Re: draft-ietf-mpls-ldp-ipv6-16

2015-02-20 Thread Saku Ytti
On (2015-02-19 11:06 -0500), Tim Durack wrote:

 What is the chance of getting working code this decade? I would quite like
 to play with this new fangled IPv6 widget...
 
 (Okay, I'd like to stop using IPv4 for infrastructure. LDP is the last
 piece for me.)

Is there 4PE implementation to drive IPv4 edges, shouldn't be hard to accept
IPv6 next-hop in BGP LU, but probably does not work out-of-the-box?
Isn't Segment Routing implementation day1 IPV4+IPV6 in XR?

-- 
  ++ytti


Re: v6 deagg

2015-02-20 Thread Mikael Abrahamsson

On Fri, 20 Feb 2015, Saku Ytti wrote:

Correct solution is not to use some so called 'strict' ipv6 filters, 
which break Internet, by not allowing discontinuous pops having 
connectivity.


Before, the practical level of de-agg was at /24 for IPv4. This meant only 
larger organisations could do it.


With automation in the network space increasing, and with /48 being 
justifiable to any site, and with /48 being the typical DFZ routing 
filter, we now have the possibility of a lot more entities seeing IP 
address based multihoming and PI being possible.


I don't like where this is headed. There are millions of entities that are 
justifiable to announce a /48 into DFZ. Do we want this to happen?


By allowing it, we're not putting any pressure to invent solutions for 
graceful address migration with continous services, and instead putting 
the pressure on the DFZ infrastructure. Is this the correct tradeoff?


How many smaller than /32 in the IPv6 DFZ do we allow before we need to 
start to worry? In these discussions I frequently interact with people who 
don't want to limit things until they are actually a problem. So when will 
this become a problem? 100k de-agged routes? 200k? 500k? 1M?


From a technical point of view, I have little interest in my router 
handling the fact that an office at the other side of the planet shut down 
their router, and learning this via DFZ.


--
Mikael Abrahamssonemail: swm...@swm.pp.se


Re: v6 deagg

2015-02-20 Thread Nikolay Shopik
On 20/02/15 12:42, Mikael Abrahamsson wrote:
 I don't like where this is headed. There are millions of entities that
 are justifiable to announce a /48 into DFZ. Do we want this to happen?

rfc6115 have good overview and recommendation. IPv6 clearly need
separation of identification of endpoints and routing information to
that endpoint.

We already have broadband operators who fully deagg their IPv4 space.
And just one ISP IPv6 with /32 deagg will take 65536 routes.


Re: draft-ietf-mpls-ldp-ipv6-16

2015-02-20 Thread Mark Tinka


On 20/Feb/15 02:36, George, Wes wrote:

 The document has come out the other side of the IETF sausage grinder now:
 https://tools.ietf.org/html/rfc7439

 Unfortunately, it's just a list of the gaps.
 It is worth leaning on your vendors of choice to ensure that they have
 people focused on addressing these issues, as not all of them have
 volunteers to write the documents necessary to close those gaps yet.

Looking at how long it has taken the community to react to the LDPv6
draft (been chasing everyone since 2007, personally), my priority to get
a working MPLSv6 domain has gone from 1 to a lot lower.

I'd like to see it get done, but I'm going to be focusing on getting
better native IPv6 in the code/hardware before I chase the vendors for a
working MPLSv6 solution. They just have no interest because there is no
incremental revenue - and given the community are focused on other
things, threatening not to buy kit due to lack of MPLSv6 support is not
a practical avenue, unfortunately.

Mark.


Re: v6 deagg

2015-02-20 Thread Brandon Butterworth
 From: Saku Ytti s...@ytti.fi
 Is deaggregation inherently undesirable?

I'd say yes when the only limit to deaggregation is /48.

Given the opportunity people will do whatever they see
fit at everyone elses expense

 What is the correct solution here? Deaggregate or allocate space you don't
 need?

Whichever comes with sensible deagg control. The desired effect is
people advertise exactly sufficient prefixes and, I'd say, a simple
universal mechanism for everyone else to limit them to that so they
don't feel the need to advertise more to prevent hijacks etc.

 Or some others solution, should route object creation be limited to LIR
 and be controlled by specific policy? It would allow inject information about
 the reason for it.

There is always a good reason to the person doing it.

 Correct solution is not to use some so called 'strict' ipv6 filters, which
 break Internet, by not allowing discontinuous pops having connectivity.

Yes, strict would be best if based on good data. With no prefix length
police there is no good data, RIPE gave up and said /48 everywhere
removing the simpler mechanism to do this (I've not noticed what the
others are doing)

brandon


Re: v6 deagg

2015-02-20 Thread Saku Ytti
On (2015-02-20 12:07 +0900), Randy Bush wrote:

Hey,

 in a discussion with some fellow researchers, the subject of ipv6
 deaggregation arose; will it be less or more than we see in ipv4?

Is deaggregation inherently undesirable? In some RIR LIR will not get new
allocation, just because LIR lacks INET connectivity between their datacenter
or pop.
This wasn't issue in IPv4, because you actually could reasonably fill your
IPv4 allocation and were eligible for another allocation for your
discontinuous locations.

Clearly there are valid routing reasons why 1 network from single company has
to appears in DFZ. Having RIR allocate another network or having LIR
deaggregate have exact same cost to RIB/FIB, yet they are different.

