Re: Wildcards: ICANN and IAB posted their commentaries

2003-09-19 Thread Doug Barton

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Fri, 19 Sep 2003 [EMAIL PROTECTED] wrote:

> http://www.icann.org/announcements/advisory-19sep03.htm

Folks,

In regards to the statement above, the Security and Stability Advisory
Committee is sincerely interested in your feedback regarding this issue.
We are currently working on a report that details the impacts of
wildcards at the TLD level, and elsewhere as appropriate.

I would like to request that you restrict your comments to actual
operational issues. That will help ensure that they get due
consideration. We're most interested in issues related to things
that worked before, but don't now; and particularly interested in
non-obvious cases. Of course, if you have other points of interest on
this topic, we're all ears.

The e-mail address for your feedback is [EMAIL PROTECTED]

Doug
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.3 (FreeBSD)

iD8DBQE/a9//yIakK9Wy8PsRAkQqAJwPXQzltTL4Kp4NRfSJR56gwBbdgQCg+WOc
Py1DIywm8FKhA3Q/v4XxrmY=
=jdSM
-END PGP SIGNATURE-


Re: Worst design decisions?

2003-09-19 Thread Matt
Frank wrote:

On Thu, 2003-09-18 at 00:43, Matt wrote:
 

Hello all,

Was doing some upgrades on a UBR7246 (to a VXR), and I got to thinking 
about short sighted design considerations.  I was curious if any of you 
had some pet peeves from a design perspective to rant about.  I'll start 
with a couple.
   

the orginal GSR blanks came without handles. They were also put in tight
as ***. For days after, your fingers would have the imprints of the
little screws on them. I once use my socks to protect my fingers when I
was pulling them out.
Frank



 

You grabbed another one from that chassis I hadn't considered right away 
(although I do now).  Yes, that was extremely annoying - I snapped a 
screw once on an old 5800 chassis with the same design flaw.



Re: Worst design decisions?

2003-09-19 Thread Matt
Casassa, Nathan wrote:

The scissor-jack you are referring to that comes with the 12016 also doubles
as an excellent coffee table in our office...
Nathan





-Original Message-
From: Shawn Solomon [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, September 17, 2003 9:44 PM
To: Matt; [EMAIL PROTECTED]
Subject: RE: Worst design decisions?



The 12016 does have handles on the sides, but the documentation states not
to use them for lifting purposes.  Yeah, I laughed too, just before
realizing that bear-hugging a 16 into position takes a bit of motivation.
It is definitely one big hunk of iron (300+lbs on the shipping invoice), but
I just couldn't understand why in the @%$$ useful handles weren't provided.
On a side note, the scissor-jacks that came with them could lift a house.
Heh.  

http://www.cisco.com/en/US/products/hw/routers/ps167/prod_installation_g
uide09186a0080188f38.html


Warning Do not attempt to lift the chassis with the handles on the back and
sides of the chassis. These handles are not designed to support the weight
of the chassis, and should be used only to steady and guide the chassis
while it is being inserted into or removed from an equipment rack. To reduce
the risk of damage to the chassis and serious bodily injury, do not use
these handles to lift or support the chassis. 



-Original Message-
From: Matt [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, September 17, 2003 5:43 PM
To: [EMAIL PROTECTED]
Subject: Worst design decisions?

Hello all,

Was doing some upgrades on a UBR7246 (to a VXR), and I got to thinking 
about short sighted design considerations.  I was curious if any of you 
had some pet peeves from a design perspective to rant about.  I'll start

with a couple.

1) Why did Cisco design the I/O controller on the 7246 with screws in 
the corner, which are very difficult to get at?  And worse than that, 
why did they not include a cheap handle on the blank in this slot?

2) Why did Cisco not include side handles on the 12000 chassis?  It's a 
heavy chassis, and I can imagine how many techs have thrown out their 
back moving that chassis around.

I've got a couple others in my head from 3Com and a couple of others, 
but I thought I'd get the ball rolling.  So, what do you think?

 

The one I was ranting about was a 12008, but I digress.



Wildcards: ICANN and IAB posted their commentaries

2003-09-19 Thread rgaglian


You can find them here:

http://www.iab.org/documents/docs/2003-09-20-dns-wildcards.html
http://www.icann.org/announcements/advisory-19sep03.htm

I've just checked that VeriSign has not voluntarily suspend the service

Best

Roque
Ing.Roque Gagliano
[EMAIL PROTECTED]



Re: Providers removing blocks on port 135?

2003-09-19 Thread bmanning

> > Why do you get to decide that, I can't, from a hotel room, call my ISP and
> > put up a web server on my dialup connection so someone behind a firewall
> > can retrieve a document I desperately need to get to them?  Why
> > _SHOULDN'T_
> > I run a web server to do this over a dialup connection?  Why do you get

when scp or ftp over an ssh tunnel are much easier/lighter weight?

or you could hand out ASNs and run third-party BGP from your
hotel room back to the trusted core...  there are lots of ways
to get your critical content to the right party, some are more
cost effective than others.

The name "Rube Goldburg" comes to mind here...

> The distinction may be blurrier these days, but there *is* a difference
> between networking and internetworking. 

true enough. 

--bill


RE: Worst design decisions?

2003-09-19 Thread Ron Snyder



> overdesigned rather than poorly designed.  even if nobody
> can use it, it's just an extraneous feature.  an atm built
> into the concrete that you'd have to stop short of and
> get out of your car to use.  now that would be poorly
> designed.


Do you mean overdesigned in the sense that because that atm has features
that wouldn't be needed in it's current location, that it shouldn't have
those features?  What about just making inventory tracking easier? (eg. "We
have 32 ATMs that are all featurewise identical and they're all
interchangeable" vs. "We have 22 ATMS with feature X and 10 w/o feature X")

Now, to get it somewhat related to network stuff:
s/atm/router/
s/features/capabilities/
s/location/network function/

\


RE: routing issue?

2003-09-19 Thread kwallace

thanks to everyone who responded on/off list. The bad /24 announcement is
now gone (pfm :) ) . Just seeing the /8 now.

Keith Wallace
Director, Telecommunications
PC Connection Services
[EMAIL PROTECTED] dot com



The information in this email, and subsequent attachments, may
contain
confidential information that is intended solely for the attention
and use
of the named addressee(s).  This message or any part thereof must
not be
disclosed, copied, distributed or retained by any person without
authorization from the above named sender.


-Original Message-
From: Wallace Keith 
Sent: Friday, September 19, 2003 4:15 PM
To: [EMAIL PROTECTED]
Subject: routing issue?



Can anyone reach  the  38.221.129/24 range?I'm seeing this announced as
a /24 by L3,  but looks like it should be a /8 from Cogent(PSI).
Just looking for another viewpoint.  tnx.

Keith









Re: Worst design decisions?

2003-09-19 Thread steve uurtamo


It's usually a legal risk deferrer decision to buy the ATM
casing with Braille. Someone pointed out that Drive-Ups and Walk-Ups are
the same, which it true for the internals but not Drive-Ups casing and
moldings, which are adjusted for the average eye level of a person in a
car, plus recessed, tiled monitors, etc.
Basically, it costs x,xxx.xx to get the casing with Braille, and
legal risk is valued at xx,xxx.xx (i.e. someone suing them because it
doesn't have Braille).
	Better safe then sorry in risk management. I wouldn't view this
is a lapse in deign decision, more of an obscure design decision.
 

overdesigned rather than poorly designed.  even if nobody
can use it, it's just an extraneous feature.  an atm built
into the concrete that you'd have to stop short of and
get out of your car to use.  now that would be poorly
designed.
s.




Re: routing issue?

