Re: We hit half-million: The Cidr Report

2014-04-29 Thread Geoff Huston

On 29 Apr 2014, at 12:39 pm, valdis.kletni...@vt.edu wrote:

 On Mon, 28 Apr 2014 21:59:43 -0400, Patrick W. Gilmore said:
 On Apr 28, 2014, at 19:41, Chris Boyd cb...@gizmopartners.com wrote:
 I'm in the middle of a physical move.  I promise I'll take the 3 deagg'd
 /24s out as soon as I can.
 Do not laugh. If everyone who had 3 de-agg'ed prefixes fixed it, the table
 would drop precipitously. We all have to do our part.
 
 Do we have a handle on what percent of the de-aggrs are legitimate attempts
 at TE, and what percent are just whoopsies that should be re-aggregated?
 

I made a shot at such a number in a presentation to NANOG in Feb this year
(http://www.potaroo.net/presentations/2014-02-09-bgp2013.pdf)


If you assume that Traffic Engineering more specifics share a common origin AS 
with the
covering aggregate, then around 26% of more specifics are TE advertisements. 
This 
number (as a percentage) has gwon by 5% over the past three years


If you assume that Hole Punching more specifics are more specifics that use a 
different
origin AS, then these account for 30% of the more specifics in today's routing 
table.
This number has fallen by 5% over the past three years.

The remainder of the prefixes (45%) shares the same origin AS and the same path.
The could be TE prefixes, but as they are identical to their covering
aggregate its hard to appreciate exactly what the engineering intent may be. I 
could
make a wild guess and call these 45% of more specifics to be an act of 
senseless routing
vandalism. ( :-) ) This number has been steady as a % for the past three years.

Interestingly, it's the hole punching more specifics that are less stable, and 
the
senseless routing vandalism more specifics that are more stable than the 
average.

thanks,
   Geoff

Re: Question for service providers regarding tenant use of public IPv4 on your infrastructure

2014-04-29 Thread Brian Rak


On 4/28/2014 4:18 PM, Cliff Bowles wrote:

(accidentally sent this to nanog-request earlier, sorry if there is a double 
post)

We are an enterprise and we do not yet have a sophisticated service-provider 
model yet for billing, capacity-management, or infrastructure consumption. We 
have a few vBlocks that we consume internally for IT/business needs. Recently, 
the decision was made to start offering our infrastructure to partner 
businesses to deploy their apps on, which will then be made available to their 
customers.

The ingress/egress, the virtualization and even the orchestration part are 
essentially covered. We've tackled the security part as well. However, we have 
some tenants that want to egress to the internet locally rather than backhaul 
the traffic to their premise. Naturally, we could ask each tenant to provide 
their own internet for this, but the business wants to explore a dedicated, 
customer-only internet and chargeback/showback.

My question is: how are cloud providers handling the use of their IP space when 
they don't have full control over what their tenants are doing? More 
specifically, if you own a large block of IPs, how do you prevent business 
impact (or other tenant impact) if one tenant does something that causes an 
upstream ISP to blacklist/block? We don't want to put more controls in path 
between the tenant and the internet, we just want to know how to manage 
upstream relations.
If you're allocating individual customers their own subnets, make sure 
you report these allocations to ARIN (via SWIP).  This will make the 
whois results more accurate, so you'll hopefully just end up with the 
individual customer getting blacklisted, rather then your entire range.  
Make sure you actually respond to abuse complaints in a timely fashion.  
If you're actually responsive to abuse complaints, it's a lot less 
likely you'll end up with all of your subnets blacklisted.



I'm guessing Amazon and other similar providers have some arrangements with 
peering ISPs and law-enforcement to ensure that there is consultation before 
action is taken?
I doubt it.  Most of Amazon's EC2 IP ranges are on various blacklists.  
There's really no feasible way for them to keep all their IPs off 
blacklists, so I suspect they've just given up trying.

Or do ISPs put some level of security between their tenants and the internet to 
prevent this? I've been told that the majority do not have any intelligent 
filtering beyond bogon-lists. I'd imagine that would cause huge operational 
overhead and frustrate the tenants.
You should try to block whatever abuse you can, especially if you're 
going to be offering 'cloud' servers to the public.  Get some routine 
security scans going (start off with the basics, look for open 
resolvers, vulnerable NTP servers, open chargen servers, SNMP servers 
with default communities) and alert your customers whenever you detect 
something.


It should go without saying, but make sure your users cannot spoof IP 
addresses.


Re: We hit half-million: The Cidr Report

2014-04-29 Thread Patrick W. Gilmore
 The remainder of the prefixes (45%) shares the same origin AS and the same 
 path.
 The could be TE prefixes, but as they are identical to their covering
 aggregate its hard to appreciate exactly what the engineering intent may be. 
 I could
 make a wild guess and call these 45% of more specifics to be an act of 
 senseless routing
 vandalism. ( :-) ) This number has been steady as a % for the past three 
 years.

This could easily be TE, and a type of TE which would be trivially fixed.

Let's take a simple example of a network with a /22 and 4 POPs. They have the 
same transit provider(s) at all 4 POPs and a small backbone to connect them. 
Each POP gets a /24.

A not-ridiculous way to force their transit provider to carry bits instead of 
clogging their backbone while still ensuring redundancy would be to announce 
the /22 at all four POPs and the individual /24 at each individual POP. This 
creates four /24s and a covering /22 with exactly the same path, but still has 
use as TE.

