordfish

It's not like anyone but the sender is likely to know that unless they
really are in your mail stream in which case you have other problems.

It would be nice if that were automated but it could be done manually.

I have certain Subject: phrases I use with people, some funny, so they
know it's almost certainly me.


You're on the right track with what I was proposing. While spoofing can 
be addressed, it's not the primary goal. The idea was to verify whether 
an incoming email was authorized or not. Authentication is just a prereq 
to that. It is up to the recipient to choose what to do with 
unauthorized mail: Treat them the same as any other, tag them, put them 
in a separate folder or quarantine, reject them, or send them to the bit 
bucket. This may be a list, but I wouldn't consider a whitelist unless 
implemented as such by the user/client.




Re: ARIN board accountability to network operators (was: RE: [arin-ppml] [arin-discuss] Term Limit Proposal)

2014-03-28 Thread Sander Steffann
Hi Owen,

 I, for one, would not want to start having to pay RIPE-level fees.
 
 ARIN fees are a much better deal than RIPE fees.

Only up to Small... The RIPE NCC membership fee is €1750 (±$2400 currently) for 
everybody. The ARIN fees are between $500 and $32000, with category Small at 
$2000 and Medium at $4000. I personally am glad about this (although in ARIN I 
would probably be Small) because it doesn't give operators any financial 
incentive to stingy when giving their customers IPv6 prefixes.

If you want to give a million customers a /48 it is not going to cost you more 
then giving them a /60. IPv6 resources are not such a scarce resource compared 
to IPv4, so differentiating price based on the amount of integers you need 
doesn't make much sense in the current world anymore :)

But: this is all RIPE NCC members/AGM stuff, independent of the RIPE community 
and its working groups. (well the RIPE NCC facilitates the RIPE meetings (note: 
RIPE meeting, not RIPE NCC meeting) and without the help of the NCC the RIPE 
community wouldn't have such well organised meetings. The NCC only facilitates 
though, it doesn't control or influence the RIPE working groups) and the 
structure of the RIPE working groups was what Randy was referring to.

Cheers,
Sander




Re: Why IPv6 isn't ready for prime time :-)

2014-03-28 Thread Timothy Morizot
Hmmm. Phone accidentally sent email before it was finished.

Indeed. Having been deeply involved leading the technical side of our
transition at my organization for the past three years, I think those who
wait until the IPv6/IPv4 divide is roughly 50/50 or later are going to be
in for a world of hurt.


Re: why IPv6 isn't ready for prime time, SMTP edition

2014-03-28 Thread Owen DeLong

On Mar 28, 2014, at 5:27 AM, Brandon Ross br...@pobox.com wrote:

 On Thu, 27 Mar 2014, Owen DeLong wrote:
 
 On Mar 27, 2014, at 1:38 PM, Brandon Ross br...@pobox.com wrote:
 
 On Thu, 27 Mar 2014, Owen DeLong wrote:
 
 On Mar 27, 2014, at 11:15 AM, Barry Shein b...@world.std.com wrote:
 
 Please explain in detail where the fraud potential comes in.
 
 Spammer uses his botnet of zombie machines to send email from each of them 
 to his own domain using the user's legitimate email address as From:. 
 Spammer says it was unsolicited and keeps the full $.10/email that victim 
 users have deposited into this escrow thing.
 
 Sounds a lot more profitable than regular spam.
 
 You say this like having a tax on running a botted computer on the internet 
 would be a bad thing.
 
 Heh, perhaps not...
 
 I agree that it would provide a bit of profit to the spammers for a very 
 short period of time, but I bet it would get a lot of bots fixed pretty 
 quick.
 
 I don't think so.  The motivations to continue to game the system are much 
 stronger under this scheme because the profits are immediate and direct. A 
 spammer no longer has to just hope that the advertising, phishing or whatever 
 they are up to is acted upon by the user, instead they get a somewhat 
 immediate cash payout that's not dependent on the user.

This assumes a different economic model of SPAM that I have been lead to 
believe exists.

My understanding is that the people sending the SPAM get paid immediately and 
that the people paying them to send it are the ones hoping that the 
advertising/phishing/etc. are acted on.

Owen




Re: why IPv6 isn't ready for prime time, SMTP edition

2014-03-28 Thread Brandon Ross

On Fri, 28 Mar 2014, Owen DeLong wrote:

This assumes a different economic model of SPAM that I have been lead to 
believe exists.


My understanding is that the people sending the SPAM get paid 
immediately and that the people paying them to send it are the ones 
hoping that the advertising/phishing/etc. are acted on.


Fine, then the people paying the people who do the spamming have more of 
an incentive to pay higher rates and more spammers.  It doesn't really 
matter how may layers of abstraction there are, the point is that the main 
motivator has become more attractive.


--
Brandon Ross  Yahoo  AIM:  BrandonNRoss
+1-404-635-6667ICQ:  2269442
 Skype:  brandonross
Schedule a meeting:  http://www.doodle.com/bross



Re: ARIN board accountability to network operators (was: RE: [arin-ppml] [arin-discuss] Term Limit Proposal)

2014-03-28 Thread Owen DeLong

On Mar 28, 2014, at 5:58 AM, Sander Steffann san...@steffann.nl wrote:

 Hi Owen,
 
 I, for one, would not want to start having to pay RIPE-level fees.
 
 ARIN fees are a much better deal than RIPE fees.
 
 Only up to Small... The RIPE NCC membership fee is €1750 (±$2400 currently) 
 for everybody. The ARIN fees are between $500 and $32000, with category Small 
 at $2000 and Medium at $4000. I personally am glad about this (although in 
 ARIN I would probably be Small) because it doesn't give operators any 
 financial incentive to stingy when giving their customers IPv6 prefixes.
 
