importance of fiber cleaning

2016-09-20 Thread Mikael Abrahamsson


https://www.sunet.se/blogg/long-read-cleanliness-is-a-virtue/

This is an excellent article regarding fiber cleaning and its importance. 
Please do share with other people in our business. I'm sure lack of proper 
fiber cleaning causes a lot of unneccessary outages and operational 
problems worldwide, partly because people aren't aware of its importance.


--
Mikael Abrahamssonemail: swm...@swm.pp.se


Re: "Defensive" BGP hijacking?

2016-09-20 Thread Bryant Townsend
Hello,

We wanted to clarify that we are not the ones behind these attacks and we
were not the ones behind the previous hijackings. We have also been the
targets of DDoS attacks reaching up to 200+ Gbps (~20 times a day), every
day since Krebs' original article that included our name. We believe these
attacks are coming from vDOS past customers and other botnets that used the
vDOS service for launching and selling attacks. We have also been targeted
with what seems to be multiple e-mail list bombs in attempts to delay our
response time. As I mentioned before, NANOG's trust means everything in
this industry and we want to be able to answer as much as we can.

Sincerely,
Bryant Townsend

On Tue, Sep 20, 2016 at 8:28 PM, Tom Beecher  wrote:

> Brian Krebs tweeted out that Prolexic reported a 665Gbps attack directed at
> his site.
>
> https://twitter.com/briankrebs/status/778398865619836928
>
> On Tue, Sep 20, 2016 at 11:21 PM, Mel Beckman  wrote:
>
> > While I was reading the krebsonsecurity.com article cited below, the
> > site, hosted at Akamai address 72.52.7.144, became non responsive and now
> > appears to be offline. Traceroutes stop before the Akamai-SWIPed border
> > within Telia, as if blackholed (but adjacent IPs pass through to Akamai):
> >
> > traceroute to krebsonsecurity.com (72.52.7.144), 64 hops max, 40 byte
> > packets
> >  1  router1.sb.becknet.com (206.83.0.1)  0.771 ms  0.580 ms  0.342 ms
> >  2  206-190-77-9.static.twtelecom.net (206.190.77.9)  0.715 ms  1.026 ms
> > 0.744 ms
> >  3  ae1-90g.ar7.lax1.gblx.net (67.17.75.18)  9.532 ms  6.567 ms  2.912
> ms
> >  4  ae10.edge1.losangeles9.level3.net (4.68.111.21)  2.919 ms  2.925 ms
> > 2.904 ms
> >  5  telia-level3-4x10g.losangeles.level3.net (4.68.70.130)  3.981 ms
> > 3.567 ms  3.401 ms
> >  6  sjo-b21-link.telia.net (62.115.116.40)  11.209 ms  11.140 ms  11.161
> > ms
> >  7  * * *
> >  8  * * *
> >  9  * * *
> > 10  * * *
> >
> > Weird coincidence?
> >
> >  -mel beckman
> >
> > > On Sep 20, 2016, at 6:46 PM, Hugo Slabbert  wrote:
> > >
> > > Lucy, you got some (*serious*) 'splainin to do...
> > >
> > > http://research.dyn.com/2016/09/backconnects-suspicious-bgp-hijacks/
> > > http://krebsonsecurity.com/2016/09/ddos-mitigation-firm-
> > has-history-of-hijacks/
> > >
> > > --
> > > Hugo Slabbert   | email, xmpp/jabber: h...@slabnet.com
> > > pgp key: B178313E   | also on Signal
> > >
> > >> On Sun 2016-Sep-18 22:25:44 -0400, Tom Beecher 
> > wrote:
> > >>
> > >> So after reading your explanation of things...
> > >>
> > >> Your technical protections for your client proved sufficient to handle
> > the
> > >> attack. You took OFFENSIVE action by hijacking the IP space. By your
> own
> > >> statements, it was only in response to threats against your company.
> You
> > >> were no longer providing DDoS protection to a client. You were
> exacting
> > a
> > >> vendetta against someone who was being MEAN to you. Even if that
> person
> > >> probably deserved it, you still cannot do what was done.
> > >>
> > >> I appreciate the desire to want to protect friends and family from
> > >> anonymous threats, and also realize how ill equipped law enforcement
> > >> usually is while something like this is occurring.
> > >>
> > >> However, in my view, by taking the action you did, you have shown your
> > >> company isn't ready to be operating in the security space. Being
> > threatened
> > >> by bad actors is a nominal part of doing business in the security
> space.
> > >> Unfortunately you didn't handle it well, and I think that will stick
> to
> > you
> > >> for a long time.
> > >>
> > >> On Tue, Sep 13, 2016 at 3:29 PM, Bryant Townsend <
> > bry...@backconnect.com>
> > >> wrote:
> > >>
> > >>> @ca & Matt - No, we do not plan to ever intentionally perform a
> > >>> non-authorized BGP hijack in the future.
> > >>>
> > >>> @Steve - Correct, the attack had already been mitigated. The decision
> > to
> > >>> hijack the attackers IP space was to deal with their threats, which
> if
> > >>> carried through could have potentially lead to physical harm.
> Although
> > the
> > >>> hijack gave us a unique insight into the attackers services, it was
> > not a
> > >>> factor that influenced my decision.
> > >>>
> > >>> @Blake & Mel - We will likely cover some of these questions in a
> future
> > >>> blog post.
> > >>>
> >
>


