Re: Charter DNS servers returning malware filtered IP addresses

2023-10-27 Thread niels=nanog

* Owen DeLong [Sat 28 Oct 2023, 01:00 CEST]:
If it’s such a reasonable default, why don’t any of the public 
resolvers (e.g. 1.1.1.1, 8.8.8.8, 9.9.9.9, etc.) do so?


It's generally a service that's offered for money. Quad9 definitely 
offer it: https://www.quad9.net/service/threat-blocking




DNS isn’t the right place to attack this, IMHO.


Why not (apart from a purity argument), and where should it happen 
instead? As others pointed out, network operators have a vested 
interest in protecting their customers from becoming victims to 
malware.



-- Niels.


Re: ARIN email address (was cogent spamming directly from ARIN records?)

2023-10-03 Thread niels=nanog

* morrowc.li...@gmail.com (Christopher Morrow) [Tue 03 Oct 2023, 21:50 CEST]:
I'm sure telling dave shaeffer: "Hey, your sales droids are being 
rude" is going to end as well as sending him ED pill emails.


Such outreach to technical contacts is counterproductive anyway. Which 
is more likely, that noc@ leads to a person with purchasing power, or 
that it leads to one who happens to be rabidly anti-spam who may then 
help get you thrown off the PeeringDB island for a few seasons?



-- Niels.


Re: ARIN email address (was cogent spamming directly from ARIN records?)

2023-10-03 Thread niels=nanog

* morrowc.li...@gmail.com (Christopher Morrow) [Tue 03 Oct 2023, 18:29 CEST]:
this sort of thing (provider X scrapes Y and mails Z for sales leads) 
every ~18 months.

the same outrage and conversation happens every time.
the same protection mechanisms are noted every time.

Is there a reason that: "killfileand move on" is not the answer 
everytime for this?

(why do we need to keep rediscussing it)


It's a vicious circle: provider scrapes operational addresses and 
spams them, providers stop putting useful addresses in public 
databases to avoid spam, everybody who needs to find operational 
contacts in a variety of situations loses in the end.


We keep discussing it because we care about keeping the internet 
running. It's similar to why we keep looking for new security holes in 
existing software: we don't stop because inevitably we'll find more so 
it's a lost cause, we keep looking because inevitably we'll find more 
so the product becomes more secure.



-- Niels.


Re: New addresses for b.root-servers.net

2023-06-18 Thread niels=nanog

* nanog@nanog.org (Cynthia Revström via NANOG) [Sun 18 Jun 2023, 20:52 CEST]:

Naturally C root is fine on HE over IPv4, the issue is with IPv6.
2001:500:2::c is not reachable over HE.


You're absolutely correct. Maybe their LG defaulting to IPv6 made my 
brain short-circuit. (Their looking glass took longer to render that 
than its own cache timeout.)



-- Niels.


Re: New addresses for b.root-servers.net

2023-06-18 Thread niels=nanog

* na...@as397444.net (Matt Corallo) [Sun 18 Jun 2023, 19:12 CEST]:
If its not useful, please describe a mechanism by which an average 
recursive resolver can be protected against someone hijacking C root 
on Hurricane Electric (which doesn't otherwise have the announcement 
at all, last I heard) and responding with bogus data?


No comment on DNSSEC but lg.he.net indicates that they do in fact 
carry a route to C-root:

---
1   76 ms   *   *   port-channel2.core2.pao1.he.net (72.52.92.65)
2   44 ms   63 ms   78 ms   palo-b24-link.ip.twelve99.net (195.12.255.209)
3   55 ms   66 ms   103 ms  cogent-ic-344188.ip.twelve99-cust.net 
(62.115.174.65)
4   74 ms   57 ms   120 ms  be2431.ccr41.sjc03.atlas.cogentco.com 
(154.54.88.189)
5   142 ms  99 ms   79 ms   be3142.ccr21.sjc01.atlas.cogentco.com 
(154.54.1.193)
6   53 ms   75 ms   111 ms  be3176.ccr41.lax01.atlas.cogentco.com 
(154.54.31.189)
7   82 ms   133 ms  85 ms   te0-0-2-0.c-root.lax01.atlas.cogentco.com 
(154.54.27.138)
8   60 ms   152 ms  84 ms   c.root-servers.net (192.33.4.12)
Entry cached for another 60 seconds. 2023-06-18 17:57:17 UTC
---

I don't see any ROAs for AS2149's two originated prefixes, though: 
https://irrexplorer.nlnog.net/prefix/192.33.4.0/24 so hijacks might 
still be easier than they could be.


