Re: Verisign Responds

2003-09-23 Thread Paul Vixie

 ISC has made root-delegation-only the default behaviour in the new bind, 

actually, though, we havn't, and wouldn't (ever).  the feature is present
but must be explicitly enabled by a knowledgeable operator to have effect.

 how about drafting up an RFC making it an absolute default requirement
 for all DNS?

this is what the icann secsac recommendation...

http://www.icann.org/correspondence/secsac-to-board-22sep03.htm

...says that ietf/iab should look into:

We call on the IAB, the IETF, and the operational community to
examine the specifications for the domain name system and consider
whether additional specifications could improve the stability of
the overall system. Most urgently, we ask for definitive
recommendations regarding the use and operation of wildcard DNS
names in TLDs and the root domain, so that actions and expectations
can become universal. With respect to the broader architectural
issues, we call on the technical community to clarify the role of
error responses and on the separation of architectural layers,
particularly and their interaction with security and stability.

and it does seem rather urgent that if a wildcard in the root domain or in
a top level domain is dangerous and bad, that the ietf say so out loud so
that icann has a respected external reference to include in their contracts.
-- 
Paul Vixie


bind 9.2.3rc3 successful

2003-09-23 Thread William Allen Simpson

Thought I'd mention that I helped setup BIND 9.2.3rc3 on a yellowdog 
linux powercomputing machine tonight.  It worked.  And the mail queues 
began clearing out.  Just for an oddball success report. 

Are others having similar luck?  What needs to be done to make this a 
standard feature set?  Is somebody working on an RFC?
-- 
William Allen Simpson
Key fingerprint =  17 40 5E 67 15 6F 31 26  DD 0D B9 9B 6A 15 2C 32


Re: bind 9.2.3rc3 successful

2003-09-23 Thread Paul Vixie

 Thought I'd mention that I helped setup BIND 9.2.3rc3 on a yellowdog 
 linux powercomputing machine tonight.  It worked.  And the mail queues 
 began clearing out.  Just for an oddball success report. 

oh hell.  thanks for the kind words, but we just released rc4.

 Are others having similar luck?  What needs to be done to make this a 
 standard feature set?  Is somebody working on an RFC?

i do not expect the ietf to say that root and tld zones should all be
delegation-only.  but good luck trying.
-- 
Paul Vixie


Re: bind 9.2.3rc3 successful

2003-09-23 Thread Haesu

I am using bind 9.2.2-p2 on our resolver name servers so far.. And I have no
problems to report at this time, it's been running smooth so far; mail queues
started clearing out nice and clean.

-hc

-- 
Haesu C.
TowardEX Technologies, Inc.
Consulting, colocation, web hosting, network design and implementation
http://www.towardex.com | [EMAIL PROTECTED]
Cell: (978)394-2867 | Office: (978)263-3399 Ext. 174
Fax: (978)263-0033  | POC: HAESU-ARIN

On Tue, Sep 23, 2003 at 02:35:48AM -0400, William Allen Simpson wrote:
 
 Thought I'd mention that I helped setup BIND 9.2.3rc3 on a yellowdog 
 linux powercomputing machine tonight.  It worked.  And the mail queues 
 began clearing out.  Just for an oddball success report. 
 
 Are others having similar luck?  What needs to be done to make this a 
 standard feature set?  Is somebody working on an RFC?
 -- 
 William Allen Simpson
 Key fingerprint =  17 40 5E 67 15 6F 31 26  DD 0D B9 9B 6A 15 2C 32



Re: bind 9.2.3rc3 successful

2003-09-23 Thread Will Yardley

On Tue, Sep 23, 2003 at 02:35:48AM -0400, William Allen Simpson wrote:

 Thought I'd mention that I helped setup BIND 9.2.3rc3 on a yellowdog 
 linux powercomputing machine tonight.  It worked.  And the mail queues 
 began clearing out.  Just for an oddball success report. 

We've been using these patches on production servers since they first
came out (both the 9.2.2 patches and the 9.2.3rcx versions); no problems
reported so far (knock wood).

-- 
Since when is skepticism un-American?
Dissent's not treason but they talk like it's the same...
(Sleater-Kinney - Combat Rock)




Re: Verisign Responds

2003-09-23 Thread Daniel Karrenberg

On 23.09 06:07, Paul Vixie wrote:
 We call on the IAB, the IETF, and the operational community to
 examine the specifications for the domain name system and consider
 whether additional specifications could improve the stability of
 the overall system. Most urgently, we ask for definitive
 recommendations regarding the use and operation of wildcard DNS
 names in TLDs and the root domain, so that actions and expectations
 can become universal. With respect to the broader architectural
 issues, we call on the technical community to clarify the role of
 error responses and on the separation of architectural layers,
 particularly and their interaction with security and stability.
 
 and it does seem rather urgent that if a wildcard in the root domain or in
 a top level domain is dangerous and bad, that the ietf say so out loud so
 that icann has a respected external reference to include in their contracts.

The IAB has done an excellent job with 
http://www.iab.org/documents/docs/2003-09-20-dns-wildcards.html.
I quote:

...
Proposed guideline: If you want to use wildcards in your zone and
understand the risks, go ahead, but only do so with the informed consent
of the entities that are delegated within your zone. 

Generally, we do not recommend the use of wildcards for record types
that affect more than one application protocol.  At the present time,
the only record types that do not affect more than one application
protocol are MX records. 

For zones that do delegations, we do not recommend even wildcard MX
records.  If they are used, the owners of zones delegated from that zone
must be made aware of that policy and must be given assistance to ensure
appropriate behavior for MX names within the delegated zone.  In other
words, the parent zone operator must not reroute mail destined for the
child zone without the child zone's permission. 

We hesitate to recommend a flat prohibition against wildcards in
registry-class zones, but strongly suggest that the burden of proof in
such cases should be on the registry to demonstrate that their intended
use of wildcards will not pose a threat to stable operation of the DNS
or predictable behavior for applications and users. 

We recommend that any and all TLDs which use wildcards in a manner
inconsistent with this guideline remove such wildcards at the earliest
opportunity.

What else does the IETF need to do here?

This should be enough of an expert opinion for ICANN and others 
like the US DoC in the sort term. Verisign have realised that and
are talking about an -so far vapour- expert panel to counter that.
I wonder about its composition .

Daniel


Re: bind 9.2.3rc3 successful

2003-09-23 Thread Paul Wouters

On 23 Sep 2003, Paul Vixie wrote:

  Thought I'd mention that I helped setup BIND 9.2.3rc3 on a yellowdog 
  linux powercomputing machine tonight.  It worked.  And the mail queues 
  began clearing out.  Just for an oddball success report. 
 
 oh hell.  thanks for the kind words, but we just released rc4.

Now all I need is a patched version of the 9.3 snapshot tree, so I don't need
to kill my dnssec stuff :P (And it's time for a non-snapshot bind version
with full dnssec capabilities anyway :)

Paul



Re: Verisign Responds

2003-09-23 Thread bmanning

 
 
 On Mon, 22 Sep 2003, Dave Stewart wrote:
  Courts are likely to support the position that Verisign has control of .net 
  and .com and can do pretty much anything they want with it.
 
 ISC has made root-delegation-only the default behaviour in the new bind, 
 how about drafting up an RFC making it an absolute default requirement for 
 all DNS?
 
 -Dan

That would be making a fundamental change to the DNS
to make wildcards illegal anywhere. Is that what you
want?

--bill


Re: Cheap temperature sensors

2003-09-23 Thread Robert Boyle
At 06:29 AM 9/23/2003, you wrote:
I hate to point this out but this sounds spammy as hell, and while I've 
been on this list a very short time, very very big alarm bells went off 
when I read it.
I have no financial interest in the company and I was just letting the list 
know about a cheap solution that works really, really well for a tremendous 
price. That's an elusive thing to find and I managed to locate something 
that many of us need.

If you aren't a spammer, compare your review with what spammers write, 
noting key phrases I bought one and WOW! rings IMMEDIATE spam bells, 
further you went from buying one (note above) to I  purchased 10 
individual temperature sensors and two temp/humidity sensors, for a total 
of 12.
All comparable solutions were $2000-3000 for the same number of sensors. I 
was half expecting to loose $445 to a scam company in Slovakia. I was very 
pleasantly surprised and I wanted to share my positive experience. I was 
excited because of the ease of setup and the dirt cheap price. If you don't 
need them. Ignore the post. If you do, or if someone searching the archives 
does, they will find my post useful.  It is a lot more on topic than a lot 
of the nanog noise.

So I figure I'm going to call Tellurian tomorrow, and confirm you exist, 
hoping you'll forgive me for my lack of faith.
Look at the archives. I've been a nanog poster for years and an ISP for 
even longer. Tellurian has been providing Internet access since 1995. I am 
_clearly_ not a spammer!

Relatedly, don't capitalize words for emphasis,
It's a stylistic choice. I don't believe in html posting. In plain text, I 
have caps and _underlines_. That's it.

 I note a previous post that stated that people will be able to search 
these lists when you're looking for employment and one must chose one's 
words carefully.
I haven't done anything wrong and I never wrote anything I will regret in 
the future. I really don't get it.

Anyway, I will give you a ring tomorrow, hoping that you do exist, and 
that you did send this, if not we can figure out exactly what's going on, 
and get it back to the list.
I am real. Look at our web site and look at the archives. I bought a cheap 
and elegant solution to a problem we all have and I wanted to share that 
positive experience with the list to benefit others. I was hesitant to buy 
it because it looked too good to be true and they are located in Slovakia 
(no offense to others from SK), but it works and I'm very impressed. Again, 
I have absolutely NO connection to them other than as a satisfied customer.

-Robert

Tellurian Networks - The Ultimate Internet Connection
http://www.tellurian.com | 888-TELLURIAN | 973-300-9211
Good will, like a good name, is got by many actions, and lost by one. - 
Francis Jeffrey



RE: [nanog]: Re: Cheap temperature sensors

2003-09-23 Thread Tomas Daniska


 All comparable solutions were $2000-3000 for the same number 
 of sensors. I 
 was half expecting to loose $445 to a scam company in 
 Slovakia. I was very 
 pleasantly surprised and I wanted to share my positive 
 experience. I was 


no-scam
actually being from .sk, i just can tell that what you might consider a
crap price in .us gets you a reasonably good product here

there are several companies here developing measurement and power
systems, both telco- and industry- grade and they have great renome
abroad

if you need flexibility in [reasonably priced] custom-built products, i
believe the best bet is one of these companies
/no-scam


sorry if this disturbed you

--

deejay 


a.k.a.

--
 
Tomas Daniska
systems engineer
Tronet Computer Networks
Plynarenska 5, 829 75 Bratislava, Slovakia
tel: +421 2 58224111, fax: +421 2 58224199
 
A transistor protected by a fast-acting fuse will protect the fuse by
blowing first.



Re: Cheap temperature sensors

2003-09-23 Thread Andy Walden



 At 06:29 AM 9/23/2003, you wrote:
 I hate to point this out but this sounds spammy as hell, and while I've
 been on this list a very short time, very very big alarm bells went off
 when I read it.

Well, if you had been on the list a little longer you would have realized
that this is something that comes up on a regular basis and that someone
has finally found an affordable solution helps a lot of people out. In
fact, your reply was borderline creepy...maybe you need a different hobby
then stalking spammers.

andy
--
PGP Key Available at http://www.tigerteam.net/andy/pgp


Re: bind patches++ (Re: Wildcards)

2003-09-23 Thread Mr. James W. Laferriere

Hello Paul , All ,  Is there a url listing the TLD's that
officially use wild cards in their deployment ?
TIa ,  JimL

On Sat, 20 Sep 2003, Paul Vixie wrote:
 this feature is only in the latest release candidate is 9.2.3rc3.
 our patches to 9.2.2 and 9.1 only support delegation-only zones.
 to get the root-delegation-only option you need 9.2.3rc3.
 see www.isc.org/products/BIND/delegation-only.html for details.
 re:

  Date: Sat, 20 Sep 2003 14:22:57 -0400 (EDT)
  From: Mr. James W. Laferriere [EMAIL PROTECTED]
  To: Paul Vixie [EMAIL PROTECTED]
  Cc: [EMAIL PROTECTED]
  Subject: Re: bind patches++ (Re: Wildcards)
  Hello Paul ,  Am I correct in the understanding that the below
  tells me that 9.2.2p2 does NOT contain the ablility to do
  root-delegation-only ?  Tia ,  JimL
-- 
   +--+
   | James   W.   Laferriere | SystemTechniques | Give me VMS |
   | NetworkEngineer | P.O. Box 854 |  Give me Linux  |
   | [EMAIL PROTECTED] | Coudersport PA 16915 |   only  on  AXP |
   +--+


Re: ICANN asks VeriSign to pull redirect service

2003-09-23 Thread Jack Bates
John Dvorak wrote:
and the response from Russell Lewis:
http://www.icann.org/correspondence/lewis-to-twomey-21sep03.htm
explenative deleted! The Internet works perfectly fine for years. They 
make a change which is confirmed to disrupt service. Instead of 
restoring the stable state while conducting a review, they feel that 
they must keep the service as is? This is the problem with a for-profit 
company. They are keeping it to make money. The truth is that no one 
would complain about reverting back to the stable condition which 
everyone has lived with for years. They are complaining now. In 
addition, the IAB has already published a report that pointed out the 
various problems. Much discussion has existed on the topic across all 
the major networking/spam/security mailing lists. It is obvious that 
they have broken a lot of things. To not revert is to push their own 
needs; ie. profit.

