Re: Sprint peering policy

2002-07-04 Thread Rizzo Frank


Gordon Cook wrote:
  I don't post here much

Any chance of changing that?  After listening to endless banter from 
Ralph Doncaster, I'd welcome of your latest interview with Bill St. 
Arnaud and Wade Hong on CANET*3.1415927. Pretty please with a plastic 
figurine of the delectable Ms. Jane on top?

  Finally I'd like to ask a question in return.  I am trying to look at
  what will grow up on the ashes of the current industry collapse.

Larger large players, more basement web hosters.

  Fiber to the home is beginning to appear in a few   
  isolated areas. 

It will disappear just as quickly.  Has, in some places.  A few years 
back, VC's were wooed by the concept.   They didn't know what the heck 
it was, nor did they care, so long as those pitching it (who knew even 
less about it, for the most part) kept dropping buzzards such as 
broadband and fiber over and over.  Now's the wake-up call.  It just 
isn't cost-effective, which might explain why every company offering 
FTTH services in the States is either f'd, soon-to-be f'd, or abandoned 
the plans in favor of something more viable like cable.  Whatever 
happened to WINfirst?

  Are there folk with adequate  
  routes and connectivity that would undertake to form a network that  
  might be independent of the current internet  core back bone of what 
  (112,000 routes?) on top of which sit the half dozen or so Tier one  
  players that peer primarily with each other and demand transit $$$   
  from everyone  else?  Web and email stay on the legacy backbone...new
  services migrate to a backbone with a cost structure unencumbered by 
  the tier one oligopolists?

No.

  PS. Anyone interested in  trekking in Nepal in October please let me
  know off list.  eg http://cookreport.com/everest.shtm

When?  I'm handnig out summaries of the Cook Report at the 
Princeton-Harvard game on the 26th.  Then it's off to Shanghai to crash 
the ICANN meeting.  Then Eugene to lobby for macro-allocations and true 
financial disclosure/accountability at the ARIN conference.  Beginning 
of the month works best. I've been benching 300 and tracing Broadwing 
cross-country fiber routes by foot in preparation, hopefully you'll be 
able to keep up! Have any other internet luminaries expressed an 
interest in going?

Frank Proud to be an American Rizzo

PS: I had a bet with my boss: how many of you are watching fireworks 
tonight?  Mail me privately and I'll post a summary to the list.





Internet vulnerabilities

2002-07-04 Thread Jason Lewis


There is a lot of news lately about terrorist groups doing recon on
potential targets.  The stories got me thinking.

What are the real threats to the global Internet?

I am looking for anything that might be a potential attack point.  I don't
want to start a flame war, but any interesting or even way out there idea
is welcome.

Is it feasible that a coordinated attack could shutdown the entire net?  I
am not talking DDoS.  What if someone actually had the skills to disrupt
BGP on a widescale?

jas






Re: Internet vulnerabilities

2002-07-04 Thread Mike Tancsa



Well, the recent jumbo AS path issue had an interesting effect of resource 
starvation on a few routers.  Still, I think the softest targets are the 
root name servers.  I was glad to hear at the Toronto NANOG meeting that 
this was being looked into from a routing perspective.  Not sure what is 
being done from a DoS perspective.


 ---Mike

At 01:56 PM 04/07/2002 -0400, Jason Lewis wrote:

There is a lot of news lately about terrorist groups doing recon on
potential targets.  The stories got me thinking.

What are the real threats to the global Internet?

I am looking for anything that might be a potential attack point.  I don't
want to start a flame war, but any interesting or even way out there idea
is welcome.

Is it feasible that a coordinated attack could shutdown the entire net?  I
am not talking DDoS.  What if someone actually had the skills to disrupt
BGP on a widescale?

jas




Re: Internet vulnerabilities

2002-07-04 Thread David Lesher


In terms of damage to the 'Net lasting longer than the slashdot
thread on same; I'm far more afraid of Mickey Mouse Lawyers vice
any MidEast terrorist.


-- 
A host is a host from coast to [EMAIL PROTECTED]
 no one will talk to a host that's close[v].(301) 56-LINUX
Unless the host (that isn't close).pob 1433
is busy, hung or dead20915-1433



Re: Internet vulnerabilities

2002-07-04 Thread David Ulevitch



quote who=Jason Lewis
 What if someone actually had the skills to disrupt BGP on a widescale?

