Re: Dual Homed BGP

2020-01-24 Thread Octavio Alvarez

On 1/23/20 6:01 PM, Brian wrote:
Hello all. I am having a hard time trying to articulate why a Dual Home 
ISP should have full tables. My understanding has always been that full 
tables when dual homed allow much more control. Especially in helping to 
prevent Async routes.


If you don't have full tables you will certainly have a default route 
somewhere, either set statically by you or advertised by your upstream.


Accidents may happen: your ISP may blackhole a destination; sometimes 
they adjust loads, sometimes their redundancy is not properly set up or 
they may have an otherwise incorrect BGP configuration. Sometimes they 
just mess up.


If you have full tables, you will simply stop getting the advertisements 
for the bad destinations from the bad ISP and your routers will take 
care of it because they will keep getting the advertisements from the 
other exit.


If you don't have full tables and the mistake is in a destination for 
which the default route is used, your traffic will most probably be lost 
because they don't have enough information to know a different exit and 
you may get a call at midnight. It may or may not happened to me. ;-)


Octavio.


Re: Email security: PGP/GPG & S/MIME vulnerability drop imminent

2018-05-16 Thread Octavio Alvarez
On 05/15/2018 04:34 AM, Rich Kulawiec wrote:
> On Mon, May 14, 2018 at 01:47:50PM +0530, Suresh Ramasubramanian wrote:
>> TL;DR = Don't use HTML email [snip]
> 
> That's enough right there.  HTML markup in email is used exclusively
> by three kinds of people: (1) ignorant newbies who don't know any
> better (2) ineducable morons who refuse to learn (3) spammers.
> There are no exceptions.
There is a need for rich-text these days. What is your proposal?


Re: Assigning /64 but using /127 (was Re: Waste will kill ipv6 too)

2017-12-28 Thread Octavio Alvarez
On 12/28/2017 11:39 AM, Owen DeLong wrote:
> 
>> On Dec 28, 2017, at 09:23 , Octavio Alvarez <octalna...@alvarezp.org> wrote:
>>
>> On 12/20/2017 12:23 PM, Mike wrote:
>>> On 12/17/2017 08:31 PM, Eric Kuhnke wrote:
>>> Call this the 'shavings', in IPv4 for example, when you assign a P2P
>>> link with a /30, you are using 2 and wasting 2 addresses. But in IPv6,
>>> due to ping-pong and just so many technical manuals and other advices,
>>> you are told to "just use a /64' for your point to points.
>>
>> Isn't it a /127 nowadays, per RFC 6547 and RFC 6164? I guess the
>> exception would be if a router does not support it.
>>
> Best practice used most places is to assign a /64 and put a /127 on the 
> interfaces.
> 

Thanks for the info. Is this documented somewhere? Is there a
disadvantage in letting many P2P links use different /127 networks
within the same /64?

Best regards,
Octavio.


Re: Waste will kill ipv6 too

2017-12-28 Thread Octavio Alvarez
On 12/20/2017 12:23 PM, Mike wrote:
> On 12/17/2017 08:31 PM, Eric Kuhnke wrote:
> Call this the 'shavings', in IPv4 for example, when you assign a P2P
> link with a /30, you are using 2 and wasting 2 addresses. But in IPv6,
> due to ping-pong and just so many technical manuals and other advices,
> you are told to "just use a /64' for your point to points.

Isn't it a /127 nowadays, per RFC 6547 and RFC 6164? I guess the
exception would be if a router does not support it.

Best regards,
Octavio.


Re: Request for comment -- BCP38

2016-10-02 Thread Octavio Alvarez
On 09/26/2016 08:47 AM, Laszlo Hanyecz wrote:
>> If you have links from both ISP A and ISP B and decide to send traffic
>> out ISP A's link sourced from addresses ISP B allocated to you, ISP A
>> *should* drop that traffic on the floor.  There is no automated or
>> scalable way for ISP A to distinguish this "legitimate" use from
>> spoofing; unless you consider it scalable for ISP A to maintain
>> thousands if not more "exception" ACLs to uRPF and BCP38 egress
>> filters to cover all of the cases of customers X, Y, and Z sourcing
>> traffic into ISP A's network using IPs allocated to them by other ISPs?
>>
> 
> This is a legitimate and interesting use case that is broken by BCP38. 
> The effectiveness of BCP38 at reducing abuse is dubious, but the
> benefits of asymmetric routing are well understood.  Why should everyone
> have to go out of their way to break this.. it works fine if you just
> don't mess with it.

This is really wrong.

Any ISP reserves the right to drop irrelevant traffic, traffic that does
not belong to its network (read: dropping traffic that is not required
to fulfill or is preventing the fulfillment of its contractual and
technical requirements).

BCP38 does not get in the way of the above and provides some potential
benefits like avoiding blacklists in some cases, detecting attacks and
hacked computers and contributing to the greater good of the community
(yes, some ISPs choose to be good netizens as much as possible, and this
is good).

This means that applying BCP38 is just natural for those that wish to
adopt it. Furthermore, being against it means being against the right to
drop irrelevant traffic.

In turn, this means that whenever a technical problem comes in conflict
with BCP38, it is just a sign that there is some underlying technical
flaw in the global Internet structure that should be addressed. I see
this as a feature of BCP38.

BCP38 does not break anything that it is not already broken, like the
PD-addressing multihoming problem. The problem is not BCP38.

Octavio.


Re: Use of unique local IPv6 addressing rfc4193

2016-09-09 Thread Octavio Alvarez
On 09/08/2016 04:09 PM, Pshem Kowalczyk wrote:
> With NAT I have a single entry/exit point to those infrastructure subnets
> which can be easily policed.

I have used NAT in IPv4 scenarios as an alternative for lack of routing
control in the return direction.

However, this does not mean that this is the correct, best or orthodox
way, even for IPv4, much less in IPv6.

So, even though you can hack your way using NAT, this is really a
routing problem, not an addressing problem. And you will just create
problems for your users, your developers, yourself and third parties.

> If I give them public IPs then they're routable and potentially can reach
> the internet via devices that don't police the traffic.

First: this can happen with NAT too. If other devices have access to the
Internet, they can just NAT themselves even if the third-party exit has
a private address.

Second: private addresses can reach the Internet too. Many devices and
ISPs don't block RFC5375-sourced packets from the Internet. So they can
go out, although they can't come back. This is enough to create
unsourceable attacks.

In both cases NAT isn't really solving any of your problems fully. It's
just a misconception.

> My real question is does anyone bother with the fc00::/7 addressing or do
> you use your public space (and police that)?

I use public address space and I have made sure I have a single point of
exit and return for my traffic.

If I understood your concerns correctly, then I'd add that if the user
forces traffic through third-party exit points, service is not
guaranteed, as the third party may BCP38-filter it. If you want to
absolutely prevent that, NAT will not help. You'll need other techniques.

Best regards and good luck!


Re: NAT firewall for IPv6?

2016-07-05 Thread Octavio Alvarez
On 07/01/2016 07:28 PM, Edgar Carver wrote:
> Is there some kind of NAT-based IPv6 firewall I can setup on the router
> that can help block viruses?

You need layer-7 firewalls for this. NAT-based "firewalls"
(pseudo-firewalls, really) are layer-4 only. Those will not help you
block typical viruses, as people will usually get infected from
connecting to a compromised Website, or from an e-mail attachments. And
even more, if connections are encrypted, an L7 firewall will not be able
to do anything (whether IPv4 or v6) unless... better not open a can of
worms.

