Re: short Botnet list and Cashing in on DoS

2004-10-08 Thread alex

On Fri, 8 Oct 2004, J. Oquendo wrote:

> this since it bugs me) EV1, Everybody's Internet. Not only do they host
> some botnets, malware spewing servers, spam relays, terrorists related
> sites, their excuse is "Well we don't know who we rent to"
They don't. When you have few thousands of dedicated servers and you can
claim that you know *exactly* what is each server used for, then you can
talk back.

> Now I know laws are being worked in along the way, but if you own a home
> and rent it out, then it gets subletted, the re-sub'ed, let's say fifty
> transactions occurred, you own the home. If someone down the line is
> running drugs out of the apartment your house is gone.
And these laws (drug forfeiture) are grossly unfair, are used as a revenue
generator by many municipalities, thus increasing pressure on prosecutors
to try to seize as much as they can. Let's not use one bad law as an 
excuse to have more.

> Yes their is little that can be done right now, but yet there ARE things
> that CAN BE DONE. I'm one that is skeptical about laws since laws abroad
> would mean nothing here and vice versa, but where are things headed?
> Spend more on infrastructure to support these issues when you shouldn't
> have to or buy bigger equipment to handle filtering when you shouldn't
> have to. I say nip it at the bud, if you're an upstream provider and you
> see some of these issues, three strikes shut these things down, or
> nullroute them, don't just sit twiddling your thumbs "Oh but that won't
> help your idea is silly because foo_x reason." Have something better in
> mind propose it. I'm sure some of these networks that are getting DoS'ed
> out of existence would love to hear them. Hell some might even pay you
> to implement them.
Don't sit twiddling your thumbs coming up with Final Ultimate Solutions to
DDoS problems (FUSSDP) ideas and refusing to listen to foo_x reasons why
it won't work. Listen and come up with better ideas, we'll love to hear
them. Present them at BOF at NANOG.

-alex



Re: short Botnet list and Cashing in on DoS

2004-10-08 Thread J. Oquendo


>> Most ISP's truly don't want this as their own problem. I personally
>> don't blame them. Luckily the ISP I work for has no home users.

Most ISP's wouldn't have to deal with this problem if corporations took
the time to release better products. I was faced with the question of
"What do you do for infected clients?" What can an ISP do. Most of the
times ISP's become the de facto MS technical support team and it is rather
unfair and costly to have technical support staff on the phone constantly
putting out MS' fires. They are left with the prospect of losing clients
when the client is told "It's an MS problem you have to contact MS", yet
they've called MS and spoke with someone likely in another country who has
no clue, called  Dell and spoke with yet another clueless person, and all
they wanted to do was surf the net. What do you tell a client when they
start stating "Well then I want to cancel my service" because they don't
understand, and won't care to since they're frustrated. Sure take a hit
with one client cancelling an account, what happens when it grows?

As for the prior responses of "You will get DoS'ed" this I am aware of.
Problems that concerned me were more of the tracking issues, coupled with
the fact that there would be no guarantee that admins would do anything
about it. Take the case of that one Californian who hijacked a /16 a while
back I believe from a county over there. Admins like this are liable to
sit back and do nothing since along the line someone is going to be paying
money for the traffic. It is rather sad, and worse when you contact their
upstream and they too do little. Consider (and I will keep mentioning them
this since it bugs me) EV1, Everybody's Internet. Not only do they host
some botnets, malware spewing servers, spam relays, terrorists related
sites, their excuse is "Well we don't know who we rent to"

Now I know laws are being worked in along the way, but if you own a home
and rent it out, then it gets subletted, the re-sub'ed, let's say fifty
transactions occurred, you own the home. If someone down the line is
running drugs out of the apartment your house is gone.

Yes their is little that can be done right now, but yet there ARE
things that CAN BE DONE. I'm one that is skeptical about laws since laws
abroad would mean nothing here and vice versa, but where are things
headed? Spend more on infrastructure to support these issues when you
shouldn't have to or buy bigger equipment to handle filtering when you
shouldn't have to. I say nip it at the bud, if you're an upstream provider
and you see some of these issues, three strikes shut these things down, or
nullroute them, don't just sit twiddling your thumbs "Oh but that won't
help your idea is silly because foo_x reason." Have something better in
mind propose it. I'm sure some of these networks that are getting DoS'ed
out of existence would love to hear them. Hell some might even pay you to
implement them.


=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
GPG Key ID 0x51F9D78D
Fingerprint 2A48 BA18 1851 4C99

CA22 0619 DB63 F2F7 51F9 D78D
http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x51F9D78D

sil @ politrix . orghttp://www.politrix.org
sil @ infiltrated . net http://www.infiltrated.net

"How can we account for our present situation unless we
believe that men high in this government are concerting
to deliver us to disaster?" Joseph McCarthy "America's
Retreat from Victory"


Re: short Botnet list and Cashing in on DoS

2004-10-08 Thread Gadi Evron

Only when they do something about it.
Trouble? When they have 40K extra users to pay for bandwidth (easily 
eats up a T1 or two), it's damage enough. Besides, would you like 
someone to launch "cyber A-Bombs" (phaa) from your network?

1. Worrying about personal privacy of their users, not wanting to bend 
too many rules to fight these drones that *appear* like regular users.

Appear? If you own one of the blocks below, please do something about it.
And I know people who mail abuse reports for hundreds of such *lists*, 
something /rarely/ gets done.

One thing they focus on it taking down control web pages. For example if 
the runner would give a command: 'update http://etc.com/evil.trojan.exe' 
or if the drones spam themselves on irc.. then it's all about the abuse 
teams. Some are really responsive, some just ignore.

Last time I took the time to inform ISP's about such a list was when it 
was a 700 large army of *nix boxes. Haven't seen one of those for years 
before that. It was 3 months ago or so.

It was rather funny really. Lesson learned: don't use hostnames like 
"securebox" or "secureserver1" or such.

sadsa``` [EMAIL PROTECTED]  Don't Touch Me  
`o`hj`h` [EMAIL PROTECTED]  Don't Touch Me  
TaiFrunze [EMAIL PROTECTED]  Don't Touch Me  
{snip}
I try and take care personally of drones and abusers I see coming from 
Israel.. it's way too much work and annoyance as it is, thanks though.

Most ISP's truly don't want this as their own problem. I personally 
don't blame them. Luckily the ISP I work for has no home users.

If you have any problem in Israel, whether with finding a contact or 
reaching law enforcement - feel free to email me and I'd be glad to find 
you a contact.

	Gadi.


RE: FW: House Toughens Spyware Penalties

2004-10-08 Thread David Schwartz


> "The bill also permits computer software providers to
> interact with a user's computer without notice and
> consent in order to determine whether the computer
> user is authorized to use the software upon
> initialization of the software or an update of the
> software."
>
> I find this aspect of the Bill objectionable, since it
> contradicts other laws, which make it illegal to break
> into a computer. There is also no guarantee that
> the person doing the snooping is above criminal intent
> and would create an operational nightmare for
> most prudent ISP/NSP organizations.