Re: PlayStationNetwork blocking of CGNAT public addresses

2016-09-20 Thread Valdis . Kletnieks
On Wed, 21 Sep 2016 11:29:49 +1000, Mark Andrews said:

> What we need is business tech reporters to continually report on
> these failures of content providers to deliver their services over
> IPv6.  20 years lead time should be enough for any service.

Interestingly enough, the Playstation 4 has at least rudimentary IPv6
support - it will DHCPv6 and answer pings.  Threw me for a loop first
time I saw it, I couldn't figure out what unaccounted-for gear I had
that was grabbing an IPv6 address... :)


pgpXiDyor6qTh.pgp
Description: PGP signature


Re: "Defensive" BGP hijacking?

2016-09-20 Thread Tom Beecher
Brian Krebs tweeted out that Prolexic reported a 665Gbps attack directed at
his site.

https://twitter.com/briankrebs/status/778398865619836928

On Tue, Sep 20, 2016 at 11:21 PM, Mel Beckman  wrote:

> While I was reading the krebsonsecurity.com article cited below, the
> site, hosted at Akamai address 72.52.7.144, became non responsive and now
> appears to be offline. Traceroutes stop before the Akamai-SWIPed border
> within Telia, as if blackholed (but adjacent IPs pass through to Akamai):
>
> traceroute to krebsonsecurity.com (72.52.7.144), 64 hops max, 40 byte
> packets
>  1  router1.sb.becknet.com (206.83.0.1)  0.771 ms  0.580 ms  0.342 ms
>  2  206-190-77-9.static.twtelecom.net (206.190.77.9)  0.715 ms  1.026 ms
> 0.744 ms
>  3  ae1-90g.ar7.lax1.gblx.net (67.17.75.18)  9.532 ms  6.567 ms  2.912 ms
>  4  ae10.edge1.losangeles9.level3.net (4.68.111.21)  2.919 ms  2.925 ms
> 2.904 ms
>  5  telia-level3-4x10g.losangeles.level3.net (4.68.70.130)  3.981 ms
> 3.567 ms  3.401 ms
>  6  sjo-b21-link.telia.net (62.115.116.40)  11.209 ms  11.140 ms  11.161
> ms
>  7  * * *
>  8  * * *
>  9  * * *
> 10  * * *
>
> Weird coincidence?
>
>  -mel beckman
>
> > On Sep 20, 2016, at 6:46 PM, Hugo Slabbert  wrote:
> >
> > Lucy, you got some (*serious*) 'splainin to do...
> >
> > http://research.dyn.com/2016/09/backconnects-suspicious-bgp-hijacks/
> > http://krebsonsecurity.com/2016/09/ddos-mitigation-firm-
> has-history-of-hijacks/
> >
> > --
> > Hugo Slabbert   | email, xmpp/jabber: h...@slabnet.com
> > pgp key: B178313E   | also on Signal
> >
> >> On Sun 2016-Sep-18 22:25:44 -0400, Tom Beecher 
> wrote:
> >>
> >> So after reading your explanation of things...
> >>
> >> Your technical protections for your client proved sufficient to handle
> the
> >> attack. You took OFFENSIVE action by hijacking the IP space. By your own
> >> statements, it was only in response to threats against your company. You
> >> were no longer providing DDoS protection to a client. You were exacting
> a
> >> vendetta against someone who was being MEAN to you. Even if that person
> >> probably deserved it, you still cannot do what was done.
> >>
> >> I appreciate the desire to want to protect friends and family from
> >> anonymous threats, and also realize how ill equipped law enforcement
> >> usually is while something like this is occurring.
> >>
> >> However, in my view, by taking the action you did, you have shown your
> >> company isn't ready to be operating in the security space. Being
> threatened
> >> by bad actors is a nominal part of doing business in the security space.
> >> Unfortunately you didn't handle it well, and I think that will stick to
> you
> >> for a long time.
> >>
> >> On Tue, Sep 13, 2016 at 3:29 PM, Bryant Townsend <
> bry...@backconnect.com>
> >> wrote:
> >>
> >>> @ca & Matt - No, we do not plan to ever intentionally perform a
> >>> non-authorized BGP hijack in the future.
> >>>
> >>> @Steve - Correct, the attack had already been mitigated. The decision
> to
> >>> hijack the attackers IP space was to deal with their threats, which if
> >>> carried through could have potentially lead to physical harm. Although
> the
> >>> hijack gave us a unique insight into the attackers services, it was
> not a
> >>> factor that influenced my decision.
> >>>
> >>> @Blake & Mel - We will likely cover some of these questions in a future
> >>> blog post.
> >>>
>


Re: "Defensive" BGP hijacking?

