Photographs of Iraqi telecomunication facilities

2003-03-28 Thread Sean Donelan

The Washington Post has on-line photographs of several of the major
telecommunication facilities in Bahgdad.

http://www.washingtonpost.com/wp-srv/inatl/longterm/fogofwar/index/photos.htm

The Washington Times is reporting that US had infilitrated the main
telecommunication exchange in Baghdad, and wiretapped some of the
circuits.  Which may explain why it wasn't attacked earlier.




The Cidr Report

2003-03-28 Thread cidr-report

This report has been generated at Fri Mar 28 21:50:09 2003 AEST.
The report analyses the BGP Routing Table of an AS4637 (Reach) router
and generates a report on aggregation potential within the table.

Check http://www.cidr-report.org/as4637 for a current version of this report.

Recent Table History
Date  PrefixesCIDR Agg
21-03-03120815   86434
22-03-03120741   86424
23-03-03120589   86556
24-03-03120679   86593
25-03-03120712   86324
26-03-03120739   86276
27-03-03120877   86281
28-03-03120855   86349


AS Summary
 14836  Number of ASes in routing system
  5851  Number of ASes announcing only one prefix
  1555  Largest number of prefixes announced by an AS
AS701  : ALTERNET-AS UUNET Technologies, Inc.
  73048064  Largest address span announced by an AS (/32s)
AS568  : SUMNET-AS DISO-UNRRA


Aggregation Summary
The algorithm used in this report proposes aggregation only
when there is a precise match using the AS path, so as 
to preserve traffic transit policies. Aggregation is also
proposed across non-advertised address space ('holes').

 --- 28Mar03 ---
ASnumNetsNow NetsAggr  NetGain   % Gain   Description

Table 121000863623463828.6%   All ASes

AS3908  1048  537  51148.8%   SUPERNETASBLK SuperNet, Inc.
AS18566  509   14  49597.2%   COVAD Covad Communications
AS4151   585  107  47881.7%   USDA-1 USDA
AS701   1555 1115  44028.3%   ALTERNET-AS UUNET
   Technologies, Inc.
AS7843   599  198  40166.9%   ADELPHIA-AS Adelphia Corp.
AS7018  1346  952  39429.3%   ATT-INTERNET4 ATT WorldNet
   Services
AS4323   561  176  38568.6%   TW-COMM Time Warner
   Communications, Inc.
AS1221  1109  813  29626.7%   ASN-TELSTRA Telstra Pty Ltd
AS1239   968  688  28028.9%   SPRINTLINK Sprint
AS6197   476  202  27457.6%   BATI-ATL BellSouth Network
   Solutions, Inc
AS22927  286   14  27295.1%   AR-TEAR2-LACNIC TELEFONICA DE
   ARGENTINA
AS6198   450  182  26859.6%   BATI-MIA BellSouth Network
   Solutions, Inc
AS705534  268  26649.8%   ASN-ALTERNET UUNET
   Technologies, Inc.
AS4355   382  116  26669.6%   ERMS-EARTHLNK EARTHLINK, INC
AS1  685  429  25637.4%   GNTY-1 Genuity
AS4814   267   15  25294.4%   CHINANET-BEIJING-AP China
   Telecom (Group)
AS2386   499  249  25050.1%   INS-AS ATT Data
   Communications Services
AS17676  235   28  20788.1%   GIGAINFRA XTAGE CORPORATION
AS22291  239   39  20083.7%   CHARTER-LA Charter
   Communications
AS27364  265   65  20075.5%   ACS-INTERNET Armstrong Cable
   Services
AS7132   674  475  19929.5%   SBIS-AS SBC Internet Services
   - Southwest
AS4134   316  123  19361.1%   CHINANET-BACKBONE
   No.31,Jin-rong Street
AS22773  1978  18995.9%   CCINET-2 Cox Communications
   Inc. Atlanta
AS209526  339  18735.6%   ASN-QWEST Qwest
AS690503  316  18737.2%   MERIT-AS-27 Merit Network Inc.
AS6347   373  193  18048.3%   DIAMOND SAVVIS Communications
   Corporation
AS3561   520  344  17633.8%   CWUSA Cable  Wireless USA
AS2048   259   87  17266.4%   LANET-1 State of Louisiana
AS17557  375  214  16142.9%   PKTELECOM-AS-AP Pakistan
   Telecom
AS6140   290  140  15051.7%   IMPSAT-USA ImpSat

Total  16631 8446 818549.2%   Top 30 total



Please see http://www.cidr-report.org for the full report


Copies of this report are mailed to:
  [EMAIL PROTECTED]
  [EMAIL PROTECTED]
  [EMAIL PROTECTED]
  [EMAIL PROTECTED]
  [EMAIL PROTECTED]


Re: Using Policy Routing to stop DoS attacks

2003-03-28 Thread Andre Chapuis

We could ask Cisco and Juniper to add a way of 'artificially' remove networks from the 
CEF table (with an ACL or so). That way, even with loose-RPF, the packet will be 
dropped based on source-address at the ingress without consuming CPU.
Or maybe such a feature already exist
André

At 09:06 25.03.2003 -0500, Christian Liendo wrote:

Looking for advice.

I am sorry if this was discussed before, but I cannot seem to find this.
I want to use source routing as a way to stop a DoS rather than use access-lists.

In other words, lets say I know the source IP (range of IPs) of an attack and they do 
not change.

If the destination stays the same I can easily null route the destination, but what 
if the destination constantly changes. So I have to work based on the source IP.

Depending on the router and the code, if I implement an access-list then the CPU 
utilization shoots through the roof.
What I would like to try and do is use source routing to route that traffic to null. 
I figured it would be easier on the router than an access-list.

Has anyone else tried this successfully on ciscos and junipers?
Is it easier on the CPU than access-lists?
Is there a link I cannot find on cisco or google?

Thanks
Christian Liendo


-
Andre Chapuis
IP+ Engineering
Swisscom Ltd
Genfergasse 14
3050 Bern
+41 31 893 89 61
[EMAIL PROTECTED]
CCIE #6023
--



is this true or... ?

2003-03-28 Thread Tomas Daniska


http://www.theinquirer.net/?article=8595

--
 
Tomas Daniska
systems engineer
Tronet Computer Networks
Plynarenska 5, 829 75 Bratislava, Slovakia
tel: +421 2 58224111, fax: +421 2 58224199
 
A transistor protected by a fast-acting fuse will protect the fuse by
blowing first.



DNS dDos Attack!

2003-03-28 Thread Dan Armstrong

I am sorry if this has come up before, but it seems that one of our name

servers is under some sort of dDos attack.  It seems to be receiving
millions of queries form spoofed IPs, and it is spending all of it's
time sending back icmp unreachables.

It is running bind 4.31 under BSD 4.62STABLE

Help!

Thanks,
Dan.



Re: DNS dDos Attack!

2003-03-28 Thread Stephen J. Wilcox

Personally I'd blackhole the traffic at the entry point and work on finding the 
origin.

Assuming its only one of your name servers you can run with one dead...


On Fri, 28 Mar 2003, Dan Armstrong wrote:

 
 I am sorry if this has come up before, but it seems that one of our name
 
 servers is under some sort of dDos attack.  It seems to be receiving
 millions of queries form spoofed IPs, and it is spending all of it's
 time sending back icmp unreachables.
 
 It is running bind 4.31 under BSD 4.62STABLE
 
 Help!
 
 Thanks,
 Dan.
 
 



Re: is this true or... ?

2003-03-28 Thread Steven M. Bellovin

In message [EMAIL PROTECTED], Tomas 
Daniska writes:


http://www.theinquirer.net/?article=8595


freedom-to-tinker.com, which is the source cited by your link, is 
indeed Ed Felten's.  And I trust Ed.