Multiple allocation gives additional scrutiny, network must pass RIR policy to
be able to exist.
Deagrregation is entirely uncontrolled, we don't know from route object the
reason for it, valid reasons and invalid reasons are grouped in same pool.

What is the correct solution here? Deaggregate or allocate space you don't
need? Or some others solution, should route object creation be limited to LIR
and be controlled by specific policy? It would allow inject information about
the reason for it.

Correct solution is not to use some so called 'strict' ipv6 filters, which
break Internet, by not allowing discontinuous pops having connectivity.

-- 
  ++ytti


Re: draft-ietf-mpls-ldp-ipv6-16

2015-02-20 Thread Tim Durack
On Fri, Feb 20, 2015 at 6:39 AM, Saku Ytti s...@ytti.fi wrote:

 On (2015-02-19 11:06 -0500), Tim Durack wrote:

  What is the chance of getting working code this decade? I would quite
 like
  to play with this new fangled IPv6 widget...
 
  (Okay, I'd like to stop using IPv4 for infrastructure. LDP is the last
  piece for me.)

 Is there 4PE implementation to drive IPv4 edges, shouldn't be hard to
 accept
 IPv6 next-hop in BGP LU, but probably does not work out-of-the-box?
 Isn't Segment Routing implementation day1 IPV4+IPV6 in XR?

 --
   ++ytti


I would gladly take OSPFv2/OSPFv3/ISIS+SR over LDP, but I'm seeing that is
not all that is needed.

I also need some flavor of L2VPN (eVPN) and L3VPN (VPNv4/VPNv6) working
over IPv6.

IPv6 control plane this decade may yet be optimistic.

-- 
Tim:


Re: An Easy way to build a server cluster without top of rack switches (MEMO)

2015-02-20 Thread NAOTO MATSUMOTO
BTW: This scenario's combination has another portion for us like as below.

High Availability Server Clustering without ILB(Internal Load Balancer)
(MEMO)
http://slidesha.re/1vld6uB

--
Naoto MATSUMOTO

On Mon, Feb 16, 2015 at 12:23 PM, NAOTO MATSUMOTO naoto...@gmail.com
wrote:

 Hi Dan and ken.

 I respect your great works.

 Certainly, our scenario was network classics and it just does not one
 size fits all network architecture.
 Many people tried to built centralized and decentralized networks many
 years ago, some guys output
 implementation like this.


 Interconnect of K computer (torus fusion)

 https://www.fujitsu.com/global/Images/fujitsu-hpc-roadmap-beyond-petascale-computing.pdf


 I agree with you point. Our approach have to do more simple way on
 physical and logical
 network engineering, and change the mindset, I think.
 (e.g. network cabling procedure and troubleshooting and handling)

 But, some guys need more cost effective server cluster environment and
 they does't care
 network latency like Low-End Web Hosting.


 e.g. Intel Diversity of Server workloads http://bit.ly/1BgFH65 [JPG].


 Now, Many people do not use Dijkstra and automaton theory on the server
 side,
 but it is great mechanism for network durability if they controlled.

 The Ethernet NIC's bandwidth is increasing day by day, the cost is
  decreasing too.

 I say again, our scenario is not one size fits all network architecture,
 but we believe that something will happen for some guys works. ;-)

 best regards,

 --
 Naoto MATSUMOTO



 On Sat, Feb 14, 2015 at 7:08 AM, Dan Eckert daniel.eck...@microsoft.com
 wrote:

 I'm having a hard time seeing how this reduces cable costs or increases
 network durability.  Each individual server is well connected to 3-4 other
 servers in the rack, but the rack still only has two uplinks.  For many
 servers in the rack you're adding 3-4 routing hops between an end node and
 the rack uplink.

 Additionally, with only 2 external links tied to 2 specific nodes, you
 introduce more risks.  If one of the uplink nodes fails, you've got to
 re-route all of the nodes that were using it as the shortest path to now
 exit through the other uplink node -- the worst case in the example then
 increases from the original 4-hops-to-exit to now 7-hops-to-exit.

 As far as cable costs go, you might have slightly shorter cables, but far
 more complex wiring pattern -- so in essence you're trading off a small
 amount of cable cost for a higher amount of installation and
 troubleshooting cost.

 Also, using this layout, you dramatically reduce the effective bandwidth
 available between devices, since per-device links now have to be used for
 backhaul/transport in addition to device-specific traffic.

 Finally, you have to manage per-server routing service configurations to
 make this work -- more points of failure and increased
 setup/troubleshooting cost.  In a ToR switch scenario, you do one config on
 one switch, plug in the cables, and you're done -- problems happen, you go
 to the one switch, not chasing a needle through a haystack of
 interconnected servers.

 If your RU count is worth more than the combination of increased
 installation, server configuration, troubleshooting, latency, and capacity
 costs, then this is a good solution.  Either way, it's a neat idea and a
 fun thought experiment to work through.

 Thanks!
 Dan


 -Original Message-
 From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of NAOTO MATSUMOTO
 Sent: Wednesday, February 11, 2015 11:32 PM
 To: nanog@nanog.org
 Subject: FYI: An Easy way to build a server cluster without top of rack
 switches (MEMO)

 Hi all!

 We wrote up TIPS memo an easy way to build a server cluster without top
 of rack switches concept.