2016-09-20 Thread Justin Paine via NANOG
earlier on Twitter Krebs said he was hit by 665Gbps attack (so says
Prolexic/Akamai). Could be ongoing/related.


Justin Paine
Head of Trust & Safety
CloudFlare Inc.
PGP: BBAA 6BCE 3305 7FD6 6452 7115 57B6 0114 DE0B 314D


On Tue, Sep 20, 2016 at 8:21 PM, Mel Beckman  wrote:
> While I was reading the krebsonsecurity.com article cited below, the site, 
> hosted at Akamai address 72.52.7.144, became non responsive and now appears 
> to be offline. Traceroutes stop before the Akamai-SWIPed border within Telia, 
> as if blackholed (but adjacent IPs pass through to Akamai):
>
> traceroute to krebsonsecurity.com (72.52.7.144), 64 hops max, 40 byte packets
>  1  router1.sb.becknet.com (206.83.0.1)  0.771 ms  0.580 ms  0.342 ms
>  2  206-190-77-9.static.twtelecom.net (206.190.77.9)  0.715 ms  1.026 ms  
> 0.744 ms
>  3  ae1-90g.ar7.lax1.gblx.net (67.17.75.18)  9.532 ms  6.567 ms  2.912 ms
>  4  ae10.edge1.losangeles9.level3.net (4.68.111.21)  2.919 ms  2.925 ms  
> 2.904 ms
>  5  telia-level3-4x10g.losangeles.level3.net (4.68.70.130)  3.981 ms  3.567 
> ms  3.401 ms
>  6  sjo-b21-link.telia.net (62.115.116.40)  11.209 ms  11.140 ms  11.161 ms
>  7  * * *
>  8  * * *
>  9  * * *
> 10  * * *
>
> Weird coincidence?
>
>  -mel beckman
>
>> On Sep 20, 2016, at 6:46 PM, Hugo Slabbert  wrote:
>>
>> Lucy, you got some (*serious*) 'splainin to do...
>>
>> http://research.dyn.com/2016/09/backconnects-suspicious-bgp-hijacks/
>> http://krebsonsecurity.com/2016/09/ddos-mitigation-firm-has-history-of-hijacks/
>>
>> --
>> Hugo Slabbert   | email, xmpp/jabber: h...@slabnet.com
>> pgp key: B178313E   | also on Signal
>>
>>> On Sun 2016-Sep-18 22:25:44 -0400, Tom Beecher  wrote:
>>>
>>> So after reading your explanation of things...
>>>
>>> Your technical protections for your client proved sufficient to handle the
>>> attack. You took OFFENSIVE action by hijacking the IP space. By your own
>>> statements, it was only in response to threats against your company. You
>>> were no longer providing DDoS protection to a client. You were exacting a
>>> vendetta against someone who was being MEAN to you. Even if that person
>>> probably deserved it, you still cannot do what was done.
>>>
>>> I appreciate the desire to want to protect friends and family from
>>> anonymous threats, and also realize how ill equipped law enforcement
>>> usually is while something like this is occurring.
>>>
>>> However, in my view, by taking the action you did, you have shown your
>>> company isn't ready to be operating in the security space. Being threatened
>>> by bad actors is a nominal part of doing business in the security space.
>>> Unfortunately you didn't handle it well, and I think that will stick to you
>>> for a long time.
>>>
>>> On Tue, Sep 13, 2016 at 3:29 PM, Bryant Townsend 
>>> wrote:
>>>
 @ca & Matt - No, we do not plan to ever intentionally perform a
 non-authorized BGP hijack in the future.

 @Steve - Correct, the attack had already been mitigated. The decision to
 hijack the attackers IP space was to deal with their threats, which if
 carried through could have potentially lead to physical harm. Although the
 hijack gave us a unique insight into the attackers services, it was not a
 factor that influenced my decision.

 @Blake & Mel - We will likely cover some of these questions in a future
 blog post.



Re: "Defensive" BGP hijacking?