It's really a trivial issue, because even without this provision, the
license could just say (and most do), that the software will validate your
authorization to use it. Without this provision, one could argue that using
a hidden (location undisclosed) key in the registry to keep track of a trial
start date violates the letter of the law. After all, you are storing
something on someone else's computer and you don't tell them what it is or
where it is.

DS




Re: short Botnet list and Cashing in on DoS

2004-10-08 Thread Matthew S. Hallacy

On Fri, Oct 08, 2004 at 09:07:48PM +0200, Gadi Evron wrote:

> Those drone armies that lurk on actual real networks are a major problem 
> for the networks themselves, but I doubt anyone can blame them for:

Only when they do something about it.

> 1. Worrying about personal privacy of their users, not wanting to bend 
> too many rules to fight these drones that *appear* like regular users.

Appear? If you own one of the blocks below, please do something about it.


sadsa``` [EMAIL PROTECTED]  Don't Touch Me  
`o`hj`h` [EMAIL PROTECTED]  Don't Touch Me  
TaiFrunze [EMAIL PROTECTED]  Don't Touch Me  
Crist9597 [EMAIL PROTECTED]  Don't Touch Me  
Mihaiul [EMAIL PROTECTED]  Don't Touch Me  
Cs` [EMAIL PROTECTED]  Don't Touch Me  
__intzu__ [EMAIL PROTECTED]  Don't Touch Me  
_ragonul_ [EMAIL PROTECTED]  Don't Touch Me  
Dragonul_ [EMAIL PROTECTED]  Don't Touch Me  
}-{ [EMAIL PROTECTED]  Don't Touch Me  
{}- [EMAIL PROTECTED]  Don't Touch Me  
Kyia_ [EMAIL PROTECTED]  Don't Touch Me  
Rupetot [EMAIL PROTECTED]  Don't Touch Me  
awa` [EMAIL PROTECTED]  Don't Touch Me  
Raz [EMAIL PROTECTED]  Don't Touch Me  
FacFocu [EMAIL PROTECTED]  Don't Touch Me  
Cristi-- [EMAIL PROTECTED]  Don't Touch Me  
VandFan [EMAIL PROTECTED]  Don't Touch Me  
Dragonul` [EMAIL PROTECTED]  Don't Touch Me  
Viper18 [EMAIL PROTECTED]  Don't Touch Me  
\op [EMAIL PROTECTED]  Don't Touch Me  
Kyia [EMAIL PROTECTED]  Don't Touch Me  
n3fertiti [EMAIL PROTECTED]  Don't Touch Me  
_i___ [EMAIL PROTECTED]  Don't Touch Me  
Tzucky [EMAIL PROTECTED]  Don't Touch Me  
Cristel` [EMAIL PROTECTED]  Don't Touch Me  
ns0 [EMAIL PROTECTED]  Don't Touch Me  
Aiuritul [EMAIL PROTECTED]  Don't Touch Me  
dragonul [EMAIL PROTECTED]  Don't Touch Me  
Aiure`l [EMAIL PROTECTED]  Don't Touch Me  
Avi0n [EMAIL PROTECTED]  Don't Touch Me  
Muthi_ [EMAIL PROTECTED]  Don't Touch Me  
forgrt [EMAIL PROTECTED]  Don't Touch Me  
Qp` [EMAIL PROTECTED]  Don't Touch Me  
Pasarel [EMAIL PROTECTED]  Don't Touch Me  
`p`p`p [EMAIL PROTECTED]  Don't Touch Me  
Dragonel [EMAIL PROTECTED]  Don't Touch Me  
polq [EMAIL PROTECTED]  Don't Touch Me  
`o`o`o`o` [EMAIL PROTECTED]  Don't Touch Me  
HanPanga [EMAIL PROTECTED]  Don't Touch Me  
Hanga [EMAIL PROTECTED]  Don't Touch Me  
helpMa [EMAIL PROTECTED]  Don't Touch Me  
OrlanDo`` [EMAIL PROTECTED]  Don't Touch Me  
ionmaria [EMAIL PROTECTED]  Don't Touch Me  
Wow` [EMAIL PROTECTED]  Don't Touch Me  
heart [EMAIL PROTECTED]  Don't Touch Me  
nicknam`` [EMAIL PROTECTED]  Don't Touch Me  
_o_o_o [EMAIL PROTECTED]  Don't Touch Me  
apometre [EMAIL PROTECTED]  Don't Touch Me  
mutule [EMAIL PROTECTED]  Don't Touch Me  
sugaciu`` [EMAIL PROTECTED]  Don't Touch Me  
Rezerve [EMAIL PROTECTED]  Don't Touch Me  
Sugaci`` [EMAIL PROTECTED]  Don't Touch Me  
daasd`` [EMAIL PROTECTED]  Don't Touch Me  
Soule [EMAIL PROTECTED]  Don't Touch Me  
IP255 [EMAIL PROTECTED]  Don't Touch Me  
Ghidon [EMAIL PROTECTED]  Don't Touch Me  
Minea [EMAIL PROTECTED]  Don't Touch Me  
Milimetru [EMAIL PROTECTED]  Don't Touch Me  
centime [EMAIL PROTECTED]  Don't Touch Me  
wip` [EMAIL PROTECTED]  Don't Touch Me  
ijij [EMAIL PROTECTED]  Don't Touch Me  
_o_ [EMAIL PROTECTED]  Don't Touch Me  
afchd`` [EMAIL PROTECTED]  Don't Touch Me  
Aiureai [EMAIL PROTECTED]  Don't Touch Me  
Save- [EMAIL PROTECTED]  Don't Touch Me  
Sugativa` [EMAIL PROTECTED]  Don't Touch Me  
costi`` [EMAIL PROTECTED]  Don't Touch Me  
}-{` [EMAIL PROTECTED]  Don't Touch Me  
`o`o`o [EMAIL PROTECTED]  Don't Touch Me  
wacdsfc [EMAIL PROTECTED]  Don't Touch Me  
Cruella [EMAIL PROTECTED]  Don't Touch Me  
So`what [EMAIL PROTECTED]  Don't Touch Me  
`o`o [EMAIL PROTECTED]  Don't Touch Me  
Dragon-` [EMAIL PROTECTED]  Don't Touch Me  
mysql [EMAIL PROTECTED]  Don't Touch Me  
MaArunc [EMAIL PROTECTED]  Don't Touch Me  
InterGame [EMAIL PROTECTED]  Don't Touch Me  
Ampulea [EMAIL PROTECTED]  Don't Touch Me  
wadasd` [EMAIL PROTECTED]  Don't Touch Me  
Vrabie [EMAIL PROTECTED]  Don't Touch Me  
Ancas [EMAIL PROTECTED]  Don't Touch Me  
Hacker-ul [EMAIL PROTECTED]  Don't Touch Me  
Pilotu [EMAIL PROTECTED]  Don't Touch Me  
lamerul [EMAIL PROTECTED]  Don't Touch Me  
Muthi [EMAIL PROTECTED]  Don't Touch Me  
Pasarelu [EMAIL PROTECTED]  Don't Touch Me  
`o`o``o` [EMAIL PROTECTED]  Don't Touch Me  
Apometru [EMAIL PROTECTED]  Don't Touch Me  
Soare` [EMAIL PROTECTED]  Don't Touch Me  
qwewq [EMAIL PROTECTED]  Don't Touch Me  
Imagine [EMAIL PROTECTED]  Don't Touch Me  
SeeN [EMAIL PROTECTED]  Don't Touch Me  
Saliva [EMAIL PROTECTED]  Don't Touch Me  
}[} [EMAIL PROTECTED]  Don't Touch Me  
Polik [EMAIL PROTECTED]  Don't Touch Me  
Comes [EMAIL PROTECTED]  Read Only *  
Parts [EMAIL PROTECTED]  Read Only *  
Officials [EMAIL PROTECTED]  Read Only *  
BaNNeD [EMAIL PROTECTED]  Read Only *  
Regide [EMAIL PROTECTED]  Read Only *  
ImTheBoss [EMAIL PROTECTED]  Read Only *  
Makara [EMAIL PROTECTED]  Read Only *  
Distrus [EMAIL PROTECTED]  Read Only *  
Read [EMAIL PROTECTED]  Read 