 This model have a reduce switches and cables costs and high network
 durability by lightweight and simple configuration.

 if you interest in, please try to do yourself this concept  ;-)


 An Easy way to build a server cluster without top of rack switches (MEMO)
 http://slidesha.re/1EduYXM


 Best regards,
 --
 Naoto MATSUMOTO





Re: draft-ietf-mpls-ldp-ipv6-16

2015-02-20 Thread Mark Tinka


On 20/Feb/15 13:39, Saku Ytti wrote:

 Is there 4PE implementation to drive IPv4 edges, shouldn't be hard to accept
 IPv6 next-hop in BGP LU, but probably does not work out-of-the-box?
 Isn't Segment Routing implementation day1 IPV4+IPV6 in XR?

The last time I checked, MPLS support in SR for IPv6 is not a high
priority, compared to TE for IPv4 MPLS.

My thoughts that SR would automatically mean native label signaling in
IS-IS and OSPFv3 were otherwise ambitious.

Mark.


Re: draft-ietf-mpls-ldp-ipv6-16

2015-02-20 Thread Jeff Tantsura
For L2VPN if you could make it work - go with EVPN day 1, it solves most of the 
issues present in both LDP and BGP VPLS implementations.
Be aware of differences in PBB vs plain EVPN and platform support. 
EVPN, specifically multhoming/split horizon/some other stuff as well as 
presence of L3 (type 2/5) and complications of above brings lots of complexity 
into fast path processing and not every platform/NPU can do full spec.



Regards,
Jeff

 On Feb 20, 2015, at 1:19 PM, Saku Ytti s...@ytti.fi wrote:
 
 On (2015-02-20 09:00 -0500), Tim Durack wrote:
 
 Hey Tim,
 
 I also need some flavor of L2VPN (eVPN) and L3VPN (VPNv4/VPNv6) working
 over IPv6.
 
 L3VPN uses BGP exclusively for VPN label signalling, no need for LDP.
 
 For L2VPN only Martini uses LDP, but if you have choice, why wouldn't you
 choose Kompella, the scaling factor is superior, as you only have 2 signalling
 connection, instead of n*(n-1)/2 signalling sessions. And you get to
 capitalize on instantly available backuo path.
 Of course I know that in CSCO land Kompella isn't available on every platform
 where Martini is, so you indeed may need LDP for some time until old platforms
 are phased out. 'Luckily' these older platforms have dubious IPv6 anyhow, so
 you might opt them out from IPv6 deployment anyhow.
 
 IPv6 control plane this decade may yet be optimistic.
 
 For greenfield it's doable today (only Kompella pseudowires), but IPv6-only
 would require 4PE, I don't know if that works/exists.
 
 -- 
  ++ytti


Re: DNS Admin at Comcast

2015-02-20 Thread Livingood, Jason
Sent a note off-list.


- Jason

On 2/20/15, 1:38 PM, Mark Stevens mana...@monmouth.com wrote:

If a DNS Admin at Comcast could contact me offline it would be great.
This is concerning your IPV6 configured mail servers.

Thanks,

Mark





Re: Interesting BFD discussion on reddit

2015-02-20 Thread Sudeep Khuraijam



On (2015-02-17 06:11 +0530), Glen Kent wrote:

 I think the hardware used was Broadcom. They have a few chipsets which
do
 MD5 and (possibly) SHA in hardware for BFD -- which i have been told is
 pretty much useless when you start scaling.

While I don¹t fully understand the context of this particular test and the
scaling limitation, there are merchant silicon, NPUs and even CPUs that do
support MD5 and SHA
at transport line rate requirements.  BFD requirements are just a fraction
of these capabilities.

The option to negotiate capabilities should be available independent of
scaling/cost/inefficiencies at present time.  It is a matter of
implementation/product design choice.

Sudeep Khuraijam



Re: draft-ietf-mpls-ldp-ipv6-16

2015-02-20 Thread Jeff Tantsura
From market prospective v6 SR is definitely lower priority. Comcast and few 
more are looking into native rather than v6 with MPLS encap.
Wrt v4 - 2 weeks ago at EANTC in Berlin we have tested 3 implementations of 
ISIS SR v4 MPLS with L3VPN and 6VPE over SR tunnels. Worked very well, very few 
issues.
So there's production quality code and interoperability - given the timeframe 
we have done a really good job in IETF :)


Regards,
Jeff

 On Feb 20, 2015, at 2:09 PM, Mark Tinka mark.ti...@seacom.mu wrote:
 
 
 
 On 20/Feb/15 13:39, Saku Ytti wrote:
 
 Is there 4PE implementation to drive IPv4 edges, shouldn't be hard to accept
 IPv6 next-hop in BGP LU, but probably does not work out-of-the-box?
 Isn't Segment Routing implementation day1 IPV4+IPV6 in XR?
 
 The last time I checked, MPLS support in SR for IPv6 is not a high
 priority, compared to TE for IPv4 MPLS.
 
 My thoughts that SR would automatically mean native label signaling in
 IS-IS and OSPFv3 were otherwise ambitious.
 
 Mark.


Re: draft-ietf-mpls-ldp-ipv6-16

2015-02-20 Thread Saku Ytti
On (2015-02-20 09:00 -0500), Tim Durack wrote:

Hey Tim,

 I also need some flavor of L2VPN (eVPN) and L3VPN (VPNv4/VPNv6) working
 over IPv6.

L3VPN uses BGP exclusively for VPN label signalling, no need for LDP.