2016-09-20 Thread Mel Beckman
While I was reading the krebsonsecurity.com article cited below, the site, 
hosted at Akamai address 72.52.7.144, became non responsive and now appears to 
be offline. Traceroutes stop before the Akamai-SWIPed border within Telia, as 
if blackholed (but adjacent IPs pass through to Akamai):

traceroute to krebsonsecurity.com (72.52.7.144), 64 hops max, 40 byte packets
 1  router1.sb.becknet.com (206.83.0.1)  0.771 ms  0.580 ms  0.342 ms
 2  206-190-77-9.static.twtelecom.net (206.190.77.9)  0.715 ms  1.026 ms  0.744 
ms
 3  ae1-90g.ar7.lax1.gblx.net (67.17.75.18)  9.532 ms  6.567 ms  2.912 ms
 4  ae10.edge1.losangeles9.level3.net (4.68.111.21)  2.919 ms  2.925 ms  2.904 
ms
 5  telia-level3-4x10g.losangeles.level3.net (4.68.70.130)  3.981 ms  3.567 ms  
3.401 ms
 6  sjo-b21-link.telia.net (62.115.116.40)  11.209 ms  11.140 ms  11.161 ms
 7  * * *
 8  * * *
 9  * * *
10  * * *

Weird coincidence?

 -mel beckman

> On Sep 20, 2016, at 6:46 PM, Hugo Slabbert  wrote:
> 
> Lucy, you got some (*serious*) 'splainin to do...
> 
> http://research.dyn.com/2016/09/backconnects-suspicious-bgp-hijacks/
> http://krebsonsecurity.com/2016/09/ddos-mitigation-firm-has-history-of-hijacks/
> 
> -- 
> Hugo Slabbert   | email, xmpp/jabber: h...@slabnet.com
> pgp key: B178313E   | also on Signal
> 
>> On Sun 2016-Sep-18 22:25:44 -0400, Tom Beecher  wrote:
>> 
>> So after reading your explanation of things...
>> 
>> Your technical protections for your client proved sufficient to handle the
>> attack. You took OFFENSIVE action by hijacking the IP space. By your own
>> statements, it was only in response to threats against your company. You
>> were no longer providing DDoS protection to a client. You were exacting a
>> vendetta against someone who was being MEAN to you. Even if that person
>> probably deserved it, you still cannot do what was done.
>> 
>> I appreciate the desire to want to protect friends and family from
>> anonymous threats, and also realize how ill equipped law enforcement
>> usually is while something like this is occurring.
>> 
>> However, in my view, by taking the action you did, you have shown your
>> company isn't ready to be operating in the security space. Being threatened
>> by bad actors is a nominal part of doing business in the security space.
>> Unfortunately you didn't handle it well, and I think that will stick to you
>> for a long time.
>> 
>> On Tue, Sep 13, 2016 at 3:29 PM, Bryant Townsend 
>> wrote:
>> 
>>> @ca & Matt - No, we do not plan to ever intentionally perform a
>>> non-authorized BGP hijack in the future.
>>> 
>>> @Steve - Correct, the attack had already been mitigated. The decision to
>>> hijack the attackers IP space was to deal with their threats, which if
>>> carried through could have potentially lead to physical harm. Although the
>>> hijack gave us a unique insight into the attackers services, it was not a
>>> factor that influenced my decision.
>>> 
>>> @Blake & Mel - We will likely cover some of these questions in a future
>>> blog post.
>>> 


Re: "Defensive" BGP hijacking?

2016-09-20 Thread Hugo Slabbert

Lucy, you got some (*serious*) 'splainin to do...

http://research.dyn.com/2016/09/backconnects-suspicious-bgp-hijacks/
http://krebsonsecurity.com/2016/09/ddos-mitigation-firm-has-history-of-hijacks/

--
Hugo Slabbert   | email, xmpp/jabber: h...@slabnet.com
pgp key: B178313E   | also on Signal

On Sun 2016-Sep-18 22:25:44 -0400, Tom Beecher  wrote:


So after reading your explanation of things...

Your technical protections for your client proved sufficient to handle the
attack. You took OFFENSIVE action by hijacking the IP space. By your own
statements, it was only in response to threats against your company. You
were no longer providing DDoS protection to a client. You were exacting a
vendetta against someone who was being MEAN to you. Even if that person
probably deserved it, you still cannot do what was done.

I appreciate the desire to want to protect friends and family from
anonymous threats, and also realize how ill equipped law enforcement
usually is while something like this is occurring.

However, in my view, by taking the action you did, you have shown your
company isn't ready to be operating in the security space. Being threatened
by bad actors is a nominal part of doing business in the security space.
Unfortunately you didn't handle it well, and I think that will stick to you
for a long time.

On Tue, Sep 13, 2016 at 3:29 PM, Bryant Townsend 
wrote:


@ca & Matt - No, we do not plan to ever intentionally perform a
non-authorized BGP hijack in the future.

@Steve - Correct, the attack had already been mitigated. The decision to
hijack the attackers IP space was to deal with their threats, which if
carried through could have potentially lead to physical harm. Although the
hijack gave us a unique insight into the attackers services, it was not a
factor that influenced my decision.