 If you want to give a million customers a /48 it is not going to cost you 
 more then giving them a /60. IPv6 resources are not such a scarce resource 
 compared to IPv4, so differentiating price based on the amount of integers 
 you need doesn't make much sense in the current world anymore :)
 
 But: this is all RIPE NCC members/AGM stuff, independent of the RIPE 
 community and its working groups. (well the RIPE NCC facilitates the RIPE 
 meetings (note: RIPE meeting, not RIPE NCC meeting) and without the help of 
 the NCC the RIPE community wouldn't have such well organised meetings. The 
 NCC only facilitates though, it doesn't control or influence the RIPE working 
 groups) and the structure of the RIPE working groups was what Randy was 
 referring to.



Compare and contrast the costs of being a PI holding end-user in the RIPE 
region to those in the ARIN region and the difference becomes much more 
noticeable.

Owen




Re: why IPv6 isn't ready for prime time, SMTP edition

2014-03-28 Thread Valdis . Kletnieks
On Fri, 28 Mar 2014 06:22:32 -0700, Owen DeLong said:

 This assumes a different economic model of SPAM that I have been lead to
 believe exists.

 My understanding is that the people sending the SPAM get paid immediately and
 that the people paying them to send it are the ones hoping that the 
 advertising/
 phishing/etc. are acted on.

Only because we haven't given them a way to monetize it immediately.


pgpIKbGXYKjph.pgp
Description: PGP signature


Re: ARIN board accountability to network operators (was: RE: [arin-ppml] [arin-discuss] Term Limit Proposal)

2014-03-28 Thread Sander Steffann
Hi Owen,

 Compare and contrast the costs of being a PI holding end-user in the RIPE 
 region to those in the ARIN region and the difference becomes much more 
 noticeable.

Yeah, RIPE NCC is definitely much cheaper for PI: no initial registration fee 
of ≥$500. The maintenance cost is $100/year vs €100/year (±$137) so there is a 
little difference there. The $37 difference will take at least 13.5 years to 
make up for the $500 though. And that is just for up to a /22. The $4000 
initial fee for a /16 PI would take you more than a hundred years :)

So yes: for PI the difference is much more noticeable, in favour of the RIPE 
NCC :)

Cheers,
Sander




Re: ARIN board accountability to network operators

2014-03-28 Thread Nick Hilliard
On 28/03/2014 14:03, Sander Steffann wrote:
 Yeah, RIPE NCC is definitely much cheaper for PI: no initial
 registration fee of ≥$500. The maintenance cost is $100/year vs
 €100/year (±$137) so there is a little difference there. The $37

€50 per PI assignment from the ripe ncc, no?

http://www.ripe.net/ripe/docs/ripe-591

Nick





3356 leaking routes out 3549 lately?

2014-03-28 Thread David Hubbard
Has anyone had issues with Level 3 leaking advertisements out their
Global Crossing AS3356 for customers of 3549, but not accepting the
traffic back?  We've been encountering this more and more recently,
bgpmon always detects it, and all we ever get from them is there's
nothing wrong.  Today it affected CloudFlare's ability to talk to us.
It seems to happen mostly with Europe and Asian peering points.
Typically lasts five to ten minutes which makes me think someone working
on merging the two networks is doing some 'no one will notice this'
changes in the middle of the night.

David



Re: Why IPv6 isn't ready for prime time : -)

2014-03-28 Thread John Levine
Indeed. Having been deeply involved leading the technical side of our
transition at my organiati

Yeah, IPv6 can be like that.

Helpfully,
John






Re: ARIN board accountability to network operators (was: RE: [arin-ppml] [arin-discuss] Term Limit Proposal)

2014-03-28 Thread Lee Howard


On 3/27/14 6:42 PM, Randy Bush ra...@psg.com wrote:

nanog is a separable game.  it is currently very confused between form
and substance, making committees for everything.  like the bcop thing.
two organizations, nanog and isoc, forming organizational structures to
create a document store.  the ops' doc store is ripe's because the ripe
wgs produced work and someone realized they needed a place to stash it.

I like this example, but not sure how it could apply here.  Need a NANOG
document series?  It wouldn't be an ARIN document series, would it?  Or
did I miss the point of your example?




i purposefully phrased it a bit differently, how can arin engage, get
real participation from, and serve its community, the operators.  i was
stealing examples from ripe.

but, for concrete action, how about a half day session at the next nanog
meeting on, for example, arin database services, whois and irr.  not to
try to reach hard conclusions or plans.  but to open a dialog to explore
what the community gets and wants from these services and how they are
provided.

I like this example.
I also appreciate the policy hour, where NANOG attendees get a few minutes
on ARIN proposals. 

In another message you complimented the RIPE Atlas project. I like the
work from APNIC's labs, too.  I also like LACNIC's development projects,
FRIDA, +RAICES, and education efforts. Would these kinds of efforts be in
scope for ARIN?  Does ARIN need a Chief Scientist (a la Karrenberg or
Huston)? Or is that a NANOG role, since it might include things outside of
management of number resources?

I think North American operators are missing some advantages of the
closely coordinated RIR/NOG operations in other regions, and I would like
to see them closer together here.  Unfortunately, it is not clear to me
that the examples above are in charter for either NANOG or ARIN. I'd be
happy to re-charter either, but that's probably a topic for NANOG-futures.



or pick another key service.

DNS?  DNSsec?
Security?





randy

Lee





Re: anti-spam WKBIs, was why IPv6 isn't ready for prime time, SMTP edition

2014-03-28 Thread John Levine
You say this like having a tax on running a botted computer on the internet 
would be a bad thing.

I agree that it would provide a bit of profit to the spammers for a very short 
period of time, but I bet it would get
a lot of bots fixed pretty quick.

What would actually happen is that the users would refuse to pay their
ISPs for their bot mail, the ISPs would refuse to pay the recipients,
and the whole thing would collapse.  Like I said in my decade old
white paper, the problems when real money are involved will be worse
than the ones they purport to solve.

On the other hand, if you plan to go ahead with this WKBI, I'll let
Phil Raymond know.  He'd love to do something with that patent.

R's,
John



Re: WISP or other options

2014-03-28 Thread Nick

Thanks for all the ideas.