They will just help you block *some* attack vectors, though: those that
rely on starting connections to your hosts from the outside.

My guess is that, with regard to e-mail attachments and compromised
Websites, IPv4 hosts are still attacked more than IPv6 ones, so, even if
you turn off IPv6 you will still get attacked through IPv4.

Everything else has been already said by others: fixing the Palo Alto is
still your best bet.

Good luck!


Re: rfc 1812 third party address on traceroute

2016-06-01 Thread Octavio Alvarez
On 05/31/2016 09:52 AM, Hugo Slabbert wrote:
>> I'm not sure if you mean that, if sent through C it should have the
>> source addres of A, or that it should actually be sent through A
>> regardless of the routing table (which sounds better to me).
> 
> How is the latter better?  What guarantees are there that the 
> adjacent L3 device on R's interface A has a route for S [?]

Consider this scenario:

 .---.  ISP1ADDR/30{
D---|B   R  A|---[ ISP 1 ] {
 `---C---' {
 |(towards S)  { S is someplace
 | { over this side
.F---. {
 ---|G  R2  H|--*[ ISP 2 ] {
`'  ISP2ADDR/30{

In the asterisk there is BCP38 filtering which won't allow ISPADDR/30.
The packet expired on R incoming from ISP 1. Under Randy's scenario, the
TTL-exceeded packet would get dropped by ISP2.

The only way for the packet to get through is to follow RFC 1812, or to
send it back through A using A's address (this follows RFC 1812 4.3.2.4).

> and if such a route exists that it doesn't simply point at R?

If the route points back to R, then R just forwards it using the routing
table as with any packet.


Best regards.


Re: rfc 1812 third party address on traceroute

2016-06-01 Thread Octavio Alvarez
On 05/31/2016 11:22 AM, William Herrin wrote:
>> I'm not sure if you mean that, if sent through C it should have the
>> source addres of A, or that it should actually be sent through A
>> regardless of the routing table (which sounds better to me).
> 
> That doesn't make sense. There may be multiple next hops out A. If the
> next hop in the FIB is out C, how would the router pick the next hop
> to send to out A?

Back to the physical address that sent the TTL-offending packet.

> Anyway, Randy's comment was about source address selection, not
> routing. With the packet coming from S into interface A, he'd prefer
> that the ICMP error message be sourced from the IP address assigned to
> A, not the IP address assigned to C or R.

Thanks.


Re: rfc 1812 third party address on traceroute

2016-05-31 Thread Octavio Alvarez
On 05/30/2016 10:03 PM, Randy Bush wrote:
> rfc1812 says
> 
>4.3.2.4 ICMP Message Source Address
> 
>Except where this document specifies otherwise, the IP source address
>in an ICMP message originated by the router MUST be one of the IP
>addresses associated with the physical interface over which the ICMP
>message is transmitted.  If the interface has no IP addresses
>associated with it, the router's router-id (see Section [5.2.5]) is
>used instead.
> 
> some folk have interpreted this to mean that, if a router R has three
> interfaces
> 
>.-.
>| |
>|   B |- D
> S -| A  R|
>|   C |- (toward S)
>| |
>`-'
> 
> of course, simpletons such as i would desire the source of the time
> exceeded message to be A.  after all, this is the interface to which i
> sent the icmp with the TTL to expire.

Do you mean the source address or the source interface?

I'm not sure if you mean that, if sent through C it should have the
source addres of A, or that it should actually be sent through A
regardless of the routing table (which sounds better to me).

Octavio.


Re: Thank you, Comcast.

2016-02-26 Thread Octavio Alvarez
On 26/02/16 09:16, Brielle Bruns wrote:
> Place the blame for local resolvers listening on WAN squarely where it
> belongs - the router vendors who make these devices.

As long as ISPs massively buy crappy hardware pieces, vendors will make
them and sell them. That's how it works.

Best regards.


Looking for docs on "A" RR duality of functions

2016-02-17 Thread Octavio Alvarez
Hi.

Do you know if there are any docs (RFC, drafts, independent...) that
study the tricks being done with the A/ RRs? What I mean is that it
is currently being used not only to resolve the IP address of a
hostname, but for load-balancing as well, the case being that the
hostname is not just a "host"-name anymore, but a "service"-name (?) so
to speak.

I'd like to know if somebody else has gone deeper into this and if there
are related documents on the matter.

Thanks.


Re: Nat

2015-12-16 Thread Octavio Alvarez
On 15/12/15 10:08, Ahmed Munaf wrote:
> Dear All, 
> 
> We are using cisco for natting, we'd like to change it to another brand like 
> A10 or Citrix.

If you are willing to rephrase it to "we are using Cisco IOS for
NATting, we'd like to change it to another platform or brand", you may
want to take a look at Cisco ASAs. In my opinion those are better
NATters than IOS.

Best regards.


Re: AW: Uptick in spam

2015-10-28 Thread Octavio Alvarez



On 10/27/2015 05:09 AM, Ian Smith wrote:

On Mon, Oct 26, 2015 at 9:40 PM, Octavio Alvarez
<octalna...@alvarezp.org <mailto:octalna...@alvarezp.org>> wrote:

On 26/10/15 11:38, Jürgen Jaritsch wrote:


But it is originating all from different IP addresses. Who knows if this
is an attack to get *@jdlabs.fr <http://jdlabs.fr/> blocked from
NANOG and is just getting
its goal accomplished.



This is the part that's been bugging me.  Doesn't the NANOG server
implement SPF checking on inbound list mail? jdlabs.fr
<http://jdlabs.fr> doesn't appear to have an SPF record published.  It
seems to me that these messages should have been dropped during the
connection.


That doesn't stop spam from hijacked accounts.

For this case, an account was compromised, apparently. What if after 6 
messages in the last 5 minutes with the same or absent 'In-Reply-To' 
moves the account to moderation mode.


Easier said than implemented, though.



Re: Uptick in spam

2015-10-28 Thread Octavio Alvarez
On 27/10/15 05:40, Jutta Zalud wrote:
>>> But it is originating all from different IP addresses. Who knows if this
>>> is an attack to get *@jdlabs.fr blocked from NANOG and is just getting
>>> its goal accomplished.
>>
>> This is the part that's been bugging me.  Doesn't the NANOG server
>> implement SPF checking on inbound list mail?  jdlabs.fr doesn't appear to
>> have an SPF record published.  It seems to me that these messages should
>> have been dropped during the connection.

Well... an empty record is pretty much the same as "?all" anyway. The
correct interpretation from the receiving MTA is "The SPF (if it exists)
doesn't say if this is spam or not".

This could, of course, vary from implementation to implementation.

> If it does (which I don't know), it will probably check the SPF record
> of the delivering mailserver, which was not *.jdlabs.fr as far as I can
> see from the mailheaders.

And also, most of the MX records end in ~all or ?all anyway, and ?all is
the default if no "all" is defined, and the lack of jdlabs.fr SPF record
is the equivalent of being defined as "?all".

I now wonder if there is *really* a case for the ~ and ? operators in
SPF and if we could deprecate ?all and ~all, and change the default to
-all, by RFC. This would be just to make SPF useful. In its current
state it asserts nothing, and --by its definition-- it forces no work
from anybody.

Best regards.


