IPv6 Extension Headers in the Real World

2014-09-29 Thread Fernando Gont
Folks,

Earlier in September we published a revision of our I-D "IPv6 Extension
Headers in the Real World"
().

At this point in time, we're interested in knowing whether our I-D is of
value for the IPv6 ops community, such that we can decide whether to
continue working/improving it. Additionally, if there's anything you
think we've missed in the document, we'd like to hear from you.

Overall, our I-D is meant to provide a reality-check with respect to the
issues surrounding IPv6 Extension Headers and their use on the public
Internet. More specifically, its goals are:

1) Provide data regarding support of IPv6 EHs in the real world.

This is interesting data to refer people to (e.g., folks
developing protocols) regarding the extent to which IPv6 EHs
are usable on the public Internet (at least with web, mail, and
name servers).


2) Summarize the issues associated with IPv6 EHs (performance, security,
etc.)

This is of use for folks concerned with the issues surrounding
IPv6 EHs, and covers practical issues.


3) Summarizes the implications of the aforementioned filtering.

For example, if you're designing a protocol that is meant to
work on the public Internet, you may want to provide some fall-back
mechanism that does not employ IPv6 EHs.

Yet another of the implications is the security issue that has
been discussed on-list: if e.g. IPv6 fragments are dropped and you
can be tricked into generating them, you may be subject to a DoS
attack.


4) Flag possible further work

   Here we try to flag areas where the further work may be needed,
   such as adding fall-back mechanisms to some existing protocols,
   or avoiding the use of IPv6 EHs where possible.


Thanks!

Best regards,
-- 
Fernando Gont
e-mail: ferna...@gont.com.ar || fg...@si6networks.com
PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1





Re: update

2014-09-29 Thread Pete Carah
On 09/29/2014 01:14 AM, Larry Sheldon wrote:
> On 9/29/2014 00:32, Pete Carah wrote:
>> For that matter, has the*specification*  of tcp/ip been proven to be
>> "correct" in any complete way?
>
> I find that question in this forum really confusing.
I was adding it to Valdis's statement about proven correctness of the
TCP/IP stack.  It is only possible to prove correctness of software in
relation to a (assumed) correct (and complete) specification.  Correct
software relative to a spec that doesn't relate to the real world may be
considered correct but will still fail in application.  Many of the
famous failures of military systems (and many more from commercial
systems) come from bad (or missing) assumptions in the spec, (and many
also from bad implementation, to be sure...)

The thread in question is more about security than interoperation, and
real-world effects of both compliant and non-compliant uses of the net. 
The real point is that many of the features included in tcp/ip to handle
random occurrences make purposeful interference *worse*.  In a world
with purposeful attacks, those specifications have to be amended; in
that sense they are not "correct".

>
> I thought all of the RFC-descriptions of protocols were taken to be
> statements that "if you do it this way, we think we can inter-operate"
> but at no time to be taken as "right" or "wrong".

The use of modals (MUST, MUST NOT, SHOULD) in the specification implies
a sense of correctness.

Indeed that is mostly there to guarantee interoperation.  In the early
days (pre-mid-80's) the security aspects of the protocols was minimal;
it was assumed that people would pay attention to the specs.  Now we
have players that (use spam for an example, again) (mostly) completely
comply to the technical specifications but manage to bring the net to
its knees anyhow, and also players that test what (mostly) minor
violations to the spec will do to the rest of the net.  (try to defend
against a joe-job using stock qmail, for example; that system is
completely compliant to the (older) RFCs and cannot handle significant
amounts of forged mail, mostly due to its completely compliant handling
of bounces.

And some of the MUST statements in earlier application protocols
(821/822, for example) have had to be turned off in order to defend
against such purposeful actions (e.g. bounce all messages that fail
delivery; doing so makes the spam problem MUCH worse.)  The protocols
have to be adapted to handle attacks, there is no alternative.  In that
way, there is (in some sense) correctness or not.  At least the RFC
system does allow for fairly easy (but not too easy) modification with
experience.

-- Pete



Internet in Venezuela

2014-09-29 Thread Paige Thompson
I have lots of questions, feel free to contact me privately if you have
some time or interest in answering
some of them.

-Paige

paigead...@gmail.com
PGP: 0x0d5d2688 (keys.gnupg.net), also attached.



0d5d2688.pub.asc
Description: application/pgp-encrypted


Re: YouTube CDN down?