2003-09-19 Thread Henry Yen

On Fri, Sep 19, 2003 at 04:15:20AM -0400, [EMAIL PROTECTED] wrote:
> 
> Can anyone reach  the  38.221.129/24 range?I'm seeing this announced as
> a /24 by L3,  but looks like it should be a /8 from Cogent(PSI).
> Just looking for another viewpoint.  tnx.

from uunet:
   traceroute to 38.221.129.1 (38.221.129.1), 30 hops max, 38 byte packets
6  POS7-0.BR1.NYC9.ALTER.NET (152.63.18.221)  6.436 ms  6.135 ms  6.355 ms
7  204.6.134.170 (204.6.134.170)  6.767 ms  6.508 ms  6.351 ms
8  p14-0.core01.jfk01.atlas.psi.net (154.54.1.197)  6.634 ms  9.730 ms  10.325
   ms
9  p12-0.core01.jfk02.atlas.cogentco.com (66.28.4.10)  7.470 ms  7.191 ms  6.894 ms
   10  p4-0.core02.dca01.atlas.cogentco.com (66.28.4.81)  13.017 ms  12.913 ms  12.816 
ms
   11  p14-0.core01.atl01.atlas.cogentco.com (66.28.4.161)  25.800 ms  42.129 ms  
26.144 ms
   12  g0-2.na01.b000447-0.atl01.atlas.cogentco.com (66.250.11.78)  26.008 ms  26.219 
ms  25.916 ms
   13  38.221.129.1 (38.221.129.1)  24.880 ms  24.784 ms  24.889 ms
   
-- 
Henry Yen   Aegis Information Systems, Inc.
Senior Systems Programmer   Hicksville, New York


RE: Worst design decisions?

2003-09-19 Thread John Neiberger

 Scott Granados <[EMAIL PROTECTED]> 9/19/03 1:36:39 PM >>>
>
>Actually, not what I've heard.  I have a contact at a large east
coast
>bank who told me they were charged extra for Braille per ATM.  I had
>assumed for years it was a case of build them all one way only to
save
>cost.  But in fact this is not the case.
>
>At least for the type they use.

Even if banks have to pay extra for Braille they're going to do it.
Banks have a phobia regarding lawsuits or being written up during an
audit. This phobia causes them to do things that don't necessarily make
a lot of sense to normal people.

Operationally speaking (sort of), any of you who work for banks and
have had to sit through network audits performed by idiots know what I'm
talking about. Sometimes these network audits are performed by clueless
monkeys who make 'suggestions' that have no basis in reality or logic
but we end up having to follow their recommendations for fear of being
written up during the next audit!

Insanity...

John
--


routing issue?

2003-09-19 Thread kwallace

Can anyone reach  the  38.221.129/24 range?I'm seeing this announced as
a /24 by L3,  but looks like it should be a /8 from Cogent(PSI).
Just looking for another viewpoint.  tnx.

Keith










Re: Providers removing blocks on port 135?

2003-09-19 Thread Jack Bates
Owen DeLong wrote:

Yes.   I responded to this in a previous post.  We must do what we must do
temporarily to keep things running.  However, breaking the net is not a 
long
term solution.  We must work to solve the underlying problem or it just 
becomes
an arms-race where eventually, no services are useful.

I agree, and as a point of fact, many ISP's allow their users to opt out 
of spam. The ability to opt out of port filtering is a little more 
difficult, but it is not impossible. Most authentication methods 
designed have support for telling connection equipment what security 
lists to use and how to treat a specific user. Some systems, like mine, 
do not run authentication models that support this, but I consider it 
very wise to change.

In my case, I will maintain a filter anywhere in the network that it is 
required in order to help protect the network and the users who rely 
upon the network. Currently, estimates show that removing port 135 at 
this junction would allow the current Blaster infected users to become 
infected with Nachi/Welchia which has more network impact. Some 
segments, despite blocks, have already had small outbreaks which we had 
to irradicate. In addition, dialups have very little bandwidth to begin 
with. The amount of traffic generated on icmp and 135 is currently high 
enough to severly cripple connectivity on an unprotected dialup account.

I do agree that it is a temporary measure. Yet, one must remember that 
each network has it's own definitions of temporary, drastic, and 
appropriate. I now return you to contacting those infected users in your 
network. :)

-Jack



RE: Worst design decisions?

2003-09-19 Thread Alex Rubenstein



> 2. The BAT csu/dsu, a cheap T1 csu/dsu which used red LED's to indicate
> that all was well (or was it green to indicate an alarm?)

As admitted by them, whatever cheap LED's they could by at Fry's on deep
discount.

No, I am not kidding.




-- Alex Rubenstein, AR97, K2AHR, [EMAIL PROTECTED], latency, Al Reuben --
--Net Access Corporation, 800-NET-ME-36, http://www.nac.net   --



RE: Worst design decisions?

2003-09-19 Thread Shawn Jackson


It's usually a legal risk deferrer decision to buy the ATM
casing with Braille. Someone pointed out that Drive-Ups and Walk-Ups are
the same, which it true for the internals but not Drive-Ups casing and
moldings, which are adjusted for the average eye level of a person in a
car, plus recessed, tiled monitors, etc.

Basically, it costs x,xxx.xx to get the casing with Braille, and
legal risk is valued at xx,xxx.xx (i.e. someone suing them because it
doesn't have Braille).

Better safe then sorry in risk management. I wouldn't view this
is a lapse in deign decision, more of an obscure design decision.

Shawn Jackson
Systems Administrator
Horizon USA
1190 Trademark Dr #107
Reno NV 89521
www.horizonusa.com
 
Email: [EMAIL PROTECTED]
Phone: (775) 858-2338
   (800) 325-1199 x338

-Original Message-
From: Damian Gerow [mailto:[EMAIL PROTECTED] 
Sent: Friday, September 19, 2003 11:34 AM
To: [EMAIL PROTECTED]
Subject: Re: Worst design decisions?


Thus spake Mike Donahue ([EMAIL PROTECTED]) [19/09/03 15:28]:
> Hi.. I might have missed the post, but braille on drive through has
zero to
> do with a design mistake - it's practicality.  The ATM manufacturer
doesn't
> put out a "drive-through" and "walk-up" model - it puts out one, and
then
> it's up to whomever to mount it.  Simpler just to put braille on the
kit and
> ship, and not worry about it.

But the bank, who chooses to mount the Braille-enabled machine as drive
through, orders the Braille added, do they not?

(As to whether or not this is a good idea, I'm keeping away from.)



RE: Worst design decisions?

2003-09-19 Thread Scott Granados

Actually, not what I've heard.  I have a contact at a large east coast
bank who told me they were charged extra for Braille per ATM.  I had
assumed for years it was a case of build them all one way only to save
cost.  But in fact this is not the case.

At least for the type they use.


On Fri, 19 Sep 2003, Mike Donahue wrote:

>
> >At 04:24 PM 9/18/2003, [EMAIL PROTECTED] wrote:
>
> >>  The US Congress.
> >>  "can you say ADA - sure you can" - Fred Rodgers
> >>
> >>> Who thought it was a good idea to put braille on the drive up atms?
>
> >While I don't know if the person in question was blind or not, I *have*
> seen someone use a >drive-up ATM from the back seat of a car.
>
> >jc
>
> Hi.. I might have missed the post, but braille on drive through has zero to
> do with a design mistake - it's practicality.  The ATM manufacturer doesn't
> put out a "drive-through" and "walk-up" model - it puts out one, and then
> it's up to whomever to mount it.  Simpler just to put braille on the kit and
> ship, and not worry about it.
>
> Mike
>



Re: Worst design decisions?

2003-09-19 Thread Damian Gerow

Thus spake Mike Donahue ([EMAIL PROTECTED]) [19/09/03 15:28]:
> Hi.. I might have missed the post, but braille on drive through has zero to
> do with a design mistake - it's practicality.  The ATM manufacturer doesn't
> put out a "drive-through" and "walk-up" model - it puts out one, and then
> it's up to whomever to mount it.  Simpler just to put braille on the kit and
> ship, and not worry about it.

But the bank, who chooses to mount the Braille-enabled machine as drive
through, orders the Braille added, do they not?

(As to whether or not this is a good idea, I'm keeping away from.)


RE: Worst design decisions?

