RE: Redundant Array of Inexpensive ISP's?

2009-03-12 Thread Crooks, Sam
 

In answer to a question below about experience with similar products...
Cisco IOS has the dynamic routing injection feature as part of recent
IOS versions. 

The feature is now called Performance Routing (PfR) formerly known as
OER (Optimized Edge Routing) and as of 12.4(24)T, it can optimize
routing protocols other than BGP or static routes (called PIRO  Protocol
Independent Route Optimization), including IS-IS, OSPF and EIGRP.  RIP
folks should learn about routing protocols :-D



PfR does not do compressions/tokenization of the data, so it has no
Caching/compression/WAN Acceleration features, BUT it does do dynamic
path re-routing based on your policy or observed metrics like latency,
packet loss, jitter etc and can also do it based on observed Netflow
data and automatic instatiation of IP SLA active probes to see what
happens for a RTP data stream marked with dscp 46  or video stream
marked with dscp 34 and so on.   As of recent IOS versions (12,4(9)T + I
think), it can control both inbound and outbound directions, and can do
things like send your traffic to ISP X up to bandwidth Bx and then shift
traffic over to ISP Y up to bandwidth By  to do dynamic load sharing of
traffic to IP transit commit levels Not a bad feature for free.
Larger scale deployments should probably use a dedicated controller box
making the re-routing decisions, but any WAN egress point to an Internet
or private WAN provider is your "border" device used by the "master" to
get information, setup probes and learn netflow data to make decisions.


I've used it for testing purposes on enterprise WAN deployment and it
works pretty well.  We are planning on deploying on a production DMVPN
solution when the MGRE bug below is resolved.  My main beef is a bug
related to use of PfR on mGRE tunnel interfaces and the memory-hog
nature of the feature... It will detect your brown-out issues like
increased packet loss for traffic through provider X that cause
customers to call you about broken applications and will re-route the
traffic so you may never even know there was an issue!!  The solution is
particularly good for enterprises with only a few WAN or Internet exits
from a location and for dynamically load sharing traffic to paid-for
commit levels to reduce recurring cost and get the most out of existing
connectivity without paying burst charges.  We've done testing on use
for our internet border routing in the "advice" mode, where is just says
what changes it would maek, without actually making the changes.
Production deployment soon as part of the ever popular cost-reduction
efforts currently in vogue in enterprises right now given the current
economy.


http://www.cisco.com/go/pfr


There's some similar solutions out there.. RouteScience was mentioned,
but I didn't see anyone mention InterNAP FCP, which is part of the basis
for InterNAP's PNAP business model... They also sell it to others
enterprises and ISPs. 



-Original Message-
From: Ken A [mailto:k...@pacific.net] 
Sent: Thursday, March 12, 2009 9:18 AM
To: nanog@nanog.org
Subject: Re: Redundant Array of Inexpensive ISP's?

Tim Utschig wrote:
> [Please reply off-list.  I'll summarize back to the list if there is 
> more than a little interest in me doing so.]
> 

Please do. There are many rural ISPs and WISPs that might benefit from a
decent look at these products, or any open source clones that might be
available to test & refine these tricks.

Pricing for even a fractional DS3 in the rural US is still very high. 
Being able to shift bandwidth from a colo facility in a large city to a
remote site served by 3 or 4 consumer grade broadband links could be a
helpful development, if the bottom line works out.

Thanks,
Ken

> I'm curious if anyone has experience with products from Talari 
> Networks, or anything similar, and would like to share.  Did they live

> up to your expectations?  Caveats?
> 

--
Ken Anderson
Pacific Internet - http://www.pacific.net




Re: Dynamic IP log retention = 0?

2009-03-12 Thread Martin Hannigan
On Thu, Mar 12, 2009 at 8:52 PM, Joe Greco  wrote:

> >   Well most port scanning is from compromised boxes.  Once a
> >   box is compromised it can be used for *any* sort of attack.
> >   If you really care about security you take reports of ports
> >   scans seriously.
>
> Yeahbut, the real problem is that port scanning is typically used as
> part of a process to infect _other_ boxes.  If you allow this sort of
> illness to spread, the patient (that is, the Internet) doesn't get
> better.
>
>


Port scanning is the Internet equivelant of the common cold. They're a dime
a dozen.

I recommend taking some Vitamin B and D. Block, and Drop.


Best,

Martin



-- 
Martin Hannigan   mar...@theicelandguy.com
p: +16178216079


Re: Dynamic IP log retention = 0?

2009-03-12 Thread JC Dill

N. Yaakov Ziskind wrote:


Not to disagree with any of your points, but the OP (which you quoted!)
was talking about Covad, while you're bashing Comcast.

  

Oops, my bad.  Well, and Covad's bad too.  :-)

jc




Re: Dynamic IP log retention = 0?

2009-03-12 Thread Joe Greco
>   Well most port scanning is from compromised boxes.  Once a
>   box is compromised it can be used for *any* sort of attack.
>   If you really care about security you take reports of ports
>   scans seriously.

Yeahbut, the real problem is that port scanning is typically used as
part of a process to infect _other_ boxes.  If you allow this sort of
illness to spread, the patient (that is, the Internet) doesn't get 
better.

... JG
-- 
Joe Greco - sol.net Network Services - Milwaukee, WI - http://www.sol.net
"We call it the 'one bite at the apple' rule. Give me one chance [and] then I
won't contact you again." - Direct Marketing Ass'n position on e-mail spam(CNN)
With 24 million small businesses in the US alone, that's way too many apples.



Re: Dynamic IP log retention = 0?

2009-03-12 Thread Mark Andrews

In message , "Ross" 
writ
es:
> Whether Covad chooses to enforce their AUP against port scanning is a
> business decision up to them. Again, why worry about things out of your
> control, especially when we are talking about port scanning. I would think
> people have more pressing issues, guess not.
> 
> -- 
> Ross
> ross [at] dillio.net

Well most port scanning is from compromised boxes.  Once a
box is compromised it can be used for *any* sort of attack.
If you really care about security you take reports of ports
scans seriously.

Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: mark_andr...@isc.org



Re: Dynamic IP log retention = 0?

2009-03-12 Thread Rob Evans
> Not to disagree with any of your points, but the OP (which you quoted!)
> was talking about Covad, while you're bashing Comcast.

Any sufficiently advanced NANOG conversation is indistinguishable from
Comcast-bashing.

Rob

(Not agreeing, just observing.)



Expert Witness needed for Terry Childs case

2009-03-12 Thread Jon Orb
All:

An attorney needs an Expert Witness for the Terry Childs case.
I don't know much about the case and I'm not endorsing it in either
way, but justice requires a vigorous defense -- and stating facts
and acting on behalf of the legal process is always a good thing to
participate in.

This is a paid job in a high-profile case.

The attorney is looking for someone in/near the SF Bay Area who knows
routing, WAN, switches, routers -- a CCIE type who would be willing
to act as an expert witness in this case. CCIE is not required, but
would be very helpful. Also should be expert in security and protecting
these types of networks and gear.

