RE: 69/8...this sucks -- Centralizing filtering..

2003-03-10 Thread jlewis

On Tue, 11 Mar 2003, Simon Lyall wrote:

> Could someone publish a name of a valid resource (or even pingable ip) in
> 69/8 space? This would allow people to test their (and their upsteams)
> filters quickly while we wait for the list to come out.

69.atlantic.net (69.28.64.8) is a loopback on our Gainesville, FL office 
router.

--
 Jon Lewis [EMAIL PROTECTED]|  I route
 System Administrator|  therefore you are
 Atlantic Net|  
_ http://www.lewis.org/~jlewis/pgp for PGP public key_



RE: 69/8...this sucks -- Centralizing filtering..

2003-03-10 Thread jlewis

On Mon, 10 Mar 2003, Michael Whisenant wrote:

> First I appreciate your message that you sent to us at NASA late Friday
> regarding a new address block that you received from ARIN. In that message
> you suggest that the issue was a BOGON route filter that had not been
> updated. Then without allowing sufficient time to respond to your message
> (you sent it to an administrative account and not the NOC) you decided to
> flame NASA.

My mention of NASA wasn't meant at all as a flame.  It was just an example
that not all the networks with outdated filters are remote nets in far
away countries that my customers wouldn't care about.  A few I've
found are.  I had to look up the country code to find that .al is Albania.  

I had actually planned to mention at some point that NASA was the first
(only so far) network to respond to the few messages I sent out late last
friday, and that their reported network has already been fixed.  I can
only assume that none of the previous 94 allocation holders of 69/8 space
noticed or complained to the right people.

> If you feel that you have any issue reaching a NASA resource then you can
> send a message to [EMAIL PROTECTED] and/or the tech/org/noc POC on any
> address space. NISN is NASA's ISP and as such announce via AS297 that
> address space.

As for sending the message to the wrong addresses, I can only suggest 
updating your ARIN info.  I sent the message to all the POCs (except the 
abuse one) for the relevant NetRange.  This is what I'll be doing when I 
send out the automated messages.  The ones sent friday were done by hand.

Can you elaborate on how a firewall config was the problem?  If whatever
was done there is commonly done, it may be worth revising my form message
before I send out a large number of them.

--
 Jon Lewis [EMAIL PROTECTED]|  I route
 System Administrator|  therefore you are
 Atlantic Net    |  
_ http://www.lewis.org/~jlewis/pgp for PGP public key_




Re: 69/8...this sucks

2003-03-10 Thread jlewis

On 10 Mar 2003, Jeff S Wheeler wrote:

> I repeat my suggestion that a number of DNS root-servers or gtld-servers
> be renumbered into 69/8 space.  If the DNS "breaks" for these neglected
> networks, I suspect they will quickly get enough clue to fix their ACLs.

Moving a number of them won't do anything.  Broken networks would just use
the ones they can reach.  Moving the root-servers isn't a good option
anyway since lots of Bind setups are distributed with a . hints file
containing A records for the root-servers, and these hints files are 
updated probably less frequently than bogon filters.

Since the root-servers have been reduced to refering queries to the
gtld-servers and nstld servers and perhaps others, these latter servers
would be the ones to move that would cause no pain for networks that work,
and immediate notification and motivation to fix filters for networks with 
outdated filters.

I don't suppose there's even a slim chance of this happening?

--
 Jon Lewis [EMAIL PROTECTED]|  I route
 System Administrator|  therefore you are
 Atlantic Net    |  
_ http://www.lewis.org/~jlewis/pgp for PGP public key_



RE: 69/8...this sucks -- Centralizing filtering..

2003-03-10 Thread jlewis

On Mon, 10 Mar 2003, E.B. Dreger wrote:

> Now, how can we force that?  Sufficient reward for doing so, or
> pain for failure.  Evidently "some people can't reach you" isn't
> enough pain, and having full reachability isn't enough reward.

I think the only way that's relatively guaranteed to be effective is to 
move a critical resource (like the gtld-servers) into new IP blocks when 
previously reserved blocks are assigned to RIR's.

I still have a couple hundred thousand IPs to check (I'm going to step up
the pace and see if I can get through the list today), but I already have
a list of several hundred IPs in networks that ignore 69/8.  The list
includes such networks as NASA, the US DoD, and networks in China, Russia,
and Poland.  Those are just a few that I've done manual whois's for.

I haven't decided yet whether I'll send automated messages to all the 
broken networks and give them time to respond and fix their filters, or 
just post them all to NANOG when the list is complete.

Are people interested in seeing the full list (at least the ones I find)
of networks that filter 69/8?

Does Atlantic.Net get an ARIN discount for doing all this leg work? :)
 
--
 Jon Lewis [EMAIL PROTECTED]|  I route
 System Administrator|  therefore you are
 Atlantic Net|  
_ http://www.lewis.org/~jlewis/pgp for PGP public key_



Re: Question concerning authoritative bodies.

2003-03-09 Thread jlewis

On Sun, 9 Mar 2003, E.B. Dreger wrote:

> > In AOL's case, they couldn't even tell us why our mail was
> > being rejected or our connections to their MX's blocked and I
> > had to wait a week for their postmaster dept. to get to my
> > ticket and return my call to fill me in on what was going on.
> 
> E.  Much better to put a semi-descriptive code in the 5.x.x
> and give a contact phone number and/or off-net email box.

There was a multiline message (when our connections weren't just refused 
or immediately closed).

550-The information presently available to AOL indicates that your server
550-is being used to transmit unsolicited bulk e-mail to AOL. Based on AOL's
550-Unsolicited Bulk E-mail policy at http://www.aol.com/info/bulkemail.html
550-AOL cannot accept further e-mail transactions from your server or your
550-domain.  Please have your ISP/ASP contact AOL to resolve the issue at
550 703.265.4670.

Trouble was, the people at 703.265.4670 can't help you.  They just take 
your name, number, and some other basic info, and open a ticket that the 
postmaster group will "get to eventually".

On the affected system, I ended up changing the source IP for talking to 
AOL's servers.
 
> True.  It cracks me up when someone complains about being on
> Selwerd XBL.

xbl.selwerd.cx might be useful for a few points in a spamassassin setup.  
I don't use it.

[EMAIL PROTECTED] implied that some of the other DNSBLs include selwerd.  I'm 
not aware of any, but I'm sure there are lots of DNSBLs I've never heard 
of and know nothing about.

--
 Jon Lewis [EMAIL PROTECTED]|  I route
 System Administrator|  therefore you are
 Atlantic Net|  
_ http://www.lewis.org/~jlewis/pgp for PGP public key_




Re: Question concerning authoritative bodies.

2003-03-09 Thread jlewis

On Sun, 9 Mar 2003, Jack Bates wrote:

> networks back it. Blocking the scans at a TCP/IP level is easily detectable.
> Provider received email from said server, IP was submitted for testing, no
> connection can be established to said server. Place it in the "wouldn't
> allow scan list". Politely ask AOL to use the "wouldn't allow scan list" for
> all inbound smtp connections.

Lots of people run outgoing mail servers that don't accept connections 
from the outside.  A scarey number of people run "multihomed" mail servers 
where traffic comes in on one IP, leaves on another, and the output IP 
doesn't listen for SMTP connections.

> People want the abuse of unsecured relays for smtp stopped. I'm afraid it is

Some do.  Some see absolutely nothing wrong with their running open 
relays.  You're going to need a serious authority figure with some 
effective means of backing up their policy to change these minds.

BTW...these topics have been discussed before.  Before we all get warnings 
from the nanog list police, have a look at the thread I started back in 
8-2001 http://www.cctec.com/maillists/nanog/historical/0108/msg00448.html
 
--
 Jon Lewis [EMAIL PROTECTED]|  I route
 System Administrator|  therefore you are
 Atlantic Net|  
_ http://www.lewis.org/~jlewis/pgp for PGP public key_



Re: Question concerning authoritative bodies.

2003-03-09 Thread jlewis

On Sun, 9 Mar 2003, Jack Bates wrote:

> > > made. Instead of contacting 3-5 DNSBLs, one must contact every ISP that
> > > happened to do a scan during the outage period. Centralizing scanning
> for
> > > security issues is a good thing in every way. It is the responsible
> thing to do.