--Steve Bellovin, http://www.research.att.com/~smb (me)
http://www.wilyhacker.com (2nd edition of Firewalls book)




Re: DNS dDos Attack!

2003-03-28 Thread Dan Armstrong

Sorry, I lied.  We are running 8.34Release

What I cannot figure out is why *our* name server is sending out ICMP
unreachables.  The incoming dns queries are coming from random
destinations

I have blocked icmp 3 incoming from that DMZ as not to overwhelm the CEF in
any other routers, but whoever is doing this has this name server at it's
knees.

Dan.


Eric Whitehill wrote:

 Dan:

 Can you updated your version of BIND and install some acls?

 -Eric

 On Fri, 28 Mar 2003, Dan Armstrong wrote:

  Date: Fri, 28 Mar 2003 09:20:20 -0500
  From: Dan Armstrong [EMAIL PROTECTED]
  To: [EMAIL PROTECTED]
  Subject: DNS dDos Attack!
 
 
  I am sorry if this has come up before, but it seems that one of our name
 
  servers is under some sort of dDos attack.  It seems to be receiving
  millions of queries form spoofed IPs, and it is spending all of it's
  time sending back icmp unreachables.
 
  It is running bind 4.31 under BSD 4.62STABLE
 
  Help!
 
  Thanks,
  Dan.
 
 



Re: DNS dDos Attack!

2003-03-28 Thread Jared Mauch

Dan,

Might I suggest a few things.

1) If you truly want the nanog community to help, perhaps
you wish to post the Ip being attacked as well as a series of
sources, including the names of your upstreams involved as
their security teams haven't helped you and that's the reason
for the post.
2) You probally want to install an icmp rate-limit to
help mitigate this attack.  By saying CEF, I assume you
are using a Cisco router.  Here's a quick example:

interface foo
 rate-limit input access-group 2000 1536000 20 20 conform-action transm
it exceed-action drop

access-list 2000 permit icmp any any

That should drop the icmp down to around a T1s worth.

- Jared

On Fri, Mar 28, 2003 at 09:28:48AM -0500, Dan Armstrong wrote:
 
 Sorry, I lied.  We are running 8.34Release
 
 What I cannot figure out is why *our* name server is sending out ICMP
 unreachables.  The incoming dns queries are coming from random
 destinations
 
 I have blocked icmp 3 incoming from that DMZ as not to overwhelm the CEF in
 any other routers, but whoever is doing this has this name server at it's
 knees.
 
 Dan.
 
 
 Eric Whitehill wrote:
 
  Dan:
 
  Can you updated your version of BIND and install some acls?
 
  -Eric
 
  On Fri, 28 Mar 2003, Dan Armstrong wrote:
 
   Date: Fri, 28 Mar 2003 09:20:20 -0500
   From: Dan Armstrong [EMAIL PROTECTED]
   To: [EMAIL PROTECTED]
   Subject: DNS dDos Attack!
  
  
   I am sorry if this has come up before, but it seems that one of our name
  
   servers is under some sort of dDos attack.  It seems to be receiving
   millions of queries form spoofed IPs, and it is spending all of it's
   time sending back icmp unreachables.
  
   It is running bind 4.31 under BSD 4.62STABLE
  
   Help!
  
   Thanks,
   Dan.
  
  

-- 
Jared Mauch  | pgp key available via finger from [EMAIL PROTECTED]
clue++;  | http://puck.nether.net/~jared/  My statements are only mine.


Re: Using Policy Routing to stop DoS attacks

2003-03-28 Thread Charles H. Gucker

Andre,
Actually it already exists.  But to do it, you need
to ensure you have loose-RPF checking enabled and null-route
the network you want the data dropped for.  Since a null-route
is considered by loose-RPF checking as a bad route, it will
drop the data for you.

thanks,
charles


On Fri, Mar 28, 2003 at 03:08:44PM +0100, Andre Chapuis wrote:
 
 We could ask Cisco and Juniper to add a way of 'artificially' remove networks from 
 the CEF table (with an ACL or so). That way, even with loose-RPF, the packet will be 
 dropped based on source-address at the ingress without consuming CPU.
 Or maybe such a feature already exist
 André
 
 At 09:06 25.03.2003 -0500, Christian Liendo wrote:
 
 Looking for advice.
 
 I am sorry if this was discussed before, but I cannot seem to find this.
 I want to use source routing as a way to stop a DoS rather than use access-lists.
 
 In other words, lets say I know the source IP (range of IPs) of an attack and they 
 do not change.
 
 If the destination stays the same I can easily null route the destination, but what 
 if the destination constantly changes. So I have to work based on the source IP.
 
 Depending on the router and the code, if I implement an access-list then the CPU 
 utilization shoots through the roof.
 What I would like to try and do is use source routing to route that traffic to 
 null. I figured it would be easier on the router than an access-list.
 
 Has anyone else tried this successfully on ciscos and junipers?
 Is it easier on the CPU than access-lists?
 Is there a link I cannot find on cisco or google?
 
 Thanks
 Christian Liendo
 
 
 -
 Andre Chapuis
 IP+ Engineering
 Swisscom Ltd
 Genfergasse 14
 3050 Bern
 +41 31 893 89 61
 [EMAIL PROTECTED]
 CCIE #6023
 --
 


Re: DNS dDos Attack!

2003-03-28 Thread Kevin Houle
--On Friday, March 28, 2003 09:28:48 AM -0500 Dan Armstrong 
[EMAIL PROTECTED] wrote:

Sorry, I lied.  We are running 8.34Release

What I cannot figure out is why *our* name server is sending out ICMP
unreachables.  The incoming dns queries are coming from random
destinations
Are you sure the inbound attack packets are really valid queries, or are
they responses? I ask because in the classic DDoS-via-nameservers attack,
the victim will receive answers from a slew of other nameservers and send
out ICMP unreachables. See
 http://www.cert.org/incident_notes/IN-2000-04.html

Kevin



Fw: Freedom to Tinker: Use a Firewall, Go to Jail

2003-03-28 Thread Peter Galbavy

From another mailing list;

Not being from the US, I have very little idea if this is a reality based
simply on this story...

- Original Message -
From: Dave Feustel [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Friday, March 28, 2003 1:31 PM
Subject: Freedom to Tinker: Use a Firewall, Go to Jail


 Use a Firewall, Go to Jail

 The states of Massachusetts and Texas are preparing to
 consider bills that apparently are intended to extend the
 national Digital Millennium Copyright Act. (TX bill; MA bill)
 The bills are obviously related to each other somehow,
 since they are textually similar.

 Here is one example of the far-reaching harmful effects of
 these bills. Both bills would flatly ban the possession, sale,
 or use of technologies that conceal from a communication
 service provider ... the existence or place of origin or
 destination of any communication. Your ISP is a communcation
 service provider, so anything that concealed the origin or
 destination of any communication from your ISP would be
 illegal -- with no exceptions.

 http://www.freedom-to-tinker.com/archives/000336.html





Re: Freedom to Tinker: Use a Firewall, Go to Jail

2003-03-28 Thread Peter Galbavy

 Not being from the US, I have very little idea if this is a reality based
 simply on this story...

And having left a couple of unread messages in my nanog folder, I noticed
this was raised in another thread. Apologies for double posting.

Peter



Re: is this true or... ?

2003-03-28 Thread Alfredo Sola


 http://www.theinquirer.net/?article=8595

While they are at it, it would be nice if a carefully applied lobbying 
could transform that into something that made more sense security-wise.

After dealing with one too many DDoS attacks, I would gladly mantain 
storage of a few weeks worth of netflow data for security uses if everybody 
was (a) required to do the same, and (b) required to assist when an attack is 
detected.