2003-09-19 Thread Mike Donahue

>At 04:24 PM 9/18/2003, [EMAIL PROTECTED] wrote:

>>  The US Congress.
>>  "can you say ADA - sure you can" - Fred Rodgers
>>
>>> Who thought it was a good idea to put braille on the drive up atms?

>While I don't know if the person in question was blind or not, I *have*
seen someone use a >drive-up ATM from the back seat of a car.

>jc

Hi.. I might have missed the post, but braille on drive through has zero to
do with a design mistake - it's practicality.  The ATM manufacturer doesn't
put out a "drive-through" and "walk-up" model - it puts out one, and then
it's up to whomever to mount it.  Simpler just to put braille on the kit and
ship, and not worry about it.

Mike


Re: Worst design decisions?

2003-09-19 Thread Valdis . Kletnieks
On Fri, 19 Sep 2003 12:08:33 PDT, Scott Granados said:

> noise anyway.  So that someone looking over your shoulder will still be
> there unless you've memorized the prompts on your local atm, a possibility
> granted.

Works for my dad - though he did have to call the bank once, turned out
they had added a "Select English or Spanish" screen at the start


pgp0.pgp
Description: PGP signature


RE: Providers removing blocks on port 135?

2003-09-19 Thread Mark Borchers

> Why do you get to decide that, I can't, from a hotel room, call my ISP and
> put up a web server on my dialup connection so someone behind a firewall
> can retrieve a document I desperately need to get to them?  Why
> _SHOULDN'T_
> I run a web server to do this over a dialup connection?  Why do you get
> to dictate to _ANYONE_ what things they can and can't do with their most
> portable internet access?  How can you say that it is negligent to refuse
> to DOS your customers unless they request it?  (blocking traffic to me
> that I want is every bit as much a denial of service as flooding my link).


The distinction may be blurrier these days, but there *is* a difference
between networking and internetworking.  Whereas I'd agree that
interconnections
between networks be unencumbered to the greatest degree possible, the
administrator
of a network can be slightly more draconian in order to keep the network
running
smoothly.

This statement applies, IMHO, to any provider who sells service to
individual
users.  It may be a huge wide area dialup network, but it's still a network,
in which the average customer is not a professional network administrator
but
rather a user of indeterminate knowledge level.

Now, if as an ISP you operate an internetwork ("network of networks") and a
network of users, the challenge is obviously how do you draw the distinction
between user/customers and network/customers.  I think it's do-able (DHCP
being
one criteria that comes to mind), but there there are a lot of permutations
to
consider.




Re: Worst design decisions?

2003-09-19 Thread Scott Granados

Just to clerify, since I've gotten a ton of these.

I'm totally blind have been for 28 years.

Braille on walk up machines, makes good sense.  As does it on lifts and
microwave oven buttons etc. It does not make good sense on airplane lights
and it makes less sense on drive up atms.

Especialy when you think it through long enough and if someone needs to
use braille chances are they are visually impaired enough to not be able
to read the screens at all.  Thus when the atm doesn't speak back to you
as many still don't your not sure what prompt your at.

Many do speak in larger cities,  with braille makes them very useful.


But in a car again, generally the voice will be low enough, for obvious
security ; and other reasons you won't hear it over the car and surround
noise anyway.  So that someone looking over your shoulder will still be
there unless you've memorized the prompts on your local atm, a possibility
granted.



Its just a problem that hasn't been well thought out and baddly
engineered!
 On Thu, 18 Sep 2003 [EMAIL PROTECTED] wrote:

> On Thu, 18 Sep 2003 16:14:39 PDT, Scott Granados said:
>
> > Who thought it was a good idea to put braille on the drive up atms?
>
> My dad's legally blind.   That braille makes it possible for him to get cash
> (either from the back seat or step out and walk up) if somebody's
> giving him a ride, without him having to give his card and PIN to
> somebody else.
>



Re: apathy (was Re: .ORG problems this evening)

2003-09-19 Thread Richard A Steenbergen

On Fri, Sep 19, 2003 at 01:36:41PM -0400, Todd Vierling wrote:
> 
> On Fri, 19 Sep 2003, Rodney Joffe wrote:
> 
> : You started from a point of having no idea that UltraDNS used anycast,
> : confirmed for everyone in your second email that you had no clue about
> : how anycast worked,
> 
> Please stop the bellicose, holier-than-thou attitude because you feel like
> assuming that I don't have networking experience.  It's getting tiresome.
> I apologize for whatever I've done to offend you.

On behalf of the entire NANOG community, please stop pretending that you
DO have a clue just because you believe people shouldn't assume you don't.
Trust me when I say that is is no longer an assumption.

Please also do not mistake apathy for annoyance at your continued 
incessant whining about anycast and UltraDNS. You don't have anything more 
useful to say, so please do us all a favor and just stop now.

-- 
Richard A Steenbergen <[EMAIL PROTECTED]>   http://www.e-gerbil.net/ras
GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)


RE: Worst design decisions?

2003-09-19 Thread Chris Horry

RJ45 connectors: Nasty fiddly things that never seem to work the first
time you wire them up.  (snip, curse, try again...)

Chris

-- 
Chris Horry   "Don't submit to stupid rules,
[EMAIL PROTECTED] Be yourself and not a fool.
PGP: DSA/2B4C654E  Don't accept average habits,
Amateur Radio: KG4TSM   Open your heart and push the limits."



Re: Nothing like viruses with bugs in them (Swen)

2003-09-19 Thread chuck goolsbee
We are also filtering on the following content line:

*Run attached file. Choose Yes on displayed dialog box.*

(sigh)
It does run counter to the sentiments expressed in the mail sig though...
Related to Mr. Bellovin's latest note, how are operators (and abuse 
desks) dealing with the bizarre behavior of some recent mailers that 
send "forwards" as obviously W32-readable-only attachments?

--chuck goolsbee

--

__
There's only so much stupidity you can compensate for;
there comes a point where you compensate for so much
stupidity that it starts to cause problems for the
people who actually think in a normal way.
-Bill, digital.forest tech support


Re: Nothing like viruses with bugs in them (Swen)

2003-09-19 Thread Steven M. Bellovin

In message <[EMAIL PROTECTED]>, "Mr. 
James W. Laferriere" writes:
>
>   Hello All ,
>
>On Fri, 19 Sep 2003, Brian Bruns wrote:
>> These are exim filters which catch the damn thing when the antivirus
>> software misses it.  Hopefully it might be useful.  It was taken from
>> http://pkierski.republika.pl/filtry.shtml.
>...snipped nice exim filters...
>   Is there an example of a procmail filter for this bugger ?
>   Tia ,  JimL

Here's what I use to eliminate trash on my personal incoming mail.  (I 
run NetBSD; I'm not likely to find .exe's useful...)


MIMEINFO=`/usr/pkg/bin/reformime -i`
:0
* MIMEINFO ?? 
^content-name:.+[~.](asd|bat|chm|cmd|com|dll|exe|hlp|hta|js|jse|lnk|ocx|pif|scr|shb|shm|shs|vb|vbe|vbs|vbx|vxd|wsf|wsh)$
/dev/null 

No warranties, expressed or implied.


--Steve Bellovin, http://www.research.att.com/~smb




RE: Providers removing blocks on port 135?