This, IMO, is where the real headache lies.  If every provider (or just
every large provider) has their own private DNSBL, and worse, doesn't do
much to document how it works...i.e. how to check if IPs are in it, how to
get IPs out of it, then it becomes a major PITA to deal with these
providers when one of your servers gets into their list.  I've personally
dealt with this several times over the past couple years with Earthlink
and more recently with AOL.  In each case, there was no way (other than
5xx errors or even connections refused) to tell an IP was listed.  In each
case, there was no documented procedure for getting delisted.  In AOL's
case, they couldn't even tell us why our mail was being rejected or our
connections to their MX's blocked and I had to wait a week for their
postmaster dept. to get to my ticket and return my call to fill me in on
what was going on.

> networks are issuing their own relay and proxy checks. At this rate, in a
> few years, we'll see more damage done to server resources by scanners than
> we do from spam and those who would exploit such vulnerabilities.

I doubt that's possible.  If an average sized ISP mail server receives
messages from, say, a few thousand unique IPs/day, and if that ISP wanted
to test every one of those IPs (with some sane frequency limiting of no
more than once per X days/weeks/months) then it doesn't take long at all
to get through the list.  Suppose every one of those servers decided to
test you back.  Now you're looking at a few thousand tests/day (really a
fraction of that if they do any frequency limiting).  I've got servers
that each reject several hundred thousand (sometimes >1 million)  
messages/day using a single DNSBL.

Also, I suspect consensus on a central authority and testing methods is 
highly unlikely.  People can't agree on "what is spam?" or how to deal 
with providers who turn a blind eye to spammer customers (spews).  How 
will a single central DNSBL bring all these people with opposing views 
together?

Two obvious reasons for the existence of dozens of DNSBLs are:

1) not agreeing with the policies of existing ones...thus you start your 
own
2) not trusting existing ones (not being willing to give up control over 
what you block to some 3rd party), so you start your own

I suspect AOL and Earthlink run their own DNSBLs primarily for the second
reason.  How would you convince them to trust and give up control to a
central authority?

Even if IANA were to create or bless some existing DNSBL and decree that
all IP address holders will submit to testing or have their space revoked
(yeah, that'll happen) there would still be those who weren't happy with
the central DNSBL thus creating demand for additional ones.

> network. These arguments would be diminished if an authoritative body
> handled it in a proper manner. At what point do we as a community decide
> that something needs to be done? Would it not be better to have a single
> test suite run against a server once every six months than the constant
> bombardment we see now?

Parts of the community have already decided and have helped to create 
central quasi-authoratative DNSBLs.  If nobody uses a DNSBL, who care's 
what's in it?  If a sufficient number of systems use a DNSBL, that creates 
authority.

--
 Jon Lewis [EMAIL PROTECTED]|  I route
 System Administrator|  therefore you are
 Atlantic Net|  
_ http://www.lewis.org/~jlewis/pgp for PGP public key_



69/8...this sucks

2003-03-07 Thread jlewis

Atlantic.Net has just joined the 69/8 club of ARIN members with 
assignments in this IP block that's apparently in numerous outdated bogon 
filters.  As I posted I'd do earlier if given space from this block, I've 
written some code to check reachability to a large number of remote IPs 
from 2 source IPs...one in one of our older ARIN blocks, one in the new 69 
block.
 
I'm feeding this code a very large list of known mail server IPs, and
having it ping each IP...only it'll ignore /24's once reachability from
both the old and new IPs has been established to an IP in that /24.

It's only just getting started on the list, but I've already found dozens
of networks that appear to be problems.  I've hand confirmed a couple and
sent off emails to the ARIN contacts.  It looks like there are going to be 
so many networks to notify, I'll have to write some more code to automate 
these emails.

What have others in this situation done?  

Are you actually assigning 69/8 IP's to unsuspecting customers and hoping 
they won't notice parts of the internet ignoring them?

According to ARIN's whois server, there are 95 subdelegations for 
NET-69-0-0-0-0...we're the 95th.
  
I don't know if ARIN has other "less tainted" IP space to give out, but
something ought to be said/asked about this at the next meeting.  I
realize ARIN can't guarantee global routability of IP space, but should
they continue to give out IP blocks they absolutely know are not fully
routable on the internet today?

--
 Jon Lewis [EMAIL PROTECTED]|  I route
 System Administrator|  therefore you are
 Atlantic Net|  
_ http://www.lewis.org/~jlewis/pgp for PGP public key_



Re: anti-spam vs network abuse

2003-03-01 Thread jlewis

On 1 Mar 2003, Michael Lamoureux wrote:

> andy> If so, why outlaw the act of probing? Why not outlaw "probing
> andy> for the purposes of..."?
> 
> What's the offset into the probe packets to the "intent of the this
> probe" field?  And would you trust it if there were one anyway?

People speed, drive drunk, and run over pedestrians.  Should we outlaw 
cars?  Maybe just in California? :)

> What's a legit probe?  One where the owner gave you permission in
> advance to run the scan?  I can't think of another definition of that
> phrase.

When you walk into the secure part of an airport or some schools in rough
neighborhoods, you're scanned for metallic objects.  When you exchange
traffic with certain networks, they may also want to check you out to see
what risk may be associated with accepting your data in the future.  If
your system is an open relay/proxy, then there's elevated risk that at
some point (if not already), the data coming from your system will be
SPAM.  Some networks will choose not to accept your data or to tag it
in order to prevent their customers from having to accept unwanted data.

> This is a completely naive statement.  There are 0 networks that I'm
> willing to believe have 0 vulnerabilities on them.  There may be 0
> that you know about, but that doesn't mean there aren't more
> vulnerabilities which aren't public knowledge lurking in sendmail or
> bind or ssh or ssl or apache or any number of other services you have
> running.

So if nobody probes your network, it's more secure?

--
 Jon Lewis [EMAIL PROTECTED]|  I route
 System Administrator|  therefore you are
 Atlantic Net|  
_ http://www.lewis.org/~jlewis/pgp for PGP public key_




Re: Who uses RADB? [was BGP to doom us all]

2003-03-01 Thread jlewis

On Sat, 1 Mar 2003, Mark Radabaugh wrote:

> Who actually uses RADB to build filters other than Verio?  While my
> experience with other providers is limited Verio is the only one (of the
> ones we have used) who used RADB entries for BGP peers.

AFAIK, Level3 and C&W.  I have to keep RADB entries (actually altdb, and 
c&w's own) up to date in order for each of them to accept our routes and 
our BGP customers' routes.

> Overall it wasn't the best solution IMHO for a couple of reasons:
> 
>  - there was nothing to keep us from making bogus entries in the RADB
>  - filters were only updated once a day making changes slow

OTOH, they don't have to pay someone to answer and respond to email sent 
to bgp-admin.  They won't accept routes you accidentally leak to them.  Is 
it secure?  Not really.  Is it cheap, reliable automation, I suspect so.

> This is not meant as a complaint toward Verio - I'm simply trying to decide
> why we should go to the added expense of entering our routes in a RADB.  To
> date I have seen no operational difference between using RADB and not using

www.altdb.net.  No expense other than the time you spend keeping your 
objects up to date.

--
 Jon Lewis [EMAIL PROTECTED]|  I route
 System Administrator|  therefore you are
 Atlantic Net|  
_ http://www.lewis.org/~jlewis/pgp for PGP public key_



Re: anti-spam vs network abuse

2003-02-28 Thread jlewis

On Fri, 28 Feb 2003, Andy Dills wrote:

> Actually, I think the debate starts with Paul telling Jon that Jon isn't
> passively scanning connection hosts, he's actively trawling for open
> proxies, that Paul has the logs to prove it, and that since Paul is in
> California, Jon has broken the law.

He was using considerable artistic license with the numbers when he said
every IP on every net he owns had been checked by NJABL.  The reality is
more like 0.06% of the IPs on 3 networks he owns or manages were checked
over the span of about 7 months.  At that rate (if my math is correct), it
would take almost 1000 years to scan all the IPs on those networks.  
Hopefully, someone will have solved this spam problem by then.

> You don't have to. This is why I never understood why people care so much
> about probing. If you do a good job with your network, probing will have
> zero affect on you. All the person probing can do (regardless of their
> intent) is say "Gee, I guess there aren't any vulnerabilities with this
> network."

When I hooked up my first server on the internet back in 1993, I was kind 
of shocked that some far away stranger was trying to log into my POP3 
server.  Unwanted connections have been a fact of life on the internet 
probably since its beginning.  