Hey, one can be optimistic from time to time. Before flames begin, let 
me say that I hold no hope of something remotely similar to the above coming 
true in the foreseeable future. Nor do I like the idea of the Internet being 
ruled by laws, which in addition are written by people without a clue, in the 
first place.

-- 
Alfredo Sola, after receiving an e-mail from an administrator of a smurf 
amplifier claiming that we, the attacked party, are actually the attackers.



Re: Verizon mail server on MAPS RSS list

2003-03-28 Thread Christopher X. Candreva

On Thu, 27 Mar 2003, Josh Gentry wrote:


 We've got customers trying to receive email from people using Verizon for
 Internet acess, and we are rejecting that mail because
 out013pub.verizon.net [206.46.170.44] is on the MAPS RSS list.  Can't pull
 up the MAPS RSS website at the moment to check why.  Anyone know contact
 info for Verizon for this kind of issue?

This server is an open relay. It's been on RSS since Sept. It's also on
njabl.org, and their web site is responding more quickly.

Verizon has been contacted many times about this and either doesn't care or
just doesn't know how to fix it.  In fact, the MAPS page has a specific
message that they must be contacted by a Verizon rep to have it removed.

It will relay for anyone who gives a @verizon.net return address.

==
Chris Candreva  -- [EMAIL PROTECTED] -- (914) 967-7816
WestNet Internet Services of Westchester
http://www.westnet.com/


Re: is this true or... ?

2003-03-28 Thread Richard Irving

 How do like this recent rounds of bureaucrats attempting
to make lawsh-r-m ?

 A: IMHO:This should be officially declared,
out of their jurisdiction.

 of such small municipalities... it is sort of like having a
Nurse make the judgment call during a delicate heart surgery.

  It takes a specialist, really

 There is a reason most laws that -do- exist are at a Federal
level...(in the U.S.)...

   Match the Law with the Scope of the problem.

 B: Most of these laws make about as much sense as the Old
   Blue Laws, that we are just now getting around to repealing..

 (Can't have sex with the wife on Sunday)

Why create more idiotic laws ?

   After our region voted all out (7-0) to pass laws outlawing
 Spam. and created a bill that would incarcerate about half
 of the daily usenet posters, and network operators,
 for routine operations... and outlaw anonymity on the net...

 Someone showed them how to use Spam Assassin.

  It made Front Page News.

  * dohh! *

   The real solution lie in the IEEE, IETF, and/or the IESG,
  and possibly will be included in IPV6

  The interim solution lie in software packages,
   and Firewalls

  And, fundamentally, if the USA Patriot Act didn't teach 
us at least one thing, it should have taught us to NOT
attempt to -=legislate=- the value of Pi to 4.0.

  It simply should be out of their jurisdiction, since
the physical reality is beyond their ability to change, and/or
comprehend.

 Besides, JMHO,
   don't make a -law-, per se... make it actionable. ;)

 Why send idiots to jail, and ruin their future
   When you can simply make them reimburse you for your trouble ? 

 They remain productive members of society, 
and you are recompensed for your troubles..

 ..Giving you that warm fuzzy glow of Retribution,
   you so deserve.

:D

  Its not like we don't have -=Entire States=- going into bankruptcy
because the attempted application of the Police State that is the wet-dream
of the current administration, -=didn't=- overburden the system

 You See, you can only incarcerate up to a certain percentage of the
community, until the burden to support the incarcerated
over-whelms the remaining free members of that society.

 Not to mention, certain types of laws will result in young people
being exposed, and converted, to the wrong element, early in life. 

We would be better off -=not=- exposing them to such treatment
 in the first place..

( Most hacking law breakers are juveniles, when it comes
to the internetcuriosity and the Cat, eh ?)

 Adding -more- un-enforceable laws, that not only over-burden the
system further, but permanently modify the behavior of countless 
numbers of people for the worse, over relatively trivial issue's... 

 will eventually end up as Blue Law, a waste of our time, and money.

  Fundamentally Detrimental to the Very System, itself.


Steven M. Bellovin wrote:
 
 In message [EMAIL PROTECTED], Steven M. Be
 llovin writes:
 
 In message [EMAIL PROTECTED], Steven M. B
 e
 llovin writes:
 
 In message [EMAIL PROTECTED], Toma
 s
 
 Daniska writes:
 
 
 http://www.theinquirer.net/?article=8595
 
 
 freedom-to-tinker.com, which is the source cited by your link, is
 indeed Ed Felten's.  And I trust Ed.
 
 
 It's been pointed out to me that the Texas bill, at least (I found it
 at
 http://www.capitol.state.tx.us/cgi-bin/cqcgi?CQ_SESSION_KEY=NUTHYMWBJWUFCQ_QU
 ERY_HANDLE=126838CQ_CUR_DOCUMENT=4CQ_SAVE[bill_number]=HB02121INTCQ_TLO_DOC
 _TEXT=YES
 but there may be session state -- it's bill HB 2121) only criminalizes the
 conduct if it's done with intent to harm or defraud a communications
 service provider.  Now, given the anti-NAT and anti-VPN tendencies of some
 broadband ISPs, I'm not necessarily thrilled, but it's not quite the
 same as was originally suggested.
 
 After talking to Ed Felten and reading more of the bill, I'm no longer
 certain about my clarification.  The originally-cited text is in
 Section 6; the part about intent to cause harm is in Section 4.
 Section 6 also criminalizes concealing origin or destination
 information from lawful authority -- use crypto, go to jail?
 
 --Steve Bellovin, http://www.research.att.com/~smb (me)
 http://www.wilyhacker.com (2nd edition of Firewalls book)


OT: FW: About your using mailer

2003-03-28 Thread Mike Damm


Is anyone else getting this junk regarding the list? And can we put a stop
to it?

Granted in a perfect world everyone runs software throughout the entire
enterprise that is on the bleeding edge of the latest proposed standards,
but some of us only have so big of a budget.

---
Michael Damm, MIS Department, Irwin Research  Development
V: 509.457.5080 x298 F: 509.577.0301 E: [EMAIL PROTECTED]


-Original Message-
From: Miyoko Shioda [mailto:[EMAIL PROTECTED] 
Sent: Friday, March 28, 2003 9:30 AM
To: Mike Damm
Subject: Re: About your using mailer


dear Mike Damm,

Sorry, I am talking about NANOG mailing list.
Please please change your MUA in mainling list...

Regards,

On Fri, 28 Mar 2003 09:28:17 -0800
Mike Damm [EMAIL PROTECTED] wrote:

 What mailing list are you talking about?
 
 ---
 Michael Damm, MIS Department, Irwin Research  Development
 V: 509.457.5080 x298 F: 509.577.0301 E: [EMAIL PROTECTED]
 
 
 -Original Message-
 From: Miyoko Shioda [mailto:[EMAIL PROTECTED] 
 Sent: Thursday, March 27, 2003 5:16 PM
 To: [EMAIL PROTECTED]
 Subject: About your using mailer
 
 
 Hi,
 I read your messages in mailing list.
 
 Your using mailer(MUA) does not seems to support In-Reply-To nor
References
 field. These field is defined in RFC-2822.
 If these field does not be outputted when you reply, tree construction
 will be break every time you post the messages to mailing list.
 It is inconvenient for the others.
 
 Please please change your mailer for the public good,
 at least when you post to mailing list.
 
 Today almost mailers support these field(at least In-Reply-To)
 except for the following mailers.
 
 MSN hotmail
 Exchange Server = 2000 (Exchange Server 2003 will support In-Reply-To.)
 Lotus Notes  6.0
 MIME-Tools
 AOL mailer
 dtmail
 Novell GroupWise
 foxmail
 
 regards,
 
 --
 Miyoko Shioda
 [EMAIL PROTECTED]
 

-- 
Miyoko Shioda [EMAIL PROTECTED]



Re: is this true or... ?

