RE: Survey: Peering Staffing Levels

2002-06-13 Thread Deepak Jain



Even with large providers, if you peer with them, you generally know the
peering coordinator by name.

In some cases, you know their assistant by email. :)

Deepak Jain
AiNET

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
Andy Dills
Sent: Wednesday, June 12, 2002 4:47 PM
To: Dwight Ernest
Cc: [EMAIL PROTECTED]
Subject: Re: Survey: Peering Staffing Levels



On Wed, 12 Jun 2002, Dwight Ernest wrote:

 I'm interested in getting some idea of the level of staffing provided by
 NSPs and ISPs in their peering departments. In fact, I've been asked by
 my management to provide as much info about such levels as possible,
 without a need to disclose the identity of any responding company.

Forgive me if I'm just used to small companies, but why would you really
need more than one full time person (with an assistant possibly) in your
peering department?

Sure, the job requires a very specific skill set (something along the
lines of an engineer with an MBA), but the day-to-day interactions and
changes regarding peering would seem to be minimal. In fact, my impression
seems to be that you don't really need anybody on staff to not return
emails to peering@, which is seemingly how most providers deal with it. :)

Note: I have absolutely no experience or data to base my assumptions on,
so don't slap me too hard.

Andy


Andy Dills  301-682-9972
Xecunet, LLCwww.xecu.net

Dialup * Webhosting * E-Commerce * High-Speed Access






Re: Error in assignments....?

2002-06-13 Thread Stephen Stuart


NB: this is neither an endorsement for or against generating policy
from databases. 

 Could somebody that has done this comment on how complicated this is to
 set up?  What steps were involved?

Taking this to mean filter on policy learned from databases,
following is a Tcl fragment wrapped around RAToolkit's peval that I
used to use to query the RADB and build intermediate data from which I
would then generate either Cisco prefix lists or Juniper policy
statements.

The Tcl proc psort, used to sort a list of prefixes in CIDR
notation, is left as an exercise to the reader.

proc peval {macro tag allow_incomplete description} {
set res [list $tag\tdescription\t[list $description]]
set incomplete 0
if {[catch {set tmp [exec peval $macro]} why]} {
set tmp [lindex [split $why \n] 0]
set incomplete 1
}
set plist 
if {[regexp {\(\{([^\}]+)\}\)} $tmp junk tmp2]} {
set tmp3 [split $tmp2 ,]
foreach U [lsort -command psort $tmp3] {
lappend res $tag\tpermit\t[string trim $U]
}
}
if {[info exists res]} {
if {$incomplete  !$allow_incomplete} {
return # [join $res \n# ]
} else {
return [join $res \n]
}
}
}

The Tcl proc named peval takes four arguments: the macro to be
evaluated, a tag that I would use later to name the final result,
whether an incomplete list of prefixes is permitted, and a
description.

That third bit, whether an incomplete list of prefixes is permitted,
turns out to be an important bit. Some bits of policy refer to other
bits of policy, and when bits referenced to not exist peval (the
RAToolkit peval, called by Tcl exec) writes them to stderr and causes
Tcl to raise an exception. 

An example (I used to run AS33, and the policy for AS33 doesn't appear
to have been changed since I last updated it so I'll take the liberty
of picking on it; yes, I know DEC was bought by Compaq and Compaq
bought by HP):

% source xpeval.tcl
% peval as33 33 1 Digital Equipment Corporation prefixes
33  description {Digital Equipment Corporation prefixes}
33  permit  16.0.0.0/8
33  permit  128.45.0.0/16
33  permit  130.180.0.0/16
33  permit  198.55.32.0/21
33  permit  198.55.40.0/23
33  permit  199.33.32.0/24
33  permit  199.33.32.0/19
33  permit  199.80.128.0/17
33  permit  204.123.0.0/16

(Goodness, that's a lot of address space, isn't it?)

RAToolkit's peval uses rpsl-p.merit.edu as its source of data, and,
amusingly, returns data for the macro AS33, even though the RADB
seems to have no AS33 aut-num object. Go figure.