Of course, it would be trivial for the network to clean up their act by 
attacking no-export to the /24s. But some people either do not know it exists, 
know how it works, or know BGP well enough to understand it would not harm 
them. Or maybe they are just lazy: What's 3 extra prefixes in half a million?

The answer to the last question is, frankly, nothing. But 3 prefixes for 30K 
ASNs is an ass-ton. (That's a technical term meaning lots  lots.)


This is a good time for a marketing effort. Let's see if we can get the table 
back under 500K. Everyone check your announcements. Are you announcing more 
specifics and a covering aggregate with the same path? Can you delete the more 
specific? Can you add no-export or another community to keep the more specifics 
from the global table?

If you are unsure, ask. I think it would be rather awesome if we saw a quick 
reversal in table growth and went back under 500K, even if it was short lived. 
ESPECIALLY if we can do it before we hit 512K prefixes. Would prove the 
community still cares about, well, the community, not just their own network. 
Because on the Internet, your network is part of the community, and things 
that harm the latter do harm the former, even if it is difficult for you to see 
sometimes.

Who will be the first to pull back a few prefixes?

-- 
TTFN,
patrick

On Apr 29, 2014, at 03:31 , Geoff Huston g...@apnic.net wrote:

 
 On 29 Apr 2014, at 12:39 pm, valdis.kletni...@vt.edu wrote:
 
 On Mon, 28 Apr 2014 21:59:43 -0400, Patrick W. Gilmore said:
 On Apr 28, 2014, at 19:41, Chris Boyd cb...@gizmopartners.com wrote:
 I'm in the middle of a physical move.  I promise I'll take the 3 deagg'd
 /24s out as soon as I can.
 Do not laugh. If everyone who had 3 de-agg'ed prefixes fixed it, the table
 would drop precipitously. We all have to do our part.
 
 Do we have a handle on what percent of the de-aggrs are legitimate attempts
 at TE, and what percent are just whoopsies that should be re-aggregated?
 
 
 I made a shot at such a number in a presentation to NANOG in Feb this year
 (http://www.potaroo.net/presentations/2014-02-09-bgp2013.pdf)
 
 
 If you assume that Traffic Engineering more specifics share a common origin 
 AS with the
 covering aggregate, then around 26% of more specifics are TE advertisements. 
 This 
 number (as a percentage) has gwon by 5% over the past three years
 
 
 If you assume that Hole Punching more specifics are more specifics that use a 
 different
 origin AS, then these account for 30% of the more specifics in today's 
 routing table.
 This number has fallen by 5% over the past three years.
 
 The remainder of the prefixes (45%) shares the same origin AS and the same 
 path.
 The could be TE prefixes, but as they are identical to their covering
 aggregate its hard to appreciate exactly what the engineering intent may be. 
 I could
 make a wild guess and call these 45% of more specifics to be an act of 
 senseless routing
 vandalism. ( :-) ) This number has been steady as a % for the past three 
 years.
 
 Interestingly, it's the hole punching more specifics that are less stable, 
 and the
 senseless routing vandalism more specifics that are more stable than the 
 average.
 
 thanks,
   Geoff



RE: We hit half-million: The Cidr Report

2014-04-29 Thread Kate Gerry
Already working on aggregating as much as I can. I was checking  my tables the 
other day and I think I saw another provider advertising their /18 as /24s, it 
made me sick.

--
Kate Gerry
Network Manager
k...@quadranet.com

1-888-5-QUADRA Ext 206 | www.QuadraNet.com
Dedicated Servers, Colocation, Cloud Services and more.
Datacenters in Los Angeles, Dallas and Miami.

Follow us on:  

-Original Message-
From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of Patrick W. Gilmore
Sent: Tuesday, April 29, 2014 9:23 AM
To: NANOG list
Subject: Re: We hit half-million: The Cidr Report

 The remainder of the prefixes (45%) shares the same origin AS and the same 
 path.
 The could be TE prefixes, but as they are identical to their covering 
 aggregate its hard to appreciate exactly what the engineering intent 
 may be. I could make a wild guess and call these 45% of more specifics 
 to be an act of senseless routing vandalism. ( :-) ) This number has been 
 steady as a % for the past three years.

This could easily be TE, and a type of TE which would be trivially fixed.

Let's take a simple example of a network with a /22 and 4 POPs. They have the 
same transit provider(s) at all 4 POPs and a small backbone to connect them. 
Each POP gets a /24.

A not-ridiculous way to force their transit provider to carry bits instead of 
clogging their backbone while still ensuring redundancy would be to announce 
the /22 at all four POPs and the individual /24 at each individual POP. This 
creates four /24s and a covering /22 with exactly the same path, but still has 
use as TE.

Of course, it would be trivial for the network to clean up their act by 
attacking no-export to the /24s. But some people either do not know it exists, 
know how it works, or know BGP well enough to understand it would not harm 
them. Or maybe they are just lazy: What's 3 extra prefixes in half a million?

The answer to the last question is, frankly, nothing. But 3 prefixes for 30K 
ASNs is an ass-ton. (That's a technical term meaning lots  lots.)


This is a good time for a marketing effort. Let's see if we can get the table 
back under 500K. Everyone check your announcements. Are you announcing more 
specifics and a covering aggregate with the same path? Can you delete the more 
specific? Can you add no-export or another community to keep the more specifics 
from the global table?