2003-09-19 Thread Owen DeLong

I disagree.  In my opinion a NSP shouldn't filter traffic unless one of
its customers requests it.  However I strongly believe that an ISP (where
it's customers are Joe Blow average citizen and Susy Homemaker) should
take every reasonable step to protect it's users from malicious traffic
and that includes filtering ports.  For example I have no reservation
about NATing basic dialup users.  I also have no problem with filtering
ports for services they shouldn't be running on a dialup connection (HTTP,
FTP, DNS)  or for services that IMHO have no business on the public
internet (including every single Microsoft port I can identify).  To not
do so is IMHO to run a network in an extremely negligent manner.
Why do you get to decide that, I can't, from a hotel room, call my ISP and
put up a web server on my dialup connection so someone behind a firewall
can retrieve a document I desperately need to get to them?  Why _SHOULDN'T_
I run a web server to do this over a dialup connection?  Why do you get
to dictate to _ANYONE_ what things they can and can't do with their most
portable internet access?  How can you say that it is negligent to refuse
to DOS your customers unless they request it?  (blocking traffic to me
that I want is every bit as much a denial of service as flooding my link).
We do this very thing with email.  We filter known malicious messages,
attachments, and spam from email.  I don't think there's a reasonable
person among us that can complain about that.  Why not do it to network
traffic then?  If we should allow every bit of traffic to pass unmolested
by ACLs then we should allow all email to pass by unmolested by
anti-virus  and spam checks.  It's a two-way street.
I leave it to the community to decide whether I am a reasonable person or
not, but, generally, I tend to think that I am viewed as such.
However, I would complain about the parctices you describe above
if I was your customer.  If I ask you to filter SPAM, fine.  If I ask you 
not
to filter SPAM, then I should receive every email addressed to me.  If I
cannot, then, I won't be your customer.  As far as I'm concerned, if an ISP
wants to run anti-virus or spam-checks, they should run them as an opt-in
value added service, _NOT_ as a "we're deleting your mail for you whether
you like it or not" thing.

On the other hand, what's a provider to do when their access hardware
can't deal with a pathological set of flows or arp entries? There isn't
[snip]
A good point.
Yes.   I responded to this in a previous post.  We must do what we must do
temporarily to keep things running.  However, breaking the net is not a long
term solution.  We must work to solve the underlying problem or it just 
becomes
an arms-race where eventually, no services are useful.

Owen



RE: Providers removing blocks on port 135?

2003-09-19 Thread Owen DeLong
I agree.  In my opinion, at this point, the larger issue that we really need
to find a way to address is to force a recall on the Exploding Pinto and
get real product liability available to the victims.  Not just the moron
who bought the Exploding Pinto knowing it would probably explode, who,
actually should have some culpability, but, more importantly, there should
be actual liability on the part of the manufacturer and the reckless
operator to the innocent bystander victims (ISPs, Web sites, etc.) that
are forced to try to repair or work around the damage, handle the traffic,
etc.
The Virus-of-the-week club is not going to go away until somebody gets
a multi-million dollar judgement against Micr0$0ft for the damage inflicted
by their Exploding Pinto, or, until businesses start to see that there
is liability for running unpatched windows systems to the tune of "If you
keep driving your Exploding Pinto, you may have to pay $$$ to the victims
of the explosion when it occurs."
Case 1 will lead Micr0$0ft to start rethinking some of it's less secure
design decisions.  Case 2 will lead businesses to evaluate whether
Windows is _REALLY_ a cost effective choice or not.
Until at least one, preferably both of these things happens, we are going
to be stuck with the consequences of other people choosing to run Whine-Doze
whether we run it, or even want to know that anyone runs it or not.
Owen

--On Friday, September 19, 2003 10:32 AM -0700 Matthew Kaufman 
<[EMAIL PROTECTED]> wrote:

Well, we could start by having every ISP do what we do, which is to find
worm-infected customers inside our network and get them patched or turned
off. But that's a lot of work. (Especially when you've got a new worm to
track down every week)
The scary/unfortunate part to me is that these things never seem to go
away... Check your web server's log for the last hit from Code Red, for
instance. (6 minutes ago, from 203.59.48.139, on the server I just
checked)
Matthew Kaufman
[EMAIL PROTECTED]
-Original Message-
From: Owen DeLong [mailto:[EMAIL PROTECTED]
Sent: Friday, September 19, 2003 10:23 AM
To: Matthew Kaufman; 'Jack Bates'; 'Adam Hall'
Cc: [EMAIL PROTECTED]
Subject: RE: Providers removing blocks on port 135?
OK... Obviously, you need to do what you need to do to keep things
running.  However, that should be a temporary crisis
response.  If your
equipment is getting DOS'd for more than a few months, we need to find
a way to fix a bigger problem.  Permanently breaking some service
(regardless
of what we think of it.  Personally, I'll be glad to see M$
go down in
flames)
is _NOT_ the correct answer.
Owen






Re: Worst design decisions?

2003-09-19 Thread Leo Bicknell
In a message written on Thu, Sep 18, 2003 at 03:53:44PM -0700, Ben Browning wrote:
> Cisco V-notched power cables - Design "feature" geared around getting 
> suckers to buy a power cable for 45USD.

Uh, you might want to be careful with these connections.  You'll
note the IEC-320 C13/C14 connectors (eg, what you find on PC's) are
15 Amps, but only 65 degC rated.  The IEC-320 C15/C16 (with the
notch) are also 15 Amps, but are rated to a pin temperature of 120
degC.  I doubt Cisco did it to be a PITA, electrical codes probably
required it for some reason.

-- 
   Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org


pgp0.pgp
Description: PGP signature


Re: apathy (was Re: .ORG problems this evening)

2003-09-19 Thread Todd Vierling

On Fri, 19 Sep 2003, Rodney Joffe wrote:

: You started from a point of having no idea that UltraDNS used anycast,
: confirmed for everyone in your second email that you had no clue about
: how anycast worked,

Please stop the bellicose, holier-than-thou attitude because you feel like
assuming that I don't have networking experience.  It's getting tiresome.
I apologize for whatever I've done to offend you.

What I didn't know at first was that UltraDNS's system was based on anycast.
Yes, it was my oversight, probably due to my own complacency with the gTLDs
Just Working for so long.  Once I was notified of that fact, my perspective
on the problem changed quite a bit.

I do know how anycast routing works, and that it failed miserably in this
particular case.  The implementation failure specifics are not my concern on
this point; the simple fact is that a critical gTLD resource failed.

Blindly trusting that the all-anycast implementation in use will work
"better" in the future seemed a rather bad idea to me in the context of a
gTLD.  I was trying to figure out, with the help of others who have been far
more gracious, what possibilities exist that could help keep the failure
from happening again -- outside the scope of this particular anycast
implementation.

: But it's really just that other people actually take time to research
: issues before mouthing off.

Actually, my first few requests for corroborating information ("research")
received several mouthing-off responses.  Much of this thread has required
me to fend off rather improper personal attacks -- this one included -- from
people such as yourself, while at the same time attempting to get assistance
to analyze a difficult to see, corner case problem with a critical resource.

I have apologized offlist to a few people whose heated remarks to me
received heated messages in response, and I apologize to all on-list right
now.  That is not appropriate here in either direction.

: In the interim, feel free to post your operational experience

Ultimatum demands like this are just not called for, and I will not be a
party to it.  However, I'm happy to discuss it offlist with anyone who may
be interested; there are business-vs.-personal reasons that I cannot discuss
this on-list.

-- 
-- Todd Vierling <[EMAIL PROTECTED]> <[EMAIL PROTECTED]>


RE: Providers removing blocks on port 135?

2003-09-19 Thread Justin Shore

On Fri, 19 Sep 2003, Matthew Kaufman wrote:

> 
> I agree entirely with this. You shouldn't call yourself an ISP unless you
> can transport the whole Internet, including those "bad Microsoft ports",
> between the world and your customers.

I disagree.  In my opinion a NSP shouldn't filter traffic unless one of
its customers requests it.  However I strongly believe that an ISP (where
it's customers are Joe Blow average citizen and Susy Homemaker) should
take every reasonable step to protect it's users from malicious traffic
and that includes filtering ports.  For example I have no reservation
about NATing basic dialup users.  I also have no problem with filtering
ports for services they shouldn't be running on a dialup connection (HTTP,
FTP, DNS)  or for services that IMHO have no business on the public
internet (including every single Microsoft port I can identify).  To not
do so is IMHO to run a network in an extremely negligent manner.

We do this very thing with email.  We filter known malicious messages, 
attachments, and spam from email.  I don't think there's a reasonable 
person among us that can complain about that.  Why not do it to network 
traffic then?  If we should allow every bit of traffic to pass unmolested 
by ACLs then we should allow all email to pass by unmolested by anti-virus 
and spam checks.  It's a two-way street.

