Neutral Colo - Las Vegas, NV

2004-12-06 Thread Charlie Khanna - NextWeb
Title: Neutral Colo - Las Vegas, NV






Hi,

Can anyone tell me if there are any carrier neutral data centers in Las Vegas, NV?  Thanks.


-Charlie 




Re: Unflattering comments about ISPs and DDOS

2004-12-06 Thread Joshua Brady

Or why don't they just create the $0 flash video or html step by step
instructions? Why doesn't the dummy series create "Comcast for
dummies", as they have for AOL users.


On Mon, 6 Dec 2004 21:45:30 -0500, D. Campbell MacInnes
<[EMAIL PROTECTED]> wrote:
> 
> 
> 
> 
> >
> > > "reconfigure their mail programs to point at Comcast's servers, and
> > > each phone call to the help desk costs $9."
> >
> >
> > And they couldn't spend say:
> >
> > $1.00 per CD with a vb script or instructions on doing this
> >
> > $100.00 (far fetched price) to have an interactive
> > step-by-step flash video created to show their customers
> >
> > $1000.00 (far fetched price) to set up some VXML based number
> > with a "Press 1 to RTFM... Press 2 to RTFM again"
> >
> > Even at an uber high charge (800/866 toll) of say $4.00 per
> > call, they could still implement the changes save tons of
> > money, and tons of aspirin when their headaches go away.
> > Maybe someone here can draft up a $10,000,000.00 pitch it to
> > them become an instant millionaire and save Comcast some
> > money at the same time.
> >
> >
> 
> Speaking as someone who has run a (admittedly small) help/support desk,
> I can say in no uncertain terms that you would be astounded at the
> number of customers who will ignore every single one of these solutions
> and fight their way through to a live person simply because "that
> couldn't possibly have anything to do with MY problem".
> 
> Not saying Comcast is right to not do it (though I'm also not saying
> they SHOULD do it), but I am saying that their figures, while likely
> somewhat inflated, probably aren't nearly as inflated as some might
> think they are.
> 
> ++
> D. Campbell MacInnes
> 
> 


-- 
Joshua Brady


Re: Unflattering comments about ISPs and DDOS

2004-12-06 Thread J.D. Falk

On 12/06/04, "Blake L. Smith - XtremeBandwidth.com, Inc." <[EMAIL PROTECTED]> 
wrote: 

> Since Comcast allows spamming (doesn't do anything to stop it) people
> should start spamming the phones at the help desk and let them know
> about the spam on their network. Although - two wrongs don't make a
> right.

Also, that's been tried before (first instance I can remember
being AGIS, circa 1996-1997), and has never had any appreciable 
direct effect.  Other tactics still work better.

-- 
J.D. Falk   okay, what's next?
<[EMAIL PROTECTED]>


RE: Unflattering comments about ISPs and DDOS

2004-12-06 Thread D. Campbell MacInnes


> 
> > "reconfigure their mail programs to point at Comcast's servers, and 
> > each phone call to the help desk costs $9."
> 
> 
> And they couldn't spend say:
> 
> $1.00 per CD with a vb script or instructions on doing this
> 
> $100.00 (far fetched price) to have an interactive 
> step-by-step flash video created to show their customers
> 
> $1000.00 (far fetched price) to set up some VXML based number 
> with a "Press 1 to RTFM... Press 2 to RTFM again"
> 
> Even at an uber high charge (800/866 toll) of say $4.00 per 
> call, they could still implement the changes save tons of 
> money, and tons of aspirin when their headaches go away. 
> Maybe someone here can draft up a $10,000,000.00 pitch it to 
> them become an instant millionaire and save Comcast some 
> money at the same time.
> 
> 

Speaking as someone who has run a (admittedly small) help/support desk,
I can say in no uncertain terms that you would be astounded at the
number of customers who will ignore every single one of these solutions
and fight their way through to a live person simply because "that
couldn't possibly have anything to do with MY problem".

