Re: Who does source address validation? (was Re: what's that smel l?)

2002-10-10 Thread Hank Nussbacher


At 10:43 PM 09-10-02 -0700, Steve Francis wrote:

[EMAIL PROTECTED] wrote:
My personal pet peeve is the opposite - we'll try to use pMTU, some
provider
along the way sees fit to run it through a tunnel, so the MTU there is
1460
instead of 1500 - and the chuckleheads number the tunnel endpoints out
of
1918 space - so the 'ICMP Frag Needed' gets tossed at our border
routers,
because we do both ingress and egress filtering.
That's not terribly hard to overcome - allow icmp unreachables (from any 
source) in your acl,  then deny all traffic from RFC 1918 addresses, then 
the rest of the ACL.

Combined with CAR (or CatOS QoS rate limiting) on icmp's, you end up with 
all the functionality, and almost none of the bogus traffic.

CAR should not be used to rate-limit but instead use the MQC police command
which basically does the same thing. CAR is not going to be around much 
longer and is not being developed anymore:

Have a look at:
http://www.cisco.com/warp/public/105/cbpcar.html
http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/fqos_c/fqcprt8/qcfmcli2.htm
for more information.

-Hank




Re: per-packet load sharing in cef or dcef

2002-10-10 Thread Feger, James


I am not sure what is happening for you, but as a general rule of thumb I
don't run per-packet load sharing on circuits that are not 'the same'.
The need for packet re-ordering goes way up when you are running
per-packet on two types of circuit.  Are the circuits provisioned for the
same speed at least?

-jf


On Thu, 10 Oct 2002, Adam Atkinson wrote:


 per-packet load sharing in cef / dcef just doesn't seem to want to work.

 I have two 7500s joined by a frame relay link and a fast ethernet.

 Traffic is coming in to one of the 7500s via a third link, and goes
 to a loopback on the second 7500.

 I have cef turned on

 I have ip load-sharing per-packet on every interface

 The FR and FE have the same ospf cost

 The routing tables and sh ip cef agree that there are
 two equal paths to the loopback.

 But all the traffic goes over one link.

 I've been through Cisco troubleshooting documents etc.
 and as far as I can see, everything is perfect.

 Also, a deja search reveals plenty of other people with
 similar problems, and no solutions I can see. Are we all
 missing something obvious?

 --
 Adam Atkinson





Re: Who does source address validation? (was Re: what's that smell?)

2002-10-10 Thread Richard A Steenbergen


On Thu, Oct 10, 2002 at 01:06:15AM -0400, [EMAIL PROTECTED] wrote:
 On Wed, 09 Oct 2002 23:05:59 BST, Stephen J. Wilcox said:
 
  On a related issue (pMTU) I recently discovered that using a link with MTU 
  1500 breaks a massive chunk of the net - specifically mail and webservers who
  block all inbound icmp.. the servers assume 1500, send out the packets with DF
 
 My personal pet peeve is the opposite - we'll try to use pMTU, some
 provider along the way sees fit to run it through a tunnel, so the MTU
 there is 1460 instead of 1500 - and the chuckleheads number the tunnel
 endpoints out of 1918 space - so the 'ICMP Frag Needed' gets tossed at
 our border routers, because we do both ingress and egress filtering.  
 It's bad enough when all the interfaces on the offending unit are
 1918-space, but it's really annoying when the critter has perfectly good
 non-1918 addresses it could use as the source... Argh...

Ok, I know how this manages to rile people up, but might I suggest that
you brought it upon yourself?

There is a time and a place for messages sourced from addresses to which
you cannot reply, and a time and place where those messages should not
exist. Obviously, a dns *QUERY* is not the place for a message which
cannot be returned. But what about an ICMP *RESPONSE*? Nothing depends
upon the source address of the IP header for operation, the original
headers which caused the problem are encoded in the ICMP message.

And yet people are so busy concerning themselves with this mythical thing
which might break from receiving ICMP overlapping existing internal 1918
space, the extra 0.4% of bandwidth which might be wasted, and the
righteous feeling that they have done something useful, that they don't
stop to realize *THEY* are the ones breaking PMTU-D.