> On the other hand, what's a provider to do when their access hardware can't
> deal with a pathological set of flows or arp entries? There isn't a good
> business case to forklift out your DSLAMs and every customer's matching CPE
> when a couple of ACLs will fix the problem. For that matter, there isn't a
> very good business case for transporting Nachi's ICMP floods across an
> international backbone network when you can do a bit of rate-limiting and
> cut your pipe requirements by 10-20%.

A good point.  

Justin



RE: Providers removing blocks on port 135?

2003-09-19 Thread Matthew Kaufman

Well, we could start by having every ISP do what we do, which is to find
worm-infected customers inside our network and get them patched or turned
off. But that's a lot of work. (Especially when you've got a new worm to
track down every week)

The scary/unfortunate part to me is that these things never seem to go
away... Check your web server's log for the last hit from Code Red, for
instance. (6 minutes ago, from 203.59.48.139, on the server I just checked)

Matthew Kaufman
[EMAIL PROTECTED]

> -Original Message-
> From: Owen DeLong [mailto:[EMAIL PROTECTED] 
> Sent: Friday, September 19, 2003 10:23 AM
> To: Matthew Kaufman; 'Jack Bates'; 'Adam Hall'
> Cc: [EMAIL PROTECTED]
> Subject: RE: Providers removing blocks on port 135?
> 
> 
> OK... Obviously, you need to do what you need to do to keep things
> running.  However, that should be a temporary crisis 
> response.  If your
> equipment is getting DOS'd for more than a few months, we need to find
> a way to fix a bigger problem.  Permanently breaking some service 
> (regardless
> of what we think of it.  Personally, I'll be glad to see M$ 
> go down in 
> flames)
> is _NOT_ the correct answer.
> 
> Owen
> 



RE: Providers removing blocks on port 135?

2003-09-19 Thread Owen DeLong
OK... Obviously, you need to do what you need to do to keep things
running.  However, that should be a temporary crisis response.  If your
equipment is getting DOS'd for more than a few months, we need to find
a way to fix a bigger problem.  Permanently breaking some service 
(regardless
of what we think of it.  Personally, I'll be glad to see M$ go down in 
flames)
is _NOT_ the correct answer.

Owen

--On Friday, September 19, 2003 10:14 AM -0700 Matthew Kaufman 
<[EMAIL PROTECTED]> wrote:

I agree entirely with this. You shouldn't call yourself an ISP unless you
can transport the whole Internet, including those "bad Microsoft ports",
between the world and your customers.
On the other hand, what's a provider to do when their access hardware
can't deal with a pathological set of flows or arp entries? There isn't a
good business case to forklift out your DSLAMs and every customer's
matching CPE when a couple of ACLs will fix the problem. For that matter,
there isn't a very good business case for transporting Nachi's ICMP
floods across an international backbone network when you can do a bit of
rate-limiting and cut your pipe requirements by 10-20%.
Matthew Kaufman
[EMAIL PROTECTED]
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Owen DeLong
Sent: Friday, September 19, 2003 10:03 AM
To: Jack Bates; Adam Hall
Cc: '[EMAIL PROTECTED]'
Subject: Re: Providers removing blocks on port 135?


FWIW, my opinion is that blocking this at the customer edge
per customer request is fine.  Any other blocking by an ISP
is damage and should be routed around like any other internet damage.
Owen






Re: Nothing like viruses with bugs in them (Swen)

2003-09-19 Thread Brian Bruns

You should be able to take the match parts of the exim filter and adapt them
to procmail.  I'm not that familiar with procmail, so I'm not sure, but here
are the primary things the filters look for:

content type: multipart/mixed; boundary=.[a-z]{6}
message body: September 200[23], Cumulative Patch

and

content type: multipart/alternative;
content type: "boundary=.[a-z]{6}
message body: iframe src=3D.cid:.*height=3D0.* width=3D0.*/iframe


Maybe someone out there with procmail experience could post procmail rules
based on this?
--
Brian Bruns
The Summit Open Source Development Group
Open Solutions For A Closed World / Anti-Spam Resources
http://www.2mbit.com
ICQ: 8077511
- Original Message - 
From: "Mr. James W. Laferriere" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Friday, September 19, 2003 1:07 PM
Subject: Re: Nothing like viruses with bugs in them (Swen)


>
> Hello All ,
>
> On Fri, 19 Sep 2003, Brian Bruns wrote:
> > These are exim filters which catch the damn thing when the antivirus
> > software misses it.  Hopefully it might be useful.  It was taken from
> > http://pkierski.republika.pl/filtry.shtml.
> ...snipped nice exim filters...
> Is there an example of a procmail filter for this bugger ?
> Tia ,  JimL
>
> > - Original Message -
> > From: "Mark Radabaugh" <[EMAIL PROTECTED]>
> > To: <[EMAIL PROTECTED]>
> > Sent: Friday, September 19, 2003 12:03 PM
> > Subject: Nothing like viruses with bugs in them (Swen)
> > > Seems like this virus/worm has a bug where it will occasionally send
out 1
> > > byte attachments rather than the correct worm payload.   Since the
virus
> > is
> > > not truly attached it tends to pass through e-mail virus scanners.
> > > It's causing a fair amount of end user confusion today -- lots of 'why
is
> > > your/my virus scanner not working?' questions.
> -- 
>
+--+
>| James   W.   Laferriere | SystemTechniques | Give me VMS
|
>| NetworkEngineer | P.O. Box 854 |  Give me Linux
|
>| [EMAIL PROTECTED] | Coudersport PA 16915 |   only  on  AXP
|
>
+--+
>




Re: Worst design decisions?

2003-09-19 Thread Christopher L. Morrow


On Thu, 18 Sep 2003, Ben Browning wrote:

>
> Cisco V-notched power cables - Design "feature" geared around getting
> suckers to buy a power cable for 45USD.

No! those are great!! you get to yell at the poor sap that uses your Cisco
power cable on their monitor! :) And when they do, and you can't get it
back, or lose it, just grab their sun's power cable and cut a notch in the
right end with your poocket knife :)

-Chris


RE: Providers removing blocks on port 135?

2003-09-19 Thread Matthew Kaufman

I agree entirely with this. You shouldn't call yourself an ISP unless you
can transport the whole Internet, including those "bad Microsoft ports",
between the world and your customers.

On the other hand, what's a provider to do when their access hardware can't
deal with a pathological set of flows or arp entries? There isn't a good
business case to forklift out your DSLAMs and every customer's matching CPE
when a couple of ACLs will fix the problem. For that matter, there isn't a
very good business case for transporting Nachi's ICMP floods across an
international backbone network when you can do a bit of rate-limiting and
cut your pipe requirements by 10-20%.

Matthew Kaufman
[EMAIL PROTECTED]

> -Original Message-
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On 
> Behalf Of Owen DeLong
> Sent: Friday, September 19, 2003 10:03 AM
> To: Jack Bates; Adam Hall
> Cc: '[EMAIL PROTECTED]'
> Subject: Re: Providers removing blocks on port 135?
> 
> 
> 
> FWIW, my opinion is that blocking this at the customer edge 
> per customer request is fine.  Any other blocking by an ISP 
> is damage and should be routed around like any other internet damage.
> 
> Owen
> 



Re: Nothing like viruses with bugs in them (Swen)

2003-09-19 Thread Mr. James W. Laferriere

Hello All ,

On Fri, 19 Sep 2003, Brian Bruns wrote:
> These are exim filters which catch the damn thing when the antivirus
> software misses it.  Hopefully it might be useful.  It was taken from
> http://pkierski.republika.pl/filtry.shtml.
...snipped nice exim filters...
Is there an example of a procmail filter for this bugger ?
Tia ,  JimL

> - Original Message -
> From: "Mark Radabaugh" <[EMAIL PROTECTED]>
> To: <[EMAIL PROTECTED]>
> Sent: Friday, September 19, 2003 12:03 PM
> Subject: Nothing like viruses with bugs in them (Swen)
> > Seems like this virus/worm has a bug where it will occasionally send out 1
> > byte attachments rather than the correct worm payload.   Since the virus
> is
> > not truly attached it tends to pass through e-mail virus scanners.
> > It's causing a fair amount of end user confusion today -- lots of 'why is
> > your/my virus scanner not working?' questions.
-- 
   +--+
   | James   W.   Laferriere | SystemTechniques | Give me VMS |
   | NetworkEngineer | P.O. Box 854 |  Give me Linux  |
   | [EMAIL PROTECTED] | Coudersport PA 16915 |   only  on  AXP |
   +--+


Re: Providers removing blocks on port 135?