Right now, Im talking with Maxwifi. Go the route of letting them deal 
with everything.


Im still exploring other cheaper options:
 A) 3G/4G wireless service.  A Orange rep is building a data plan to 
support 160 devices and to find out data usage in the area and available 
bandwidth.
 B) Getting wireless service from the near by datacenter(~6 miles away 
in South Gyle).


Can anyone recommended a good 3G/4G router? The follow link looks good. 
http://www.proroute.co.uk/proroute-4g-routers/proroute-h820-4g-router/


Would it be better to run one 4G route or bond many of cheap hotspot?


Thanks,
Nick Poulakos



Re: why IPv6 isn't ready for prime time, SMTP edition

2014-03-28 Thread Owen DeLong

On Mar 28, 2014, at 6:30 AM, Brandon Ross br...@pobox.com wrote:

 On Fri, 28 Mar 2014, Owen DeLong wrote:
 
 This assumes a different economic model of SPAM that I have been lead to 
 believe exists.
 
 My understanding is that the people sending the SPAM get paid immediately 
 and that the people paying them to send it are the ones hoping that the 
 advertising/phishing/etc. are acted on.
 
 Fine, then the people paying the people who do the spamming have more of an 
 incentive to pay higher rates and more spammers.  It doesn't really matter 
 how may layers of abstraction there are, the point is that the main motivator 
 has become more attractive.

Perhaps… But I’m not convinced.

Today we have more than sufficient motivation to continue to game the system 
and virtually no incentive to make the system less open to gaming.

While I agree this would increase economic incentives to game the system 
slightly, it would also add some rather strong incentives to improve security 
and make the process of gaming much harder.

Perhaps this isn’t a good solution, but it certainly cannot be argued that what 
we are doing so far is working.

Owen




Re: ARIN board accountability to network operators

2014-03-28 Thread Sander Steffann
Oops. /me was confused. €50 indeed!

Met vriendelijke groet,
Sander Steffann

 Op 28 mrt. 2014 om 15:20 heeft Nick Hilliard n...@foobar.org het volgende 
 geschreven:
 
 On 28/03/2014 14:03, Sander Steffann wrote:
 Yeah, RIPE NCC is definitely much cheaper for PI: no initial
 registration fee of ≥$500. The maintenance cost is $100/year vs
 €100/year (±$137) so there is a little difference there. The $37
 
 €50 per PI assignment from the ripe ncc, no?
 
 http://www.ripe.net/ripe/docs/ripe-591
 
 Nick
 
 



Weekly Routing Table Report

2014-03-28 Thread Routing Analysis Role Account
This is an automated weekly mailing describing the state of the Internet
Routing Table as seen from APNIC's router in Japan.

The posting is sent to APOPS, NANOG, AfNOG, AusNOG, SANOG, PacNOG, LacNOG,
TRNOG, CaribNOG and the RIPE Routing Working Group.

Daily listings are sent to bgp-st...@lists.apnic.net

For historical data, please see http://thyme.rand.apnic.net.

If you have any comments please contact Philip Smith pfsi...@gmail.com.

Routing Table Report   04:00 +10GMT Sat 29 Mar, 2014

Report Website: http://thyme.rand.apnic.net
Detailed Analysis:  http://thyme.rand.apnic.net/current/

Analysis Summary


BGP routing table entries examined:  489473
Prefixes after maximum aggregation:  192590
Deaggregation factor:  2.54
Unique aggregates announced to Internet: 241381
Total ASes present in the Internet Routing Table: 46469
Prefixes per ASN: 10.53
Origin-only ASes present in the Internet Routing Table:   35716
Origin ASes announcing only one prefix:   16381
Transit ASes present in the Internet Routing Table:6035
Transit-only ASes present in the Internet Routing Table:173
Average AS path length visible in the Internet Routing Table:   4.6
Max AS path length visible:  53
Max AS path prepend of ASN ( 50404)  51
Prefixes from unregistered ASNs in the Routing Table:  1863
Unregistered ASNs in the Routing Table: 476
Number of 32-bit ASNs allocated by the RIRs:   6256
Number of 32-bit ASNs visible in the Routing Table:4718
Prefixes from 32-bit ASNs in the Routing Table:   15266
Number of bogon 32-bit ASNs visible in the Routing Table:50
Special use prefixes present in the Routing Table:0
Prefixes being announced from unallocated address space:444
Number of addresses announced to Internet:   2662858628
Equivalent to 158 /8s, 183 /16s and 255 /24s
Percentage of available address space announced:   71.9
Percentage of allocated address space announced:   71.9
Percentage of available address space allocated:  100.0
Percentage of address space in use by end-sites:   96.0
Total number of prefixes smaller than registry allocations:  170530

APNIC Region Analysis Summary
-

Prefixes being announced by APNIC Region ASes:   116226
Total APNIC prefixes after maximum aggregation:   34666
APNIC Deaggregation factor:3.35
Prefixes being announced from the APNIC address blocks:  118899
Unique aggregates announced from the APNIC address blocks:49753
APNIC Region origin ASes present in the Internet Routing Table:4908
APNIC Prefixes per ASN:   24.23
APNIC Region origin ASes announcing only one prefix:   1230
APNIC Region transit ASes present in the Internet Routing Table:855
Average APNIC Region AS path length visible:4.7
Max APNIC Region AS path length visible: 25
Number of APNIC region 32-bit ASNs visible in the Routing Table:879
Number of APNIC addresses announced to Internet:  729984896
Equivalent to 43 /8s, 130 /16s and 175 /24s
Percentage of available APNIC address space announced: 85.3