I'm sure we can all agree on at least the concept that sourcing packets
from an address which cannot receive a reply is at least potentially
useful, for example to avoid DoS against a critical piece of
infrastructure. Would it make people feel better if there was a specific
seperate non-routed address space reserved for router generated messages
which don't want replies? Why?

Even Windows 2000+ includes blackhole detection which will eventually
remove the DF bit if packets aren't getting through and ICMP messages
aren't coming back, something many unixes lack. But the heart of the
problem is that people still push packets like every one must include the
maximum data the MTU can support. Do we have any idea how much network
suffering is being caused by that damn 1500 number right now? Aside from
the fact that it is one of the worst numbers possible for the data, it
throws a major monkey wrench in the use of tunnels, pppoe, etc. Eventually
we will realize the way to go is something like 4096 data octets, plus
some room for headers, on a 4470 MTU link. But if the best reason we can
come up with is ISIS, the IEEE will just keep laughing.

/rant

-- 
Richard A Steenbergen [EMAIL PROTECTED]   http://www.e-gerbil.net/ras
PGP Key ID: 0x138EA177  (67 29 D7 BC E8 18 3E DA  B2 46 B3 D8 14 36 FE B6)



Re: Who does source address validation? (was Re: what's that smell?)

2002-10-10 Thread Iljitsch van Beijnum


On Thu, 10 Oct 2002, Richard A Steenbergen wrote:

 Even Windows 2000+ includes blackhole detection which will eventually
 remove the DF bit if packets aren't getting through and ICMP messages
 aren't coming back, something many unixes lack.

Wow, now I'm impressed. And what about the 1999 other versions of Windows?
This is hardly a new problem. Still, it's good that some people at least
make progress, even if very slowly.

 But the heart of the
 problem is that people still push packets like every one must include the
 maximum data the MTU can support.

And why not?

 Do we have any idea how much network
 suffering is being caused by that damn 1500 number right now? Aside from
 the fact that it is one of the worst numbers possible for the data, it
 throws a major monkey wrench in the use of tunnels, pppoe, etc.

So don't use those.

 Eventually
 we will realize the way to go is something like 4096 data octets, plus
 some room for headers, on a 4470 MTU link.

So what then if someone runs a secure tunnel over wireless over a PPPoE
over ADSL using mobile IPv6 that runs over a tunnel or two ad nauseum
until the headers get bigger than 374 bytes? Then you'll have your problem
right back. Might as well really solve it the first try.

One of the problems is that there is no generally agreed on and widely
available set of rules for this stuff. Setting the DF bit on all packets
isn't good, but it works. Using RFC1918 space to number your tunnel
routers isn't good, but it works. Filtering validating source addresses on
ingress is good, but hey, it doesn't work!

Making a good list of best practices (and then have people widely
implement them) might also go a long way towards showing concerned parties
such as the US administration that the network community consists of
responsible people that can work together for the common good.

 But if the best reason we can
 come up with is ISIS, the IEEE will just keep laughing.

Why is the IEEE laughing?




Re: Who does source address validation? (was Re: what's that smell?)

2002-10-10 Thread Jared Mauch


On Thu, Oct 10, 2002 at 06:36:33PM +0200, Iljitsch van Beijnum wrote:
 So what then if someone runs a secure tunnel over wireless over a PPPoE
 over ADSL using mobile IPv6 that runs over a tunnel or two ad nauseum
 until the headers get bigger than 374 bytes? Then you'll have your problem
 right back. Might as well really solve it the first try.

This is a problem that would be solved by everyone being
responsible and doing pmtud properly.

 One of the problems is that there is no generally agreed on and widely
 available set of rules for this stuff. Setting the DF bit on all packets
 isn't good, but it works. Using RFC1918 space to number your tunnel
 routers isn't good, but it works. Filtering validating source addresses on
 ingress is good, but hey, it doesn't work!

I think we're starting to get at the heart of the problem
but let me stick my neck out and say it:

Registries (APNIC, ARIN, RIPE, usw) charge for ip addresses.
be it via a lease/registration fee, it's a per-ip charge that ISPs must
get via some means out of their subscribers.  (Unless people
don't care about money that is).  Back in the days, one could
obtain ip addresses from Internic saying i will not connect
to internet, i intend to connect at some later date in a
year or two .. (or similar), i intend to connect now.