Here's a summary from the attorney:
I am one of the attorneys working on the defense for Terry Childs.  His
is a very high profile case in San Francisco.  He is charged with denial
of service attacks on San Francisco's fiber network for city services.
He is also charged with keeping a backdoor to hack the network, by
virtue of the fact that he had at least one modem hooked up to the
network for his monitoring software.  He was in fact the administrator
who set up the network and simply failed to turn over the passwords to
the network machines to his boss, and now he is being held on
$5,000,000.00 bail.  That is a very simplified account of what happened.

Here is an O'Reilly article about the case:

http://news.oreilly.com/2008/07/coverage-of-terry-childs.html

They initially wanted a CCIE, because Mr. Childs has that
certification.  I am not sure any particular certification is required.

So we need a defense expert to testify about his security practices.
Mr. Childs locked out console ports, took passwords out of NVRAM, set up
access lists, and did a host of stuff to make sure that no one but him
had access to these machines.  It is a paid job in this super high
profile case.  I remember that you, Dave, know all about security.  I
also thought Bruno might know someone who can help, because I remember
that you, Bruno, know a lot about a lot.

Can either of you recommend someone?  Or would you like to be involved?

The trial date is fast approaching.  I look forward to hearing back from
you guys.

===

If you can assist, let me know and I'll get you in touch with the attorney.


Re: Dynamic IP log retention = 0?

2009-03-12 Thread Joe Greco
> Whether Covad chooses to enforce their AUP against port scanning is a
> business decision up to them. 

Yes, it's all a business decision.  That kind of antisocial thinking is
the sort of thing that has allowed all manner of bad guys to remain
attached to the Internet.

> Again, why worry about things out of your
> control, especially when we are talking about port scanning. 

Yes, why not talk about rapists and drug dealers instead.  They're much
worse.  It's just that this forum ... isn't for that.

> I would think people have more pressing issues, guess not.

While I am all for increasing overall security on the Internet, the
reality is that there will often be devices that are attached that
are found to be vulnerable in new and intriguing ways.  Port scanning
is a primary method for finding these vulnerabilities.  To the extent
that an ISP might proactively port scan its own userbase, that's a good
use and probably a good idea (has tradeoffs), but bad guys finding
holes in random devices so that they can launch multiGbps attacks 
against random destinations is a bad thing.

If your idea of "operations" is to make your router work and collect
your paycheck for another day, then this discussion probably does not
make any sense to you and you probably don't understand the importance
of the issue.

If your idea of "operations" is to ensure the reliable operation and
uphold the performance standards of an IP network, then it should not
be beyond comprehension that allowing miscreants access to the network
is one of many things that can adversely affect operations.  If you
accept that the presence of miscreants on the network is a negative,
it shouldn't be hard to see that complaining about consistent and
persistent port scans from what is probably an identifiable host is
one way to make an impact.

... JG
-- 
Joe Greco - sol.net Network Services - Milwaukee, WI - http://www.sol.net
"We call it the 'one bite at the apple' rule. Give me one chance [and] then I
won't contact you again." - Direct Marketing Ass'n position on e-mail spam(CNN)
With 24 million small businesses in the US alone, that's way too many apples.



Re: Dynamic IP log retention = 0?

2009-03-12 Thread Ross
Whether Covad chooses to enforce their AUP against port scanning is a
business decision up to them. Again, why worry about things out of your
control, especially when we are talking about port scanning. I would think
people have more pressing issues, guess not.

-- 
Ross
ross [at] dillio.net

>
> In message <20090312120816.b...@egps.egps.com>, "N. Yaakov Ziskind"
> writes:
>> JC Dill wrote (on Thu, Mar 12, 2009 at 09:02:25AM -0700):
>> > Ross wrote:
>> >
>> > There seems to be a big misconception that he asked them to "hand
>> over"
>> > the info.  As I read the OP, he asked Covad to do something about it
>> > and Covad said "we can't do anything about it because we don't have
>> > logs".  Here's a quote from the OP:
>
> The real problem is that Covad claim (second hand) that they can't
> identify the perpetrator(s).
>
>   I've been nudging an operator at Covad about a handful of
>   hosts from his DHCP pool that have been attacking -
>   relentlessly port scanning - our assets.  I've been informed
>   by this individual that there's "no way" to determine which
>   customer had that address at the times I list in my logs -
>   even though these logs are sent within 48 hours of the
>   incidents.
>
> One shouldn't need to have to get the indentities of the perpetrators
> to get AUP enforced.  Port scanning is against 99.9% of AUP's.
>
> Mark
> --
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742 INTERNET: mark_andr...@isc.org
>
>





Re: FYI RE: microsoft please contact me off list

2009-03-12 Thread Charles Wyble
What were the traffic characteristics that lead you to believe you were 
under a DDOS attack?


Thomas P. Galla wrote:

Here is what I got back  OBTW thanx

Thomas


=

Sent: Thursday, March 12, 2009 4:22 PM
To: Thomas P. Galla
Subject: FW: microsoft please contact me off list
Importance: High

Thomas,

I work in the research group managing the network range that you are reporting. 
 Your network could be randomly included 
Honeymonkey(http://en.wikipedia.org/wiki/HoneyMonkey) or another research 
project(http://research.microsoft.com/en-us/um/redmond/projects/strider).  
Could you give me more details on what you are seeing or the IP range on your 
side that is being hit?

Thx
Steve



Thomas P Galla
t...@bluegrass.net
BluegrassNet
Voice (502) 589.INET [4638]
Fax 502-315-0581
321 East Breckinridge St
Louisville KY 40203


-Original Message-
From: Thomas P. Galla [mailto:t...@bluegrass.net]
Sent: Thursday, March 12, 2009 3:35 PM
To: nanog@nanog.org
Subject: RE: microsoft please contact me off list

Sorry I am getting dos attacked from below and it would be nice if microsoft 
working abuse ph# or noc# or a name ?



Thomas P Galla
t...@bluegrass.net
BluegrassNet
Voice (502) 589.INET [4638]
Fax 502-315-0581
321 East Breckinridge St
Louisville KY 40203


-Original Message-
From: Thomas P. Galla [mailto:t...@bluegrass.net]
Sent: Thursday, March 12, 2009 3:24 PM
To: nanog@nanog.org
Subject: microsoft please contact me off list

Can a person in charge contact me off list




mail:~ $ whois -h whois.arin.net 131.107.65.41

OrgName:Microsoft Corp
OrgID:  MSFT
Address:One Microsoft Way
City:   Redmond
StateProv:  WA
PostalCode: 98052
Country:US

NetRange:   131.107.0.0 - 131.107.255.255
CIDR:   131.107.0.0/16
NetName:MICROSOFT
NetHandle:  NET-131-107-0-0-1
Parent: NET-131-0-0-0-0
NetType:Direct Assignment
NameServer: NS1.MSFT.NET
NameServer: NS5.MSFT.NET
NameServer: NS2.MSFT.NET
NameServer: NS3.MSFT.NET
NameServer: NS4.MSFT.NET
Comment:
RegDate:1988-11-11
Updated:2004-12-09

RTechHandle: ZM39-ARIN
RTechName:   Microsoft
RTechPhone:  +1-425-882-8080
RTechEmail:  n...@microsoft.com