This quote is also interesting:

This was done after many months of testing and analysis and in compliance with
all applicable technical standards
The system is technically within standards. The purpose of the IAB is 
not only to watch standards, but to also understand common use of the 
network. Many standards have been changed to reflect common use. A good 
section of RFC's are about common use. As networks implement standards, 
there are always incompatibilities and extra's that are added in. As 
deployment reaches general use, it is one of the duties of the IAB to 
recognize that such utilization is in place and what the overall effect 
on the Internet is.

In this case, IAB did state that the wildcard use did break commonly 
used mechanisms deployed on the Internet, even if it was technically 
within the standard. This is one reason that it was recommended that the 
users of the tld be allowed to decide on if a wildcard is appropriate. 
For .museum, it is appropriate. It's even in their ICANN agreements. For 
com and net, no such precedent was ever set and complaints from the 
users of said tld are being ignored. Common use was broken.

-Jack



Re: Verisign Responds

2003-09-23 Thread Paul Vixie

 ...
 We recommend that any and all TLDs which use wildcards in a manner
 inconsistent with this guideline remove such wildcards at the earliest
 opportunity.
 
 What else does the IETF need to do here?

issue an rfc.  iab is not a representative body, and their opinions
are not refereed.


Re: bind 9.2.3rc3 successful

2003-09-23 Thread Jack Bates
Paul Vixie wrote:
i do not expect the ietf to say that root and tld zones should all be
delegation-only.  but good luck trying.
It hasn't been that large an issue in the past, and as pointed out by 
some, the countermeasures are just as harmful. I hope that 
delegation-only is only a temporary measure in bind. I'm sure some 
people will keep it running and probably put it on tld's where it'll 
break valid records.

-Jack



Re: Verisign Responds

2003-09-23 Thread Daniel Karrenberg

On 23.09 14:34, Paul Vixie wrote:
  
  What else does the IETF need to do here?
 
 issue an rfc.  iab is not a representative body, and their opinions
 are not refereed.

brilliant_draft = rfc-format(relevant(good(iab-statement)) + night_sleep(own-ideas));
suggest(dnsop-wg, brilliant_draft);
wait(unspec);
...

Daniel


Re: Windows updates and dial up users

2003-09-23 Thread Henry Yen

On Mon, Sep 22, 2003 at 10:02:57AM -0700, Owen DeLong wrote:
  Ok then different idea, assuming that we're all agreed its MS's
  responsibility  to ensure users are patched promptly and without extra
  cost to the end user.
 
 The problem is that while we agree, Micr0$0ft does not.  They feel they 
 should
 have no responsibility whatsoever to the end user beyond cheerfully 
 refunding
 their money if they decide to stop using Windows.

Microsoft does not issue refunds if you stop using Windows, whether or
not you were satisfied with the XPerience.

My interactions with Microsoft have never been cheerful, which is a
state mostly reserved for New Product Launch(tm) parties and advertisements.

Nor can one readily obtain a refund from an OEM, even if you never
use Windows and reject the EULA (http://windowsrefund.net/index2.php).
-- 
Henry Yen   Aegis Information Systems, Inc.
Senior Systems Programmer   Hicksville, New York


RE: Verisign Responds

2003-09-23 Thread Jeroen Massar

-BEGIN PGP SIGNED MESSAGE-

Paul Vixie wrote:

  We recommend that any and all TLDs which use wildcards in a manner
  inconsistent with this guideline remove such wildcards at the earliest
  opportunity.
  
  What else does the IETF need to do here?
 
 issue an rfc.  iab is not a representative body, and their opinions
 are not refereed.

I wonder btw why Verisign didn't catch the typo's in their
own domains if they think it is that important:

8-
;  DiG 9.2.3rc2  .verisign.com
;; global options:  printcmd
;; Got answer:
;; -HEADER- opcode: QUERY, status: NXDOMAIN, id: 31401
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;.verisign.com. IN  A

;; AUTHORITY SECTION:
verisign.com.   3600IN  SOA localhost.verisign.net. 
vshostmaster.verisign.com. 2003091501 10800 3600 604800 3600

;; Query time: 165 msec
;; SERVER: ::1#53(::1)
;; WHEN: Tue Sep 23 16:51:56 2003
;; MSG SIZE  rcvd: 106
- ---8

no mistyping  there :)

BTW, that SOA record doesn't exist...
8-
;  DiG 9.2.3rc2  localhost.verisign.net.
;; global options:  printcmd
;; Got answer:
;; -HEADER- opcode: QUERY, status: NXDOMAIN, id: 52583
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;localhost.verisign.net.IN  A

;; AUTHORITY SECTION:
verisign.net.   3570IN  SOA bay-w1-inf5.verisign.net. 
vshostmaster.verisign.com. 2003091501 10800 3600 604800 3600

;; Query time: 32 msec
;; SERVER: ::1#53(::1)
;; WHEN: Tue Sep 23 16:55:48 2003
;; MSG SIZE  rcvd: 113
- ---8

Hmmm, suddenly another SOA on the same zone, this SOA does exist though.
Odd DNS software they are running over there :)
And apparently they can return NXDOMAINS after all.

Greets,
 Jeroen

-BEGIN PGP SIGNATURE-
Version: Unfix PGP for Outlook Alpha 13 Int.
Comment: Jeroen Massar / [EMAIL PROTECTED] / http://unfix.org/~jeroen/

iQA/AwUBP3BgwSmqKFIzPnwjEQK18wCfc95MR1wwV6vxDYtjtRLiuUuOLQkAoLzL
+ksSp4pgzPqouqxTgDIn1VTd
=DNLO
-END PGP SIGNATURE-



Re: Verisign Responds

2003-09-23 Thread bmanning

 On 23.09 14:34, Paul Vixie wrote:
   
   What else does the IETF need to do here?
  
  issue an rfc.  iab is not a representative body, and their opinions
  are not refereed.
 
 brilliant_draft = rfc-format(relevant(good(iab-statement)) + night_sleep(own-ideas));
 suggest(dnsop-wg, brilliant_draft);
 wait(unspec);
 ...
 
 Daniel

you missed a step... 

approve(iesg, wildcard-clarify);




FW: ISS Security Brief: ProFTPD ASCII File Remote Compromise Vulnerability

2003-09-23 Thread Ingevaldson, Dan (ISS Atlanta)



-Original Message-
From: ISS XForce 
Sent: Tuesday, September 23, 2003 10:54 AM
To: [EMAIL PROTECTED]
Subject: ISS Security Brief: ProFTPD ASCII File Remote Compromise
Vulnerability


*** PGP SIGNATURE VERIFICATION ***
*** Status:   Good Signature
*** Signer:   X-Force [EMAIL PROTECTED] (0x7DF5E1BD)
*** Signed:   9/23/2003 10:52:05 AM
*** Verified: 9/23/2003 11:51:58 AM
*** BEGIN PGP VERIFIED MESSAGE ***

Internet Security Systems Security Brief
September 23, 2003

ProFTPD ASCII File Remote Compromise Vulnerability
 
Synopsis:

ISS X-Force has discovered a flaw in the ProFTPD Unix FTP server.
ProFTPD is a highly configurable FTP (File Transfer Protocol) server for
Unix that allows for per-directory access restrictions, easy
configuration of 
virtual FTP servers, and support for multiple authentication mechanisms.
A flaw exists in the ProFTPD component that handles incoming ASCII file
transfers.

Impact:

An attacker capable of uploading files to the vulnerable system can
trigger a buffer overflow and execute arbitrary code to gain complete
control of the system. Attackers may use this vulnerability to destroy,
steal, or manipulate data on vulnerable FTP sites.

Affected Versions:

ProFTPD 1.2.7
ProFTPD 1.2.8
ProFTPD 1.2.8rc1
ProFTPD 1.2.8rc2
ProFTPD 1.2.9rc1
ProFTPD 1.2.9rc2

Note: Versions previous to version 1.2.7 may also be vulnerable.

For the complete ISS X-Force Security Advisory, please visit: 
http://xforce.iss.net/xforce/alerts/id/154

__ 

About Internet Security Systems (ISS) 
Founded in 1994, Internet Security Systems (ISS) (Nasdaq: ISSX) is a 
pioneer and world leader in software and services that protect critical 
online resources from an ever-changing spectrum of threats and misuse. 
Internet Security Systems is headquartered in Atlanta, GA, with 
additional operations throughout the Americas, Asia, Australia, Europe 
and the Middle East. 

Copyright (c) 2003 Internet Security Systems, Inc. All rights reserved 
worldwide. 

Permission is hereby granted for the electronic redistribution of this 
document. It is not to be edited or altered in any way without the 
express written consent of the Internet Security Systems X-Force. If you

wish to reprint the whole or any part of this document in any other 
medium excluding electronic media, please email [EMAIL PROTECTED] for 
permission. 

Disclaimer: The information within this paper may change without notice.

Use of this information constitutes acceptance for use in an AS IS 
condition. There are NO warranties, implied or otherwise, with regard to

this information or its use. Any use of this information is at the 
user's risk. In no event shall the author/distributor (Internet Security

Systems X-Force) be held liable for any damages whatsoever arising out 
of or in connection with the use or spread of this information. 
X-Force PGP Key available on MIT's PGP key server and PGP.com's key
server, 
as well as at http://www.iss.net/security_center/sensitive.php 
Please send suggestions, updates, and comments to: X-Force 
[EMAIL PROTECTED] of Internet Security Systems, Inc. 


*** END PGP VERIFIED MESSAGE ***

-+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+
This message was posted through the FIRST mailing list server. Contact
your team's FIRST representative to (un)subscribe,

DO NOT REDISTRIBUTE BEYOND MEMBERS OF FIRST TEAMS UNLESS THE AUTHOR OF
THIS MESSAGE GRANTS EXPRESS PERMISSION TO REDISTRIBUTE
-+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+




Re: Providers removing blocks on port 135?

2003-09-23 Thread Mike Tancsa
At 01:55 PM 21/09/2003, Justin Shore wrote:

On Sun, 21 Sep 2003, Mike Tancsa wrote:

 Yes, this is all too familiar.  Luckily it was not so acute for us.  The
 porn company in question was using legit credit cards and we knew where
 they were located.  We too got to the point where I had to contemplate
 blocking dialups with no ANI as I had already blocked all access from 
their
 phone numbers.  However, once they started doing that I called up their
 office yelling and screaming law suits and I guess they figured there were
 other ISPs that didnt care as much and moved on to them.

I don't know if you did this but if it were me I'd have contacted two
other places.  The first would have been the credit card companies with
the stolen credit cards.
The credit cards in our case were legit. They were different numbers, but 
they were not stolen.


  They are usuaully fairly responsive when it
comes to them loosing money.  Secondly after I contacted the local police,
state BI, and perhaps the FBI (assuming no luck could be had with any of
them)
I am in Canada, but I know that it has been stated that the FBI will not 
investigate computer fraud if damage is under $100,000.


I would have given the story to the local media.  There's nothing
like a little bad PR to give law enforcement a little kick in the butt.
I doubt a porn company with international clientele would give a toss about 
what the local media say.

If your newspapers where you're at are anything like our's, they love to
print a good scandal involving the local government.
Local government has nothing to do with it.  It was just some dime a dozen 
porn company.

---Mike 



Re: Providers removing blocks on port 135?

2003-09-23 Thread Jack Bates
Mike Tancsa wrote:

Local government has nothing to do with it.  It was just some dime a 
dozen porn company.

