Re: Cogent

2003-02-24 Thread Charles H. Gucker

Dave,
It looks like Cogent still has connectivity via the old
NetRail network:

*  38.8.50.0/24 0.0.0.0 100 0 701 4006 16631 i
*  38.8.81.0/24 0.0.0.0 100 0 701 4006 16631 i
*  38.8.82.0/24 0.0.0.0 100 0 701 4006 16631 i
*  38.8.84.0/24 0.0.0.0 100 0 701 4006 16631 i
*  38.8.92.0/24 0.0.0.0 100 0 701 4006 16631 i
*  38.8.93.0/24 0.0.0.0 100 0 701 4006 16631 i
*  38.9.96.0/24 0.0.0.0 100 0 701 4006 16631 i
*  38.9.124.0/240.0.0.0 100 0 701 4006 16631 i
*  38.9.128.0/240.0.0.0 100 0 701 4006 16631 i
*  38.9.129.0/240.0.0.0 100 0 701 4006 16631 i
*  38.9.130.0/240.0.0.0 100 0 701 4006 16631 i
*  38.9.203.0/240.0.0.0 100 0 701 4006 16631 i
*  38.9.204.0/240.0.0.0 100 0 701 4006 16631 i
*  38.9.206.0/240.0.0.0 100 0 701 4006 16631 i
and so on...

Where specifically did you see they 'lost' the connectivity?


charles


On Mon, Feb 24, 2003 at 10:19:44AM -0500, David Reale wrote:
> 
>Has any one else noticed Cogent's loss of UUnet routes.  It appears
>that they may have lost UUnet early Friday.
> 
> 
>David


Re: Symantec detected Slammer worm "hours" before

2003-02-24 Thread David Howe

> http://www.theregister.co.uk/content/56/29406.html
Interesting.
So they meant they got IDS "hits" hours before anyone posted a full
description of the attacks to bugtraq when they said they had detected
the worm hours before it spread?
That's a novel use of english :)




RE: Homeland Security Alert System

2003-02-24 Thread Sean Donelan

On Mon, 24 Feb 2003, St. Clair, James wrote:
> ..Once again, reason to pursue getting involved with the Telecomm ISAC.

Or FIRST, IT-ISAC, MSC-ISAC, WW-ISAC, ISP-ISAC, IOPS, 




Re: untied

2003-02-24 Thread todd glassey

I just called the IT help desk at corporate HQ (847-700-4000) and forwarded
them the summary of the groups concerns, so its up to UAL now what to do
about this.

Todd Glassey

- Original Message -
From: "Ron da Silva" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>
Sent: Monday, February 24, 2003 6:55 AM
Subject: Re: untied


>
>
> Hmm...I've called one of their 800's before and had an
> option to select "3" to complain (er I mean talk to someone)
> about their website.  Maybe you can reach someone who
> knows someone with a clue that way...
>
> -ron



Re: Symantec detected Slammer worm "hours" before

2003-02-24 Thread Glen Fillmore

Another anomaly detection product and its proactive/reactive response to the
Slammer Worm.

http://www.q1labs.com/qvision_slammer_white_paper.pdf



Glen

- Original Message -
From: "Terry Baranski" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Sunday, February 23, 2003 4:37 PM
Subject: RE: Symantec detected Slammer worm "hours" before


>
> Apologies if this is old news.  It's from Thursday, but I didn't see it
> until today.
>
> Symantec comes clean Somewhat:
>
> http://www.theregister.co.uk/content/56/29406.html
>
> -Original Message-
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
> Sean Donelan
> Sent: Thursday, February 13, 2003 12:00 PM
> To: [EMAIL PROTECTED]
> Subject: Symantec detected Slammer worm "hours" before
>
>
>
>
> Wow, Symantec is making an amazing claim.  They were able to detect the
> slammer worm "hours" before.  Did anyone receive early alerts from
> Symantec about the SQL slammer worm hours earlier?  Academics have
> estimated the worm spread world-wide, and reached its maximum scanning
> rate in less than 10 minutes.
>
> I assume Symantec has some data to back up their claim.
>
> http://enterprisesecurity.symantec.com/content.cfm?articleid=1985&EID=0
>   "For example, the DeepSight Threat Management System discovered the
>   Slammer worm hours before it began rapidly propagating. Symantec's
>   DeepSight Threat Management System then delivered timely alerts and
>   procedures, enabling administrators to protect against the attack
>   before their environment was compromised."
>



Cogent

2003-02-24 Thread David Reale








Has any one else noticed Cogent’s loss of UUnet routes. 
It appears that they may have lost UUnet early Friday.

