RED ALERT! heads up Quick security alert

2003-02-27 Thread blitz
SRI if this is OT, BUT, its a security related subject.



Since most of us deal with UPS this info may be helpful.





---
FYI ...
Quick security alert: $32,000 worth of UPS uniforms have been purchased
over the last 30 days by person(s) unknown on eBay. Law enforcement is
working the case however no suspect(s) have been identified. Subjects may
try to gain facility access by wearing these uniforms.
If anyone has suspicions about a UPS delivery (i.e., no truck but driver,
no UPS identification, etc.), contact UPS to verify employment.
URGENT
N.J. OFFICE OF COUNTER-TERRORISM ADVISORY
Re: POSSIBLE IMPERSONATION OF UPS PERSONNEL SEEKING ACCESS TO
BUILDINGS
The New Jersey Office of Counter-Terrorism has received a report of an
attempt by an unknown individual to enter a government facility by
falsely posing as an employee of the United Parcel Service. Based on
this incident, security personnel should exercise heightened vigilance
when screening all delivery personnel at the entrances to all buildings and
when accepting deliveries. Such measures should include careful inspection
of credentials and identification of all delivery personnel to ensure that
they are who they purport to be.



Re: RED ALERT! heads up Quick security alert

2003-02-27 Thread David Lesher

Unnamed Administration sources reported that blitz said:
 
 
 SRI if this is OT, BUT, its a security related subject.
 
 
 
 Since most of us deal with UPS this info may be helpful.
 
 
 
 
 
 ---
 FYI ...
 
 Quick security alert: $32,000 worth of UPS uniforms have been purchased
 over the last 30 days by person(s) unknown on eBay. Law enforcement is
 working the case however no suspect(s) have been identified. Subjects may
 try to gain facility access by wearing these uniforms.
 If anyone has suspicions about a UPS delivery (i.e., no truck but driver,
 no UPS identification, etc.), contact UPS to verify employment.




Cite? Surely you can search eBay's completed sales and find
the item numbers


Hint:
See alt.folklore.urban for this and and otherslike the
bathtub and missing kidneys, JATO car, Capt. Hook...






-- 
A host is a host from coast to [EMAIL PROTECTED]
 no one will talk to a host that's close[v].(301) 56-LINUX
Unless the host (that isn't close).pob 1433
is busy, hung or dead20915-1433


RIPE Down or DOSed ?

2003-02-27 Thread Marshall Eubanks
Can anyone else get to ripe.net ?
I cannot seem to access the whois or any other service (my ripe traffic 
goes through Sprint).
When I ping peach.ripe.net, I get 90%+ missing packets + destination 
host unreachable
from inside Sprint.

 Regards
 Marshall Eubanks


Re: RIPE Down or DOSed ?

2003-02-27 Thread Jack Bates

From: Marshall Eubanks 

 
 Can anyone else get to ripe.net ?
 I cannot seem to access the whois or any other service (my ripe traffic 
 goes through Sprint).
 When I ping peach.ripe.net, I get 90%+ missing packets + destination 
 host unreachable
 from inside Sprint.
 

The same goes for me via qwest/Level3.
peach.ripe.net PING Statistics
24 packets transmitted, 3 packets received, 87% packet loss
round-trip (ms)  min/avg/max = 127/127/127

-Jack



Re: RIPE Down or DOSed ?

2003-02-27 Thread Stephen J. Wilcox

I'm a bit closer than yuo,

we see multiple flaps on their routes. 