Back to the everyone's doing it, so let's not bother syndrome.

-Jack



Re: bind 9.2.3rc3 successful

2003-09-23 Thread Jack Bates
Dan Riley wrote:

It breaks a few things we care about--for example, www.ithaca.ny.us is
a naked CNAME in the the us root:
There's no reason to force .us as delegate only. Force com and net to 
delegate only and you'll have the Internet as it was before this debate 
started.

-Jack



Re: bind 9.2.3rc3 successful

2003-09-23 Thread Paul Vixie

 Now all I need is a patched version of the 9.3 snapshot tree, so I
 don't need to kill my dnssec stuff :P (And it's time for a
 non-snapshot bind version with full dnssec capabilities anyway :)

if you ask that question on [EMAIL PROTECTED], i promise to answer.
but i do not think details of that nature are interesting on [EMAIL PROTECTED]


Re: Providers removing blocks on port 135?

2003-09-23 Thread Jack Bates
Mike Tancsa wrote:

I am not advocating that at all.  (everyone's doing it, so let's not 
bother) However, I dont see what the municipal government has to do 
with a matter like this.  I imagine its a civil issue where you have to 
get the lawyers involved :(  Certainly if the company persisted, we 
would have done so.  The fact that they can then go to another ISP who 
does not care and allows them to use their network is another issue.

Of course, it depends on the local laws, but in many locations, 
pornography has a lot of restrictions and when those restrictions are 
broken, it becomes a criminal matter. For example, most of my user's 
have family accounts. This means that their email is not only theirs 
but their children and grandchildren's. Even if the owner of the account 
is an adult, the fact that their children are present when they read 
their email means that all pornographic spam they receive is essentially 
being delivered to a minor. This is especially true with misleading 
subject lines where children are exposed to unwanted material before 
anyone realizes it. In Oklahoma, at least, it is a criminal offense to 
expose children to pornographic material.

-Jack



Re: bind patches++ (Re: Wildcards)

2003-09-23 Thread Paul Vixie

   Hello Paul , All ,  Is there a url listing the TLD's that
   officially use wild cards in their deployment ?

nope.  right now you just have to know.  we're trying to keep a list of
places that either use wildcards and have been accepted by the community,
or don't use wildcards but run bind8 or other old broken software that
incorrectly sends answers rather than referrals when queried for data held
as subzone glue...

  see www.isc.org/products/BIND/delegation-only.html for details.

...and that's where you'll find it.

it's very possible that declaring a small number of zones delegation-only
will be less work and less intrusive than trying to find/list the exceptions.


Re: Providers removing blocks on port 135?

2003-09-23 Thread Mike Tancsa
At 01:18 PM 23/09/2003, Jack Bates wrote:
Mike Tancsa wrote:

I am not advocating that at all.  (everyone's doing it, so let's not 
bother) However, I dont see what the municipal government has to do with 
a matter like this.  I imagine its a civil issue where you have to get 
the lawyers involved :(  Certainly if the company persisted, we would 
have done so.  The fact that they can then go to another ISP who does not 
care and allows them to use their network is another issue.
Of course, it depends on the local laws, but in many locations, pornography
This user was sending *out* from our network, not to our users. It would 
have been up to the authorities in said localities to bring charges against 
them. I did what I could here.   The only cost effective way to deal with 
things like this is for the ISP to act which we did.  Oklahoma would be 
foolish to spend tens of thousands of dollars to go after this idiot. 
Really, your state money is better spent elsewhere.
This is not very different than the ISPs out there not bothering to clean 
up their infected users (my favorite rant for the quarter).  Looking at
http://isc.sans.org/port_details.html?port=135repax=1tarax=2srcax=2percent=Ndays=70Redraw=Submit+Query
it would appear by the number of source addresses, there has not been any 
significant reduction in blaster and its variants.

---Mike


has a lot of restrictions and when those restrictions are broken, it 
becomes a criminal matter. For example, most of my user's have family 
accounts. This means that their email is not only theirs but their 
children and grandchildren's. Even if the owner of the account is an 
adult, the fact that their children are present when they read their email 
means that all pornographic spam they receive is essentially being 
delivered to a minor. This is especially true with misleading subject 
lines where children are exposed to unwanted material before anyone 
realizes it. In Oklahoma, at least, it is a criminal offense to expose 
children to pornographic material.

-Jack



Re: Windows updates and dial up users

2003-09-23 Thread Owen DeLong
If you bought your Windows from an OEM, you're pretty much screwed because
Micr0$0ft has transferred all responsibility to the OEM, and, the OEMs don't
want to issue refunds because that costs them on their deal with Micr0$0ft.
(A questionable business practice on M$ part, at best).
However, every time I have purchased a copy of Windows from Micr0$0ft or
from a store without a computer, discovered it didn't work, called Micr0$0ft
and insisted that they deliver what they promise, they have cheerfully 
offered
to refund my money, and, I have always gotten my refund within 2-3 weeks of
sending them their piece of shit product.

If you're OEM doesn't refund you, the simplest course of action is to print
out the EULA you didn't agree to which says in clear text that you are
entitled to a refund from your OEM (at least the last time I looked at
one, which, was probably NT4 or W2K at the latest).  Attach that to your
small-claims filing, and, have the OEM served (certified mail usually works
with corporations).  It's always good to name the CEO as a party in the
suit and send the service to him personally as well as the corporation
generally.
In any case, my point is that at best, they'll refund your money.  They 
don't
feel they have any responsibility for the consequences of their actions.

Owen

--On Tuesday, September 23, 2003 11:01 AM -0400 Henry Yen 
[EMAIL PROTECTED] wrote:

On Mon, Sep 22, 2003 at 10:02:57AM -0700, Owen DeLong wrote:
 Ok then different idea, assuming that we're all agreed its MS's
 responsibility  to ensure users are patched promptly and without extra
 cost to the end user.
The problem is that while we agree, Micr0$0ft does not.  They feel they
should
have no responsibility whatsoever to the end user beyond cheerfully
refunding
their money if they decide to stop using Windows.
Microsoft does not issue refunds if you stop using Windows, whether or
not you were satisfied with the XPerience.
My interactions with Microsoft have never been cheerful, which is a
state mostly reserved for New Product Launch(tm) parties and
advertisements.
Nor can one readily obtain a refund from an OEM, even if you never
use Windows and reject the EULA (http://windowsrefund.net/index2.php).
--
Henry Yen   Aegis Information
Systems, Inc. Senior Systems Programmer   Hicksville,
New York




Re: bind 9.2.3rc3 successful

2003-09-23 Thread Stephen L Johnson

On Tue, 2003-09-23 at 01:35, William Allen Simpson wrote:
 Thought I'd mention that I helped setup BIND 9.2.3rc3 on a yellowdog 
 linux powercomputing machine tonight.  It worked.  And the mail queues 
 began clearing out.  Just for an oddball success report. 

I upgrade our DNS server the week-end but only to bind 9.2.2-P2. (And I
see there's a new release already. Sigh...)  It's helped clear out a
bunch of mail queues.

I'm new to the list, but I do want to echo the thanks to Paul Vixie and
the ISC for their prompt work. Thanks You very much!

-- 
Stephen L Johnson   [EMAIL PROTECTED]
Unix Systems Administrator  [EMAIL PROTECTED]
Department of Information Systems
State of Arkansas
501-682-4339



Re: Verisign Responds

2003-09-23 Thread Paul Vixie

 I wonder btw why Verisign didn't catch the typo's in their
 own domains if they think it is that important:
 ...
 ;; QUESTION SECTION:
 ;.verisign.com. IN  A

wildcards don't work that way.  there are ns rr's in .com for verisign.com,
so you get a referral to those servers no matter whether a *.com wildcard
exists or not.


Re: Verisign Responds

2003-09-23 Thread Jack Bates
Paul Vixie wrote:

wildcards don't work that way.  there are ns rr's in .com for verisign.com,
so you get a referral to those servers no matter whether a *.com wildcard
exists or not.
I think the point was that if catching typographical errors was so 
important to verisign, they would have created a *.verisign.com wildcard 
as well.

-Jack



Re: Verisign Responds

2003-09-23 Thread Dan Hollis

On Tue, 23 Sep 2003 [EMAIL PROTECTED] wrote:
  On Mon, 22 Sep 2003, Dave Stewart wrote:
   Courts are likely to support the position that Verisign has control of .net 
   and .com and can do pretty much anything they want with it.
  ISC has made root-delegation-only the default behaviour in the new bind, 
  how about drafting up an RFC making it an absolute default requirement for 
  all DNS?
   That would be making a fundamental change to the DNS
   to make wildcards illegal anywhere. Is that what you
   want?

no it wouldnt. it would ust make wildcards illegal in top level domains, 
not subdomains.

-Dan
-- 
[-] Omae no subete no kichi wa ore no mono da. [-]



Re: Verisign Responds

2003-09-23 Thread bmanning

 
 On Tue, 23 Sep 2003 [EMAIL PROTECTED] wrote:
   On Mon, 22 Sep 2003, Dave Stewart wrote:
Courts are likely to support the position that Verisign has control of .net 
and .com and can do pretty much anything they want with it.
   ISC has made root-delegation-only the default behaviour in the new bind, 
   how about drafting up an RFC making it an absolute default requirement for 
   all DNS?
  That would be making a fundamental change to the DNS
  to make wildcards illegal anywhere. Is that what you
  want?
 
 no it wouldnt. it would ust make wildcards illegal in top level domains, 
 not subdomains.
 
 -Dan

really? and how would that work? (read be enforced...)

--bill



Re: Verisign Responds

2003-09-23 Thread Matthew Richardson

-BEGIN PGP SIGNED MESSAGE-

Paul Vixie [EMAIL PROTECTED] wrote:-

  We recommend that any and all TLDs which use wildcards in a manner
  inconsistent with this guideline remove such wildcards at the earliest
  opportunity.
  
  What else does the IETF need to do here?
 
 issue an rfc.  iab is not a representative body, and their opinions
 are not refereed.

Yes indeed, but one has to ask the question What about ICANN's 
recommendations? and what they might have to do to have them 
implemented.

As an outsider to the politics of ICANN, registries, registrars and 
the like, it boggles my mind that Verisign, a company issued with a 
contract by ICANN to run a gTLD, should be able to make technical 
changes which cause significant breakage (and hence cost the Internet 
community to fix/workaround), and should then be quite so 
demonstrably unwilling to accept ICANN's polite request.

It seems to me that there must be something seriously broken in the 
procedures or contracts that a situation such as this could occur.

The consensus technical view seems to be that the wildcard 
introduction has been a destabilising influence and yet ICANN, who 
are charged with the responsibility of ensuring the stability of the 
Internet, seem powerless to do anything about it.

It's all most bizarre!

Best wishes,
Matthew

-BEGIN PGP SIGNATURE-
Version: 2.6.3i
Charset: noconv

iQCVAgUBP3CPCwKwLwcHEv69AQGUKwP/dXTWek8Zh2fjGqjLjjhKJSY+y2FPYObI
0Q8o1IgCumuGxPlARDcy4JxZAzGa6NmU5bLyLSfLtJwZoSDeMCyvu4zVDUy5kfMN
As0KrXVrkgEl8eRh1mZrQGdkf3SQIrhYhugAfX5LRBxZwMn3lcFMAhw1qUKJ+km5
IKtSQztc/sM=
=kB7Y
-END PGP SIGNATURE-


Re: Verisign Responds

2003-09-23 Thread Crist Clark

[EMAIL PROTECTED] wrote:
 
 
  On Tue, 23 Sep 2003 [EMAIL PROTECTED] wrote:
On Mon, 22 Sep 2003, Dave Stewart wrote:
 Courts are likely to support the position that Verisign has control of .net
 and .com and can do pretty much anything they want with it.
ISC has made root-delegation-only the default behaviour in the new bind,
how about drafting up an RFC making it an absolute default requirement for
all DNS?
   That would be making a fundamental change to the DNS
   to make wildcards illegal anywhere. Is that what you
   want?
 
  no it wouldnt. it would ust make wildcards illegal in top level domains,
  not subdomains.
 
  -Dan
 
 really? and how would that work? (read be enforced...)