Anyways, there was more glue to (a) build vendor-specific
configuration language to turn that into a syntactically correct
filter for routers (the kind of glue that has to be rewritten every
time a new vendor invents a new configuration language), with care
taken not to replace a previously-defined filter with no filter should
an error be introduced into the RADB, (b) and update the router
configs nightly with the new policy.

When I ran into the problem of a list of prefixes for one peer being
generated that caused the resulting (compressed) configuration to
exceed the size of flash memory on my routers, I stopped the cron job
and switched all the peers over to maximum-prefix-style limits with
a standard bogon exclusion filter.

It took a couple days to put it together and test it (although I
didn't think to test the list too long case), and was in production
for about a year and a half. The vendors' implementation of maximum
prefix limits was not available when I started it, and was available
when the list too long case cropped up.



RE: GigEth regenerators

2002-06-13 Thread Daniska Tomas


a brief summary of responses up to now:

- there are several vendors making some kind of sx-to-zx gbe converters (they call it 
gbe extenders), which gives an equivalent of a device with a zx gbic. these vendors 
include jdsu, luxn, extreme etc.

- two companies were found making gbe optical regenerators - imcnetworks and transmode

- other solution is to try with edfa



mikael: which exact gbic did you use?

i was comparing cisco-reselled gbics and their cwdm gbics seem to be more than 10dB 
better on power budget... anybody tried this in real life?


thanks again

--
 
Tomas Daniska
systems engineer
Tronet Computer Networks
Plynarenska 5, 829 75 Bratislava, Slovakia
tel: +421 2 58224111, fax: +421 2 58224199
 
A transistor protected by a fast-acting fuse will protect the fuse by blowing first.



 -Original Message-
 From: Mikael Abrahamsson [mailto:[EMAIL PROTECTED]] 
 Sent: 12. júna 2002 17:48
 To: [EMAIL PROTECTED]
 Subject: Re: GigEth regenerators
 
 
 
 On Wed, 12 Jun 2002, Daniska Tomas wrote:
 
  but for gigeth in this case - we need to connect two sites 
 about 200km
  apart over dark fiber
 
 Check out the 7020 from Transmode 
 http://www.transmode.se/products/sing_dual.htm
 
 Btw, my personal best so far is 150km over dark fiber using a 
 extra long 
 haul GBIC, 32dB loss over the fiber and it worked perfectly. 
 Only tested 
 it for 10 minutes, but there were no CRC errors during that time.
 
 +4dB output from the GGBIC, now we have to worry to not look into the 
 laser :)
 
 -- 
 Mikael Abrahamssonemail: [EMAIL PROTECTED]
 
 



RE: What's wrong with provisioning tools?

2002-06-13 Thread Daniska Tomas


bob,

i was more interested in something emulating a vt100 that one could eventually plug to 
a console port and chat with the box...
from someone's post sooner in this thread it seemed that someone is using it out 
there...
i like the idea of talking with the box while let's say driving a car... 

e.g. vocollect does something close to this but it's more an in-building solution than 
an over-the-phone stuff

http://www.vocollect.com/sitehtml/products/talkman01.php


maybe it would be worth making some mediation to pstn and a proxy app which could ssh 
the boxes :)


--
 
Tomas Daniska
systems engineer
Tronet Computer Networks
Plynarenska 5, 829 75 Bratislava, Slovakia
tel: +421 2 58224111, fax: +421 2 58224199
 
A transistor protected by a fast-acting fuse will protect the fuse by blowing first.



 -Original Message-
 From: Bob Bradlee [mailto:[EMAIL PROTECTED]] 
 Sent: 13. júna 2002 16:29
 To: Daniska Tomas
 Subject: RE: What's wrong with provisioning tools?
 
 
 I have a client HTTP://www.CORRS.ORG using several 
 speech-synthesis terminals,
 they even have a brail printer on the network.
 I donate my eyes to them from time to time, but they get 
 along very well on their own.
 
 Bob
 
 
 --Original Message Text---
 From: Daniska Tomas
 Date: Thu, 13 Jun 2002 15:15:23 +0200
 
 Message by the way - those speech-synthesis terminals were a 
 just joke or is anyone really using them? :))
  



Re: What's wrong with provisioning tools?