Re: [OT] Good Anti-Spam Boilerplate

2004-10-08 Thread Charles Sprickman

On Fri, 8 Oct 2004, Charles Sprickman wrote:

> After some senseless Googling, I'm at a loss.  I'm looking for a very
> comprehensive, up-to-date example of an AUP that covers spam.  When I say
> "modern", I mean that I want it to include not just direct spamming, but
> abuse of remote open-relays, abuse of remote trojaned boxes, sending
> through a third party that circumvents the local AUP, etc.  Some good
> definition of "requested email" would be great - ie: double opt-in, or
> single opt-in with some documentation that the user requested the mail on
> a web form or similar.
>
> Some language that covers penalties would also be helpful, such as
> equipment seizure for non-payment of penalties.
>
> Please reply privately and I'll summarize.  I do not wish to get into any
> debates about what qualifies as spam on this list.

Replying to myself here...

Thanks to everyone.  I'd missed the spamhaus "spam definition" which will
be very helpful in wording a few things.  And the prize for "best TOS"
goes to Steve Sobol from "justthe.net".  This one is great:

http://justthe.net/legal/tos/

I especially like the pdf generator. :)

Now I'll have to see what the lawyer thinks.

Thanks again everyone,

Charles

> Thanks,
>
> Charles
>
> --
> Charles Sprickman
> [EMAIL PROTECTED]
>


Re: House Toughens Spyware Penalties

2004-10-08 Thread Petri Helenius
Scott Morris wrote:
Oh, how festive.  Anyone got that "Bill (Gates) Blocker" filter ready?  :)
Left to their own devices, congressmen should NOT be allowed to write bills
about things they don't understand.  Well...  Ok, that's too restrictive.
No bills would ever get written.  

We'll still see the same problems coming from the same non-US places where
it isn't exactly feasible to prosecute.  But it made someone someplace feel
better, I'm sure!
 

Sure, but as long as most spyware and spam is originated and operated by 
US citizens on US soil, it makes sense to make them responsible for 
their junk?

Pete


Re: FW: House Toughens Spyware Penalties

2004-10-08 Thread Henry Linneweh

"The bill also permits computer software providers to
interact with a user's computer without notice and
consent in order to determine whether the computer
user is authorized to use the software upon
initialization of the software or an update of the
software."

I find this aspect of the Bill objectionable, since it
contradicts other laws, which make it illegal to break
into a computer. There is also no guarantee that
the person doing the snooping is above criminal intent
and would create an operational nightmare for 
most prudent ISP/NSP organizations.

-Henry





--- Nicole <[EMAIL PROTECTED]> wrote:

> 
> 
>  It all reads ok until the latter part... shudder...
> 
>   Nicole
> 
> 
> -FW:
> <[EMAIL PROTECTED]>-
> 
> Date: Fri, 08 Oct 2004 16:00:53 -0400
> Sender: [EMAIL PROTECTED]
> From: cybercrime-alerts <[EMAIL PROTECTED]>
> To: [EMAIL PROTECTED]
> Subject: House Toughens Spyware Penalties
> 
> October 8, 2004 
> House Toughens Spyware Penalties 
> 
>
http://www.internetnews.com/bus-news/article.php/3419211
> 
> For the second time in three days, the U.S. House of
> Representatives has passed
> an anti-spyware bill, this time adding criminal
> penalties to tough civil
> provisions of legislation passed on Tuesday. 
> 
> The Internet Spyware Prevention Act of 2004 (H.R.
> 4661), which passed on a
> 415-0 vote Thursday, makes it a crime to
> intentionally access a computer
> without authorization or to intentionally exceed
> authorized access. If the
> unauthorized intrusion is to further another federal
> crime such as secretly
> accessing personal data, the penalty is up to five
> years in prison. 
> 
> Deliberately injuring or defrauding a person or
> damaging a computer through the
> unauthorized installation of spyware carry prison
> terms of up to two years. The
> legislation also authorizes $10 million for the
> Department of Justice to combat
> spyware and phishing (define) scams, although the
> bill does not specifically
> make phishing a crime. 
> 
> "By imposing criminal penalties on these bad actors,
> this legislation will help
> deter the use of spyware, and will thus help protect
> consumers from these
> aggressive attacks," Rep. Bob Goodlatte (R-VA), the
> bill's author, said in a
> statement. "At the same time, the legislation leaves
> the door open for
> innovative technology developments to continue to
> combat spyware programs." 
> 
> Tuesday night, the House passed legislation
> prohibiting unfair or deceptive
> practices related to spyware. The bill, known as the
> Spy Act (H.R. 2929), also
> requires an opt-in notice and consent form for legal
> software that collects
> personally identifiable information from consumers.
> The penalties in H.R. 2929
> are limited to civil fines of up to $3 million. 
> 
> Both bills now go the Senate, which has pending
> legislation similar to the
> House bills. House Energy and Commerce Committee
> Chairman Joe Barton (R-Texas)
> said earlier this week he thought the two chambers
> could agree on a spyware
> bill before lawmakers adjourn on Friday or Saturday.
> 
> 
> "[We've] seen several egregious examples of spyware
> being used in ways that
> most Americans would think clearly ought to be
> criminal," Ari Schwartz,
> associate director of the Center for Democracy and
> Technology, said in another
> statement. "The bill will help make sure there are
> strong deterrents to using
> spyware to defraud or injure consumers." 
> 
> The two House bills are supported by a broad array
> of trade groups, including
> the U.S. Chamber of Commerce and the Business
> Software Alliance (BSA). "This
> anti-spyware legislation ensures that criminal
> penalties are imposed upon those
> persons who aim to harm innocent Internet users via
> spyware applications," said
> Robert Holleyman, president and CEO of the BSA. 
> 
> Dell (Quote, Chart), eBay (Quote, Chart)>, Microsoft
> (Quote, Chart), Time
> Warner (Quote, Chart), Yahoo (Quote, Chart) and
> Earthlink (Quote, Chart)
> endorsed the Tuesday legislation. They did so after
> exemptions were added to
> the bill for network monitoring for security
> purposes, technical support or
> repair, or the detection or prevention of fraudulent
> activities. 
> 
> The bill also permits computer software providers to
> interact with a user's
> computer without notice and consent in order to
> determine whether the computer
> user is authorized to use the software upon
> initialization of the software or
> an update of the software. 
> 
> "Every day thousands of unsuspecting Americans have
> their identities hijacked
> by a new breed of cyber criminals because of
> spyware. People whose identities
> have been stolen can spend months or years -- and
> much of their hard-earned
> money -- trying to restore their good name and
> credit record. This legislation
> will help prevent bad things from happening to good
> names," Rep. Lamar Smith
> (R-Texas) said. 
> 
> 
> --
> Articles distributed for the purposes of educatio