People number out of 1918 space primarily for a few
reasons, be them good or not:

1) Internal use
2) Cost involved.. nobody else needs to telnet to my p2p
links but me, and i don't want to pay {regional_rir} for my
internal use to reduce costs
3) security of not being a publicly accessible
network.

This can break many things, pmtu, multicast and various
streaming (multi)media applications.

With the past scare of we'll be out of ip addresses by 199x
still fresh in some peoples memories, they in their good consience decided
to also conserve ips via this method.

The problem is not everyone today that considers themselves
a network operator understands all the ramifications of their current
practices, be they good or bad.

Going into fantasy-land mode, if IPv6 addresses were instantly
used by everyone, people could once again obtain ips that could be
used for internal private use yet remain globally unique, therefore
allowing tracking back of who is leaking their own internal sources.


 Making a good list of best practices (and then have people widely
 implement them) might also go a long way towards showing concerned parties
 such as the US administration that the network community consists of
 responsible people that can work together for the common good.

I agree here, I personally think that numbering your internal
links out of 1918 space is not an acceptable solution unless it's
behind your natted network/firewall and does not leak out.

Perhaps some of those that are the better/brighter out there want
to start to write up a list of networking best practices.

Then test those book smart ccie/cne types with the information
to insure they understand the ramifications.  a few good whitepapers
about these might be good to include or quiz folks on.  i suspect
there's only a handful of people that actually understand the complete
end-to-end problem and all the ramifications involved as it is quite
complicated.

  But if the best reason we can
  come up with is ISIS, the IEEE will just keep laughing.
 
 Why is the IEEE laughing?

The implication is that IEEE will not change the 802.x specs
to allow larger [default] link-local mtu due to legacy interop
issues.  imagine your circa 1989 ne2000 card attempting to process
a 4400 byte frame on your local lan.  a lot of the cheap ethernet
cards don't include enough buffering to handle such a large frame
let alone the legacy issues involved.. and remember the enterprise
networks have a far larger number of ethernet interfaces deployed
than the entire internet combined * 100 at least.  any change
to the spec would obviously affect them also.

- jared

-- 
Jared Mauch  | pgp key available via finger from [EMAIL PROTECTED]
clue++;  | http://puck.nether.net/~jared/  My statements are only mine.



[OT] Does AOL block IP Protocol #50 / UDP Port #500?

2002-10-10 Thread Gerard White



Greetings

Does anyone know if AOL blocks the capability to use a VPN client
over their DUI service?

Sorry if this is off topic...

GW




Anyone home at AOL?

2002-10-10 Thread Roger Marquis


Not the first time one of our clients has been impacted by AOL, nor
the first time AOL has failed respond to requests/complaints.

Though this isn't a DDOS like previous AOL-based network abuse, and
probably isn't a dictionary attack, it is placing considerable
strain on a couple of leased lines and mailexchangers.

Any idea how a small network admin can get someone at AOL to deal
with a problem like this?

TIA,

-- 
Roger Marquis
Roble Systems Consulting
http://www.roble.com/

PS. these logs illustrate only a small fraction of the SMTP activity
from AOL's servers.