The same way all RFCs and Standards are enforced, by the IETF Delta
Squad Elite Stormtrooper Interdiction Unit Strike Force.
-- 
Crist J. Clark   [EMAIL PROTECTED]
Globalstar Communications(408) 933-4387


Re: Verisign Responds

2003-09-23 Thread Dan Hollis

On Tue, 23 Sep 2003 [EMAIL PROTECTED] wrote:
  On Tue, 23 Sep 2003 [EMAIL PROTECTED] wrote:
On Mon, 22 Sep 2003, Dave Stewart wrote:
 Courts are likely to support the position that Verisign has control of .net 
 and .com and can do pretty much anything they want with it.
ISC has made root-delegation-only the default behaviour in the new bind, 
how about drafting up an RFC making it an absolute default requirement for 
all DNS?
 That would be making a fundamental change to the DNS
 to make wildcards illegal anywhere. Is that what you
 want?
  no it wouldnt. it would ust make wildcards illegal in top level domains, 
  not subdomains.
   really? and how would that work? (read be enforced...)

Well yes thats part of the problem. It looks like verisign doesnt care 
what anyone (ICANN, IAB, operators) thinks. But if we can mandate via RFC 
it for dns software (servers, resolvers) etc. Then we go a ways to 
removing verisign from the equation. Verisign can do what they like, 
everyone will just ignore their hijacking.

-Dan
-- 
[-] Omae no subete no kichi wa ore no mono da. [-]



Re: Verisign Responds

2003-09-23 Thread Randy Bush

 it would ust make wildcards illegal in top level domains, 
 not subdomains.

there are tlds with top level wildcards that are needed and
in legitimate use.

verisign has not done anything strictly against spec.  this
is a social and business issue.  

all this noise and bluster is depressing.  it indicates that
we are in a very quickly maturing industry because a lot of
probably-soon-to-be-ex engineers have too much time on their
hands.

randy



Re: Verisign Responds

2003-09-23 Thread bmanning

 
 
 On Tue, 23 Sep 2003 [EMAIL PROTECTED] wrote:
   On Tue, 23 Sep 2003 [EMAIL PROTECTED] wrote:
 On Mon, 22 Sep 2003, Dave Stewart wrote:
  Courts are likely to support the position that Verisign has control of 
  .net 
  and .com and can do pretty much anything they want with it.
 ISC has made root-delegation-only the default behaviour in the new bind, 
 how about drafting up an RFC making it an absolute default requirement for 
 all DNS?
That would be making a fundamental change to the DNS
to make wildcards illegal anywhere. Is that what you
want?
   no it wouldnt. it would ust make wildcards illegal in top level domains, 
   not subdomains.
  really? and how would that work? (read be enforced...)
 
 Well yes thats part of the problem. It looks like verisign doesnt care 
 what anyone (ICANN, IAB, operators) thinks. But if we can mandate via RFC 
 it for dns software (servers, resolvers) etc. Then we go a ways to 
 removing verisign from the equation. Verisign can do what they like, 
 everyone will just ignore their hijacking.
 

lets try this again... why should a valid DNS protocol element
be made illegal in some parts of the tree and not others?
if its bad one place, why is it ok other places?

--bill


Foundry BigIron series

2003-09-23 Thread Will Yardley

We're considering switching to Foundry BigIrons (probably the 4000, as
opposed to Cisco 6500 series switches. We're currently using 7206VXRs).
Anyone have opinions (on or off list) on this product? Looking through
the archives, I don't notice any discussions of this since about 2001 [1].

(http://www.foundrynet.com/products/l3backbone/bigiron/BigIronx00Datasheet.html)

I'm mostly interested in its BGP implementation, as the boxes would be
handling our core routing via BGP.
(I haven't noticed anyone complaining about BGP problems in the past
year or so); also opinions on the CLI would be helpful (I'm told it's
95% identical to IOS's CLI). The CLI was another complaint in the thread
cited below, so I'm curious if it has improved since 2001.

I'd be interested in hearing about the comparable Riverstone boxes as
well.

[1] thread starting at
http://www.merit.edu/mail.archives/nanog/2002-09/msg00050.html

-- 
Since when is skepticism un-American?
Dissent's not treason but they talk like it's the same...
(Sleater-Kinney - Combat Rock)




Re: Verisign Responds

2003-09-23 Thread Randy Bush

   lets try this again... why should a valid DNS protocol element
   be made illegal in some parts of the tree and not others?
   if its bad one place, why is it ok other places?

because some engineers think that all social and business problems
can be solved by technical hacks.  it's the godess's revenge for
the lawyers who think all engineering problems can be solved at
layer nine.

randy, who will go back to work now



Re: Verisign Responds

2003-09-23 Thread Kevin Loch
Daniel Karrenberg wrote:
What else does the IETF need to do here?

Recognize the legacy status of certain zones and establish strict
criteria for making configuration changes to them.  This would
be in addition to any guidance for all zones with delegations.
KL



RE: Foundry BigIron series

2003-09-23 Thread Joel Perez

Hey Will,

I do not have experience using any Foundry boxes.
I do however use Riverstone extensively; my whole network is composed of
RS boxes ranging from RS3000's up to RS8600's.
I have an RS8600 handling my core routing right now! Im taking full bgp
tables from 3 upstreams and several gig and ds-3 links for my OSPF
backbone.
I used to have a 7206VXR trying to do the same.

The cli is in my opinion easier than Cisco's IOS to learn. It has plenty
of neat features that make it very user friendly. 

The only issue I have had is with the way it handles flows. I used to
hit 100% cpu utilization when my traffic peaked due to the way the flows
were handled. However, the problem was sort of fixed by enabling
Riverstone's version of Cisco's CFE and move the flows to the ASIC's in
the linecards. 
Just as an example during my peak usage I move between 300-350Megs of
traffic and my cpu barely goes above 10% utilization.

The draw back is that I can not use ACL's as effectively in my core, so
I moved all my ACL's to my edge routers! 

Oh, and they are a fraction of the cost of the other big name brands.


If you want any more info you are more than welcome to ask.

Regards,
--
Joel Perez [EMAIL PROTECTED]  | IP Engineer
http://www.ntera.net/ | Ntera
305.914.3412

-Original Message-
From: Will Yardley [mailto:[EMAIL PROTECTED]
Sent: Tuesday, September 23, 2003 2:55 PM
To: [EMAIL PROTECTED]
Subject: Foundry BigIron series


We're considering switching to Foundry BigIrons (probably the 4000, as
opposed to Cisco 6500 series switches. We're currently using
7206VXRs).
Anyone have opinions (on or off list) on this product? Looking through
the archives, I don't notice any discussions of this since about 2001
[1].

(http://www.foundrynet.com/products/l3backbone/bigiron/BigIronx00Datas
heet
.html)

I'm mostly interested in its BGP implementation, as the boxes would be
handling our core routing via BGP.
(I haven't noticed anyone complaining about BGP problems in the past
year or so); also opinions on the CLI would be helpful (I'm told it's
95% identical to IOS's CLI). The CLI was another complaint in the
thread
cited below, so I'm curious if it has improved since 2001.

I'd be interested in hearing about the comparable Riverstone boxes as
well.

[1] thread starting at
http://www.merit.edu/mail.archives/nanog/2002-09/msg00050.html

--
Since when is skepticism un-American?
Dissent's not treason but they talk like it's the same...
(Sleater-Kinney - Combat Rock)




Re: Verisign Responds

2003-09-23 Thread Stephen J. Wilcox

On Tue, 23 Sep 2003 [EMAIL PROTECTED] wrote:
  On Tue, 23 Sep 2003 [EMAIL PROTECTED] wrote:
On Tue, 23 Sep 2003 [EMAIL PROTECTED] wrote:
  On Mon, 22 Sep 2003, Dave Stewart wrote:
   Courts are likely to support the position that Verisign has control of 
   .net 
   and .com and can do pretty much anything they want with it.
  ISC has made root-delegation-only the default behaviour in the new bind, 
  how about drafting up an RFC making it an absolute default requirement for 
  all DNS?
   That would be making a fundamental change to the DNS
   to make wildcards illegal anywhere. Is that what you
   want?
no it wouldnt. it would ust make wildcards illegal in top level domains, 
not subdomains.
 really? and how would that work? (read be enforced...)
  
  Well yes thats part of the problem. It looks like verisign doesnt care 
  what anyone (ICANN, IAB, operators) thinks. But if we can mandate via RFC 
  it for dns software (servers, resolvers) etc. Then we go a ways to 
  removing verisign from the equation. Verisign can do what they like, 
  everyone will just ignore their hijacking.
 
   lets try this again... why should a valid DNS protocol element
   be made illegal in some parts of the tree and not others?
   if its bad one place, why is it ok other places?

Well one point is from http://www.icann.org/tlds/ only domains classed as
'sponsored' previously had wildcards. Domains that are unsponsored including
.net and .com are supposed to operate under policy established from the global
community thro ICANN.

Also this is a specific case, .net/.com have legacy implications and no one 
including Verisign is naive enough to believe that this would have been ok.

This is why they have done it in the way they have without consultation. A 
number of people claim they are acting in breach of their charter with ICANN, 
sure (Randy) this is a social argument, but theres technical ones as well but 
they dont stand up so well in the courtroom..

Steve



Re: Verisign Responds

2003-09-23 Thread Andy Walden


On Tue, 23 Sep 2003 [EMAIL PROTECTED] wrote:

 
  On Tue, 23 Sep 2003 [EMAIL PROTECTED] wrote:
On Tue, 23 Sep 2003 [EMAIL PROTECTED] wrote:
  On Mon, 22 Sep 2003, Dave Stewart wrote:
   Courts are likely to support the position that Verisign has control of 
   .net
   and .com and can do pretty much anything they want with it.
  ISC has made root-delegation-only the default behaviour in the new bind,
  how about drafting up an RFC making it an absolute default requirement for
  all DNS?
   That would be making a fundamental change to the DNS
   to make wildcards illegal anywhere. Is that what you
   want?
no it wouldnt. it would ust make wildcards illegal in top level domains,
not subdomains.
 really? and how would that work? (read be enforced...)
 
  Well yes thats part of the problem. It looks like verisign doesnt care
  what anyone (ICANN, IAB, operators) thinks. But if we can mandate via RFC
  it for dns software (servers, resolvers) etc. Then we go a ways to
  removing verisign from the equation. Verisign can do what they like,
  everyone will just ignore their hijacking.
 

   lets try this again... why should a valid DNS protocol element
   be made illegal in some parts of the tree and not others?
   if its bad one place, why is it ok other places?

 --bill

Because of who is affected by the element. At the TLD level, many are
affected, at the domain level, then its a much smaller subset.

Ultimately, as Randy has already said, it is a business and social
problem. From a business standpoint, why should an organization be forced
to use its own resources to work around Verisign's plan to put more money
in its own packet.

From a social aspect, since Verisign has grown to be one of the most hated
(a decidedly non-business adjective) and distrusted organizations
existing. It pisses people off that they have found an unfair advantage to
use resources in bad faith, to generate revenue from people's typos and
ignorance. It smacks of being unethical, underhanded, illegal, and
generally the opposite of generating revenue by providing a quality
service to your loyal customers.

The technical hacks are a testament to our culture and provide instance
gratification while the slower moving social and business issues are
worked it. They help to gratify the emotional need to generally do the
right thing.

andy
--
PGP Key Available at http://www.tigerteam.net/andy/pgp


Re: Verisign Responds

2003-09-23 Thread Eliot Lear
Randy Bush wrote:

it would ust make wildcards illegal in top level domains, 
not subdomains.


there are tlds with top level wildcards that are needed and
in legitimate use.
verisign has not done anything strictly against spec.  this
is a social and business issue.
And this in itself indicates a possible failure in our model.  When 
someone can do something that causes so much outrage, and we the 
community have no recourse, something is wrong.  Maybe we're in the 
realm of politics, but our implementations reflect our values.

Do you feel the same today about the GPG/PGP v. X.509 as you did before 
Verisign decided to become an unauthorized interloper?  Might we have a 
standards problem with SSL, because people cannot simply NOT trust 
Verisign certs?  After all, how many certificates can you get out of SSL 
for a server or a client?

all this noise and bluster is depressing.  it indicates that
we are in a very quickly maturing industry because a lot of
probably-soon-to-be-ex engineers have too much time on their
hands.
I take a different view.  If people who are upset with Verisign's change 
DON'T say anything, then there's no reason for Verisign to change.  I 
suspect that the better forum may be one's Congress person...

Eliot




monkeys.dom UPL being DDOSed to death

2003-09-23 Thread Raymond Dijkxhoorn

Hi!

After Osirusoft was shut down most likely Infinite-Monkeys are doing down 
also ?? 