RE: House Toughens Spyware Penalties

2004-10-08 Thread David Schwartz


The general consensus seems to be that companies that choose to obey the
law will simply disclose everything their software does in many, many
paragraphs of legal language that few people will actually read. This will
allow them to claim they have consent for whatever it is that they do.

On the bright side, it will at least be possible for those who are
sufficiently curious and diligent to determine what the software is doing by
picking through the legal language. I've heard that Gator's license is 20%
longer than the constitution.

DS




RE: House Toughens Spyware Penalties

2004-10-08 Thread Scott Morris

Oh, how festive.  Anyone got that "Bill (Gates) Blocker" filter ready?  :)

Left to their own devices, congressmen should NOT be allowed to write bills
about things they don't understand.  Well...  Ok, that's too restrictive.
No bills would ever get written.  

We'll still see the same problems coming from the same non-US places where
it isn't exactly feasible to prosecute.  But it made someone someplace feel
better, I'm sure!

Scott
 

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Nicole
Sent: Friday, October 08, 2004 4:33 PM
To: [EMAIL PROTECTED]
Subject: FW: House Toughens Spyware Penalties



 It all reads ok until the latter part... shudder...

  Nicole


-FW: <[EMAIL PROTECTED]>-

Date: Fri, 08 Oct 2004 16:00:53 -0400
Sender: [EMAIL PROTECTED]
From: cybercrime-alerts <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: House Toughens Spyware Penalties

October 8, 2004
House Toughens Spyware Penalties 

http://www.internetnews.com/bus-news/article.php/3419211

For the second time in three days, the U.S. House of Representatives has
passed an anti-spyware bill, this time adding criminal penalties to tough
civil provisions of legislation passed on Tuesday. 

The Internet Spyware Prevention Act of 2004 (H.R. 4661), which passed on a
415-0 vote Thursday, makes it a crime to intentionally access a computer
without authorization or to intentionally exceed authorized access. If the
unauthorized intrusion is to further another federal crime such as secretly
accessing personal data, the penalty is up to five years in prison. 

Deliberately injuring or defrauding a person or damaging a computer through
the unauthorized installation of spyware carry prison terms of up to two
years. The legislation also authorizes $10 million for the Department of
Justice to combat spyware and phishing (define) scams, although the bill
does not specifically make phishing a crime. 

"By imposing criminal penalties on these bad actors, this legislation will
help deter the use of spyware, and will thus help protect consumers from
these aggressive attacks," Rep. Bob Goodlatte (R-VA), the bill's author,
said in a statement. "At the same time, the legislation leaves the door open
for innovative technology developments to continue to combat spyware
programs." 

Tuesday night, the House passed legislation prohibiting unfair or deceptive
practices related to spyware. The bill, known as the Spy Act (H.R. 2929),
also requires an opt-in notice and consent form for legal software that
collects personally identifiable information from consumers. The penalties
in H.R. 2929 are limited to civil fines of up to $3 million. 

Both bills now go the Senate, which has pending legislation similar to the
House bills. House Energy and Commerce Committee Chairman Joe Barton
(R-Texas) said earlier this week he thought the two chambers could agree on
a spyware bill before lawmakers adjourn on Friday or Saturday. 

"[We've] seen several egregious examples of spyware being used in ways that
most Americans would think clearly ought to be criminal," Ari Schwartz,
associate director of the Center for Democracy and Technology, said in
another statement. "The bill will help make sure there are strong deterrents
to using spyware to defraud or injure consumers." 

The two House bills are supported by a broad array of trade groups,
including the U.S. Chamber of Commerce and the Business Software Alliance
(BSA). "This anti-spyware legislation ensures that criminal penalties are
imposed upon those persons who aim to harm innocent Internet users via
spyware applications," said Robert Holleyman, president and CEO of the BSA. 

Dell (Quote, Chart), eBay (Quote, Chart)>, Microsoft (Quote, Chart), Time
Warner (Quote, Chart), Yahoo (Quote, Chart) and Earthlink (Quote, Chart)
endorsed the Tuesday legislation. They did so after exemptions were added to
the bill for network monitoring for security purposes, technical support or
repair, or the detection or prevention of fraudulent activities. 

The bill also permits computer software providers to interact with a user's
computer without notice and consent in order to determine whether the
computer user is authorized to use the software upon initialization of the
software or an update of the software. 

"Every day thousands of unsuspecting Americans have their identities
hijacked by a new breed of cyber criminals because of spyware. People whose
identities have been stolen can spend months or years -- and much of their
hard-earned money -- trying to restore their good name and credit record.
This legislation will help prevent bad things from happening to good names,"
Rep. Lamar Smith
(R-Texas) said. 


--
Articles distributed for the purposes of education, discussion and review.

Archives and Subscription Updates: http://cybercrime.theMezz.com
Guestbook: http://guestbook.theMezz.com
PGP Key: http://pgp.theMezz.com

 
 

--End of forwarded message---

FW: House Toughens Spyware Penalties

2004-10-08 Thread Nicole


 It all reads ok until the latter part... shudder...