2014-09-29 Thread Paige Thompson
yt is working for me:

2607:f2f8:a2c4:/48 / 206.125.168.64/28

On 09/30/14 00:22, Blair Trosper wrote:
> Watching in dev tools, the CDN is returning the dreaded HTTP header 204 (No
> Content), even though the entire video is buffering.
>
> This reminds me of an outage a while back that only affected IPv6.
>
> I've confirmed with other users, and YouTube is dead to us from these
> networks:
> - AS22645 (Texas Gigapop) - v4/v6
> - AS19108 (Suddenlink) - v4
> - AS40285 (Northland Cable) - v4/v6
> - AS40244 (TurnKey) - v4/v6
>
> It does seem to be regional.  People in SC/NC who are presumably hitting
> the Charleston DC are unaffected.
>
> On Mon, Sep 29, 2014 at 4:16 PM, Brandon Martin 
> wrote:
>
>> On 09/29/2014 05:12 PM, Blair Trosper wrote:
>>
>>> Suddenly having an inability to play YouTube videos over IPv4 and IPv6
>>> from
>>> multiple ASNs in multiple locations in the United States.  Tried multiple
>>> operating systems and browsers...all have the same issue.
>>>
>>> (The very few that do play stall out, even though they're buffered.)
>>>
>>> Is this just me, or is there an issue afoot?
>>>
>>>
>> Seems to be working here over a HE.net IPv6 tunnel (Chicago endpoint).
>>
>> --
>> Brandon Martin
>>



Re: GMail contact - misroute / security issue

2014-09-29 Thread Jeff Woolsey

On 09/29/14 10:06, Nicolai wrote:
Most likely reason: gmail is so common that someone mistypes 
johnsm...@example.com as johnsm...@gmail.com, not paying attention to 
what they're doing. It happens.


More likely, I think, is that newbies think that email addresses already 
exist for everyone on the planet at firstl...@gmail.com, and they just 
give that when asked (maybe they think it's throwaway and never actually 
expect to get any email there).  I'm in the same boat.   It doesn't 
bother me all that much because gmail is not my primary mail service.  I 
use it to store big stuff that's clogging the mail service I do pay 
for.  In fact, it can be entertaining, as I get usernames and passwords 
for sites that this guy signed up for.  He's also a poker player and has 
recently tried to enroll at an art college.  The latter I could reply to 
and explain that their prospective student is an idiot and should not be 
accepted, but that's what will happen anyway if I don't say anything.


--
Jeff Woolsey {woolsey,jlw}@{jlw,jxh}.com first.last@{gmail,jlw}.com
Spum bad keming.
Nature abhors a straight antenna, a clean lens, and unused storage capacity.
"Delete! Delete! OK!" -Dr. Bronner on disk space management
"Card sorting, Joel." -me, re Solitaire



Re: YouTube CDN down?

2014-09-29 Thread Blair Trosper
Watching in dev tools, the CDN is returning the dreaded HTTP header 204 (No
Content), even though the entire video is buffering.

This reminds me of an outage a while back that only affected IPv6.

I've confirmed with other users, and YouTube is dead to us from these
networks:
- AS22645 (Texas Gigapop) - v4/v6
- AS19108 (Suddenlink) - v4
- AS40285 (Northland Cable) - v4/v6
- AS40244 (TurnKey) - v4/v6

It does seem to be regional.  People in SC/NC who are presumably hitting
the Charleston DC are unaffected.

On Mon, Sep 29, 2014 at 4:16 PM, Brandon Martin 
wrote:

> On 09/29/2014 05:12 PM, Blair Trosper wrote:
>
>> Suddenly having an inability to play YouTube videos over IPv4 and IPv6
>> from
>> multiple ASNs in multiple locations in the United States.  Tried multiple
>> operating systems and browsers...all have the same issue.
>>
>> (The very few that do play stall out, even though they're buffered.)
>>
>> Is this just me, or is there an issue afoot?
>>
>>
> Seems to be working here over a HE.net IPv6 tunnel (Chicago endpoint).
>
> --
> Brandon Martin
>


Re: YouTube CDN down?

2014-09-29 Thread Brandon Martin

On 09/29/2014 05:12 PM, Blair Trosper wrote:

Suddenly having an inability to play YouTube videos over IPv4 and IPv6 from
multiple ASNs in multiple locations in the United States.  Tried multiple
operating systems and browsers...all have the same issue.

(The very few that do play stall out, even though they're buffered.)

Is this just me, or is there an issue afoot?



Seems to be working here over a HE.net IPv6 tunnel (Chicago endpoint).

--
Brandon Martin


YouTube CDN down?