See:



[Mimedefang] monkeys.dom UPL being DDOSed to death 
Jon R. Kibler [EMAIL PROTECTED] 
Tue Sep 23 14:15:01 2003 

Greetings to all:

I have some really sad news. I just got off the telephone with Ron 
Guilmette who runs the monkeys.com Unsecured Proxies List DNSBL. I hate to 
say it, but monkeys.com has been killed. It has been DDOSed to death.

Ron says that every aspect of his network is undergoing a massive DDOS 
attack from thousands of IPs -- apparently many/all spoofed. He has tried 
to get law enforcement to investigate, but to no avail. He indicated that 
this is probably the end of his service.

This makes two DNSBLs that have been DDOSed to death recently. Which one 
is next? NJABL? ORDB?

The computer security industry really needs to figure out how to get law 
enforcement to take these attacks seriously. It would only take a few good 
prosecutions to put an end to these types of attacks. Any 
thoughts/suggestions?

This is really a dark day for those of us fighting spam. I looks like the 
spammers have won a BIG battle. The only question now is who will be the 
causality in this war?

Jon R. Kibler
A.S.E.T., Inc.
Charleston, SC  USA



This is pretty sad. 

bye,
Raymond.



Re: Verisign Responds

2003-09-23 Thread Vadim Antonov


On Tue, 23 Sep 2003, Randy Bush wrote:

 some engineers think that all social and business problems
 can be solved by technical hacks.  

Dunno about some engineers, but engineers in general can do a lot to avoid
creation of many problems in the first place.  This wildcard flop is a
perfect example of a bad design decision coming back to bite.

I'd say that engineers pay too little attention to the social and business
implications of their decisions.

--vadim




Re: Verisign Responds

2003-09-23 Thread Kee Hinckley
At 11:47 AM -0700 9/23/03, [EMAIL PROTECTED] wrote:
lets try this again... why should a valid DNS protocol element
be made illegal in some parts of the tree and not others?
if its bad one place, why is it ok other places?
There's a simple answer and a not so simple.  The simple answer is 
because in one part of the tree it was expected by all players up 
front, and in the other it wasn't.  However in general I tend to 
agree.  The things that Verisign broke (and which have cost my 
company several thousand dollars in lost time and unplanned 
programming tasks, never mind the increase in spam) are also broken 
by other TLDs that use wildcards.  The issues weren't clear because 
the impact was small.  Now that they are clear, those decisions 
should also be revisited.
--
Kee Hinckley
http://www.messagefire.com/ Next Generation Spam Defense
http://commons.somewhere.com/buzz/  Writings on Technology and Society

I'm not sure which upsets me more: that people are so unwilling to accept
responsibility for their own actions, or that they are so eager to regulate
everyone else's.


Re: Verisign Responds

2003-09-23 Thread Jack Bates
Dan Hollis wrote:

On Tue, 23 Sep 2003 [EMAIL PROTECTED] wrote:

On Mon, 22 Sep 2003, Dave Stewart wrote:

Courts are likely to support the position that Verisign has control of .net 
and .com and can do pretty much anything they want with it.
ISC has made root-delegation-only the default behaviour in the new bind, 
how about drafting up an RFC making it an absolute default requirement for 
all DNS?
That would be making a fundamental change to the DNS
to make wildcards illegal anywhere. Is that what you
want?


no it wouldnt. it would ust make wildcards illegal in top level domains, 
not subdomains.

Actually, it's worst than that. root-delegation-only does not just 
change the wildcard behavior. RRs which are in the tld itself instead of 
being delegated (like some of the ccTLDs) break if forced into 
root-delegation-only. This is one of the points in the IAB opinion 
concerning remedies causing other problems.

The issue itself is political, but it does have technical ramifications. 
It's still to be seen if ISC's cure is worse than the disease; as 
instead of detecting and stoping wildcard sets, it looks for delegation. 
It is also configurable to a degree that inexperienced operators will 
break their DNS implementations out of ignorance (like ignoring the ISC 
recomendation and root-delegating .de).

One should consider sponsored TLDs like .museum the exception. If you 
have filtering rules (like smtp) that are bypassed as a result of the 
wildcard, then those rules themselves should be changed. The sponsored 
TLDs and even a lot of the ccTLDs have a rather small subdomain base, 
allowing for unified agreement on changes made to the zone. The legacy 
TLD's should be rather static to ensure stability in DNS architecture 
overall. The subdomain base is massive, making communication and 
agreement on changes difficult. If I'm not mistaken, this is one of the 
duties of ICANN.

-Jack





Re: Verisign Responds

2003-09-23 Thread Rich Braun

Leo Bicknell wrote:
Looks like the lawsuits are going to be the ones to settle this
dispute...anyone think there's a chance of ICANN pulling .COM and .NET
from Verisign due to breach of contract?  I think it's highly unlikely.

Dave Stewart wrote:
Oh, I dunno... ICANN has no teeth, so that won't happen.

Shouldn't one of them smarty-pants attorneys file for an immediate injunction
against VeriSign?  Looks like plenty of technical arguments have been posted
here which even the most dim-witted judge would understand vs. the public
position taken by VeriSign that they should keep their cash register jingling
with Sitefinder proceeds while the topic is studied and/or fought over for
another 24 months.

It's obvious to me that the technical arguments fade out quickly if the
service is kept up and running.  VeriSign cashes in while everyone else incurs
the expense of implementing workarounds and bug-fixes.  Once the workarounds
are in place for more than a couple weeks, there isn't much impetus to put
everything back the way it was.

Has an injunction been requested?

-rich



Re: monkeys.dom UPL being DDOSed to death

2003-09-23 Thread Dan Hollis

On Tue, 23 Sep 2003, Raymond Dijkxhoorn wrote:
 After Osirusoft was shut down most likely Infinite-Monkeys are doing down 
 also ?? 

Anyone SERIOUSLY interested in designing a new PTP RBL system 100% immune 
to DDOS, please drop me a line.

By seriously, i mean those who actually want to solve the problem, not 
those who want to be whiny pedants.

-Dan
-- 
[-] Omae no subete no kichi wa ore no mono da. [-]



Re: monkeys.dom UPL being DDOSed to death

2003-09-23 Thread Jack Bates
Raymond Dijkxhoorn wrote:

[Mimedefang] monkeys.dom UPL being DDOSed to death 
Jon R. Kibler [EMAIL PROTECTED] 
Tue Sep 23 14:15:01 2003 
The computer security industry really needs to figure out how to get law 
enforcement to take these attacks seriously. It would only take a few good 
prosecutions to put an end to these types of attacks. Any 
thoughts/suggestions?

This is really a dark day for those of us fighting spam. I looks like the 
spammers have won a BIG battle. The only question now is who will be the 
causality in this war?

This goes beyond spam and the resources that many mail servers are 
using. These attacks are being directed at anti-spam organizations 
today. Where will they point tomorrow? Many forms of breaking through 
network security require that a system be DOS'd while the crime is being 
committed. These machines won't quiet down after the blacklists are shut 
down. They will keep attacking hosts. For the US market, this is a 
national security issue. These systems will be exploited to cause havoc 
among networks of all types and sizes; governmental and commercial.

Windows Update may be protected for now, but it still has limitations. 
It can be killed to the point of non use. Then how will system get 
patched to protect themselves from new exploits? The problem will 
escalate. There are many financial institutions online. Does anyone 
doubt that their security can be penetrated? What about DoD networks?

There are a lot of social aspects to internetworking. Changes need to be 
made. Power needs to be allocated appropriately. A reconing needs to 
occur. All the businesses that make and spend mass amount of money due 
to the Internet need to strongly consider that there won't be a product 
if the social ramifications are solved.

Users don't want to be online and check email just to find hundreds of 
advertisements, pornography, and illegal material in their inbox. Users 
don't want to hear that they've been infected with the latest virus and 
can no longer be online until they fix the problem; usually resulting in 
money. Users don't want to hear that they can't reach site X because of 
some change in architecture. If the general masses get fed up with the 
Internet, there won't be an Internet. Millions of dollars are easily 
being lost because of malicious activity on the Internet. Millions more 
are being lost due to differences of opinion in the governing bodies of 
the Internet.

Is everyone so short sighted and greedy as to not recognize that they 
are dying a slow financial death?

-jack



Re: Foundry BigIron series

2003-09-23 Thread Will Yardley

I've gotten some really useful responses off list. Sorry for the extra
noise, but I'm going to summarize the responses to the list later today
(for the archives)...

I'm removing names, email addresses, company names and other identifying
stuff in case anyone doesn't want to be quoted publicly, but if you
don't want me to quote you at all, please do send me a heads up.

-- 
Since when is skepticism un-American?
Dissent's not treason but they talk like it's the same...
(Sleater-Kinney - Combat Rock)




[Fwd: monkeys.dom UPL DNSBL being DDOSed to death]

2003-09-23 Thread Matthew Sullivan
Forwarded for your information.  That leave 2 proxy DNSbls left - SORBS and 
DSBL...  Looking at the stats for SORBS over at SDSC looks like SORBS is 
pretty ineffective thanks to the DDoS:

(see: http://www.sdsc.edu/~jeff/spam/cbc.html)

 Original Message 
From: Jon R. Kibler [EMAIL PROTECTED]
Newsgroups: news.admin.net-abuse.email
Subject: monkeys.dom UPL DNSBL being DDOSed to death
Date: Tue, 23 Sep 2003 14:26:47 -0400
Greetings to all:

I have some really sad news. I just got off the telephone with Ron Guilmette 
who runs the monkeys.com Unsecured Proxies List DNSBL. I hate to say it, but 
monkeys.com has been killed. It has been DDOSed to death.

Ron says that every aspect of his network is undergoing a massive DDOS 
attack from thousands of IPs -- apparently many/all spoofed. He has tried to 
get law enforcement to investigate, but to no avail. He indicated that this 
is probably the end of his service.

This makes two DNSBLs that have been DDOSed to death recently. Which one is 
next? NJABL? ORDB?

The computer security industry really needs to figure out how to get law 
enforcement to take these attacks seriously. It would only take a few good 
prosecutions to put an end to these types of attacks. Any thoughts/suggestions?

This is really a dark day for those of us fighting spam. It looks like the 
spammers have won a BIG battle. The only question now is who will be the 
causality in this war?

Jon R. Kibler
A.S.E.T., Inc.
Charleston, SC  USA


Detecting a non-existent domain

2003-09-23 Thread Kee Hinckley
Getting practical for a minute.  What is the optimal way now to see 
if a given host truly exists?  Assume that I can't control the DNS 
server--I need to have this code run in any (*ix) environment. 
Assume also that I don't want to run around specialcasing specific IP 
addresses or TLDs--this needs to work reliably no matter what the 
domain.  User gives me a string, and I need to see if the given host 
is a real machine.

An answer from Verisign would be most appropriate here, since they 
have done extensive research on the impact of their new service, so 
presumably they figured out the answer to this problem and have code 
samples available for distribution.  However I get the feeling from 
their press releases that they've forgotten there is more to the 
internet than just the web.
--
Kee Hinckley
http://www.messagefire.com/ Next Generation Spam Defense
http://commons.somewhere.com/buzz/  Writings on Technology and Society

I'm not sure which upsets me more: that people are so unwilling to accept
responsibility for their own actions, or that they are so eager to regulate
everyone else's.


Re: Verisign Responds

2003-09-23 Thread Dave Crocker

Folks,

EL And this in itself indicates a possible failure in our model.  When 
EL someone can do something that causes so much outrage, and we the 
EL community have no recourse, something is wrong.  Maybe we're in the 
EL realm of politics, but our implementations reflect our values.


Verisign effectively disabled an error response.  The response would not exist
in the protocol if it were not to be used.

Hence, Versign changed the protocol.

That's a technical violation of the standard, not a social or business one.

Folks are free to negotiate their own version of protocols. However, when a
provider imposes a change by fiat, they have rendered the work technically
proprietary.

The IAB and the ICANN advisory panel reports characterise the technical issues
carefully and thoroughly. They make clear that the technical and operational
ramifications of this change are massive.

/d
--
 Dave Crocker dcrocker-at-brandenburg-dot-com
 Brandenburg InternetWorking www.brandenburg.com
 Sunnyvale, CA  USA tel:+1.408.246.8253



Re: monkeys.dom UPL being DDOSed to death

2003-09-23 Thread Mike Tancsa


http://www.openrbl.org

is also offline due to a DDoS.