--
 Jon Lewis [EMAIL PROTECTED]|  I route
 System Administrator|  therefore you are
 Atlantic Net    |  
_ http://www.lewis.org/~jlewis/pgp for PGP public key_



Re: anti-spam vs network abuse

2003-02-28 Thread jlewis

On Fri, 28 Feb 2003, Roy wrote:

> I haven not checked NJABL but some of the other other open relay testers use
> scenarios that are illegal (actually criminal) in California.

If you mean the use of "incorrect" from addresses, I believe that law only 
applies if the message(s) sent with someone else's address results in 
damage.  I'm not here to debate the issue, and I certainly didn't mean to 
start such a long thread here (the same post went to spam-l, where it was 
nearly ignored), but I don't think 1 test message sent every 4 weeks (or 
less frequently) will cause damage[1].
 
[1] yes...I am aware of one case where were ORBZ got in some hot water 
over an SMTP envelope that effectively broke an outdated version of Lotus 
Domino.  NJABL takes precautions to not repeat that mishap.

Just to be safe, mayby I'll avoid visiting the People's Republic of
Kalifornia.  That shouldn't be so hard.

--
 Jon Lewis [EMAIL PROTECTED]|  I route
 System Administrator|  therefore you are
 Atlantic Net    |  
_ http://www.lewis.org/~jlewis/pgp for PGP public key_



anti-spam vs network abuse

2003-02-27 Thread jlewis

We (Atlantic.Net) have gotten a flurry of abuse complaints from people 
who's systems have been scanned by 209.208.0.15 (rt.njabl.org...a DNSBL 
hosted on our network).  I'm hoping the new PTR record will head off many 
complaints now.

For the past 15 months, NJABL has reactively tested systems that have
connected to participating SMTP servers to see if those systems are open
relays.  Just over a week ago, NJABL added open proxy testing to its relay
testing software.  The proxy testing checks for a variety of common proxy
software/protocols on about 20 different ports simultaneously.  This is
apparently setting off some IDS/firewall alarms.

We do not consider what NJABL does abuse, and we reply to all the 
complaints explaining that the complainant should go have a look at 
http://njabl.org/ and hopefully they'll understand why their system was 
scanned.

This sort of activity is becoming more common / mainstream, so people
ought to just get used to it.  Road Runner is doing the same thing
(according to http://sec.rr.com/probing.htm) which is pretty ironic given
how their security department has gotten along with (or not) various
DNSBLs in the past.

BTW...in the week that NJABL has been testing for open proxies, more than
18000 have been detected, pretty much all of which are actively being
abused by spammers, else mail would not have come through them.

--
 Jon Lewis [EMAIL PROTECTED]|  I route
 System Administrator|  therefore you are
 Atlantic Net|  
_ http://www.lewis.org/~jlewis/pgp for PGP public key_



Re: RIPE Down or DOSed ?

2003-02-27 Thread jlewis

On Thu, 27 Feb 2003, Kai Schlichting wrote:

> Secrecy over a public resource = no oversight = facilitator of abuse.
> 
> Why do I get the distinct feeling that this "move" by Level3 is
> aimed not at creating greater customer privacy (it never served
> POC email addresses), or protecting themselves from getting their
> customer base poached by other providers, but at preventing
> people from identifying spamming Level3 customers (of which they
> seem to have 100's) by organization name and being able to
> correlate activity from different netblocks of theirs.

Though I agree, Level3 seems to host a good number of spammers, they're by
no means the only guilty party.  Pulled at random from recent spams I've
submitted to NJABL are 69.6.4.104, 69.6.4.114, and 69.6.4.156.  whois
@arin.net yields the following:

...
NetRange:   69.6.0.0 - 69.6.63.255
CIDR:   69.6.0.0/18
NetName:WHOLE-2
NetHandle:  NET-69-6-0-0-1
Parent: NET-69-0-0-0-0
NetType:Direct Allocation
NameServer: NS1.WHOLESALEBANDWIDTH.COM
NameServer: NS2.WHOLESALEBANDWIDTH.COM
...

Where are the swips?  The rest of that record makes no mention of an
rwhois server.  Doing a bunch of whois requests for IPs in that block, I
found only one swip (for a /21).  I realize the ARIN regs don't seem to
require that reassignment info be made available to the public (just to
ARIN), but using your innocent customers (if there are any) as a shield to
hide your spammer customers is just wrong.  Should I block 69.6.4.0/24
from sending email into my systems?  69.6.0.0/18?

http://www.njabl.org/cgi-bin/lookup.cgi?query=69.6.4.104
http://www.njabl.org/cgi-bin/lookup.cgi?query=69.6.4.114
http://www.njabl.org/cgi-bin/lookup.cgi?query=69.6.4.156

--
 Jon Lewis [EMAIL PROTECTED]|  I route
 System Administrator|  therefore you are
 Atlantic Net    |  
_ http://www.lewis.org/~jlewis/pgp for PGP public key_



Re: 69.0.0.0/8 - Please update your filters

2003-02-25 Thread jlewis

On Tue, 25 Feb 2003, Haesu wrote:

> And how quickly would those ASN's respond to or even comprehend the
> bogon-filter update notices? If those ASN's are competent and
> quick-responsive ones, we should not even be having these prroblems to
> begin with.

If the alternative is getting space, giving it to customers, and 
explaining why they can't reach X, Y, and Z on their connection to us, but 
they can on other internet connections, we're going to at least have to 
try.

I like the idea of moving the gtld servers into such space.  That way, the 
networks that are at fault will break, and they'll be well motivated to 
fix their filters.  
 
--
 Jon Lewis [EMAIL PROTECTED]|  I route
 System Administrator|  therefore you are
 Atlantic Net    |  
_ http://www.lewis.org/~jlewis/pgp for PGP public key_



Re: 69.0.0.0/8 - Please update your filters

2003-02-25 Thread jlewis

On Tue, 25 Feb 2003, Stephen Sprunk wrote:

> Thus spake "E.B. Dreger" <[EMAIL PROTECTED]>
> > I _still_ like the idea of putting DNS roots in new IP blocks
> > during sunrise and having the final octet be .0 and/or .255.  It
> > would be nice to catch dated bogon filters, lame attempts at
> > smurf stopping, _and_ stale root.cache in one blow.
> 
>  From an academic standpoint, that would be a very interesting experiment.
> However, most of us are paid to keep our networks or services running, not
> to intentionally break them.

The trouble is, some people are neglecting their jobs and making things 
rough for others (the people getting new allocations).

Somebody with one of these new cursed allocations ought to setup a system 
with two IPs (one from the new block, one from an older established block) 
and do reachability tests to various parts of the net, and then automate 
sending a notice of bogus filters to those ASNs reachable from the old IP, 
but not from the new one.

If I end up with some of this space, I'll be doing this.
 
--
 Jon Lewis [EMAIL PROTECTED]|  I route
 System Administrator|  therefore you are
 Atlantic Net|  
_ http://www.lewis.org/~jlewis/pgp for PGP public key_



Re: IP Management tool for service providers

2003-02-25 Thread jlewis

On Thu, 20 Feb 2003, John Todd wrote:

> Here's one.  I haven't used it in production, but the demo that I was 
> given was pretty slick.  Works on pretty much any POSIX platform... 
> Alas, it is commercial software.
> 
> Voyager IP   http://www.vger.com/products.shtml#v_ip

Where did you see a demo?  Any idea what it costs?  I just sent them an 
email.  Not much info on their web site, and their contact submission form 
is broken.

> This was referenced on the list back in Jan of 2002:
> http://www.freeipdb.org/ http://www.globalcrossing.com

A coworker took a look at this recently.  He had some difficulty getting 
it installed properly and it lacks some features we'd require relating to 
the tracking of IP allocations in the ways ARIN demands.

> This was referenced on the list in November of 2001:
> http://www.brownkid.net/NorthStar/

I just installed this.  Installation went easily, but it doesn't seem to
actually work :)  After adding a big block of space and creating one
allocation in it, the links to create additional subnets bring up the
wrong page.  It seems very browser dependent.  i.e. with various versions
of Netscape and Mozilla on Linux, some of the pages don't work (but don't
produce any error messages).  The same pages did work in IE on Windows, at
least until the whole thing quit working.  It also lacks necessary
features and doesn't seem to be flexible enough to incorporate the
features I want without digging into the code.