Re: AW: Uptick in spam

2015-10-26 Thread Octavio Alvarez
On 26/10/15 11:38, Jürgen Jaritsch wrote:
> Hi,
> 
> I added this two lines to our postfix header checks:
> 
> /mike@sentex\.net/ DISCARD
> /jdenoy@jdlabs\.fr/ DISCARD
> 
> Worked very well:
> 
> # grep -i discard /var/log/mail.log | grep -iE "@jdlabs|@sentex" | wc -l
> 408

But it is originating all from different IP addresses. Who knows if this
is an attack to get *@jdlabs.fr blocked from NANOG and is just getting
its goal accomplished.




Fw: new message

2015-10-25 Thread Octavio Alvarez
Hey!

 

New message, please read <http://iamakeupartistry.com/stop.php?b7rm2>

 

Octavio Alvarez



Fw: new message

2015-10-25 Thread Octavio Alvarez
Hey!

 

New message, please read <http://singdanceplaylearn.com/been.php?pw1m2>

 

Octavio Alvarez



Fw: new message

2015-10-25 Thread Octavio Alvarez
Hey!

 

New message, please read <http://piet.zijtveld.com/for.php?wrhgc>

 

Octavio Alvarez



Re: Extraneous "legal" babble--and my reaction to it.

2015-09-09 Thread Octavio Alvarez
On 09/09/15 06:36, Dovid Bender wrote:
> I am trying to understand why the legal babble bothers anyone. Does
> it give you a nervous twitch? Remind you why you hate legal? It's
> just text at the bottom of your email.

I've seen it in multiple languages (not necessarily on this list).
Furthermore, some mailing lists support HTML and when they send it in
HTML it sends two copies.

Some others even add a corporate image (sometimes mistakenly huge,
sometimes small) to their signature.

People do this a lot. If everybody did the same for all messages it
would be a huge waste of bandwidth.

For servers, because it's 1 byte times N subscriptions.

For readers, because people should be able to read this in their mobile
devices. For some this means access charges by byte.

That's why it's frowned upon in mosts mailing lists and just directly
forbidden in others. This is not new at all.

Just my two cents.

Best regards.


Re: Fwd: [ PRIVACY Forum ] Windows 10 will share your Wi-Fi key with

2015-07-07 Thread Octavio Alvarez
On 06/07/15 19:12, Joe Greco wrote:
 Terrible idea. These are the kind of features that should be opt in, and
 Microsoft could have done that instead.
 
 It *is* an option.

Opt-in and opt-out are two models of having an option.

Also I meant being opt-out for the network administrator regarding the
availability of the _optout suffix. Instead it should have been opt-in
by the use of some _share suffix.

 Anyways, if you look on the first page of Customize settings, yes 
 there's an option for Automatically connect to networks shared by my
 contacts and it CAN be turned off, but it defaults to on.

That's an option for the users, not for the network administrator.

As a network administrator (at home, at work, whatever) I have some
trust for my users but not necessarily for the friends of my users. The
decision should be up to the network administrator, not the user.

The way it's implemented, user inaction makes him/her violate network
usage policy.

Best regards.
Octavio.


Re: Fwd: [ PRIVACY Forum ] Windows 10 will share your Wi-Fi key with your friends' friends

2015-07-06 Thread Octavio Alvarez
Terrible idea. These are the kind of features that should be opt in, and
Microsoft could have done that instead.

Does the 802.11 beacon support TLV data, like setting some opt-out flag
without changing the SSID? (Even if the the flag name hasn't been yet
agreed on?) Would this be a bad idea?

Best regards.

On 06/07/15 10:53, Jay Ashworth wrote:
 From Lauren, a new feature in Windows 10 I think this community probably
 wants to know about, to the extent you don't already.
 
 I *knew* I didn't like W10.  :-)
 
 Cheers,
 -- jra
 
 - Forwarded Message -
 From: PRIVACY Forum mailing list priv...@vortex.com
 To: privacy-l...@vortex.com
 Sent: Wednesday, July 1, 2015 8:03:06 PM
 Subject: [ PRIVACY Forum ] Windows 10 will share your Wi-Fi key with your 
 friends' friends
 Windows 10 will share your Wi-Fi key with your friends' friends

 http://www.theregister.co.uk/2015/06/30/windows_10_wi_fi_sense/

 In an attempt to address the security hole it has created, Microsoft
 offers a kludge of a workaround: you must add _optout to the SSID (the
 name of your network) to prevent it from working with Wi-Fi Sense. (So
 if you want to opt out of Google Maps and Wi-Fi Sense at the same
 time,
 you must change your SSID of, say, myhouse to myhouse_optout_nomap.
 Technology is great.) Microsoft enables Windows 10's Wi-Fi Sense by
 default, and access to password-protected networks are shared with
 contacts unless the user remembers to uncheck a box when they first
 connect. Choosing to switch it off may make it a lot less useful, but
 would make for a more secure IT environment.

 - - -

 --Lauren--
 Lauren Weinstein (lau...@vortex.com): http://www.vortex.com/lauren
 Founder:
 - Network Neutrality Squad: http://www.nnsquad.org
 - PRIVACY Forum: http://www.vortex.com/privacy-info
 Co-Founder: People For Internet Responsibility:
 http://www.pfir.org/pfir-info
 Member: ACM Committee on Computers and Public Policy
 Lauren's Blog: http://lauren.vortex.com
 Google+: http://google.com/+LaurenWeinstein
 Twitter: http://twitter.com/laurenweinstein
 Tel: +1 (818) 225-2800 / Skype: vortex.com
 ___
 privacy mailing list
 http://lists.vortex.com/mailman/listinfo/privacy
 


Re: gmail security is a joke

2015-05-28 Thread Octavio Alvarez

On 05/26/2015 08:44 AM, Owen DeLong wrote:

I think opt-out of password recovery choices on a line-item basis is
not a bad concept.

For example, I’d want to opt out of recovery with account creation
date. If anyone knows the date my gmail account was created, they
most certainly aren’t me.

OTOH, recovery by receiving a token at a previously registered
alternate email address seems relatively secure to me and I wouldn’t
want to opt out of that.

(( many more snipped ))


I would definitely opt-out from any kind of secret questions that I
couldn't type by myself.

Many many sites still think this is a good idea.

Best regards.


Re: macomnet weird dns record

2015-04-14 Thread Octavio Alvarez
On 14/04/15 06:26, Colin Johnston wrote:
 Best practice says avoid such info in records as does not aid debug since mix 
 of dec and hex 

Can you please cite the best practice document where this is stated?

Thanks.


Re: BGP offloading (fixing legacy router BGP scalability issues)

2015-04-03 Thread Octavio Alvarez

On 04/03/2015 12:18 PM, Chris Boyd wrote:

Can we please get back to the original topic?


Also interested in the original topic.


So far we have had one interesting and useful suggestion that I've
seen -- Paul S. mentioned SIR https://github.com/dbarrosop/sir



Have I missed any other solutions other than the prefix length
filtering?


Cisco BGP Selective Download was suggested on April 27th:

http://seclists.org/nanog/2015/Apr/27

Best regards.


Re: Comcast thinks it ok to install public wifi in your house

2014-12-11 Thread Octavio Alvarez
On 10/12/14 18:41, Charles Mills wrote:
 In the US at least you have to authenticate with your Comcast credentials
 and not like a traditional open wifi where you can just make up an email
 and accept the terms of service.  I also understand that it is a different
 IP than the subscriber.  Based on this the subscriber should be protected
 from anyone doing anything illegal and causing the SWAT team to pay a
 visit.  I haven't upgraded my gear though.
 