 25396 15703 12859 
193.109.219.130 from 193.109.219.130 (213.160.111.1)
  Origin IGP, localpref 150, valid, external
  Community: 6320:1004 6320:2002 6320:21238 15703:22001 25396:15703 
  Dampinfo: penalty 441, flapped 1 times in 00:02:46
  7176 , (suppressed due to dampening)
195.66.224.74 from 195.66.224.74 (195.16.160.29)
  Origin IGP, metric 1090, localpref 100, valid, external
  Community: 6320:1004 6320:2003 6320:7176
  Dampinfo: penalty 3298, flapped 14 times in 00:54:45, reuse in 00:32:00
  1136 
195.66.224.163 from 195.66.224.163 (194.151.224.192)
  Origin IGP, metric 70, localpref 150, valid, external, best
  Community: 6320:1004 6320:2002 6320:5459
  Dampinfo: penalty 1899, flapped 7 times in 01:02:51
  6461 12859 
208.185.188.165 from 208.185.188.165 (207.126.96.50)
  Origin IGP, metric 721, localpref 150, valid, external
  Community: 6320:1004 6320:2002 6320:3000
  6461 12859 
195.66.224.76 from 195.66.224.76 (209.249.254.202)
  Origin IGP, metric 741, localpref 150, valid, external
  Community: 6320:1004 6320:2002 6320:5459
  13237 12859 
195.66.224.99 from 195.66.224.99 (80.245.35.6)
  Origin IGP, metric 20, localpref 150, valid, external
  Community: 6320:1004 6320:2002 6320:5459 12859:1000 12859:4000
  Dampinfo: penalty 875, flapped 1 times in 00:02:54
  3291  (history entry)
195.66.224.14 from 195.66.224.14 (154.14.65.2)
  Origin IGP, metric 20, localpref 150, external
  Community: 6320:1004 6320:2002 6320:5459
  Dampinfo: penalty 1001, flapped 5 times in 01:03:26


On Thu, 27 Feb 2003, Marshall Eubanks wrote:

 
 Can anyone else get to ripe.net ?
 I cannot seem to access the whois or any other service (my ripe traffic 
 goes through Sprint).
 When I ping peach.ripe.net, I get 90%+ missing packets + destination 
 host unreachable
 from inside Sprint.
 
 
   Regards
   Marshall Eubanks
 
 



Fw: RIPE Down or DOSed ?

2003-02-27 Thread Jack Bates

From: Remco van de Meent [EMAIL PROTECTED]


 [I cannot post on nanog hence this private mail]
 
 
 RIPE NCC just sent an email to the AMS-IX list stating that they are 
 currently experiencing an ICMP DDOS attack.
 
 
 
 cheers, Remco.




Re: RIPE Down or DOSed ?

2003-02-27 Thread hostmaster



same here.
both for 193.0.0.203 and 193.0.0.193
the buck stops at the KPN Internet Operator at 195.190.227.37

-
Bert




Re: RIPE Down or DOSed ?

2003-02-27 Thread hostmaster

back to normal here

AMS-IX 193.194.136.2
RIPE 193.0.0.193

-

Bert


Change in homeland security threat level

2003-02-27 Thread Rob Thomas

Hi, NANOGers.

For those of you tracking the DHS threat level - The Homeland Security
threat level is very likely to be lowered one notch today, according
to Marcus Sachs.

Thanks,
Rob.
-- 
Rob Thomas
http://www.cymru.com
ASSERT(coffee != empty);




Lowering the Homeland Security Advisory Threat Level

2003-02-27 Thread Sean Donelan


CNN (and most other news sources) are reporting that the Department of
Homeland Security is lowering the threat level from Orange to Yellow
later today.

There is no sign of any change on the Department of Homeland Security web
site yet.  Has any ISAC given out information to its members?




Re: RIPE Down or DOSed ?

2003-02-27 Thread kai

And on a related topic (whois.ripe.net almost unreachable, along with
the rest of RIPE): rwhois.level3.net:4321 as been MIA or AWOL for
about 4 days: Level3 was informed, but seems to have some good reasons
of their own not to fix this

$ telnet rwhois.level3.net 4321
Trying 209.244.1.179...
telnet: Unable to connect to remote host: Connection refused



Re: RIPE Down or DOSed ?

2003-02-27 Thread Subhi S Hashwa

Thursday, February 27, 2003, 3:04:55 PM, Marshall wrote:

Got told by an insider they are under a very nasty icmp attack, I guess
they're little busy to get the chance to reply.


-Subhi

 Can anyone else get to ripe.net ?
 I cannot seem to access the whois or any other service (my ripe traffic 
 goes through Sprint).
 When I ping peach.ripe.net, I get 90%+ missing packets + destination 
 host unreachable
 from inside Sprint.