OrgAbuseHandle: ABUSE231-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-425-882-8080
OrgAbuseEmail:  ab...@msn.com

OrgAbuseHandle: HOTMA-ARIN
OrgAbuseName:   Hotmail Abuse
OrgAbusePhone:  +1-425-882-8080
OrgAbuseEmail:  ab...@hotmail.com

OrgAbuseHandle: MSNAB-ARIN
OrgAbuseName:   MSN ABUSE
OrgAbusePhone:  +1-425-882-8080
OrgAbuseEmail:  ab...@msn.com

OrgNOCHandle: ZM23-ARIN
OrgNOCName:   Microsoft Corporation
OrgNOCPhone:  +1-425-882-8080
OrgNOCEmail:  n...@microsoft.com

OrgTechHandle: MSFTP-ARIN
OrgTechName:   MSFT-POC
OrgTechPhone:  +1-425-882-8080
OrgTechEmail:  ipr...@microsoft.com

# ARIN WHOIS database, last updated 2009-03-11 19:10
# Enter ? for additional hints on searching ARIN's WHOIS database.
mail:~ $ whois -h whois.arin.net 131.107.65.41





Thomas P Galla
t...@bluegrass.net
BluegrassNet
Voice (502) 589.INET [4638]
Fax 502-315-0581
321 East Breckinridge St
Louisville KY 40203




No virus found in this incoming message.
Checked by AVG - www.avg.com
Version: 8.0.237 / Virus Database: 270.11.5/1979 - Release Date: 03/11/09 
20:42:00


No virus found in this incoming message.
Checked by AVG - www.avg.com
Version: 8.0.237 / Virus Database: 270.11.5/1979 - Release Date: 03/11/09 
20:42:00



--
Charles N Wyble char...@thewybles.com
(818)280-7059 http://charlesnw.blogspot.com
CTO SocalWiFI.net



FYI RE: microsoft please contact me off list

2009-03-12 Thread Thomas P. Galla

Here is what I got back  OBTW thanx

Thomas


=

Sent: Thursday, March 12, 2009 4:22 PM
To: Thomas P. Galla
Subject: FW: microsoft please contact me off list
Importance: High

Thomas,

I work in the research group managing the network range that you are reporting. 
 Your network could be randomly included 
Honeymonkey(http://en.wikipedia.org/wiki/HoneyMonkey) or another research 
project(http://research.microsoft.com/en-us/um/redmond/projects/strider).  
Could you give me more details on what you are seeing or the IP range on your 
side that is being hit?

Thx
Steve



Thomas P Galla
t...@bluegrass.net
BluegrassNet
Voice (502) 589.INET [4638]
Fax 502-315-0581
321 East Breckinridge St
Louisville KY 40203


-Original Message-
From: Thomas P. Galla [mailto:t...@bluegrass.net]
Sent: Thursday, March 12, 2009 3:35 PM
To: nanog@nanog.org
Subject: RE: microsoft please contact me off list

Sorry I am getting dos attacked from below and it would be nice if microsoft 
working abuse ph# or noc# or a name ?



Thomas P Galla
t...@bluegrass.net
BluegrassNet
Voice (502) 589.INET [4638]
Fax 502-315-0581
321 East Breckinridge St
Louisville KY 40203


-Original Message-
From: Thomas P. Galla [mailto:t...@bluegrass.net]
Sent: Thursday, March 12, 2009 3:24 PM
To: nanog@nanog.org
Subject: microsoft please contact me off list

Can a person in charge contact me off list




mail:~ $ whois -h whois.arin.net 131.107.65.41

OrgName:Microsoft Corp
OrgID:  MSFT
Address:One Microsoft Way
City:   Redmond
StateProv:  WA
PostalCode: 98052
Country:US

NetRange:   131.107.0.0 - 131.107.255.255
CIDR:   131.107.0.0/16
NetName:MICROSOFT
NetHandle:  NET-131-107-0-0-1
Parent: NET-131-0-0-0-0
NetType:Direct Assignment
NameServer: NS1.MSFT.NET
NameServer: NS5.MSFT.NET
NameServer: NS2.MSFT.NET
NameServer: NS3.MSFT.NET
NameServer: NS4.MSFT.NET
Comment:
RegDate:1988-11-11
Updated:2004-12-09

RTechHandle: ZM39-ARIN
RTechName:   Microsoft
RTechPhone:  +1-425-882-8080
RTechEmail:  n...@microsoft.com

OrgAbuseHandle: ABUSE231-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-425-882-8080
OrgAbuseEmail:  ab...@msn.com

OrgAbuseHandle: HOTMA-ARIN
OrgAbuseName:   Hotmail Abuse
OrgAbusePhone:  +1-425-882-8080
OrgAbuseEmail:  ab...@hotmail.com

OrgAbuseHandle: MSNAB-ARIN
OrgAbuseName:   MSN ABUSE
OrgAbusePhone:  +1-425-882-8080
OrgAbuseEmail:  ab...@msn.com

OrgNOCHandle: ZM23-ARIN
OrgNOCName:   Microsoft Corporation
OrgNOCPhone:  +1-425-882-8080
OrgNOCEmail:  n...@microsoft.com

OrgTechHandle: MSFTP-ARIN
OrgTechName:   MSFT-POC
OrgTechPhone:  +1-425-882-8080
OrgTechEmail:  ipr...@microsoft.com

# ARIN WHOIS database, last updated 2009-03-11 19:10
# Enter ? for additional hints on searching ARIN's WHOIS database.
mail:~ $ whois -h whois.arin.net 131.107.65.41





Thomas P Galla
t...@bluegrass.net
BluegrassNet
Voice (502) 589.INET [4638]
Fax 502-315-0581
321 East Breckinridge St
Louisville KY 40203




No virus found in this incoming message.
Checked by AVG - www.avg.com
Version: 8.0.237 / Virus Database: 270.11.5/1979 - Release Date: 03/11/09 
20:42:00


No virus found in this incoming message.
Checked by AVG - www.avg.com
Version: 8.0.237 / Virus Database: 270.11.5/1979 - Release Date: 03/11/09 
20:42:00



Re: Dynamic IP log retention = 0?

2009-03-12 Thread Mark Andrews

In message <20090312120816.b...@egps.egps.com>, "N. Yaakov Ziskind" writes:
> JC Dill wrote (on Thu, Mar 12, 2009 at 09:02:25AM -0700):
> > Ross wrote:
> > 
> > There seems to be a big misconception that he asked them to "hand over" 
> > the info.  As I read the OP, he asked Comcast to do something about it 
> > and Comcast said "we can't do anything about it because we don't have 
> > logs".  Here's a quote from the OP:

The real problem is that Covad claim (second hand) that they can't
identify the perpetrator(s).

I've been nudging an operator at Covad about a handful of
hosts from his DHCP pool that have been attacking -
relentlessly port scanning - our assets.  I've been informed
by this individual that there's "no way" to determine which
customer had that address at the times I list in my logs -
even though these logs are sent within 48 hours of the
incidents.

One shouldn't need to have to get the indentities of the perpetrators
to get AUP enforced.  Port scanning is against 99.9% of AUP's.

Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: mark_andr...@isc.org



Re: microsoft please contact me off list

2009-03-12 Thread Jeff Shultz
In our case we didn't bother with where it was coming from - our router 
guy figured out where it was going to - and had that IP shut down a 
couple levels away from us.


Thomas P. Galla wrote:

Sorry I am getting dos attacked from below and it would be nice if microsoft 
working abuse ph# or noc# or a name ?



Thomas P Galla
t...@bluegrass.net
BluegrassNet
Voice (502) 589.INET [4638]
Fax 502-315-0581
321 East Breckinridge St
Louisville KY 40203


-Original Message-
From: Thomas P. Galla [mailto:t...@bluegrass.net]
Sent: Thursday, March 12, 2009 3:24 PM
To: nanog@nanog.org
Subject: microsoft please contact me off list

Can a person in charge contact me off list




mail:~ $ whois -h whois.arin.net 131.107.65.41

OrgName:Microsoft Corp
OrgID:  MSFT
Address:One Microsoft Way
City:   Redmond
StateProv:  WA
PostalCode: 98052
Country:US

NetRange:   131.107.0.0 - 131.107.255.255
CIDR:   131.107.0.0/16
NetName:MICROSOFT
NetHandle:  NET-131-107-0-0-1
Parent: NET-131-0-0-0-0
NetType:Direct Assignment
NameServer: NS1.MSFT.NET
NameServer: NS5.MSFT.NET
NameServer: NS2.MSFT.NET
NameServer: NS3.MSFT.NET
NameServer: NS4.MSFT.NET
Comment:
RegDate:1988-11-11
Updated:2004-12-09

RTechHandle: ZM39-ARIN
RTechName:   Microsoft
RTechPhone:  +1-425-882-8080
RTechEmail:  n...@microsoft.com

OrgAbuseHandle: ABUSE231-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-425-882-8080
OrgAbuseEmail:  ab...@msn.com

OrgAbuseHandle: HOTMA-ARIN
OrgAbuseName:   Hotmail Abuse
OrgAbusePhone:  +1-425-882-8080
OrgAbuseEmail:  ab...@hotmail.com

OrgAbuseHandle: MSNAB-ARIN
OrgAbuseName:   MSN ABUSE
OrgAbusePhone:  +1-425-882-8080
OrgAbuseEmail:  ab...@msn.com

OrgNOCHandle: ZM23-ARIN
OrgNOCName:   Microsoft Corporation
OrgNOCPhone:  +1-425-882-8080
OrgNOCEmail:  n...@microsoft.com

OrgTechHandle: MSFTP-ARIN
OrgTechName:   MSFT-POC
OrgTechPhone:  +1-425-882-8080
OrgTechEmail:  ipr...@microsoft.com

# ARIN WHOIS database, last updated 2009-03-11 19:10
# Enter ? for additional hints on searching ARIN's WHOIS database.
mail:~ $ whois -h whois.arin.net 131.107.65.41





Thomas P Galla
t...@bluegrass.net
BluegrassNet
Voice (502) 589.INET [4638]
Fax 502-315-0581
321 East Breckinridge St
Louisville KY 40203




No virus found in this incoming message.
Checked by AVG - www.avg.com
Version: 8.0.237 / Virus Database: 270.11.5/1979 - Release Date: 03/11/09 
20:42:00




--
Jeff Shultz



Re: microsoft please contact me off list

2009-03-12 Thread Valdis . Kletnieks
On Thu, 12 Mar 2009 12:40:06 PDT, Charles Wyble said:
> You are getting dossed from a Microsoft network range? Really? Perhaps 
> they got bit by a worm targeting windows systems? :)

You mean like this?

http://www.theregister.co.uk/2001/07/20/code_red_bug_hits_microsoft/

(To be fair, screw-ups happen at *all* vendors eventually - the RedHat/Fedora
crew had a small "whoops!" with the system that digitally signs their RPM
packages a while ago.  Just proves that security is harder to get right than
a lot of people think...)




pgpGWyhwKXmWq.pgp
Description: PGP signature


Re: microsoft please contact me off list

2009-03-12 Thread Charles Wyble

Yes I agree. I forgot to do the *raises an incredulous eyebrow* bit. :)

By the way try calling that number and reaching an operator then 
asking for the NOC.


chris.ra...@nokia.com wrote:

More likely spoofed sources.

Good luck.
 





Re: Dynamic IP log retention = 0?

2009-03-12 Thread William Allen Simpson

J. Oquendo wrote:

On Thu, 12 Mar 2009, Glen Turner wrote:


William Allen Simpson wrote:

A telecommunications carrier releasing a customer's details without their
permission, to a non-investigatory third party, without a court order.
Hmmm. It's certainly illegal here in Australia. And last I checked wasn't
the US firm Hewlett Packard in trouble for hiring people to do just that?



Hey, bad quotation!  I'm not from Australia.  That's not my writing.  Nor
did I ever advocate releasing a customer's details -- to anybody. :-(

I also disagree with your point about responsibilities of ISPs.  Yes, it's
true that Microsoft externalized its costs upon its customers.

But only the ISPs are in a position to detect the abuse, and that's part of
the business.  Some of us take network security seriously.




Re: microsoft please contact me off list

2009-03-12 Thread Joey Boyer
He's gonna need it!