APNIC AS Blocks4608-4864, 7467-7722, 9216-10239, 17408-18431
(pre-ERX allocations)  23552-24575, 37888-38911, 45056-46079, 55296-56319,
   58368-59391, 63488-63999, 131072-133631
APNIC Address Blocks 1/8,  14/8,  27/8,  36/8,  39/8,  42/8,  43/8,
49/8,  58/8,  59/8,  60/8,  61/8, 101/8, 103/8,
   106/8, 110/8, 111/8, 112/8, 113/8, 114/8, 115/8,
   116/8, 117/8, 118/8, 119/8, 120/8, 121/8, 122/8,
   123/8, 124/8, 125/8, 126/8, 133/8, 150/8, 153/8,
   163/8, 171/8, 175/8, 180/8, 182/8, 183/8, 202/8,
   203/8, 210/8, 211/8, 218/8, 219/8, 220/8, 221/8,
   222/8, 223/8,

ARIN Region Analysis Summary


Prefixes being announced by ARIN Region ASes:166997
Total ARIN prefixes after maximum aggregation:83020
ARIN Deaggregation factor: 2.01
Prefixes being announced from the ARIN address blocks:   168430
Unique aggregates announced from the ARIN address blocks: 78330
ARIN Region origin ASes present in the Internet Routing Table:16204
ARIN 

2nd. Call for Papers and Participation - I Workshop pre-IETF (Side Event to CSBC 2014)

2014-03-28 Thread Juliao Braga


Re: Access Lists for Subscriber facing ports?

2014-03-28 Thread Blake Hudson

Shawn L wrote the following on 3/27/2014 7:44 AM:

With all of the new worms / denial of service / exploits, etc. that are
coming out, I'm wondering what others are using for access-lists on
residential subscriber-facing ports.

We've always taken the stance of 'allow unless there is a compelling reason
not to', but with everything that is coming out lately, I'm not sure that's
the correct position any more.

thanks
By default on all devices and customers we enforce BCP 38 as close to 
the subscriber as possible (as well as any other L2/L3 abuse mitigation 
techniques that the equipment supports well), and possibly again at the 
network border.


On residential accounts we only consider blocking TCP/UDP ports  1024 
and even then that typically means blocking just SMB (135-139, 445). 
With SMB blocking becoming a largely irrelevent need given the move to 
more secure Windows versions, OS firewalls, and firewall enabled CPEs.


In the context of an ISP, I very strongly believe in a policy of 
non-blocking and neutrality. If there's an issue with telco provided CPE 
that is running services accessible via the WAN (DNS, Telnet, etc), 
that's an issue best addressed at the CPE level, although temproary ACLs 
could be applied upstream. If a customer is running their own vulnerable 
equipment, we may try to notify him or her, but if it does not impact 
service to other subscribers then we won't go through too many hoops to 
educate them.


--Blake





Re: 3356 leaking routes out 3549 lately?

2014-03-28 Thread Chip Marshall
On 2014-03-28, David Hubbard dhubb...@dino.hostasaurus.com sent:
 Has anyone had issues with Level 3 leaking advertisements out their
 Global Crossing AS3356 for customers of 3549, but not accepting the
 traffic back?  We've been encountering this more and more recently,
 bgpmon always detects it, and all we ever get from them is there's
 nothing wrong.  Today it affected CloudFlare's ability to talk to us.
 It seems to happen mostly with Europe and Asian peering points.
 Typically lasts five to ten minutes which makes me think someone working
 on merging the two networks is doing some 'no one will notice this'
 changes in the middle of the night.

I'm not sure if it's the same thing, but I've had a few alerts
from Renesys lately seeing a path to my AS via GLBX 3549 that
shouldn't exist, as we only have connections with Level 3 3356.

For example, Renesys reports x 3549 33517 where it should only
be able to see x 3356 33517 or maybe x 3549 3356 33517.

(Due to Renesys policy, I can't know what x is)

-- 
Chip Marshall c...@2bithacker.net
http://2bithacker.net/


pgpUcrBhQwmHj.pgp
Description: PGP signature


Re: arin representation

2014-03-28 Thread Doug Barton

On 3/24/2014 9:03 PM, Owen DeLong wrote:

[0] As a member of the nominating committee in question, I will disagree with
your claim that our declining to nominate you constitutes rigging the election.
While I can’t disclose the details due to NDA restrictions on the NomCom,
I will say that in my experience having served on the NomCom several times,
they consider each potential nominee and do not take their duties lightly.


There is a simple way to solve this problem and indemnify the nomcom 
against all further such claims. Let anyone volunteer for a spot on the 
ballot. Let the membership decide who should be elected.


Doug




Re: Cisco Security Advisory

2014-03-28 Thread Scott Weeks


On 3/27/2014 7:44 PM, Alexander Neilson wrote:
 I wonder if they should be invited to only post a single message with
 the titles and links to the alerts so that people can follow it up.
--


If a person is on multiple of *NOG mailing lists a lot of these're 
received.  For example, I got well over 30 of them this round.  It'd be 
nice to get something brief like this:


--
The Semiannual Cisco IOS Software Security Advisory has been released.

For information please goto this URL:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar14.html

Advisory titles:
- Session Initiation Protocol Denial of Service Vulnerability
- Cisco 7600 Series Route Switch Processor 720 with 10 Gigabit Ethernet Uplinks 
Denial of Service Vulnerability
- Internet Key Exchange Version 2 Denial of Service Vulnerability
- Network Address Translation Vulnerabilities
- SSL VPN Denial of Service Vulnerability
- Crafted IPv6 Packet Denial of Service Vulnerability
---

Not everyone uses cisco and not everyone needs to see every vulnerability
detail email multiple times.  Imagine if all vendors started doing what
cisco is doing.

:-(

scott



Re: arin representation

2014-03-28 Thread Jared Mauch

On Mar 25, 2014, at 12:53 PM, Bob Evans b...@fiberinternetcenter.com wrote:

 Like every governing body, it's easy to criticize it. However, if it were
 some big monopoly with giant hidden agendas accomplished behind closed
 doors, I wouldn't see networks like Verizon disappointed at an ARIN
 meeting as their perspective was being over ruled by the majority. I have
 seen this at a meeting when Verizon decided to go purchase IPv4 space in
 the marketplace as they could not obtain what they tried to justify. It
 would have been a huge chunk of what remained. The IPv4 marketplace grew
 even more that week.
 