---Mike

At 05:04 PM 23/09/2003, Joe St Sauver wrote:

Hi,

#This goes beyond spam and the resources that many mail servers are
#using. These attacks are being directed at anti-spam organizations
#today. Where will they point tomorrow? Many forms of breaking through
#network security require that a system be DOS'd while the crime is being
#committed. These machines won't quiet down after the blacklists are shut
#down. They will keep attacking hosts. For the US market, this is a
#national security issue. These systems will be exploited to cause havoc
#among networks of all types and sizes; governmental and commercial.
Note that not all DNSBLs are being effectively hit. DNSBLs which run with
publicly available zone files are too distributed to be easily taken down,
particularly if periodic deltas are distributed via cryptographically
signed Usenet messages (or other push channels). You can immunize DNSBLs
from attack, *provided* that you're willing to publicly distribute the
contents of those DNSBLs.
And when it comes to dealing with the sources of these attacks, we all
know that there are *some* networks where security simply isn't any sort of
priority. (For example, make it a practice to routinely see what ISPs
consistently show up highly ranked on incident summary sites such as
http://www.mynetwatchman.com/ ).
Maybe the folks running those networks are overworked and understafffed,
maybe they have legal constraints that limit what they can do, maybe their
management just don't care as long as they keep getting paid. Who knows?
Whatever the reason, no one is willing to depeer them or filter their
routes, so they really are free to do absolutely *nothing* about
vulnerable hosts or abusive customers.
There are absolutely *no* consequences to their security inactivity, and
because of that, none of us should be surprised that the problem is
becoming a worsening one.
Regards,

Joe St Sauver ([EMAIL PROTECTED])
University of Oregon Computing Center



Re: Providers removing blocks on port 135?

2003-09-23 Thread Justin Shore

On Tue, 23 Sep 2003, Mike Tancsa wrote:

 The credit cards in our case were legit. They were different numbers, but 
 they were not stolen.

That would make a difference.  The credit card companies probably wouldn't 
care if you told them that the cards were being used by their customer for 
illegal activity.  Stolen, maybe.  Anything else they could probably care 
less about.

They are usuaully fairly responsive when it
 comes to them loosing money.  Secondly after I contacted the local police,
 state BI, and perhaps the FBI (assuming no luck could be had with any of
 them)
 
 I am in Canada, but I know that it has been stated that the FBI will not 
 investigate computer fraud if damage is under $100,000.

I didn't realize you were in Canada.  That makes a difference.  The dollar
amount with the FBI varies widely.  I've heard over $5,000, $25,000,
$50,000, now $100,000.  I don't think there's a hard set rule.  I think it
basically boils down to the old fashioned
will-it-get-us-good-PR-with-little-or-not-work rule of thumb. :)

 I doubt a porn company with international clientele would give a toss about 
 what the local media say.

Local media would have been useful not against the spammers but against 
the local lw enforcement that refuses to do anything about it.  Since 
however your local law enforncement can't do much about (international 
borders et al) then the local media wouldn't really care.

 Local government has nothing to do with it.  It was just some dime a dozen 
 porn company.

Ditto for what I said above.  The part about being in Canada changes 
things considerably from what I was assuming.  I must have missed that 
earlier.  Still it's worked in the past in other circumstances so the 
practice is fairly sound.  It just won't work in your case.

My only other advice would involve what's suggested in man 8 syslogd under 
SECURITY THREATS, option number 5.  Best of luck.

Justin



Re: monkeys.dom UPL being DDOSed to death

2003-09-23 Thread Dan Hollis

On Tue, 23 Sep 2003, Joe St Sauver wrote:
 There are absolutely *no* consequences to their security inactivity, and
 because of that, none of us should be surprised that the problem is 
 becoming a worsening one.

china seems hellbent on becoming a LAN. i see the same thing eventually 
happening to networks which refuse to deal with their ddos sources.

-Dan
-- 
[-] Omae no subete no kichi wa ore no mono da. [-]



Re: monkeys.dom UPL being DDOSed to death

2003-09-23 Thread Jason Slagle

On Tue, 23 Sep 2003, Jack Bates wrote:

 This goes beyond spam and the resources that many mail servers are
 using. These attacks are being directed at anti-spam organizations
 today. Where will they point tomorrow? Many forms of breaking through
 network security require that a system be DOS'd while the crime is being
 committed. These machines won't quiet down after the blacklists are shut
 down. They will keep attacking hosts. For the US market, this is a
 national security issue. These systems will be exploited to cause havoc
 among networks of all types and sizes; governmental and commercial.

It's somewhat funny.  Quite some time ago, us IRC server operators warned
about this same thing, and were mostly just told to not run IRC servers.

The anti-spammers will likely just get told to not run DNSBL's.  This
only works up until the point that it's YOUR service thats getting hit and
people tell you to stop running it.

For several years now I've noticed a trend of technologies being used to
attack IRC servers being later abused to send SPAM.  First it was the open
wingates, then the misconfigured Cisco's, then the HTTP Proxies.  It looks
like the large botnets are now being harvested by spammers to fight the
Anti spammers.  This is something we IRC server admins, and other high
profile services like it which draw such attacks have been dealing with
for some time.

Ron, good luck with it.  You're stuck between a rock and a hard place.  If
you down it the kiddies win again, and will feel they can bully the next
guy.  If you don't your network is crippled.  It's a no win situation.

Jason

-- 
Jason Slagle - CCNP - CCDP
/\ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
\ /   ASCII Ribbon Campaign  .
 X  - NO HTML/RTF in e-mail  .
/ \ - NO Word docs in e-mail .




Re: Detecting a non-existent domain

2003-09-23 Thread Dominic J. Eidson

On Tue, 23 Sep 2003, Kee Hinckley wrote:

 Getting practical for a minute.  What is the optimal way now to see
 if a given host truly exists?  Assume that I can't control the DNS

Look for a SOA record for the domain - this should be the proper way to
check for the existance of a domain, instead of looking for A, NS or MX
records..

  box:~# dig assvsvsdcacdasc.com SOA
  ;  DiG 9.1.3  assvsvsdcacdasc.com SOA
  ;; global options:  printcmd
  ;; Got answer:
  ;; -HEADER- opcode: QUERY, status: NOERROR, id: 47940
  ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

  ;; QUESTION SECTION:
  ;assvsvsdcacdasc.com.   IN  SOA

  ;; AUTHORITY SECTION:
  com.10800   IN  SOA a.gtld-servers.net. 
nstld.verisign-grs.com. 2003092300 1800 900 604800 86400


  box:~# dig yahoo.com SOA
  ;  DiG 9.1.3  yahoo.com SOA
  ;; global options:  printcmd
  ;; Got answer:
  ;; -HEADER- opcode: QUERY, status: NOERROR, id: 50827
  ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 5, ADDITIONAL: 0

  ;; QUESTION SECTION:
  ;yahoo.com. IN  SOA

  ;; ANSWER SECTION:
  yahoo.com.  1800IN  SOA hidden-master.yahoo.com. 
hostmaster.yahoo-inc.com. 2003092304 900 300 604800 600


Note the difference in QUERY and ANSWER numbers for the two...


 - d.

-- 
Dominic J. Eidson
Baruk Khazad! Khazad ai-menu! - Gimli
---
   http://www.the-infinite.org/



Re: monkeys.dom UPL being DDOSed to death

2003-09-23 Thread Valdis . Kletnieks
On Tue, 23 Sep 2003 14:15:48 PDT, Dan Hollis said:

 china seems hellbent on becoming a LAN. i see the same thing eventually 
 happening to networks which refuse to deal with their ddos sources.

Well.. that's all fine and good, except we first need one large player to
put their foot down and say That's enough of this manure, we're depeering
you and blocking your prefixes till you clean up your act.

Once *one* big player does that, your eventually happening will be pretty fast.


pgp0.pgp
Description: PGP signature


Re: monkeys.dom UPL being DDOSed to death

2003-09-23 Thread Jack Bates
Joe St Sauver wrote:
Note that not all DNSBLs are being effectively hit. DNSBLs which run with
publicly available zone files are too distributed to be easily taken down,
particularly if periodic deltas are distributed via cryptographically 
signed Usenet messages (or other push channels). You can immunize DNSBLs
from attack, *provided* that you're willing to publicly distribute the 
contents of those DNSBLs. 
Actually, SBL has had a lot of issues. The issue isn't always with the 
dns zones. It is true that one can distribute the zones to make dDOS 
more difficult; although not impossible. However, in the case of SBL, 
they have had issues with the web servers being dDOS'd. The ability to 
lookup why a host is blacklisted, and in the case of relay/proxy lists 
to request removal, is also important.

There are still a lot of blacklists out there; njabl, ordb, dsbl, 
reynolds, sbl, and spews (in a round about sort of way). Yet what 
happens when  a business desides to destroy his competitor's website? 
What happens when someone decides they don't like magazine X or vendor X 
and attacks their web farms? Shall the Internet be called akamai? Don't 
get me wrong. It's a good service, but not invulnerable. 
windowsupdate.com can still be brought to it's knees if the attacker is 
persistant enough.

Of course, when big money businesses are involved, things get done. Yet 
what about the smaller business or the charity? What about critical 
infrastructure? Does anyone claim that MAE East and West couldn't be 
made inoperational by dDOS? How does that shift the network and peering? 
What are the ramifications?

Of the various RPC worms, spybot is the most malicious in intent. Yet 
what if parts of Swen/Gibe/Sobig.F were incorporated into blaster. 
Process terminations to make repair difficult and to open the computer 
to other viruses and vulnerabilites. Installed proxy servers and bots. 
Keyloggers. Now collect your information, gather your bots, and watch a 
single phrase create destruction.

Things have not improved over the last year. They have gotten worse. The 
Internet is more malicious than ever. It is quickly becoming the Inner 
City Projects of communication. Greed and hatred created some of the 
worst neighborhoods in the world. The same concept will apply to 
network. If action isn't taken, it will get worse. More money will be 
lost over the coming years. Many people will be hurt. Communication will 
be impaired.

Question: Why is it not illegal for an ISP to allow a known vulnerable 
host to stay connected and not even bother contacting the owner? There 
are civil remedies that can be sought but no criminal. Bear in mind, 
these vulnerable hosts are usually in the process of performing 
malicious activity when they are reported.

Ron has reported many of the IP addresses that dDOS'd monkeys.com. Under 
the same token, Ron has also reported to many ISP's about spammers which 
have abused servers under his control, scanning and utilizing open 
proxies; which is theft of resources. Why is nothing done about these 
people? Why is the ISP not held liable for allowing the person to 
continue in such malicious activity?

-Jack



Re: Detecting a non-existent domain

2003-09-23 Thread Jack Bates
Kee Hinckley wrote:

Getting practical for a minute.  What is the optimal way now to see if a 
given host truly exists?  Assume that I can't control the DNS server--I 
need to have this code run in any (*ix) environment. Assume also that I 
don't want to run around specialcasing specific IP addresses or 
TLDs--this needs to work reliably no matter what the domain.  User gives 
me a string, and I need to see if the given host is a real machine.

A set comparison between the domain your interested in and *.TLD will 
inform you if the domain is pointed to the same IP addresses as the 
wildcard. In many cases, this is sufficient and can be made to work 
dynamically and quickly with most software and scripts.

-Jack



RE: Detecting a non-existent domain

2003-09-23 Thread David Schwartz


 On Tue, 23 Sep 2003, Kee Hinckley wrote:

  Getting practical for a minute.  What is the optimal way now to see
  if a given host truly exists?  Assume that I can't control the DNS

 Look for a SOA record for the domain - this should be the proper way to
 check for the existance of a domain, instead of looking for A, NS or MX
 records..

He asked for the optimal way to see if a given host truly exists and
you told him how to confirm or deny the existance of a domain. He asked
about hosts, you answered about domains.

DS




Re: Detecting a non-existent domain

2003-09-23 Thread Daniel Roesen

On Tue, Sep 23, 2003 at 04:24:32PM -0500, Dominic J. Eidson wrote:
 Look for a SOA record for the domain - this should be the proper way to
 check for the existance of a domain,

No, because there doesn't _have_ to be a SOA RR for a 2nd level
domain. For example, in the .de TLD, there are (many) domains
which have their RRs (A, MX) in the de. zone file, NOT being
delegated to another NS RRset.

Example: fsck.de


Regards,
Daniel


Re: [Fwd: monkeys.dom UPL DNSBL being DDOSed to death]

2003-09-23 Thread Chris Lewis
Lewis, Chris [CAR:W669:EXCH] wrote:


See cbl.abuseat.org.  It's effectively a proxy DNSBL, and is more 
effective than any of the others.  More effective than many of the more 
reasonable combo DNSBLs too.
I should also mention that OPM and PSS (originally osirus's open socks 
proxy BL) are also quite good.