I think the media talk about taking down the Internet are kind of bogus.

Nobody has ever died because they couldn't check their email.

If the net went down for an hour, a day, or even a week I think that my
mom and the rest of the non glued-to-their-terminal world would somehow
struggle through and sustain a normal daily routine.

-davidu [who probably would not survive a week long net outage ;) ]

-- 
Never doubt that a small group of thoughtful citizens can change the
world. Indeed, it is the only thing that ever has. --Margaret Mead





RE: Internet vulnerabilities

2002-07-04 Thread Phil Rosenthal


Except what if in my scenario, while flooding, it executed dd
if=/dev/zero of=(hd) on all of the system drives.

If someone wanted to do it, it could be done.
--Phil

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of
David Ulevitch
Sent: Thursday, July 04, 2002 2:23 PM
To: [EMAIL PROTECTED]
Subject: Re: Internet vulnerabilities




quote who=Jason Lewis
 What if someone actually had the skills to disrupt BGP on a widescale?

I think the media talk about taking down the Internet are kind of
bogus.

Nobody has ever died because they couldn't check their email.

If the net went down for an hour, a day, or even a week I think that my
mom and the rest of the non glued-to-their-terminal world would
somehow struggle through and sustain a normal daily routine.

-davidu [who probably would not survive a week long net outage ;) ]

-- 
Never doubt that a small group of thoughtful citizens can change the
world. Indeed, it is the only thing that ever has. --Margaret Mead






Re: Internet vulnerabilities

2002-07-04 Thread Richard A Steenbergen


On Thu, Jul 04, 2002 at 02:01:16PM -0400, Jared Mauch wrote:
 
  Is it feasible that a coordinated attack could shutdown the entire net?  I
  am not talking DDoS.  What if someone actually had the skills to disrupt
  BGP on a widescale?
 
   There are a few interesting things on this front that could be
 done.
 
   As in most routers the data+control plane are the same, one can
 DoS the processor or router in interesting ways.

I can't quite picture Osama leading a crack team of BGP commandos on a 
jihad against the internet... 

Maybe blowing up some important net targets, or cutting some important
fiber (and then leaving anti-personnel mines for the people who come to
splice it)... Though if they took out the MAE's, I think routing would 
improve. :)

I've always wondered if someone could get away with colo'ing explosives at
major locations. Take a large computer or router chassis (a 12016 would do
nicely, or some Sun gear), fill it with explosives, and colo it... It
could even be operated over the internet, running bombd as it were.

Or what about an attack against the people running the net, say a NANOG or 
IETF meeting... Or maybe something more constructive, like MPLSCon...

But I'm sure there are probably more subtile ways to do it. As with all
good vulnerabilities, it takes someone who is working on the inside to
REALLY know how to muck things up... Fortunately the terrorists seem to be 
concerned with killing thousands of innocent people and scaring millions, 
not pissing off a few nerds and disrupting eBay's profit margin for a 
week. As much as we like to think we are important, I'd hardly put them in 
the same class.

-- 
Richard A Steenbergen [EMAIL PROTECTED]   http://www.e-gerbil.net/ras
PGP Key ID: 0x138EA177  (67 29 D7 BC E8 18 3E DA  B2 46 B3 D8 14 36 FE B6)



Re: Internet vulnerabilities

2002-07-04 Thread Pete Ehlke


On Thu, Jul 04, 2002 at 02:35:32PM -0400, Richard A Steenbergen wrote:
 
 But I'm sure there are probably more subtile ways to do it. As with all
 good vulnerabilities, it takes someone who is working on the inside to
 REALLY know how to muck things up... Fortunately the terrorists seem to be 
 concerned with killing thousands of innocent people and scaring millions, 
 not pissing off a few nerds and disrupting eBay's profit margin for a 
 week. As much as we like to think we are important, I'd hardly put them in 
 the same class.
 
Or, you could work behind the scene, get Michael Powell appointed to the
FCC, and make sure there are no brakes on the shortsightedness of
lawyers at the RIAA, the MPAA, and the US RBOCs.

Oh. Wait. That's been done. Nevermind.



Re: Internet vulnerabilities

2002-07-04 Thread Paul Vixie


[EMAIL PROTECTED] (Mike Tancsa) writes:

 ...  Still, I think the softest targets are the root name servers.  I was
 glad to hear at the Toronto NANOG meeting that this was being looked into
 from a routing perspective.  Not sure what is being done from a DoS
 perspective.