2003-03-28 Thread Sean Donelan

On Fri, 28 Mar 2003, blitz wrote:
 If it is, it reveals how utterly clueless our legislators really are

 At 15:09 3/28/03 +0100, you wrote:
 http://www.theinquirer.net/?article=8595

Uhm, I don't think you can blame the legislators for this one.  Almost
identical legislation being introduced in six different states?  I suspect
an outside influence was involved in drafting the proposed legislation.




Re: [OT: FW: About your using mailer]

2003-03-28 Thread Joshua Smith

i got one too - i was going to ask if anyone else minded that my
mua was fully rfc 2822 compliant (before telling usa.net that they
have to rewrite their webmail app)...

i like how the examples cited are crap-html/mime oriented (msn, 
exchange, and aol?)

Mike Damm [EMAIL PROTECTED] wrote:
 
 
 Is anyone else getting this junk regarding the list? And can we put a stop
 to it?
 
 Granted in a perfect world everyone runs software throughout the entire
 enterprise that is on the bleeding edge of the latest proposed standards,
 but some of us only have so big of a budget.
 
 ---
 Michael Damm, MIS Department, Irwin Research  Development
 V: 509.457.5080 x298 F: 509.577.0301 E: [EMAIL PROTECTED]
 
 
 -Original Message-
 From: Miyoko Shioda [mailto:[EMAIL PROTECTED] 
 Sent: Friday, March 28, 2003 9:30 AM
 To: Mike Damm
 Subject: Re: About your using mailer
 
 
 dear Mike Damm,
 
 Sorry, I am talking about NANOG mailing list.
 Please please change your MUA in mainling list...
 
 Regards,
 
 On Fri, 28 Mar 2003 09:28:17 -0800
 Mike Damm [EMAIL PROTECTED] wrote:
 
  What mailing list are you talking about?
  
  ---
  Michael Damm, MIS Department, Irwin Research  Development
  V: 509.457.5080 x298 F: 509.577.0301 E: [EMAIL PROTECTED]
  
  
  -Original Message-
  From: Miyoko Shioda [mailto:[EMAIL PROTECTED] 
  Sent: Thursday, March 27, 2003 5:16 PM
  To: [EMAIL PROTECTED]
  Subject: About your using mailer
  
  
  Hi,
  I read your messages in mailing list.
  
  Your using mailer(MUA) does not seems to support In-Reply-To nor
 References
  field. These field is defined in RFC-2822.
  If these field does not be outputted when you reply, tree construction
  will be break every time you post the messages to mailing list.
  It is inconvenient for the others.
  
  Please please change your mailer for the public good,
  at least when you post to mailing list.
  
  Today almost mailers support these field(at least In-Reply-To)
  except for the following mailers.
  
  MSN hotmail
  Exchange Server = 2000 (Exchange Server 2003 will support In-Reply-To.)
  Lotus Notes  6.0
  MIME-Tools
  AOL mailer
  dtmail
  Novell GroupWise
  foxmail
  
  regards,
  
  --
  Miyoko Shioda
  [EMAIL PROTECTED]
  
 
 -- 
 Miyoko Shioda [EMAIL PROTECTED]
 



Walk with me through the Universe,
 And along the way see how all of us are Connected.
 Feast the eyes of your Soul,
 On the Love that abounds.
 In all places at once, seemingly endless,
 Like your own existence.
 - Stephen Hawking -



Re: FW: About your using mailer

2003-03-28 Thread Jeff Kell
Kris Foster wrote:
Is anyone else getting this junk regarding the list? And can 
we put a stop
to it?


Got the same message.  I think Miyoko's fight should be with the vendors,
not the poor people who are subjected to the whims of an IS department.
In the beginning, there was The Word.
And The Word was Content-type: text/plain
Jeff



69/8 revisited

2003-03-28 Thread jlewis

I've setup a little web site with the results of my ping sweep to attempt 
to locate as many networks as possible with outdated bogon filters.

http://69box.atlantic.net/

If you can't reach that, fix your network...or use the alternative 
non-69/8 hostname http://not69box.atlantic.net/

Number of IP's currently known to have 69/8 filter issues: 683
Number of /24 networks's currently known to have 69/8 filter issues: 511

Check out the site and see if you recognize any of the IPs.  You can 
test/remove IPs if they've become reachable, or test/add IPs if they have 
69/8 filter issues.

--
 Jon Lewis [EMAIL PROTECTED]|  I route
 System Administrator|  therefore you are
 Atlantic Net|  
_ http://www.lewis.org/~jlewis/pgp for PGP public key_



Allegiance telecom boston colo down?

2003-03-28 Thread Eric Gauthier

Heya,

We've got a business unit hosted in Allegiance Telecom's boston colo
that's been down for a bit and all they can get out of Allegiance is
um... we're not sure what's going on.  I'm guessing that boston.com,
which is also down, is affected by this...

If you go to the Allegiance Telecom looking glass 
(http://nitrous.digex.net/mae/mae-lg.html) and enter an IP from their
colo you get a network not in table so my guess is that the colo
is FUBAR...

Anyone know whats up?

Eric :)


RE: FW: About your using mailer

2003-03-28 Thread Kris Foster

 In the beginning, there was The Word.
 And The Word was Content-type: text/plain

My bad..

Kris



Re 7/8 - was Re: 69/8 revisited

2003-03-28 Thread John Palmer

Speaking of that, has 7/8 been allocated? Doesn't show it on IANA's list but
I saw several routes come in (7.1/16 comes to mind) a few days ago. 

- Original Message - 
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Friday, March 28, 2003 12:36
Subject: 69/8 revisited


 
 I've setup a little web site with the results of my ping sweep to attempt 
 to locate as many networks as possible with outdated bogon filters.
 
 http://69box.atlantic.net/
 
 If you can't reach that, fix your network...or use the alternative 
 non-69/8 hostname http://not69box.atlantic.net/
 
 Number of IP's currently known to have 69/8 filter issues: 683
 Number of /24 networks's currently known to have 69/8 filter issues: 511
 
 Check out the site and see if you recognize any of the IPs.  You can 
 test/remove IPs if they've become reachable, or test/add IPs if they have 
 69/8 filter issues.
 
 --
  Jon Lewis [EMAIL PROTECTED]|  I route
  System Administrator|  therefore you are
  Atlantic Net|  
 _ http://www.lewis.org/~jlewis/pgp for PGP public key_
 
 
 


Re: is this true or... ?

2003-03-28 Thread Richard Irving

Sean Donelan wrote:
 On Fri, 28 Mar 2003, blitz wrote:
  If it is, it reveals how utterly clueless our legislators really are
  At 15:09 3/28/03 +0100, you wrote:
  http://www.theinquirer.net/?article=8595
 Uhm, I don't think you can blame the legislators for this one.  Almost
 identical legislation being introduced in six different states?  I suspect
 an outside influence was involved in drafting the proposed legislation.

  Now, -that's- using your noodle.

   With just a little investigative work, we should be able
to find out which of the Righteous Vigilante Right
was running around championing this concept

   Usually, you find someone who is a member of a politically
active group, perhaps a church group, or lobbying group,
who has a child, and walked in upon him/her opening up a pornographic
spam

  And then, with tears streaming from their eyes, knowing their
innocent darling Pat has been corrupted, and -damned- for all eternity...

They become determined to lead us all to 
   the One True Path of righteousness...

 The Universal WorldWide Creation of Pat's Law.

 (Pause for Hysterical Sobbing for the Now Damned soul)

 (Que: Triumphant Angelic Music)

  With Such bogus Rhetoric as their foundation,
 as:

 You want our children to be -=safe=-, don't you ?

 (Scratch Record, stop music abruptly!)