   Regards
   Marshall Eubanks



-- 
Best regards,
 Subhi S Hashwa mailto:[EMAIL PROTECTED]
 Operations Manager
 Electronic Corner Limited




Re: WorldCom's DWDM capabilities/OC12 SONET vs DWDM

2003-02-27 Thread Daniel Concepcion

Hi,

On Thursday 27 February 2003 18:16, Max's Lists wrote:
 thanks all for your input.

 on closer examination I found that the only two countries in Europe where
 WorldCom seems to sell wavelength services retail are Belgium and
 Luxemburg. There is some talk about selling DWDM wholesale in Spain, but I
 am afraid this is just boilerplate language.

WorldCom don't  sell DWDM in Spain.  They use capacity from other well know 
provideers. 

 if anyone knows anything about how to figure out DWDM prices in those two
 countires ... i would be greatly appreciative

If you need something in Spain mailme off list.


Regards,
Daniel



RIPE NCC network affected by the DDoS attack (fwd)

2003-02-27 Thread Daniel Diaz


--- Forwarded Message

Date: Thu, 27 Feb 2003 18:18:25 +0100
From: Andrei Robachevsky [EMAIL PROTECTED]
Sender:   [EMAIL PROTECTED]
To:   [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject:  RIPE NCC network affected by the DDoS attack

Dear Colleagues,

Starting from 14:00 UTC today, 27 February, RIPE NCC network suffered a
large DDoS attack. It was a distributed ICMP echo attack.

The attack caused various congestion related problems for the RIPE NCC's
network, to the extent that our BGP peering sessions were affected, and
non-ICMP traffic was being randomly dropped.

The attack was successfully mitigated with cooperation of our peer
networks at AMS-IX. Network condition returned back to normal at 16:30 UTC.

As a result some of our services, including www.ripe.net (web),
whois.ripe.net (RIPE Database), ns.ripe.net (DNS) and ftp.ripe.net (FTP)
were not accessible during this timeframe. Now all services are back to
normal.


Regards,

Andrei Robachevsky
CTO, RIPE NCC



--- End of Forwarded Message





Re: RIPE Down or DOSed ?

2003-02-27 Thread Will Yardley

On Thu, Feb 27, 2003 at 11:09:19AM -0500, [EMAIL PROTECTED] wrote:
 
 And on a related topic (whois.ripe.net almost unreachable, along with
 the rest of RIPE): rwhois.level3.net:4321 as been MIA or AWOL for
 about 4 days: Level3 was informed, but seems to have some good reasons
 of their own not to fix this
 
 $ telnet rwhois.level3.net 4321
 Trying 209.244.1.179...
 telnet: Unable to connect to remote host: Connection refused

There is no public access to rwhois.level3.net (it worked at one point,
but, accurding to Level3, not intentionally). They say that they don't
have to make this information available to anyone except ARIN. I was
always under the impression that delegations had to be publicly visible,
but looking at ARIN's policy more closely, it seems that the information
only has to be available to ARIN.

-- 
Since when is skepticism un-American?
Dissent's not treason but they talk like it's the same...
(Sleater-Kinney - Combat Rock)




Re: RIPE Down or DOSed ?

2003-02-27 Thread Dave Israel


On 2/27/2003 at 10:44:49 -0800, Will Yardley said:
 
 On Thu, Feb 27, 2003 at 11:09:19AM -0500, [EMAIL PROTECTED] wrote:
  
  And on a related topic (whois.ripe.net almost unreachable, along with
  the rest of RIPE): rwhois.level3.net:4321 as been MIA or AWOL for
  about 4 days: Level3 was informed, but seems to have some good reasons
  of their own not to fix this
  
  $ telnet rwhois.level3.net 4321
  Trying 209.244.1.179...
  telnet: Unable to connect to remote host: Connection refused
 
 There is no public access to rwhois.level3.net (it worked at one point,
 but, accurding to Level3, not intentionally). They say that they don't
 have to make this information available to anyone except ARIN. I was
 always under the impression that delegations had to be publicly visible,
 but looking at ARIN's policy more closely, it seems that the information
 only has to be available to ARIN.