  Nicole


-FW: <[EMAIL PROTECTED]>-

Date: Fri, 08 Oct 2004 16:00:53 -0400
Sender: [EMAIL PROTECTED]
From: cybercrime-alerts <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: House Toughens Spyware Penalties

October 8, 2004 
House Toughens Spyware Penalties 

http://www.internetnews.com/bus-news/article.php/3419211

For the second time in three days, the U.S. House of Representatives has passed
an anti-spyware bill, this time adding criminal penalties to tough civil
provisions of legislation passed on Tuesday. 

The Internet Spyware Prevention Act of 2004 (H.R. 4661), which passed on a
415-0 vote Thursday, makes it a crime to intentionally access a computer
without authorization or to intentionally exceed authorized access. If the
unauthorized intrusion is to further another federal crime such as secretly
accessing personal data, the penalty is up to five years in prison. 

Deliberately injuring or defrauding a person or damaging a computer through the
unauthorized installation of spyware carry prison terms of up to two years. The
legislation also authorizes $10 million for the Department of Justice to combat
spyware and phishing (define) scams, although the bill does not specifically
make phishing a crime. 

"By imposing criminal penalties on these bad actors, this legislation will help
deter the use of spyware, and will thus help protect consumers from these
aggressive attacks," Rep. Bob Goodlatte (R-VA), the bill's author, said in a
statement. "At the same time, the legislation leaves the door open for
innovative technology developments to continue to combat spyware programs." 

Tuesday night, the House passed legislation prohibiting unfair or deceptive
practices related to spyware. The bill, known as the Spy Act (H.R. 2929), also
requires an opt-in notice and consent form for legal software that collects
personally identifiable information from consumers. The penalties in H.R. 2929
are limited to civil fines of up to $3 million. 

Both bills now go the Senate, which has pending legislation similar to the
House bills. House Energy and Commerce Committee Chairman Joe Barton (R-Texas)
said earlier this week he thought the two chambers could agree on a spyware
bill before lawmakers adjourn on Friday or Saturday. 

"[We've] seen several egregious examples of spyware being used in ways that
most Americans would think clearly ought to be criminal," Ari Schwartz,
associate director of the Center for Democracy and Technology, said in another
statement. "The bill will help make sure there are strong deterrents to using
spyware to defraud or injure consumers." 

The two House bills are supported by a broad array of trade groups, including
the U.S. Chamber of Commerce and the Business Software Alliance (BSA). "This
anti-spyware legislation ensures that criminal penalties are imposed upon those
persons who aim to harm innocent Internet users via spyware applications," said
Robert Holleyman, president and CEO of the BSA. 

Dell (Quote, Chart), eBay (Quote, Chart)>, Microsoft (Quote, Chart), Time
Warner (Quote, Chart), Yahoo (Quote, Chart) and Earthlink (Quote, Chart)
endorsed the Tuesday legislation. They did so after exemptions were added to
the bill for network monitoring for security purposes, technical support or
repair, or the detection or prevention of fraudulent activities. 

The bill also permits computer software providers to interact with a user's
computer without notice and consent in order to determine whether the computer
user is authorized to use the software upon initialization of the software or
an update of the software. 

"Every day thousands of unsuspecting Americans have their identities hijacked
by a new breed of cyber criminals because of spyware. People whose identities
have been stolen can spend months or years -- and much of their hard-earned
money -- trying to restore their good name and credit record. This legislation
will help prevent bad things from happening to good names," Rep. Lamar Smith
(R-Texas) said. 


--
Articles distributed for the purposes of education, discussion and review.

Archives and Subscription Updates: http://cybercrime.theMezz.com
Guestbook: http://guestbook.theMezz.com
PGP Key: http://pgp.theMezz.com


 

--End of forwarded message-


--
 |\ __ /|   (`\
 | o_o  |__  ) )   
//  \\ 
  -  [EMAIL PROTECTED]  -  Powered by FreeBSD  -
--
 "The term "daemons" is a Judeo-Christian pejorative.
 Such processes will now be known as "spiritual guides"
  - Politicaly Correct UNIX Page

 Opportunity is missed by most people because it is dressed in overalls and
looks like work.
   - Thomas Edison

 "Microsoft isn't evil, they just make really crappy operating systems."
   - Linus Torvalds

  If you want to go backwards, you put i

Re: Is there an email admin from RR.COM out there?

2004-10-08 Thread W. Mark Herrick, Jr.
Forwarded to admins at RR, since I'm not 100% sure who's on here from there.
-MH
At 01:26 PM 10/8/2004, Jeff Wheeler wrote:
Not sure how applicable to NANOG this is, but the below thread has started 
on another list that I am on, and I thought someone listening here from 
RR.COM might be able to help.  If you think you can assist or at least 
want to find out more about these issues, please contact me off list and 
I'll get you in touch with those effected.

--
Jeff Wheeler
Postmaster, Network Admin
US Institute of Peace
*snip*
W. Mark Herrick, Jr.
Director - Data and Network Security
Adelphia Communications
5619 DTC Parkway
Greenwood Village, CO 80111
(O) 303-268-6440
(C) 720-252-5929
(F) 303-268-6687 



[OT] Good Anti-Spam Boilerplate

2004-10-08 Thread Charles Sprickman

Howdy,

After some senseless Googling, I'm at a loss.  I'm looking for a very
comprehensive, up-to-date example of an AUP that covers spam.  When I say
"modern", I mean that I want it to include not just direct spamming, but
abuse of remote open-relays, abuse of remote trojaned boxes, sending
through a third party that circumvents the local AUP, etc.  Some good
definition of "requested email" would be great - ie: double opt-in, or
single opt-in with some documentation that the user requested the mail on
a web form or similar.

Some language that covers penalties would also be helpful, such as
equipment seizure for non-payment of penalties.

Please reply privately and I'll summarize.  I do not wish to get into any
debates about what qualifies as spam on this list.

Thanks,

Charles

--
Charles Sprickman
[EMAIL PROTECTED]



Is there an email admin from RR.COM out there?

2004-10-08 Thread Jeff Wheeler
Not sure how applicable to NANOG this is, but the below thread has 
started on another list that I am on, and I thought someone listening 
here from RR.COM might be able to help.  If you think you can assist or 
at least want to find out more about these issues, please contact me 
off list and I'll get you in touch with those effected.

--
Jeff Wheeler
Postmaster, Network Admin
US Institute of Peace

Begin forwarded message:
From: Mitchell Kahn
Date: October 8, 2004 3:06:22 PM EDT
To: "CommuniGate Pro Discussions"
Subject: Re: blocked for too many messages?
It sounds as if your difficulties are actually worse than mine. Thanks 
for letting me know that I am in good company.