The basics of what I think an IP allocation tracking system needs (at 
least for any ARIN member) are:

1) Ability to track allocations from multiple IP blocks

2) Ability to track type of assignment (i.e. assigned vs reserved)

3) Ability to track service category as required on ARIN additional 
request form.  i.e.  Dial-up|Cable|Web Hosting|Leased Line|
xDSL|Co-location|Wireless|Other-

4) Storage of customer name and contact info for each allocation

5) Storage of justification info for each assignment

6) Ability to present unallocated space in such a way that allocations can
be done efficiently.  i.e. if a /28 needs to be allocated, make it easy to
find unallocated existing /28's, rather than do unnecessary subnetting to
create a new /28.

7) Auditing.  When it's additional request time, you need to be able to 
audit your assignments and add up how much space is reserved, how 
much is assigned, how much is being used for each of the various ARIN 
defined categories, look up justifications, etc.

8) Automated swip/unswip or hooks to automate rwhois maintenance would be 
nice, but not absolutely required.

The systems I've seen so far lack multiple features from the above list.  
Is everyone just using flat files, spreadsheets, or home grown solutions?

--
 Jon Lewis [EMAIL PROTECTED]|  I route
 System Administrator|  therefore you are
 Atlantic Net|  
_ http://www.lewis.org/~jlewis/pgp for PGP public key_



Re: M$SQL cleanup incentives

2003-02-22 Thread jlewis

On Sat, 22 Feb 2003, Stephen Sprunk wrote:

> As one hoster put it to me, DoS and worm traffic is billable so it's not in
> the hoster's interests to protect customers -- quite the opposite in fact.

Whether or not the traffic is billable is irrelevant if your network is 
effectively down.  One infected host connected to a 2900XL effectively 
kills the switch.  I was fortunate enough to be on vacation and not even 
have net access when the initial slammer wave hit.  But when I was back 
and on-call, we had a single customer get (re-?)infected, killing the 
switch they were on and noticably slowing down the network for the whole 
POP.

> What will you do when a similar worm appears on 53/udp or some other
> heavily-used port?  We lucked out with Sapphire because MS/SQL is generally

Be screwed unless we've completed planned upgrades.  But in this case, I
can filter until we've upgraded our network to hardware that's better able
to deal with such traffic.  Just because filtering might not always work
doesn't mean it shouldn't be done when it does work.

--
 Jon Lewis [EMAIL PROTECTED]|  I route
 System Administrator|  therefore you are
 Atlantic Net    |  
_ http://www.lewis.org/~jlewis/pgp for PGP public key_



Re: M$SQL cleanup incentives

2003-02-22 Thread jlewis

On Sat, 22 Feb 2003, Doug Clements wrote:

> The issue I had with your argument is "forever". You should realize as well
> as anyone that the course of software development and implementation will
> mitigate the threats of the slammer worm until it's nothing more than a bad
> memory.

Unlikely in this case.  A reasonably fast system infected with slammer is 
capable of generating enough traffic to make the Cisco 2900XL switch its 
plugged into incapable of passing normal traffic.  All it takes is one 
infected customer's system to really foul up the network it's attached to.  
The only plus side is, this is perfect justification to management for 
replacing any switches customers connect to with newer ones that (at least 
claim to) do per-port rate limiting.  If your network is able to contain 
slammer infected boxes without melting down, who cares if you have a few 
infected customers?  You don't need to filter, and they'll all be 
encouraged to fix their systems sooner.

I setup inbound 1434/udp filters the 3rd time we had a customer (different
ones each time) get (re-?)infected weeks after the initial outbreak.  
Sure, some DNS replies and assorted other packets will get dropped, but
AFAIK, nobody has complained or even noticed...and we've had no more
re-infections since the filters were put in place.

I don't believe we'll have to filter 1434/udp forever, but I plan to leave 
the filters in place until we no longer need them or until they hurt more 
than they help.

--
 Jon Lewis [EMAIL PROTECTED]|  I route
 System Administrator|  therefore you are
 Atlantic Net|  
_ http://www.lewis.org/~jlewis/pgp for PGP public key_



Re: scripts to map IP to AS?

2003-02-20 Thread jlewis

On Thu, 20 Feb 2003, William Allen Simpson wrote:

> Anybody have a pointer to scripts to map IP to AS? 

I suspect the easiest thing to do would be to write some code to query a 
looking glass, perhaps even install your own for this

> There are still 10K-20K hosts spewing M$SQL slammer/sapphire packets, 
> and I'd like to start blocking routing to those irresponsible AS's 
> that haven't blocked their miscreant customers.

but automatically blocking AS's that send some 1434/udp traffic your way
sounds like a really bad idea and would setup an easy way to DoS your
network by "tricking" you into blocking certain AS's.  Why not just block
1434/udp at your ingress points and be happy?

--
 Jon Lewis *[EMAIL PROTECTED]*|  I route
 System Administrator|  therefore you are
 Atlantic Net    |  
_ http://www.lewis.org/~jlewis/pgp for PGP public key_




Re: DC power versus AC power

2002-12-28 Thread jlewis

On Fri, 27 Dec 2002, Scott Granados wrote:

> It is likely that in many settings during power failures transition from ac
> street power to ac generator power will have some lag and during that time
> your hardware could loose power.  This of course depends on ups systems in
> use and many factors.  Dc usually however is clean in its transition and
> goes with out saying is battery backed up.

I'll add to that, that since DC removes the need for your own UPS's, by
going with DC, you save rack space, deploy less gear (UPS's are HEAVY),
and don't have to worry about which POPs have how many UPS's with dead
batteries at any given time.  OTOH, since with DC you're unlikely to have
any backup power of your own, it is important to wire up both an A side
and B side.  Some places (like certain telcos) like to briefly turn off
parts of their DC power grids somewhat regularly.  This makes gear with
only one set of DC inputs rather annoying.  Does anyone actually wire up 
both the A side and B side to a single DC power supply and use diodes to 
keep the two supply grids separate?

DC also avoids bulky AC power cords...and not only are the wires less
bulky, but you'll likely cut them to the actual length needed.  Since DC
wiring is usually screwed down, they don't get bumped or accidentally
pulled out of the outlets as often.

--
 Jon Lewis *[EMAIL PROTECTED]*|  I route
 System Administrator|  therefore you are
 Atlantic Net    |  
_ http://www.lewis.org/~jlewis/pgp for PGP public key_




Re: Operational Issues with 69.0.0.0/8...

2002-12-09 Thread jlewis

On Mon, 9 Dec 2002, Todd A. Blank wrote:

> I hereby challenge one of you to trade CIDRs with us.  You take this
> 69.1.192.0/19 ARIN assigned us and you go spend your valuable time,
> resources, and money working out what seems to be "nobody's problem".

Was this an initial allocation into which you're renumbering out of
provider space, or a trade-in (you gave some block back to ARIN and got
this one)?  Based on the newness of your ASN and sho ip bg regex _26483,
I'm guessing it's your first allocation.  Assuming you did this because
you were about out of the space allocated to you by your provider(s), have
you looked into getting some more space from your providers to keep things
running while the issues with 69.0.0.0/8 filters are worked out?  Even if
they've already given you as much space as their policies allow, I suspect
you could talk them into bending the rules in a case like this.  Creating
more networks to renumber sucks, but it beats losing customers, and you
have plenty of time...probably even more than the ARIN published
guidelines for renumbering due to the problems you've encountered...and 
what can ARIN do if you go beyond their suggested deadline anyway?

I don't have any spare CIDRs to trade you.  In fact, I'll be doing the 
ARIN dance again soon to get more space since we're running out.  I'm 
really not looking forward to being in the same boat as you, but at least 
I know now to expect trouble, especially if we get a chunk of the same /8 
you did.  

In your first message, you posted a couple of web sites that were not 
reachable from your IP space.  It'd be more useful (to people in your 
shoes) and more embarrassing (to the offending networks) if you could post 
the names of the networks/backbones you've identified thus far that are 
still filtering 69.0.0.0/8.  

Maybe someone reading this list will know someone who knows someone at
those networks and be able to get something done.  If nothing else, it
gives the next guy who gets 69.0.0.0/8 space a starting point of networks
to check connectivity to and networks to contact if things don't work for
them.  Then those networks will have multiple people pestering them to fix
their filters even if not everyone affected has customers that actually
care about reaching those nets.