 I like term limits for every governing body - except when it's a company I
 built with my money.  :-)

I've seen term limits significantly harm organizations due to the churn that
can happen as a result.  Folks aren't as invested long-term as a consequence.

This can clearly cut both ways resulting in some positions being protected 
longer
than they should, or allowing the entire vote the bums out crowd to cause
unstable behavior afterwards.

I believe there are things that ARIN could do better but don't have
the time to invest in the process to correct these.  I do take time
to lobby those who I know that are involved in the process and express
my opinion of the ways that ARIN could do a better service for the community.

- Jared


Re: 3356 leaking routes out 3549 lately?

2014-03-28 Thread Jared Mauch

On Mar 28, 2014, at 3:42 PM, Chip Marshall c...@2bithacker.net wrote:

 On 2014-03-28, David Hubbard dhubb...@dino.hostasaurus.com sent:
 Has anyone had issues with Level 3 leaking advertisements out their
 Global Crossing AS3356 for customers of 3549, but not accepting the
 traffic back?  We've been encountering this more and more recently,
 bgpmon always detects it, and all we ever get from them is there's
 nothing wrong.  Today it affected CloudFlare's ability to talk to us.
 It seems to happen mostly with Europe and Asian peering points.
 Typically lasts five to ten minutes which makes me think someone working
 on merging the two networks is doing some 'no one will notice this'
 changes in the middle of the night.
 
 I'm not sure if it's the same thing, but I've had a few alerts
 from Renesys lately seeing a path to my AS via GLBX 3549 that
 shouldn't exist, as we only have connections with Level 3 3356.
 
 For example, Renesys reports x 3549 33517 where it should only
 be able to see x 3356 33517 or maybe x 3549 3356 33517.
 
 (Due to Renesys policy, I can't know what x is)

It's been a few years i think now since the level-crossing merger
so I'm certainly not surprised to see them doing work on this front.

This often happens during integration work, and networks of that scale
I would imagine tools that detect routing leaks need to account for this
merger activity.

I can see I need to update my tools :)

http://puck.nether.net/bgp/leakinfo.cgi?search=dosearch_prefix=search_aspath=3549_3356search_asn=recent=1000

http://puck.nether.net/bgp/leakinfo.cgi?search=dosearch_prefix=search_aspath=3356_3549search_asn=recent=1000


Re: why IPv6 isn't ready for prime time, SMTP edition

2014-03-28 Thread Barry Shein

On March 28, 2014 at 00:06 o...@delong.com (Owen DeLong) wrote:
   Advertising is a valuable commodity.  Free advertising is particularly
   valuable, ROI with I close to zero.
  
  But it?s only free if you send it to yourself and then approve it. Any 
  message you send to someone else who doesn?t want it isn?t free.

I thought the suggestion was that a recipient (email, or by analogy
postal) could indicate they wanted an email which would cancel the
postage attached, that is, no charge to sender if they wanted it.

So if a spammer or junk mailer could, say, trick you into accepting
mail in those schemes then they get free advertising, no postage
anyhow.

We're getting lost in the metaphors methinks.

  
   So offering to not charge you because you wanted that mail makes no
   sense, right?
  
  But this isn?t a charge for the post office and by the time you?re connected 
  to the internet, the cost of receiving the mail and transporting it and the 
  sender sending it is pretty much sunk by some arguments.

FIRST: There's a typo/thinko in my sentence!

Should be:

  So offering to not charge THE SENDER because THE RECIPIENT wanted
  that mail makes no sense, right?

SECOND:

In response, someone has to scale resources to match volume.

But maybe my typo/thinko confused this because you know that, sorry.

  
  This is an effort to provide a financial disincentive for spamming.

Did I say that or you? I agree!

Possibly with myself. Which judging by my just previous comments is
not always a given.

   If you want to attach e-postage you have to go get some and that can
   be a contract which says you don't do that, if you have multiple
   accounts you split it among your accounts or buy more. And if you do
   what you describe you understand that it is criminal fraud. Click
   Agree [ ] before proceeding, or similar.
  
  Because spammers are all on the up and up and never commit fraud in order to 
  send their SPAM, right?

I'm trying to create an economics around enforcement.

But it's helpful to convince the relatively honest public that what
you describe is a serious crime tantamount to counterfeiting.

And we don't want to be in a situation like we were in 1996 where we
were debating whether Spam is even a crime.

Enforcement is your usual avoidance, detection, recovery, sort of
affair. But there has to be an economics pushing it or it gets mostly
ignored (except for people complaining about spam.)

Compare and contrast for example spamming vs RIAA style enforcement of
copyright violations.

Spamming? The occasional shutdown of a botnet tho those may be more
motivated by DDoS and phishing.

Copyright? Megaupload, wham, Bit torrents, wham, site takedowns, RIAA
lawsuits, wham wham wham. Lawyers, guns, and money.

What's the difference? Clear monied interests in the latter.

  
   Who can't operate with 1M msgs/day?
   
   Well, maybe Amazon or similar.
   
   But as I said earlier MAYBE THEY SHOULD PAY ALSO!
   
   I, for one, don?t want my Amazon prices increased by a pseudo-tax on the 
   fact that they do a large volume of email communications with their 
   customers. They have enough problems trying to get IPv6 deployed without 
   adding this to their list of problems.
   
   That assumes that spam is free for them, and you. Including free as
   in stealing your time?.
  
  No, it assumes that most of the messages I get from Amazon are NOT SPAM.

And I'm arguing we need to change our attitudes on this.

This whole idea that because the recipient wants it it isn't spam is
wearing thin.

Just like my analogy with the post office, they wouldn't deliver mail
for free just because the recipient wanted it.

It's a fundamentally broken idea and spam is its bastard offspring.

  The vast majority of messages I get from Amazon are order confirmations, 
  shipping status reports, etc. Messages related to transactions I have 
  conducted with them. Yes, I get a little bit of SPAM from them and I 
  wouldn?t mind seeing them forced to pay me for those messages, but I 
  certainly don?t want to see them paying for every message they send.