If the ARIN server recurses properly, you should be able to pull it
out that way.  So hiding it from everybody but ARIN doesn't make the
information unavailable.  They're probably sheltering themselves from
security concerns in the server.

-Dave



Re: Root server error

2003-02-27 Thread Will Yardley

On Thu, Feb 27, 2003 at 02:21:20PM -0500, Geo. wrote:
 
 Can someone verify something for me?
 
 Do an NSLOOKUP for www.stemtostern.com and stemtostern.com against the
 i.gtld-servers.net
 
 why would the www one resolve?

It's stale glue; i.e., there's a host (nameserver) record for this
address. Delete or modify the record.

jazz% whois www.stemtostern.com

Whois Server Version 1.3

Domain names in the .com and .net domains can now be registered
with many different competing registrars. Go to http://www.internic.net
for detailed information.

   Server Name: WWW.STEMTOSTERN.COM
   IP Address: 216.144.36.50
   Registrar: NETWORK SOLUTIONS, INC.
   Whois Server: whois.networksolutions.com
   Referral URL: http://www.networksolutions.com

jazz% dig @b.gtld-servers.net www.stemtostern.com +norec

;  DiG 9.3.0s20021217  @b.gtld-servers.net www.stemtostern.com +norec
;; global options:  printcmd
;; Got answer:
;; -HEADER- opcode: QUERY, status: NOERROR, id: 57571
;; flags: qr; QUERY: 1, ANSWER: 1, AUTHORITY: 2, ADDITIONAL: 2

;; QUESTION SECTION:
;www.stemtostern.com.   IN  A

;; ANSWER SECTION:
www.stemtostern.com.172800  IN  A   216.144.36.50

;; AUTHORITY SECTION:
stemtostern.com.172800  IN  NS  NS1.NLS.NET.
stemtostern.com.172800  IN  NS  NS2.NLS.NET.

;; ADDITIONAL SECTION:
NS1.NLS.NET.172800  IN  A   216.144.0.10
NS2.NLS.NET.172800  IN  A   216.144.0.11

;; Query time: 17 msec
;; SERVER: 192.33.14.30#53(b.gtld-servers.net)
;; WHEN: Thu Feb 27 11:59:29 2003
;; MSG SIZE  rcvd: 128

-- 
Since when is skepticism un-American?
Dissent's not treason but they talk like it's the same...
(Sleater-Kinney - Combat Rock)




Re: Root server error

2003-02-27 Thread Matt Larson

On Thu, 27 Feb 2003, Geo. wrote:
 Can someone verify something for me?
 
 Do an NSLOOKUP for www.stemtostern.com and stemtostern.com against the
 i.gtld-servers.net
 
 why would the www one resolve?

If an A (or ) record appears in the com or net zones, it's because
it is referenced at least one NS record also in the com and net zones,
i.e., it appears on the right side of an NS record.

This is the case with www.stemtostern.com.  While it is not a name
server for stemtostern.com, it is a name server for
harbormarinetowing.com; please see the dig output below.

Matt
--
Matt Larson [EMAIL PROTECTED]
VeriSign Global Registry Services


;  DiG 9.2.1  +norec @a.gtld-servers.net ns harbormarinetowing.com
;; global options:  printcmd
;; Got answer:
;; -HEADER- opcode: QUERY, status: NOERROR, id: 41821
;; flags: qr; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 2

;; QUESTION SECTION:
;harbormarinetowing.com.IN  NS

;; ANSWER SECTION:
harbormarinetowing.com. 172800  IN  NS  ns.nls.net.
harbormarinetowing.com. 172800  IN  NS  www.stemtostern.com.

;; ADDITIONAL SECTION:
ns.nls.net. 172800  IN  A   216.144.8.10
www.stemtostern.com.172800  IN  A   216.144.36.50

;; Query time: 24 msec
;; SERVER: 192.5.6.30#53(a.gtld-servers.net)
;; WHEN: Thu Feb 27 15:32:09 2003
;; MSG SIZE  rcvd: 126


Re: RIPE Down or DOSed ?