Regards


-- Niels.


Re: Normal ARIN registration service fees for LRSA entrants after 31 Dec 2023 (was: Fwd: [arin-announce] Availability of the Legacy Fee Cap for New LRSA Entrants Ending as of 31 December 2023)

2022-09-19 Thread niels=nanog

* g...@toad.com (John Gilmore) [Sat 17 Sep 2022, 04:14 CEST]:

Now that markets exist for IP addresses, all that IP addresses need is a
deed-registry to discourage fraud, like a county real-estate registrar's
office.


Are IP addresses like houses, though? Aren't they more like other 
intellectual property such as trademarks or patents? What happens 
to those when you don't pay the USPTO?



-- Niels.


Re: FYI - 2FA to be come mandatory for ARIN Online?

2022-05-24 Thread niels=nanog

* nanog@nanog.org (Laura Smith via NANOG) [Tue 24 May 2022, 22:22 CEST]:
Its 2022. Do we really still need a consultation on why mandatory 
2FA is a good thing ? Even more so for something like ARIN ?


To many of us in 2022 it's clear that SMS 2FA isn't necessarily a good 
way to protect critical infrastructure, but apparently ARIN does need 
a consultation for that



-- Niels.


Re: DNS pulling BGP routes?

2021-10-17 Thread niels=nanog

* mo...@necom830.hpcl.titech.ac.jp (Masataka Ohta) [Sun 17 Oct 2021, 11:17 
CEST]:

Jay Hennigan wrote:

Neutral backbone providers don't peer with access/retail ISPs.
They sell transit to them.


FYI, that is called paid peering.


Can you please please please stop posting nonsense?


-- Niels.


Re: DNS pulling BGP routes?

2021-10-16 Thread niels=nanog

* mo...@necom830.hpcl.titech.ac.jp (Masataka Ohta) [Sat 16 Oct 2021, 15:50 
CEST]:
Access/retail ISPs have no problem by peering with neutral backbone 
providers.


Getting strong Marie-Antoinette vibes here.


-- Niels.


Re: public open resolver list?

2021-02-02 Thread niels=nanog

$ whois AS16589
No match found for a 16589.


* li...@benappy.com (Michel 'ic' Luczak) [Tue 02 Feb 2021, 14:48 CET]:

whois -r AS16589 # perhaps?

aut-num:AS16589
as-name:ELV-ANYCAST-NET


You skipped the most important line:


source: RIPE-NONAUTH


In other words, this object dates back to the times when anybody 
could throw almost anything into RIPE's IRRdb.  In other words, 
it's not authoritative and its presence doesn't mean anything.


It's probably legit, the data is old but somewhat consistent.  Comodo 
should probably try to clean up the RIR administration surrounding 
this ASN, though.



-- Niels.


Re: Parler

2021-01-14 Thread niels=nanog

* n...@foobar.org (Nick Hilliard) [Mon 11 Jan 2021, 13:56 CET]:

Eric S. Raymond wrote on 11/01/2021 00:00:

Yes, it would.  This was an astonnishingly stupid move on AWS's part;
I'm prett sure their counsel was not conmsulted.


this is quite an innovative level of speculation. Care to provide sources?


Of course he hasn't.  And Amazon's response filing clearly demonstrates 
that he was talking out of his ass.



-- Niels.


Re: Parler

2021-01-10 Thread niels=nanog

* iz...@setec.org (Izaac) [Mon 11 Jan 2021, 00:22 CET]:


Got links?


Your message arrived like five times here but I did the google for you:

https://www.buzzfeednews.com/article/johnpaczkowski/amazon-parler-aws
| On Parler, reaction to the impending ban was swift and outraged, with
| some discussing violence against Amazon. "It would be a pity if someone
| with explosives training were to pay a visit to some AWS data
| centers," one person wrote.