> Also, if you would like to come over and answer the support calls and
> explain to our customers why the competitor's networks can reach these
> sites, but ours can't.  Hey - after all, it's just CIDR - it's all the
> same, right?

Have you given customers in the affected space the option of renumbering 
back into your previous IP space?

> What all of you don't know, is that for the first month we had this
> CIDR, we could not register hosts on it at NetSol/Verisign, because
> their core registry did not recognize it.  We have been getting F***ed

That should have set off some alarm bells and prompted a post to nanog a 
month ago.

--
 Jon Lewis *[EMAIL PROTECTED]*|  I route
 System Administrator|  therefore you are
 Atlantic Net|  
_ http://www.lewis.org/~jlewis/pgp for PGP public key_




Re: Operational Issues with 69.0.0.0/8...

2002-12-06 Thread jlewis

On Fri, 6 Dec 2002, Ralph Doncaster wrote:

> ARIN clients should have the ability to exchange defective "goods".  It
> seems ARIN won't do this.  And posting to NANOG or similar lists doesn't
> seem to fix the problem.  Sooner or later someone's going to decide to let
> the lawyers deal with it.  I don't think ARIN's resources should be wasted
> in the courts.

ARIN can't change (or even detect) who's filtering what.  They likely have
no way of knowing in advance if any IP block is filtered anywhere.  How
many places need to block your IP before you declare the IP bad?  Should
ARIN announce and test connectivity with some standard suite before giving
each allocation?  Should the end-user be given some trial period during
which they can do this?  What happens when ARIN runs out of IPs that don't
appear to be filtered by any recognized network?

This is an unfortunate pitfall that goes along with portable IP space and
BGP.  When I got the company's first ARIN block at a previous employer
(back in the late 90s), we ran into issues with several large/well known
networks ignoring our BGP route.  Some were fixed just by doing the RADB
thing.  Some had to be emailed or phone called before they fixed their
filters.

This isn't a new problem, and there's no magic solution ARIN can
execute...at least not that anyone's come up with so far.

...wondering when we'll hear from Dalph on the matter. :)

--
 Jon Lewis *[EMAIL PROTECTED]*|  I route
 System Administrator|  therefore you are
 Atlantic Net|  
_ http://www.lewis.org/~jlewis/pgp for PGP public key_




Re: Odd DDoS, anyone else seen this?

2002-11-25 Thread jlewis

On Mon, 25 Nov 2002, Christopher L. Morrow wrote:

> On Mon, 25 Nov 2002 [EMAIL PROTECTED] wrote:
> >
> > Can anyone think of a reason why this sort of traffic should be routed at
> > all?  Does anyone actually drop hosts on to addresses ending in x.x.x.0?
> >
> 
> I've seen cable modem users have .0 ips.

DSL ports too.  I was spammed today from a Verizon DSL IP of 4.46.3.0.

--
 Jon Lewis *[EMAIL PROTECTED]*|  I route
 System Administrator|  therefore you are
 Atlantic Net    |  
_ http://www.lewis.org/~jlewis/pgp for PGP public key_




Re: sprint passes uu?

2002-10-15 Thread jlewis


On Tue, 15 Oct 2002, Brian wrote:

> 
> The interesting part of that to me is that the total number of prefixes in
> a full feed is in the low 100,000 range, so this still represents a very
> large percentage of the entire prefix pie.
> >
> > x.x.x.x 4  1239 2396636  438162 6144276100 9w3d47637
> > x.x.x.x 4   701 3768775  499186 6144276100 1w5d45410

It's hard to know how large a percentage though without knowing how many
Sprint customers are also UU customers.  i.e. The combination of Sprint
and UU customer routes could still be just 47637 prefixes, though I'm sure
it's somewhere between that and 47637+45410.  It's certainly not
47637+45410, which would falsely suggest that together Sprint and UU have
roughly 80% of the internet as customers.
 
--
 Jon Lewis *[EMAIL PROTECTED]*|  I route
 System Administrator|  therefore you are
 Atlantic Net    |  
_ http://www.lewis.org/~jlewis/pgp for PGP public key_




Re: iBGP next hop and multi-access media

2002-10-07 Thread jlewis


On Mon, 7 Oct 2002, Ralph Doncaster wrote:

> > > > As others are saying... it isn't "local".  It's not "local"
> > > > unless in the same subnet.  Physical topology often correlates
> > > > with higher layers, but it's not strictly 1:1.
> > > 
> > > Manually configuring a static route in router A would achieve the result:
> > > ip route 172.16.16.0 255.255.255.0 fa0/0
> > 
> > Why are we doing basic IP routing 101 on NANOG?  
> 
> OK, since it's so basic why don't you explain how to have router A
> dynamically learn from router B that there is a new subnet on the local
> ethernet?

You don't.  Even if you did somehow manage that on the routers, how will 
the hosts get packets back to a router for which they have no route?  
With no route to get packets back to the router, they're going to use 
their default route.  Or you could write your own IP stack.  I have a 
friend who did this for a networked environmental probe.  Rather than 
utilizing IP routing, this device's primitive IP stack simply sends 
replies to the MAC address from which they came.  I suspect the IP stack 
on Cisco switches may do something similar.  I don't think you're going to 
find this functionality in many 'normal' IP stacks. 

> > Don't route IP blocks to the ethernet.  That's using ARP as your routing
> > protocol and it's horribly fragile.  I've seen one ISP do that (they were
> > very technically challenged) and it's a setup that broke way too easily.
> 
> So then what do you call a connected route (for an ethernet interface on a
> router)?  If you use ethernet, at the edges of your network you HAVE to
> route IP blocks to the ethernet.

I don't have to.  Go ahead and do it your way.

--
 Jon Lewis *[EMAIL PROTECTED]*|  I route
 System Administrator|  therefore you are
 Atlantic Net|  
_ http://www.lewis.org/~jlewis/pgp for PGP public key_




Re: iBGP next hop and multi-access media

2002-10-06 Thread jlewis


On Sun, 6 Oct 2002, Ralph Doncaster wrote:

> > As others are saying... it isn't "local".  It's not "local"
> > unless in the same subnet.  Physical topology often correlates
> > with higher layers, but it's not strictly 1:1.
> 
> Manually configuring a static route in router A would achieve the result:
> ip route 172.16.16.0 255.255.255.0 fa0/0

Why are we doing basic IP routing 101 on NANOG?  

Don't route IP blocks to the ethernet.  That's using ARP as your routing
protocol and it's horribly fragile.  I've seen one ISP do that (they were
very technically challenged) and it's a setup that broke way too easily.

Paging Dalph Roncaster.  Clean-up in aisle one.

--
 Jon Lewis *[EMAIL PROTECTED]*|  I route
 System Administrator    |  therefore you are
 Atlantic Net|  
_ http://www.lewis.org/~jlewis/pgp for PGP public key_




Re: selective prepends...one more time

2002-09-30 Thread jlewis


On Mon, 30 Sep 2002, Leo Bicknell wrote:

> In a message written on Tue, Oct 01, 2002 at 12:16:07AM +0200, Iljitsch van Beijnum 
>wrote:
> > I think most customers don't know how this works. Maybe someone should
> > write a book that explains this kind of stuff...
> 
> I'm not so sure I'd come to that conclusion.  I think when most
> customers see a problem on their transit providers network they

Some NOCs, even ones that support this on their network, don't understand 
it...or at least have staff that don't even come close to grasping it.  It 
wouldn't surprise me at all if it's beyond a great many customers.

> Most people I see using this feature fall into two catagories.
> The first type doesn't believe the provider can fix the problem
> but is forced to use them (due to price, management, whatever) and
> uses this to avoid their NOC because it doesn't work.  The second
> type of person believes they can actually do a better job of routing
> than their upstream.  This may even be true in some cases (where
> the customer has several transit providers all supporting this
> 'feature'), however I suspect in many cases the customer is actually
> making their own life worse.

Consider a network with several transit providers.  Each transit pipe is
incapable of handling all that network's traffic.  The pipes may even be
of wildly different sizes.  Letting BGP decide where traffic goes (or
comes from) with no tuning just won't work.  You'd end up with some pipes
overutilized and others underutilized.  In this case, selective prepends
make it possible to shift traffic around or decide "we're going to try
forcing all ASxyz traffic to come to us over pipe A."