 Most people are dumbfounded when encountering
such Rhetoric... for some reason, they can't
seperate the answer to the logical trap posed in the
wording that they have stepped into, 
from the -=real=- answer to the problem

 Most people internally cognate the answer Yes to the above question,
and then can't understand why they find themselves
agreeing with the RVR's proselytizer

  * dohh *

I.E: Do you beat your wife, often ?!

  :*

 The real way to combat such morally reprehensible
manipulation of logic of the verbal exchange is
to identify the underlying fallacy.

So, instead of Yes, answer:

 Of course we do, Schmuck, that is why we oppose such a
 negligent abuse of power and the subsequent
 creation of ludicrous laws... by emotionally
 blinded idiots, such as yourself... and seek a -real- solution,
 instead of attempting to legislate something you simply
 don't understand, ineffectively.

 Yup. Find the Fallacy, and soon one understands why the
RVR's really should seek -=therapy=-, not political office.

So, in conclusion:

 You want to be Safe -and- Free, don't you ?

  :P

 .Richard.

Historical Quote:

 Any resemblance between this post,
 and current political practices,
 are purely intentional.

= So, has Babylon Fallen, Yet ? ;)


Re: Re 7/8 - was Re: 69/8 revisited

2003-03-28 Thread Haesu

Seems  like 7/8 was allocated to dept. of defense for quite a bit of
time..

OrgName:DoD Network Information Center
OrgID:  DNIC
Address:7990 Science Applications Ct
Address:M/S CV 50
City:   Vienna
StateProv:  VA
PostalCode: 22183-7000
Country:US

NetRange:   7.0.0.0 - 7.255.255.255
CIDR:   7.0.0.0/8
NetName:DISANET7
NetHandle:  NET-7-0-0-0-1
Parent:
NetType:Direct Allocation
Comment:Defense Information Systems Agency
Comment:DISA /D3
Comment:11440 Isaac Newton Square
Comment:Reston, VA 22090-5087 US
RegDate:1997-11-24
Updated:1998-09-26

TechHandle: MIL-HSTMST-ARIN
TechName:   Network DoD, Network
TechPhone:  +1-703-676-1051
TechEmail:  [EMAIL PROTECTED]

OrgTechHandle: MIL-HSTMST-ARIN
OrgTechName:   Network DoD, Network
OrgTechPhone:  +1-703-676-1051
OrgTechEmail:  [EMAIL PROTECTED]

On Fri, 28 Mar 2003, John Palmer wrote:


 Speaking of that, has 7/8 been allocated? Doesn't show it on IANA's list but
 I saw several routes come in (7.1/16 comes to mind) a few days ago.

 - Original Message -
 From: [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Sent: Friday, March 28, 2003 12:36
 Subject: 69/8 revisited


 
  I've setup a little web site with the results of my ping sweep to attempt
  to locate as many networks as possible with outdated bogon filters.
 
  http://69box.atlantic.net/
 
  If you can't reach that, fix your network...or use the alternative
  non-69/8 hostname http://not69box.atlantic.net/
 
  Number of IP's currently known to have 69/8 filter issues: 683
  Number of /24 networks's currently known to have 69/8 filter issues: 511
 
  Check out the site and see if you recognize any of the IPs.  You can
  test/remove IPs if they've become reachable, or test/add IPs if they have
  69/8 filter issues.
 
  --
   Jon Lewis [EMAIL PROTECTED]|  I route
   System Administrator|  therefore you are
   Atlantic Net|
  _ http://www.lewis.org/~jlewis/pgp for PGP public key_
 
 
 




Re: Allegiance telecom boston colo down?

2003-03-28 Thread Sean Donelan

On Fri, 28 Mar 2003, Dave Israel wrote:
 I do.  But I won't discuss it in this forum.

 My best advice in general, is when you have a backbone problem with
 Allegiance, call the NOCC (866 696 2794, options 3,1,4).  They've got
 the most data on that, and if you're a customer of Allegiance, they'll
 gladly share.

And if you're not a customer...




Re: is this true or... ?

2003-03-28 Thread Valdis . Kletnieks
On Fri, 28 Mar 2003 13:59:02 EST, Richard Irving said:
 Sean Donelan wrote:
  identical legislation being introduced in six different states?  I suspect
  an outside influence was involved in drafting the proposed legislation.
 
   Now, -that's- using your noodle.
 
With just a little investigative work, we should be able
 to find out which of the Righteous Vigilante Right
 was running around championing this concept
 
Usually, you find someone who is a member of a politically
 active group, perhaps a church group, or lobbying group,
 who has a child, and walked in upon him/her opening up a pornographic
 spam

Actually, it's the copyright people, it appears.

http://www.freedom-to-tinker.com/doc/2003/mpaa_27mar.pdf

Follow the money. *SIGH*


pgp0.pgp
Description: PGP signature


Re: is this true or... ?

2003-03-28 Thread Nathan E Norman
On Fri, Mar 28, 2003 at 02:07:24PM -0500, [EMAIL PROTECTED] wrote:
 On Fri, 28 Mar 2003 13:59:02 EST, Richard Irving said:
  Sean Donelan wrote:
   identical legislation being introduced in six different states?  I suspect
   an outside influence was involved in drafting the proposed legislation.
  
Now, -that's- using your noodle.
  
 With just a little investigative work, we should be able
  to find out which of the Righteous Vigilante Right
  was running around championing this concept
  
 Usually, you find someone who is a member of a politically
  active group, perhaps a church group, or lobbying group,
  who has a child, and walked in upon him/her opening up a pornographic
  spam
 
 Actually, it's the copyright people, it appears.
 
 http://www.freedom-to-tinker.com/doc/2003/mpaa_27mar.pdf
 
 Follow the money. *SIGH*

You mean Richard Irving was _wrong_ ???  Wow.

-- 
Nathan Norman - Incanus Networking mailto:[EMAIL PROTECTED]
  GUIs normally make it simple to accomplish simple actions and
  impossible to accomplish complex actions.
  -- Doug Gwyn


pgp0.pgp
Description: PGP signature


Re: is this true or... ?

2003-03-28 Thread Richard Irving

[EMAIL PROTECTED] wrote:
 On Fri, 28 Mar 2003 13:59:02 EST, Richard Irving said:
  Sean Donelan wrote:
   identical legislation being introduced in six different states?  I suspect
   an outside influence was involved in drafting the proposed legislation.
Now, -that's- using your noodle.
 With just a little investigative work, we should be able
  to find out which of the Righteous Vigilante Right
  was running around championing this concept
 
 Usually, you find someone who is a member of a politically
  active group, perhaps a church group, or lobbying group,
  who has a child, and walked in upon him/her opening up a pornographic
  spam
 Actually, it's the copyright people, it appears.
 
 http://www.freedom-to-tinker.com/doc/2003/mpaa_27mar.pdf
 
 Follow the money. *SIGH*

  Ah, yes. The -=one=- motive more powerful than even
self preservation of the species...

 * Greed *

 Did you know that in Africa, there is a humane monkey trap
that has been used for countless ages...

 Sun Flower seeds in an empty coconut shell, securely mounted.

 With a narrow opening in the top of the shell, the monkey reaches in,
and grabs a handful of seeds..

  But, with its hand -full- of seeds, it cannot withdraw it
from the Narrow Opening in the top of the coconut

  You have to check these traps often, though...

 The Monkey will starve to death, rather than release the
hand full of seeds.

 Did you know that man's genomes are roughly 98% Simian ?

 :D



 
   
 
Part 1.2Type: application/pgp-signature


Re: Allegiance telecom boston colo down?

2003-03-28 Thread Dave Israel

On 3/28/2003 at 14:02:36 -0500, Sean Donelan said:
 
 On Fri, 28 Mar 2003, Dave Israel wrote:
  I do.  But I won't discuss it in this forum.
 