On Thu, Mar 12, 2009 at 12:54 PM,   wrote:
> More likely spoofed sources.
>
> Good luck.
>
>
>>-Original Message-
>>From: ext Charles Wyble [mailto:char...@thewybles.com]
>>Sent: Thursday, March 12, 2009 12:40 PM
>>To: Thomas P. Galla
>>Cc: nanog@nanog.org
>>Subject: Re: microsoft please contact me off list
>>
>>You are getting dossed from a Microsoft network range? Really?
>>Perhaps they got bit by a worm targeting windows systems? :)
>>
>>
>>
>>Thomas P. Galla wrote:
>>> Sorry I am getting dos attacked from below and it would be
>>nice if microsoft working abuse ph# or noc# or a name ?
>>>
>>>
>>>
>>> Thomas P Galla
>>> t...@bluegrass.net
>>> BluegrassNet
>>> Voice (502) 589.INET [4638]
>>> Fax 502-315-0581
>>> 321 East Breckinridge St
>>> Louisville KY 40203
>>>
>>>
>>> -Original Message-
>>> From: Thomas P. Galla [mailto:t...@bluegrass.net]
>>> Sent: Thursday, March 12, 2009 3:24 PM
>>> To: nanog@nanog.org
>>> Subject: microsoft please contact me off list
>>>
>>> Can a person in charge contact me off list
>>>
>>>
>>>
>>>
>>> mail:~ $ whois -h whois.arin.net 131.107.65.41
>>>
>>> OrgName:    Microsoft Corp
>>> OrgID:      MSFT
>>> Address:    One Microsoft Way
>>> City:       Redmond
>>> StateProv:  WA
>>> PostalCode: 98052
>>> Country:    US
>>>
>>> NetRange:   131.107.0.0 - 131.107.255.255
>>> CIDR:       131.107.0.0/16
>>> NetName:    MICROSOFT
>>> NetHandle:  NET-131-107-0-0-1
>>> Parent:     NET-131-0-0-0-0
>>> NetType:    Direct Assignment
>>> NameServer: NS1.MSFT.NET
>>> NameServer: NS5.MSFT.NET
>>> NameServer: NS2.MSFT.NET
>>> NameServer: NS3.MSFT.NET
>>> NameServer: NS4.MSFT.NET
>>> Comment:
>>> RegDate:    1988-11-11
>>> Updated:    2004-12-09
>>>
>>> RTechHandle: ZM39-ARIN
>>> RTechName:   Microsoft
>>> RTechPhone:  +1-425-882-8080
>>> RTechEmail:  ...@microsoft.com
>>>
>>> OrgAbuseHandle: ABUSE231-ARIN
>>> OrgAbuseName:   Abuse
>>> OrgAbusePhone:  +1-425-882-8080
>>> OrgAbuseEmail:  ab...@msn.com
>>>
>>> OrgAbuseHandle: HOTMA-ARIN
>>> OrgAbuseName:   Hotmail Abuse
>>> OrgAbusePhone:  +1-425-882-8080
>>> OrgAbuseEmail:  ab...@hotmail.com
>>>
>>> OrgAbuseHandle: MSNAB-ARIN
>>> OrgAbuseName:   MSN ABUSE
>>> OrgAbusePhone:  +1-425-882-8080
>>> OrgAbuseEmail:  ab...@msn.com
>>>
>>> OrgNOCHandle: ZM23-ARIN
>>> OrgNOCName:   Microsoft Corporation
>>> OrgNOCPhone:  +1-425-882-8080
>>> OrgNOCEmail:  ...@microsoft.com
>>>
>>> OrgTechHandle: MSFTP-ARIN
>>> OrgTechName:   MSFT-POC
>>> OrgTechPhone:  +1-425-882-8080
>>> OrgTechEmail:  ipr...@microsoft.com
>>>
>>> # ARIN WHOIS database, last updated 2009-03-11 19:10
>>> # Enter ? for additional hints on searching ARIN's WHOIS database.
>>> mail:~ $ whois -h whois.arin.net 131.107.65.41
>>>
>>>
>>>
>>>
>>>
>>> Thomas P Galla
>>> t...@bluegrass.net
>>> BluegrassNet
>>> Voice (502) 589.INET [4638]
>>> Fax 502-315-0581
>>> 321 East Breckinridge St
>>> Louisville KY 40203
>>>
>>>
>>>
>>>
>>> No virus found in this incoming message.
>>> Checked by AVG - www.avg.com
>>> Version: 8.0.237 / Virus Database: 270.11.5/1979 - Release
>>Date: 03/11/09 20:42:00
>>>
>>
>>--
>>Charles N Wyble char...@thewybles.com
>>(818)280-7059 http://charlesnw.blogspot.com
>>CTO SocalWiFI.net
>>
>>
>



RE: microsoft please contact me off list

2009-03-12 Thread chris.ranch
More likely spoofed sources.

Good luck.
 

>-Original Message-
>From: ext Charles Wyble [mailto:char...@thewybles.com] 
>Sent: Thursday, March 12, 2009 12:40 PM
>To: Thomas P. Galla
>Cc: nanog@nanog.org
>Subject: Re: microsoft please contact me off list
>
>You are getting dossed from a Microsoft network range? Really? 
>Perhaps they got bit by a worm targeting windows systems? :)
>
>
>
>Thomas P. Galla wrote:
>> Sorry I am getting dos attacked from below and it would be 
>nice if microsoft working abuse ph# or noc# or a name ?
>> 
>> 
>> 
>> Thomas P Galla
>> t...@bluegrass.net
>> BluegrassNet
>> Voice (502) 589.INET [4638]
>> Fax 502-315-0581
>> 321 East Breckinridge St
>> Louisville KY 40203
>> 
>> 
>> -Original Message-
>> From: Thomas P. Galla [mailto:t...@bluegrass.net]
>> Sent: Thursday, March 12, 2009 3:24 PM
>> To: nanog@nanog.org
>> Subject: microsoft please contact me off list
>> 
>> Can a person in charge contact me off list
>> 
>> 
>> 
>> 
>> mail:~ $ whois -h whois.arin.net 131.107.65.41
>> 
>> OrgName:Microsoft Corp
>> OrgID:  MSFT
>> Address:One Microsoft Way
>> City:   Redmond
>> StateProv:  WA
>> PostalCode: 98052
>> Country:US
>> 
>> NetRange:   131.107.0.0 - 131.107.255.255
>> CIDR:   131.107.0.0/16
>> NetName:MICROSOFT
>> NetHandle:  NET-131-107-0-0-1
>> Parent: NET-131-0-0-0-0
>> NetType:Direct Assignment
>> NameServer: NS1.MSFT.NET
>> NameServer: NS5.MSFT.NET
>> NameServer: NS2.MSFT.NET
>> NameServer: NS3.MSFT.NET
>> NameServer: NS4.MSFT.NET
>> Comment:
>> RegDate:1988-11-11
>> Updated:2004-12-09
>> 
>> RTechHandle: ZM39-ARIN
>> RTechName:   Microsoft
>> RTechPhone:  +1-425-882-8080
>> RTechEmail:  n...@microsoft.com
>> 
>> OrgAbuseHandle: ABUSE231-ARIN
>> OrgAbuseName:   Abuse
>> OrgAbusePhone:  +1-425-882-8080
>> OrgAbuseEmail:  ab...@msn.com
>> 
>> OrgAbuseHandle: HOTMA-ARIN
>> OrgAbuseName:   Hotmail Abuse
>> OrgAbusePhone:  +1-425-882-8080
>> OrgAbuseEmail:  ab...@hotmail.com
>> 
>> OrgAbuseHandle: MSNAB-ARIN
>> OrgAbuseName:   MSN ABUSE
>> OrgAbusePhone:  +1-425-882-8080
>> OrgAbuseEmail:  ab...@msn.com
>> 
>> OrgNOCHandle: ZM23-ARIN
>> OrgNOCName:   Microsoft Corporation
>> OrgNOCPhone:  +1-425-882-8080
>> OrgNOCEmail:  n...@microsoft.com
>> 
>> OrgTechHandle: MSFTP-ARIN
>> OrgTechName:   MSFT-POC
>> OrgTechPhone:  +1-425-882-8080
>> OrgTechEmail:  ipr...@microsoft.com
>> 
>> # ARIN WHOIS database, last updated 2009-03-11 19:10
>> # Enter ? for additional hints on searching ARIN's WHOIS database.
>> mail:~ $ whois -h whois.arin.net 131.107.65.41
>> 
>> 
>> 
>> 
>> 
>> Thomas P Galla
>> t...@bluegrass.net
>> BluegrassNet
>> Voice (502) 589.INET [4638]
>> Fax 502-315-0581
>> 321 East Breckinridge St
>> Louisville KY 40203
>> 
>> 
>> 
>> 
>> No virus found in this incoming message.
>> Checked by AVG - www.avg.com
>> Version: 8.0.237 / Virus Database: 270.11.5/1979 - Release 
>Date: 03/11/09 20:42:00
>> 
>
>-- 
>Charles N Wyble char...@thewybles.com
>(818)280-7059 http://charlesnw.blogspot.com
>CTO SocalWiFI.net
>
>


Re: microsoft please contact me off list

2009-03-12 Thread Charles Wyble
You are getting dossed from a Microsoft network range? Really? Perhaps 
they got bit by a worm targeting windows systems? :)




Thomas P. Galla wrote:

Sorry I am getting dos attacked from below and it would be nice if microsoft 
working abuse ph# or noc# or a name ?