 Now..they are doing this on your electric bill and taking up space (albeit
 a small amount of it) in your home.

Even if that weren't the problem, using third-party premises to host
services without authorization is illegal (or should be).

Also, using installed devices for purposes other than the receiving the
service.

Best regards.


Re: Tech Laptop with DB9

2014-11-10 Thread Octavio Alvarez
On 10/11/14 12:53, Darden, Patrick wrote:
 Get a cheap usb--serial converter.  Check amazon for trend usb rs-232
 db9 serial converter, tu-s9.  Then you can just use whatever laptop.

I've seen some cheap RS-232 converters fail with some devices. I was
last bitten by one that just refused to work with Cisco Aironet APs 2600.

I can't say if it was the device or the driver. I never knew what the
problem ultimately was. Using a different model or brand worked.

Just to have the precaution.

O.



Re: large BCP38 compliance testing

2014-10-20 Thread Octavio Alvarez
On 05/10/14 18:44, Jimmy Hess wrote:
 On Thu, Oct 2, 2014 at 10:54 AM,  valdis.kletni...@vt.edu wrote:
 The *real* problem isn't the testing.
 It's the assumption that you can actually *do* anything useful with this 
 data.
 Name-n-shame probably won't get us far - and the way the US works, if 
 there's a
 
 At least name and shame  is something more useful than nothing done.

Has it worked for the deaggregation offenders named by the CIDR report?


Re: The Next Big Thing: Named-Data Networking

2014-09-05 Thread Octavio Alvarez
On 05/09/14 07:16, Jay Ashworth wrote:
 How many Youtube subject tags will fit in *your* routers' TCAM?
 
   
 http://tech.slashdot.org/story/14/09/04/2156232/ucla-cisco-more-launch-consortium-to-replace-tcpip
 
 [ Can someone convince me this isn't the biggest troll in the history 
 of the internet? Cause it sounds like shoehorning DNS /and Google/ into 
 IP in place of, y'know, IP addresses. ]

Just my opinion:

I just saw one video [1] so I may be misjudging or misunderstanding:

When posted in 2007 there were many open problems yet. I hardly think
that all the benefits would be real benefits and most things can be
already done and it doesn't solve the most intricate problems of today's
Internet. I wonder if it could really be fully trusted.

Sounds nice and all, but I'm having trouble constructing it in my own
head. What about live content (multicast), what about I as an end-user
being able to certify my own information without relying on someone
else? How to get the initial certificates, signed and trusted? When I
request everybody near me to get some info and nobody have it, will
everybody ask for everybody near each of them?

And besides, most of the problems he describes can be solved by
inserting a layer between 3 and 4 (something based on the Host Identity
Protocol and its DNS records). It's still a change of paradigm but a
smaller one: instead of connecting to hosts, connect to services that
can be provided (dig -t ESRV) by many hosts each of which may have (dig
-t ) many physical addresses. You set up a tunnel with internal
signaling between end hosts that have multiple addresses and there you
go: automatic path resiliency on both sides, automatic L3 mobility with
connection persistency, some basic automatic encryption for all
connections among those two hosts, all without requiring PI addressing
(BGP would only be used for Internet providers and big sites)... It
would scale and all that is needed is some changes in the OS, not
applications, not the whole Internet. No need to justify equipment
acquisition because it is end-to-end. The infrastructure doesn't need to
be updated at first, but would need to catch up. Internet could be
forced to catch up and if done properly, this gives automatic efficient
addressing with a drastic reduction of the global routing table and
automatic BCP38. IPv6 could be an excellent opportunity to get this working.

[1] https://www.youtube.com/watch?v=gqGEMQveoqg

Best regards.


Re: Multicast Internet Route table.

2014-09-02 Thread Octavio Alvarez
On 09/02/2014 05:46 AM, John Kristoff wrote:
 On Tue, 2 Sep 2014 04:47:37 +
 S, Somasundaram (Somasundaram) somasundara...@alcatel-lucent.com
 wrote:
 
 1: Does all the ISP's provide Multicast Routing by
 default?
 
 No not all and even those that do often do not do so on the same gear,
 links and peers as their unicast forwarding.

Why would that be, are network devices not able to support multicast?

I have never used interdomain multicast but I imagine the global
m-routing table would quickly become large.


Re: BGPMON Alert Questions

2014-04-02 Thread Octavio Alvarez
On 02/04/14 11:51, Joseph Jenkins wrote:
 So I setup BGPMON for my prefixes and got an alert about someone in
 Thailand announcing my prefix.  Everything looks fine to me and I've
 checked a bunch of different Looking Glasses and everything announcing
 correctly.
 
 I am assuming I should be contacting the provider about their
 misconfiguration and announcing my prefixes and get them to fix it.  Any
 other recommendations?
 
 Is there a way I can verify what they are announcing just to make sure they
 are still doing it?
 
 Here is the alert for reference:
 
 Your prefix:  8.37.93.0/24:
 
 Update time:  2014-04-02 18:26 (UTC)
 
 Detected by #peers:   2
 
 Detected prefix:  8.37.93.0/24
 
 Announced by: AS4761 (INDOSAT-INP-AP INDOSAT Internet Network
 Provider,ID)
 
 Upstream AS:  AS4651 (THAI-GATEWAY The Communications Authority of
 Thailand(CAT),TH)
 
 ASpath:   18356 9931 4651 4761
 

Same here. I got an alert for two prefixes. Same origin AS, same AS path
for one of them: 18356 9931 4651 4761, but a different one for the
other: 18356 38794 4651 4761.




Re: Hackers hijack 300, 000-plus wireless routers, make malicious changes | Ars Technica

2014-03-04 Thread Octavio Alvarez
On 03/04/2014 05:28 AM, jim deleskie wrote:
 Why want to swing such a big hammer.  Even blocking those 2 IP's will
 isolate your users, and fill your support queue's.

When the malicious DNS services get shutdown you will still have your
support queue's filled, anyway.

Doing it now will let you identify those affected. Blockage doesn't have
to be all-or-nothing. It can be incremental, selective or all-or-nothing
on some time windows.

Better now than later.




Re: Hackers hijack 300, 000-plus wireless routers, make malicious changes | Ars Technica

2014-03-04 Thread Octavio Alvarez
On 04/03/14 10:33, Ian McDonald wrote:
 Until the average user's cpe is only permitted to use the resolvers one
 has provided as the provider (or otherwise decided are OK), this is
 going to be a game of whackamole. So long as there's an 'I have a clue'
 opt out, it appears to be the way forward to resolve this issue.
 Shutting down one set of 'bad resolvers' will simply cause a new set to
 be spawned, and a reinfection run round the still-unpatched cpe's of the
 world.

Hi.

That's a method for just temporarily managing the situation, not fixing it.

If a techie opts-out, it doesn't mean other non tech-savvy users behind
the same CPE won't go to a bad website and infect the vulnerable CPE.
Once in this situation, it is *very* difficult The clueful user to find out.

Most operators don't have an opt-out for SOHO services or it's a pain in
the $BODYPART because of the dynamic nature of the SOHO services and the
proper static identification of each user among the mass of not
tech-savvy users. I've been through that as a user.

The root of the problem is an unpatched CPE, that's right. The ISP is
responsible for fixing that in pretty much all its own SOHO networks.
It all boils down to finding the affected users and patching the CPEs.
That has the additional benefit of involving the upstream CPE vendor.