  My best advice in general, is when you have a backbone problem with
  Allegiance, call the NOCC (866 696 2794, options 3,1,4).  They've got
  the most data on that, and if you're a customer of Allegiance, they'll
  gladly share.
 
 And if you're not a customer...

...then if you have a good reason to ask, they'll help you, and if
not, they won't.  This should not surprise anybody; that's how NOCCs
are.



Re: is this true or... ?

2003-03-28 Thread Richard Irving

Nathan E Norman wrote:
 On Fri, Mar 28, 2003 at 02:07:24PM -0500, [EMAIL PROTECTED] wrote:
  On Fri, 28 Mar 2003 13:59:02 EST, Richard Irving said:
   Sean Donelan wrote:
identical legislation being introduced in six different states?  I suspect
an outside influence was involved in drafting the proposed legislation.
  
 Now, -that's- using your noodle.
  
  With just a little investigative work, we should be able
   to find out which of the Righteous Vigilante Right
   was running around championing this concept
  
  Usually, you find someone who is a member of a politically
   active group, perhaps a church group, or lobbying group,
   who has a child, and walked in upon him/her opening up a pornographic
   spam
 
  Actually, it's the copyright people, it appears.
 
  http://www.freedom-to-tinker.com/doc/2003/mpaa_27mar.pdf
 
  Follow the money. *SIGH*
 You mean Richard Irving was _wrong_ ???  Wow.

  It would be a miracle, eh ? Agreed.

  But, Alas, you confuse a hypothesis, with a conclusion.

  Better luck next time.

  :P

 
 --
 Nathan Norman - Incanus Networking mailto:[EMAIL PROTECTED]
   GUIs normally make it simple to accomplish simple actions and
   impossible to accomplish complex actions.
   -- Doug Gwyn
 
   
 
Part 1.2Type: application/pgp-signature


RE: [OT: FW: About your using mailer]

2003-03-28 Thread Mike Damm

As I figured.

Here was my official reply I sent to him:
RFC-2822 is a Proposed Standard according to the Official Internet Protocol
Standards. We are completely compliant with RFC822, which is the current
standard for MAIL. If your software in unable to handle older standards, it
is suggested that you upgrade.

In regards to what mail platform we are using, we do run Microsoft Exchange
5.5. If you would like us to upgrade, I can forward you bank details so you
can wire us $45,000 - the cost of switching to another product. Until then,
please discontinue these unsolicited memos, for the public good.

---
Michael Damm, MIS Department, Irwin Research  Development
V: 509.457.5080 x298 F: 509.577.0301 E: [EMAIL PROTECTED]


-Original Message-
From: Joshua Smith [mailto:[EMAIL PROTECTED] 
Sent: Friday, March 28, 2003 10:01 AM
To: Mike Damm; [EMAIL PROTECTED]
Subject: Re: [OT: FW: About your using mailer]

i got one too - i was going to ask if anyone else minded that my
mua was fully rfc 2822 compliant (before telling usa.net that they
have to rewrite their webmail app)...

i like how the examples cited are crap-html/mime oriented (msn, 
exchange, and aol?)

Mike Damm [EMAIL PROTECTED] wrote:
 
 
 Is anyone else getting this junk regarding the list? And can we put a stop
 to it?
 
 Granted in a perfect world everyone runs software throughout the entire
 enterprise that is on the bleeding edge of the latest proposed standards,
 but some of us only have so big of a budget.
 
 ---
 Michael Damm, MIS Department, Irwin Research  Development
 V: 509.457.5080 x298 F: 509.577.0301 E: [EMAIL PROTECTED]
 
 
 -Original Message-
 From: Miyoko Shioda [mailto:[EMAIL PROTECTED] 
 Sent: Friday, March 28, 2003 9:30 AM
 To: Mike Damm
 Subject: Re: About your using mailer
 
 
 dear Mike Damm,
 
 Sorry, I am talking about NANOG mailing list.
 Please please change your MUA in mainling list...
 
 Regards,
 
 On Fri, 28 Mar 2003 09:28:17 -0800
 Mike Damm [EMAIL PROTECTED] wrote:
 
  What mailing list are you talking about?
  
  ---
  Michael Damm, MIS Department, Irwin Research  Development
  V: 509.457.5080 x298 F: 509.577.0301 E: [EMAIL PROTECTED]
  
  
  -Original Message-
  From: Miyoko Shioda [mailto:[EMAIL PROTECTED] 
  Sent: Thursday, March 27, 2003 5:16 PM
  To: [EMAIL PROTECTED]
  Subject: About your using mailer
  
  
  Hi,
  I read your messages in mailing list.
  
  Your using mailer(MUA) does not seems to support In-Reply-To nor
 References
  field. These field is defined in RFC-2822.
  If these field does not be outputted when you reply, tree construction
  will be break every time you post the messages to mailing list.
  It is inconvenient for the others.
  
  Please please change your mailer for the public good,
  at least when you post to mailing list.
  
  Today almost mailers support these field(at least In-Reply-To)
  except for the following mailers.
  
  MSN hotmail
  Exchange Server = 2000 (Exchange Server 2003 will support In-Reply-To.)
  Lotus Notes  6.0
  MIME-Tools
  AOL mailer
  dtmail
  Novell GroupWise
  foxmail
  
  regards,
  
  --
  Miyoko Shioda
  [EMAIL PROTECTED]
  
 
 -- 
 Miyoko Shioda [EMAIL PROTECTED]
 



Walk with me through the Universe,
 And along the way see how all of us are Connected.
 Feast the eyes of your Soul,
 On the Love that abounds.
 In all places at once, seemingly endless,
 Like your own existence.
 - Stephen Hawking -


RE: is this true or... ?

2003-03-28 Thread Ejay Hire

Methinks what they are aiming for is trying to prevent spammers from hiding their 
origin using open relays/open proxies/stealthware.  With the proper application of 
clue, maybe we'll have something to wield against the spammers.

-Original Message-
From: Tomas Daniska [mailto:[EMAIL PROTECTED]
Sent: Friday, March 28, 2003 8:09 AM
To: [EMAIL PROTECTED]
Subject: is this true or... ?




http://www.theinquirer.net/?article=8595

--
 
Tomas Daniska
systems engineer
Tronet Computer Networks
Plynarenska 5, 829 75 Bratislava, Slovakia
tel: +421 2 58224111, fax: +421 2 58224199
 
A transistor protected by a fast-acting fuse will protect the fuse by
blowing first.



Re: Allegiance telecom boston colo down?

2003-03-28 Thread Sean Donelan

On Fri, 28 Mar 2003, Dave Israel wrote:
 On 3/28/2003 at 14:02:36 -0500, Sean Donelan said:
  On Fri, 28 Mar 2003, Dave Israel wrote:
   I do.  But I won't discuss it in this forum.
  
   My best advice in general, is when you have a backbone problem with
   Allegiance, call the NOCC (866 696 2794, options 3,1,4).  They've got
   the most data on that, and if you're a customer of Allegiance, they'll
   gladly share.
 
  And if you're not a customer...

 ...then if you have a good reason to ask, they'll help you, and if
 not, they won't.  This should not surprise anybody; that's how NOCCs
 are.

I guess we'll have to wait for Allegiance customers leak the
information.  The leaks may not be as accurate as if the information
came directly from Allegiance.  Other providers such as ATT, Earthlink,
MFN, RCN have a different philosophy about providing information
concerning their network status.  Not all NOC's are the same.




Re: is this true or... ?