@Blake & Mel - We will likely cover some of these questions in a future
blog post.



signature.asc
Description: PGP signature


Re: PlayStationNetwork blocking of CGNAT public addresses

2016-09-20 Thread Mark Andrews

Mark Andrews writes:
> 
> In message <09342130-874f-4fa4-b410-b7b66a75f...@mtin.net>, Justin Wilson wri
> te
> s:
> > PSN is one reason I am not a fan of CGNAT. All they see are tons of
> > connections from the same IP.  This results in them banning folks.  Due
> > to them being hacked so many times getting them to actually communicate
> > is almost impossible.  My .02 is just get the gamers a true public if at
> > all possible.
> >
> > Justin Wilson
> > j...@mtin.net
> 
> What we need is business tech reporters to continually report on
> these failures of content providers to deliver their services over
> IPv6.  20 years lead time should be enough for any service.

Additionally is the a role for the SEC in ensuring that companies
take IPv6 seriously?  If I remember correctly they got involved
with Y2K.  Just because there isn't a hard date it doesn't mean
that IPv6 is any less important than Y2K to your business's survival.

> Mark
> -- 
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org


Re: PlayStationNetwork blocking of CGNAT public addresses

2016-09-20 Thread Mark Andrews

In message <09342130-874f-4fa4-b410-b7b66a75f...@mtin.net>, Justin Wilson write
s:
> PSN is one reason I am not a fan of CGNAT. All they see are tons of
> connections from the same IP.  This results in them banning folks.  Due
> to them being hacked so many times getting them to actually communicate
> is almost impossible.  My .02 is just get the gamers a true public if at
> all possible.
>
> Justin Wilson
> j...@mtin.net

What we need is business tech reporters to continually report on
these failures of content providers to deliver their services over
IPv6.  20 years lead time should be enough for any service.

Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org


Re: CDN Overload?

2016-09-20 Thread Florian Weimer
* Jon Lewis:

> This is kind of a funny problem though, because CDNs get paid to
> deliver data, and they get compared/graded according to who can
> deliver the bits the fastest...and here you are complaining that
> they're delivering the bits too fast (or at least faster than you'd
> like them to).

Surely CDNs bill packets which are subsequently dropped by the
network. :)


Re: CDN Overload?

2016-09-20 Thread Mike Hammett
This is what I'm asking of them: 


= 
Have you seen a CDN overloading a customer? Help me gather information on the 
issue. 

What CDN? 
What have you identified the traffic to be? 
What is the access network? 
Where is the rate limiting done? 
How is the rate limiting done (policing vs. queueing, SFQ, PFIFO, etc,, etc.)? 
What is doing the rate limiting? 
What is the rate-limit set to? 
Upstream of the rate-limiter, what are you seeing for inbound traffic? 
One connection or many? 
How much traffic? 
How does other traffic behave when exceeding the rate limit? 
Where is NAT performed? 
What is doing NAT? 
Shared NAT or isolated to that customer? 
Have you done a packet capture before and after the rate limiter? The NAT 
device? 
Would you be willing to send a filtered packet capture (only the frames that 
relate to this CDN) to the CDN if they want it? 



There have been reports of CDNs sending more traffic than the customer can 
handle and ignores TCP convention to slow down. Trying to investigate this 
thoroughly so we can get the CDN to fix their system. Multiple CDNs have been 
shown to do this. 
= 




- 
Mike Hammett 
Intelligent Computing Solutions 

Midwest Internet Exchange 

The Brothers WISP 

- Original Message -

From: "Mike Hammett"  
To: "NANOG"  
Sent: Monday, September 19, 2016 12:34:48 PM 
Subject: CDN Overload? 

I participate on a few other mailing lists focused on eyeball networks. For a 
couple years I've been hearing complaints from this CDN or that CDN was 
behaving badly. It's been severely ramping up the past few months. There have 
been some wild allegations, but I would like to develop a bit more standardized 
evidence collection. Initially LimeLight was the only culprit, but recently it 
has been Microsoft as well. I'm not sure if there have been any others. 

The principal complaint is that upstream of whatever is doing the rate limiting 
for a given customer there is significantly more capacity being utilized than 
the customer has purchased. This could happen briefly as TCP adjusts to the 
capacity limitation, but in some situations this has persisted for days at a 
time. I'll list out a few situations as best as I can recall them. Some of 
these may even be merges of a couple situations. The point is to show the 
general issue and develop a better process for collecting what exactly is 
happening at the time and how to address it. 

One situation had approximately 45 megabit/s of capacity being used up by a 
customer that had a 1.5 megabit/s plan. All other traffic normally held itself 
within the 1.5 megabit/s, but this particular CDN sent excessively more for 
extended periods of time. 

An often occurrence has someone with a single digit megabit/s limitation 
consuming 2x - 3x more than their plan on the other side of the rate limiter. 