The vast majority of paper mail I get from my bank accounts is useful
and informative and often legally important.

But every one of them has postage attached.

But maybe there could be some way to reverse charges like you can with
fedex and similar.

When you sign up with Amazon et al you also enter your (free)
e-postage cert (whatever, some cookie) giving them permission to
charge against it for some list of mutually agreeable emailings like
order confirms and maybe even marketing materials.

There are some implementation details involved but it doesn't strike
me as a crazy idea.

  
   We really need to get over the moral component of spam content (and
   senders' intentions) and see it for what it is: A free ride anyone
   would take if available.
   
   I disagree. I see it as a form of theft of service that only immoral 
   thieves would take if available.
   
   

The Cidr Report

2014-03-28 Thread cidr-report
This report has been generated at Fri Mar 28 21:13:59 2014 AEST.
The report analyses the BGP Routing Table of AS2.0 router
and generates a report on aggregation potential within the table.

Check http://www.cidr-report.org/2.0 for a current version of this report.

Recent Table History
Date  PrefixesCIDR Agg
21-03-14494294  278866
22-03-14495055  279654
23-03-14495459  279808
24-03-14495254  277341
25-03-14492381  277631
26-03-14492485  277939
27-03-14492416  277972
28-03-14492834  278168


AS Summary
 46632  Number of ASes in routing system
 19077  Number of ASes announcing only one prefix
  3626  Largest number of prefixes announced by an AS
AS28573: 
  119829504  Largest address span announced by an AS (/32s)
AS4134 : 


Aggregation Summary
The algorithm used in this report proposes aggregation only
when there is a precise match using the AS path, so as 
to preserve traffic transit policies. Aggregation is also
proposed across non-advertised address space ('holes').

 --- 28Mar14 ---
ASnumNetsNow NetsAggr  NetGain   % Gain   Description

Table 493014   278159   21485543.6%   All ASes

AS6389  3008   56 295298.1%   
AS28573 3626  797 282978.0%   
AS17974 2777  160 261794.2%   
AS4766  2972  905 206769.5%   
AS18881 1917   35 188298.2%   
AS1785  2194  370 182483.1%   
AS18566 2048  565 148372.4%   
AS36998 1637  175 146289.3%   
AS4323  2943 1520 142348.4%   
AS10620 2804 1478 132647.3%   
AS7303  1750  456 129473.9%   
AS4755  1843  615 122866.6%   
AS7545  2233 1092 114151.1%   
AS7552  1229  121 110890.2%   
AS22561 1304  247 105781.1%   
AS6983  1328  315 101376.3%   
AS22773 2413 1449  96440.0%   
AS4808  1359  425  93468.7%   
AS9829  1621  716  90555.8%   
AS24560 1123  297  82673.6%   
AS18101  918  163  75582.2%   
AS7738   912  161  75182.3%   
AS8151  1405  654  75153.5%   
AS701   1484  755  72949.1%   
AS855759   56  70392.6%   
AS4788  1000  306  69469.4%   
AS6147   784  113  67185.6%   
AS4780  1030  366  66464.5%   
AS9808   967  317  65067.2%   
AS8551   966  321  64566.8%   

Total  52354150063734871.3%   Top 30 total


Possible Bogus Routes

27.100.7.0/24AS56096 
41.73.1.0/24 AS37004 
41.73.2.0/24 AS37004 
41.73.10.0/24AS37004 
41.73.11.0/24AS37004 
41.73.12.0/24AS37004 
41.73.13.0/24AS37004 
41.73.14.0/24AS37004 
41.73.15.0/24AS37004 
41.73.16.0/24AS37004 
41.73.18.0/24AS37004 
41.73.20.0/24AS37004 
41.73.21.0/24AS37004 
41.76.48.0/21AS36969 
41.78.120.0/23   AS22351 
41.78.236.0/24   AS37290 
41.78.237.0/24   AS37290 
41.78.238.0/24   AS37290 
41.78.239.0/24   AS37290 
41.190.72.0/23   AS37451 
41.190.74.0/23   AS37451 
41.191.108.0/22  AS37004 
41.191.108.0/24  AS37004 
41.191.109.0/24  AS37004 
41.191.110.0/24  AS37004 
41.191.111.0/24  AS37004 
41.217.208.0/22  AS37158 
62.61.220.0/24   AS24974 
62.61.221.0/24   AS24974 
63.247.0.0/19AS226   
63.247.0.0/24AS27609 
63.247.1.0/24AS27609 
63.247.2.0/24AS27609 
63.247.3.0/24AS27609 
63.247.4.0/24AS27609 
63.247.5.0/24AS27609 
63.247.6.0/24AS27609 
63.247.7.0/24AS27609 
63.247.8.0/24AS27609 
63.247.9.0/24AS27609 
63.247.10.0/24   AS27609 
63.247.11.0/24   AS27609 
63.247.13.0/24   AS27609 
63.247.14.0/24   AS27609 
63.247.15.0/24   AS27609 
63.247.16.0/24   AS27609 
63.247.17.0/24   AS27609 
63.247.18.0/24   AS27609 
63.247.19.0/24   AS27609 
63.247.20.0/24   AS27609 
63.247.21.0/24   AS27609 
63.247.22.0/24   AS27609 
63.247.23.0/24   AS27609 
63.247.24.0/24   AS27609 
63.247.25.0/24   AS27609 
63.247.26.0/24   AS27609 
63.247.27.0/24   AS27609 

BGP Update Report

2014-03-28 Thread cidr-report
BGP Update Report
Interval: 20-Mar-14 -to- 27-Mar-14 (7 days)
Observation Point: BGP Peering with AS131072