2003-03-28 Thread Scott Weeks



: self preservation of the species...
:
:  * Greed *
:
:  Did you know that in Africa, there is a humane monkey trap
: that has been used for countless ages...
:
:  Sun Flower seeds in an empty coconut shell, securely mounted.
:
:  With a narrow opening in the top of the shell, the monkey reaches in,
: and grabs a handful of seeds..
:
:   But, with its hand -full- of seeds, it cannot withdraw it
: from the Narrow Opening in the top of the coconut
:
:   You have to check these traps often, though...
:
:  The Monkey will starve to death, rather than release the
: hand full of seeds.
:
:  Did you know that man's genomes are roughly 98% Simian ?
:
:  :D
:
:
:
: 
:

: Part 1.2Type: application/pgp-signature
:



Re: Allegiance telecom boston colo down?

2003-03-28 Thread Eric Gauthier

  ...then if you have a good reason to ask, they'll help you, and if
  not, they won't.  This should not surprise anybody; that's how NOCCs
  are.
 
 I guess we'll have to wait for Allegiance customers leak the
 information.  The leaks may not be as accurate as if the information
 came directly from Allegiance.  Other providers such as ATT, Earthlink,
 MFN, RCN have a different philosophy about providing information
 concerning their network status.  Not all NOC's are the same.

Yeah, and you'll have to wait for a while since our business unit -
 who is a customer and has called repeatedly both the NOC and their
sales team - has received nothing beyond we don't know what's wrong.

Eric :)


Re: Allegiance telecom boston colo down?

2003-03-28 Thread Dan Hollis

On Fri, 28 Mar 2003, Dave Israel wrote:
 ...then if you have a good reason to ask, they'll help you, and if
 not, they won't.  This should not surprise anybody; that's how NOCCs
 are.

good reason to ask varies wildly with different nocs.

-Dan
-- 
[-] Omae no subete no kichi wa ore no mono da. [-]



Re: Allegiance telecom boston colo down?

2003-03-28 Thread Dave Israel


At the risk of starting a debate that will go nowhere and annoy
the readership...

On 3/28/2003 at 14:44:00 -0500, Sean Donelan said:
 
 I guess we'll have to wait for Allegiance customers leak the
 information.  The leaks may not be as accurate as if the information
 came directly from Allegiance.  Other providers such as ATT, Earthlink,
 MFN, RCN have a different philosophy about providing information
 concerning their network status.  Not all NOC's are the same.

I seriously doubt that, if a 12-year-old from Nebraska called the NOC
at ATT and asked for a list of all their network failures in the past
two years, the NOC person would feel obliged to spend their time on
it.  Furthermore, if that NOC tech could be helping to fix the
problem, and I were a customer, I'd be upset that he is wasting time
chatting on the phone with a non-customer.  NOCs have limited
resources.  More importantly, they often don't know what's wrong until
after it was fixed, and sharing what may be a wrong assessment with
people who have no vested interest in the problem is asking for a lot
more trouble, especially since they probably will never know or care
what the real solution was.

-Dave





Re: is this true or... ?

2003-03-28 Thread Richard Irving

 I think this is bringing it back on topic,
Ms. Harris


Ejay Hire wrote:
 
 Methinks what they are aiming for is trying to prevent spammers from hiding their 
 origin using open relays/open proxies/stealthware. 

  Agreed, However:

   The Highway to Hell is paved with Good intentions.

 With the 
proper application of clue, maybe we'll have something to wield against the spammers.

 Like new base software from the IETF.

 * cough *

 Otherwise, we will -still- be missing the clue

  I don't question the intentions, I question the structural
integrity of the composition of the pavement, 
and where the road is -=leading=-. 


(Back on topic, Ma'am ?  ;)
 -Original Message-
 From: Tomas Daniska [mailto:[EMAIL PROTECTED]
 Sent: Friday, March 28, 2003 8:09 AM
 To: [EMAIL PROTECTED]
 Subject: is this true or... ?
 
 http://www.theinquirer.net/?article=8595
 
 --
 
 Tomas Daniska
 systems engineer
 Tronet Computer Networks
 Plynarenska 5, 829 75 Bratislava, Slovakia
 tel: +421 2 58224111, fax: +421 2 58224199
 
 A transistor protected by a fast-acting fuse will protect the fuse by
 blowing first.


Re: Curing the BIND pain

2003-03-28 Thread Crist J. Clark

Nathan J. Mehl wrote:
 In the immortal words of [EMAIL PROTECTED] ([EMAIL PROTECTED]):
  
  I suggest that an appropriate technique would be for the BIND server to 
  originate traffic on it's local subnet that would look suspicious and 
  possibly trigger intrusion alarms. 

 Good lord.

 I'm a little stuck for a proper analogy for this.  A car that
 helpfully starts emitting noxious smoke to let you know that it's
 time for a tune-up?

A car whose breaks start to squeal annoyingly telling you they're
about to wear out?

 An answering
 machine that replaces the outgoing message with a stream of
 profanities to alert callers that the incoming message tape is full?

Cash register tape that turns an ugly pink or green towards the end of
the roll?

Cell phones, pagers, and fifty zillion other electronic devices that
beep or buzz endlessly when the battery starts to run low?

Not that I agree that making BIND self-destruct or send off alarms is
a particularly workable idea. Even if someone comes up with a
beautiful system for this, it's probably all moot. How many vendors
of binary distributions aren't just going to rip the code back out
(BIND being freely modifiable open source)? Doing so reduces the
number of confused and panicked calls from clients when BIND does
whatever weird things it is programmed to, and also would reduce the
pressure for instant patches whenever BIND self-destructs. What vendor
in their right mind would leave it in?
-- 
Crist J. Clark | [EMAIL PROTECTED]
   | [EMAIL PROTECTED]
http://people.freebsd.org/~cjc/| [EMAIL PROTECTED]


Re: Allegiance telecom boston colo down?

2003-03-28 Thread Sean Donelan

On Fri, 28 Mar 2003, Dave Israel wrote:
 I seriously doubt that, if a 12-year-old from Nebraska called the NOC
 at ATT and asked for a list of all their network failures in the past
 two years, the NOC person would feel obliged to spend their time on

I try to point out when providers are doing a good job.

ATT has set up their system so their NOC people don't have to get bogged
down answering phones.  ATT has a very nice news system where you can
read about network issues.  ATT's customer care people post regular
updates about POP problems, circuits down, etc.  I suppose if the 12-year
old from Nebraska archived the news system for two years, he could read
about all their network issues.

Earthlink has
http://support.earthlink.net/harvest_inc/SYSSTATUS/sysstatus_pop.html

RCN has
http://status.erols.com

MFN has
http://status.psinet.com

etc, etc, etc

While there is always room for improvement, and some providers have
goofed up, there are providers who attempt to keep their network users
(even if they aren't direct customers) informed.




RE: [OT: FW: About your using mailer]

2003-03-28 Thread just me

On Fri, 28 Mar 2003, Mike Damm wrote:

  Here was my official reply I sent to him:

[smarmy email elided]

Thats the email you sent to Mr. Miyoko Shioda? You might want to get
in touch with Mr. JC Dill then, and ask her which bothers her more-
gender assumptions or MUA snobbery.


Cheers, toots.

(Mr.) Matt Ghali

  ---
  Michael Damm, MIS Department, Irwin Research  Development
  V: 509.457.5080 x298 F: 509.577.0301 E: [EMAIL PROTECTED]


[EMAIL PROTECTED]darwin
   Flowers on the razor wire/I know you're here/We are few/And far
   between/I was thinking about her skin/Love is a many splintered
   thing/Don't be afraid now/Just walk on in. #include disclaim.h




Re: Allegiance telecom boston colo down?

2003-03-28 Thread Dave Israel

On 3/28/2003 at 16:19:03 -0500, Sean Donelan said:
 On Fri, 28 Mar 2003, Dave Israel wrote:
  I seriously doubt that, if a 12-year-old from Nebraska called the NOC
  at ATT and asked for a list of all their network failures in the past
  two years, the NOC person would feel obliged to spend their time on
 
 I try to point out when providers are doing a good job.
 