Now that we've seen enough years of experience from Genuity.orig, UltraDNS,
Nominum, AS112, and {F,K}.root-servers.net, we're seriously talking about using
anycast for the root server system.  This is because a DDoS isn't just against
the servers, but against the networks leading to them.  Even if we provision
for a trillion packets per second per root server, there is no way to get
the whole Internet, which is full of Other People's Networks, provisioned at
that level.  Wide area anycast, dangerous though it can be, works around that.

See www.as112.net for an example of how this might work.  More later.
-- 
Paul Vixie



Re: Internet vulnerabilities

2002-07-04 Thread batz


On Thu, 4 Jul 2002, Jason Lewis wrote:

:What are the real threats to the global Internet?

I realize this seems like  nitpicking, but asking what the real risks are 
might be a more useful question. The reason I mention this is because the 
washington post report the other day about threats to SCADA systems was 
blown out of proportion, because it equated the seriousness of the threats 
with their associated risks. Yes, most ASN.1 implementations have serious 
vulnerabilities, welcome to 1988. 

The ASN.1 vulnerabilities being talked about right now are serious threats, 
but lower risk than say, millions of unpatched IIS and apache servers, 
public exploits and a worm on the loose. Application level vulnerabilities 
that have to be patched on a host by host basis, cause a greater risk than 
say, SNMP vulnerabilities that can be filtered at the gateway, which 
protects from opportunistic external attacks.  

When you talk about threats to the global Internet, there are hundreds of
equally serious vulnerabilities of varying risk. Also, the global Internet
has many different meanings. It can mean the ability to send and recieve 
packets on layer 3 or people being able to conduct business electronically, 
with some reasonable expectation of the confidentiality, integrity and 
reliability of their transactions.  

So, it all depends on what you mean by the Internet:) I think this is 
an extremely important discussion to have on the list, I just think
it should be framed in terms of real risks, root causes, and 
potential solutions. 


:I am looking for anything that might be a potential attack point.  I don't
:want to start a flame war, but any interesting or even way out there idea
:is welcome.
:
:Is it feasible that a coordinated attack could shutdown the entire net?  I
:am not talking DDoS.  What if someone actually had the skills to disrupt
:BGP on a widescale?

Once you start thinking about the Internet from a security perspective, 
you realize there is no entire net subject to the sum of its parts in 
any practical sense. It is a network of networks that serves a continuum 
of interests, bounded by economics, and driven by porn. ;) 

The attack point is anywhere you think will do the most harm to the 
people you dislike. If you just want to break something, find serious, 
easy to exploit, security design limitations in BGP, MPLS, BIND and 
drive a major global backbone like UUNet into insolvency. 

..What? Oh ...Too late. 

--
batz




RE: Waiver of IP and AS Number Transfer Fees

2002-07-04 Thread jnelson


Hey, I'll be the first to laugh it up about some of ARIN's oldschool
GM-style practices, but let's not knock the staff there... I've had
nothing but good experiences with the front-liners (billing and
support). And I believe your cry has been heard and this clean-up and
the template revision are merely portions of their restructuring.
-j

-Original Message-
From: Tom Thomas [mailto:[EMAIL PROTECTED]] 
Sent: Wednesday, July 03, 2002 9:32 PM
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]; jnelson; [EMAIL PROTECTED]
Subject: RE: Waiver of IP and AS Number Transfer Fees

Michael its simple ARIN is staffed by a bunch of people who have no
concept
of business or reality. There reality is based on outmoded ideals
enforced
on them, so no wonder people do not want to go through the abuse of
dealing
with them.

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
Michael Hallgren
Sent: Wednesday, July 03, 2002 4:34 PM
To: [EMAIL PROTECTED]; jnelson; [EMAIL PROTECTED]
Subject: RE: Waiver of IP and AS Number Transfer Fees



Please correct me if I am wrong. This is not allowing the practice of
selling IPs or ASes,

I've never really come around to fully understand the notion (more and
more common, it seems) of _selling_ such..? (Maybe I'm an idealist :)

 but it encourages those of us who have acquired other
companies to consolidate all the registrations under a single NIC
handle
(for example) to reduce the total number of contacts floating out
there?