TOP 20 Unstable Origin AS
Rank ASNUpds %  Upds/PfxAS-Name
 1 - AS483741011  1.4%  60.8 -- CHINA169-BACKBONE CNCGROUP 
China169 Backbone
 2 - AS840235505  1.2%  18.7 -- CORBINA-AS OJSC Vimpelcom
 3 - AS982935504  1.2%  22.6 -- BSNL-NIB National Internet 
Backbone
 4 - AS29571   31812  1.1% 170.1 -- CITelecom-AS
 5 - AS25184   28844  1.0% 225.3 -- AFRANET AFRANET Co. Tehran, Iran
 6 - AS45169   24876  0.9%1658.4 -- GLOBAL-DESCON-AS-AP Descon 
Limited
 7 - AS28573   24765  0.9%   6.7 -- NET Serviços de Comunicação S.A.
 8 - AS13118   22468  0.8% 488.4 -- ASN-YARTELECOM OJSC Rostelecom
 9 - AS41691   20828  0.7% 867.8 -- SUMTEL-AS-RIPE Summa Telecom LLC
10 - AS755220276  0.7%  17.6 -- VIETEL-AS-AP Viettel Corporation
11 - AS50710   19542  0.7%  86.9 -- EARTHLINK-AS EarthLink Ltd. 
CommunicationsInternet Services
12 - AS36998   18568  0.6%  11.3 -- SDN-MOBITEL
13 - AS815118305  0.6%  13.0 -- Uninet S.A. de C.V.
14 - AS35819   18279  0.6%  36.0 -- MOBILY-AS Etihad Etisalat 
Company (Mobily)
15 - AS17974   18025  0.6%   6.5 -- TELKOMNET-AS2-AP PT 
Telekomunikasi Indonesia
16 - AS48159   16354  0.6%  89.9 -- TIC-AS Telecommunication 
Infrastructure Company
17 - AS453816280  0.6%  30.4 -- ERX-CERNET-BKB China Education 
and Research Network Center
18 - AS17557   15697  0.5% 130.8 -- PKTELECOM-AS-PK Pakistan 
Telecommunication Company Limited
19 - AS980815203  0.5%  15.7 -- CMNET-GD Guangdong Mobile 
Communication Co.Ltd.
20 - AS45899   14515  0.5%  39.3 -- VNPT-AS-VN VNPT Corp


TOP 20 Unstable Origin AS (Updates per announced prefix)
Rank ASNUpds %  Upds/PfxAS-Name
 1 - AS20450   14151  0.5%7075.5 -- THL16-ASN - Trojan Hosting, LLC.
 2 - AS544658022  0.3%2674.0 -- QPM-AS-1 - QuickPlay Media Inc.
 3 - AS45169   24876  0.9%1658.4 -- GLOBAL-DESCON-AS-AP Descon 
Limited
 4 - AS60345 995  0.0% 995.0 -- NBITI-AS Nahjol Balagheh 
International Research Institution
 5 - AS41691   20828  0.7% 867.8 -- SUMTEL-AS-RIPE Summa Telecom LLC
 6 - AS14340   10962  0.4% 783.0 -- SALESFORCE - Salesforce.com, 
Inc.
 7 - AS47714 750  0.0% 750.0 -- DRIESSEN-AS Driessen Aerospace 
Group NV
 8 - AS55746 637  0.0% 637.0 -- WITT-AS-AP Western Institute of 
Technology at Taranaki,
 9 - AS165613008  0.1% 501.3 -- ARIBANETWORK Ariba Inc. 
Autonomous System
10 - AS13118   22468  0.8% 488.4 -- ASN-YARTELECOM OJSC Rostelecom
11 - AS11054   11226  0.4% 488.1 -- LIVEPERSON LivePerson, Inc
12 - AS57201 481  0.0% 481.0 -- EDF-AS Estonian Defence Forces
13 - AS47918 934  0.0% 467.0 -- GIGABASE Gigabase ltd
14 - AS22688 897  0.0% 448.5 -- DOLGENCORP - Dollar General 
Corporation
15 - AS3 441  0.0%1987.0 -- MIT-GATEWAYS - Massachusetts 
Institute of Technology
16 - AS278286947  0.2% 434.2 -- Universidad Mayor de San Andres
17 - AS35463 850  0.0% 425.0 -- PSM-AS Pulawska Spoldzielnia 
Mieszkaniowa
18 - AS121316528  0.2% 408.0 -- IJ-NET - Internet Junction 
Corporation
19 - AS62431 403  0.0% 403.0 -- NCSC-IE-AS National Cyber 
Security Centre
20 - AS45703 767  0.0% 383.5 -- BKPM-AS-ID Badan Koordinasi 
Penanaman Modal (BKPM)


TOP 20 Unstable Prefixes
Rank Prefix Upds % Origin AS -- AS Name
 1 - 109.161.64.0/20   22255  0.7%   AS13118 -- ASN-YARTELECOM OJSC Rostelecom
 2 - 89.221.206.0/24   20666  0.7%   AS41691 -- SUMTEL-AS-RIPE Summa Telecom LLC
 3 - 121.52.144.0/24   15121  0.5%   AS17557 -- PKTELECOM-AS-PK Pakistan 
Telecommunication Company Limited
 AS45773 -- HECPERN-AS-PK PERN AS Content 
Servie Provider, Islamabad, Pakistan
 4 - 192.58.232.0/249987  0.3%   AS6629  -- NOAA-AS - NOAA
 5 - 216.109.107.0/24   9868  0.3%   AS11486 -- COLO-PREM-VZB - Verizon Online 
LLC
 AS16561 -- ARIBANETWORK Ariba Inc. 
Autonomous System
 6 - 78.109.192.0/209246  0.3%   AS25184 -- AFRANET AFRANET Co. Tehran, Iran
 7 - 66.210.60.0/24 8066  0.3%   AS20450 -- THL16-ASN - Trojan Hosting, LLC.
 8 - 206.152.15.0/248008  0.3%   AS54465 -- QPM-AS-1 - QuickPlay Media Inc.
 9 - 205.247.12.0/247498  0.2%   AS6459  -- TRANSBEAM - I-2000, Inc.
10 - 42.83.48.0/20  7412  0.2%   AS18135 -- BTV BTV Cable television
11 - 199.187.118.0/24   6233  0.2%   AS11054 -- LIVEPERSON LivePerson, Inc
12 - 74.231.237.0/246085  0.2%   AS20450 -- THL16-ASN - Trojan Hosting, 