Not saying Comcast is right to not do it (though I'm also not saying
they SHOULD do it), but I am saying that their figures, while likely
somewhat inflated, probably aren't nearly as inflated as some might
think they are.


++
D. Campbell MacInnes



RE: Unflattering comments about ISPs and DDOS

2004-12-06 Thread J. Oquendo


> "reconfigure their mail programs to point at Comcast's
> servers, and each phone call to the help desk costs $9."


And they couldn't spend say:

$1.00 per CD with a vb script or instructions on doing this

$100.00 (far fetched price) to have an interactive step-by-step flash
video created to show their customers

$1000.00 (far fetched price) to set up some VXML based number with a
"Press 1 to RTFM... Press 2 to RTFM again"

Even at an uber high charge (800/866 toll) of say $4.00 per call, they
could still implement the changes save tons of money, and tons of aspirin
when their headaches go away. Maybe someone here can draft up a
$10,000,000.00 pitch it to them become an instant millionaire and save
Comcast some money at the same time.


=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
GPG Key ID 0x51F9D78D
Fingerprint 2A48 BA18 1851 4C99

CA22 0619 DB63 F2F7 51F9 D78D
http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x51F9D78D

sil @ politrix . orghttp://www.politrix.org
sil @ infiltrated . net http://www.infiltrated.net

"How can we account for our present situation unless we
believe that men high in this government are concerting
to deliver us to disaster?" Joseph McCarthy "America's
Retreat from Victory"


RE: Unflattering comments about ISPs and DDOS

2004-12-06 Thread Blake L. Smith - XtremeBandwidth.com, Inc.

Since Comcast allows spamming (doesn't do anything to stop it) people
should start spamming the phones at the help desk and let them know
about the spam on their network. Although - two wrongs don't make a
right.

 

 

Best Wishes,

Blake L. Smith
XtremeBandwidth.com, Inc.
949-330-6400 Office
949-606-7100 Fax
www.XtremeBandwidth.com


-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Rich Kulawiec
Sent: Monday, December 06, 2004 4:19 PM
To: [EMAIL PROTECTED]
Subject: Re: Unflattering comments about ISPs and DDOS


On Mon, Dec 06, 2004 at 04:56:49PM +, [EMAIL PROTECTED]
wrote:
> And if enough people clean up the bots on their network,
> then a case can be made for depeering (or severely damping)
> networks that don't clean up their act.

Agreed.

But few, if any, will "clean up their act".  For instance, consider:

http://news.com.com/2102-1034_3-5218178.html

which is a news story discussing the enormous number of spam-spewing
zombies
on Comcast's network and which says (in part):

"Based on my conversations last week, Comcast's network
engineers
would like to be more aggressive. But the marketing department
shot down a ban on port 25 because of its circa $58 million
price
tag--so high partially because some subscribers would have to be
told how to reconfigure their mail programs to point at
Comcast's
servers, and each phone call to the help desk costs $9."

Since Comcast has elected not to pay that hypothetical $58 million
dollar price tag, see if you can guess who is.  Those costs (whatever
they are) don't just evaporate into nothingness merely because Comcast
isn't picking up the tab.


Please note that since then, they've begun doing *some* port-25
blocking:

http://news.com.com/2102-1038_3-5230615.html

But I can't find any evidence that they're doing anything other
than reactively blocking port 25 connections based on some usage
threshold.  And of course that's purely symptomatic treatment for the
problem-of-the-moment: it doesn't cure the disease, doesn't un-zombie
the zombies and thus it lets them do anything/everything else they want.