2014-09-29 Thread Blair Trosper
Suddenly having an inability to play YouTube videos over IPv4 and IPv6 from
multiple ASNs in multiple locations in the United States.  Tried multiple
operating systems and browsers...all have the same issue.

(The very few that do play stall out, even though they're buffered.)

Is this just me, or is there an issue afoot?


Re: Match.com contact - Previously: GMail contact - misroute / security issue

2014-09-29 Thread Jay Ashworth
- Original Message -
> From: "Grant Taylor" 

> *sigh*
> 
> So this is a non-RFC compliant ""feature.

Nope.  The LHS of an email address *is system defined*; no one outside of
the destination mailserver is permitted to make any assumptions about it.

RFC5322 3.4.1:

"""
The local-part portion is a domain-dependent string.  In addresses,
it is simply interpreted on the particular host as a name of a
particular mailbox.
"""

Note that using a "real name" as an email address is Not The Best Idea:

http://www.sendmail.com/sm/open_source/support/support_faq/faq_ver_8_issues/#3.5

Cheers,
-- jra
-- 
Jay R. Ashworth  Baylink   j...@baylink.com
Designer The Things I Think   RFC 2100
Ashworth & Associates   http://www.bcp38.info  2000 Land Rover DII
St Petersburg FL USA  BCP38: Ask For It By Name!   +1 727 647 1274


Re: update

2014-09-29 Thread Valdis . Kletnieks
On Sun, 28 Sep 2014 13:22:57 -0400, Jay Ashworth said:
> "The Internet is the only endeavour of man in which a single-character
> typographical error in a file on a computer on the other side of the
> planet *which you do not even know exists* can take your entire business
> off line for the better part of a day."
>
> -- Someone, in the wake of the (I think) Turkish YouTube BGP hijacking;
> damn if I remember who.  I might be embellishing.  :-)

"A distributed system is one in which the failure of a computer you didn't even
know existed can render your own computer unusable." -- Leslie Lamport, 1987.

http://research.microsoft.com/en-us/um/people/lamport/pubs/distributed-system.txt



pgpXYKRqYy3sY.pgp
Description: PGP signature


Re: Match.com contact - Previously: GMail contact - misroute / security issue

2014-09-29 Thread Anne P. Mitchell, Esq.

> Does anyone have any Match.com contacts?  I'll try going that route to 
> get the messages stopped.  (Including emailing postmaster@ and abuse@ to 
> see if they can help.)

I've contacted Grant offlist to provide him with a contact.

Anne

Anne P. Mitchell, Esq.
CEO/President
ISIPP SuretyMail Email Accreditation
Your mail system + SuretyMail accreditation = delivered to their inbox!
http://www.SuretyMail.com/

Author: Section 6 of the Federal CAN-SPAM Act of 2003
Member, California Bar Cyberspace Law Committee
Ret. Professor of Law, Lincoln Law School of San Jose
https://www.linkedin.com/in/annemitchell
303-731-2121 | amitch...@isipp.com | @AnnePMitchell | Facebook/AnnePMitchell 




Re: GMail contact - misroute / security issue

2014-09-29 Thread James Welcher
Gmail will strip out periods. So it's not like there was some OTHER email
address that your wife is suddenly getting. There is only her address. Dots
or No Dots. Your wife's email address IS THE SAME as the dotless-version.

On Sun, Sep 28, 2014 at 8:42 PM, Grant Taylor 
wrote:

> Hi,
>
> I'm looking for a GMail contact.
>
> My wife is receiving someone else's emails.
>
> Specifically she is receiving emails for  name>@gmail.com (no dots) when her email address is really  name>..@gmail.com (dots).
>
> I don't know if this is a "feature" or a "bug", but either way, it's
> disquieting my wife.  (Unhappy wife = unhappy life.)
>
> I view this as both non-RFC compliant behavior -and- a potential security
> risk.  (Registering a GMail account as @gmail.com (no
> dot) to capture email for .@gmail.com (dot) emails.)
>
> Please reply or email me directly at gtaylor (at) tnetconsulting (dot) net
> for additional details.
>
> Thank you and have a nice day.
>
>
>
> --
> Grant. . . .
> unix || die
>
>
> P.S.  Thus far messages to postmas...@gmail.com and ab...@gmail.com have
> gone unanswered.
>



-- 
James Welcher


Re: update

2014-09-29 Thread Barry Shein

On September 28, 2014 at 13:22 j...@baylink.com (Jay Ashworth) wrote:
 > 
 > "The Internet is the only endeavour of man in which a single-character 
 > typographical error in a file on a computer on the other side of the 
 > planet *which you do not even know exists* can take your entire business
 > off line for the better part of a day."
 > 
 > -- Someone, in the wake of the (I think) Turkish YouTube BGP hijacking;
 > damn if I remember who.  I might be embellishing.  :-)

Oh I dunno. I know someone who accidentally brought down the entire
Manhattan phone system (monopoly, pre-mobile days) installing a
carefully tested patch with a hot failover running (oh well, the best
laid schemes o' Mice an' Men, Gang aft agley.)