If you are unsure, ask. I think it would be rather awesome if we saw a quick 
reversal in table growth and went back under 500K, even if it was short lived. 
ESPECIALLY if we can do it before we hit 512K prefixes. Would prove the 
community still cares about, well, the community, not just their own network. 
Because on the Internet, your network is part of the community, and things 
that harm the latter do harm the former, even if it is difficult for you to see 
sometimes.

Who will be the first to pull back a few prefixes?

--
TTFN,
patrick

On Apr 29, 2014, at 03:31 , Geoff Huston g...@apnic.net wrote:

 
 On 29 Apr 2014, at 12:39 pm, valdis.kletni...@vt.edu wrote:
 
 On Mon, 28 Apr 2014 21:59:43 -0400, Patrick W. Gilmore said:
 On Apr 28, 2014, at 19:41, Chris Boyd cb...@gizmopartners.com wrote:
 I'm in the middle of a physical move.  I promise I'll take the 3 
 deagg'd /24s out as soon as I can.
 Do not laugh. If everyone who had 3 de-agg'ed prefixes fixed it, the 
 table would drop precipitously. We all have to do our part.
 
 Do we have a handle on what percent of the de-aggrs are legitimate 
 attempts at TE, and what percent are just whoopsies that should be 
 re-aggregated?
 
 
 I made a shot at such a number in a presentation to NANOG in Feb this 
 year
 (http://www.potaroo.net/presentations/2014-02-09-bgp2013.pdf)
 
 
 If you assume that Traffic Engineering more specifics share a common 
 origin AS with the covering aggregate, then around 26% of more 
 specifics are TE advertisements. This number (as a percentage) has 
 gwon by 5% over the past three years
 
 
 If you assume that Hole Punching more specifics are more specifics 
 that use a different origin AS, then these account for 30% of the more 
 specifics in today's routing table.
 This number has fallen by 5% over the past three years.
 
 The remainder of the prefixes (45%) shares the same origin AS and the same 
 path.
 The could be TE prefixes, but as they are identical to their covering 
 aggregate its hard to appreciate exactly what the engineering intent 
 may be. I could make a wild guess and call these 45% of more specifics 
 to be an act of senseless routing vandalism. ( :-) ) This number has been 
 steady as a % for the past three years.
 
 Interestingly, it's the hole punching more specifics that are less 
 stable, and the senseless routing vandalism more specifics that are more 
 stable than the average.
 
 thanks,
   Geoff



Re: What Net Neutrality should and should not cover

2014-04-29 Thread Owen DeLong

On Apr 28, 2014, at 12:13 PM, Miles Fidelman mfidel...@meetinghouse.net wrote:

 Barry Shein wrote:
 I think the problem is simply a lack of competition and the rise of,
 in effect, vertical trusts. That is, content providers also
 controlling last-mile services.
 
 What exists is rife with conflict of interest and unfair market
 power. Particularly in that wire-plants are generally protected
 monopolies or small-N oligopolies.
 
 The wire-plant* operators and content providers need to be separated
 and competition needs to be mandated by allowing easy and fair access
 to wire-plants.
 
 Wire-plant operators should be closely regulated. Content providers
 should not, in general, be regulated.
 
 
 * Which of course may not involve any actual wires but it's a term of
 art, L1/L2 if you prefer.
 
 I kind of think Layer 3 - metropolitan area IP carriage seems to be where the 
 issues converge.  Somehow the notion of multiple IP providers, operating 
 across unbundled fiber, doesn’t seem to work out in practice.


It’s working quite well in areas where it’s been tried in earnest.

 Yes, there are a few municipal networks that provide Ethernet VPNs as the 
 basic block of unbundled service - with multiple players providing various 
 Internet (IP), video, and voice services on their own VPNs; and there are 
 some networks, particularly in Canada, where the unit of unbundling is a 
 wavelength, on a common fiber/conduit plant; but in most cases, economies of 
 scale seem to dictate a single IP-layer fabric for a geographic area. (Think 
 campus and enterprise networks.)

If you build out a fiber plant with home runs to colocation facilities where 
providers can meet subscriber lines, the economies of scale can generally work 
and do in some areas.

While active ethernet to the subscriber isn’t necessarily viable, GPON with the 
splitter at the MMR is just as viable as GPON with the splitter in the 
neighborhood. This was, in fact, discussed at length a while back on this very 
list.

Owen



Re: We hit half-million: The Cidr Report

2014-04-29 Thread ML
At one time Covad stated they announce everything as /24 to make 
hijacking more difficult.  Looks like Covad (now MEGAPATH) hasn't 
changed that policy.





On 4/29/2014 12:29 PM, Kate Gerry wrote:

Already working on aggregating as much as I can. I was checking  my tables the 
other day and I think I saw another provider advertising their /18 as /24s, it 
made me sick.

--
Kate Gerry
Network Manager
k...@quadranet.com

1-888-5-QUADRA Ext 206 | www.QuadraNet.com
Dedicated Servers, Colocation, Cloud Services and more.
Datacenters in Los Angeles, Dallas and Miami.