---Rsk



Re: Unflattering comments about ISPs and DDOS

2004-12-06 Thread Paul Vixie

> > "Based on my conversations last week, Comcast's network engineers
> > would like to be more aggressive. But the marketing department
> > shot down a ban on port 25 because of its circa $58 million price ...
> 
> Thats quite ok, if theyre unwilling to filter port 25 on their end, we 
> are more than happy to filter port 25 on our end. Many have already done 
> this.

right, me too, but a surprising number of my friends strangely believe that
their ~1Mbit/sec home dsl connection (which 100millions of less-clued people
have) should be able to originate e-mail the same way their ~1Mbit/sec work
DS-1 line (which only a few million had, and most of those cluefully) did.

therefore, while i reject e-mail from dsl on a wholesale basis, i have to
whitelist certain friends on a retail basis -- which is madness without end.
far better for the cable and dsl providers to kill off outbound smtp by
default and then re-enable it when a customer waves the right clue-flag.

[off-topic: lots of you/us have proposed global whitelists to solve this kind
of thing, but nobody has yet figured out how a scalable community can have a
single definition of "that which is good"... so don't start that thread again
just because it seems desireable (which it is) and technically easy (also).]
-- 
Paul Vixie


Re: LG close to MCI Japan anyone?

2004-12-06 Thread Janet Sullivan
Suresh Ramasubramanian wrote:
I'm currently searching for a looking glass close to AS703 in Japan.
Unfortunately, JPIX doesn't offer one (would have been to easy anyway).
http://lg01.colo01.bbtower.ad.jp/
http://bgp4.jp/
http://neptune.dti.ad.jp/ixp2-lg.html
(The Looking Glass Wiki at bgp4.net can be handy sometimes.)


Re: Bangladesh gets itself an IXP

2004-12-06 Thread Suresh Ramasubramanian
Majid Farid wrote:
Also http://www.pie.net.pk/ for Pakistan.
You sure it is an open peering point rather than a government mandated 
interconnection for (say) filtering or monitoring purposes, or to make 
the job of the incumbent telco there easier?

Just asking if anybody knows, as the exchange website doesnt seem to 
have any details beyond a looking glass and a password protected smoke 
ping page.

--
suresh ramasubramanian [EMAIL PROTECTED] gpg # EDEDEFB9
manager, security & antispam operations, outblaze limited


Re: Unflattering comments about ISPs and DDOS

2004-12-06 Thread Dan Hollis

On Mon, 6 Dec 2004, Rich Kulawiec wrote:
>   "Based on my conversations last week, Comcast's network engineers
>   would like to be more aggressive. But the marketing department
>   shot down a ban on port 25 because of its circa $58 million price
>   tag--so high partially because some subscribers would have to be
>   told how to reconfigure their mail programs to point at Comcast's
>   servers, and each phone call to the help desk costs $9."

Thats quite ok, if theyre unwilling to filter port 25 on their end, we 
are more than happy to filter port 25 on our end. Many have already done 
this.

-Dan



Re: Unflattering comments about ISPs and DDOS

2004-12-06 Thread Rich Kulawiec

On Mon, Dec 06, 2004 at 04:56:49PM +, [EMAIL PROTECTED] wrote:
> And if enough people clean up the bots on their network,
> then a case can be made for depeering (or severely damping)
> networks that don't clean up their act.

Agreed.

But few, if any, will "clean up their act".  For instance, consider:

http://news.com.com/2102-1034_3-5218178.html

which is a news story discussing the enormous number of spam-spewing zombies
on Comcast's network and which says (in part):

"Based on my conversations last week, Comcast's network engineers
would like to be more aggressive. But the marketing department
shot down a ban on port 25 because of its circa $58 million price
tag--so high partially because some subscribers would have to be
told how to reconfigure their mail programs to point at Comcast's
servers, and each phone call to the help desk costs $9."

Since Comcast has elected not to pay that hypothetical $58 million
dollar price tag, see if you can guess who is.  Those costs (whatever
they are) don't just evaporate into nothingness merely because Comcast
isn't picking up the tab.