For L2VPN only Martini uses LDP, but if you have choice, why wouldn't you
choose Kompella, the scaling factor is superior, as you only have 2 signalling
connection, instead of n*(n-1)/2 signalling sessions. And you get to
capitalize on instantly available backuo path.
Of course I know that in CSCO land Kompella isn't available on every platform
where Martini is, so you indeed may need LDP for some time until old platforms
are phased out. 'Luckily' these older platforms have dubious IPv6 anyhow, so
you might opt them out from IPv6 deployment anyhow.

 IPv6 control plane this decade may yet be optimistic.

For greenfield it's doable today (only Kompella pseudowires), but IPv6-only
would require 4PE, I don't know if that works/exists.

-- 
  ++ytti


The Cidr Report

2015-02-20 Thread cidr-report
This report has been generated at Fri Feb 20 21:14:25 2015 AEST.
The report analyses the BGP Routing Table of AS2.0 router
and generates a report on aggregation potential within the table.

Check http://www.cidr-report.org/2.0 for a current version of this report.

Recent Table History
Date  PrefixesCIDR Agg
13-02-15538035  294739
14-02-15538453  294684
15-02-15538305  294704
16-02-15538359  294312
17-02-15538588  294957
18-02-15538600  295168
19-02-15538555  295850
20-02-15538805  296396


AS Summary
 49708  Number of ASes in routing system
 19851  Number of ASes announcing only one prefix
  3121  Largest number of prefixes announced by an AS
AS10620: Telmex Colombia S.A.,CO
  120442368  Largest address span announced by an AS (/32s)
AS4134 : CHINANET-BACKBONE No.31,Jin-rong Street,CN


Aggregation Summary
The algorithm used in this report proposes aggregation only
when there is a precise match using the AS path, so as 
to preserve traffic transit policies. Aggregation is also
proposed across non-advertised address space ('holes').

 --- 20Feb15 ---
ASnumNetsNow NetsAggr  NetGain   % Gain   Description

Table 539262   296349   24291345.0%   All ASes

AS22773 2985  170 281594.3%   ASN-CXA-ALL-CCI-22773-RDC -
   Cox Communications Inc.,US
AS6389  2891   98 279396.6%   BELLSOUTH-NET-BLK -
   BellSouth.net Inc.,US
AS17974 2826   77 274997.3%   TELKOMNET-AS2-AP PT
   Telekomunikasi Indonesia,ID
AS39891 2473   14 245999.4%   ALJAWWALSTC-AS Saudi Telecom
   Company JSC,SA
AS28573 2306  312 199486.5%   NET Serviços de Comunicação
   S.A.,BR
AS4755  1976  247 172987.5%   TATACOMM-AS TATA
   Communications formerly VSNL
   is Leading ISP,IN
AS4766  2891 1323 156854.2%   KIXS-AS-KR Korea Telecom,KR
AS7303  1788  279 150984.4%   Telecom Argentina S.A.,AR
AS7545  2599 1107 149257.4%   TPG-INTERNET-AP TPG Telecom
   Limited,AU
AS9808  1546   67 147995.7%   CMNET-GD Guangdong Mobile
   Communication Co.Ltd.,CN
AS6147  1589  161 142889.9%   Telefonica del Peru S.A.A.,PE
AS10620 3121 1699 142245.6%   Telmex Colombia S.A.,CO
AS20115 1850  514 133672.2%   CHARTER-NET-HKY-NC - Charter
   Communications,US
AS8402  1329   26 130398.0%   CORBINA-AS OJSC Vimpelcom,RU
AS4323  1630  409 122174.9%   TWTC - tw telecom holdings,
   inc.,US
AS8452  1783  578 120567.6%   TE-AS TE-AS,EG
AS9498  1300  111 118991.5%   BBIL-AP BHARTI Airtel Ltd.,IN
AS18566 2040  869 117157.4%   MEGAPATH5-US - MegaPath
   Corporation,US
AS7552  1146   57 108995.0%   VIETEL-AS-AP Viettel
   Corporation,VN
AS22561 1329  251 107881.1%   AS22561 - CenturyTel Internet
   Holdings, Inc.,US
AS34984 1965  891 107454.7%   TELLCOM-AS TELLCOM ILETISIM
   HIZMETLERI A.S.,TR
AS3356  2569 1502 106741.5%   LEVEL3 - Level 3
   Communications, Inc.,US
AS6849  1196  243  95379.7%   UKRTELNET JSC UKRTELECOM,UA
AS7738  1000   84  91691.6%   Telemar Norte Leste S.A.,BR
AS38285  983  113  87088.5%   M2TELECOMMUNICATIONS-AU M2
   Telecommunications Group
   Ltd,AU
AS4538  1776  939  83747.1%   ERX-CERNET-BKB China Education
   and Research Network
   Center,CN
AS4780  1103  309  79472.0%   SEEDNET Digital United Inc.,TW
AS26615  922  134  78885.5%   Tim Celular S.A.,BR
AS8151  1547  763  78450.7%   Uninet S.A. de C.V.,MX
AS24560 1212  429  78364.6%   AIRTELBROADBAND-AS-AP Bharti
   Airtel Ltd., Telemedia
   Services,IN

Total  5567113776   

Re: [j-nsp] draft-ietf-mpls-ldp-ipv6-16

2015-02-20 Thread Tim Durack
On Fri, Feb 20, 2015 at 6:02 PM, Adam Vitkovsky adam.vitkov...@gamma.co.uk
wrote:

  Alright so would you mind sharing the business drivers that would make
 you migrate your current production infrastructure to this new unproven
 possibly buggy LDPv6 and 4PE/4VPE setup please?



 adam


Businesses bigger than me think there is a business driver for IPv6:

http://meetings.ripe.net/ripe-54/presentations/IPv6_management.pdf
http://www.internetsociety.org/deploy360/wp-content/uploads/2014/04/WorldIPv6Congress-IPv6_LH-v2.pdf

IPv6 management of equipment is relatively easy. Once you've started down
that path, you start looking at the protocol stuff, and wondering what to
do about that.