Follow us on:

-Original Message-
From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of Patrick W. Gilmore
Sent: Tuesday, April 29, 2014 9:23 AM
To: NANOG list
Subject: Re: We hit half-million: The Cidr Report


The remainder of the prefixes (45%) shares the same origin AS and the same path.
The could be TE prefixes, but as they are identical to their covering
aggregate its hard to appreciate exactly what the engineering intent
may be. I could make a wild guess and call these 45% of more specifics
to be an act of senseless routing vandalism. ( :-) ) This number has been 
steady as a % for the past three years.

This could easily be TE, and a type of TE which would be trivially fixed.

Let's take a simple example of a network with a /22 and 4 POPs. They have the 
same transit provider(s) at all 4 POPs and a small backbone to connect them. 
Each POP gets a /24.

A not-ridiculous way to force their transit provider to carry bits instead of clogging 
their backbone while still ensuring redundancy would be to announce the /22 at all four 
POPs and the individual /24 at each individual POP. This creates four /24s and a covering 
/22 with exactly the same path, but still has use as TE.

Of course, it would be trivial for the network to clean up their act by attacking 
no-export to the /24s. But some people either do not know it exists, know how it works, 
or know BGP well enough to understand it would not harm them. Or maybe they are just 
lazy: What's 3 extra prefixes in half a million?

The answer to the last question is, frankly, nothing. But 3 prefixes for 30K ASNs is an 
ass-ton. (That's a technical term meaning lots  lots.)


This is a good time for a marketing effort. Let's see if we can get the table 
back under 500K. Everyone check your announcements. Are you announcing more 
specifics and a covering aggregate with the same path? Can you delete the more 
specific? Can you add no-export or another community to keep the more specifics 
from the global table?

If you are unsure, ask. I think it would be rather awesome if we saw a quick reversal in table 
growth and went back under 500K, even if it was short lived. ESPECIALLY if we can do it before we 
hit 512K prefixes. Would prove the community still cares about, well, the community, not just their 
own network. Because on the Internet, your network is part of the 
community, and things that harm the latter do harm the former, even if it is difficult 
for you to see sometimes.

Who will be the first to pull back a few prefixes?

--
TTFN,
patrick

On Apr 29, 2014, at 03:31 , Geoff Huston g...@apnic.net wrote:


On 29 Apr 2014, at 12:39 pm, valdis.kletni...@vt.edu wrote:


On Mon, 28 Apr 2014 21:59:43 -0400, Patrick W. Gilmore said:

On Apr 28, 2014, at 19:41, Chris Boyd cb...@gizmopartners.com wrote:
I'm in the middle of a physical move.  I promise I'll take the 3
deagg'd /24s out as soon as I can.

Do not laugh. If everyone who had 3 de-agg'ed prefixes fixed it, the
table would drop precipitously. We all have to do our part.

Do we have a handle on what percent of the de-aggrs are legitimate
attempts at TE, and what percent are just whoopsies that should be 
re-aggregated?


I made a shot at such a number in a presentation to NANOG in Feb this
year
(http://www.potaroo.net/presentations/2014-02-09-bgp2013.pdf)


If you assume that Traffic Engineering more specifics share a common
origin AS with the covering aggregate, then around 26% of more
specifics are TE advertisements. This number (as a percentage) has
gwon by 5% over the past three years


If you assume that Hole Punching more specifics are more specifics
that use a different origin AS, then these account for 30% of the more 
specifics in today's routing table.
This number has fallen by 5% over the past three years.

The remainder of the prefixes (45%) shares the same origin AS and the same path.
The could be TE prefixes, but as they are identical to their covering
aggregate its hard to appreciate exactly what the engineering intent
may be. I could make a wild guess and call these 45% of more specifics
to be an act of senseless routing vandalism. ( :-) ) This number has been 
steady as a % for the past three years.

Interestingly, it's the hole punching more specifics that are less
stable, and the senseless routing vandalism more specifics that are more stable 
than the average.

thanks,
   Geoff




Re: We hit half-million: The Cidr Report

2014-04-29 Thread Paul S.

There are many actually doing this, to be honest.

From the top of my head, in the greater Dallas area, 54540 comes to mind.

http://bgp.he.net/AS54540#_asinfo

For large ASNs like these, aggregation would really help the table size.

That said, working on reducing our own as well.

On 4/29/2014 10:29 PM, Kate Gerry wrote:

Already working on aggregating as much as I can. I was checking  my tables the 
other day and I think I saw another provider advertising their /18 as /24s, it 
made me sick.

--
Kate Gerry
Network Manager
k...@quadranet.com

1-888-5-QUADRA Ext 206 | www.QuadraNet.com
Dedicated Servers, Colocation, Cloud Services and more.
Datacenters in Los Angeles, Dallas and Miami.

Follow us on:

-Original Message-
From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of Patrick W. Gilmore
Sent: Tuesday, April 29, 2014 9:23 AM
To: NANOG list
Subject: Re: We hit half-million: The Cidr Report


The remainder of the prefixes (45%) shares the same origin AS and the same path.
The could be TE prefixes, but as they are identical to their covering
aggregate its hard to appreciate exactly what the engineering intent
may be. I could make a wild guess and call these 45% of more specifics
to be an act of senseless routing vandalism. ( :-) ) This number has been 
steady as a % for the past three years.

This could easily be TE, and a type of TE which would be trivially fixed.

Let's take a simple example of a network with a /22 and 4 POPs. They have the 
same transit provider(s) at all 4 POPs and a small backbone to connect them. 
Each POP gets a /24.