 

David 








Re: The good old days (was Re: M$SQL cleanup incentives)

2003-02-24 Thread Peter Salus


Sean,
Plus ca change, plus c'est le meme chose.

Of course the past is with us:  look at Bob 
Metcalfe's RFC 602 (1973).  Have we fixed 
anything over the nearly 30 years?  How 
recently have you seen a password on a Post-It?
How many folks have their spouse's/significant other's/
offspring's name as a password?

How many uninstalled fixes can dance on a port?

Peter


Re: untied

2003-02-24 Thread Ron da Silva


Hmm...I've called one of their 800's before and had an
option to select "3" to complain (er I mean talk to someone)
about their website.  Maybe you can reach someone who
knows someone with a clue that way...

-ron


RE: Homeland Security Alert System

2003-02-24 Thread St. Clair, James

..Once again, reason to pursue getting involved with the Telecomm ISAC.

Jim

-Original Message-
From: Sean Donelan [mailto:[EMAIL PROTECTED]
Sent: Saturday, February 22, 2003 6:47 PM
To: [EMAIL PROTECTED]
Subject: Re: Homeland Security Alert System



I'm certain the government folks working to protect us 24x7 are doing
everything they can, but the fact of the matter is the public alert
systems in the US suck.  Some just suck less.

http://www.nj.com/news/gloucester/index.ssf?/base/news-0/104590500555170.xml

   "Butts said he often finds out about things like the change in the
   national threat level on CNN hours before the Communications Center
   receives a teletype about it."

Butts is the Gloucester County Emergency Response Coordinator including
the county 9-1-1 communications center.


ISPs and other communication providers should be prepared to share
information directly and quickly with each other.  If you wait to hear
from government officials to decide what sanitized information to share,
it will be hours later.  If ever.


Re: 223.255.255.0/24 (fwd)

2003-02-24 Thread Sean Donelan


RFC3330 issued in September 2002 does indicate that this address block
is subject to future allocations.  But I think people were expecting
something from the IAB/IETF before IANA actually allocated previous
special use reserved address blocks.  My understanding was RFC3330 was
written by IANA and published by IANA to document existing practices, not
to change previous practices.  Eventually we'll use it.

The simpliest solution is for IANA to inform APNIC that it was an
oversight.  The 223.255.255.0/24 network block within the 223/8 CIDR block
assigned to APNIC is still IANA-RESERVED per RFC3330 and previous
practice; and not allocated for APNIC's use at this time.

Its probably easier for APNIC to flag the 223.255.255.0/24 network within
the CIDR block 223/8 as IANA-RESERVED in the APNIC database just like
ARIN does with the other IANA-RESERVED blocks in ARIN's database; rather
than do the ugly CIDR block breaking of 223.0.0.0-223.255.254.255 and
223.255.255.0-223-255.255.255.  But that is a decision for APNIC.


On Mon, 24 Feb 2003, Geoff Huston wrote:

> My interpretation of this is that the IETF, by publishing an RFC with an
> "IANA Considerations" section can nominate that an address block
> declared allocatable under certain criteria, or they can "reserve" the prefix.
>
> "reserving" in my mind constrains IANA from undertaking any activity
> on this block, and this is the state until the IETF elects to produce
> a successor document with an IANA Considerations section that nominates
> some other status to the block.
>
> "Reserved" blocks in my opinion cannot be passed to RIRs, or anyone
> else - the IANA cannot do anything with the block other than register its
> reserved status, and this can only be undone by an action of the IETF.
>
> Hence, my reading of  the IANA registry:
>  http://www.iana.org/assignments/ipv4-address-space
> is that this is a flawed implementation of the instructions in RFC 3330,
> and that
> the 233.255.255.0/24  should be listed IDENTICALLY to 128.0.0.0/16
>
> i.e. its status is actually:
>   223.255.255/25 IANA - Reserved - RFC 3330
>
> if the IANA is to consistently act upon RFC 3330 (as indeed it should)
>
> Perhaps the IETF folk on this message should review the RFC and the IANA
> registry and see if they agree with this interpretation, and make their
> conclusion
> as to the accuracy of the registry as it is currently published:
>
>("223/8 Feb 03 APNIC (whois.apnic.net)")
>
> My view is that this block as properly "Reserved", and that the "subject to
> allocation"
> is an addendum that indicates a forward intention of the IETF, but not a
> capability
> for any IANA action.
>
> As my only humble suggestion, perhaps the best thing right now is for the
> APNIC folk
> to refrain from any assignment actions regarding this prefix until the IETF
> folk and the
> IANA sort out this inconsistency in the interpretation of RFC 3330.
>
>Geoff
>
>
>
> >Date: Mon, 24 Feb 2003 00:32:47 -0500 (EST)
> >From: Sean Donelan <>
> >To:
> >Cc:
> >Subject: Re: 223.255.255.0/24
> >
> >On Sun, 23 Feb 2003 [EMAIL PROTECTED] wrote:
> > >   why would an APNIC/AP region specific issue need to be discussed
> > >   on the NANOG list and not the RIPE/AFNOG/et.al. regional ops lists?
> > >   This is a prefix delegated to the APregion and so they should be
> > >   the ones who set the policies for the prefixes they are responsible
> > >   for. I appreciate their willingness to share the outcome of their
> > >   deliberations, but why NAites have any special say in AP policies
> > >   is a bit beyond me.
> >
> >The question is really whether IANA properly implemented the relevant
> >RFC's by delagating a block containing a reserved special use address to a
> >registry without maintaining the previous reservations on those addresses.
> >
> >Its not up to APNIC how to handle the reserved special use addresses, just
> >like the other special use addresses in ARIN's space are really outside
> >of ARIN's scope.  ARIN can't re-assign special use addresses in "its"
> >space for other purposes. Nor should APNIC or RIPE or LANIC or any other
> >registry which is assigned a /8 block containing special use addresses.
> >
> >Its not APNIC bashing.  If the ARIN board got to gether and decided to
> >assign 128.0.0.0/16 I think folks would be raising questions about ARIN.
> >
> >IANA should have properly excluded the IANA reserved special use block
> >from the delegation to APNIC, just like the other reserved special use
> >blocks are reserved from ARIN's use.
>
>
>
>



The good old days (was Re: M$SQL cleanup incentives)

2003-02-24 Thread Sean Donelan

On Sat, 22 Feb 2003, William Allen Simpson wrote:
> > I see. So you're still filtering port 25 from the Morris sendmail worm.
>
> Funny thing, I was a researcher visiting at Cornell, and had just left
> in the car for the 9.5 hour drive home when it struck.  I've often
> wished I'd stuck around for a few more hours for the excitement.
>
> Anyway, we didn't need to put in a long term block, as everyone took
> down their systems and cleaned them.  I didn't even find out about the
> problem until over a day later, by which time it was long gone.
>
> Ah, the days when we all cooperated

In 1988 we had ad-hoc responses, with people posting to various USENET
newsgroups or some mailing lists still working, about what they were
seeing and how to fix it.  There was no CERT, BBN (and others)
disconnected from the net (and took many  people downstream with them),
even though most people knew each other they didn't all have alternate
contact information, and most of the methods the Morris worm used in 1988
are still being used *effectively* today.

1) Backdoor in SENDMAIL
2) Buffer overflow in Fingerd
3) Password guessing in Rsh/Rexec

Some people blocked the ports used.  Some people still block ports such
as Finger (79) and rsh/rexec (513/514).  But generally ports were blocked
by the local institution, not on the ARPANET.

The version numbers change, the executables change, but the basic problems
haven't changed in 30 years.

We still have backdoors, buffer overflows and pasword guessing. We still
have ad-hoc response by people sharing solutions on mailing lists. The
people who cut themselves off from the open process are still slower to
get stuff fixed. And we still have weak methods for contacting people
through alternate methods.

I wish it was as easy as paying a managed security company to watch out
for me.  But unfortunately, paying several thousand dollars for the
privilege of getting "confidential alerts" which look amazingly similar
to what I wrote on a public mailing list a few hours earlier is a bit
silly.