Re: monkeys.dom UPL being DDOSed to death

2003-09-23 Thread Joe Abley


On Tuesday, Sep 23, 2003, at 17:32 Canada/Eastern, 
[EMAIL PROTECTED] wrote:

On Tue, 23 Sep 2003 14:15:48 PDT, Dan Hollis said:

china seems hellbent on becoming a LAN. i see the same thing 
eventually
happening to networks which refuse to deal with their ddos sources.
Well.. that's all fine and good, except we first need one large player 
to
put their foot down and say That's enough of this manure, we're 
depeering
you and blocking your prefixes till you clean up your act.

Once *one* big player does that, your eventually happening will be 
pretty fast.
In my recent experience, many, many network operators in North America 
and Europe who are really, really bad at tracking back source-spoofed 
DDoS traffic through their networks (there are also some notable, fine 
exceptions I've dealt with recently, who know who they are and should 
not feel slighted by this generality).

If transit was uniformly denied to every operator who was not equipped 
to deal with DDoS tracking in a timely manner, I think 90% of the 
Internet would disappear immediately.

This is not just an Asian problem.

(Incidentally, I think if one big player suddenly decided to throw away 
the millions of dollars of revenue they earn through providing transit 
to east Asian countries, the likely effect would be another grateful 
big player leaping in to take over. I don't see a future in which the 
well-being of users in other peoples' networks trumps income.)

Joe



Re: monkeys.dom UPL being DDOSed to death

2003-09-23 Thread Petri Helenius
Dan Hollis wrote:

china seems hellbent on becoming a LAN. i see the same thing eventually 
happening to networks which refuse to deal with their ddos sources.

 

This invites the question if the hijacked PC or the hijacker in the 
sunshine state is more
guilty of the spam and ddos?

I would expect disconnecting .fl.us have more positive effect to the 
Internet as whole
than would .cn.

Pete




Re: monkeys.dom UPL being DDOSed to death

2003-09-23 Thread Dan Hollis

On Tue, 23 Sep 2003, Joe Abley wrote:
 If transit was uniformly denied to every operator who was not equipped 
 to deal with DDoS tracking in a timely manner, I think 90% of the 
 Internet would disappear immediately.

it gets worse. there are operators who *are* equipped, but refuse to deal 
not only with ddos tracking but with shutting off confirmed sources within 
their networks. the response is 'we will deal with it when we get a 
subpoena'.

-Dan
-- 
[-] Omae no subete no kichi wa ore no mono da. [-]



Re: monkeys.dom UPL being DDOSed to death

2003-09-23 Thread jlewis

On Tue, 23 Sep 2003, Jason Slagle wrote:

 It's somewhat funny.  Quite some time ago, us IRC server operators warned
 about this same thing, and were mostly just told to not run IRC servers.

A private IRC server with one user isn't much fun.

 The anti-spammers will likely just get told to not run DNSBL's.  This
 only works up until the point that it's YOUR service thats getting hit and
 people tell you to stop running it.

A private DNSBL with one user works just fine.

If whoever is behind this succeeds in driving all the DNSBLs off the net 
what they'll really do is drive them all underground.  In the short term, 
lots of networks will lose access to the public DNSBLs they've been using.  
The spammers will rejoice, but that will only fuel the creation of 
hundreds (maybe thousands) of new private DNSBLs.  Necessity is the mother 
of invention.  Those with clue, will run their own.  Alot of those without 
will too.  Some will likely even latch onto the last snapshot they got 
before the DNSBLs they were syncing went offline/private.  These will, of 
course, get out of date and out of sync almost immediately.  

Once you host a customer who turns out to be a spammer, good luck getting 
those IPs removed from 1 private DNSBLs.  E-mail abuse management may 
be the next field to really open up with job opportunities as networks 
will have to contact a large portion of the internet to try to get IPs 
cleared from everyone's private DNSBL...most of which will be poorly 
documented if at all.

Just over 2 years ago, I posted a message titled Affects of the 
balkanization of mail blacklisting about how ex-MAPS users were using 
out-of-sync copies of the MAPS DUL after MAPS went commercial and those 
networks presumably lost access to the data.  I guess that was just the 
tip of the iceberg.
 

--
 Jon Lewis [EMAIL PROTECTED]|  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|  
_ http://www.lewis.org/~jlewis/pgp for PGP public key_



Re: monkeys.dom UPL being DDOSed to death

2003-09-23 Thread Kai Schlichting

On 9/23/2003 at 5:16 PM, Mike Tancsa [EMAIL PROTECTED] wrote:

 http://www.openrbl.org

 is also offline due to a DDoS.

And the ignorance of front-end personnel in LE agencies, unless you are
the NY Times and claim $500,000 in purely fictious damages, can be a bit
frustrating.

Spamcop and Spamhaus have been undergoing intense DDoS attacks for
months, and I am only partially aware how they are being mitigated.

If certain large operators can donate bandwidth and equipment for
IRC servers in locations with OC-12 and better connectivity, AND
live through the DDoS attacks that come with it, why not step forward
and provide some forwarding-proxy service for some of the websites
and distribution sites for DNSBLs, plus possibly proxying DNS traffic?

OpenRBL.org has stated (http://www.openrbl.org/index-2.htm) that the
bandwidth required for actual application traffic can be very low
(0.5Mbps or less), not counting DDoS traffic.

No arrangements of that kind have to be public knowledge.

Other measures:

- Got a spare /20 that can be used to make the forwarding proxy hop around
  a bit, every 5 minutes or so, with DNS TTLs in the 10-minute range?

  It's been done with 'moving-target' spamvertised sites like
  optinspecialists.info , which is currently using a LARGE number of
  compromised Windows hosts illegally to proxy DNS and HTTP traffic for
  them. They've been doing it for weeks. Do the registrars care? Hell no.
  (see morozreg.biz, bubra.biz, the domains used for DNS, domains you
  probably want to add local zone overrides for, in your nameservers,
  not your HOSTS file. Now we know how Al-Quaeda is hiding their websites,
  at last.

  It would be trivial to 'sinkhole' DoS traffic still going on to IPs of
  the recent past, greatly increasing the chances of catching the
  perpetrators as they keep switching their trojans to new IPs,
  hitting a few fully-sniffed honeypots while they are at it.

- BGP anycast, ideally suited for such forwarding proxies.
  Anyone here feeling very adapt with BGP anycast (I don't) for
  the purpose of running such a service? This is a solution that
  has to be suggested and explained to some of the DNSBL operators.

If someone reading this has gone forward with a private mailing list to
discuss all these issues, I'd be happy to receive an invitation to donate
my [lack of] smarts to the cause.

bye,Kai



Re: monkeys.dom UPL being DDOSed to death

2003-09-23 Thread Dan Hollis

On Wed, 24 Sep 2003, Petri Helenius wrote:
 Dan Hollis wrote:
 china seems hellbent on becoming a LAN. i see the same thing eventually 
 happening to networks which refuse to deal with their ddos sources.
 This invites the question if the hijacked PC or the hijacker in the 
 sunshine state is more guilty of the spam and ddos?

the operator hosting the hijacked PC is guilty if they are notified and 
refuse to take action. which seems to be all too common these days with 
universities and colocation companies.

-Dan
-- 
[-] Omae no subete no kichi wa ore no mono da. [-]



RE: Detecting a non-existent domain

2003-09-23 Thread David Schwartz


 Getting practical for a minute.  What is the optimal way now to see
 if a given host truly exists?

You first have to define what you mean by 'exists'. I have a machine here
that I call 'stinky'. It's not on the Interent though. Does the 'host'
'stinky' exist?

 Assume that I can't control the DNS
 server--I need to have this code run in any (*ix) environment.
 Assume also that I don't want to run around specialcasing specific IP
 addresses or TLDs--this needs to work reliably no matter what the
 domain.  User gives me a string, and I need to see if the given host
 is a real machine.

How would you do this before? Does an A record for a hostname mean that a
host with that name exists? If so, then all *.com 'hosts' now 'exist'. If
not, what did you mean by exist before?

 An answer from Verisign would be most appropriate here, since they
 have done extensive research on the impact of their new service, so
 presumably they figured out the answer to this problem and have code
 samples available for distribution.  However I get the feeling from
 their press releases that they've forgotten there is more to the
 internet than just the web.

Forgive me for defending Verisign, but if you want to know if a given DNS
name corresponds with an A record, you can still determine that. If you want
to determine something else, you can still do that, depending upon what that
something else is.

As for 'fsck.de', a good argument can be made that this is not really a
legal domain. It's a host. Checking for an SOA is a good way to tell if a
domain is valid, depending upon what you mean by 'domain' and 'valid'.

I'm reminded of the classic programmers question, how do you tell if a
machine is online?. The answer is define what you mean by a machine being
online and test for that.

So you aren't asking a comprehensible question yet.

DS




Follow up to: [Fwd: monkeys.dom UPL DNSBL being DDOSed to death]

2003-09-23 Thread Matthew Sullivan
Hi all,

Sorry people I had forgotten about EasyNet.nl's proxy list (Wirehub) 
and for the record for a proxy spam blocker I don't rate the opm.

Yours

Matthew



Re: Detecting a non-existent domain

2003-09-23 Thread Daniel Roesen

On Tue, Sep 23, 2003 at 03:15:06PM -0700, David Schwartz wrote:
   As for 'fsck.de', a good argument can be made that this is not really a
 legal domain.

It's a perfectly valid domain registered with DE-NIC. DE-NIC offers two
types of domains: delegated and so-called MX-only domains, where up
to five (IIRC) RRs reside directly in the TLD zone file. Do a whois
lookup on whois.denic.de for fsck.de to see how this looks like.

 It's a host. Checking for an SOA is a good way to tell if a
 domain is valid, depending upon what you mean by 'domain' and 'valid'.

Your definition of domain is too narrow. A valid domain in common
context is a registered second level DNS label. It has no implication
on what is technically being done with this label. Some NICs like
DE-NIC impose restrictions upon registration though (domain has to
be delegated to a working and configured set of NSses or be a MX-only
domain).


Regards,
Daniel


Re: Detecting a non-existent domain

2003-09-23 Thread Joe Abley


On Tuesday, Sep 23, 2003, at 18:15 Canada/Eastern, David Schwartz wrote:

	As for 'fsck.de', a good argument can be made that this is not really 
a
legal domain. It's a host. Checking for an SOA is a good way to tell 
if a
domain is valid, depending upon what you mean by 'domain' and 'valid'.
Are you sure you are not confusing the terms domain and zone?



Re[2]: monkeys.dom UPL being DDOSed to death

2003-09-23 Thread Richard Welty

On Tue, 23 Sep 2003 18:12:11 -0400 (EDT) [EMAIL PROTECTED] wrote:
 These will,
 of 
 course, get out of date and out of sync almost immediately.  

one wonders how many private blocking lists still have the old aegis
netblocks in them.

i make it a point to date entries in my lists and periodically purge older
entries that don't seem to be active spam sources anymore, but most do not,
i'm afraid.

if the well run BLs are run underground or shutdown, this will ultimately
lead to exactly what jon fears -- an IP space full of random, unusable
superfund sites.

cheers,
  richard
-- 
Richard Welty [EMAIL PROTECTED]
Averill Park Networking 518-573-7592
Java, PHP, PostgreSQL, Unix, Linux, IP Network Engineering, Security




Re: Foundry BigIron series

2003-09-23 Thread Will Yardley

Here are the responses I got so far, trimmed and edited. Thanks once
again - I got way more than I bargained for in the way of responses.
I did also receive a response directly from someone at Foundry, (with at
least one of the expected emails from $SALES_DROID at $COMPETITOR).

Sorry for the super long post (about 22k so far) - I've tried to trim as
much as possible (if you respond to this post, PLEASE don't fullquote
the entire message).

Hopefully this won't start any flamewars! I didn't say any of this
stuff, so please don't write me telling me that I'm wrong or asking
who wrote a particular comment.

From what I can tell, it sounds like the newer JetCore based stuff is
much less problematic than the Ironcore stuff. Overall, sounds like the
CLI is fairly easy to adapt to for someone who has experience with Cisco
gear. Definitely some complaints about the BGP implementation; hard to
tell whether those issues are resolved with newer hardware / software.

***

Then take Juniper! Foundry is crap, seriously. 