A not-ridiculous way to force their transit provider to carry bits instead of clogging 
their backbone while still ensuring redundancy would be to announce the /22 at all four 
POPs and the individual /24 at each individual POP. This creates four /24s and a covering 
/22 with exactly the same path, but still has use as TE.

Of course, it would be trivial for the network to clean up their act by attacking 
no-export to the /24s. But some people either do not know it exists, know how it works, 
or know BGP well enough to understand it would not harm them. Or maybe they are just 
lazy: What's 3 extra prefixes in half a million?

The answer to the last question is, frankly, nothing. But 3 prefixes for 30K ASNs is an 
ass-ton. (That's a technical term meaning lots  lots.)


This is a good time for a marketing effort. Let's see if we can get the table 
back under 500K. Everyone check your announcements. Are you announcing more 
specifics and a covering aggregate with the same path? Can you delete the more 
specific? Can you add no-export or another community to keep the more specifics 
from the global table?

If you are unsure, ask. I think it would be rather awesome if we saw a quick reversal in table 
growth and went back under 500K, even if it was short lived. ESPECIALLY if we can do it before we 
hit 512K prefixes. Would prove the community still cares about, well, the community, not just their 
own network. Because on the Internet, your network is part of the 
community, and things that harm the latter do harm the former, even if it is difficult 
for you to see sometimes.

Who will be the first to pull back a few prefixes?

--
TTFN,
patrick

On Apr 29, 2014, at 03:31 , Geoff Huston g...@apnic.net wrote:


On 29 Apr 2014, at 12:39 pm, valdis.kletni...@vt.edu wrote:


On Mon, 28 Apr 2014 21:59:43 -0400, Patrick W. Gilmore said:

On Apr 28, 2014, at 19:41, Chris Boyd cb...@gizmopartners.com wrote:
I'm in the middle of a physical move.  I promise I'll take the 3
deagg'd /24s out as soon as I can.

Do not laugh. If everyone who had 3 de-agg'ed prefixes fixed it, the
table would drop precipitously. We all have to do our part.

Do we have a handle on what percent of the de-aggrs are legitimate
attempts at TE, and what percent are just whoopsies that should be 
re-aggregated?


I made a shot at such a number in a presentation to NANOG in Feb this
year
(http://www.potaroo.net/presentations/2014-02-09-bgp2013.pdf)


If you assume that Traffic Engineering more specifics share a common
origin AS with the covering aggregate, then around 26% of more
specifics are TE advertisements. This number (as a percentage) has
gwon by 5% over the past three years


If you assume that Hole Punching more specifics are more specifics
that use a different origin AS, then these account for 30% of the more 
specifics in today's routing table.
This number has fallen by 5% over the past three years.

The remainder of the prefixes (45%) shares the same origin AS and the same path.
The could be TE prefixes, but as they are identical to their covering
aggregate its hard to appreciate exactly what the engineering intent
may be. I could make a wild guess and call these 45% of more specifics
to be an act of senseless routing vandalism. ( :-) ) This number has been 
steady as a % for the past three years.

Interestingly, it's the hole punching more specifics that are less
stable, and the 

Re: The FCC is planning new net neutrality rules. And they could enshrine pay-for-play. - The Washington Post

2014-04-29 Thread Jay Ashworth
- Original Message -
 From: Owen DeLong o...@delong.com

 What is absolutely contrary to the public interest is allowing $CABLECO to
 leverage their position as a monopoly or oligopoly ISP to create an 
 operational disadvantage in access for that competing product.

I was with you right up til here.

 The so-called “internet fast lane” is a euphemism for allowing $CABLECO
 to put competing video products into a newly developed slow-lane while
 limiting the existing path to their own products and those content
 providers that are able to and choose to pay these additional fees.

So, how do you explain, and justify -- if you do -- cablecos who use
IPTV to deliver their mainline video, and supply VoIP telephone...

and use DOCSIS to put that traffic on separate pipes to the end terminal
from their IP service, an advantage which providers who might compete
with them don't have -- *even*, I think, if they are FCC mandated 
alternative IP providers who get aggregated access to the cablemodem, 
as do Earthlink and the local Internet Junction in my market, which
can (at least in theory) still be provisioned as your cablemodem 
supplier for Bright House (Advance/Newhouse) customers.

Those are fast lanes for TV and Voice traffic, are they not?

They are (largely) anticompetitive, and unavailable to other providers.

Cheers,
-- jra
-- 
Jay R. Ashworth  Baylink   j...@baylink.com
Designer The Things I Think   RFC 2100
Ashworth  Associates   http://www.bcp38.info  2000 Land Rover DII
St Petersburg FL USA  BCP38: Ask For It By Name!   +1 727 647 1274


dedicated server providers in Mexico?

2014-04-29 Thread Carlos Kamtha
Hi everyone, 

I am currently not happy with out MX server provider, and so, inquiring 
with anyone that can give a recommendation based on experience? 

I found this list via google. 

http://www.webhostingsearch.com/dedicated-server/mexico.php

I wondering if anyone can speak to any of the providers on this list
(outside of 1n1). offlist..

Feedback as always greatly appreciated. 

Cheers, 

Carlos. 


Re: dedicated server providers in Mexico?

2014-04-29 Thread Jason Canady
I have no experience with dedicated hosting providers in Mexico, but 
that list is incorrect.  I know that Steadfast does not have servers 
located in Mexico.  I believe other providers are also incorrectly listed.