2003-02-27 Thread Kai Schlichting

On 2/27/2003 at 1:44 PM, [EMAIL PROTECTED] (Will Yardley) wrote:

 There is no public access to rwhois.level3.net (it worked at one point,
 but, accurding to Level3, not intentionally). They say that they don't
 have to make this information available to anyone except ARIN. I was
 always under the impression that delegations had to be publicly visible,
 but looking at ARIN's policy more closely, it seems that the information
 only has to be available to ARIN.

Secrecy over a public resource = no oversight = facilitator of abuse.

It has worked as long as I can remember, and them intentionally
shutting it off is completely against letter and spirit of
ARIN's allocation policy: rwhois, or SWIP delegations, but not
none of the above. 7018 Realized this for 12.0.0.0/8 at some
point.

Why do I get the distinct feeling that this move by Level3 is
aimed not at creating greater customer privacy (it never served
POC email addresses), or protecting themselves from getting their
customer base poached by other providers, but at preventing
people from identifying spamming Level3 customers (of which they
seem to have 100's) by organization name and being able to
correlate activity from different netblocks of theirs.

So instead of select prefixes, most longer than /24 appearing in
the various DNSBLs that do manual listing by organization
(Spamhaus SBL, SPEWS, Wirehub), Level3 customers can now look
forward to /24 to /17 knock-outs that should absolutely positive
cover the hiding criminal scum they so willingly receive money
from. And then some. If you are a Level3 customer using Level3
IP space, you might want to expediously insist that your IP space
delegation appears at whois.arin.net properly, or else consider
a new network provider or buying yourself your own /16 on the
grey market^W^W^W^Wacquire a defunct company with a mostly
unused /16.

What did Randy once say?
I welcome my competitors running their networks this way
(paraphrased)



RE: Root server error

2003-02-27 Thread Jeroen Massar

Matt Larson wrote:
 On Thu, 27 Feb 2003, Geo. wrote:
  Can someone verify something for me?
  
  Do an NSLOOKUP for www.stemtostern.com and stemtostern.com 
 against the
  i.gtld-servers.net
  
  why would the www one resolve?
 
 If an A (or ) record appears in the com or net zones, it's because
 it is referenced at least one NS record also in the com and net zones,
 i.e., it appears on the right side of an NS record.

Is it _finally_ possible then, to get a  record as glue into
the com/net/org zones?

 This is the case with www.stemtostern.com.  While it is not a name
 server for stemtostern.com, it is a name server for
 harbormarinetowing.com; please see the dig output below.
 
 Matt
 --
 Matt Larson [EMAIL PROTECTED]
 VeriSign Global Registry Services

Greets,
 Jeroen



Cidera will be back up

2003-02-27 Thread Ringdahl, Dwight (WebUseNet)

By midnight, providing the bandwidth challenged UseNet feeds again.
WebUseNet will make an announcement of our business deal with Cidera in the
near future. We are glad we were able to help save this important resource
on the Internet.

Dwight Ringdahl
WebUseNet


ebgp-multihop

2003-02-27 Thread Tim Rand



Hi -
I have searched the archives but have not found an answer to my question - 
is there any danger in using excessively high TTL values with 
ebgp-multihop? For example, neighbor x.x.x.x ebgp-multihop 
255 - 255 is generally much higher than needed, but is there 
any risk/danger ?? Thanks in advance. - Tim

 
Tim 
Rand 
 
Network 
Engineer 
 
OHSU Information Technology 
Group 
 ph: 
503.418.1045 
fx: 503.494.7143


Re: ebgp-multihop

2003-02-27 Thread Iljitsch van Beijnum

On Thu, 27 Feb 2003, Tim Rand wrote:

 I have searched the archives but have not found an answer to my question - is there 
 any danger in using excessively high TTL values with ebgp-multihop?For example, 
 neighbor x.x.x.x ebgp-multihop 255   -  255 is generally much higher than needed, 
 but is there any risk/danger ??Thanks in advance.   - Tim

If you use this for a regular BGP feed (one where you actually send
traffic as per the routes received) you can get interesting results if
your direct connection to the peer goes down. Your BGP session will
probably survive this and simply continue to run over any other
connection(s) to the net you have. You can of course make sure this
doesn't happen by creative application of static routes with different
administrative distances (or even a filter).