-- Niels.


Re: Parler

2021-01-10 Thread niels=nanog

* w...@typo.org (Wayne Bouchard) [Sun 10 Jan 2021, 16:40 CET]:

On Sun, Jan 10, 2021 at 04:32:29PM +0100, niels=na...@bakker.net wrote:

* sro...@ronan-online.com (sro...@ronan-online.com) [Sun 10 Jan 2021, 14:46 
CET]:
While Amazon is absolutely within their rights to suspend anyone 
they want for violation of their TOS, it does create an 
interesting problem. Amazon is now in the content moderation 
business, which could potentially open them up to liability if 
they fail to suspend any other customer who hosts objectionable 
content.


Didn't that ship sail when they booted WikiLeaks off their 
platform?


Yeah, pretty much.

See, the real issue here is AUPs which initially were used to make 
sure users knew that their services could not be used to facilitate 
illegal things and then used to keep order on the platforms by 
restricting abusive behavior. However the definition of "abusive" 
has now been extended so greatly and with constantly changing rules 
that it's making the statement, effectively, "if we don't like what 
you say, or if we don't like you or your business, sucks to be you."


It's amazing how far the world has stumbled that "fomenting violent 
insurrection and calling for the murder of elected officials" now 
falls under standard T against abusive behaviour where this used 
to be perfectly fine a year ago.


(That was sarcasm.)


-- Niels.


Re: Parler

2021-01-10 Thread niels=nanog

* sro...@ronan-online.com (sro...@ronan-online.com) [Sun 10 Jan 2021, 14:46 
CET]:
While Amazon is absolutely within their rights to suspend anyone 
they want for violation of their TOS, it does create an interesting 
problem. Amazon is now in the content moderation business, which 
could potentially open them up to liability if they fail to suspend 
any other customer who hosts objectionable content.


Didn't that ship sail when they booted WikiLeaks off their platform?


-- Niels.


Re: nike.com->nike.com/ca

2021-01-07 Thread niels=nanog

* bdant...@medline.com (Dantzig, Brian) [Thu 07 Jan 2021, 18:07 CET]:
When you send a DNS query to 8.8.8.8 it goes to the “nearest” 
resolver. Not nearest in terms of location since 8.8.8.8 is an 
anycast address and exists in many locations. It’s the BGP path to 
8.8.8.8 that determines nearest. Next, the resolver does it’s thing 
and sends a query to the akamai DNS. That DNS is probably also an 
anycast address so again, how close is it? Akamai then tries to geo 
locate you but they have the IP of Google, not you. You get an IP 
and connect to that. Everything up till now probably doesn’t matter 
as it’s probably not the DNS that is causing what you see. The IP is 
not Nike but rather an akamai proxy. When you connect to akamai 
proxy, the proxy can see your IP and may do the Geo location lookup 
and pass what it thinks as your location to the content server. When 
it gets to the content server, it may use that Geo information but 
possibly not. It’s likely it’s not the content server but a load 
balancer. In either case, they may ignore any Geo lookup done by 
akamai and try to locate the incoming IP. Well, that’s actually the 
address of the akamai proxy. Hopefully the developers thought of 
this and had akamai pass your IP in a header and geo locate on that. 
It’s probably the content server that is sending an HTTP redirect to 
get you to the “/ca” location on the site.


I checked off list with Becki Kain and Akamai's geolocation is not 
placing her in Canada. I can't speculate as to what company Nike would 
be using for its decision to redirect to /ca on its website.



-- Niels.


Re: Mystery CDN

2020-06-17 Thread niels=nanog

* clin...@scripty.com (Clinton Work) [Wed 17 Jun 2020, 17:31 CEST]:
I'm struggling to determine which CDN owns the servers in 
CenturyLink prefix 8.240.0.0/12.  During the Call of Duty Season 4 
update on June 11th from 06:00 UTC until 08:30 UTC, we had 240 Gbps 
of traffic steaming into our network from CenturyLink prefix 
8.240.0.0/12.  We originally thought it was Akamai, but they swear 
up and down that the servers don't belong to them.