You should search for providers on Web Hosting Talk, 
http://www.webhostingtalk.com


Regards,

Jason

On 4/29/14, 2:06 PM, Carlos Kamtha wrote:

Hi everyone,

I am currently not happy with out MX server provider, and so, inquiring
with anyone that can give a recommendation based on experience?

I found this list via google.

http://www.webhostingsearch.com/dedicated-server/mexico.php

I wondering if anyone can speak to any of the providers on this list
(outside of 1n1). offlist..

Feedback as always greatly appreciated.

Cheers,

Carlos.




Re: The FCC is planning new net neutrality rules. And they could enshrine pay-for-play. - The Washington Post

2014-04-29 Thread Jean-Francois Mezei
On 14-04-29 13:48, Jay Ashworth wrote:

 So, how do you explain, and justify -- if you do -- cablecos who use
 IPTV to deliver their mainline video, and supply VoIP telephone...


In Canada, our net neutrality rules are called the ITMP, for Internet
Traffic Management Practices which occured as a result of Bell Canada
throttling P2P and then wanting to charge UBB *solely to manage traffic*
(since the UBB rates had nothing to do with costs, they had to do with
moderating usage to reduce congestion).

The ITMP rules as well as section 27(2) of the Telecommunications Act
prevent undue preference and basically states thart if if apply an ITMP
(either throttling or UBB) it must be applied evenly to all content.

The apply evenly was even argued by the incumbents who stated that
everyonr had to pay the same UBB rate for all access in order to ensure
that the UBB ITMP plays an equal role in moderating usage. (users with
ower UBB rates or with some content exempt would then use mroe of the
network capacity and cause disproporaionate congestion which would hurt
those paying the higher UBB rates)


When an incumbent argues that its *broadcasting* service is on different
capacity and does not cause congestion to the telecom side of things,
then the broadcasting service does not have to play by those rules.

In the case of cablecos, their TV service uses different frequencies on
the coax, so they do not affect data transfers.

For Telcos, in the case of Bell, proper use of semantics and propaganda
convinced the CRTC that it FibeTV service was on totally different
network capacity right up to the DSLAM, and since there was no
congestion on the DSL last copper mile, the fact that the two shared the
last mile didn't matter because the congestion happened in the
aggregation network where FibeTV was already on a separate network.

So both cablecos and telcos get their wireline broadcasting execpt
from the net neutrality rules in Canada.

Currently, there is a complaint about wireless TV where the incumbents
do not charge UBB for their own TV service, while charging UBB for
competing services such as Netflix, or accessing content from a TV
station's web site etc.  In the last round, they basically admitted that
in the case of wireless, those service co-exist with other internet
traffic on the same pipe to the handsets.

The TV on mobile phones is the first true test of network neutrality
under the 2009 ITMP rules. Previous complaints had to do with fautly
throttling which singled out certain applications like games.

The Mobile TV service is one where the incumbents give their own TV
service an undue preference.

Bell Canada argues that because their TV service is broadcasting, it
is under a different law (Boradcasting Act) and not bound by ITMP rules.


Re: The FCC is planning new net neutrality rules. And they could enshrine pay-for-play. - The Washington Post

2014-04-29 Thread Matthew Petach
It was pointed out privately to me that I may
have caused some confusion here with my
variable substitution.  $BB_provider was
intended to be BroadBand provider, *not*
BackBone provider, as some people have
(understandably) misread it.  So--to clarify,
this was not meant as any type of characterization
of backbone providers, but rather of broadband
providers.

I hope this helps clear up any confusion.

Thanks!

Matt



On Sun, Apr 27, 2014 at 11:44 AM, Matthew Petach mpet...@netflight.comwrote:




 On Thu, Apr 24, 2014 at 5:15 AM, Patrick W. Gilmore patr...@ianai.netwrote:

 Anyone afraid what will happen when companies which have monopolies can
 charge content providers or guarantee packet loss?

 In a normal free market, if two companies with a mutual consumer have a
 tiff, the consumer decides which to support. Where I live, I have one
 broadband provider. If they get upset with, say, a streaming provider, I
 cannot choose another BB company because I like the streaming company. I
 MUST pick another streaming company, as that is the only thing I can
 choose.



 [I speak only for myself here; any use of the word we
 should be taken to represent only my sense of inclusion
 with the rest of humanity, and not with any commercial
 entity or organization.  Any other characterization of the
 following words is patently incorrect, and grounds for
 possible actions, up to and including litigation.  Please
 don't be an ass, and quote me out of context, or as
 representing something I'm not.  Original post edited
 slightly, with specific entity names replaced with
 variables; you may do your own substitution back
 into the variables as you feel appropriate.  --MNP]


 What if we turn the picture around slightly, and look
 at it like the negotiations between broadcast networks
 and cable companies?  2010's battle between Fox television
 and  cablevision comes to mind, where the content holder
 blacked out access to their content for specific cable
 companies unless they agree to pay the demanded fees.

 It would be interesting to have seen $content_CEO take a
 hard line stance; it wouldn't be hard to send a BGP feed
 to video streaming servers, and if the requestor's IP was
 from a prefix seen behind AS$foo, put up a message
 informing the subscriber that their access to $company's
 content would cease on such-and-such a date, due
 to $BB_provider's unwillingness to agree to increase
 interconnect capacity, and that if subscribers wished
 to continue to see $company's content, they should consider
 switching to a different network provider.  Basically,
 follow the same model News Corp used against
 Cablevision, Viacom used against Time Warner,
 or Disney used against Cablevision.