Mitch
On Oct 8, 2004, at 11:44 AM, eLists wrote:
Hello,
I too have had my emails to any rr.com server rejected as well. I 
also checked my IP address at this senderbase page and funny how a 
ranking of 10 equates to all internet email, and with my server 
sending out about 2000 emails a day, I have a rating of 2.3?

Seems something is rather messed up with both senderbase and rr (not 
surprising that rr is messed up).

In the past few days, my server has only attempted to send about 20 
emails to rr.com servers. Yet all of mine are also blocked. Like you, 
my IP is not in any lists.

Mitchell Kahn wrote:
One of our clients received the following messaged when her e-mail 
was bounced:
Failed to deliver to '[EMAIL PROTECTED]'
SMTP module(domain hawaii.rr.com) reports:
 host orngca-01.mgw.rr.com says:
 452 Too many recipients received this hour.  Please see our rate 
limit
policy at http://security.rr.com/spam.htm#ratelimit
I went to the page listed to try to understand why her e-mail was 
rejected but this is incongruent with the facts as I understand 
them. I checked our logs and there was only one attempt in the last 
two days to send mail to this domain. My server does not appear on 
any of the spam lists that they show (see below), we have a static 
IP address on the server, and we don't have any open relays. This 
Road Runner process appears to render e-mail useless as a 
communication tool if this is the future of spam filtering. I 
contacted the ISP that bounced the mail but I have not had a 
response. (I wonder if my contact mail was bounced.)
Is anyone else familiar with this experience? Does anyone know of a 
way around it?
Thanks,
Mitch_
Mitchell Kahn



Anyone from Hotmail listening?

2004-10-08 Thread Drew Linsalata
If anyone responsible at Hotmail is listening, please email me off list. 
 We have an issue that needs some work, and the usual channels are 
getting us nowhere.

Thanks.
--
Drew Linsalata
The Gotham Bus Company, Inc.
Colocation and Dedicated Access Solutions
http://www.gothambus.com



Re: MED and community fluctuation

2004-10-08 Thread Daniel Roesen

On Fri, Oct 08, 2004 at 08:49:22PM +0200, Daniel Roesen wrote:
> On Fri, Oct 08, 2004 at 11:40:54AM -0700, Zhen Wu wrote:
> > We are thinking of the motivation of doing this?
> 
> Traffic enginneering.

I should have elaborated: to encourage the peer to perform cold-potato
routing towards you.


Best regards,
Daniel

-- 
CLUE-RIPE -- Jabber: [EMAIL PROTECTED] -- [EMAIL PROTECTED] -- PGP: 0xA85C8AA0


Re: short Botnet list and Cashing in on DoS

2004-10-08 Thread Gadi Evron

I didn't mean to put IRC in a bad light, just pointing out that as usual,
any good tool can be abused.
Those drone armies that lurk on actual real networks are a major problem 
for the networks themselves, but I doubt anyone can blame them for:

1. Worrying about personal privacy of their users, not wanting to bend 
too many rules to fight these drones that *appear* like regular users.

2. Piss enough kiddies and these drone armies will take down servers. 
Meaning the hosting company might not even want to keep hosting it 
afterwards.

There have been several examples of servers that were taken down along 
with the tri-state area, for a few hours. Major losses.

	Gadi.


Re: short Botnet list and Cashing in on DoS

2004-10-08 Thread Matthew S. Hallacy

On Fri, Oct 08, 2004 at 02:40:06PM -0400, Drew Weaver wrote:
> 
> The sad thing is that IRC has actual positive uses for sharing
> information; look at the various help channels (especially on a net like
> freenode) for everything from Linux to math to all different types of
> programming languages. That's what a lot of people don't understand when
> they examine the problem of IRC and botnets, is that YES it has huge
> issues but it has legitimate (albeit very under-proportionate to the
> number of non-legitimate) uses and users.
> 
> -Drew

I didn't mean to put IRC in a bad light, just pointing out that as usual,
any good tool can be abused.

-- 
Matthew S. HallacyFUBAR, LART, BOFH Certified
http://www.poptix.net   GPG public key 0x01938203


Re: MED and community fluctuation

2004-10-08 Thread Daniel Roesen

On Fri, Oct 08, 2004 at 11:40:54AM -0700, Zhen Wu wrote:
> We are thinking of the motivation of doing this?

Traffic enginneering.

> Why the ISPs configured their network so that the MED values
> oscillate?

Is there actually persistant oscillation, or just "frequent change"
with some peers at some periods of time?

> Did ISPs configure MED values dynamically calculated from IGP metrics?

This may very well the reason. At least Cisco and Juniper offer the
option to derive MED from IGP metric.

> The most strange thing to us is why the community attribute associated 
> with prefixes also oscillate frequently. [...]
> Misconfigurations?

Possibly. Routes received via different ingress points being tagged
differently (e.g. country/city based scheme) and due to backbone
topology changes, a different "version" of the route becoming "best"
and thus announced to the looking glass. Or routes received via
multiple ingress points and some missing the ingress tagging due
to misconfigured route-map/policies. Same outcome.


Best regards,
Daniel

-- 
CLUE-RIPE -- Jabber: [EMAIL PROTECTED] -- [EMAIL PROTECTED] -- PGP: 0xA85C8AA0


MED and community fluctuation

2004-10-08 Thread Zhen Wu

I understand the usage and application of MED and community attributes. 
But we watch some interesting policy/attribute fluctuation of MED and 
community.

We analyze BGP updates sent out by RouteViews peers. We observed a lot 
of AADupType2 instabilities. We define AADupType2 event as: A route is 
implicitly withdrawn and replaced
with a duplicate of the original route. The two messages have the same 
NEXTHOP and ASPATH attribute, but differ between at least one other 
attribute (like MED). Note that we only pair two updates from the same 
RouteViews' peer / neighboring AS.

A fine-grained analysis revealed that most AADupType2 instabilities 
just change the MED or community attribute (or both), which means that 
MED and community values associated with prefixes are changing 
dynamically and frequently. We are not claiming it is a common practice 
of the Internet, this is just the cases observed from RouteViews peers.

We are thinking of the motivation of doing this? Why the ISPs 
configured their network so that the MED values oscillate? Did ISPs 
configure MED values dynamically calculated from IGP metrics?

The most strange thing to us is why the community attribute associated 
with prefixes also oscillate frequently. We know that community are 
used to simply operational complexity: group a set of prefixes to apply 
the same policy. It didn't make sense to me to change it dynamically. 
Misconfigurations?

Any comments or discussions? Thanks!
Zhen Wu


RE: short Botnet list and Cashing in on DoS

2004-10-08 Thread Drew Weaver


b) IRC is a haven for these people, unfortunately networks like Undernet
take it a step further by providing channel services and host hiding so
that not only the people behind the DDoS are hidden, but so are the bots
themselves. The people running the network fear retaliation too much to
do anything about it.