Is my understanding accurate?


I would hope so, in a general perspective.

mh


Thanks,

DJ




RE: Internet vulnerabilities

2002-07-04 Thread Deepak Jain



Coordinated infrastructure attacks are scary for that reason. They are
scary. :) Netcraft will provide you the information on every web
server/server OS just for the asking -- you don't need an OC3 or even nmap.

Historically, wide spreading worms have had a flaw in the program that
prevented how much damage they could cause. (i.e., either too virulent or
too patient). I suspect even in your dd solution, the attacker would leave a
delay to allow some additional CPU power devoted to attacking other
destinations. If the timeout is too short and interesting machines go down
fast, the spread takes longer. If its too long, it can be stopped before it
gets as far. The nastier you make it, the less far it spreads.

In some paranoid networks, within 20 minutes of the content disappearing
they would probably pull all or many of their most significant machines off
line while they are figuring out what attack is occuring. The least
responsive networks are going to be the most vulnerable to a scenario like
this.

Rate limiting ICMP (or your favorite attack packet) isn't as difficult as it
used to be (even at the border), and since most large networks use automatic
configuration generators -- no matter how cumbersome -- it is concievable
that the brute force attack could be killed on the largest networks at a
mean of 10-12 hrs. Server damage would take longer depending on how
available/recent backups are.

The best part of multilevel NOCs (level 1-2 open tickets 3+ solve problems)
is that under large, cascading attacks of this sort, those who actually
solve the problem are not as bogged down by frantic customers calling.



Risers (inside) a building aren't even that big a deal. Most manholes around
these carrier hotels are not welded shut, and most of the POEs (no matter
how many there are) have a man hole or two on the street for splicing
purposes.

A few bad guys could drop a explosive, incendiary, acid, etc in each of
these around each major carrier hotel and disable the hotel in about 20
minutes from start-to-finish. (4 men teams at each major infrastructure
location in the U.S. -- say 10?) could disable everything in less than 5
minutes from start to finish and be making a quick exit before the first
fiber goes down.

If you simultaneously melt/explode/destroy every POE to every major cable
landing/telecom hotel in the U.S., you will have problems (sky links MIGHT
be excepted if you are especially clever). And 24 hr repair times, assuming
you can get the repair call out in the first place.

Lets not forget that manholes are almost always in public right of way, or
similarly accessible. Opening them quickly/publicly won't even freak out too
many people. Worst case 2-3 blocks away you triple the number of manholes to
open/disable, and have no tech-savvy types or building-security types have
the chance to even see it go down -- better, no welded manholes to worry
about whatsoever.

---

Its almost ridiculous to worry about protecting carrier-buildings from
deliberate mischief because they are far more vulnerable outside than
inside. Security guards inside are (IMO) to keep large pieces of equipment
from walking out without getting a good look at the guy(s) doing it. Even
then, most misunderstand their role and rely on the basic honesty of the
visitors to maintain anything...

I could just be grumpy though.

Deepak Jain
AiNET


 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
 Phil Rosenthal
 Sent: Thursday, July 04, 2002 2:17 PM
 To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
 Subject: RE: Internet vulnerabilities



 Thinking about a physical threat...
 If you go to 111 8th ave, NYC.  They have added security since 9-11-01
 which now requires either building ID, or showing a driver's license
 before entering building (because terrorists don't have driver's
 licenses).

 On some floors (eg the 7th).  The building risers and conduits are
 completely exposed. I can't help but wonder how much damage a terrorist
 attack to that would do.

 Also, say someone from a moderately fast internet connection (OC-3) ran
 nmap across the entire internet on ports like 21,22,53,80,443,3306.  In
 one day, they can probably have a list of every server answering those
 ports, and the versions of the daemons on them.

 Next, just wait for an wide enough exploit to come out, and then write a
 Trojan that has a list of every other server vulnerable, and on every
 hack, it splits the list in 2, and roots another box and gives it the
 2nd half of the list.

 I estimate that with a wide enough exploit (eg apache or openssh), you
 could probably compromise 20% of the servers on the net within 1 hour,
 and then have them all begin a ping flood of something far away
 network wise (meaning a box in NYC would flood a box in SJC, a box in
 SJC would flood a box in Japan, etc... Trying to have as much bit
 distance as possible).

 Damn scary, but I believe if someone was determined enough, they could