Last month on my own network I saw someone with 2x - 3x being consumed upstream 
and they had *190* connections downloading said data from Microsoft. 

The past week or two I've been hearing of people only having a single 
connection downloading at more than their plan rate. 


These situations effectively shut out all other Internet traffic to that 
customer or even portion of the network for low capacity NLOS areas. It's a DoS 
caused by downloads. What happened to the days of MS BITS and you didn't even 
notice the download happening? A lot of these guys think that the CDNs are just 
a pile of dicks looking to ruin everyone's day and I'm certain that there are 
at least a couple people at each CDN that aren't that way. ;-) 




Lots of rambling, sure. What do I need to have these guys collect as evidence 
of a problem and who should they send it to? 




- 
Mike Hammett 
Intelligent Computing Solutions 

Midwest Internet Exchange 

The Brothers WISP 




Re: PlayStationNetwork blocking of CGNAT public addresses

2016-09-20 Thread Justin Wilson
PSN is one reason I am not a fan of CGNAT. All they see are tons of connections 
from the same IP.  This results in them banning folks.  Due to them being 
hacked so many times getting them to actually communicate is almost impossible. 
 My .02 is just get the gamers a true public if at all possible. 

Justin Wilson
j...@mtin.net

---
http://www.mtin.net Owner/CEO
xISP Solutions- Consulting – Data Centers - Bandwidth

http://www.midwest-ix.com  COO/Chairman
Internet Exchange - Peering - Distributed Fabric

> On Sep 20, 2016, at 8:24 AM, Danijel Starman  wrote:
> 
> Something similar happened to a local FantasyConon I was helping set up, we
> had only two PS4 machines there and accounts provided by Blizzard for
> Overwatch. Outside IP of the LAN (as it was NATed) was banned by PSN in
> about 8h. There was no other traffic other then those two accounts playing
> Overwatch so my guess is that they have some too aggressive checks. I've
> managed to convince our ISP there to change the outside IP of the link so
> we got them working the next day but it happened again in 8h.
> 
> -- 
> *blap*
> 
> On Fri, Sep 16, 2016 at 3:12 PM, Simon Lockhart  wrote:
> 
>> All,
>> 
>> We operate an access network with several hundred thousand users.
>> Increasingly
>> we're putting the users behind CGNAT in order to continue to give them an
>> IPv4
>> service (we're all dual-stack, so they all get public IPv6 too). Due to the
>> demographic of our users, many of them are gamers.
>> 
>> We're hitting a problem with PlayStationNetwork 'randomly' blocking some
>> of our
>> CGNAT outside addresses, because they claim to have received anomalous, or
>> 'attack' traffic from that IP. This obviously causes problems for the other
>> legitimate users who end up behind the same public IPv4 address.
>> 
>> Despite numerous attempts to engage with PSN, they are unwilling to give us
>> any additional information which would allow us to identify the 'rogue'
>> users
>> on our network, or to identify the 'unwanted' traffic so that we could
>> either
>> block it, or use it to identify the rogue users ourselves.
>> 
>> Has anyone else come up against the problem, and/or have any suggestions on
>> how best to resolve it?
>> 
>> Many thanks in advance,
>> 
>> Simon
>> 
>> 
> 



Re: "Defensive" BGP hijacking?

2016-09-20 Thread John Curran
On Sep 20, 2016, at 10:48 AM, Christopher Morrow 
mailto:morrowc.li...@gmail.com>> wrote:
On Tue, Sep 20, 2016 at 8:05 AM, John Curran 
mailto:jcur...@arin.net>> wrote:
...
If you want to just use your legacy address block (wth the same services that
where in place at ARIN's formation), then you don't need to enter into an LRSA -
but please do still update your registration in the ARIN registry to have 
current
contact data, as this helps deter potential hijackers.   If you want to have 
those
services that were developed since ARIN's formation, then I'd suggest reviewing
the actual current LRSA agreement, as it is significantly improved over earlier
versions.


and probably: "If you think there are still improvements, show up at arin 
meetings and lobby for change"

yes?

Absolutely.
/John


Re: "Defensive" BGP hijacking?

2016-09-20 Thread Christopher Morrow
On Tue, Sep 20, 2016 at 8:05 AM, John Curran  wrote:

> On Sep 19, 2016, at 11:58 PM, Christopher Morrow 
> wrote:
> >
> > (caution! I don't really think arin is evil!)
>
> Nor do I…  (but I will remind folks that organizations evolve based on
> participation,
> so ongoing diligence and involvement is definitely warranted.)
>
> > On Mon, Sep 19, 2016 at 1:16 PM, John Curran  wrote:
> >
> >> To be clear, he would still end up bound to an agreement which provides
> >> that they
> >> indemnify the RIR regarding their RPKI usage (which was the complaint
> >> expressed
> >> in the NANOG community regarding ARIN’s RPKI terms and conditions) -
> >>
> >>
> > maybe, but his point was that the evil (evile?) arin would not be putting
> > their clutches on his ip-address-spaces... Sure he's trading ARIN for
> RIPE
> > here, but I diidn't think the RPA bit was his concern as much as the LRSA
> > and 'now that you agree these are ip blocks are subject to the legacy
> > registry services agreement, we (arin - with twisty mustasche) might
> decide
> > to wrest them away from you!!!’
>
> A distinct possibly, but much improved in the current LRSA (and RSA, which
> are the same document at this point.)   Unless he’s planning to not pay the
> annual maintenance fee and ignore the notices and letters that follow over
> the next 120 days, or if going to make a serious misrepresentation in the
> process of claiming the rights to the address block, he’s fairly safe...
> for
> example,  ARIN now specifically disclaims revocation for lack of
> utilization.
> (Furthermore, if ARIN breaches its obligations, the status of the address
> block reverts to the same prior to entry the LRSA – this is definitely less
> than RIPE provides, which is effectively exit at any time, but far better
> than
> the original LRSA.)
>
> If you want to just use your legacy address block (wth the same services
> that
> where in place at ARIN’s formation), then you don’t need to enter into an
> LRSA –
> but please do still update your registration in the ARIN registry to have
> current
> contact data, as this helps deter potential hijackers.   If you want to
> have those
> services that were developed since ARIN’s formation, then I’d suggest
> reviewing
> the actual current LRSA agreement, as it is significantly improved over
> earlier
> versions.
>
>
and probably: "If you think there are still improvements, show up at arin
meetings and lobby for change"

yes?


> Thanks!
> /John
>
> John Curran
> President and CEO
> [Evil?] ARIN
>
>
>
>


Re: Customers announcing communities to SP of SP

2016-09-20 Thread Joe Provo
On Mon, Sep 19, 2016 at 12:00:36PM -0400, Jason Lixfeld wrote:
> Hi,
> 
> Consider the following scenario:
> 
> - Customer A is a customer of SP A
> - SP A is a customer of SP B
> - SP B has a traffic engineering community implementation 
> 
> With regards to using BGP communities for TE:
> 
> - Does SP A write their own community implementation that maps to (some 
> portion of) the community implementation of SP B?
> - Does SP A write their own community implementation that has no mappings at 
> all to the community implementation of SP B; any TE that is required to be 
> pushed to SP B is done by some dialog and coordination between Customer A and 
> SP A?
> - Does SP A allow Customer A to announce prefixes tagged with SP B???s 
> communities[1][2]

"Sometimes" for all of the above; it depends on the network.  There are 
networs which strip all signalling but their own. There are those who 
will strip signalling to their immediate neighbors (expecting customers
to use thri own).  There are some which propagate anything and everything.

IME, it is generally good to sanitize an input stream of signalling you 
use to reduce unknown/difficult to trace conditions.  It is also a good 
principle for a sender to be aware of how far their dollars/euros/quatloos
propagate, as that's pretty much the limit of guarantee others will act 
on their requests.  In your scenario, when SP B changes their communities, 
they have no obligation (nor method) to let a downstream of a downstream
know about it...

> - Is this sort of thing really complicated today, but one of the
> goals of draft-heitz-idr-large-community?

It can be complicated - review the various way folks have published 
their policies via the compilation up at https://onestep.net/communities/
and you'll see a number of approaches. I can't speak for the authors, 
but by my reading draft-heitz-idr-large-community provides two things: 
- parity for 32b and 16b use in communities
- the room to clearly express multiple party ASNs distinctly from 
  'take action' data, which we do not have now

Cheers!

Joe

-- 
RSUC / GweepNet / Spunk / FnB / CotSG / Usenix / NANOG


Re: PlayStationNetwork blocking of CGNAT public addresses

2016-09-20 Thread Danijel Starman
Something similar happened to a local FantasyConon I was helping set up, we
had only two PS4 machines there and accounts provided by Blizzard for
Overwatch. Outside IP of the LAN (as it was NATed) was banned by PSN in
about 8h. There was no other traffic other then those two accounts playing
Overwatch so my guess is that they have some too aggressive checks. I've
managed to convince our ISP there to change the outside IP of the link so
we got them working the next day but it happened again in 8h.