===

The sad thing is that IRC has actual positive uses for sharing
information; look at the various help channels (especially on a net like
freenode) for everything from Linux to math to all different types of
programming languages. That's what a lot of people don't understand when
they examine the problem of IRC and botnets, is that YES it has huge
issues but it has legitimate (albeit very under-proportionate to the
number of non-legitimate) uses and users.

-Drew


Weekly Routing Table Report

2004-10-08 Thread Routing Table Analysis

This is an automated weekly mailing describing the state of the Internet
Routing Table as seen from APNIC's router in Japan.
Daily listings are sent to [EMAIL PROTECTED]

If you have any comments please contact Philip Smith <[EMAIL PROTECTED]>.

Routing Table Report   04:00 +10GMT Sat 09 Oct, 2004

Analysis Summary


BGP routing table entries examined:  149020
Prefixes after maximum aggregation:   87919
Unique aggregates announced to Internet:  71042
Total ASes present in the Internet Routing Table: 18195
Origin-only ASes present in the Internet Routing Table:   15790
Origin ASes announcing only one prefix:7393
Transit ASes present in the Internet Routing Table:2405
Transit-only ASes present in the Internet Routing Table: 79
Average AS path length visible in the Internet Routing Table:   4.7
Max AS path length visible:  26
Prefixes from unregistered ASNs in the Routing Table:58
Special use prefixes present in the Routing Table:0
Prefixes being announced from unallocated address space: 16
Number of addresses announced to Internet:   1344430884
Equivalent to 80 /8s, 34 /16s and 99 /24s
Percentage of available address space announced:   36.3
Percentage of allocated address space announced:   58.6
Percentage of available address space allocated:   61.9
Total number of prefixes smaller than registry allocations:   68695

APNIC Region Analysis Summary
-

Prefixes being announced by APNIC Region ASes:28600
Total APNIC prefixes after maximum aggregation:   14296
Prefixes being announced from the APNIC address blocks:   26765
Unique aggregates announced from the APNIC address blocks:14304
APNIC Region origin ASes present in the Internet Routing Table:2146
APNIC Region origin ASes announcing only one prefix:641
APNIC Region transit ASes present in the Internet Routing Table:329
Average APNIC Region AS path length visible:4.8
Max APNIC Region AS path length visible: 22
Number of APNIC addresses announced to Internet:  164575616
Equivalent to 9 /8s, 207 /16s and 57 /24s
Percentage of available APNIC address space announced: 75.1

APNIC AS Blocks4608-4864, 7467-7722, 9216-10239, 17408-18431
   23552-24575
APNIC Address Blocks   58/7, 60/7, 202/7, 210/7, 218/7, 220/7 and 222/8

ARIN Region Analysis Summary


Prefixes being announced by ARIN Region ASes: 85051
Total ARIN prefixes after maximum aggregation:51403
Prefixes being announced from the ARIN address blocks:65114
Unique aggregates announced from the ARIN address blocks: 22973
ARIN Region origin ASes present in the Internet Routing Table: 9604
ARIN Region origin ASes announcing only one prefix:3450
ARIN Region transit ASes present in the Internet Routing Table: 931
Average ARIN Region AS path length visible: 4.4
Max ARIN Region AS path length visible:  18
Number of ARIN addresses announced to Internet:   233997056
Equivalent to 13 /8s, 242 /16s and 131 /24s
Percentage of available ARIN address space announced:  69.7

ARIN AS Blocks 1-1876, 1902-2042, 2044-2046, 2048-2106
   2138-2584, 2615-2772, 2823-2829, 2880-3153
   3354-4607, 4865-5119, 5632-6655, 6912-7466
   7723-8191, 10240-12287, 13312-15359, 16384-17407
   18432-20479, 21504-23551, 25600-26591,
   26624-27647,29695-30719, 31744-33791
ARIN Address Blocks24/8, 63/8, 64/6, 68/7, 70/7, 72/8, 198/7, 204/6,
   208/7 and 216/8

RIPE Region Analysis Summary


Prefixes being announced by RIPE Region ASes: 27632
Total RIPE prefixes after maximum aggregation:19190
Prefixes being announced from the RIPE address blocks:24481
Unique aggregates announced from the RIPE address blocks: 16076
RIPE Region origin ASes present in the Internet Routing Table: 5882
RIPE Region origin ASes announcing only one prefix:3169
RIPE Region transit ASes present in the Internet Routing Table:1018
Average RIPE Region AS path length visible: 5.3
Max RIPE Region AS path length visible:  26
Number of RIPE addresses announced to Internet:   173276096
Equivalent to 10 /8s, 83 /16s and 251 /24s
Percentage 

Re: short Botnet list and Cashing in on DoS

2004-10-08 Thread Matthew S. Hallacy

On Thu, Oct 07, 2004 at 04:24:42PM -0400, Mike Tancsa wrote:
> 
> Have you sent email to those edu abuse contacts ?  Most of the universities 
> I have worked with for abuse resolution are generally responsive.

Unfortunately the 'generally responsive' is the best you can hope for. 

Recently while investigating a customer system that had been rooted (poorly
chosen root password) I tracked the psybnc and energymech bots down to a 
channel on Undernet's IRC network (#The-Hackers), after wiping out about 
half their bots (with informaiton gleaned from the exploited system) they 
got upset and decided to attack the host I was IRC'ing from.

One provider (Qwest) resolved the issue after 6 hours of ~100mbit coming
from a colo customer (big name game company, SLA complicated things)

One provider (NetNation.com) said they were aware that the system had been
exploited, and was attacking other systems, but that they had not gotten
around to doing anything about it. A phone call to the customer paying for
the ~50-60mbit/s it was spewing got that resolved very quickly.

The third system went offline completely about 5 minutes after it started
attacking, I like to believe that it set off an alarm somewhere and someone
investigated.


Notable points here:

a) Some providers are happy to allow their customers systems to push DDoS
traffic, it increases their revenue

b) IRC is a haven for these people, unfortunately networks like Undernet
take it a step further by providing channel services and host hiding so
that not only the people behind the DDoS are hidden, but so are the bots
themselves. The people running the network fear retaliation too much to
do anything about it.

c) Everyone I've run across while hunting botnets has been from Thailand,
Korea, India, or somewhere nearby. #The-Hackers has their own website
complete with valid phone numbers: www.the-hackers.org

d) There is no easy solution.

-- 
Matthew S. HallacyFUBAR, LART, BOFH Certified
http://www.poptix.net   GPG public key 0x01938203


Re: routing sniffed traffic

2004-10-08 Thread Stephen J. Wilcox



On Fri, 8 Oct 2004, Nils Ketelsen wrote:

> 
> On Thu, Oct 07, 2004 at 09:43:47PM +0100, Stephen J. Wilcox wrote:
> 
> [switching/routing traffic from a passive tap]
> 
> > Hi Peter,
> >  if you are feeding this into a switch you should be able to switch it
> > just like the real traffic.. ie plug your fibers into gbics on
> > whatever switch you want to use, i dont see any special requirements for
> > this application
> 
> I have no practical experience on that, I always used the monitor directly
> on the Tap, but I see a theoretical problem: Where does the switch switch
> it to? The Target MAC of the packet coming from the Tap will
> be still pointing to the device in the production network. 

statically configure your  mac to spoof that of the real interface.