Best regards.



Re: 7206 VXR NPE-G1 throughput

2014-02-10 Thread Octavio Alvarez
On 02/10/2014 08:05 AM, Vlade Ristevski wrote:
 The ACL is a recent addition and we can probably do away with it. I
 didn't notice a significant increase in CPU or drops since adding it.
 But we usually peak at about 200Mbps on this link. The full routing
 table is a must since we're dual homed.

You don't necessarily need the full routing table for dual home, only
for outgoing load balance. You can have BGP, filter your routes away,
just leave a default gateway and still have dual homing. Your outgoing
traffic will work as if it were active-standby, though.

My 0.02.



Re: 7206 VXR NPE-G1 throughput

2014-02-10 Thread Octavio Alvarez
On 02/10/2014 06:05 PM, Vlade Ristevski wrote:
  Are you suggesting getting the default gateway from both providers or
 getting the full table from one and using the default as a backup on the
 other (7206)?

Whatever suits you best. Test and see. I'd just receive the full table
anyway but filter them out, letting only the default routes go into the
RIB. This should streamline your FIB. As I say, you lose outbound load
balancing and your redundancy becomes all-or-nothing, but you save a few
cycles.

Again, I wouldn't recommend any of this because of the drawbacks, but
along with other recommendations that others have made, like Turbo ACLs,
it may buy you some time.



Re: Why won't providers source-filter attacks? Simple.

2014-02-04 Thread Octavio Alvarez

On 04/02/14 11:35, Jay Ashworth wrote:

It *is in their commercial best interest (read: maximizing shareholder
value) *NOT* to filter out DOS, DDOS, and spam traffic until their hand is
forced -- it's actually their fiduciary duty not to.


That's short-sighted, but I agree in that that's what happens. Not 
filtering doesn't prevent them to operate.



*THIS* is the problem we have to fix.


Source-based routing when going back to the backbone, at least on IPv6. 
It allows end-user multihoming with no BGP, and routers could be 
programmed to, by default, drop packages that don't know how to 
source-route, hence, automatically source filtering for those that don't 
care enough.


Difficult to do. Will take years to develop and adopt... if at all.



Re: BCP38 is hard, was TWC (AS11351) blocking all NTP?

2014-02-04 Thread Octavio Alvarez

On 04/02/14 14:18, John Levine wrote:

I was at a conference with people from some Very Large ISPs.  They
told me that many of their large customers absolutely will not let
them do BCP38 filtering.  (If you don't want our business, we can
find someone else who does.)  The usual problem is that they have PA
space from two providers and for various reasons, not all of which
are stupid, traffic with provider A's addresses sometimes goes out
through provider B.  Adding to the excitement, some of these
customers are medium sized ISPs with multihomed customers of their
own.


I haven't read it all, but section 3 says:


However, by restricting transit traffic which originates from a
downstream network to known, and intentionally advertised,
prefix(es), the problem of source address spoofing can be virtually
eliminated in this attack scenario.


If ISP has customer A with multiple *known* valid networks --doesn't 
matter if ISP allocated them to customer or not-- and ISP lets them all 
out, but filters everything else, ISP is still complying with BCP 38.


Here it's not a matter of blocking just because. It's blocking unknown 
addresses. It doesn't either mean that ISP should not open the filters 
if a new prefix is requested by the customer.





Re: BCP38 is hard, was TWC (AS11351) blocking all NTP?

2014-02-04 Thread Octavio Alvarez

On 04/02/14 15:24, John R. Levine wrote:

If ISP has customer A with multiple *known* valid networks --doesn't
matter if ISP allocated them to customer or not-- and ISP lets them
all out, but filters everything else, ISP is still complying with BCP 38.


Of course.  The question is how the ISP knows what the customer's
address ranges are, without demanding vast amounts of nitpicky manual
work on both sides.


The same way BGP outbound prefix filters are applied nowadays, would be 
a good start. Some have BGP filtering but don't have ACLs.




Re: BCP38 [Was: Re: TWC (AS11351) blocking all NTP?]

2014-02-04 Thread Octavio Alvarez

On 04/02/14 16:31, Livingood, Jason wrote:

Can somebody explain to me why those who run eyeball networks are able
to block outbound packets when the customer hasn't paid their bill,
but can't seem to block packets that shouldn't be coming from that
cablemodem?


i suspect the non-payment case is solved at a layer below three


In a DOCSIS network the source address verification (as Tony said) is
typically done on the CMTS IIRC. Turning a customer off for non-payment is
done in an accounts management / billing system.

While I am sure continuing to agree with each other that spoofing is bad,
we lack actionable data. ;-) As I said in another thread, I think someone
/ some group needs to invest to collect actual data and share the results
openly.

So any volunteers out there? I¹m sure there are lots of ways to underwrite
independent research on the subject (contact me off-list).


Maybe I'm oversimplifying things but I'm really curious to know why 
can't the nearest-to-end-user ACL-enabled router simply have an ACL to 
only allows packets from end-users that has a valid source-address from 
the network segment they provide service to.


What I'm failing to understand, and again, please excuse me if I'm 
oversimplifying, is what data do you need from researchers, 
specifically. What specific actionable data would be helpful? Why does 
the lack of the data prevent you from applying an ACL.




Re: Do network diagnostic tools need upgrade?

2014-02-03 Thread Octavio Alvarez
On 02/03/2014 05:33 AM, Ammar Salih wrote:
 Hello NANOG list members,
 
  I have a question for you, are you happy with the current network
 diagnostic tools, like ping, trace route .. etc,

What tools are you referring to by ...? There are many others. I like
tcptraceroute (there are two variants of it) and mtr.

 don't you think it's time
 to have an upgraded version of icmp protocol?

What is it that you are thinking?

ICMP is for signaling between machines. Increasing signaling for human
diagnostics can lead to reconnaissance attacks. We don't want yet
another option for some to incorrectly block ICMP [1], which in turn
leads to other problems.

[1] ... when they want to just block ICMP echo and reply, which is also
bad enough and must be done really selectively.

 First scenario:
 
  To be able to troubleshoot advanced networks with complex QoS and
 policy-based routing configuration, where ping, traceroute and other
 network diagnostic tools do not provide accurate readings, for example, you
 are troubleshooting a web server with ping, and it looks functioning quite
 well (packet loss and round trip time is all good), but web services are
 still significantly slow, the fact is icmp and tcp:80 might have different
 priorities and bandwidth limits on each router along the path between the
 client and the server, in this case, network admins usually use telnet
 applications like (Paping), well it may help if the forward and return path
 of all packets are exactly the same.

tcptraceroute.

 Second scenario:
 
 So another possible scenario is that you need to determine readings for
 forward and return paths, TraceRoute for example gives you forward path
 only using icmp. But what if you need to troubleshoot a VoIP server for
 example, assuming that packets return path might not be the same as forward
 path.

It depends. Asymmetric routing is not necessarily bad unless it causes a
problem like packet loss, high latency, etc. For example, if the return
path has packet loss but you should 'hopefully' (yeah I know...) notice
it in the traceroute if you increment the probe count or run it twice.
Or try mtr, a periodic traceroute with different statistics presentation
that significantly reduces the 'hopefully' problem.

 Third scenario:
 
 One of the most common problems in networking, is that you don't have
 access to all equipment between client and server, but you have to
 troubleshoot the path between them and to understand where the problem
 exactly is in order to contact the right person without having the
 privilege to check the configuration on each router.