2002-06-13 Thread Streiner, Justin


On Wed, 12 Jun 2002, Stephen Griffin wrote:

 In the referenced message, David Daley said:
 snip
  4) There isn't anything to track non sanctioned changes to the network
  (i.e.: hacker induced re-configurations)

 I would be really surprised if anything other than mom-and-pop shops
 didn't have _at least_ this.

 rtrmon or rancid can do great config archiving and provide difference
 output.

I didn't find anything that really suited my needs at the time (late
2000/early 2001), so I ended up writing my own archiver.  From time to
time I've thought about adding it to the COSI-NMS project on Sourceforge,
but never gotten around to it.  I've also other similar tools outside of
Sourceforce, such as Pancho (http://pancho.lunarmedia.net/).

I wrote the code behind mine to be fairly modular, so that adding a module
to back up a config from a new device is pretty easy.  It currently backs
up these devices using either SNMP or Expect scripts for devices that
require it:

Cisco IOS 12.0
Cisco IOS =12.0
Cisco CatOS
Cisco 5000 VPN concentrators (the Compatible Systems ones, not Altiga)
Cisco LocalDirectors
Lucent TAOS (Max TNTs)
Alteon WebOS (ACEdirectors)
Redback AOS
Nortel BayRS (Bay Networks nee Wellfleet) -config is binary
other odds and ends as they come up, like Netopia routers, etc.

I haven't written anything to back up Junipers yet because I don't have
any to test against.  Aside from the Nortel routers, I support versioning
on everything else.

Keep in mind this is only one piece of the puzzle - backing up what's
already out there.  I intentionally left out the functionality to allow a
config to be uploaded to one of the devices above for reasons already
specified in this thread - it's just too dangerous.  You can melt down a
whole network really quickly if you're not careful.

jms




Re:Survey: Peering Staffing Levels

2002-06-13 Thread Dean S Moran


Dwight,

Contact Peter Jansen, ([EMAIL PROTECTED]). He is *clearly* The Man when
it comes to peering, and I'm certain that he'd be more than glad to answer
all of your questions.




--
Original Message
From: Dwight Ernest[EMAIL PROTECTED]
Subject: Survey: Peering Staffing Levels
Date: Wed, 12 Jun 2002 15:11:13 -0400


Please forgive the non-operational content.

I'm interested in getting some idea of the level of staffing provided by 
NSPs and ISPs in their peering departments. In fact, I've been asked by 
my management to provide as much info about such levels as possible, 
without a need to disclose the identity of any responding company.

If you have time, and wish to participate, I'd sure appreciate it. I 
will provide a summary of the responses to respondents. No identifying 
information need be provided. Get a disposable email account at Hotmail 
or Yahoo if you'd like to be really anonymous. Any question may be 
skipped if you wish. I appreciate your assistance!

DO NOT RESPOND TO THE LIST!

1. Do your peering staff members do peering negotiations and planning 
only, or do they also do peering-related hands-on router engineering?
 ___ planning and negotiation only
 ___ planning, negotiation, and hands-on router stuff
 ___ something other than these two choices:
 __

2. What is the size of your peering staff?
 ___ full-time staff members
 ___ part-time staff members

3. Do you feel this staffing level is appropriate?
 ___ too high
 ___ just right
 ___ too low

4. What is the ballpark aggregate exchange volume in megabits/second at 
peak, for your AS, or for all of the ASses for which you are responsible?
 ___ mb/s @ peak

5. What is the primary location of the majority of your peering 
department's staff members?
 ___ USA
 ___ North America other than USA
 ___ Europe
 ___ Central or Western Asia
 ___ Eastern or Southeastern Asia
 ___ Australia/NZ
 ___ South America
 ___ Africa

6. Approximately how many private or public peers does your network 
exchange traffic with?
 ___ private peers
 ___ public peers

7. What percentage volume of your network's total exchange volume is 
exchange via peering (as opposed to being exchanged via transit)?
 ___% is exchanged via peering

Again, thank you very much for your participation.

Cheers,
--Dwight Ernest



_
Free email with personality! Over 200 domains!
http://www.MyOwnEmail.com




LEAP Security Vulnerabilities??