2003-09-19 Thread Owen DeLong
FWIW, my opinion is that blocking this at the customer edge per customer
request is fine.  Any other blocking by an ISP is damage and should be
routed around like any other internet damage.
Owen



Re: apathy (was Re: .ORG problems this evening)

2003-09-19 Thread Rodney Joffe



Todd Vierling wrote:
> 
> On Fri, 19 Sep 2003, Alex Bligh wrote:
> 
> : > DNS site A goes down, but its BGP advertisements are still in effect.
> : > (Their firewall still appears to be up, but DNS requests fail.)  Host
> : > site C cannot resolve ANYTHING from DNS site A, even though DNS site B is
> : > still up and running.  But host site C cannot see DNS site B!
> :
> : What you seem to be missing is that the BGP advert goes away when the DNS
> : requests stop working.
> 
> It didn't.  That's the problem.
> 
> I've repeatedly described how I do understand the methodology here.  What's
> being expressed on this list is blind faith and trust in an anycast-only
> gTLD DNS scheme that has the possibility of routing to a single point of
> failure.
> 
> This scheme has already failed once.  ("When will it fail again?")
> 
> Established gTLD practice has not put trust in an anycast routing scheme
> where one (1) destination might serve all queries for a host.  What I've
> tried to express is that the years-established, standard DNS redundancy
> failover model could and should be implemented to complement -- not replace
> -- this anycast model for something as critical as a Big Three gTLD.
> 
> That's fine; I give up due to pervasive community apathy.  When this happens
> again, I'll be sure to bring up the archive URL to the head of this thread.
> 
> 

You started from a point of having no idea that UltraDNS used anycast,
confirmed for everyone in your second email that you had no clue about
how anycast worked, and migrated by your third email to being an expert
on how it should work. And based on assumptions that were flawed in the
very beginning, you've created a one megabyte thread and a s+n/n ration
almost unparalleled by anything I've ever seen on NANOG before. As I
told you privately, I'm working on a response that tries to deal with
all the misinformation you've spouted. There is so much, however, that
it is taking more than the 10 minutes you took to decide you knew it
all.

So you can call it apathy, or anything else you want. It seems
consistent with your way of jumping to conclusions based on flawed
assumptions. But it's really just that other people actually take time
to research issues before mouthing off.

YMMV, and apparently it does.

In the interim, feel free to post your operational experience and
qualification with tlds and their dns.
-- 
Rodney Joffe
CenterGate Research Group, LLC.
http://www.centergate.com
"Technology so advanced, even we don't understand it!"(R)


Re: Nothing like viruses with bugs in them (Swen)

2003-09-19 Thread Brian Bruns

These are exim filters which catch the damn thing when the antivirus
software misses it.  Hopefully it might be useful.  It was taken from
http://pkierski.republika.pl/filtry.shtml.



# Swen #


if $h_content-type matches "multipart/mixed; boundary=.[a-z]{6}" and
   $message_body matches "September 200[23], Cumulative Patch"
then
   logfile $home/filter.log 0644
   logwrite "$tod_log - filter: *** Swen.1 *** - sender: $sender_address -
subj$
   seen finish
endif



# Swen #


if $h_content-type contains "multipart/alternative;" and
   $h_content-type matches "boundary=.[a-z]{6}" and
   $message_body matches "iframe src=3D.cid:.*height=3D0.*
width=3D0.*/iframe"
then
   logfile $home/filter.log 0644
   logwrite "$tod_log - filter: *** Swen.2 *** - sender: $sender_address -
subj$
   seen finish
endif

--
Brian Bruns
The Summit Open Source Development Group
Open Solutions For A Closed World / Anti-Spam Resources
http://www.2mbit.com
ICQ: 8077511
- Original Message - 
From: "Mark Radabaugh" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Friday, September 19, 2003 12:03 PM
Subject: Nothing like viruses with bugs in them (Swen)


>
> Seems like this virus/worm has a bug where it will occasionally send out 1
> byte attachments rather than the correct worm payload.   Since the virus
is
> not truly attached it tends to pass through e-mail virus scanners.
>
> It's causing a fair amount of end user confusion today -- lots of 'why is
> your/my virus scanner not working?' questions.
>
> Mark Radabaugh
> Amplex
> (419) 720-3635
>
>
>




Nothing like viruses with bugs in them (Swen)

2003-09-19 Thread Mark Radabaugh

Seems like this virus/worm has a bug where it will occasionally send out 1
byte attachments rather than the correct worm payload.   Since the virus is
not truly attached it tends to pass through e-mail virus scanners.

It's causing a fair amount of end user confusion today -- lots of 'why is
your/my virus scanner not working?' questions.

Mark Radabaugh
Amplex
(419) 720-3635




RE: apathy (was Re: .ORG problems this evening)

2003-09-19 Thread Eric Germann



> -Original Message-
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of
> Todd Vierling
> Sent: Friday, September 19, 2003 11:37 AM
> To: [EMAIL PROTECTED]
> Subject: apathy (was Re: .ORG problems this evening)
> 
> 
> I've repeatedly described how I do understand the methodology 
> here.  What's
> being expressed on this list is blind faith and trust in an anycast-only
> gTLD DNS scheme that has the possibility of routing to a single point of
> failure.
> 

Anyone know if 64.94.110.11 is done via anycast?

> This scheme has already failed once.  ("When will it fail again?")


In that case, hopefully soon ...
> 




Costs of not testing an implementation

2003-09-19 Thread Chan, Chung Ming

Hi,
I'm trying to gather some data to justify the needs of getting
protocol conformance testing tools for testing out the products before
deployment.
Especially if there is any study on what is the cost of not doing
enough testing before deployment and that cost comparing to the cost of
getting the tools.


If any of you can point me to any useful link, it will be great!


Thanks in advance!






RE: Where to get an ASN certificate?

2003-09-19 Thread Nine, Jason

Thanks all for the info!

-Original Message-
From: Clinton Work [mailto:[EMAIL PROTECTED] 
Sent: Friday, September 19, 2003 10:35 AM
To: Nine, Jason
Subject: Re: Where to get an ASN certificate?

You have to apply to ARIN to get a AS number.

www.arin.net

=
Clinton Work [EMAIL PROTECTED]
Airdrie, AB

- Original Message - 
From: "Nine, Jason" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: 19 September, 2003 9:02 AM
Subject: FW: Where to get an ASN certificate?






We will need to run BGP here in the next few weeks, does anyone know
where you apply for an ASN certificate?

Thanks 




apathy (was Re: .ORG problems this evening)

2003-09-19 Thread Todd Vierling

On Fri, 19 Sep 2003, Alex Bligh wrote:

: > DNS site A goes down, but its BGP advertisements are still in effect.
: > (Their firewall still appears to be up, but DNS requests fail.)  Host
: > site C cannot resolve ANYTHING from DNS site A, even though DNS site B is
: > still up and running.  But host site C cannot see DNS site B!
:
: What you seem to be missing is that the BGP advert goes away when the DNS
: requests stop working.

It didn't.  That's the problem.

I've repeatedly described how I do understand the methodology here.  What's
being expressed on this list is blind faith and trust in an anycast-only
gTLD DNS scheme that has the possibility of routing to a single point of
failure.

This scheme has already failed once.  ("When will it fail again?")

Established gTLD practice has not put trust in an anycast routing scheme
where one (1) destination might serve all queries for a host.  What I've
tried to express is that the years-established, standard DNS redundancy
failover model could and should be implemented to complement -- not replace
-- this anycast model for something as critical as a Big Three gTLD.