Oct  9 10:57:06 PDT reject: RCPT from omr-d08.mx.aol.com[205.188.156.76]: 550 
[EMAIL PROTECTED]: User unknown; from= to=[EMAIL PROTECTED]
Oct  9 11:02:51 PDT reject: RCPT from omr-r01.mx.aol.com[152.163.225.129]: 550 
[EMAIL PROTECTED]: User unknown; from= to=[EMAIL PROTECTED]
Oct  9 11:03:19 PDT reject: RCPT from omr-d10.mx.aol.com[205.188.156.78]: 550 
[EMAIL PROTECTED]: User unknown; from= to=[EMAIL PROTECTED]
Oct  9 11:04:00 PDT reject: RCPT from omr-r04.mx.aol.com[152.163.225.132]: 550 
[EMAIL PROTECTED]: User unknown; from= to=[EMAIL PROTECTED]
Oct  9 11:07:24 PDT reject: RCPT from omr-m01.mx.aol.com[64.12.138.1]: 550 
[EMAIL PROTECTED]: User unknown; from= to=[EMAIL PROTECTED]
Oct  9 11:08:07 PDT reject: RCPT from omr-r03.mx.aol.com[152.163.225.131]: 550 
[EMAIL PROTECTED]: User unknown; from= to=[EMAIL PROTECTED]
Oct  9 11:08:23 PDT reject: RCPT from omr-d06.mx.aol.com[205.188.156.71]: 550 
[EMAIL PROTECTED]: User unknown; from= to=[EMAIL PROTECTED]
Oct  9 11:11:35 PDT reject: RCPT from omr-m01.mx.aol.com[64.12.138.1]: 550 
[EMAIL PROTECTED]: User unknown; from= to=[EMAIL PROTECTED]
Oct  9 11:11:54 PDT reject: RCPT from omr-r02.mx.aol.com[152.163.225.130]: 550 
[EMAIL PROTECTED]: User unknown; from= to=[EMAIL PROTECTED]
Oct  9 11:16:22 PDT reject: RCPT from omr-d08.mx.aol.com[205.188.156.76]: 550 
[EMAIL PROTECTED]: User unknown; from= to=[EMAIL PROTECTED]
Oct  9 11:24:39 PDT reject: RCPT from omr-r03.mx.aol.com[152.163.225.131]: 550 
[EMAIL PROTECTED]: User unknown; from= to=[EMAIL PROTECTED]
Oct  9 11:27:31 PDT reject: RCPT from omr-d07.mx.aol.com[205.188.159.13]: 550 
[EMAIL PROTECTED]: User unknown; from= to=[EMAIL PROTECTED]
Oct  9 11:29:59 PDT reject: RCPT from omr-d04.mx.aol.com[205.188.159.7]: 550 
[EMAIL PROTECTED]: User unknown; from= to=[EMAIL PROTECTED]
Oct  9 11:33:29 PDT reject: RCPT from omr-d05.mx.aol.com[205.188.156.66]: 550 
[EMAIL PROTECTED]: User unknown; from= to=[EMAIL PROTECTED]
Oct  9 11:35:59 PDT reject: RCPT from omr-d06.mx.aol.com[205.188.156.71]: 550 
[EMAIL PROTECTED]: User unknown; from= to=[EMAIL PROTECTED]
Oct  9 11:38:27 PDT reject: RCPT from omr-d05.mx.aol.com[205.188.156.66]: 550 
[EMAIL PROTECTED]: User unknown; from= to=[EMAIL PROTECTED]
Oct  9 11:42:03 PDT reject: RCPT from omr-r02.mx.aol.com[152.163.225.130]: 550 
[EMAIL PROTECTED]: User unknown; from= to=[EMAIL PROTECTED]
Oct  9 11:43:30 PDT reject: RCPT from omr-m01.mx.aol.com[64.12.138.1]: 550 
[EMAIL PROTECTED]: User unknown; from= to=[EMAIL PROTECTED]
Oct  9 11:48:58 PDT reject: RCPT from omr-d04.mx.aol.com[205.188.159.7]: 550 
[EMAIL PROTECTED]: User unknown; from= to=[EMAIL PROTECTED]
Oct  9 11:49:49 PDT reject: RCPT from omr-d10.mx.aol.com[205.188.156.78]: 550 
[EMAIL PROTECTED]: User unknown; from= to=[EMAIL PROTECTED]
Oct  9 11:50:44 PDT reject: RCPT from omr-m01.mx.aol.com[64.12.138.1]: 550 
[EMAIL PROTECTED]: User unknown; from= to=[EMAIL PROTECTED]
Oct  9 11:51:59 PDT reject: RCPT from omr-d10.mx.aol.com[205.188.156.78]: 550 
[EMAIL PROTECTED]: User unknown; from= to=[EMAIL PROTECTED]
Oct  9 11:54:40 PDT reject: RCPT from omr-m01.mx.aol.com[64.12.138.1]: 550 
[EMAIL PROTECTED]: User unknown; from= to=[EMAIL PROTECTED]
Oct  9 11:56:51 PDT reject: RCPT from omr-d09.mx.aol.com[205.188.156.77]: 550 
[EMAIL PROTECTED]: User unknown; from= to=[EMAIL PROTECTED]
Oct  9 11:56:57 PDT reject: RCPT from omr-d05.mx.aol.com[205.188.156.66]: 550 
[EMAIL PROTECTED]: User unknown; from= to=[EMAIL PROTECTED]
Oct  9 11:57:50 PDT reject: RCPT from omr-r03.mx.aol.com[152.163.225.131]: 550 
[EMAIL PROTECTED]: User unknown; from= to=[EMAIL PROTECTED]
Oct  9 12:06:01 PDT reject: RCPT from omr-d08.mx.aol.com[205.188.156.76]: 550 
[EMAIL PROTECTED]: User unknown; from= to=[EMAIL PROTECTED]
Oct  9 12:06:52 PDT reject: RCPT from omr-r08.mx.aol.com[152.163.225.153]: 550 
[EMAIL PROTECTED]: User unknown; from= to=[EMAIL PROTECTED]
Oct  9 12:11:59 PDT reject: RCPT from omr-r04.mx.aol.com[152.163.225.132]: 550 
[EMAIL PROTECTED]: User unknown; from= to=[EMAIL PROTECTED]
Oct  9 12:14:38 PDT reject: RCPT from omr-d06.mx.aol.com[205.188.156.71]: 550 
[EMAIL PROTECTED]: User unknown; from= to=[EMAIL PROTECTED]
Oct  9 12:14:51 PDT reject: RCPT from omr-r07.mx.aol.com[152.163.225.147]: 550 
[EMAIL PROTECTED]: User unknown; from= to=[EMAIL PROTECTED]
Oct  9 12:15:47 PDT reject: RCPT from omr-d05.mx.aol.com[205.188.156.66]: 550 
[EMAIL PROTECTED]: User unknown; from= 