-- 
*blap*

On Fri, Sep 16, 2016 at 3:12 PM, Simon Lockhart  wrote:

> All,
>
> We operate an access network with several hundred thousand users.
> Increasingly
> we're putting the users behind CGNAT in order to continue to give them an
> IPv4
> service (we're all dual-stack, so they all get public IPv6 too). Due to the
> demographic of our users, many of them are gamers.
>
> We're hitting a problem with PlayStationNetwork 'randomly' blocking some
> of our
> CGNAT outside addresses, because they claim to have received anomalous, or
> 'attack' traffic from that IP. This obviously causes problems for the other
> legitimate users who end up behind the same public IPv4 address.
>
> Despite numerous attempts to engage with PSN, they are unwilling to give us
> any additional information which would allow us to identify the 'rogue'
> users
> on our network, or to identify the 'unwanted' traffic so that we could
> either
> block it, or use it to identify the rogue users ourselves.
>
> Has anyone else come up against the problem, and/or have any suggestions on
> how best to resolve it?
>
> Many thanks in advance,
>
> Simon
>
>


Re: "Defensive" BGP hijacking?

2016-09-20 Thread John Curran
On Sep 19, 2016, at 11:58 PM, Christopher Morrow  
wrote:
> 
> (caution! I don't really think arin is evil!)

Nor do I…  (but I will remind folks that organizations evolve based on 
participation, 
so ongoing diligence and involvement is definitely warranted.) 

> On Mon, Sep 19, 2016 at 1:16 PM, John Curran  wrote:
> 
>> To be clear, he would still end up bound to an agreement which provides
>> that they
>> indemnify the RIR regarding their RPKI usage (which was the complaint
>> expressed
>> in the NANOG community regarding ARIN’s RPKI terms and conditions) -
>> 
>> 
> maybe, but his point was that the evil (evile?) arin would not be putting
> their clutches on his ip-address-spaces... Sure he's trading ARIN for RIPE
> here, but I diidn't think the RPA bit was his concern as much as the LRSA
> and 'now that you agree these are ip blocks are subject to the legacy
> registry services agreement, we (arin - with twisty mustasche) might decide
> to wrest them away from you!!!’

A distinct possibly, but much improved in the current LRSA (and RSA, which
are the same document at this point.)   Unless he’s planning to not pay the 
annual maintenance fee and ignore the notices and letters that follow over
the next 120 days, or if going to make a serious misrepresentation in the 
process of claiming the rights to the address block, he’s fairly safe... for 
example,  ARIN now specifically disclaims revocation for lack of utilization.
(Furthermore, if ARIN breaches its obligations, the status of the address 
block reverts to the same prior to entry the LRSA – this is definitely less 
than RIPE provides, which is effectively exit at any time, but far better than 
the original LRSA.)

If you want to just use your legacy address block (wth the same services that
where in place at ARIN’s formation), then you don’t need to enter into an LRSA –
but please do still update your registration in the ARIN registry to have 
current 
contact data, as this helps deter potential hijackers.   If you want to have 
those
services that were developed since ARIN’s formation, then I’d suggest reviewing 
the actual current LRSA agreement, as it is significantly improved over earlier
versions.

Thanks!
/John

John Curran
President and CEO
[Evil?] ARIN





Re: CDN Overload?

2016-09-20 Thread Mike Hammett
What do most broadband platforms do for rate limiting? 




- 
Mike Hammett 
Intelligent Computing Solutions 

Midwest Internet Exchange 

The Brothers WISP 

- Original Message -

From: "Matthew Walster"  
To: "George Skorup"  
Cc: "nanog list"  
Sent: Tuesday, September 20, 2016 2:44:24 AM 
Subject: Re: CDN Overload? 

On 20 Sep 2016 9:14 am, "George Skorup"  wrote: 

> 

> Now lets move the Windows 10 updates. A 'buried in the sticks' customer 
on Canopy 900 FSK. 1.5Mbps/384k. Multiple streams from Microsoft and LLNW 
at the same time. LLNW alone had maybe 10 streams going and was sending at 
over 15Mbps on average and at worst about 25Mbps... to a 1.5Mbps 
subscriber. I could throw in a MikroTik queue upstream which only moved the 
problem as that 15-25Mbps was still hitting backhaul links. And when I have 
a 100Mbps link going into the site, 25Mbps is a lot. 


Maybe I'm being naive but this sounds like an issue primarily with buffers. 
Police rather than shape the traffic, and reduce the burst size, and a lot 
of this should disappear... 


M 



Re: CDN Overload?

2016-09-20 Thread Matthew Walster
On 20 Sep 2016 9:14 am, "George Skorup"  wrote:

>

> Now lets move the Windows 10 updates. A 'buried in the sticks' customer
on Canopy 900 FSK. 1.5Mbps/384k. Multiple streams from Microsoft and LLNW
at the same time. LLNW alone had maybe 10 streams going and was sending at
over 15Mbps on average and at worst about 25Mbps... to a 1.5Mbps
subscriber. I could throw in a MikroTik queue upstream which only moved the
problem as that 15-25Mbps was still hitting backhaul links. And when I have
a 100Mbps link going into the site, 25Mbps is a lot.


Maybe I'm being naive but this sounds like an issue primarily with buffers.
Police rather than shape the traffic, and reduce the burst size, and a lot
of this should disappear...


M