Maybe I should leave it alone until the business people figure it out for
me :-)

Tim:


NYC Metro Ethernet Providers

2015-02-20 Thread Bryn Sadler
Hi all,

We're currently a UK based managed service provider looking to open up in the 
New York area. Part of our service model involves buying quite a lot of L2 
ethernet tails from customer prems back to our DCs, usually 100Mb and 1Gb, but 
sometimes smaller 10-50Mb services for backups. I was wondering if anyone on 
the list would be able to recommend reliable providers in that region, we'd 
essentially just want pure Layer 2 so we can run our own VLANs etc across them, 
with a number of circuits aggregated and handed off in a DC as a trunk, each 
circuit as an SPVLAN that we can then strip.

Thanks in advance for any feedback,

Bryn Sadler


What would you do about questionable domain pointing A record to your IP address?

2015-02-20 Thread Anne P. Mitchell, Esq.
All,

We have a rather strange situation (well, strange to me, at least).

We have an email reputation accreditation applicant, who otherwise looks clean, 
however there is a very strange and somewhat concerning domain being pointed to 
one of the applicant's IP addresses  Let's call the domain example.com, and the 
IP address 127.0.0.1, for these purposes.

Applicant is assigned 127.0.0.1.  the rDNS correctly goes to their own domain.

However, example.com (which in reality is a concerning domain name) claims 
127.0.0.1 as their A record. 

Of course, example.com is registered privately, and their DNS provider is one 
who is...umm... known to provide dns for domains seen in spam.

As I see it, the applicant's options are:

a) just not worry about it and keep an eye on it

b) publish a really tight spf record on it, so if they are somehow compromised, 
email appearing to come from example.com and 127.0.0.1 should be denied

c) not use the IP address at all (it's part of a substantially larger block)

d) two or more of the above.

Thoughts?  What would you do?

Thanks!

Anne

Anne P. Mitchell, Esq.
CEO/President
ISIPP SuretyMail Email Reputation, Accreditation  Certification
Your mail system + SuretyMail accreditation = delivered to their inbox!
http://www.SuretyMail.com/
http://www.SuretyMail.eu/

Author: Section 6 of the Federal CAN-SPAM Act of 2003
Member, California Bar Cyberspace Law Committee
Ret. Professor of Law, Lincoln Law School of San Jose
303-731-2121 | amitch...@isipp.com | @AnnePMitchell | Facebook/AnnePMitchell 





Re: v6 deagg

2015-02-20 Thread Jack Bates

On 2/20/2015 4:13 AM, Nikolay Shopik wrote:


rfc6115 have good overview and recommendation. IPv6 clearly need
separation of identification of endpoints and routing information to
that endpoint.




I'm not overly familiar, but I'm always good for new things if one 
process is supported.


deagg X network to Y provider, ask provider to blackhole XY address in X.

Not every provider has a good blackhole system. Sometimes you desire to 
move a subset of data to a single provider for purposes of discarding 
data. I believe some of the protocols allow multiple sub-identifiers for 
load balancing purposes, but I'm unsure how strictly they are adhered to 
or if they might be ignored.


I know BGP blackholing is a coincidental abuse of how BGP works, but it 
is a commonly used one; especially when some city endusers now have more 
bandwidth than entire rural ISPs. DDOS/amplification isn't always 
necessary these days. :(


Jack


Re: What would you do about questionable domain pointing A record to your IP address?

2015-02-20 Thread Donald Eastlake
Hi,

On Fri, Feb 20, 2015 at 12:08 PM, Anne P. Mitchell, Esq.
amitch...@isipp.com wrote:
 All,

 We have a rather strange situation (well, strange to me, at least).

 We have an email reputation accreditation applicant, who otherwise looks 
 clean, however there is a very strange and somewhat concerning domain being 
 pointed to one of the applicant's IP addresses  Let's call the domain 
 example.com, and the IP address 127.0.0.1, for these purposes.

 Applicant is assigned 127.0.0.1.  the rDNS correctly goes to their own domain.

 However, example.com (which in reality is a concerning domain name) claims 
 127.0.0.1 as their A record.

I don't think having an A record in the DNS is really a claim. Let's
say I want to send mail to company.example.com but I don't like them
so much so I set up companySUCKS.foo.example.com pointing at their
mail server either through an A record or a CNAME... Then, I believe,
inside my mail, the mail could appear to be to
per...@companysucks.foo.example.com if it wasn't blocked by some
security mechanism. Perhaps this is protected speech or, with a few
changes, a parody or something.

See Section 4.1.3 You Can't Control What Names Point At You in my
RFC http://tools.ietf.org/html/rfc3675

A somewhat similar thing is in Section 4.1.4.1 of that RFC where I was
on social mailing list with an innocuous name and someone had long set
up a forwarder so that if you sent email to
cat-torturers@other.example (real left hand side, obviously not the
real right hand side). It would get sent to the social mailing list
and the that address would appear in the to: line inside the mail.
For that particular crowd, most people thought this was pretty funny,
but it is the same sort of thing.

 Of course, example.com is registered privately, and their DNS provider is one 
 who is...umm... known to provide dns for domains seen in spam.