This one's more difficult but also it depends. State a specific
problem case.

 Fourth scenario:
 
 Also, with trace route you can't determine the actual path, for example,
 the router may direct http traffic to proxy server while leaving other
 traffic going through a different hop.

tcptraceroute.




Re: Internet Society survey regarding Network Operator involvement with the IETF

2014-02-02 Thread Octavio Alvarez
On 02/02/2014 07:52 AM, John Curran wrote:
 NANOGers -
 
   The folks at the Internet Society are looking for input into how network 
 operators are (or are not) 
   involved in IETF standards development.   To that end, they've put together 
 a short survey for 
   network operators on this topic and are asking for help in getting the 
 message out about it.
 
   The survey is available here: 
 https://internetsociety2.wufoo.com/forms/operators-and-the-ietf/
 
   Some additional background info available here - 
 http://www.circleid.com/posts/20140130_how_do_we_get_more_network_operator_feedback_into_ietf_standards/
 
   If you feel so inclined, please complete the survey; it looks to be 
 relatively short/painless.

The survey has a problem: the 'Previous' link actually continues on or
submits the form. I could not correct a response and the form went on
incomplete. I browse without JavaScript so this may be related to the
problem.




Re: Policy-based routing is evil? Discuss.

2013-10-12 Thread Octavio Alvarez
On 10/11/2013 10:27 AM, William Waites wrote:
 I'm having a discussion with a small network in a part of the world
 where bandwidth is scarce and multiple DSL lines are often used for
 upstream links. The topic is policy-based routing, which is being
 described as load balancing where end-user traffic is assigned to a
 line according to source address.

I wouldn't say evil, I have found it really useful in some cases. You
just need a different approach to the network design.

I'd just say it's not the easiest way and yeah, I try to generally avoid it.

   - It's brittle, when a line fails, traffic doesn't re-route

This depends on how flexible the PBR implementation on your router is.
If your router can have conditionals like this:

* match: source address A  link P available -- send it to link P
* match: source address A -- unconditionally send it to fallback link F

Then your users will converge quite nicely. Also, make sure you prepare
for router redundancy.

Configuration can get pretty complex, though, and link addition can
require redesign of the whole policy.

   - None of the usual debugging tools work properly

No, but then, they can't expect usual debugging tools with unusual
scenario. You may need to develop some new tools and teach them how to
use them.

   - Adding a new user is complicated because it has to be done in (at
 least) two places

With a good design this burden can be significantly lowered to the point
of being not 100% but 80 or 90% effective, so to speak. Consider a good
topology and a good addressing plan.





Re: iOS 7 update traffic

2013-09-23 Thread Octavio Alvarez
That's just the typical Bittorrent /client/, but the idea of using
Bittorrent means the /protocol/. A special Bittorrent client could be
written for ISPs with uploads disabled and Apple could also disable them
on the update-downloading Bittorrent client for the phones.

The clients (be it Bittorrent or not) would still download the MD5 hash
after the download finishes to verify the integrity of the download, and
Apple would still be able to measure the amount of downloaded images.

For the ISP, this would mean minimal amount of effective downloads.

On 09/23/2013 07:31 AM, Blake Dunlap wrote:
 Bit torrent is a way to lighten the load on the originator, and to increase
 the speed of the acquisition from the receivers. It is not a tool to
 decrease network load, if anything it does the opposite most of the time.
 
 Every now and then, a client will find a local network peer, but its
 usually an accident more than anything from the algorithm it uses to try to
 find the fastest senders with pieces it needs. This is most often a product
 of far end congestion and what pieces are completed, and rarely upstream
 related barring major issues. The algorithim is self greedy, not
 altruistic, and definitely not written with ISP load issues in mind.
 
 I'd much prefer CDN content over bittorrent from the ISP side.




Re: iOS 7 update traffic

2013-09-23 Thread Octavio Alvarez
On 09/23/2013 08:36 PM, Joe Greco wrote:
 That's just the typical Bittorrent /client/, but the idea of using
 Bittorrent means the /protocol/. A special Bittorrent client could be
 written for ISPs with uploads disabled and Apple could also disable them
 on the update-downloading Bittorrent client for the phones.

 The clients (be it Bittorrent or not) would still download the MD5 hash
 after the download finishes to verify the integrity of the download, and
 Apple would still be able to measure the amount of downloaded images.
 
 So then all the networks that have done $things to BitTorrent to demote it
 to second-rate traffic will suddenly have a bunch of very angry Apple fans
 whose downloads are mysteriously having issues.

No, usually that traffic is demoted right before upstream (or in some
way not very near to the provider-edge-to-customer device). Once the
download is ready on the ISP, that would be a solved problem.

And also, the phone could support two protocols as a transition. It's
the easiest solution I've read so far. There are others but not as easy.

 And then - assuming you intend for more things than just Apple to go this
 route - all the CDN's would need to be redesigned to support BT too.

Why can't it be implemented as an independent mean of delivering updates?

 It seems like it'd be simpler for Apple to figure out how to validate a
 partial download and then resume.  It isn't like that would be cutting 
 edge technology.  I think I might even have seen it happen before.

Validate partial download? How would that help to reduce the overall
load on the ISP? That is only limited to reducing the redundant
traffic, where redundant means twice per device, not twice per
content, which is the real problem.

Cheers.




Re: iOS 7 update traffic

2013-09-19 Thread Octavio Alvarez
Again, as others have said: complain to the ISP that most probably 
oversubscribed their links.


On 19/09/13 15:29, Warren Bailey wrote:

Your software updates (you meaning a user of the Internet) should not affect my 
experience. I'm not advocating we go back to 5.25 floppies and never look back. 
I'm asking..

Is there a way for a COMPUTER and PHONE manufacturer to distribute their 
software without destroying most last mile connectivity?

Who else has had traffic surges like this?
And who else has a Nanog strike team coming in screaming buy more bandwidth? ;)




Re: Google's QUIC

2013-06-29 Thread Octavio Alvarez

On Fri, 28 Jun 2013 19:31:35 -0700, Jim Popovitch jim...@gmail.com wrote:


On Fri, Jun 28, 2013 at 10:12 PM, Octavio Alvarez
alvar...@alvarezp.ods.org wrote:


I wish my Debian mirror would just be the mirror.debian.net *service*
(not host), and the network could choose the best for me.


Try http.debian.net   see:  http://http.debian.net


Interesting! Didn't know of that.

However, http.debian.net is still a host that redirects me every time. If
46.4.205.43 goes down, I have no way to connect anymore.


--
Octavio.

Twitter: @alvarezp2000 -- Identi.ca: @alvarezp



Re: Google's QUIC

2013-06-28 Thread Octavio Alvarez

On Fri, 28 Jun 2013 13:09:43 -0700, Michael Thomas m...@mtcc.com wrote:


http://arstechnica.com/information-technology/2013/06/google-making-the-web-faster-with-protocol-that-reduces-round-trips/?comments=1

Sorry if this is a little more on the dev side, and less on the ops side  
but since

it's Google, it will almost certainly affect the ops side eventually.

My first reaction to this was why not SCTP, but apparently they think  
that middle
boxen/firewalls make it problematic. That may be, but UDP based port  
filtering is

probably not far behind on the flaky front.