 How long would $BB_provider be able to hold out against
 the howls of its users, if there was a scrolling
 banner across the top of the screen during their
 favorite show, or favorite movie alerting them that
 they would soon be unable to see that content
 unless they switched to a different service provider?

 It's easy to forget that the sword can be swung both
 ways.   Right now, $BB_provider is swinging the sharp edge
 at $content; but $content is not without its own influence in
 the market, and could swing the sword the other way,
 cutting back at $BB_provider.  Yes, it comes at some great
 risk to $content, in terms of potential customer loss; but
 no great wins come without great risks (unless you
 cheat, and use the government to get you a big win
 at no risk--but none of us like that model).

 I think it's high time for content players to flex their
 power, and push back on the eyeball networks that
 attempt to use their customer base as hostages to
 extract additional revenue from the content being
 requested by their users.  If the content providers
 simply make it clearly visible to the end users that
 they cannot watch the requested content on that
 network, or that they can only watch in reduced
 resolution from that network, it will have a two-fold
 effect: a) traffic volume from the content provider
 to the contentious network will be reduced, limiting
 the need for the upgrades in the first place, and
 b) customers of the provider will be informed of
 their status as hostage cannon fodder on the
 battlefield, allowing them to vote with their wallets.
 One could potentially even insert suggestions
 for alternate connectivity options they might
 consider into the content feed, to help the
 users vote with their wallets more easily.
 Or, provide the phone number of the local
 municipal office that granted the franchise
 rights to the BB provider, along with instructions
 on what to say when calling (Hi--I'm a registered
 voter in your district.  If you'd like to get re-elected
 next term, you need to repeal the cable franchise
 agreement with broadband provider such-and-so,
 as their monopolistic practices are hampering
 my ability to freely choose what content I can
 consume.)

 We're not powerless in this fight.  We 

Re: dedicated server providers in Mexico?

2014-04-29 Thread Paul Norton

RedIT

--
Paul Norton


Carlos Kamtha wrote:

Hi everyone,

I am currently not happy with out MX server provider, and so, inquiring
with anyone that can give a recommendation based on experience?

I found this list via google.

http://www.webhostingsearch.com/dedicated-server/mexico.php

I wondering if anyone can speak to any of the providers on this list
(outside of 1n1). offlist..

Feedback as always greatly appreciated.

Cheers,

Carlos.


Re: We hit half-million: The Cidr Report

2014-04-29 Thread Owen DeLong

On Apr 28, 2014, at 6:59 PM, Patrick W. Gilmore patr...@ianai.net wrote:

 Composed on a virtual keyboard, please forgive typos. 
 
 On Apr 28, 2014, at 19:41, Chris Boyd cb...@gizmopartners.com wrote:
 
 
 On Apr 28, 2014, at 2:27 AM, Andy Davidson wrote:
 
  now aggregate it back down again, please. :-)
 
 I'm in the middle of a physical move.  I promise I'll take the 3 deagg'd 
 /24s out as soon as I can.
 
 Do not laugh. If everyone who had 3 de-agg'ed prefixes fixed it, the table 
 would drop precipitously. We all have to do our part. 

If everyone who had 30+ inaggregable IPv4 prefixes replaced them with 1 (or 
even 3) IPv6 prefixes…

As a bonus, we could get rid of NAT, too. ;-)

/me ducks (but you know I had to say it)

Owen



Re: The FCC is planning new net neutrality rules. And they could enshrine pay-for-play. - The Washington Post

2014-04-29 Thread Owen DeLong

On Apr 29, 2014, at 10:48 AM, Jay Ashworth j...@baylink.com wrote:

 - Original Message -
 From: Owen DeLong o...@delong.com
 
 What is absolutely contrary to the public interest is allowing $CABLECO to
 leverage their position as a monopoly or oligopoly ISP to create an 
 operational disadvantage in access for that competing product.
 
 I was with you right up til here.
 
 The so-called “internet fast lane” is a euphemism for allowing $CABLECO
 to put competing video products into a newly developed slow-lane while
 limiting the existing path to their own products and those content
 providers that are able to and choose to pay these additional fees.
 
 So, how do you explain, and justify -- if you do -- cablecos who use
 IPTV to deliver their mainline video, and supply VoIP telephone...
 
 and use DOCSIS to put that traffic on separate pipes to the end terminal
 from their IP service, an advantage which providers who might compete
 with them don't have -- *even*, I think, if they are FCC mandated 
 alternative IP providers who get aggregated access to the cablemodem, 
 as do Earthlink and the local Internet Junction in my market, which
 can (at least in theory) still be provisioned as your cablemodem 
 supplier for Bright House (Advance/Newhouse) customers.

I don’t explain it, don’t justify it, don’t support it.

 Those are “fast lanes for TV and Voice traffic, are they not?

Carving the pipe up into lanes to begin with is kind of questionable IMHO.
I realize it’s tradition, but if you think about it, it was only necessary
when things were TDM/FDM. Once everything is IP, dividing the IP up among
different TDM/FDM is just a way to take one large fast lane and turn it into
slow lanes (some slower than others, perhaps) where some traffic can be
given preferential treatment.