Akamai:

% curl -sv http://95.100.96.208/ |& fgrep Server:
< Server: AkamaiGHost



Here are some of the HTTP/HTTPS servers in 8.240.0.0/12:
8.253.151.248
8.251.135.126
8.240.167.126
8.240.228.126
8.240.168.126
8.240.126.254
8.240.191.254


Not Akamai:

% curl -sv http://8.240.191.254/ |& fgrep Server:
< Server: FP6.1.1866.55

Have you tried a Shodan search for this fingerprint?

HTH,


-- Niels.


Re: RIPE NCC Executive Board election

2020-05-13 Thread niels=nanog

* e...@netstyle.io (Elad Cohen) [Wed 13 May 2020, 15:46 CEST]:

Ronald was called an antisemitic and a racist person here on Nanog in the 
following two links, by people which are not related to me:
https://imgur.com/AQCmZlk


Since you're quoting me here, let me reiterate that I was out of line 
in that posting, as I posted to the mailing list at the time as well.



-- Niels.


Re: Hurricane Electric dead on NYIIX?

2020-03-05 Thread niels=nanog

* fohdee...@gmail.com (Jon Sands) [Thu 05 Mar 2020, 23:50 CET]:
Not sure when it happened, but our BGP session to HE via NYIIX is  
dead, can't even ping them anymore. Can hit all our other NYIIX 
peers without issue


Did your email client accidentally autocomplete 'n...@he.net' (quite 
responsive people) to 'nanog@nanog.org' (a mailing list with thousands 
of curmudgeon subscribers)?



-- Niels.


Re: Elad Cohen (was: Re: Cogent sales reps who actually respond)

2019-09-24 Thread niels=nanog

* r...@tristatelogic.com (Ronald F. Guilmette) [Fri 20 Sep 2019, 00:50 CEST]:
Leaving aside the minor quibble that "Dutch" is not, as far as I am 
aware, a "race" per se, I do apologize for having improperly and 
quite wrongly generalized the apparent confluence of of certain 
events and actions to the Dutch people generally.  That was entirely 
incorrect and improper on my part and I do sincerly apologize.


Apologies on my end as well, Ronald. I should not have said racist; 
bigoted would have been a more apt description of your earlier screed.

Again, I do apologise, I was clearly in the wrong here.


... it's difficult for me not to infer a possible pattern.


Yep. Sure.


-- Niels.


Re: Elad Cohen (was: Re: Cogent sales reps who actually respond)

2019-09-19 Thread niels=nanog

* r...@tristatelogic.com (Ronald F. Guilmette) [Thu 19 Sep 2019, 10:05 CEST]:
I never like to generalize to entire populations, and I will 
therefore refrain from suggesting any endemic or widespread defect 
in the Dutch national psyche, but I cannot help but note that, as 
pointed out in the MyBroadband.co.za news report, a gentleman named 
Maikel Uerlings, who is also Dutch, and who presently appears to be 
notably absent from the Netherlands, perhaps due to certain 
less-than-friendly legal entanglements, is also, it appears, 
intimately connected to Mr. Cohen and to his business, such as it 
is.  It would be entirely improper for me to say or even to suggest 
that the Dutch are any more inclined toward cybercrime, or toward 
looking the other way while it takes place, than anyone else.  I 
will instead only paraphrase William Shakespeare and say that there 
is something rotten in the Netherlands, and that whatever it is, it 
ain't doing their national reputation any good at all.


Couching your racism in some faux plausible deniability by using 
phrases such as "It would be entirely improper of me to" or "I will 
refrain from [making a certain racist suggestion]" and then immediately 
making that racist suggestion, doesn't make your remarks not racist.  
Nor can you hide behind the classics.


Racism has no place in this community and you would do well to refrain 
from posting any more such remarks.



-- Niels.


Re: IPAM recommendations

2019-09-05 Thread niels=nanog

* m...@beckman.org (Mel Beckman) [Thu 05 Sep 2019, 14:17 CEST]:
I don’t think this is a reasonable understanding of Nanog. Nanog 
members ask each other for operational tool recommendations all the 
time, and since these products are right up the alley of Nanog’s 
mission — network operations — it’s a perfectly reasonable use of 
Nanog.