Thomas P Galla
t...@bluegrass.net
BluegrassNet
Voice (502) 589.INET [4638]
Fax 502-315-0581
321 East Breckinridge St
Louisville KY 40203


-Original Message-
From: Thomas P. Galla [mailto:t...@bluegrass.net]
Sent: Thursday, March 12, 2009 3:24 PM
To: nanog@nanog.org
Subject: microsoft please contact me off list

Can a person in charge contact me off list




mail:~ $ whois -h whois.arin.net 131.107.65.41

OrgName:Microsoft Corp
OrgID:  MSFT
Address:One Microsoft Way
City:   Redmond
StateProv:  WA
PostalCode: 98052
Country:US

NetRange:   131.107.0.0 - 131.107.255.255
CIDR:   131.107.0.0/16
NetName:MICROSOFT
NetHandle:  NET-131-107-0-0-1
Parent: NET-131-0-0-0-0
NetType:Direct Assignment
NameServer: NS1.MSFT.NET
NameServer: NS5.MSFT.NET
NameServer: NS2.MSFT.NET
NameServer: NS3.MSFT.NET
NameServer: NS4.MSFT.NET
Comment:
RegDate:1988-11-11
Updated:2004-12-09

RTechHandle: ZM39-ARIN
RTechName:   Microsoft
RTechPhone:  +1-425-882-8080
RTechEmail:  n...@microsoft.com

OrgAbuseHandle: ABUSE231-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-425-882-8080
OrgAbuseEmail:  ab...@msn.com

OrgAbuseHandle: HOTMA-ARIN
OrgAbuseName:   Hotmail Abuse
OrgAbusePhone:  +1-425-882-8080
OrgAbuseEmail:  ab...@hotmail.com

OrgAbuseHandle: MSNAB-ARIN
OrgAbuseName:   MSN ABUSE
OrgAbusePhone:  +1-425-882-8080
OrgAbuseEmail:  ab...@msn.com

OrgNOCHandle: ZM23-ARIN
OrgNOCName:   Microsoft Corporation
OrgNOCPhone:  +1-425-882-8080
OrgNOCEmail:  n...@microsoft.com

OrgTechHandle: MSFTP-ARIN
OrgTechName:   MSFT-POC
OrgTechPhone:  +1-425-882-8080
OrgTechEmail:  ipr...@microsoft.com

# ARIN WHOIS database, last updated 2009-03-11 19:10
# Enter ? for additional hints on searching ARIN's WHOIS database.
mail:~ $ whois -h whois.arin.net 131.107.65.41





Thomas P Galla
t...@bluegrass.net
BluegrassNet
Voice (502) 589.INET [4638]
Fax 502-315-0581
321 East Breckinridge St
Louisville KY 40203




No virus found in this incoming message.
Checked by AVG - www.avg.com
Version: 8.0.237 / Virus Database: 270.11.5/1979 - Release Date: 03/11/09 
20:42:00



--
Charles N Wyble char...@thewybles.com
(818)280-7059 http://charlesnw.blogspot.com
CTO SocalWiFI.net



RE: microsoft please contact me off list

2009-03-12 Thread Thomas P. Galla
Sorry I am getting dos attacked from below and it would be nice if microsoft 
working abuse ph# or noc# or a name ?



Thomas P Galla
t...@bluegrass.net
BluegrassNet
Voice (502) 589.INET [4638]
Fax 502-315-0581
321 East Breckinridge St
Louisville KY 40203


-Original Message-
From: Thomas P. Galla [mailto:t...@bluegrass.net]
Sent: Thursday, March 12, 2009 3:24 PM
To: nanog@nanog.org
Subject: microsoft please contact me off list

Can a person in charge contact me off list




mail:~ $ whois -h whois.arin.net 131.107.65.41

OrgName:Microsoft Corp
OrgID:  MSFT
Address:One Microsoft Way
City:   Redmond
StateProv:  WA
PostalCode: 98052
Country:US

NetRange:   131.107.0.0 - 131.107.255.255
CIDR:   131.107.0.0/16
NetName:MICROSOFT
NetHandle:  NET-131-107-0-0-1
Parent: NET-131-0-0-0-0
NetType:Direct Assignment
NameServer: NS1.MSFT.NET
NameServer: NS5.MSFT.NET
NameServer: NS2.MSFT.NET
NameServer: NS3.MSFT.NET
NameServer: NS4.MSFT.NET
Comment:
RegDate:1988-11-11
Updated:2004-12-09

RTechHandle: ZM39-ARIN
RTechName:   Microsoft
RTechPhone:  +1-425-882-8080
RTechEmail:  n...@microsoft.com

OrgAbuseHandle: ABUSE231-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-425-882-8080
OrgAbuseEmail:  ab...@msn.com

OrgAbuseHandle: HOTMA-ARIN
OrgAbuseName:   Hotmail Abuse
OrgAbusePhone:  +1-425-882-8080
OrgAbuseEmail:  ab...@hotmail.com

OrgAbuseHandle: MSNAB-ARIN
OrgAbuseName:   MSN ABUSE
OrgAbusePhone:  +1-425-882-8080
OrgAbuseEmail:  ab...@msn.com

OrgNOCHandle: ZM23-ARIN
OrgNOCName:   Microsoft Corporation
OrgNOCPhone:  +1-425-882-8080
OrgNOCEmail:  n...@microsoft.com

OrgTechHandle: MSFTP-ARIN
OrgTechName:   MSFT-POC
OrgTechPhone:  +1-425-882-8080
OrgTechEmail:  ipr...@microsoft.com

# ARIN WHOIS database, last updated 2009-03-11 19:10
# Enter ? for additional hints on searching ARIN's WHOIS database.
mail:~ $ whois -h whois.arin.net 131.107.65.41





Thomas P Galla
t...@bluegrass.net
BluegrassNet
Voice (502) 589.INET [4638]
Fax 502-315-0581
321 East Breckinridge St
Louisville KY 40203




No virus found in this incoming message.
Checked by AVG - www.avg.com
Version: 8.0.237 / Virus Database: 270.11.5/1979 - Release Date: 03/11/09 
20:42:00



microsoft please contact me off list

2009-03-12 Thread Thomas P. Galla
Can a person in charge contact me off list




mail:~ $ whois -h whois.arin.net 131.107.65.41

OrgName:Microsoft Corp
OrgID:  MSFT
Address:One Microsoft Way
City:   Redmond
StateProv:  WA
PostalCode: 98052
Country:US