Please note that since then, they've begun doing *some* port-25 blocking:

http://news.com.com/2102-1038_3-5230615.html

But I can't find any evidence that they're doing anything other
than reactively blocking port 25 connections based on some usage
threshold.  And of course that's purely symptomatic treatment for the
problem-of-the-moment: it doesn't cure the disease, doesn't un-zombie
the zombies and thus it lets them do anything/everything else they want.

---Rsk


Re: Sprint security contact

2004-12-06 Thread Rick Ernst


I had a couple of requests outside the list to pass on any information I
found.

The puck.nether.net phone number is correct.  To get to the NOC it is
option #3.  Option #2 is for trouble/ticketing.

There's additional information given between each option, so it takes a
while to hear that one.



On Mon, 6 Dec 2004, Erond wrote:

:>
:>
:>One of our customers is currently undergoing a ~30Mbs DDoS to a single IP.
:>We've BGP blackholed them within our network, but they are still beating up
:>on our upstream links.
:>
:>UUNET has blocked them internally, but I'm getting bounced around within
:>Sprint to have their NOC/security group work on it.  I started with our
:>contact information and also the puck.nether.net info.
:>
:>If there is a Sprint security person on list, please contact me. If
:>somebody has a direct Sprint NOC/Security contact, please pass it along.
:>
:>Thanks,
:>Rick
:>
:>



RE: Bangladesh gets itself an IXP

2004-12-06 Thread Majid Farid

Also http://www.pie.net.pk/ for Pakistan.

--
Majid.


-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Suresh Ramasubramanian
Sent: Monday, December 06, 2004 8:56 AM
To: [EMAIL PROTECTED]
Subject: Bangladesh gets itself an IXP


http://www.bdix.net looks quite good to me.

Open peering, with over 10 local ISPs peering there.

What a change from the joke that is NIXI (www.nixi.org) in India ..

srs (depressed)




Sprint security contact

2004-12-06 Thread Erond


One of our customers is currently undergoing a ~30Mbs DDoS to a single IP.
We've BGP blackholed them within our network, but they are still beating up
on our upstream links.

UUNET has blocked them internally, but I'm getting bounced around within
Sprint to have their NOC/security group work on it.  I started with our
contact information and also the puck.nether.net info.

If there is a Sprint security person on list, please contact me. If
somebody has a direct Sprint NOC/Security contact, please pass it along.

Thanks,
Rick




RE: Blocking worms/ddos for customer for free?

2004-12-06 Thread Chad Skidmore

 
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

> -Original Message-
> From: Kim Onnel [mailto:[EMAIL PROTECTED] 
> Posted At: Monday, December 06, 2004 11:46 AM
> Posted To: NANOG
> Conversation: Blocking worms/ddos for customer for free?
> Subject: Blocking worms/ddos for customer for free?
> 
> 
> 
> Hello,
> 
> Currently, on our ingress, we block spoofed packets, common 
> worms/trojans ports.
> 
> We do that for all of our customers(residential DSL, Dial-up, 
> Corporate DSL, and the data center hosted websites/servers),
> however,  
> 
> For me there are 2 ways to look at it,
> if i leave these worms to come in, they would consume our 
> bandwidth and CPU, and on the other hand, it looks like we're 
> giving a free service, which in a way uses up our resources,
> 
> Its the same for DDoS, if i stop it for a customer, i'm 
> giving him a free a service, if i dont, its gonna wreck my network.
> 
> Personally, i block the illegitimate packets out of my 
> network(egress) but thats because i owe this to the internet 
> community, even if i am not getting paid for it.
> 
> I would like to know other providers policy about this?
> 

Blocking spoofed packets (inbound and outbound) is certainly a good
thing and, in my opinion should be done by providers across the
board.

Blocking worms/trojan/whatever ports starts to get a little more
difficult.  Mainly due to the fact that they often times use ports
and protocols that are valid and blocking them breaks things that are
required.  At the risk of starting the whole "Microsoft stuff should
be banned from the Internet rant" I'll use the example of ports
135-139.  Some people block those ports and don't get too much grief
from their customer base.  Others that try to block them find that at
least some portion of the customer base complains because they have
something that relies on those ports to work.  This leads many to
choose the path of least resistance and not filter.