Sure, that was just Manhattan, and of course everyone on the other
side of those connections.


-- 
-Barry Shein

The World  | b...@theworld.com   | http://www.TheWorld.com
Purveyors to the Trade | Voice: 800-THE-WRLD| Dial-Up: US, PR, Canada
Software Tool & Die| Public Access Internet | SINCE 1989 *oo*


Re: update

2014-09-29 Thread Merike Kaeo
Heh….this reminded me of a project I had to do circa 1991/2 when getting my 
Master's in EE where we used this book and mechanism to
'validate' TCP.  http://spinroot.com/gerard/popd.html

Although as a student homework assignment I wouldn't say what we did was in any 
way rigorous but certainly had me learning some interesting
concepts (and as I was actually creating a backbone with routers at the time it 
was kind of fun to see where academics and operations went a bit
orthogonal) :)  And no, I can't for the life of me remember that far back 
except to remember that I was the only one in class with practical knowledge.

And then of course there's the 'how did one actually implement the protocols' 
and hence the Interop conferences as someone already mentioned.
Even a formal proof of 'protocol validation and correctness' doesn't alter the 
implementation creativities…

- merike


On Sep 28, 2014, at 11:41 PM, George Michaelson  wrote:

> for two asynchronous, otherwise unconnected systems, using TCP/IP there is
> a state transition sequence which can be shown to work if you stick to it.
> There are also (I believe) corner cases when you send unexpected sequences,
> and some of them have known behaviours
> 
> in that sense, the question: "does the RFC adequately document the state
> transition sequences which are understood to be valid states and
> transitions" is a well formed question.
> 
> Robin Milner, in his calculus of communicating systems tried to codify a
> formal mathematics of async communicating systems. I don't know if anyone
> either extended the idea(s) or applied it to TCP/IP.
> 
> Certainly I believe there are formally verified protocols. Thats a space
> Erlang occupies isn't it?
> 
> On Mon, Sep 29, 2014 at 4:14 PM, Larry Sheldon  wrote:
> 
>> On 9/29/2014 00:32, Pete Carah wrote:
>> 
>>> For that matter, has the*specification*  of tcp/ip been proven to be
>>> "correct" in any complete way?
>>> 
>> 
>> I find that question in this forum really confusing.
>> 
>> I thought all of the RFC-descriptions of protocols were taken to be
>> statements that "if you do it this way, we think we can inter-operate" but
>> at no time to be taken as "right" or "wrong".
>> --
>> The unique Characteristics of System Administrators:
>> 
>> The fact that they are infallible; and,
>> 
>> The fact that they learn from their mistakes.
>> 
>> 
>> Quis custodiet ipsos custodes
>> 



signature.asc
Description: Message signed with OpenPGP using GPGMail


Re: GMail contact - misroute / security issue

2014-09-29 Thread Philip
On Mon, Sep 29, 2014 at 10:06 AM, Nicolai 
wrote:

>
> Have your wife log in while omitting the dots, using e.g. "janeqpublic"
> instead of "jane.q.public" as the username.  She'll see there's only
> one account, and it's her's, and that someone just typed the wrong
> address.
>
>
This is what I was going to suggest. Have your wife login to the match.com
site (using the forgot password feature),
and then just deactivate / delete the account.
Or as other have pointed out, gmail filters with hidden labels or direct to
spam also works great.


Re: Match.com contact - Previously: GMail contact - misroute / security issue

2014-09-29 Thread Bacon Zombie
You sure you wife did not sign up or Match.com and using this as a cover
story?
On Sep 29, 2014 6:17 AM, "John Fraizer"  wrote:

> Set up a filter in the GMAIL console to match (pun intended) the "Match"
> emails and filter them into their own label.  Then, hide that label.  Don't
> delete them though.  You might have a gold mine there.  Think of the
> comedic relief you could provide others with "
> www.My-wife-keeps-getting-sent-pics-of-some-guys-tiny.org"  You could post
> the emails, the profile names of the pervs, etc.  Sort of like a 20/20 "To
> catch a..." only instead of predator, it would be perv.
>
> --
> John Fraizer
> ΥΣΜΧ
>


Re: GMail contact - misroute / security issue

2014-09-29 Thread Nicolai
On Sun, Sep 28, 2014 at 10:42:56PM -0500, Grant Taylor wrote:

> Specifically she is receiving emails for  name>@gmail.com (no dots) when her email address is really  name>..@gmail.com (dots).
> 
> I don't know if this is a "feature" or a "bug", but either way, it's
> disquieting my wife.  (Unhappy wife = unhappy life.)