There's also the occasional case of medium to long term overloaded peering 
between large providers in which case you might want to do all you can to 
force traffic to/from ASxzy to not come/go via pipe A.

> increased.  Even if we assume all the people using it really need
> it, is it worth risking the performance of 500 or 1000 customers
> for the 5-10 who actually use the features?

I wonder if anyone from Sprint or C&W is willing/able to say what 
percentage of multihomed customers utilize these communities?  With enough 
full views from enough route-servers, it might even be possible to analyze 
the data and see how many use this.
 
--
 Jon Lewis *[EMAIL PROTECTED]*|  I route
 System Administrator|  therefore you are
 Atlantic Net|  
_ http://www.lewis.org/~jlewis/pgp for PGP public key_




selective prepends...one more time

2002-09-30 Thread jlewis


>From last week's thread on Cogent service and selective prepends, I've 
compiled a list of transit providers that support BGP communities for 
selective prepends when propagating routes to peers.

sprint
c&w
gblx.net
level3
Williams Communications Group
internap.com

Is anyone aware of others, preferably of similar size to Sprint and C&W
(and in the US) that support this?  I need to choose an additional
provider real soon and already have Sprint and C&W.  We'll be connecting 
ideally in Orlando, FL, but can take connectivity in most of the bigger 
cities in FL.

--
 Jon Lewis *[EMAIL PROTECTED]*|  I route
 System Administrator|  therefore you are
 Atlantic Net|  
_____ http://www.lewis.org/~jlewis/pgp for PGP public key_





RE: Cogent service

2002-09-22 Thread jlewis


On Fri, 20 Sep 2002, Dale Levesque wrote:

> I must agree with everyone else's synopsis. There bandwidth is cheap,
> and connection is reliable. They however do have some congestion issues
> and are not very flexible when it comes to special needs. 

What are these 'special needs' people keep mentioning?  What special needs 
might you have of your transit providers?

Speaking of special...having played around a little with the BGP 
communities supported by C&W and Sprint, I'm wondering which other big 
transit providers (it seems almost a waste to say Tier 1 anymore) support 
community strings that will let you (the customer) cause them to 
selectively prepend route announcements to their peers.

This seems to be a really handy tool for balancing (or at least trying to 
balance) traffic across multiple transit providers without having to 
resort to the sort of all or nothing results you'd get by prepending your 
announcements to the transit provider, or worse, deaggregating your IP 
space for traffic engineering.

AFAIK, Genuity does not have this.  

UUNet has a very rudimentary version which allows you to cause them to do
prepending to all or no non-customer peers.  

Sprint and C&W do it very differently but allow you to select which peers 
to prepend to (though you'll likely have to work with several Sprint 
engineers or get lucky to get it working).

If there are others that support the sort of flexibility of Sprint and 
C&W, and have decent T3 level pricing, I'd like to hear about/from them.


--
 Jon Lewis *[EMAIL PROTECTED]*|  I route
 System Administrator|  therefore you are
 Atlantic Net    |  
_ http://www.lewis.org/~jlewis/pgp for PGP public key_




Re: e-mail blacklists (was Re: SPEWS?)

2002-06-20 Thread jlewis


On Thu, 20 Jun 2002 [EMAIL PROTECTED] wrote:

> On Thu, 20 Jun 2002, J.D. Falk wrote:
>
> >  But spamcop's in specific is still based on spamcop user
> > complaints, and most of the spamcop user complaints I've seen
> > have been grossly mistargetted.
>
> How?  I find spamcop to be very reliable, and the basis of many actions.

Spamcop is a perfect example of garbage in / garbage out.  I've had a
number of servers in spamcop's blacklist for the following reasons:

1) Local user misinterprets headers and reports one of our own MX's
thinking it generated a spam he/she received.  We get blacklisted.

2) Remote user gets the same message a few times from one of our users
(some tax related documents) and for reasons unknown to us, reports it as
spam, and we're blacklisted.

3) Local user runs a mailing list on one of our servers and leaves posting
open (yeah...that was a bad idea, but lots of lists still do it).  List
gets spammed.  A list member reports our server, causing it to be
blacklisted.  This one is actually listed right now, and we've gotten a
few "why can't I send email to ...?"  questions from other customers on
the same server.

The idea of a spam blacklist with an army of contributors is appealing.
In theory, it could blacklist large numbers of spam sources, perhaps
before they get a chance to hit your servers...but the reality is an army
of idiots turning a good idea into an unusable mess.

Some sort of hybrid of spamcop with dsbl, where those who screw up have
their contributing rights revoked would be far more interesting.  There
also needs to be some method for intervening when someone screws up rather
than having to just wait out expiration of a listing that should never
have happened.

-- 
--
 Jon Lewis *[EMAIL PROTECTED]*|  I route
 System Administrator|  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_




mail-abuse.org down?

2002-06-08 Thread jlewis


Yesterday morning, I noticed mail-abuse.org appeared to be down
(unreachable). I checked again, and it's still unreachable.  In fact, I
can't even reach its name server.

I did some more looking last night, and it seems it's not down, it's just
unreachable from my network.  Even stranger, it's only unreachable from
Atlantic.Net's primary ARIN block of 209.208.0.0/17.  Traceroutes die at
so-1-1-0.mpr1.sql1.us.mfnx.net (209.249.203.58).

Router interfaces (using provider IPs) and a smaller IP block from an ISP
we acquired are able to reach mail-abuse.org, as are other networks I have
access to.  We don't appear to be listed in the MAPS RBL+.  I've tried
clearing BGP sessions, forcing packets out through alternate paths, with
no affect.

Is this some weird routing glitch somewhere between me and MAPS or has
someone at MAPS or vix.com decided they don't like me?

Also, though it seems to be on a totally different network, I've just
noticed I have the same problem reaching f.root-servers.net only from
209.208.0.0/17.  Here traceroutes die at 189.ATM11-0-0.BR1.PAO1.ALTER.NET
(146.188.148.105).

I certainly hope this isn't yet another case of someone confusing
Atlantic.Net/Internet Connect Company, Inc. with

ATLANTIC INTERNET (NETBLK-Q0417-65-124-104-0)
   621 NW 53RD ST. SUIT E135
   BOCA RATON, FL 33487
   US

   Netname: Q0417-65-124-104-0
   Netblock: 65.124.104.0 - 65.124.111.255

Atlantic Internet is full of commercial spammers and has just recently
resulted in several providers blacklisting our primary ARIN block thinking
we were the same company.

-- 
--
 Jon Lewis *[EMAIL PROTECTED]*|  I route
 System Administrator|  therefore you are
 Atlantic Net    |
_ http://www.lewis.org/~jlewis/pgp for PGP public key_





AOL and Sprint

2002-05-25 Thread jlewis


Anyone else unable to reach AOL this morning via Sprint's network?  I can
get there through C&W or UUNet, but not via Sprint.

-- 
--
 Jon Lewis *[EMAIL PROTECTED]*|  I route
 System Administrator|  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_




Re: Controlling Spam to the NOC

2002-05-23 Thread jlewis


On Thu, 23 May 2002 [EMAIL PROTECTED] wrote:

> 
> You hit it dead on: use all the tools at your disposal, but preemptively
> "whitelist" your customers.  Unfortunately, the whitelisting isn't always as
> easy as it sounds.  If they are within your IP space, you're good to go, but
> if they have the rare portable block, or they are multihomed, etc., you need
> to be more careful.
> 
>
> In Short: Whitelist like crazy, and then blacklist like mad!

We do both...but I wouldn't say whitelist like crazy.  More like whitelist
as needed, and find a blacklist or one of the message body parsing utils
you like...or both.

For the rare emergency when a customer (or non-customer) needs to talk to
our NOC and can't get email through, we have these neat things called
telephones.  They work pretty well.  In fact, I think mine often works too
well.

-- 
--
 Jon Lewis *[EMAIL PROTECTED]*|  I route
 System Administrator|  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_




Re: list problems?