Did you read Todd's email at all?  He asked the poster to do more 
homework before bothering the mailing list membership, an entirely 
reasonable request, especially given their recent posting history 
of similarly worded questions with lack of background supplied.




But you read a single comment without researching any Nanog history,


This is laughably wrong.  Todd is a long-time NANOG attendee and has 
even served on its Program Committee.  (Pot, kettle, black.)



-- Niels.


Re: Contacts wanted: OVH, DigitalOcean, and Microsoft (Deutschland)

2019-03-19 Thread niels=nanog

Apologies, it was in reply to a list mail. Just bad threading.

* niels=na...@bakker.net (niels=na...@bakker.net) [Tue 19 Mar 2019, 16:51 CET]:

Kind of bad netiquette to repost a private email to the list



Re: Contacts wanted: OVH, DigitalOcean, and Microsoft (Deutschland)

2019-03-19 Thread niels=nanog

Kind of bad netiquette to repost a private email to the list


-- Niels.


Re: BGP Experiment

2019-01-08 Thread niels=nanog

Hi Saku,

After seeing this initial result I'm wondering why the researchers 
couldn't set up their own sandbox first before breaking code on the 
internet.  I believe FRR is a free download and comes with GNU autoconf.


We probably should avoid anything which might demotivate future good
guys from finding breaking bugs and reporting them, while sending
perfectly standard-compliant messages. Only ones who will win are bad
guys who collect libraries of how-to-break-internet.
There are certainly several transit packet of deaths and BGP parser
bugs in each implementation, I'd rather have good guy trigger them and
give me details why my network broke, than have bad guy store them for
future use.


I fully agree with you.  However, this doesn't give 'good guys' carte 
blanche to break stuff.  I'm glad they've already taken action to 
improve their practices as confirmed by Italo Cunha in his earlier mail.



-- Niels.


Re: BGP Experiment

2019-01-08 Thread niels=nanog

* valdis.kletni...@vt.edu (valdis.kletni...@vt.edu) [Tue 08 Jan 2019, 18:06 
CET]:

(Personally, I'd never heard of FRR before)


Martin Winter of OSR/FRR has attended many a NANOG, RIPE and other 
industry meetings, so it's not for their lack of trying



-- Niels.


Re: BGP Experiment

2019-01-08 Thread niels=nanog

* thomasam...@gmail.com (Tom Ammon) [Tue 08 Jan 2019, 17:59 CET]:
There are a fair number of open source BGP implementations now. It 
would require additional effort to test all of them.


In the real world, doing the correct thing is often harder than doing 
an incorrect thing, yes.



-- Niels.


Re: BGP Experiment

2019-01-08 Thread niels=nanog

* cu...@dcc.ufmg.br (Italo Cunha) [Tue 08 Jan 2019, 17:42 CET]:

[A] https://goo.gl/nJhmx1


For the archives, since goo.gl will cease to exist soon, this links to
https://docs.google.com/spreadsheets/d/1U42-HCi3RzXkqVxd8e2yLdK9okFZl77tWZv13EsEzO0/htmlview

After seeing this initial result I'm wondering why the researchers 
couldn't set up their own sandbox first before breaking code on the 
internet.  I believe FRR is a free download and comes with GNU autoconf.



-- Niels.


Re: CloudFlare D.N.S. Resolvers... (1.1.1.1 & 1.0.0.1)

2018-09-26 Thread niels=nanog

* na...@ics-il.net (Mike Hammett) [Wed 26 Sep 2018, 13:14 CEST]:
I recommend that eyeball networks don't run any external recursive 
server for optimal CDN performance. Yes, some CDNs support other 
methods, but not all. If not all do, then the requirement remains.


+1

https://blog.powerdns.com/2018/09/04/on-firefox-moving-dns-to-a-third-party/


-- Niels.