2002-06-13 Thread Hyska, Jason [JJCUS]
Title: LEAP Security Vulnerabilities??






I am well aware of the many security vulnerabilities that exist on wireless networks as well as the inadequacies of WEP. I was curious if anyone has had any experiences with Cisco's LEAP authentication protocol? I have scoured the net for reviews or documents examining any potential vulnerabilities, but have not been able to find any. Any and all help or information would be appreciated.


Thanks in advance,
Jason Hyska
Worldwide Information Security
Johnson  Johnson
[EMAIL PROTECTED]






Re: What's wrong with provisioning tools?

2002-06-13 Thread Jake Khuon


### On Wed, 12 Jun 2002 18:37:07 -0400 (EDT), jeffrey arnold
### [EMAIL PROTECTED] casually decided to expound upon [EMAIL PROTECTED]
### the following thoughts about Re: What's wrong with provisioning
### tools?:

ja On Wed, 12 Jun 2002, Stephen Griffin wrote:
ja 
ja :: I would be really surprised if anything other than mom-and-pop shops
ja :: didn't have _at least_ this.
ja ::
ja :: rtrmon or rancid can do great config archiving and provide difference
ja :: output.
ja 
ja I don't think the issue is detecting change as much as it is associating
ja change to specific goals/tickets, etc.. If an ACL changes on a router,
ja rancid will pick it up, but right now there is no automated way to tell
ja whether that was as a result of a customer request or a security breach.

I've had quite a bit of experience with config management tools and have
written some myself many years ago as did probably others due to the at the
time lack of such things.  However, many vendors are providing thrid-party
solutions.  The one I've seen that seems most suited to an ISP environment
is GoldWire although to be honest, I have not really looked in-depth into
such products for almost a year now so there might be others.


--
/*===[ Jake Khuon [EMAIL PROTECTED] ]==+
 | Packet Plumber, Network Engineers /| / [~ [~ |) | | --- |
 | for Effective Bandwidth Utilisation  / |/  [_ [_ |) |_| N E T W O R K S |
 +=*/



Level 3

2002-06-13 Thread Pawlukiewicz Jane

Hi,

Is there a network status page for level 3? Their website seems a bit
off today.

Thanks much,

Jane

begin:vcard 
n:Pawlukiewicz;Jane
tel;cell:703 517-2591
tel;fax:703 289-5814
tel;work:703 289-5307
x-mozilla-html:FALSE
org:Booz Allen Hamilton;Visit us on the Internet: a href=http://boozallen.com;BoozOnline/a 
adr:;;
version:2.1
email;internet:[EMAIL PROTECTED]
title:Senior Consultant
fn:Jane Pawlukiewicz
end:vcard



RE: LEAP Security Vulnerabilities??

2002-06-13 Thread Rowland, Alan D
Title: LEAP Security Vulnerabilities??



If 
you're serious enough about security to find 128 WEP inadequate, I would think 
you would be doing some sort of VPN or other SSL solution anyway, making WEP 
redundant. Or am I missing something?

Best,

-Al 
Rowland

  -Original Message-From: Hyska, Jason [JJCUS] 
  [mailto:[EMAIL PROTECTED]]Sent: Thursday, June 13, 2002 10:15 
  AMTo: [EMAIL PROTECTED]Subject: LEAP Security 
  Vulnerabilities??
  I am well aware of the many security vulnerabilities that 
  exist on wireless networks as well as the inadequacies of WEP. I was 
  curious if anyone has had any experiences with Cisco's LEAP authentication 
  protocol? I have scoured the net for reviews or documents examining any 
  potential vulnerabilities, but have not been able to find any. Any and 
  all help or information would be appreciated.
   Thanks in advance, Jason Hyska Worldwide Information 
  Security Johnson  Johnson [EMAIL PROTECTED]  



Re: LEAP Security Vulnerabilities??

2002-06-13 Thread Stephen Sprunk


Thus spake Hyska, Jason [JJCUS] [EMAIL PROTECTED]
 I am well aware of the many security vulnerabilities that exist
 on wireless networks as well as the inadequacies of WEP.