> If you want to route it you will run into the same problem: The copied
> ethernet frame is not addresses to the router in the monitoring network,
> so it will not accept the Ethernet frame.

again just duplicate the ip address

> Maybe you could do something with faking the MAC on the router
> in the monitoring network to be the same as the MACaddress of the target
> in the production network, but it feels like a dirty hack. 
> 
> Or am I missnig something obvious here?

ok so you have the same thoughts.. the key point is the original question 
suggested this 'copycat' network is not connected to the real net, and so long 
as you dont allow the packets to be routed back into the real net (and hence 
create dups) you should be fine.

Steve

> 
> Nils
> 



Re: routing sniffed traffic

2004-10-08 Thread Nils Ketelsen

On Thu, Oct 07, 2004 at 09:43:47PM +0100, Stephen J. Wilcox wrote:

[switching/routing traffic from a passive tap]

> Hi Peter,
>  if you are feeding this into a switch you should be able to switch it
> just like the real traffic.. ie plug your fibers into gbics on
> whatever switch you want to use, i dont see any special requirements for
> this application

I have no practical experience on that, I always used the monitor directly
on the Tap, but I see a theoretical problem: Where does the switch switch
it to? The Target MAC of the packet coming from the Tap will
be still pointing to the device in the production network. 

The switch in the management network will not know where to switch it to,
as there is no device with the same mac in his ARP table.

If you want to route it you will run into the same problem: The copied
ethernet frame is not addresses to the router in the monitoring network,
so it will not accept the Ethernet frame.

Maybe you could do something with faking the MAC on the router
in the monitoring network to be the same as the MACaddress of the target
in the production network, but it feels like a dirty hack. 

Or am I missnig something obvious here?

Nils


The Cidr Report

2004-10-08 Thread cidr-report

This report has been generated at Fri Oct  8 21:44:22 2004 AEST.
The report analyses the BGP Routing Table of an AS4637 (Reach) router
and generates a report on aggregation potential within the table.

Check http://www.cidr-report.org/as4637 for a current version of this report.

Recent Table History
Date  PrefixesCIDR Agg
01-10-04145932  100119
02-10-04146075   99905
03-10-04145755  100267
04-10-04146184  100294
05-10-04146297  100252
06-10-04146316  100325
07-10-04146253  100429
08-10-04146340  100450


AS Summary
 18121  Number of ASes in routing system
  7375  Number of ASes announcing only one prefix
  1392  Largest number of prefixes announced by an AS
AS7018 : ATTW AT&T WorldNet Services
  86706432  Largest address span announced by an AS (/32s)
AS721  : DNIC DoD Network Information Center


Aggregation Summary
The algorithm used in this report proposes aggregation only
when there is a precise match using the AS path, so as 
to preserve traffic transit policies. Aggregation is also
proposed across non-advertised address space ('holes').

 --- 08Oct04 ---
ASnumNetsNow NetsAggr  NetGain   % Gain   Description

Table 146447   1004494599831.4%   All ASes

AS18566  7437  73699.1%   CVAD Covad Communications
AS4134   814  178  63678.1%   CHINANET-BACKBONE
   No.31,Jin-rong Street
AS4323   789  220  56972.1%   TWTC Time Warner Telecom
AS7018  1392  967  42530.5%   ATTW AT&T WorldNet Services
AS6197   789  382  40751.6%   BNS-14 BellSouth Network
   Solutions, Inc
AS22773  403   21  38294.8%   CXA Cox Communications Inc.
AS27364  411   37  37491.0%   ARMC Armstrong Cable Services
AS6467   390   30  36092.3%   ACSI e.spire Communications,
   Inc.
AS701   1252  907  34527.6%   UU UUNET Technologies, Inc.
AS22909  383   38  34590.1%   CMCS Comcast Cable
   Communications, Inc.
AS1239   953  639  31432.9%   SPRN Sprint
AS17676  368   61  30783.4%   JPNIC-JP-ASN-BLOCK Japan
   Network Information Center
AS9929   334   33  30190.1%   CNCNET-CN China Netcom Corp.
AS6478   379   79  30079.2%   ATTW AT&T WorldNet Services
AS4355   381   99  28274.0%   ERSD EARTHLINK, INC
AS21502  2693  26698.9%   ASN-NUMERICABLE NUMERICABLE is
   a cabled network in France,
AS4766   529  266  26349.7%   KIXS-AS-KR Korea Telecom
AS14654  2606  25497.7%   WAYPOR-3 Wayport
AS9443   357  108  24969.7%   INTERNETPRIMUS-AS-AP Primus
   Telecommunications
AS6140   370  134  23663.8%   IMPSA ImpSat
AS15557  334  104  23068.9%   LDCOMNET LDCOM NETWORKS
AS2386   841  612  22927.2%   ADCS-1 AT&T Data
   Communications Services
AS1221   815  587  22828.0%   ASN-TELSTRA Telstra Pty Ltd
AS25844  244   16  22893.4%   SASMFL-2 Skadden, Arps, Slate,
   Meagher & Flom LLP
AS9583   529  306  22342.2%   SIFY-AS-IN Sify Limited
AS7843   488  266  22245.5%   ADELPH-13 Adelphia Corp.
AS6198   432  214  21850.5%   BNS-14 BellSouth Network
   Solutions, Inc
AS13083  2178  20996.3%   Mannesmann Datenverarbeitung
   Autonomes System
AS721718  513  20528.6%   DNIC DoD Network Information
   Center
AS3356   647  445  20231.2%   LEVEL3 Level 3 Communications

Total  16831 7286 954556.7%   Top 30 total


Possible Bogus Routes

24.138.80.0/20   AS11260 AHSICHCL Andara High Speed Internet c/o Halifax 
Cable Ltd.
24.246.0.0/17AS7018  ATTW AT&T WorldNet Services
24.246.38.0/24   AS25994 NPGCAB NPG Cable, INC
24.246.128.0/18  AS7018  ATTW AT&T WorldNet Services
64.46.4.0/22 AS11711 TULARO TULAROSA COMMUNICATIONS
64.46.27.0/24AS8674  NETNOD-IX Netnod Internet Exchange Sverige AB
64.46.34.0/24AS3408  
64.46.63.0/24AS7850  IHIGHW iHighway.net, Inc.
64.83.96.0/19AS26956 NETFR NetFree Communications