That's fine; I give up due to pervasive community apathy.  When this happens
again, I'll be sure to bring up the archive URL to the head of this thread.



-- 
-- Todd Vierling <[EMAIL PROTECTED]> <[EMAIL PROTECTED]>


RE: Interesting interaction between Blaster worm variants and Verisign DNS change

2003-09-19 Thread Jeremy_Powell

Not possible is a strong statement since it has happened 
twice so far.  The assumption you are making is the assumption
that I made, which is that the resolver would first try to
lookup exactly what was requested, but that is not what it
does for example, with the machines domain set to clementnt.com
and the default Append Primary DNS suffix to lookups checked
under thae advanced TCP/IP properties the result of an nslookup
from the machine for www.apple.com is to lookup 
www.apple.com.clementnt.com  which returns 64.94.110.11 because
it does not exist.  It does this before actually looking up what
was typed.  When I say it has happened twice, I mean that I have
had 2 Blaster infected machines sending spoofed IP address request
to 64.94.110.11 tcp port 80 containing the windowsupdate.com in
the host portion of the html header.  Removing blaster using virus
tools eliminated this behavior.

Jeremy Powell

> -Original Message-
> From: Florian Weimer [mailto:[EMAIL PROTECTED]
> Sent: Friday, September 19, 2003 4:44 AM
> To: Jeremy Powell
> Cc: [EMAIL PROTECTED]
> Subject: Re: Interesting interaction between Blaster worm variants and
> Verisign DNS change
> 
> 
> <[EMAIL PROTECTED]> writes:
> 
> > I think that an interesting interaction involving:
> >
> > 1) Blaster worm DDoS attack against windows update.
> > 2) The default action of Windows 2000 and XP computers
> > to automatically append the domain name under "Network
> > Identification" or the suffix search list to DNS lookups.
> > 3) The number of non-existent domains that exist in the
> > above settings.
> > 4) The change that Verisign made so that all non-existent
> > domains resolve to 64.94.110.11
> >
> > is the cause of the DDoS attack that Verisign is experiencing.
> 
> This is not possible.  There's a NS entry for windowsupdate.com, which
> overrides the wildcard A record (in standard zone files, wildcard
> records are suppressed as soon as an RR for the domain exists, even if
> the types don't match).
> 


_

Statement of Confidentiality:  The contents of this e-mail message and any attachments 
are intended solely for the addressee.  The information may also be confidential 
and/or legally privileged.  This transmission is sent for the sole purpose of delivery 
to the intended recipient.  If you have received this transmission in error, any use, 
reproduction, or dissemination of this transmission is strictly prohibited.  If you 
are not the intended recipient, please immediately notify the sender by reply e-mail, 
send a copy to [EMAIL PROTECTED] and delete this message and its attachments, if any.

E-mail is covered by the Electronic Communications Privacy Act, 18 USC SS 2510-2521 
and is legally privileged.  

Date Sent (d/m/yy): 19/9/2003  -  Sender: [EMAIL PROTECTED]



Re: .ORG problems this evening

2003-09-19 Thread Alex Bligh


--On 18 September 2003 10:05 -0400 Todd Vierling <[EMAIL PROTECTED]> wrote:

DNS site A goes down, but its BGP advertisements are still in effect.
(Their firewall still appears to be up, but DNS requests fail.)  Host
site C cannot resolve ANYTHING from DNS site A, even though DNS site B is
still up and running.  But host site C cannot see DNS site B!
What you seem to be missing is that the BGP advert goes away when the DNS
requests stop working.
I have written DNS/BGP code (nothing to do with UltraDNS) and I can tell
you it works very well. Even if you unplug the machine from the net you can
get rapid failover by tweaking a BGP timer here or there. If you are going
to say "yes but that means I don't have one of the servers up whilst
routing reconverges" this is true, but (a) it happens ANYWAY, (b) as the
prefered route is in general more local, the "rainshadow" from routing
reconvergence in the event of disruption is smaller.
Alex


Re: FW: Where to get an ASN certificate?

2003-09-19 Thread Joe Abley


On Friday, Sep 19, 2003, at 11:02 Canada/Eastern, Nine, Jason wrote:

We will need to run BGP here in the next few weeks, does anyone know
where you apply for an ASN certificate?
For an organisation based in the US, as you seem to be, see:

  http://www.arin.net/library/training/asn_process/index.html

For advice about multi-homing and associated BGP stuff, ask google 
about the multi-homing workshops run by Philip Smith and others all 
over the place, including those run at NANOG meetings (check the 
presentation index, maybe, for slides). Philip is presenting another 
one in Chicago, I think.

If you want a certificate for your ASN, you can always print out the 
e-mails ARIN send you and frame them :-)



Re: FW: Where to get an ASN certificate?

2003-09-19 Thread bmanning

> We will need to run BGP here in the next few weeks, does anyone know
> where you apply for an ASN certificate?
> 
> Thanks 
> 

don't know what an ASN certificate is, but you can get
an Autonomous System Number delegated from your friendly
local RIR.  You might want to explore the ARIN web site.
www.arin.net

--bill


diversion...

2003-09-19 Thread bmanning


for the third time in nine years an ISP ran into some misconceptions
wrt some address blocks that I've been piloting. Third times the charm.
For ISPs that might want to know the "policy" in play for those blocks:

www.ep.net/policy.html

--bill


FW: Where to get an ASN certificate?

2003-09-19 Thread Nine, Jason




We will need to run BGP here in the next few weeks, does anyone know
where you apply for an ASN certificate?

Thanks 



Re: Providers removing blocks on port 135?

2003-09-19 Thread Sean Donelan

On Fri, 19 Sep 2003, Adam Hall wrote:
> Anyone know anything about prorviders removing ACLs from their routers to
> allow ports 135/445/ back into their network?  Curious only because
> customers are calling in saying that Verizon, Cox, Bellsouth, and DSL.net
> are doing so and seem to have a big problem with the fact that we're
> hesitent follow their lead.

Well, first you would have to find providers willing to say they had ACLs,
then willing to say the ACLs that didn't exist are being removed.

Although 135, 139, 445, etc ACLs still seem to be very wide-spread, they
are not network or service provider wide.  It may vary by region,
provider, wholesale arrangement, etc.  A provider may have some ACLs in
Atlanta, but not in Boston.  Or even in the same city, some circuits may
go through different wholesale arrangements resulting in different ACLs.




Re: Providers removing blocks on port 135?

2003-09-19 Thread Jack Bates
Adam Hall wrote:



Anyone know anything about prorviders removing ACLs from their routers 
to allow ports 135/445/ back into their network?  Curious only 
because customers are calling in saying that Verizon, Cox, Bellsouth, 
and DSL.net are doing so and seem to have a big problem with the fact 
that we're hesitent follow their lead.

No two networks are the same, nor do they have the same issues. The new 
RPC exploit worm will be interesting to watch on the above networks if 
they've dropped their blocks. There's also a question of at which layer 
they have done so. For example, if blocks were removed from central 
sites in favor of blocks that were pushed out to the end users.

Allowing the various scans out costs other people money. If nothing 
else, I'll leave 135 in place long enough to ensure that the number of 
users that are infected are manageable. My transit customers are all 
telling me the same thing. They are still pushing it to get people 
cleaned up and patched. They want their blocks to remain (so they don't 
have to pay us more).

-Jack



Providers removing blocks on port 135?

2003-09-19 Thread Adam Hall
Title: Providers removing blocks on port 135?





Anyone know anything about prorviders removing ACLs from their routers to allow ports 135/445/ back into their network?  Curious only because customers are calling in saying that Verizon, Cox, Bellsouth, and DSL.net are doing so and seem to have a big problem with the fact that we're hesitent follow their lead.

Adam





RE: Worst design decisions?

2003-09-19 Thread Mark Borchers

1. Any device whose physical characteristics make it a likely candidate
to be shelf-mounted, yet which has side ventilation ports which will be
blocked by the sides of a rack shelf.

2. The BAT csu/dsu, a cheap T1 csu/dsu which used red LED's to indicate
that all was well (or was it green to indicate an alarm?)