[ And a followup, after request for a more specific answer ]

Foundry is crap, its end of life stuff. They wont support Ipv6 in hardware 
and certainly dont do things wirespeed. Besides that, take a look on some 
internet exchanges. For example ams-ix, allmost ZERO foundrys left, they 
just dont fit the BGP stuff. Most people allready replaced them with 
either a cisco or a juniper.

We have several Junipers running, and LOVE them. We also have three 
foundry's and they go oput end this year, and i am happy to replace them. 
They just die with the numer of users and traffic we push in those boxes. 
And its not THAT much (70.000 customers and 1.5 GB traffic).

Cisco is ok also, we use a couple of 6509s and several 7206VXRs but if you 
want to do serious BGP and move real traffic, go for Junipers, rock solid 
and cheaper then cisco also. 

***

You're insane; use the cat 6500.

[ And a followup, after requesting more information ]

We USED Foundry, but the BGP implementation was horribly broken.

***

We built a BGP network using them where I worked in 1999 to 2000 or so.
Aside from various problems they had on their WAN links we had a bunch of
BGP problems, relating to memory allocation and the like.  I wound up
filtering routes between all my sites (as I had the same upstream from
each).  At the time they didn't follow the BGP rfc closely, skipping things
like closest IGP hop to use router id as a rotue selection criteria.
Shortly after I left they demoted them to layer 2 switches and they put int
junipers.  I might have some concerns regarding their ability to handle DoS
attacks a la Extreme.  Who knows, they may have gotten the kinks out and
they sure where cheap but my experience was far from perfect.  Hope that
helps,

***

Just my experience.

The interface ie command line is of course almost exactly the same so
you'll have no trouble if you know cisco.

Where I had problems is the particular bigiron I was working with would
lock up hard under higher loads say 600 to 800 megabits on a gig.  I'm not
sure if it was load specific as the customer using the box was always
under high load but it was known to lock up periodically.

I had a 6509 and it only locked once as the result of what turned out to a
be a counter growing to large.

***

We use Foundry and Riverstone boxes to run our ISP and have wonderful
success with them...the Riverstone CLI is a bit unwieldy, but the hardware
rocks.  But we mainly use foundry big iron and net iron boxes at the core,
and for the most part they are great.  Foundry's tech support is also first
class, and you just can't beat the speed.

***

Stay away from Riverstone. My upstream (GNAPS) just dumped them
all...majorly unstable and they take forever to reboot when they
crash.

They switched to junipers (got a bunch of M20s used) and it's
been rock solid since!

***

We use Foundry here and are switching to a combination of Foundry and
Juniper to meet our needs.  The main recommendation I have is to avoid the
Ironcore-based products (older stuff) and go with the newer, Jetcore-based
products.  The older stuff does not support Netflow nor Sflow, and a few
other BGP features that are really must-have in my opinion.

***

I would advise against it.  I had some pretty extensive experience
with this platform running a content network I left about 4 months
ago.  Some of the software implementations on their newer hardware 
may be better, but the BI4000 code we were running (their semi-latest)
was totally bug ridden.  Their BGP implmentation was not at all stable
and their OSPF wasn't much better.  They would drop routes for no
reason and it would require kicking BGP or OSPF to fix the problem.
In some cases removing it from the config and re-applying it.
The boxes would randomly reload when applying an ACL change
but with no consistancy.

We also had a lot of bad luck with their hardware, we had a lot
of the optics go bad on their Gig 

Re: [Fwd: monkeys.dom UPL DNSBL being DDOSed to death]

2003-09-23 Thread Paul Vixie

[EMAIL PROTECTED] (Matthew Sullivan) writes:

 ...  That leave 2 proxy DNSbls left - SORBS and DSBL...

well, and, there's the MAPS OPL, which is also part of the RBL+.  (just 'cuz
i'm not operationally involved with maps doesn't mean i stopped subscribing.)
-- 
Paul Vixie


Re: Verisign Responds

2003-09-23 Thread Paul Vixie

 It's still to be seen if ISC's cure is worse than the disease; as 
 instead of detecting and stoping wildcard sets, it looks for delegation. 

that's because wildcard (synthesized) responses do not look different
on the wire, and looking for a specific A RR that can be changed every day
or even loadbalanced through four /16's that may have real hosts in them
seems like the wrong way forward.
-- 
Paul Vixie


Re: monkeys.dom UPL being DDOSed to death

2003-09-23 Thread John Payne


--On Tuesday, September 23, 2003 6:11 PM -0400 Kai Schlichting 
[EMAIL PROTECTED] wrote:

- BGP anycast, ideally suited for such forwarding proxies.
  Anyone here feeling very adapt with BGP anycast (I don't) for
  the purpose of running such a service? This is a solution that
  has to be suggested and explained to some of the DNSBL operators.
Anyone want to offer hardware, colo, bandwidth and a bgp session for a 
dnsbl anycast solution?



Re: monkeys.dom UPL being DDOSed to death

2003-09-23 Thread Dan Hollis

On Tue, 23 Sep 2003, John Payne wrote:
 --On Tuesday, September 23, 2003 6:11 PM -0400 Kai Schlichting 
 [EMAIL PROTECTED] wrote:
  - BGP anycast, ideally suited for such forwarding proxies.
Anyone here feeling very adapt with BGP anycast (I don't) for
the purpose of running such a service? This is a solution that
has to be suggested and explained to some of the DNSBL operators.
 Anyone want to offer hardware, colo, bandwidth and a bgp session for a 
 dnsbl anycast solution?

they still make static targets for ddos, the only difference is theres 
a few more of them.

-Dan
-- 
[-] Omae no subete no kichi wa ore no mono da. [-]



Re: monkeys.dom UPL being DDOSed to death

2003-09-23 Thread John Payne


--On Tuesday, September 23, 2003 4:56 PM -0700 Dan Hollis 
[EMAIL PROTECTED] wrote:

On Tue, 23 Sep 2003, John Payne wrote:
--On Tuesday, September 23, 2003 6:11 PM -0400 Kai Schlichting
[EMAIL PROTECTED] wrote:
 - BGP anycast, ideally suited for such forwarding proxies.
   Anyone here feeling very adapt with BGP anycast (I don't) for
   the purpose of running such a service? This is a solution that
   has to be suggested and explained to some of the DNSBL operators.
Anyone want to offer hardware, colo, bandwidth and a bgp session for a
dnsbl anycast solution?
they still make static targets for ddos, the only difference is theres
a few more of them.
Yep





RE: Detecting a non-existent domain

2003-09-23 Thread Kee Hinckley
At 3:15 PM -0700 9/23/03, David Schwartz wrote:
	How would you do this before? Does an A record for a hostname 
mean that a
host with that name exists? If so, then all *.com 'hosts' now 'exist'. If
not, what did you mean by exist before?
Okay, let's be very specific.  I need to know if a given name has 
either A or MX records which are *not* the same as those provided by 
the a wildcard in the appropriate TLD.

The answer so far seems to be to query *.TLD, nab all the records, 
and then compare them all the results you get back from querying the 
domain.  If there is anything that doesn't match, you are in the 
clear.  (Modulo internal networks and localhost and all those fun 
tricks of course--but that's a different problem.)

The fact that this is a single IP comparison with Verisign today 
presumably does not preclude the wonders of MX records, CNAME's, 
multiple A records and all of that in the future.
--
Kee Hinckley
http://www.messagefire.com/ Next Generation Spam Defense
http://commons.somewhere.com/buzz/  Writings on Technology and Society

I'm not sure which upsets me more: that people are so unwilling to accept
responsibility for their own actions, or that they are so eager to regulate
everyone else's.


RE: Detecting a non-existent domain

2003-09-23 Thread David Schwartz


 At 3:15 PM -0700 9/23/03, David Schwartz wrote:
  How would you do this before? Does an A record for a hostname
 mean that a
 host with that name exists? If so, then all *.com 'hosts' now 'exist'. If
 not, what did you mean by exist before?

 Okay, let's be very specific.  I need to know if a given name has
 either A or MX records which are *not* the same as those provided by
 the a wildcard in the appropriate TLD.

Okay, but what does that have to do with Verisign? That question would
apply to .museum as well, for example. It also applies equally to
lower-level domain. It's not Verisign's fault that DNS doesn't provide any
'wildcard' flag in its responses.

If we're going to challenge Verisign, we should be very careful to
precisely phrase our queries so that Verisign has no wiggle room. For
example, I suggest, If I don't like SiteFinder, don't agree to its terms,
and don't want to use it, or if I can't comply with its terms because my
usage is commercial, how do I avoid it?

DS




Lucent/Avaya Cajun experiences

2003-09-23 Thread Andy Grosser

This request is largely for anecdotal/historical purposes.  The recent
Foundry/Riverstone posts reminded me of a topic I'd kept meaning to
broach.

My organization will probably be replacing all of our L2/L3 Lucent/Avaya
Cajun switches in the next few months with Catalyst 65XX series boxes.
Our experience has largely been disastrous - 3 operational years have been
filled with _constant_ HW and SW failures, buggy code (i.e. backplane
suddenly stops all traffic forwarding), horrible tech support, lousy
online resources (a la SW releases).  Their M770 ATM gear hasn't been much
better, and their PacketStar media gateways are still, surprisingly,
limping along.

Anyone care to share their own Lucent/Avaya experiences?

Please feel free to reply off-list and I will provide an anonymous
summary.

Thanks.

---
Andy Grosser, CCNP
[EMAIL PROTECTED]
---





Re: monkeys.dom UPL being DDOSed to death

2003-09-23 Thread Geo.

 Ron, good luck with it.  You're stuck between a rock and a hard place.  If
 you down it the kiddies win again, and will feel they can bully the next
 guy.  If you don't your network is crippled.  It's a no win situation.

If any of the dos'ed to death rbls really want's to get back at the spammers
it's easy. Write software that allows any ISP or business to use their mail
servers and their customers/employees (via a foward to address) to maintain
their own highly dynamic blacklist.

Blacklists are just one kind of filter. If we could load software that
allowed us to forward spams caught by other filters into it and it
maintained a DNS blacklist we could have our servers use, we wouldn't need
big public rbl's, everyone doing any kind of mail volume could easily run
their own IF THE SOFTWARE WAS AVAILABLE. A distributed solution for a
distributed problem.

Resistance is NOT futile.

Geo.



New CA Law

2003-09-23 Thread Leo Bicknell

Word is Gray Davis signed this law,
http://info.sen.ca.gov/pub/bill/sen/sb_0151-0200/sb_186_bill_20030911_enrolled.html
today.  It seems to be a pretty strong anti-spam bill.  Given all
the talk of black lists and DDOS's and the like does anyone think
this will make a difference?  Is anyone planning on using the law
to recover damages?

-- 
   Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/
Read TMBG List - [EMAIL PROTECTED], www.tmbg.org


pgp0.pgp
Description: PGP signature


Re: New CA Law

2003-09-23 Thread Joe St Sauver

Hi Leo,

#Word is Gray Davis signed this law,
#http://info.sen.ca.gov/pub/bill/sen/sb_0151-0200/
#sb_186_bill_20030911_enrolled.html today.  It seems to be a pretty 
#strong anti-spam bill.  Given all the talk of black lists and DDOS's 
#and the like does anyone think this will make a difference?  Is 
#anyone planning on using the law to recover damages?

Likewise, Oregon passed (and our Governor signed) SB910 
http://www.leg.state.or.us/03reg/measures/sb0900.dir/sb0910.en.html
which includes a right of private action with $500 per spam penalties
[in the case of spam which Misrepresents or hinders a person from 
determining the point of origin or transmission path of the electronic 
mail message] among other nice provisions. 

Electronic mail service providers also acquire new rights of action,
and some interesting immunities. 

All that's needed now is litigation support software that can ingest
spam submissions, aggregate and summarize appropriately, do automated
whois lookups and deobfuscation, and produce digestified ready-to-litigate 
spam packages for interested attorneys.

Regards,

Joe


Re: monkeys.dom UPL being DDOSed to death

2003-09-23 Thread jlewis

On Tue, 23 Sep 2003, Geo. wrote:

 If any of the dos'ed to death rbls really want's to get back at the spammers
 it's easy. Write software that allows any ISP or business to use their mail
 servers and their customers/employees (via a foward to address) to maintain
 their own highly dynamic blacklist.

Already been done.  http://spamikaze.nl.linux.org/

--
 Jon Lewis [EMAIL PROTECTED]|  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|  
_ http://www.lewis.org/~jlewis/pgp for PGP public key_