NetRange:   131.107.0.0 - 131.107.255.255
CIDR:   131.107.0.0/16
NetName:MICROSOFT
NetHandle:  NET-131-107-0-0-1
Parent: NET-131-0-0-0-0
NetType:Direct Assignment
NameServer: NS1.MSFT.NET
NameServer: NS5.MSFT.NET
NameServer: NS2.MSFT.NET
NameServer: NS3.MSFT.NET
NameServer: NS4.MSFT.NET
Comment:
RegDate:1988-11-11
Updated:2004-12-09

RTechHandle: ZM39-ARIN
RTechName:   Microsoft
RTechPhone:  +1-425-882-8080
RTechEmail:  n...@microsoft.com

OrgAbuseHandle: ABUSE231-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-425-882-8080
OrgAbuseEmail:  ab...@msn.com

OrgAbuseHandle: HOTMA-ARIN
OrgAbuseName:   Hotmail Abuse
OrgAbusePhone:  +1-425-882-8080
OrgAbuseEmail:  ab...@hotmail.com

OrgAbuseHandle: MSNAB-ARIN
OrgAbuseName:   MSN ABUSE
OrgAbusePhone:  +1-425-882-8080
OrgAbuseEmail:  ab...@msn.com

OrgNOCHandle: ZM23-ARIN
OrgNOCName:   Microsoft Corporation
OrgNOCPhone:  +1-425-882-8080
OrgNOCEmail:  n...@microsoft.com

OrgTechHandle: MSFTP-ARIN
OrgTechName:   MSFT-POC
OrgTechPhone:  +1-425-882-8080
OrgTechEmail:  ipr...@microsoft.com

# ARIN WHOIS database, last updated 2009-03-11 19:10
# Enter ? for additional hints on searching ARIN's WHOIS database.
mail:~ $ whois -h whois.arin.net 131.107.65.41





Thomas P Galla
t...@bluegrass.net
BluegrassNet
Voice (502) 589.INET [4638]
Fax 502-315-0581
321 East Breckinridge St
Louisville KY 40203





Four blocks of AS Numbers allocated

2009-03-12 Thread Leo Vegoda
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi,

The IANA AS Numbers registry has been updated to reflect the allocation of
four blocks of AS Numbers recently.

49152-50175Assigned by RIPE NCC whois.ripe.net 2009-03-06
50176-51199Assigned by RIPE NCC whois.ripe.net 2009-03-06
51200-52223Assigned by RIPE NCC whois.ripe.net 2009-03-06
52224-53247Assigned by LACNIC   whois.lacnic.net   2009-03-11

The registry can be found at:

http://www.iana.org/assignments/as-numbers/as-numbers.xml

Regards,

Leo Vegoda
Number Resources Manager, IANA

-BEGIN PGP SIGNATURE-
Version: 9.9.1.287

wj8DBQFJuUXxvBLymJnAzRwRAkgiAJ4gPAIF9egizyMbGGB/2MAciOCsdQCfXQfX
N4gRb5lyNjDDcKZ4bhf5AqY=
=LKc/
-END PGP SIGNATURE-




Re: Dynamic IP log retention = 0?

2009-03-12 Thread J. Oquendo
On Thu, 12 Mar 2009, Glen Turner wrote:

> William Allen Simpson wrote:
> 
> A telecommunications carrier releasing a customer's details without their
> permission, to a non-investigatory third party, without a court order.
> Hmmm. It's certainly illegal here in Australia. And last I checked wasn't
> the US firm Hewlett Packard in trouble for hiring people to do just that?




=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
SGFA, SGFE, C|EH, CNDA, CHFI, OSCP

"Enough research will tend to support your
conclusions." - Arthur Bloch

"A conclusion is the place where you got
tired of thinking" - Arthur Bloch

227C 5D35 7DCB 0893 95AA  4771 1DCE 1FD1 5CCD 6B5E
http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x5CCD6B5E




Re: Dynamic IP log retention = 0?

2009-03-12 Thread Mike Lewinski

valdis.kletni...@vt.edu wrote:


You *do* realize that "has a public address" does not actually mean that
the machine is reachable from random addresses, right?  There *are* these
nice utilities called iptables and ipf - even Windows and Macs can be configured
to say "bugger off" to unwanted traffic.  And you can put a firewall appliance
inline without using NAT as well.


The other big benefit to using real public IPs is abuse related. There's 
a scenario we encounter on a semi-regular basis where we forward a 
report of an apparently infected host to a customer who responds back: 
"How can I tell which one of our hosts is infected? We've got 200 
workstations inside our NAT and this abuse report only has our single 
public address."


So I recommend a packet sniffer inside their LAN or accounting on their 
firewall. But sometimes the source is a salesperson's laptop, and 
they've gone on a business trip. So no new reports come in and everyone 
decides it must have been a false alarm. Now imagine that salesperson 
only stops back in the office once a month, at random undocumented 
intervals to make backups. How do we ever track him down? The abuse 
report cycle just doesn't turn around fast enough - often we don't even 
get reports for a day or two.


So I find myself advising customers in this situation to give every user 
a public IP. Even if they still do 1:1 NAT, the problem is mostly 
resolved provided they faithfully document MAC addresses and keep DHCP 
logs for a suitable length of time.


Mike



Re: Dynamic IP log retention = 0?

2009-03-12 Thread Valdis . Kletnieks
On Wed, 11 Mar 2009 07:53:01 -0800, Marcus Reid said:

> A quick scan of the reverse mapping for your address space in DNS reveals
> that you have basically your entire network on public addresses.  No wonder
> you're worried about portscans when the printer down the hall and the
> receptionists machine are sitting on public addresses.  I think you are
> trying to secure your network from the wrong end here.

You *do* realize that "has a public address" does not actually mean that
the machine is reachable from random addresses, right?  There *are* these
nice utilities called iptables and ipf - even Windows and Macs can be configured
to say "bugger off" to unwanted traffic.  And you can put a firewall appliance
inline without using NAT as well.


pgpXjezqNw16b.pgp
Description: PGP signature


Re: Dynamic IP log retention = 0?

2009-03-12 Thread N. Yaakov Ziskind
JC Dill wrote (on Thu, Mar 12, 2009 at 09:02:25AM -0700):
> Ross wrote:
> 
> There seems to be a big misconception that he asked them to "hand over" 
> the info.  As I read the OP, he asked Comcast to do something about it 
> and Comcast said "we can't do anything about it because we don't have 
> logs".  Here's a quote from the OP:
> 
> >I've been nudging an operator at Covad about a handful of hosts from 
> >his DHCP pool that have been attacking - relentlessly port scanning - 
> >our assets. I've been informed by this individual that there's "no 
> >way" to determine which customer had that address at the times I list 
> >in my logs - even though these logs are sent within 48 hours of the 
> >incidents. 
> 
> IMHO, that's a bunch of BS from whoever he's talking with at Comcast.  
> In the normal course of business they would have logs of which customer 
> had that IP just 48 hours earlier.  They *can* do something about their 
> customer.  And they *should* do something about their customer who is 
> causing problems on another network, the same as if that customer was 
> spewing spam, or actually attacking (DDoS etc.) another network.
> 
> So the question circles back around to how does the OP get Comcast to 
> step up, internally identify and take care of their problem customer?  
> What path should he take to get connected with someone who has more clue 
> about this type of problem so that they can address it in a timely fashion?
> 
> Has it come to needing to get a lawyer to write a strongly worded letter 
> just to get this type of thing done today?
> 
> jc

[Disclaimer - I am a lawyer, and I write strongly worded letters to pay my 
bills.]