2002-05-22 Thread jlewis


On Wed, 22 May 2002, Andy Dills wrote:

> > >From the number of personal replies I got about these topics, it seems
> > like many people are interested in sharing information about how to do
> > routing on a budget, or how to avoid getting shot in the foot with your
> > Cisco box.
>
> Routing on a budget? Dude, you can buy a 7200 for $2 grand. Why bother
> with a linux box? Heh, at least use FreeBSD :)

Before the dot com implosion, they weren't nearly that inexpensive.  The
average corporate user will also need smartnet (what's that on a 7200, a K
or a few per year?) for support, warranty, and software updates.  Some
people just don't appreciate being nickled and dimed by cisco and forced
to either buy much more router than they need, or risk ending up with
another cisco boat anchor router when the platform they chose can no
longer do the job in the limited memory config supported.

I have a consulting customer who, against my strong recommendation, bought
a non-cisco router to multihome with.  It's PC based, runs Linux, and with
the exception of the gated BGP issue that bit everyone running gated a few
months ago, has worked just fine.  It's not as easy to work with in most
cases, but there are some definite advantages, and some things that Linux
actually makes easier.  They'd initially bought a 2621 when multihoming
was just a thought, and by the time it was a reality, 64mb on a 2621
couldn't handle full routes.  The C&W/PSI depeering (which did affect
this customer, as they were single homed to C&W at the time and did
regular business with networks single homed to PSI) was proof that without
full routes, you're not really multihomed.

-- 
--
 Jon Lewis *[EMAIL PROTECTED]*|  I route
 System Administrator|  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_




Re: RADB & RRs

2002-05-16 Thread jlewis


On Thu, 16 May 2002, Ralph Doncaster wrote:

>
> I've been registering my routes in ARIN's RR, only to find that nobody
> uses it. ;-(
> Do any of the RRs mirrored by the RADB offer free maintainer-IDs?

altdb.net...everything's free there.

-- 
--
 Jon Lewis *[EMAIL PROTECTED]*|  I route
 System Administrator|  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_




Re: IP renumbering timeframe

2002-05-06 Thread jlewis


On Mon, 6 May 2002, Stephen J. Wilcox wrote:

> I think they're on dangerous ground, whether or not their contract says
> the IPs should be returned if they not only stop routing them but then
> start contacting third parties that they have no relationship with and ask
> them to stop routing them with the end result being that your business
> cannot function then I'd say this looks more malicious than pure business
> and I'd suggest to them a courtroom might view it that way too.

This whole thing sounds fishy.  He never passed any traffic to cogent, but
he was using their IPs.  Why wasn't he using Peer1's IPs?  Cogent tried to
get them shut down on a sunday?  Is there a serious BOFH in Cogent's
network monitoring group?  I doubt the billing department would be open
sunday afternoon to order the disconnect, much less know to suggest
contacting Peer1 to ask them to stop routing the space.  It sounds like
there's an awful lot missing from the story.

This is why using provider IP space sucks...but you have to plan
accordingly.  If you're in dispute and plan to terminate service, start
renumbering.  I've been there and done that.  I've also been on the other
end and let a customer have several months to renumber, but that was a
special case and they left on relatively good terms.  A customer who left
without paying their bill would likely not be treated so well.

-- 
--
 Jon Lewis *[EMAIL PROTECTED]*|  I route
 System Administrator|  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_




Re: anybody else been spammed by "no-ip.com" yet?

2002-05-04 Thread jlewis


On Fri, 3 May 2002 [EMAIL PROTECTED] wrote:

> Do you have data on approximate amount of this extra mail bandwidth due to
> spam per user? Actually lets be more exact, can some of you with 10,000
> real user mail accounts reply how much traffic your mail server is using
> and if you have spam filter, how much (in percentage) of mail were filters.
> And how big were the filterd spam in comparison to all other regular mails?
> And if possible how much in amount of disk space was it in comparison to
> all other emails?

Since sendmail applies our dnsbl rules before accepting the message, I
can't say how much bandwidth the blocked spam would have used.  On a MX
that handles mail for several tens of thousands of actual user accounts,
it's not unusual for us to deliver ~400k messages and reject anywhere from
200k-500k messages.  A few weeks ago we had a several day period during
which we rejected > 1,000,000 messages/day.

The rejected numbers can be somewhat inflated though by the 'alphabet
spammers'.  I'm not sure what else to call them...but these are the people
who try to send mail to every conceivable address @yourdomain.  If you run
a large mail server, you've probably seen them hit you.  When they dump
their random address spam on an open relay, that relay gets blacklisted
pretty quickly, resulting in large numbers of dnsbl rejected messages that
would have eventually bounced as 'no such user' bounces, and likely double
bounced.

Worse, IMO, than the bandwidth issue (mail from/rcpt to/571 doesn't use
that much bandwidth), is the mail server load issue.  A couple of open
relays pounding on our mail servers trying to deliver a truckload of spam
someone dumped on them will drive up the load in no time.  I'm seriously
considering adapting some existing code to watch syslog data and use
kernel packet filtering to cut off connectivity for say 24h from IP's
after N dnsbl caused rejections in Y minutes.  This should reduce load
considerably.  While typing this I was just watching the log on one mail
server and noticed several rejections/sec from mail.ignacio.k12.co.us.
That system is an open relay (listed in several blacklists) and has been
trying to deliver mail to atlantic.net since last wednesday.  We've
rejected from them the following numbers of messages:

Wed: 82102
Thur: 286861
Fri: 215779
Sat (so far): 62128

-- 
--
 Jon Lewis *[EMAIL PROTECTED]*|  I route
 System Administrator|  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_




Re: UUNET instability?

2002-04-25 Thread jlewis


On Thu, 25 Apr 2002, Chris Pace wrote:

>
> It was really bad this morning. I had problems with Bellsouth, AT&T and
> Qwest's connection to UUNET.
> Does anyone know if there is a web site or newsgroup I can get alerts and
> updates about what is going on with UUNET ?

There's www.noc.uu.net, but unless the problem is long lasting or severe
enough that it can't be swept under the rug, they don't seem to admit to
anything on that page.

-- 
--
 Jon Lewis *[EMAIL PROTECTED]*|  I route
 System Administrator|  therefore you are
 Atlantic Net    |
_ http://www.lewis.org/~jlewis/pgp for PGP public key_





Re: UUNET instability?

2002-04-25 Thread jlewis


On Thu, 25 Apr 2002, Streiner, Justin wrote:

> Anyone else seeing routing instability through UUNET or have any more
> details?  I saw a significant drop in my inbound and outbound traffic to
> them around 10:00AM EDT.  UUNET has a prompt on their phone menus about

I saw the same thing on our UUNET connection.

Backbone: Normalhm

-- 
--
 Jon Lewis *[EMAIL PROTECTED]*|  I route
 System Administrator|  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_