 ATT has set up their system so their NOC people don't have to get bogged
 down answering phones.  ATT has a very nice news system where you can
 read about network issues.  ATT's customer care people post regular
 updates about POP problems, circuits down, etc.  I suppose if the 12-year
 old from Nebraska archived the news system for two years, he could read
 about all their network issues.

That may be true.  However, we weren't talking about network outage
notifications in general, we were talking specifically about calling
our NOCC to ask about an outage.  No, it isn't apples to oranges, but
it is Red Deliciouses to Granny Smiths. ;-)

 While there is always room for improvement, and some providers have
 goofed up, there are providers who attempt to keep their network users
 (even if they aren't direct customers) informed.

And if you're a network operator who is flinging packets across our
network and they aren't arriving, and you want to know why, that
generally fits the descripton of good reason, in my book.  

I'll admit, it isn't perfect.  As somebody else pointed out, good
reason is not an easy metric; it depends on who you are, who you have
reached, the nature of the outage, how busy the NOCC is, the phase of
the moon, etc, etc.

-Dave






Re: Using Policy Routing to stop DoS attacks

2003-03-28 Thread Petri Helenius

With Juniper gear there is no performance difference between what you propose
and an ACL, both run at wire rate. So implementing CPU saving measures is pointless
waste of time.

Pete


 We could ask Cisco and Juniper to add a way of 'artificially' remove networks from 
 the CEF table (with an ACL or so). That way,
even with loose-RPF, the packet will be dropped based on source-address at the ingress 
without consuming CPU.
 Or maybe such a feature already exist
 André

 At 09:06 25.03.2003 -0500, Christian Liendo wrote:

 Looking for advice.
 
 I am sorry if this was discussed before, but I cannot seem to find this.
 I want to use source routing as a way to stop a DoS rather than use access-lists.
 
 In other words, lets say I know the source IP (range of IPs) of an attack and they 
 do not change.
 
 If the destination stays the same I can easily null route the destination, but what 
 if the destination constantly changes. So I
have to work based on the source IP.
 
 Depending on the router and the code, if I implement an access-list then the CPU 
 utilization shoots through the roof.
 What I would like to try and do is use source routing to route that traffic to 
 null. I figured it would be easier on the router
than an access-list.
 
 Has anyone else tried this successfully on ciscos and junipers?
 Is it easier on the CPU than access-lists?
 Is there a link I cannot find on cisco or google?
 
 Thanks
 Christian Liendo
 

 -
 Andre Chapuis
 IP+ Engineering
 Swisscom Ltd
 Genfergasse 14
 3050 Bern
 +41 31 893 89 61
 [EMAIL PROTECTED]
 CCIE #6023
 --





OUTAGE: Known Iraq public Internet service

2003-03-28 Thread Sean Donelan

In the last few hours, all the public Internet hosts I knew were
physically in Iraq (i.e. connected through the Iraqi state provider),
have stopped responding.  I don't know the cause (power failure,
telecom failure, physical damage, shutdown by administrator, etc).

Of course, this does not mean there are no IP-enabled devices
operating within Iraq's physical borders.  The Iraq government and
military may have private IP networks, not connected to the Internet
or connected in ways I don't know about.  Likewise the US military and
various news media are carrying IP enabled devices in southern Iraq, but I
don't know their IP addresses. I also believe in Kurdish controlled areas
have seperate Internet connections.



Re: is this true or... ?

2003-03-28 Thread David Schwartz

On Fri, 28 Mar 2003 12:06:56 -0500, blitz wrote:

If it is, it reveals how utterly clueless our legislators really
are

The text I saw talks about a device's primary purpose. The primary
purpose of NAT is not to hide anything, it's to allow multiple
connections to share a scarce resource. If you download your email
over an encrypted link, your primary purpose is to conceal the
*content* of communications, not their source or destination.
Similarly, the primary purpose of a firewall is to enforce policies
about security, not to hide the origin of a communication.

So the issue is really more narrow. The issue is whether it's ever
legitimate to do something primarily for the purpose of hiding the
origin or destination of a communication from an ISP. I would argue
that most people don't care if their ISPs know where there
communications originate or terminate; however, the law is bad
because there certainly are legitimate cases where my ISP has no
business knowing who is talking to me or who I'm talking to.

However, Felten's claim that anything that concealed the origin
would be illegal is FUD. In fact, his spin no it is pure FUD, IMO.

That said, if it takes a bit of FUD to get attention to a bad law,
that's maybe not such a terribly bad thing. The risk is that
lawmakers will refute the FUD and then feel comfortable going ahead
with a bad law.

--
David Schwartz
[EMAIL PROTECTED]




Re: is this true or... ?

2003-03-28 Thread Steven M. Bellovin

In message [EMAIL PROTECTED]@whenever, David Schwar
tz writes:

On Fri, 28 Mar 2003 12:06:56 -0500, blitz wrote:

If it is, it reveals how utterly clueless our legislators really
are

   The text I saw talks about a device's primary purpose. 

I'm not sure what text you saw.  The Texas bill (I posted the URL 
earlier today) does not speak of primary purpose.  The section Felten 
warned about (Section 6) criminalizes the following things:  
manufacture, sale, etc., of a communications device with an intent to 
*either* defraud, *or* conceal origin, destination, etc.; manufacture, 
sale, etc., of an unauthorized access divce; or manufacture, sale, 
etc., of plans or instructions for such devices with the knowledge that 
the intent of the end user is illegal.  The word primary does not 
occur in the text of the bill, according to both my reading and Acrobat's 
find fucntion.

--Steve Bellovin, http://www.research.att.com/~smb (me)
http://www.wilyhacker.com (2nd edition of Firewalls book)




Re: is this true or... ?

2003-03-28 Thread Jack Bates
Steven M. Bellovin wrote:
but there may be session state -- it's bill HB 2121) only criminalizes the
conduct if it's done with intent to harm or defraud a communications
service provider.  Now, given the anti-NAT and anti-VPN tendencies of some
broadband ISPs, I'm not necessarily thrilled, but it's not quite the 
same as was originally suggested.  

Without looking it up (a little busy), there should be a Definitions 
section defining communications service provider. Is the bill aimed at 
ISP's or is it aimed at the actual Telco?

-Jack
*probably just creating noise*


Re: is this true or... ?

2003-03-28 Thread Steven M. Bellovin

In message [EMAIL PROTECTED], Jack Bates writes:
Steven M. Bellovin wrote:
 but there may be session state -- it's bill HB 2121) only criminalizes the
 conduct if it's done with intent to harm or defraud a communications
 service provider.  Now, given the anti-NAT and anti-VPN tendencies of some
 broadband ISPs, I'm not necessarily thrilled, but it's not quite the 
 same as was originally suggested.  
 

Without looking it up (a little busy), there should be a Definitions 
section defining communications service provider. Is the bill aimed at 
ISP's or is it aimed at the actual Telco?

-Jack
*probably just creating noise*

I'm busy, too, and probably shouldn't bother, but see 
http://www.capitol.state.tx.us/data/docmodel/78r/billtext/pdf/HB02121I.PDF
-- and yes, it specifically speaks of an Internet-based distribution 
system, network, or facility.


--Steve Bellovin, http://www.research.att.com/~smb (me)
http://www.wilyhacker.com (2nd edition of Firewalls book)




Re: is this true or... ?

2003-03-28 Thread Scott W Brim

On Fri, Mar 28, 2003 09:35:09AM -0600, Jack Bates allegedly wrote:
 Without looking it up (a little busy), there should be a Definitions 
 section defining communications service provider. Is the bill aimed at 
 ISP's or is it aimed at the actual Telco?

Also a communication.