The other challenge with filtering is that it can consume resources,
in some cases more quickly than not filtering at all.  If traffic
levels are high enough filtering can melt down your router more
quickly than not filtering.  This obviously depends on a number of
things and we are seeing vendors produce routers that can filter at
line rate without impacting performance or just plain falling over. 
Those routers can be very expensive however and if someone isn't
paying for that additional service it can be hard to justify
upgrading to a new line card that runs an easy six figures just to
become your customer's free firewall.

Those two things said, we don't believe that we are our customer's
firewall unless specifically contracted to perform that task.  That
insures that we are compensated for the resources consumed and that
we all agree on what is or is not valid traffic.  All to often we
have found that valid traffic for one person is not valid traffic for
another so "firewall rules" will vary from one customer to the next.

DDOS inbound to your customer may or may not wreck your network and
what looks like a DDOS attack can be valid traffic for some
customers.  I know that we handle it on a case-by-case basis with
good customer communication before we take action, assuming it isn't
wrecking the rest of our network. If it is wrecking our network then
we subscribe to the "Sacrifice the one to save the many" philosophy
and will stop the attack.

DDOS outbound from your network is again something that you need to
double check to insure that it really is a DDOS attack.  In our case
if we see something that we strongly believe to be an outbound attack
or can verify as an outbound attack then we'll take action. Anomolous
traffic gets investigated to see if it is an attack or if it is
valid. That, to us, is just part of being a good net citizen and
making sure our customers don't ruin someone else's day. 


Regards,
Chad



- 
Chad E Skidmore
One Eighty Networks, Inc.
http://www.go180.net
509-688-8180   

-BEGIN PGP SIGNATURE-
Version: PGP 8.1

iQA/AwUBQbS/XU2RUJ5udBnvEQKY9ACdEDqM/PMlkKCokIgduKfQnvkHf3cAoN2B
40u2sItiQQdZ/xVChcXO1oTP
=E0NF
-END PGP SIGNATURE-



Re: Blocking worms/ddos for customer for free?

2004-12-06 Thread Daniel J. Evans

We have bogon filters in place to filter ingress traffic from our
upstreams. As for blocking worms and other nasties our views have
changed with the increasingly hostile climate...

In the past we have taken the approach that a "service provider" should
do exactly that - provide service. Since we didn't offer a managed
firewall service it was the responsiblity of our customers to protect
themselves and others from their infected machines. At the risk of
pouring gas on the fire, I think we're all aware of how well this works
in the face of Blaster, Nachi, Code Red, and others.

As it stands now, we attempt to block this type of traffic before it
enters our network where possible. Not because we want to protect the
65 year-old retired school teacher who just signed up for his first DSL
account with no firewall, no antivirus software, etc. Our focus is
strictly to protect our access and distribution routers from having to
deal with the flood of unnecessary collateral traffic associated with
Grandpa** and his new fandangled internet thingy.



-- 
It's not easy juggling a pregnant wife and a troubled child, but
somehow I still manage to squeeze in 8 hours of TV a day. 

- Homer Simpson


Daniel Evans




On Mon, 6 Dec 2004 21:46:04 +0200
Kim Onnel <[EMAIL PROTECTED]> wrote:

> 
> Hello,
> 
> Currently, on our ingress, we block spoofed packets, common worms/trojans 
> ports.
> 
> We do that for all of our customers(residential DSL, Dial-up,
> Corporate DSL, and the data center hosted websites/servers), however,
> 
> For me there are 2 ways to look at it, 
> if i leave these worms to come in, they would consume our bandwidth
> and CPU, and on the other hand, it looks like we're giving a free
> service, which in a way uses up our resources,
> 
> Its the same for DDoS, if i stop it for a customer, i'm giving him a
> free a service, if i dont, its gonna wreck my network.
> 
> Personally, i block the illegitimate packets out of my network(egress)
> but thats because i owe this to the internet community, even if i am
> not getting paid for it.
> 
> I would like to know other providers policy about this?