 They are (largely) anticompetitive, and unavailable to other providers.

Agreed… I thought that’s what I said above.

Owen



Re: We hit half-million: The Cidr Report

2014-04-29 Thread Jeff Kell
On 4/29/2014 2:06 PM, Owen DeLong wrote:
 If everyone who had 30+ inaggregable IPv4 prefixes replaced them with 1 (or 
 even 3) IPv6 prefixes…

 As a bonus, we could get rid of NAT, too. ;-)

 /me ducks (but you know I had to say it)

Yeah, just when we thought Slammer / Blaster / Nachi / Welchia / etc /
etc  had been eliminated by process of can't get there from here... we
expose millions more endpoints...

/me ducks too (but you know *I* had to say it)



Re: We hit half-million: The Cidr Report

2014-04-29 Thread TheIpv6guy .
On Tue, Apr 29, 2014 at 7:54 PM, Jeff Kell jeff-k...@utc.edu wrote:
 On 4/29/2014 2:06 PM, Owen DeLong wrote:
 If everyone who had 30+ inaggregable IPv4 prefixes replaced them with 1 (or 
 even 3) IPv6 prefixes…

 As a bonus, we could get rid of NAT, too. ;-)

 /me ducks (but you know I had to say it)

 Yeah, just when we thought Slammer / Blaster / Nachi / Welchia / etc /
 etc  had been eliminated by process of can't get there from here... we
 expose millions more endpoints...

 /me ducks too (but you know *I* had to say it)


No ducking here.  You forgot Nimda.  Do you have an example from the
last 10 years of this class ?

Windows XP SP3  with a default host firewall on really did solve most
of this, not NAT.  Not stateful firewalls in networks.

In fact, jogging my memory, i clearly remember Blaster taking out
enterprise networks with network firewalls and stateful inspection...
because people manually move their laptops between security zones.
Right? They got infected on one LAN and then attached and spread the
worm to other LANs.

 I also remember the folks saying we just spent $100k on a pair of
super Netscreen firewalls, why is our network crashing?  Right?  And
then the infection scanning from hacked hosts... of course, overloaded
the firewall, and that crashed the entire campus... because the
firewall was a single point of failure sitting on the internet
boarder... and it has the 0-day flaw of too many sessions = crash.
Most firewalls have this 0-day, it's a feature.

This really happened to me in 2003, where a network based attack had a
broad impact on hosts.  But, never again after Win XP SP3.  Now, i
just have DDoS from purposefully publicly (poorly) run NTP and DNS
servers. And, hacks from users clicking on links they know they should
not click on. Oh, and anything made with Java or Adobe or IE.  Those
things are impossible to run securely, so secure systems don't run
them.

And, every now and then a server gets cracked, right through the
stateful firewall... because there was a rule allowing ANY to TCP 80.

CB


Re: We hit half-million: The Cidr Report

2014-04-29 Thread Jeff Kell
On 4/29/2014 11:37 PM, TheIpv6guy . wrote:
 On Tue, Apr 29, 2014 at 7:54 PM, Jeff Kell jeff-k...@utc.edu wrote:
 On 4/29/2014 2:06 PM, Owen DeLong wrote:
 If everyone who had 30+ inaggregable IPv4 prefixes replaced them with 1 (or 
 even 3) IPv6 prefixes…
 As a bonus, we could get rid of NAT, too. ;-)
 /me ducks (but you know I had to say it)
 Yeah, just when we thought Slammer / Blaster / Nachi / Welchia / etc /
 etc  had been eliminated by process of can't get there from here... we
 expose millions more endpoints...

 /me ducks too (but you know *I* had to say it)

 No ducking here.  You forgot Nimda.  Do you have an example from the
 last 10 years of this class ?

Oh?  Anything hitting portmapper (tcp/135), or CIFS (tcp/445), or RDP
(tdp/3389 -- CVE-2012-0002 ring any bells?). 

The vulnerabilities never stop.  We just stop paying attention because
most of us have blocked 135-139 and 445 and 3389 at the border long ago.

Now granted that 80/443 (server-side) are more dangerous these days :) 
But that doesn't eliminate the original risks. 

These are ports that were originally open by default...  and if you
don't have a perimeter policy, you're wrong (policy, compliance,
regulation, etc).

Not to mention that PCI compliance requires you are RFC1918 (non-routed)
at your endpoints, but I digress...

Jeff



Re: We hit half-million: The Cidr Report

2014-04-29 Thread Owen DeLong

On Apr 29, 2014, at 7:54 PM, Jeff Kell jeff-k...@utc.edu wrote:

 On 4/29/2014 2:06 PM, Owen DeLong wrote:
 If everyone who had 30+ inaggregable IPv4 prefixes replaced them with 1 (or 
 even 3) IPv6 prefixes…
 
 As a bonus, we could get rid of NAT, too. ;-)
 
 /me ducks (but you know I had to say it)
 
 Yeah, just when we thought Slammer / Blaster / Nachi / Welchia / etc /
 etc  had been eliminated by process of can't get there from here... we
 expose millions more endpoints...
 
 /me ducks too (but you know *I* had to say it)

Pretending that endpoints are not exposed to those things with NAT is kind of 
like putting a screen door in front of a bank vault and saying “now safe from 
tornadoes”.

Owen