Re: ARIN board accountability to network operators

2014-03-28 Thread Randy Bush
 Yeah, RIPE NCC is definitely much cheaper for PI: no initial
 registration fee of ≥$500. The maintenance cost is $100/year vs
 €100/year (±$137) so there is a little difference there. The $37
 €50 per PI assignment from the ripe ncc, no?
 http://www.ripe.net/ripe/docs/ripe-591

guys, you are following an arin policy weenie's red herring.  this was
not about fees.  it was about arin's board being it's own governance
review committee and having no term limits, arin forcing folk to sign
contracts with clauses saying arin can change the TsCs unilaterally and
arbitrarily, ...

randy



Re: why IPv6 isn't ready for prime time

2014-03-28 Thread William Herrin
Apropos nothing, I tried to bring up IPv6 with another service
provider today (this being the fourth I've attempted with only one
success) but all I'm getting is:

%BGP-3-NOTIFICATION: sent to neighbor ::1000:A000::6 2/7
(unsupported/disjoint capability) 0 bytes

:(

-Bill


-- 
William D. Herrin  her...@dirtside.com  b...@herrin.us
3005 Crane Dr. .. Web: http://bill.herrin.us/
Falls Church, VA 22042-3004



Re: ARIN board accountability to network operators

2014-03-28 Thread Jay Moran
On Fri, Mar 28, 2014 at 6:13 PM, Randy Bush ra...@psg.com wrote:

 arin forcing folk to sign
 contracts with clauses saying arin can change the TsCs unilaterally and
 arbitrarily, ...


Exactly! -- Jay


Re: Cisco Security Advisory

2014-03-28 Thread Robert Drake


On 3/28/2014 4:11 PM, Scott Weeks wrote:

If a person is on multiple of *NOG mailing lists a lot of these're
received.  For example, I got well over 30 of them this round.  It'd be
nice to get something brief like this:


--
The Semiannual Cisco IOS Software Security Advisory has been released.

For information please goto this URL:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar14.html

Advisory titles:
- Session Initiation Protocol Denial of Service Vulnerability
- Cisco 7600 Series Route Switch Processor 720 with 10 Gigabit Ethernet Uplinks 
Denial of Service Vulnerability
- Internet Key Exchange Version 2 Denial of Service Vulnerability
- Network Address Translation Vulnerabilities
- SSL VPN Denial of Service Vulnerability
- Crafted IPv6 Packet Denial of Service Vulnerability
---

Not everyone uses cisco and not everyone needs to see every vulnerability
detail email multiple times.  Imagine if all vendors started doing what
cisco is doing.
I hate that it's spam for some and relevant for others, but in the NSP 
world you can almost be certain that someone is going to have at least 
some Cisco equipment (even companies who are known to dislike Cisco 
enough to avoid them religiously have bought other companies who might 
have Cisco gear)


Having the vulnerability in the subject draws attention to the problems 
and makes people less likely to ignore it.   When I see keywords of 
technologies I'm using, like IPv6 or 6500 I tend to read through 
carefully to see if I'm vulnerable.  Because it can be difficult and 
time consuming to see if all your gear is vulnerable, If it's a bug in 
obscure card I didn't buy one of or weird technology I haven't had a 
chance to run then I'm not as diligent.  I guess I might be selfish 
because seeing 5 advisories at once is like a giant line break in NANOG 
discussions, so it's harder to tune it out and skip the emails :)


They could Bcc: all the lists they are sending to in one set of emails 
so the message-id is the same, then you could filter duplicates at 
least.  Or they could do the summary email like you guys want, whichever 
makes people happy.  :)




:-(

scott



:-(
Robert



Re: Cisco Security Advisory

2014-03-28 Thread Scott Weeks


--- rdr...@direcpath.com wrote:
From: Robert Drake rdr...@direcpath.com

because seeing 5 advisories at once is like a giant line break in NANOG 
discussions, so it's harder to tune it out and skip the emails :)

They could Bcc: all the lists they are sending to in one set of emails 
so the message-id is the same, then you could filter duplicates at 
least.  Or they could do the summary email like you guys want, whichever 
makes people happy.  :)



You got 5 (actually 6 this time) perhaps because you're only on NANOG.
I got over 30 this time and once when there were 9 vulnerabilities
I got almost 50 emails from cisco.

scott



Re: Cisco Security Advisory

2014-03-28 Thread Mark Tinka
On Saturday, March 29, 2014 02:34:13 AM Scott Weeks wrote:

 You got 5 (actually 6 this time) perhaps because you're
 only on NANOG. I got over 30 this time and once when
 there were 9 vulnerabilities I got almost 50 emails from
 cisco.

I've always known that Cisco will submit their notices to 
multiple lists, including their own. So when I see it on one 
list, I already know to expect it on others. Given how easy 
they are to identify, I immediately delete them from other 
lists which I've decided is not the primary list I want to 
learn them on.

It does help that they stack them up in one batch, so you 
don't even need to think about it much.

But clearly, this is one of those issues where you have a 
good amount of folk on either side of the fence.

Mark.


signature.asc
Description: This is a digitally signed message part.


Re: Cisco Security Advisory

2014-03-28 Thread Larry Sheldon

On 3/29/2014 12:43 AM, Mark Tinka wrote:


But clearly, this is one of those issues where you have a
good amount of folk on either side of the fence.


I wonder what the ratio of I don't want that info here (for various 
values of here) to Geez!  WHY didn't somebody tell me is.


--
Requiescas in pace o email   Two identifying characteristics
of System Administrators:
Ex turpi causa non oritur actio  Infallibility, and the ability to
learn from their mistakes.
  (Adapted from Stephen Pinker)