Blocking worms/ddos for customer for free?

2004-12-06 Thread Kim Onnel

Hello,

Currently, on our ingress, we block spoofed packets, common worms/trojans ports.

We do that for all of our customers(residential DSL, Dial-up,
Corporate DSL, and the data center hosted websites/servers), however,

For me there are 2 ways to look at it, 
if i leave these worms to come in, they would consume our bandwidth
and CPU, and on the other hand, it looks like we're giving a free
service, which in a way uses up our resources,

Its the same for DDoS, if i stop it for a customer, i'm giving him a
free a service, if i dont, its gonna wreck my network.

Personally, i block the illegitimate packets out of my network(egress)
but thats because i owe this to the internet community, even if i am
not getting paid for it.

I would like to know other providers policy about this?


Re: 16-bit ASN kludge

2004-12-06 Thread Owen DeLong
Sorry... I was talking about Eds proposal... I hadn't noticed the shift
to an entirely different proposal by John.
I think Eds proposal (which I proposed some modification to) has merit.
I think Johns alternative is far less desirable and agree with your concerns
about it.
Owen
--On Monday, December 6, 2004 1:32 PM -0500 [EMAIL PROTECTED] wrote:
On Mon, 06 Dec 2004 10:14:12 PST, Owen DeLong said:
The proposal wasn't for "parallel" ASN space.  The proposal was to have
a range of ASNs for leaf-networks and a range for transit networks,
allowing transit networks to make more rational (possibly automated)
decisions about route aggregation.
That may be sane, but that's not how I read John's actual proposal:
On Fri, 03 Dec 2004 16:36:39 -0600, John Dupuy said:
Along these lines, one could leave the transit AS networks alone if a
parallel 16 bit ASN space were created. Essentially, any non-transit
network would have it's non-public ASN retranslated NAT-style by
upstream  transit network border routers. Only the border routers would
have to be  changed. They would have to differentiate between public ASN
X and  non-public ASN X (same number) based on the which side of the
router the  ASN was learned from.
I don't see anything about ranges, but an entire parallel 16 bit space.
And John's definitely talking about them possibly having a 1312 on both
sides, because it matters which side you hear about it from.
Conversely, if it matters which side you hear about it from, it also
matters which side you announce it on.. which was my point.

--
If it wasn't crypto-signed, it probably didn't come from me.


pgpVsB6eWn3Qd.pgp
Description: PGP signature


Re: 16-bit ASN kludge

2004-12-06 Thread Valdis . Kletnieks
On Mon, 06 Dec 2004 10:14:12 PST, Owen DeLong said:
> The proposal wasn't for "parallel" ASN space.  The proposal was to have
> a range of ASNs for leaf-networks and a range for transit networks, allowing
> transit networks to make more rational (possibly automated) decisions about
> route aggregation.

That may be sane, but that's not how I read John's actual proposal:

On Fri, 03 Dec 2004 16:36:39 -0600, John Dupuy said:
> Along these lines, one could leave the transit AS networks alone if a 
> parallel 16 bit ASN space were created. Essentially, any non-transit 
> network would have it's non-public ASN retranslated NAT-style by upstream 
> transit network border routers. Only the border routers would have to be 
> changed. They would have to differentiate between public ASN X and 
> non-public ASN X (same number) based on the which side of the router the 
> ASN was learned from.

I don't see anything about ranges, but an entire parallel 16 bit space.
And John's definitely talking about them possibly having a 1312 on both
sides, because it matters which side you hear about it from.