Re: ebgp-multihop

2003-02-27 Thread Steve Carter

* Tim Rand [EMAIL PROTECTED] [030227 16:39]:
 Hi -
 I have searched the archives but have not found an answer to my question
 - is there any danger in using excessively high TTL values with
 ebgp-multihop?  For example, neighbor x.x.x.x ebgp-multihop 255 - 255 is
 generally much higher than needed, but is there any risk/danger ??  
 Thanks in advance.  - Tim

There is a potential for blackholing traffic should you be dual (or multi)  
homed and if the ebgp-multihop session were able to re-establish over
another path.  Better to keep it close to what you'd expect your maximum
number of hops to be to reduce the potential for undesirable modes.

-Steve


Re: ebgp-multihop

2003-02-27 Thread Jack Bates



From: Tim 
Rand 



  
  Hi -
  I have searched the archives but have not found an answer to my question 
  - is there any danger in using excessively high TTL values with 
  ebgp-multihop? For example, neighbor x.x.x.x ebgp-multihop 
  255 - 255 is generally much higher than needed, but is there 
  any risk/danger ?? Thanks in advance. - 
  Tim

The number of hops in an ebgp-multihop scenario 
isn't usually the concern. When using ebgp sessions to null route baddies, the 
peer can be an unspecified number of hops away. I would consider 255 to be 
overkill, but not much harm. In normal routing, I would try to keep the hop 
count within 1 or 2. It's just a good practice. Remember, every router between 
the two sessions has to also know the route. Perhaps some of the older folks 
have some better tidbits of advice.

-Jack


Re: Root server error

2003-02-27 Thread Owen DeLong
Perhaps it is GLUE for an NS record.

Owen

--On Thursday, February 27, 2003 2:21 PM -0500 Geo. [EMAIL PROTECTED] 
wrote:



Can someone verify something for me?

Do an NSLOOKUP for www.stemtostern.com and stemtostern.com against the
i.gtld-servers.net
why would the www one resolve?

Geo.





Re: RIPE Down or DOSed ?

2003-02-27 Thread jlewis

On Thu, 27 Feb 2003, Kai Schlichting wrote:

 Secrecy over a public resource = no oversight = facilitator of abuse.
 
 Why do I get the distinct feeling that this move by Level3 is
 aimed not at creating greater customer privacy (it never served
 POC email addresses), or protecting themselves from getting their
 customer base poached by other providers, but at preventing
 people from identifying spamming Level3 customers (of which they
 seem to have 100's) by organization name and being able to
 correlate activity from different netblocks of theirs.

Though I agree, Level3 seems to host a good number of spammers, they're by
no means the only guilty party.  Pulled at random from recent spams I've
submitted to NJABL are 69.6.4.104, 69.6.4.114, and 69.6.4.156.  whois
@arin.net yields the following:

...
NetRange:   69.6.0.0 - 69.6.63.255
CIDR:   69.6.0.0/18
NetName:WHOLE-2
NetHandle:  NET-69-6-0-0-1
Parent: NET-69-0-0-0-0
NetType:Direct Allocation
NameServer: NS1.WHOLESALEBANDWIDTH.COM
NameServer: NS2.WHOLESALEBANDWIDTH.COM
...