Not to disagree with any of your points, but the OP (which you quoted!)
was talking about Covad, while you're bashing Comcast.

-- 
_
Nachman Yaakov Ziskind, FSPA, LLM   aw...@ziskind.us
Attorney and Counselor-at-Law   http://ziskind.us
Economic Group Pension Services http://egps.com
Actuaries and Employee Benefit Consultants



Re: Dynamic IP log retention = 0?

2009-03-12 Thread JC Dill

Ross wrote:

I'll try to answer you in a more common sense approach as some have tried
to do. First of all no network operator has to hand over their logs or
user information over to you just because you want to know.


There seems to be a big misconception that he asked them to "hand over" 
the info.  As I read the OP, he asked Comcast to do something about it 
and Comcast said "we can't do anything about it because we don't have 
logs".  Here's a quote from the OP:


I've been nudging an operator at Covad about a handful of hosts from 
his DHCP pool that have been attacking - relentlessly port scanning - 
our assets. I've been informed by this individual that there's "no 
way" to determine which customer had that address at the times I list 
in my logs - even though these logs are sent within 48 hours of the 
incidents. 



IMHO, that's a bunch of BS from whoever he's talking with at Comcast.  
In the normal course of business they would have logs of which customer 
had that IP just 48 hours earlier.  They *can* do something about their 
customer.  And they *should* do something about their customer who is 
causing problems on another network, the same as if that customer was 
spewing spam, or actually attacking (DDoS etc.) another network.


So the question circles back around to how does the OP get Comcast to 
step up, internally identify and take care of their problem customer?  
What path should he take to get connected with someone who has more clue 
about this type of problem so that they can address it in a timely fashion?


Has it come to needing to get a lawyer to write a strongly worded letter 
just to get this type of thing done today?


jc




Re: Redundant Array of Inexpensive ISP's?

2009-03-12 Thread Ken A

Tim Utschig wrote:

[Please reply off-list.  I'll summarize back to the list if there
is more than a little interest in me doing so.]



Please do. There are many rural ISPs and WISPs that might benefit from a 
decent look at these products, or any open source clones that might be 
available to test & refine these tricks.


Pricing for even a fractional DS3 in the rural US is still very high. 
Being able to shift bandwidth from a colo facility in a large city to a 
remote site served by 3 or 4 consumer grade broadband links could be a 
helpful development, if the bottom line works out.


Thanks,
Ken


I'm curious if anyone has experience with products from Talari
Networks, or anything similar, and would like to share.  Did they
live up to your expectations?  Caveats?



--
Ken Anderson
Pacific Internet - http://www.pacific.net



Re: Redundant Array of Inexpensive ISP's?

2009-03-12 Thread Max Tulyev
Hello Tim,

a lot of our customers need a very stable Internet access got their
portable address space and their AS number from us (we are a LIR) and
connected to 2 or even more upstreams.

Sure, some of broadband ISPs didn't provide BGP for their clients, but
there are companies providing BGP over L2TP or GRE.

So all the solution costs ~$1000 one-time fee (PI/AS, BGP router like
Cisco or Quagga box, a bit consulting).

Good advice is to diverse upstreams by the media, i.e.
CaTV+DSL+Fiber+Radio, so if fiber to the house is cut - radio still working.

It is possible to integrate that to a complete service - i.e. install a
box that connects to 2-3 ISPs and "just works", but we haven't requests
to to that. Please, contact me off-list if somebody interesting in it.

Tim Utschig wrote:
> [Please reply off-list.  I'll summarize back to the list if there
> is more than a little interest in me doing so.]
> 
> I'm curious if anyone has experience with products from Talari
> Networks, or anything similar, and would like to share.  Did they
> live up to your expectations?  Caveats?
> 


-- 
WBR,
Max Tulyev (MT6561-RIPE, 2:463/2...@fido)



Re: Dynamic IP log retention = 0?

2009-03-12 Thread Brett Watson

On Mar 12, 2009, at 12:25 AM, Ross wrote:

How did a simple thread about network scanning get so derailedwe  
have

people talking about the legal implications of port scanning, hiring
lawyers to go after ISPs, talking to the fbi, the benefits/downfalls  
of

NAT as a security policy, etc. Wow just wow.


it's nanog, you expect something different? :)




Re: Dynamic IP log retention = 0?

2009-03-12 Thread Ross
How did a simple thread about network scanning get so derailedwe have
people talking about the legal implications of port scanning, hiring
lawyers to go after ISPs, talking to the fbi, the benefits/downfalls of
NAT as a security policy, etc. Wow just wow.

I'll try to answer you in a more common sense approach as some have tried
to do. First of all no network operator has to hand over their logs or
user information over to you just because you want to know. You can ask
their abuse department to intervene but that is all up to that department.
They may have told you they don't have them just because they didn't want
you pestering them anymore or they may really not have them, who knows.
Don't try to judge them but try to fix this very minute problem in a way
you can control.

The ways you can control this are simple.

1) Block all of covad (not very smart)
2) Block all of covad except for essential ports (25,80,443 or whatever
other common ports they may need)
3) Setup a perimeter protection that blocks hosts that are scanning you
and removes them after a determined amount of time

This trying to shun people in public because they aren't following your
guide to network administration probably isn't going to work very well for
you. If 65000 covad addresses were ddosing you then I would agree that you
have a legitimate gripe but focus on what you can control and not what you
believe others should be doing.

-- 
Ross
ross [at] dillio.net

>   I've been nudging an operator at Covad about a handful of hosts from his
> DHCP pool that have been attacking - relentlessly port scanning - our
> assets.
> I've been informed by this individual that there's "no way" to determine
> which
> customer had that address at the times I list in my logs - even though
> these
> logs are sent within 48 hours of the incidents.
>   The operator advised that I block the specific IP's that are attacking
> us at my perimeter. When I mentioned the fact that blocking individual
> addresses
> will only be as effective as the length of lease for that DHCP pool I get
> the
> email equivalent of a shrug.
>   "Well, maybe you want to ban our entire /15 at your perimeter..."
>   I'm reluctant to ban over 65,000 hosts as my staff have colleagues
> all over the continental US with whom they communicate regularly.
>   I realize these are tough times and that large ISP's may trim abuse team
> budgets before other things, but to have NO MECHANISM to audit who has
> what
> address at any given time kinda blows my mind.
>   Does one have to get to the level of a subpoena before abuse teams pull
> out the tools they need to make such a determination? Or am I naive enough
> to
> think port scans are as important to them as they are to me on the
> receiving
> end?
>
> --
> 
> Brett Charbeneau, GSEC Gold, GCIH Gold
> Network Administrator
> Williamsburg Regional Library
> 7770 Croaker Road
> Williamsburg, VA 23188-7064
> (757)259-4044  www.wrl.org
> (757)259-4079 (fax)br...@wrl.org
> 
>
>
>