3. Routers that will accomodate high density of OCx ports but only have
the bus capacity to support a fraction of them.

4. The Cleveland airport.




RE: Kill Verisign Routes :: A Dynamic BGP solution

2003-09-19 Thread Eric Germann

I guess we don't really need to discuss the political ramifications, because
I don't really care about VS.  Our internal policy is to kill the route to
the host.  I'm offering up a tool to implement a technical solution to
killing the route.  Nothing more, nothing less.  It only affects our
internal network, so we don't really have a global impact, unlike some folks
in Virgina.  If people want it, its here.  If not, they're free to delete
this.  Key is, they have choice.

Eric


> -Original Message-
> From: David Schwartz [mailto:[EMAIL PROTECTED]
> Sent: Friday, September 19, 2003 4:04 AM
> To: J.A. Terranson
> Cc: [EMAIL PROTECTED]
> Subject: RE: Kill Verisign Routes :: A Dynamic BGP solution
>
>
>
> > On Thu, 18 Sep 2003, David Schwartz wrote:
>
> > >   I think the whole idea of getting into an escalating
> > > technical war with
> > > Verisign is extremely bad. Your suggestion only makes sense if
> > > you expect
> > > Verisign to make changes to evade technical solutions. Each
> > > such change by
> > > Verisign will cause more breakage. Verisign will either
> provide a way to
> > > definitively, quickly, and easily tell that a domain is not
> > > registered or
> > > Verisign will badly break COM and NET.
>
> > >   DS
>
> > With all due respect, this line of logic is the same one used
> in the US to
> > prevent people from defending themselves from other types of
> > crime, and it's totally bogus.
>
>   Really? I've never seen anyone attempt such an argument,
> but it would be
> rather amusing to see. Which part would you use?
>
>   Would you argue that criminals aren't likely to take steps
> that obviously
> are attempts to reduce the effectiveness of guns? And if they do,
> they will
> have to deal with the likely PR and government pressure that would result.
>
>   The whole point here is that it's not clear to everyone
> that Verisign is
> analogous to the criminal. The point is to make it clear that they are and
> that won't happen if you look very much like them.
>
> > We have been, in a literal sense, attacked by Verislime, any and
> > all defenses
> > are appropriate.
>
>   No. The defenses have to be reasonable and have to avoid
> collateral damage
> to innocent parties. If not, Verisign will have a reasonable argument that
> we are the bad guys. They caused some breakage? So what, so did we. They
> distorted the true data that should have been in the zone? So what, so did
> we.
>
>   You are welcome to see this as an attack, but the response
> should not be
> out of proportion. If a measured response leads to an escalation, then you
> can consider "any and all defenses".
>
>   DS
>
>
>




The Cidr Report

2003-09-19 Thread cidr-report

This report has been generated at Fri Sep 19 21:47:52 2003 AEST.
The report analyses the BGP Routing Table of an AS4637 (Reach) router
and generates a report on aggregation potential within the table.

Check http://www.cidr-report.org/as4637 for a current version of this report.

Recent Table History
Date  PrefixesCIDR Agg
12-09-03124543   88827
13-09-03124711   88736
14-09-03124535   88697
15-09-0312   88796
16-09-03124819   88837
17-09-03124894   88815
18-09-03124780   88746
19-09-03124625   88474


AS Summary
 15713  Number of ASes in routing system
  6223  Number of ASes announcing only one prefix
  1454  Largest number of prefixes announced by an AS
AS701  : ALTERNET-AS UUNET Technologies, Inc.
  73351168  Largest address span announced by an AS (/32s)
AS568  : SUMNET-AS DISO-UNRRA


Aggregation Summary
The algorithm used in this report proposes aggregation only
when there is a precise match using the AS path, so as 
to preserve traffic transit policies. Aggregation is also
proposed across non-advertised address space ('holes').

 --- 19Sep03 ---
ASnumNetsNow NetsAggr  NetGain   % Gain   Description

Table 124256884633579328.8%   All ASes

AS4323   662  194  46870.7%   TW-COMM Time Warner
   Communications, Inc.
AS701   1454 1010  44430.5%   ALTERNET-AS UUNET
   Technologies, Inc.
AS7018  1398  982  41629.8%   ATT-INTERNET4 AT&T WorldNet
   Services
AS7843   518  138  38073.4%   ADELPHIA-AS Adelphia Corp.
AS3908   909  536  37341.0%   SUPERNETASBLK SuperNet, Inc.
AS6197   612  282  33053.9%   BATI-ATL BellSouth Network
   Solutions, Inc
AS6198   493  207  28658.0%   BATI-MIA BellSouth Network
   Solutions, Inc
AS4355   392  109  28372.2%   ERMS-EARTHLNK EARTHLINK, INC
AS1221   977  695  28228.9%   ASN-TELSTRA Telstra Pty Ltd
AS6347   350   92  25873.7%   DIAMOND SAVVIS Communications
   Corporation
AS1239   901  650  25127.9%   SPRINTLINK Sprint
AS27364  319   68  25178.7%   ACS-INTERNET Armstrong Cable
   Services
AS22773  268   28  24089.6%   CCINET-2 Cox Communications
   Inc. Atlanta
AS17676  262   30  23288.5%   GIGAINFRA Softbank BB Corp.
AS25844  241   14  22794.2%   SKADDEN1 Skadden, Arps, Slate,
   Meagher & Flom LLP
AS209503  294  20941.6%   ASN-QWEST Qwest
AS6140   343  135  20860.6%   IMPSAT-USA ImpSat
AS4134   324  117  20763.9%   CHINANET-BACKBONE
   No.31,Jin-rong Street
AS11305  230   38  19283.5%   INTERLAND-NET1 Interland
   Incorporated
AS4519   1804  17697.8%   MAAS Maas Communications
AS6327   200   26  17487.0%   SHAW Shaw Communications Inc.
AS2386   371  200  17146.1%   INS-AS AT&T Data
   Communications Services
AS2048   256   87  16966.0%   LANET-1 State of Louisiana
AS14654  1702  16898.8%   WAYPORT Wayport
AS9498   187   20  16789.3%   BBIL-AP BHARTI BT INTERNET
   LTD.
AS705415  252  16339.3%   ALTERNET-AS UUNET
   Technologies, Inc.
AS17557  288  136  15252.8%   PKTELECOM-AS-AP Pakistan
   Telecom
AS9800   203   52  15174.4%   UNICOM CHINA UNICOM
AS19262  212   65  14769.3%   VZGNI-TRANSIT Verizon Global
   Networks
AS3602   231   86  14562.8%   SPRINT-CA-AS Sprint Canada
   Inc.

Total  13869 6549 732052.8%   Top 30 total


Possible Bogus Routes

24.119.0.0/16AS11492 CABLEONE CABLE ONE
61.12.32.0/24AS7545  TPG-INTERNET-AP TPG Internet Pty Ltd
61.12.34.0/24AS7545  TPG-INTERNET-AP TPG Internet Pty Ltd
64.30.64.0/19AS14900 USLEC-CORP-1 USLEC Corp.
66.41.192.0/18   AS13367 ATT-BBND-B AT&T Broadband
132.0.0.0/10 AS568   SUMNE

site finder performance

2003-09-19 Thread Petri Helenius


The redirect port 80 server seems to gain on performance, I wonder if 
that´s
due to Verisign fixing issues or enough people blocking it so the load 
lowers?

We´ve gone from 22 seconds average transaction time yesterday, to about
two seconds so far today.
Minimum achieved is 239 milliseconds, which is also about the 
theoretical minimum
from our neck of woods because of light speed limitations.

Pete




RE: News of ISC Developing BIND Patch

2003-09-19 Thread Adam Atkinson

> I would say _supposed_ to be unique.  Surely some cheapo manufacturer 
> has recycled addresses from their old ISA card days.

I've seen at least one manufacturer ship multiple cards with the same
MAC address. One shop in Tottenham Court Road, London sold several
people on the same LAN cards with identical MAC addresses.