Where are the swips?  The rest of that record makes no mention of an
rwhois server.  Doing a bunch of whois requests for IPs in that block, I
found only one swip (for a /21).  I realize the ARIN regs don't seem to
require that reassignment info be made available to the public (just to
ARIN), but using your innocent customers (if there are any) as a shield to
hide your spammer customers is just wrong.  Should I block 69.6.4.0/24
from sending email into my systems?  69.6.0.0/18?

http://www.njabl.org/cgi-bin/lookup.cgi?query=69.6.4.104
http://www.njabl.org/cgi-bin/lookup.cgi?query=69.6.4.114
http://www.njabl.org/cgi-bin/lookup.cgi?query=69.6.4.156

--
 Jon Lewis [EMAIL PROTECTED]|  I route
 System Administrator|  therefore you are
 Atlantic Net|  
_ http://www.lewis.org/~jlewis/pgp for PGP public key_



Re: ebgp-multihop

2003-02-27 Thread David Barak

No!

eBGP multihop carries with it the implicit possiblity
of session highjacking - in a normal (Multihop=1)
session, the router would not be able to find a
duplicate neighbor with the specified IP address
directly connected.  Obviously, once you're saying
that the neighbor could be anywhere in the world,
what's to prevent me assigning my home Macintosh with
a second IP address and injecting whatever I want into
your network?

Second, Multihop is really a kludge: eBGP is ideally
run at the edge of a network across a point-to-point
(or shared) medium, and there really shouldn't be
multiple paths to eBGP neighbors.  If your link to ISP
X goes away, do you really want to have your router
think that ISP X is still available?  Or would you
rather just fail-over to a backup path?

iBGP is another matter - there you want 255, b/c you
want the sessions to stay up even in the event of a
backbone link flap.


--- Iljitsch van Beijnum [EMAIL PROTECTED] wrote:
 
 On Thu, 27 Feb 2003, Tim Rand wrote:
 
  I have searched the archives but have not found an
 answer to my question - is there any danger in using
 excessively high TTL values with ebgp-multihop?   
 For example, neighbor x.x.x.x ebgp-multihop 255   - 
 255 is generally much higher than needed, but is
 there any risk/danger ??Thanks in advance.   -
 Tim
 
 If you use this for a regular BGP feed (one where
 you actually send
 traffic as per the routes received) you can get
 interesting results if
 your direct connection to the peer goes down. Your
 BGP session will
 probably survive this and simply continue to run
 over any other
 connection(s) to the net you have. You can of course
 make sure this
 doesn't happen by creative application of static
 routes with different
 administrative distances (or even a filter).
 

=
David Barak
-fully RFC 1925 compliant-

__
Do you Yahoo!?
Yahoo! Tax Center - forms, calculators, tips, more
http://taxes.yahoo.com/


Re: ebgp-multihop

2003-02-27 Thread Jared Mauch

On Thu, Feb 27, 2003 at 07:29:29PM -0800, David Barak wrote:
 
 No!
 
 eBGP multihop carries with it the implicit possiblity
 of session highjacking - in a normal (Multihop=1)

Everyone uses md5 signature/bgp password/
authentication keys correct?

That means this isn't an issue :)

 session, the router would not be able to find a
 duplicate neighbor with the specified IP address
 directly connected.  Obviously, once you're saying
 that the neighbor could be anywhere in the world,
 what's to prevent me assigning my home Macintosh with
 a second IP address and injecting whatever I want into
 your network?
 
 Second, Multihop is really a kludge: eBGP is ideally
 run at the edge of a network across a point-to-point
 (or shared) medium, and there really shouldn't be
 multiple paths to eBGP neighbors.  If your link to ISP
 X goes away, do you really want to have your router
 think that ISP X is still available?  Or would you
 rather just fail-over to a backup path?
 
 iBGP is another matter - there you want 255, b/c you
 want the sessions to stay up even in the event of a
 backbone link flap.

Depends on the size of the flap and router
convergence times.

- Jared


anti-spam vs network abuse

2003-02-27 Thread jlewis

We (Atlantic.Net) have gotten a flurry of abuse complaints from people 
who's systems have been scanned by 209.208.0.15 (rt.njabl.org...a DNSBL 
hosted on our network).  I'm hoping the new PTR record will head off many 
complaints now.

For the past 15 months, NJABL has reactively tested systems that have
connected to participating SMTP servers to see if those systems are open
relays.  Just over a week ago, NJABL added open proxy testing to its relay
testing software.  The proxy testing checks for a variety of common proxy
software/protocols on about 20 different ports simultaneously.  This is
apparently setting off some IDS/firewall alarms.