Re: UUNET service

2002-04-12 Thread jlewis
er.net
> | -   || 164 |x   | UUNET
> Technologies, Inc. |
> | 43  | 50| 65.195.230.217  | 500.Serial2-11.GW4.BWI1.ALTER.NET
> | Baltimore, MD, USA  | -05:00 | 173 |x   | UUNET
> Technologies, Inc. |
> | 44  | 50| 65.195.230.218  | core62007-gw.customer.alter.net
> | -   || 158 |   -x   | UUNET
> Technologies, Inc. |
> | 45  | 50| 65.195.230.217  | 500.Serial2-11.GW4.BWI1.ALTER.NET
> | Baltimore, MD, USA  | -05:00 | 168 |x   | UUNET
> Technologies, Inc. |
> | 46  | 50| 65.195.230.218  | core62007-gw.customer.alter.net
> | -   || 166 |x   | UUNET
> Technologies, Inc. |
> | 47  | 50| 65.195.230.217  | 500.Serial2-11.GW4.BWI1.ALTER.NET
> | Baltimore, MD, USA  | -05:00 | 159 |x   | UUNET
> Technologies, Inc. |
> | 48  | 60| 65.195.230.218  | core62007-gw.customer.alter.net
> | -   || 140 |   x-   | UUNET
> Technologies, Inc. |
> | 49  | 60| 65.195.230.217  | 500.Serial2-11.GW4.BWI1.ALTER.NET
> | Baltimore, MD, USA  | -05:00 | 145 |   x-   | UUNET
> Technologies, Inc. |
> | 50  | 60| 65.195.230.218  | core62007-gw.customer.alter.net
> | -   || 170 |   -x   | UUNET
> Technologies, Inc. |
> | 51  | 70| 65.195.230.217  | 500.Serial2-11.GW4.BWI1.ALTER.NET
> | Baltimore, MD, USA  | -05:00 | 137 |   x-   | UUNET
> Technologies, Inc. |
> | 52  | 60| 65.195.230.218  | core62007-gw.customer.alter.net
> | -   || 133 |   x-   | UUNET
> Technologies, Inc. |
> | 53  | 60| 65.195.230.217  | 500.Serial2-11.GW4.BWI1.ALTER.NET
> | Baltimore, MD, USA  | -05:00 | 142 |   x-   | UUNET
> Technologies, Inc. |
> | 54  | 60| 65.195.230.218  | core62007-gw.customer.alter.net
> | -   || 147 |   x-   | UUNET
> Technologies, Inc. |
> | 55  | 60| 65.195.230.217  | 500.Serial2-11.GW4.BWI1.ALTER.NET
> | Baltimore, MD, USA  | -05:00 | 143 |   x-   | UUNET
> Technologies, Inc. |
> | 56  | 60| 65.195.230.218  | core62007-gw.customer.alter.net
> | -   || 156 |   -x   | UUNET
> Technologies, Inc. |
> | 57  | 60| 65.195.230.217  | 500.Serial2-11.GW4.BWI1.ALTER.NET
> | Baltimore, MD, USA  | -05:00 | 167 |   -x   | UUNET
> Technologies, Inc. |
> | 58  | 60| 65.195.230.218  | core62007-gw.customer.alter.net
> | -   || 167 |   -x   | UUNET
> Technologies, Inc. |
> | 59  | 60| 65.195.230.217  | 500.Serial2-11.GW4.BWI1.ALTER.NET
> | Baltimore, MD, USA  | -05:00 | 170 |   -x   | UUNET
> Technologies, Inc. |
> | 60  | 60| 65.195.230.218  | core62007-gw.customer.alter.net
> | -   || 174 |   -x   | UUNET
> Technologies, Inc. |
> | 61  | 70| 65.195.230.217  | 500.Serial2-11.GW4.BWI1.ALTER.NET
> | Baltimore, MD, USA  | -05:00 | 173 |   -x   | UUNET
> Technologies, Inc. |
> | 62  | 60| 65.195.230.218  | core62007-gw.customer.alter.net
> | -   || 178 |   -x   | UUNET
> Technologies, Inc. |
> | 63  | 60| 65.195.230.217  | 500.Serial2-11.GW4.BWI1.ALTER.NET
> | Baltimore, MD, USA  | -05:00 | 186 |   -x   | UUNET
> Technologies, Inc. |
> | 64  | 60| 65.195.230.218  | core62007-gw.customer.alter.net
> | -   || 183 |x-  | UUNET
> Technologies, Inc. |
> | ... |   | |
> | || ||
> |
> | ?   |   | 162.33.138.132  | online.mmsi-usa.com
> | ?Woodbridge, NJ 07095   || || RAM
> Communications Consultants, Inc. |
> 
> 
> -
> Roundtrip time to 65.195.230.218, average = 183ms, min = 152ms, max =
> 210ms -- 12-Apr-02 3:04:18 PM
>
> Bradley Corner
> Northeast Florida Multiple Listing Service, Inc.
> 7801 Deecreek Club Rd Ste 1
> Jacksonville FL 32217
> (904) 394-9494
>
>

-- 
--
 Jon Lewis *[EMAIL PROTECTED]*|  I route
 System Administrator|  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_




Re: solutions to the spam problem

2002-04-03 Thread jlewis


3. Private Address Space

   The Internet Assigned Numbers Authority (IANA) has reserved the
   following three blocks of the IP address space for private internets:

 10.0.0.0-   10.255.255.255  (10/8 prefix)
 172.16.0.0  -   172.31.255.255  (172.16/12 prefix)
 192.168.0.0 -   192.168.255.255 (192.168/16 prefix)

Someone has done an Apnic registration for rfc1918 private IP space.
What this has to do with solving spam problems is still a mystery to
me...unless someone is suggesting spammers (or perhaps all of Korea)
should be assigned non-routable IP space.

On Wed, 3 Apr 2002, Andy Dills wrote:

>
> On Wed, 3 Apr 2002, Sabri Berisha wrote:
>
> >
> > [sabri@bofh sabri]$ whois -h whois.apnic.net 172.21.3.168
> >
> > % Rights restricted by copyright. See
> > http://www.apnic.net/db/dbcopyright.html
> > % (whois6.apnic.net)
> >
> > inetnum: 172.21.3.168 - 172.21.3.199
> > netname: DSB-KR
> >
> > (I heared about this via IRC so credits for discovery go somewhere else :)
>
> Mind explaining exactly what your discovery is, for those of us without
> mind reading abilities?
>
> Andy
>
> 
> Andy Dills  301-682-9972
> Xecunet, LLCwww.xecu.net
> 
> Dialup * Webhosting * E-Commerce * High-Speed Access
>

-- 
--
 Jon Lewis *[EMAIL PROTECTED]*|  I route
 System Administrator|  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_




Re: Verio as an DS3 upstream provider - comments?

2002-03-23 Thread jlewis


On Sat, 23 Mar 2002, Jason Slagle wrote:

>
> AFAIK, Verio is shrinking back to a small footprint.

As far as I'm concerned, Verio is the new AGIS...host to many
"bulletproof" commercial spammers.  Complaints to abuse@ and a host of
other verio addresses are apparently ignored since I keep receiving spams
from the same verio customers.  The worst one is:

Custom Offers (NETBLK-C052-128-121-16-224) C052-128-121-16-224
   128.121.16.224 - 128.121.16.255
Verio Data Centers - Sterling/Dulles (NETBLK-VRIO-128-121-000) VRIO-128-121-000
  128.121.0.0 - 128.121.31.255
Verio Inc. (NETBLK-VRIO-128-121) VRIO-128-121128.121.0.0 - 128.121.255.255

> ...
> I would avoid them if at all possible.

I would agree and would not recommend anyone buy anything from verio.
If you have circuit contracts up for renewal, ask your salesdroid about
verio's policy on spam, and take your business elsewhere.

-- 
--
 Jon Lewis *[EMAIL PROTECTED]*|  I route
 System Administrator|  therefore you are
 Atlantic Net|
_____ http://www.lewis.org/~jlewis/pgp for PGP public key_




Re: Yahoo Hacked?

2002-03-19 Thread jlewis


I saw signifigant DNS server load issues on all our DNS servers this
evening beginning around that same time.  It looked as if either yahoo.com
had an accident with their DNS or someone did some cache poisoning.  We
were passing out SERVFAIL to anyone looking up pretty much
anything.yahoo.com...and there were lots of *.yahoo.com queries going on.

No...I don't think it has anything to do with vanity NS records as
below...but I was considering posting about the DNS issue anyway.

On Tue, 19 Mar 2002, David McGaugh wrote:

> Maybe it has nothing to do with it then, but No one saw a significant
> decrease in traffic with Yahoo between 17:00 PST and 17:15 PST?
>
> David McGaugh wrote:
> >
> > whois -h whois.internic.net yahoo.com
> >
> > Whois Server Version 1.3
> >
> > Domain names in the .com, .net, and .org domains can now be registered
> > with many different competing registrars. Go to http://www.internic.net
> > for detailed information.
> >
> > YAHOO.COM.REALLY.NEEDS.TO.GET.A.CLUE.AT.JIMPHILLIPS.ORG
> > YAHOO.COM.IS.TRYING.TO.STEAL.YAHOO.VU.HOW.ACIDULOUS.COM
> > YAHOO.COM.IS.NOT.CANADIAN.ORG
> > YAHOO.COM.BR
> > YAHOO.COM.AND.SAFESEARCH.COM.AINT.NOTHING.COMPARED.TO.SHEEPSTER.COM
> > YAHOO.COM.AINT.NOTHIN.COMPARED.TO.SAFESEARCH.COM
> > YAHOO.COM
> >
> > To single out one record, look it up with "xxx", where xxx is one of the
> > of the records displayed above. If the records are the same, look them
> > up
> > with "=xxx" to receive a full display for each record.
> >
> > >>> Last update of whois database: Tue, 19 Mar 2002 17:10:53 EST <<<
> >
> > The Registry database contains ONLY .COM, .NET, .ORG, .EDU domains and
> > Registrars.
>
>

-- 
--
 Jon Lewis *[EMAIL PROTECTED]*|  I route
 System Administrator|  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_




<    1   2