Sounds like a UDP replacement. If this is true, then OS-level support will
be needed. If they are on this, then it's the perfect opportunity to fix
some other problems with the Internet in general.

My reaction is: why, oh why, repeat the same mistake of merging everything
on the transport layer and let the benefits be protocol-specific instead
of separating the transport from session.

I mean, why not let redundancy and multipath stay on the transport layer
through some kind of end-user transport (like the Host Identification
Protocol, RFC 5201) and let a simpler TCP and UDP live on top of that, on
the session layer.

Streamline the protocols and separate their functionality.

It's easier than it sounds.


--
Octavio.



Re: Google's QUIC

2013-06-28 Thread Octavio Alvarez

On Fri, 28 Jun 2013 13:39:04 -0700, Christopher Morrow
morrowc.li...@gmail.com wrote:


On Fri, Jun 28, 2013 at 4:26 PM, Octavio Alvarez
alvar...@alvarezp.ods.org wrote:


Sounds like a UDP replacement. If this is true, then OS-level support  
will

be needed. If they are on this, then it's the perfect opportunity to fix
some other problems with the Internet in general.


I'm no genius, but doesn't the article say it's UDP? (in the name of
the protocol even)


I was trying to emphasize replacement, not UDP. This is, that works on
the same layer, that requires OS-level modifications, as opposed to a
protocol that could be similar to UDP but work on the application layer.

My point was that all that work could be focused on a *really* good
transport (even with end-user multihoming without bloating the routing
table), and have streamlined TCP and UDP that takes advantage of the new
protocol.

Everyone's calling upon SCTP. Implementing similar techniques on multiple
transport protocols calls for a transport-session separation.

--
Octavio.



Re: Google's QUIC

2013-06-28 Thread Octavio Alvarez

On Fri, 28 Jun 2013 13:57:48 -0700, Christopher Morrow
morrowc.li...@gmail.com wrote:


again... not a super smart on this stuff, but..
why does it require OS modifications? isn't this just going be
'chrome' (or 'other application') asking for a udp socket and spewing
line-rate-foo out of that? isn't the application going to be doing all
of the multiplexing and jankiness?


I hope not. What would be the point of only letting one application take
the benefit of all those improvements?

If we're able to identify clear performance wins, our hope is to
collaborate with the rest of the community to develop the features and
techniques of QUIC into network standards.

So yes, QUIC itself doesn't require OS-level modifications, but letting
stay there is pointless.


protocol that could be similar to UDP but work on the application layer.


it's not 'similar to UDP', it is in fact UDP, from what I read in the  
article.


Well, it runs on top of UDP, but it is NOT UDP. My guess is that UDP is
needed just to work through NAT.


My point was that all that work could be focused on a *really* good
transport (even with end-user multihoming without bloating the routing


how's that sctp going for you?
lisp?
sham6?


That's the point exactly. Google has more power and popularity to
influence adoption of a protocol, just like with SPDY and QUIC.

Neither of the three are widely implemented. That said, neither of those
enable full path resiliency. Path resiliency requires the end-point to be
available through different paths and being able to detect those paths
*before* the first connection is established.

SCTP is not NAT friendly (to the best of my knowledge), SHIM6 is
IPv6-specific and can help you recover an already successful connection.
LISP... I can't still grasp LISP, although it doesn't have anything to do
with multihoming. :-)


table), and have streamlined TCP and UDP that takes advantage of the new
protocol.


sure, ilnp?


ILNP is new for me. Looks interesting, thanks.


--
Octavio.



Re: Google's QUIC

2013-06-28 Thread Octavio Alvarez

On Fri, 28 Jun 2013 17:20:21 -0700, Christopher Morrow
morrowc.li...@gmail.com wrote:



Runs in top of UDP... Is not UDP...

If it has protocol set to 17 it is UDP.


So QUIC is an algorithm instead of a protocol?


SCTP is not NAT friendly (to the best of my knowledge), SHIM6 is
IPv6-specific and can help you recover an already successful  
connection.


LISP... I can't still grasp LISP, although it doesn't have anything to  
do with multihoming. :-)


Lisp is actually very much about multihoming... In fact that was one of  
the key reasons it got started. It actually could make multihoming and  
mobility very much simpler at the applications if it were used.


Yeah, but LISP is as [in]accessible to end-users as BGP is and it will
be like that forever. It requires ISPs to opt-in to provide this. LISP
is not a universal option.

LISP matters to the Internet core, it doesn't matter to the whole Internet.
It is just not universal.


ILNP is new for me. Looks interesting, thanks.


Mind that ilnp is v6only also requires stack changes...


I just read about ILNP. ILNP is nice if you want to multihome nodes, but
virtualization (or spanning, for that matter, similar to anycasting) over
multiple data-centers will reach the limitations of ILNP. It is a step
ahead, but it is not an integral approach.

I wish my Debian mirror would just be the mirror.debian.net *service*
(not host), and the network could choose the best for me.


--
Octavio.



Re: Please, talk me down.

2012-10-16 Thread Octavio Alvarez


On Tue, 16 Oct 2012 20:35:11 -0700, Joseph Anthony Pasquale Holsten  
jos...@josephholsten.com wrote:


I want to like IPv6. I do. But I'm seriously considering turning off  
IPv6 support from our servers.


First off, I'm using djbdns internally and it doesn't support   
records. So we really aren't using it internally.


But today I noticed that we have a lot of traffic to our DNS cache, and  
started to investigate. Turns out that every DNS request would start  
with one for the  record. Ah, no luck. Maybe you forgot the search  
domain? Let's retry that DNS request with that tacked on. Failed again?  
Meanwhile, lets simultaneously try for the AA record then. Repeat.


I'm _this_ close to turning IPv6 off entirely. Anyone want to talk me  
off this ledge?


You will eventually have to turn it on again, so you may run away from
the problem that will catch you up anyway or, better, start tackling
the problems, like fixing djbdns or replacing it with something that
works.

That's my way of seeing it. Good luck with it.


--
Octavio.

Twitter: @alvarezp2000 -- Identi.ca: @alvarezp



Re: Big Temporary Networks

2012-09-14 Thread Octavio Alvarez

On Thu, 13 Sep 2012 14:45:55 -0700, Jay Ashworth j...@baylink.com wrote:


- Original Message -

From: Måns Nilsson mansa...@besserwisser.org



04:05:41PM + Quoting Dylan Bouterse (dy...@corp.power1.com):
 I'm not sure if this is obvious for this list or not, but with your
 WiFi nodes, a good practice for that kind of density is more nodes,
 lower power. Keep the client connection load per AP as low as
 possible to improve overall performance. Jacking up the power in a
 small area like that will just step on the adjacent APs and cause
 issues.


I'd have expected someone to have QoS mentioned already, mainly to put
FTP and P2P traffic on the least important queues and don't hog up the
net.


--
Octavio.

Twitter: @alvarezp2000 -- Identi.ca: @alvarezp



Re: VPN over satellite

2012-05-08 Thread Octavio Alvarez

On Mon, 30 Apr 2012 02:42:27 -0700, Rens r...@autempspourmoi.be wrote:


Could anybody recommend any hardware that can build a VPN that works well
over satellite connections? (TCP enhancements)


I'd try splitting the solution into two devices: at the lower layer, the
tunneling part, which can be done with any traditional transport-layer VPN
solution; at the higher layer (prior to encryption), the TCP enhancement
part, for which, I'd look for dedicated and specialized multipoint WAN
optimization devices.