We do not consider what NJABL does abuse, and we reply to all the 
complaints explaining that the complainant should go have a look at 
http://njabl.org/ and hopefully they'll understand why their system was 
scanned.

This sort of activity is becoming more common / mainstream, so people
ought to just get used to it.  Road Runner is doing the same thing
(according to http://sec.rr.com/probing.htm) which is pretty ironic given
how their security department has gotten along with (or not) various
DNSBLs in the past.

BTW...in the week that NJABL has been testing for open proxies, more than
18000 have been detected, pretty much all of which are actively being
abused by spammers, else mail would not have come through them.

--
 Jon Lewis [EMAIL PROTECTED]|  I route
 System Administrator|  therefore you are
 Atlantic Net|  
_ http://www.lewis.org/~jlewis/pgp for PGP public key_



Re: anti-spam vs network abuse

2003-02-27 Thread Jack Bates

From: [EMAIL PROTECTED]


 We (Atlantic.Net) have gotten a flurry of abuse complaints from people
 who's systems have been scanned by 209.208.0.15 (rt.njabl.org...a DNSBL
 hosted on our network).  I'm hoping the new PTR record will head off many
 complaints now.

 For the past 15 months, NJABL has reactively tested systems that have
 connected to participating SMTP servers to see if those systems are open
 relays.  Just over a week ago, NJABL added open proxy testing to its relay
 testing software.  The proxy testing checks for a variety of common proxy
 software/protocols on about 20 different ports simultaneously.  This is
 apparently setting off some IDS/firewall alarms.

 We do not consider what NJABL does abuse, and we reply to all the

Ahh, yes. The age old debate. So long as you, their provider, doesn't
consider it abuse, they should be relatively safe. Obviously, there are some
net blocks up to stop the probes. There always are and always will be.
Networks don't like scans. One thing I'll say about NJABL, it's probably the
most accurate list for what it does. With the added proxy testing, they'll
get more people using the list, along with more complaints. I'll be adding
my log IP's to that list soon enough.

-Jack



Re: anti-spam vs network abuse

2003-02-27 Thread David Schwartz

On Thu, 27 Feb 2003 22:36:37 -0500 (EST), [EMAIL PROTECTED] wrote:

This sort of activity is becoming more common / mainstream, so
people
ought to just get used to it.  Road Runner is doing the same thing
(according to http://sec.rr.com/probing.htm) which is pretty ironic
given
how their security department has gotten along with (or not) various
DNSBLs in the past.

It has always been my opinion that if somebody connects to you, they
are implicitly granting you the right to connect back to them on
well-known ports. I have discussed this opinion with several dozen
people and have yet to find one who disagrees. (Though I'm sure
they're probably out there.)

I've dealt with any number of abuse complaints, many from
governmental and quasi-governmental group. They've all accepted my
cut/pasted explanation and we've been whitelisted by several such
organizations.

I often use the following as the 'meat' paragraph of my reply:

In accord with our terms of service, when someone makes a connection
to one of our machines, we make connections back to them to ensure
they're not connecting through an open proxy. These connections are
to each of the ports on which such proxies commonly run and some
ports may require more than one connection to test multiple
protocols. We never do such a probe except as a response to a
connection made to us.

--
David Schwartz
[EMAIL PROTECTED]




Q: How to avoid retaining portable class C?

2003-02-27 Thread scott.davis

I realize this is a little too non-operational for the list, but I
stupervise a 750 desktop net with a portable class C when I haven't lost
myself in the pub.  We use about (approximately) 6 of those 253 useable
addr's.  I could cut that down to 4, I think.

I don't think we're worthy of the cross-ISP portable subnet.  The company
is nearly 100 years old (in Canada!) but we just use email/user surf.

Can anyone share advice about how I might communicate this is generally
bad 'cause of BGP table size issues to a non-technical manager..?  This
individual thinks our netblock is a continued reason for his/her
employment, as per usual.

Off-List replies would be appreciated.

(416) 432-4334.  Anytime.  -- Scott.