Have your wife log in while omitting the dots, using e.g. "janeqpublic"
instead of "jane.q.public" as the username.  She'll see there's only
one account, and it's her's, and that someone just typed the wrong
address.

Most likely reason: gmail is so common that someone mistypes
johnsm...@example.com as johnsm...@gmail.com, not paying attention to
what they're doing.  It happens.

Nicolai


Re: update

2014-09-29 Thread Valdis . Kletnieks
On Mon, 29 Sep 2014 00:32:49 -0500, Pete Carah said:

> The halting problem comes up in connection with _data_ handling in any
> computer with even a language interpreter (e.g. is browser-based
> javascript complete enough for the halting problem to apply to it?

The halting problem applies to *any* language/system that's Turing-complete.
And the bar is *really* low for that. If you have an increment or decrement
operator, a branch operator, and a test-and-skip-on-zero, you're
Turing-complete.

In fact, you can design a CPU with *one* opcode that's Turing complete. Part
of the fun is that since there's only one opcode, you can omit it, and then
instructions consist only of operand addresses.  Then remember that von Neumann
architectures allow self-modifying code

http://en.wikipedia.org/wiki/One_instruction_set_computer


pgpJjS1lADyIf.pgp
Description: PGP signature


Re: GMail contact - misroute / security issue

2014-09-29 Thread Valdis . Kletnieks
On Sun, 28 Sep 2014 20:57:41 -0700, Mike Lyon said:
> I have the same issue and have had it for quite a while. I've met some
> great new friends because of it as well!

Odd.  Never seen it happen to me.  I wonder why.


pgpAO5hwZDb7r.pgp
Description: PGP signature


Re: Perfsonar and shellshock

2014-09-29 Thread Jared Mauch

> On Sep 29, 2014, at 8:55 AM, Stephen Satchell  wrote:
> 
> On 09/29/2014 05:23 AM, Leif Nixon wrote:
>> Please guys,
>> 
>> If everybody could patch their perfsonar boxen against shellshock LIKE
>> RIGHT NOW, or preferably LAST WEEK, or alternatively put the machines
>> out of their misery with a shotgun, that would be great.
>> 
>> Thank you,
>> 
> 
>> From the perfSonar site:
> 
> "perfSONAR is recommending that all users run yum update to download the
> latest packages from the CentOS repositories"
> 
> This will need to be done again in a couple of weeks, when a "better"
> patch becomes available from the FSF or wherever.
> 
> By the way, the history of the development of bash is mildly
> interesting.  http://www.wired.com/2014/09/shellshocked-bash/

Proper operation of a host requires automated updating (yum-updatesd, yum-cron) 
to pick up these packages.

Those who are paranoid or afraid of damage from automatic updates should 
exclude packages that require specific
versions.

- Jared

Re: Perfsonar and shellshock

2014-09-29 Thread Stephen Satchell
On 09/29/2014 05:23 AM, Leif Nixon wrote:
> Please guys,
> 
> If everybody could patch their perfsonar boxen against shellshock LIKE
> RIGHT NOW, or preferably LAST WEEK, or alternatively put the machines
> out of their misery with a shotgun, that would be great.
> 
> Thank you,
> 

>From the perfSonar site:

"perfSONAR is recommending that all users run yum update to download the
latest packages from the CentOS repositories"

This will need to be done again in a couple of weeks, when a "better"
patch becomes available from the FSF or wherever.

By the way, the history of the development of bash is mildly
interesting.  http://www.wired.com/2014/09/shellshocked-bash/


Perfsonar and shellshock

2014-09-29 Thread Leif Nixon
Please guys,

If everybody could patch their perfsonar boxen against shellshock LIKE
RIGHT NOW, or preferably LAST WEEK, or alternatively put the machines
out of their misery with a shotgun, that would be great.

Thank you,

-- 
Leif Nixon - Security officer
National Supercomputer Centre - Swedish National Infrastructure for Computing
Nordic Data Grid Facility - European Grid Infrastructure


pgp5Crf_EJCsF.pgp
Description: PGP signature