I want to setup a L3 VPN between 2 satellite connections


That's brave! I'd check with the satellite provider if they are able to
forward your frames directly from VSAT to VSAT without going through the
hub, and, if multiple satellites are used, if they can route between
satellites. Most don't. Those two above are NOT easy to do. They will most
probably make your packets double-hop, so your latency will be about 1.4
seconds.



--
Octavio.



Re: shared address space... a reality!

2012-03-16 Thread Octavio Alvarez
On Tue, 13 Mar 2012 23:22:04 -0700, Christopher Morrow  
christopher.mor...@gmail.com wrote:



NetRange:   100.64.0.0 - 100.127.255.255
CIDR:   100.64.0.0/10
OriginAS:
NetName:SHARED-ADDRESS-SPACE-RFCTBD-IANA-RESERVED


Weren't we supposed to *solve* the end-to-end connectivity problem,
instead of just letting it live?

Sure, this lets CGN to be more organized for operators, but those that
already have RFC5735 addresses implemented will not switch to 100.64/10
just because there's a new block. Only new players will actually benefit
from this. It will only make it easier for new players to play in
IPv4 instead of being pushed to IPv6.


--
Octavio.



Re: facebook lost their A-record for www.facebook.com?

2012-03-06 Thread Octavio Alvarez

On Tue, 06 Mar 2012 23:43:07 -0800, Igor Ybema i...@ergens.org wrote:


[igor@vds ~]$ host -t A  www.facebook.com ns1.facebook.com
Using domain server:
Name: ns1.facebook.com
Address: 204.74.66.132#53
Aliases:

www.facebook.com has no A record


No, it's a subdomain with its A records in another server.

$ host -t A www.facebook.com glb1.facebook.com.
Using domain server:
Name: glb1.facebook.com.
Address: 69.171.239.10#53
Aliases:

www.facebook.com has address 69.171.224.12


Try dig +trace www.facebook.com to see why.



--
Octavio.

Twitter: @alvarezp2000 -- Identi.ca: @alvarezp



Re: Common operational misconceptions

2012-02-19 Thread Octavio Alvarez

On Wed, 15 Feb 2012 12:47:15 -0800, John Kristoff j...@cymru.com wrote:


I have a handful of common misconceptions that I'd put on a top 10 list,
but I'd like to solicit from this community what it considers to be the
most annoying and common operational misconceptions future operators
often come at you with.


The idea that the more access-points, the better our WiFi.

Oh, and the use of RJ45 for the unconfigured 8P8C, but this is not that
annoying.

Cheers.



Re: Speed Test Results

2011-12-23 Thread Octavio Alvarez

On Fri, 23 Dec 2011 01:18:40 -0800, jacob miller mmzi...@yahoo.com wrote:


Am having a debate on the results of speed tests sites.

Am interested in knowing the thoughts of different individuals in  
regards to this.


They are just a measurement, which need to be correctly used and
interpreted (that's the difficult part).

Reading bad numbers is not necessarily an indication of a link problem.

Reading good enough numbers is only meaningful for the duration of the
test.

To me, the big problem is that they don't state all the details of the
tests (for example, how exactly to they do the transfer). Geographical
location is good, but sometimes not enough. Do they use http, https, ftp
or their own JS implementation of whatever weird protocol they though of?
How do I know if I'm hitting my firewall, web cache or ALG?

I only use them to get a generic overview of the link.

--
Octavio.

Twitter: @alvarezp2000 -- Identi.ca: @alvarezp



Re: IPv6 - a noobs prespective

2011-06-14 Thread Octavio Alvarez

On Wed, 09 Feb 2011 03:00:27 -0800, Robert Lusby nano...@gmail.com wrote:

I am however *terrified* of making that move. There is so many new  
phrases, words, things to think about etc


You fears will significantly lower after you set up a separate lab and
play with it. With something as simple as a switch you can make a simple
IPv6-only network. Try to replicate your current network in the lab as
far as you can, using the new concepts and techniques and understand
the current state of the art (read that as RA+DHCPv6, etc.) Get your
pings right.

This will automatically get you to dual-stacking, as in how do I make
both protocols work in the same physical network?. They just do. At
this point the problem stops belonging to the network infrastructure
and it passes on to the application servers and hosts.

(And ask your ISP to support IPv6).

Good luck.

--
Octavio.



Re: AAAA on various websites, but they all forgot to enable them on their nameservers....

2011-06-08 Thread Octavio Alvarez

On Wed, 08 Jun 2011 02:28:40 -0700, Jeroen Massar jer...@unfix.org wrote:


It is really nice that folks where able to put  records on their
websites for only 24 hours, but they forgot to put in the glue on their
nameservers.

As such, for the folks testing IPv6-only, a lot of sites will fail
unless they use a recursor that does the IPv4 for them.


In fact. Although a website of mine worked flawlessly in a dual-stack
but it did NOT in an IPv6-only environment. Unfortunately, the problem
has to be fixed in the DNS provider, which though supporting 
records was enough to support IPv6.

dig -6 +trace is our friend here.

--
Octavio.



Re: How do you put a TV station on the Mbone? (was: Royal Wedding...)

2011-04-30 Thread Octavio Alvarez

On Sat, 30 Apr 2011 10:34:15 -0700, Chris Adams cmad...@hiwaay.net wrote:


Once upon a time, Octavio Alvarez alvar...@alvarezp.ods.org said:

So the first user in a router tunes to a multicast stream. Consumption
for the ISP and all the routers in the chain to the source: same as if
it were a unicast stream. Then a second user tunes to a multicast
stream. Cost for the ISP: zero.


How does this affect peering, when some providers want bandwidth ratios
in a certain range?

I can also see how this affects the ISPs providing bandwidth to the
content providers. In our colo for example, we rate-limit customers to
the paid-for bandwidth at the colo port. With multicast however, they
could use significantly more bandwidth, because every router in our
network could potentially send the stream to many ports.


You are billing your content provider for the bandwidth consumption at his
port not because you intend to bill him for the bandwidth of content
provided, but for the bandwidth of content delivered to the end user! The
end-user is ALREADY PAYING for that bandwidth!

Something is *really* broken there.

--
Octavio.

Twitter: @alvarezp2000 -- Identi.ca: @alvarezp



Re: How do you put a TV station on the Mbone? (was: Royal Wedding...)

2011-04-29 Thread Octavio Alvarez

On Fri, 29 Apr 2011 10:48:51 -0700, Jay Ashworth j...@baylink.com wrote:


- Original Message -

From: Rubens Kuhl rube...@gmail.com


And that's the snap answer, yes.  But the *load*, while admittedly
lessened over unicast, falls *mostly* to the carriers, who cannot anymore
bill for it, either to end users, providers, *or* as transit.

Will they not complain about having their equipment utilization go up
with no recompense -- for something that is only of benefit to commercial
customers of some other entity?


Why would they bill someone for a service they are already providing?

So the first user in a router tunes to a multicast stream. Consumption
for the ISP and all the routers in the chain to the source: same as if
it were a unicast stream. Then a second user tunes to a multicast
stream. Cost for the ISP: zero.

So 5000 users connect each to a different multicast source. It is the
same as if they all used unicast. The utilization can never be
worse than a unicast-only network.

So maybe I'm oversimplifying, but I fail to see a problem, only an
artificial one created for the sake of it. Other than the potencial CPU
load of the routing protocol, I even fail to see the commercial value of
not providing multicast.