 As I see it, the applicant's options are:

 a) just not worry about it and keep an eye on it

 b) publish a really tight spf record on it, so if they are somehow 
 compromised, email appearing to come from example.com and 127.0.0.1 should be 
 denied

 c) not use the IP address at all (it's part of a substantially larger block)

 d) two or more of the above.

 Thoughts?  What would you do?

If it isn't actually causing a problem, a) seems viable but you could
certainly do b) or c) or both if you feel like it.

Anyway, I'm not a lawyer... :-)

Donald
=
 Donald E. Eastlake 3rd   +1-508-333-2270 (cell)
 155 Beaver Street, Milford, MA 01757 USA
 d3e...@gmail.com

 Thanks!

 Anne

 Anne P. Mitchell, Esq.
 CEO/President
 ISIPP SuretyMail Email Reputation, Accreditation  Certification
 Your mail system + SuretyMail accreditation = delivered to their inbox!
 http://www.SuretyMail.com/
 http://www.SuretyMail.eu/

 Author: Section 6 of the Federal CAN-SPAM Act of 2003
 Member, California Bar Cyberspace Law Committee
 Ret. Professor of Law, Lincoln Law School of San Jose
 303-731-2121 | amitch...@isipp.com | @AnnePMitchell | Facebook/AnnePMitchell





BGP Update Report

2015-02-20 Thread cidr-report
BGP Update Report
Interval: 12-Feb-15 -to- 19-Feb-15 (7 days)
Observation Point: BGP Peering with AS131072

TOP 20 Unstable Origin AS
Rank ASNUpds %  Upds/PfxAS-Name
 1 - AS61894  367710  7.2%   122570.0 -- FreeBSD Brasil LTDA,BR
 2 - AS23752  271684  5.3%1983.1 -- NPTELECOM-NP-AS Nepal 
Telecommunications Corporation, Internet Services,NP
 3 - AS27194  218890  4.3%   109445.0 -- REALLYFAST - ReallyFast.net,US
 4 - AS9829   119288  2.3%  70.5 -- BSNL-NIB National Internet 
Backbone,IN
 5 - AS577109681  2.1%  40.6 -- BACOM - Bell Canada,CA
 6 - AS36947   71643  1.4% 312.9 -- ALGTEL-AS,DZ
 7 - AS53563   57400  1.1%5740.0 -- XPLUSONE - X Plus One 
Solutions, Inc.,US
 8 - AS13188   40017  0.8%  38.1 -- BANKINFORM-AS CONTENT DELIVERY 
NETWORK LTD,UA
 9 - AS840230288  0.6%  21.7 -- CORBINA-AS OJSC Vimpelcom,RU
10 - AS845227196  0.5%  14.1 -- TE-AS TE-AS,EG
11 - AS381625388  0.5%  27.4 -- COLOMBIA TELECOMUNICACIONES 
S.A. ESP,CO
12 - AS42337   23301  0.5% 143.0 -- RESPINA-AS Respina Networks  
Beyond PJSC,IR
13 - AS10620   22359  0.4%   7.2 -- Telmex Colombia S.A.,CO
14 - AS23342   22359  0.4% 588.4 -- UNITEDLAYER - Unitedlayer, 
Inc.,US
15 - AS28573   21680  0.4%   8.9 -- NET Serviços de Comunicação 
S.A.,BR
16 - AS197914   21019  0.4%7006.3 -- STOCKHO-AS Stockho Hosting 
SARL,FR
17 - AS273418761  0.4% 694.9 -- CORESITE - CoreSite,US
18 - AS42081   18413  0.4% 312.1 -- SPEEDY-NET-AS Speedy net EAD,BG
19 - AS28024   18284  0.4% 304.7 -- Nuevatel PCS de Bolivia S.A.,BO
20 - AS14709   17921  0.3% 779.2 -- Telefonica Moviles Panama 
S.A.,PA


TOP 20 Unstable Origin AS (Updates per announced prefix)
Rank ASNUpds %  Upds/PfxAS-Name
 1 - AS61894  367710  7.2%   122570.0 -- FreeBSD Brasil LTDA,BR
 2 - AS27194  218890  4.3%   109445.0 -- REALLYFAST - ReallyFast.net,US
 3 - AS61039   16564  0.3%   16564.0 -- ZMZ OAO ZMZ,RU
 4 - AS463368839  0.2%8839.0 -- GOODVILLE - Goodville Mutual 
Casualty Company,US
 5 - AS501047629  0.1%7629.0 -- SATORP-AS SAUDI ARAMCO TOTAL 
Refining and Petrochemical Company,SA
 6 - AS197914   21019  0.4%7006.3 -- STOCKHO-AS Stockho Hosting 
SARL,FR
 7 - AS53563   57400  1.1%5740.0 -- XPLUSONE - X Plus One 
Solutions, Inc.,US
 8 - AS25563   16309  0.3%4077.2 -- WEBLAND-AS Webland AG, 
Autonomous System,CH
 9 - AS337213832  0.1%3832.0 -- CCL-ASN2 - CARNIVAL CRUISE 
LINES,US
10 - AS33440   12758  0.2%3189.5 -- WEBRULON-NETWORK - webRulon, 
LLC,US
11 - AS621742979  0.1%2979.0 -- INTERPAN-AS INTERPAN LTD.,BG
12 - AS1980532641  0.1%2641.0 -- AMTEL VECTRA S.A.,PL
13 - AS23752  271684  5.3%1983.1 -- NPTELECOM-NP-AS Nepal 
Telecommunications Corporation, Internet Services,NP
14 - AS476809237  0.2%1847.4 -- NHCS EOBO Limited,IE
15 - AS2011491660  0.0%1660.0 -- ITSNS ITS Network Solution sp 
z o o,PL
16 - AS9581 1565  0.0%1565.0 -- TELSTRAGLOBAL-ID-AS-AP TTPL,HK
17 - AS561691560  0.0%1560.0 -- SCOMM-AS-AP SEDCO 
COMMUNICATIONS SDN BHD,MY
18 - AS1979571539  0.0%1539.0 -- KERBB Ker Broadband 
Communications Ltd,IE
19 - AS2621494046  0.1%1348.7 -- Sistemas Fratec S.A.,CR
20 - AS456066636  0.1%1327.2 -- 