WEP's only real failure was the failure to specify keying; vendors (and users)
with less security experience interpreted this to mean static keys were
sufficient.

The choice of RC4 was unfortunate given the above problem, but the coming switch
to AES should fix that.

 I was curious if anyone has had any experiences with Cisco's
 LEAP authentication protocol?  I have scoured the net for
 reviews or documents examining any potential vulnerabilities,
 but have not been able to find any.  Any and all help or
 information would be appreciated.

LEAP itself is unlikely to present problems, as it's just a means to verify
802.1x credentials and force key rotation.  I'd be much more wary of potential
problems in 802.1x itself, since that's the over-the-air portion.

S




Re: LEAP Security Vulnerabilities??

2002-06-13 Thread Richard A Steenbergen


On Thu, Jun 13, 2002 at 02:34:29PM -0500, Stephen Sprunk wrote:
 
 WEP's only real failure was the failure to specify keying; vendors (and
 users) with less security experience interpreted this to mean static
 keys were sufficient.

 The choice of RC4 was unfortunate given the above problem, but the
 coming switch to AES should fix that.

Most existing wireless APs cannot keep up with 802.11b doing RC4 (which is
EXTREMELY light on the cpu) at line rate. I'm afraid to see what they
consider acceptable for AES, anything done as a firmware upgrade is going
to be quite limiting. At least for 802.11a I believe they're doing better.

-- 
Richard A Steenbergen [EMAIL PROTECTED]   http://www.e-gerbil.net/ras
PGP Key ID: 0x138EA177  (67 29 D7 BC E8 18 3E DA  B2 46 B3 D8 14 36 FE B6)



Re: GigEth regenerators

2002-06-13 Thread Paul Vixie


[EMAIL PROTECTED] (Daniska Tomas) writes:

 a brief summary of responses up to now:

in response to my earlier reply on this topic, i was also pointed at

http://www.nbase-xyplex.com/products.html

which indeed shows how to do 65Km regen points.  pretty cool other stuff too.



Re: LEAP Security Vulnerabilities??

2002-06-13 Thread Stephen Sprunk


Thus spake Richard A Steenbergen [EMAIL PROTECTED]
 On Thu, Jun 13, 2002 at 02:34:29PM -0500, Stephen Sprunk wrote:
  The choice of RC4 was unfortunate given the above problem,
  but the coming switch to AES should fix that.

 Most existing wireless APs cannot keep up with 802.11b doing
 RC4 (which is EXTREMELY light on the cpu) at line rate.   I'm
 afraid to see what they consider acceptable for AES, anything
 done as a firmware upgrade is going to be quite limiting. At least
 for 802.11a I believe they're doing better.

Most vendors chose to do their RC4 encryption in software and consequently can't
do more than 1-2mb/s -- caveat emptor.  That's hardly a failing of the 802.11
WG; at least one vendor can do RC4 (and soon AES) at wire rate.

You can have it good, fast, or cheap -- pick two.

S




RE: GigEth regenerators

2002-06-13 Thread Mikael Abrahamsson


On Thu, 13 Jun 2002, Daniska Tomas wrote:

 mikael: which exact gbic did you use?

The Finisar FTR1619-55.

My experiense is that buying directly from the manufacturer is taking a 
chance, it's much cheaper, but you get great variance in quality and you 
should really do testing on the gbics, or be prepared to swap gbics in 
case you get problems.

Buying from the switch vendor ensures that you do not get finger-pointing 
and they do test the gbics more than the manufacturer.
 
-- 
Mikael Abrahamssonemail: [EMAIL PROTECTED]




Re: KPNQWEST cease operation?

2002-06-13 Thread Rafi Sadowsky



## On 2002-06-14 04:08 +0100 Chrisy Luke typed:

CL
CL ?$BLpEDIt?(B wrote (on Jun 14):
CL  I heard that NOC of KPQWEST in Frankfurt would cease operation at 1400
CL  hour (local time) today.
CL 
CL  Is there any additional information about this?
CL
CL http://live.ebone.com/ is probably about as much info as you can get unless

 You mean http://live.ebone.net/ or http://live.save-ebone.com/ ?

-- 
Rafi