Re: FWIW... Re: TEST Help? TEST

2018-06-13 Thread niels=nanog

* sur...@mauigateway.com (Scott Weeks) [Wed 13 Jun 2018, 02:17 CEST]:

Turns out that it's only the "Re: IPv6
faster/better proof?"  thread I can't reply to.
I still can't.  All I wanted to say was:


Then perhaps that thread was killed by the moderators.  Please heed 
the list charter.


Also, please get a mail client that generates proper In-Reply-To 
headers and knows how to quote... it's 2018.



-- Niels.

--
"It's amazing what people will do to get their name on the internet, 
which is odd, because all you really need is a Blogspot account."

-- roy edroso, alicublog.blogspot.com


Re: ICANN GDPR lawsuit

2018-06-01 Thread niels=nanog

* l...@satchell.net (Stephen Satchell) [Fri 01 Jun 2018, 14:51 CEST]:
How does your shop, Niels, go about making contact with an operator 
that is hijacking one of your netblocks, or is doing something weird 
with routing that is causing your customers problems, or has broken 
BGP?


The same as we do now, by posting on NANOG "Can someone from ASx / 
largetelco.com contact me offlist?"



-- Niels.


Re: ICANN GDPR lawsuit

2018-06-01 Thread niels=nanog

* h...@efes.iucc.ac.il (Hank Nussbacher) [Fri 01 Jun 2018, 06:56 CEST]:

The entire whois debacle will only get resolved when some hackers attack
www.eugdpr.org, ec.europa.eu and some other key .eu sites.  When the
response they get will be "sorry, we can't determine who is attacking
you since that contravenes GDPR", will the EU light bulb go on that
something in GDPR needs to be tweaked.


Please stop inciting lawbreaking, and stop spreading long debunked 
talking points.  Both are really inappropriate for this list.



-- Niels.


Re: Whois vs GDPR, latest news

2018-05-27 Thread niels=nanog

* l...@satchell.net (Stephen Satchell) [Sun 27 May 2018, 23:17 CEST]:

On 05/27/2018 12:54 PM, niels=na...@bakker.net wrote:
You have this the wrong way around.  You'll need permission to 
store their IP address in logs that you keep and to inform third 
parties about their visits to your site.  And that is because that 
information belongs to the visitor, not to you.


This is going to run afoul of some data retention laws currently on 
the books in some places.  You *have* to keep logs, WITH IP 
addresses...


Owen doesn't.


-- Niels.


Re: Whois vs GDPR, latest news

2018-05-27 Thread niels=nanog

* o...@delong.com (Owen DeLong) [Sun 27 May 2018, 21:42 CEST]:
The way GDPR is written, if you want to collect (and store) so much 
as the IP address of the potential customer who visited your 
website, you need their informed consent and you can’t require that 
they consent as a condition of providing service.


You have this the wrong way around.  You'll need permission to store 
their IP address in logs that you keep and to inform third parties 
about their visits to your site.  And that is because that 
information belongs to the visitor, not to you.



Basically, the regulation is so poorly written that it is utterly 
nonsensical and I wonder how business in Europe intend to function 
when they can’t make collecting someone’s address a condition of 
allowing them to order something online.


Basically, this example is so bad that it's not even wrong.


-- Niels.


Re: EVERYTHING about Booters (and CloudFlare)

2016-07-27 Thread niels=nanog

* goe...@sasami.anime.net (Dan Hollis) [Wed 27 Jul 2016, 20:21 CEST]:

On Wed, 27 Jul 2016, b...@theworld.com wrote:
There isn't even general agreement on whether (or what!) Cloudfare 
is doing is a problem.


aiding and abetting. at the very least willful negligence.


I hope the armchairs y'all are lawyering from are comfortable


-- Niels.


Re: AS4788 Telecom Malaysia major route leak?

2015-06-12 Thread niels=nanog

* milln...@gmail.com (Martin Millnert) [Fri 12 Jun 2015, 12:54 CEST]:
Also, possible explanation for why nobody's fixing it: 
https://twitter.com/TMCorp/status/609167065300271104 :)

https://scontent-sea1-1.xx.fbcdn.net/hphotos-xat1/t31.0-8/10914977_10152809997716851_748171875526832420_o.jpg

Is that tweet for real?  How is that company (not TM) still in business?


-- Niels.