TOP 20 Unstable Prefixes
Rank Prefix Upds % Origin AS -- AS Name
 1 - 177.10.158.0/24  367707  7.0%   AS61894 -- FreeBSD Brasil LTDA,BR
 2 - 202.70.88.0/21   136788  2.6%   AS23752 -- NPTELECOM-NP-AS Nepal 
Telecommunications Corporation, Internet Services,NP
 3 - 202.70.64.0/21   134332  2.5%   AS23752 -- NPTELECOM-NP-AS Nepal 
Telecommunications Corporation, Internet Services,NP
 4 - 162.246.92.0/22  109482  2.1%   AS27194 -- REALLYFAST - ReallyFast.net,US
 5 - 162.208.40.0/22  109408  2.1%   AS27194 -- REALLYFAST - ReallyFast.net,US
 6 - 105.96.0.0/22 64808  1.2%   AS36947 -- ALGTEL-AS,DZ
 7 - 199.38.164.0/23   57376  1.1%   AS53563 -- XPLUSONE - X Plus One 
Solutions, Inc.,US
 8 - 64.29.130.0/2422287  0.4%   AS23342 -- UNITEDLAYER - Unitedlayer, 
Inc.,US
 9 - 130.0.192.0/2121017  0.4%   AS197914 -- STOCKHO-AS Stockho Hosting 
SARL,FR
10 - 23.34.208.0/2118151  0.3%   AS577   -- BACOM - Bell Canada,CA
11 - 91.235.169.0/24   16564  0.3%   AS61039 -- ZMZ OAO ZMZ,RU
12 - 184.84.32.0/2016281  0.3%   AS577   -- BACOM - Bell Canada,CA
13 - 23.34.220.0/2316254  0.3%   AS577   -- BACOM - Bell Canada,CA
14 - 184.84.184.0/22   16222  0.3%   AS577   -- BACOM - Bell Canada,CA
15 - 23.34.216.0/2216213  0.3%   AS577   -- BACOM - Bell Canada,CA
16 - 184.28.42.0/2316203  0.3%   AS577   -- BACOM - Bell Canada,CA

Re: What would you do about questionable domain pointing A record to your IP address?

2015-02-20 Thread Jack Bates

On 2/20/2015 11:08 AM, Anne P. Mitchell, Esq. wrote:

a) just not worry about it and keep an eye on it
If they have held the netblock for awhile and are already using the IP 
Address in question, this is fine. I presume that the servers don't 
actually respond for that domain (name-based web or domain based 
acceptance on a mail server).



b) publish a really tight spf record on it, so if they are somehow compromised, 
email appearing to come from example.com and 127.0.0.1 should be denied
You must control a domain to control its SPF. This is not an option if 
they don't control the bad domain. DKIM or similar might be the more 
appropriate protocol? SPF protects domains, some of the other protocols 
protect the mail servers themselves.



c) not use the IP address at all (it's part of a substantially larger block)


If it's a recently acquired netblock, then it may have a bad reputation 
due to prior use. Investigating the reputation and possibly avoiding 
that particular IP Address might be warranted.


Jack


Re: [j-nsp] draft-ietf-mpls-ldp-ipv6-16

2015-02-20 Thread Tim Durack
On Fri, Feb 20, 2015 at 11:33 AM, Adam Vitkovsky adam.vitkov...@gamma.co.uk
 wrote:

  Of Tim Durack
  Sent: 20 February 2015 14:00
  IPv6 control plane this decade may yet be optimistic.
 

 And most importantly it's not actually needed it's just a whim of network
 operators.

 adam


 --
 This email has been scanned for email related threats and delivered safely
 by Mimecast.
 For more information please visit http://www.mimecast.com
 --


I don't consider unique addressing of infrastructure a whim.

-- 
Tim:


Re: What would you do about questionable domain pointing A record to your IP address?

2015-02-20 Thread William Herrin
On Fri, Feb 20, 2015 at 12:08 PM, Anne P. Mitchell, Esq.
amitch...@isipp.com wrote:
 We have an email reputation accreditation applicant, who otherwise
 looks clean, however there is a very strange and somewhat
 concerning domain being pointed to one of the applicant's IP
 addresses  Let's call the domain example.com, and the IP
 address 127.0.0.1, for these purposes.

 Applicant is assigned 127.0.0.1.  the rDNS correctly goes to their own domain.

 However, example.com (which in reality is a concerning domain
 name) claims 127.0.0.1 as their A record.