Re: Broken PMTU (was: Who does source address validation? (was Re:what'sthat smell?))

2002-10-10 Thread Tony Rall


On Thursday, 2002-10-10 at 00:55 ZE2, Iljitsch van Beijnum 
[EMAIL PROTECTED] wrote:
 You can also get around this by making the first hop the one with the
 lowest MTU. This is no fun for ethernet-connected stuff, but for dial-up
 this is easy. Then this box will announce a smaller TCP MSS when the
 connection is established and there aren't any problems.

Traffic consists of more than tcp; setting your mtu low might get your tcp 
traffic delivered but won't help inbound traffic using other protocols.

Mtu discrepancies must be dealt with in at least one of the following ways 
if you don't want it to lead to fatally dropped packets:

1. Fragmentation must work.  This applies to systems that don't use PMTUD 
or use blackhole detection.  (Some folks think it a good security 
practice to drop fragments!  Some nat boxes don't know what to do with 
fragments when they arrive out of order - especially a non-initial 
fragment before the first.)

2. PMTUD must work. 

3. PMTUD blackhole detection must be used with operable fragmentation. (If 
you have to fallback to this you're likely to suffer significant 
performance hits.)

Tony Rall



RE: per-packet load sharing in cef or dcef

2002-10-10 Thread Charles D Hammonds


sounds to me like a lab scenario. and while it may not be a good idea in a
production network, it should still work. gonna try labbing it up as well.

what code versions you running, Adam?

Charles

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
Feger, James
Sent: Thursday, October 10, 2002 6:18 AM
To: Adam Atkinson
Cc: [EMAIL PROTECTED]
Subject: Re: per-packet load sharing in cef or dcef



I am not sure what is happening for you, but as a general rule of thumb I
don't run per-packet load sharing on circuits that are not 'the same'.
The need for packet re-ordering goes way up when you are running
per-packet on two types of circuit.  Are the circuits provisioned for the
same speed at least?

-jf


On Thu, 10 Oct 2002, Adam Atkinson wrote:


 per-packet load sharing in cef / dcef just doesn't seem to want to work.

 I have two 7500s joined by a frame relay link and a fast ethernet.

 Traffic is coming in to one of the 7500s via a third link, and goes
 to a loopback on the second 7500.

 I have cef turned on

 I have ip load-sharing per-packet on every interface

 The FR and FE have the same ospf cost

 The routing tables and sh ip cef agree that there are
 two equal paths to the loopback.

 But all the traffic goes over one link.

 I've been through Cisco troubleshooting documents etc.
 and as far as I can see, everything is perfect.

 Also, a deja search reveals plenty of other people with
 similar problems, and no solutions I can see. Are we all
 missing something obvious?

 --
 Adam Atkinson