Howdy,

How does 127.0.0.1 behave when you access it and declare yourself to
be seeking example.com? If it's a mail server, what happens when you
try to mail postmas...@examplecompany.com? Do you get a no-relaying
message or one of the other errors appropriate to a server not
configured to handle mail for example.com? If it's a web server, what
happens when your browser asks for Host: www.example,com? Do you get
example.com's web page?

Also check 3rd party databases to the extent possible. Can you find
examples of dastardly example.com activity from 127.0.0.1 during a
time the whois records say applicant had control of 127.0.0.1?

You get the general idea. Check for things you know to be under the
applicant's control. If they come up clean, they're clean. If they're
dirty and they're sloppy enough to not clean up the example.com DNS
zone file then they'll be sloppy elsewhere too.

Regards,
Bill Herrin



-- 
William Herrin  her...@dirtside.com  b...@herrin.us
Owner, Dirtside Systems . Web: http://www.dirtside.com/


Weekly Routing Table Report

2015-02-20 Thread Routing Analysis Role Account
This is an automated weekly mailing describing the state of the Internet
Routing Table as seen from APNIC's router in Japan.

The posting is sent to APOPS, NANOG, AfNOG, AusNOG, SANOG, PacNOG,
CaribNOG and the RIPE Routing Working Group.

Daily listings are sent to bgp-st...@lists.apnic.net

For historical data, please see http://thyme.rand.apnic.net.

If you have any comments please contact Philip Smith pfsi...@gmail.com.

Routing Table Report   04:00 +10GMT Sat 21 Feb, 2015

Report Website: http://thyme.rand.apnic.net
Detailed Analysis:  http://thyme.rand.apnic.net/current/

Analysis Summary


BGP routing table entries examined:  533255
Prefixes after maximum aggregation (per Origin AS):  204025
Deaggregation factor:  2.61
Unique aggregates announced (without unneeded subnets):  259930
Total ASes present in the Internet Routing Table: 49437
Prefixes per ASN: 10.79
Origin-only ASes present in the Internet Routing Table:   36458
Origin ASes announcing only one prefix:   16285
Transit ASes present in the Internet Routing Table:6273
Transit-only ASes present in the Internet Routing Table:171
Average AS path length visible in the Internet Routing Table:   4.5
Max AS path length visible: 107
Max AS path prepend of ASN ( 55644) 100
Prefixes from unregistered ASNs in the Routing Table:  1334
Unregistered ASNs in the Routing Table: 436
Number of 32-bit ASNs allocated by the RIRs:   8646
Number of 32-bit ASNs visible in the Routing Table:6706
Prefixes from 32-bit ASNs in the Routing Table:   24396
Number of bogon 32-bit ASNs visible in the Routing Table: 5
Special use prefixes present in the Routing Table:0
Prefixes being announced from unallocated address space:400
Number of addresses announced to Internet:   2732253284
Equivalent to 162 /8s, 218 /16s and 224 /24s
Percentage of available address space announced:   73.8
Percentage of allocated address space announced:   73.8
Percentage of available address space allocated:  100.0
Percentage of address space in use by end-sites:   97.2
Total number of prefixes smaller than registry allocations:  180436

APNIC Region Analysis Summary
-

Prefixes being announced by APNIC Region ASes:   131658
Total APNIC prefixes after maximum aggregation:   38372
APNIC Deaggregation factor:3.43
Prefixes being announced from the APNIC address blocks:  137114
Unique aggregates announced from the APNIC address blocks:55712
APNIC Region origin ASes present in the Internet Routing Table:5024
APNIC Prefixes per ASN:   27.29
APNIC Region origin ASes announcing only one prefix:   1220
APNIC Region transit ASes present in the Internet Routing Table:872
Average APNIC Region AS path length visible:4.6
Max APNIC Region AS path length visible:107
Number of APNIC region 32-bit ASNs visible in the Routing Table:   1310
Number of APNIC addresses announced to Internet:  747396800
Equivalent to 44 /8s, 140 /16s and 94 /24s
Percentage of available APNIC address space announced: 87.3

APNIC AS Blocks4608-4864, 7467-7722, 9216-10239, 17408-18431
(pre-ERX allocations)  23552-24575, 37888-38911, 45056-46079, 55296-56319,
   58368-59391, 63488-64098, 131072-135580
APNIC Address Blocks 1/8,  14/8,  27/8,  36/8,  39/8,  42/8,  43/8,
49/8,  58/8,  59/8,  60/8,  61/8, 101/8, 103/8,
   106/8, 110/8, 111/8, 112/8, 113/8, 114/8, 115/8,
   116/8, 117/8, 118/8, 119/8, 120/8, 121/8, 122/8,
   123/8, 124/8, 125/8, 126/8, 133/8, 150/8, 153/8,
   163/8, 171/8, 175/8, 180/8, 182/8, 183/8, 202/8,
   203/8, 210/8, 211/8, 218/8, 219/8, 220/8, 221/8,
   222/8, 223/8,

ARIN Region Analysis Summary


Prefixes being announced by ARIN Region ASes:176104
Total ARIN prefixes after maximum aggregation:87045
ARIN Deaggregation factor: 2.02
Prefixes being announced from the ARIN address blocks:   178169
Unique aggregates announced from the ARIN address blocks: 83527
ARIN Region origin ASes present in the Internet Routing Table:16498
ARIN Prefixes per 

DNS Admin at Comcast

2015-02-20 Thread Mark Stevens
If a DNS Admin at Comcast could contact me offline it would be great. 
This is concerning your IPV6 configured mail servers.


Thanks,

Mark