Conversely, if it matters which side you hear about it from, it also matters
which side you announce it on.. which was my point.


pgpZH4s7Q1BWX.pgp
Description: PGP signature


Re: Bogon filtering (don't ban me)

2004-12-06 Thread Patrick W Gilmore
On Dec 6, 2004, at 6:30 AM, [EMAIL PROTECTED] wrote:
The point is that the bogon feed doesn't
need to be hooked directly into your routers.
This is what Patrick Gilmore does, i.e.
he takes the bogon feed into a managenment
system, generates an ACL and then periodically
applies the ACL to his routers. Presumably
that ACL gets checked by a clueful person
before it goes out.
Just to be clear, I did not say that is what I did, or any organization 
I work for did.  It was just a possible suggestion, not a requirement 
or a statement of fact.

I'm just interested in cleaning up the cruft on the 'Net.  Useless 
deaggregates, bogons, spoofed source, etc.  You know, the things YOU 
can do with YOUR network and YOUR customers so _I_ do not have to deal 
with it.

Given how much time and effort has been spent on things like "filtering 
on allocation boundaries" because some big networks do not want to take 
some /24s when little guys multi-home, you would think everyone would 
get behind this and push really hard.  Just seems like a much bigger 
win with far fewer religious questions.

But, of course, that wouldn't be nearly as fun. :)
--
TTFN,
patrick


Re: 16-bit ASN kludge

2004-12-06 Thread Owen DeLong
The proposal was that transit ASNs would begin with 12 leading 0 bits and
non-transit ASNs would not.  As such, 1312 would not be a non-transit ASN.
The proposal wasn't for "parallel" ASN space.  The proposal was to have
a range of ASNs for leaf-networks and a range for transit networks, allowing
transit networks to make more rational (possibly automated) decisions about
route aggregation.
Owen
--On Monday, December 6, 2004 12:54 PM -0500 [EMAIL PROTECTED] wrote:
On Fri, 03 Dec 2004 15:23:55 PST, Owen DeLong said:
I don't see non-transit ASN leakage as any greater issue than current
private ASN leakage.
If somebody leaks a private ASN, we can tell that it's a private ASN by
inspection.
If somebody is using '1312' inside their parallel ASN space and
accidentally leaks it, it's a bit harder to diagnose.
And if somebody is leaking 1312, I'll be quite put out... ;)

--
If it wasn't crypto-signed, it probably didn't come from me.


pgp7pO3W3pDw3.pgp
Description: PGP signature


RE: Bogon filtering (don't ban me)

2004-12-06 Thread Jeff Rosowski

Just thinking out loud, but is there any reason that this
route-server methodology couldn't be applied to other 'undesirable'
destinations, such as the world's top spammers, phishing web sites, etc?
Maybe break them up into different communities, so subscribers can pick
which ones they want to filter.
Sounds like a good idea, though with the administrative overhead of 
managing such a project, as much as I'd like to see something like that 
offered for free, it would most likely have to be a subscription based 
service.

You're also talking a hell of a lot more information in your routing 
table, since at this point we're talking some pretty granular routes.  I 
mean if people complain about 150K+ routes now?


Re: 16-bit ASN kludge

2004-12-06 Thread Valdis . Kletnieks
On Fri, 03 Dec 2004 15:23:55 PST, Owen DeLong said:

> I don't see non-transit ASN leakage as any greater issue than current
> private ASN leakage.

If somebody leaks a private ASN, we can tell that it's a private ASN by
inspection.

If somebody is using '1312' inside their parallel ASN space and accidentally
leaks it, it's a bit harder to diagnose.

And if somebody is leaking 1312, I'll be quite put out... ;)


pgpGlwVXtqAlO.pgp
Description: PGP signature


Unflattering comments about ISPs and DDOS

2004-12-06 Thread Michael . Dillon

This article in ZDNET UK entitled "WIth ISPs like this, who needs 
enemies?" 
http://comment.zdnet.co.uk/andrewdonoghue/0,39027004,39175983,00.htm
contains some rather unflattering comments about ISPs who don't help
customers deal with DDOS attacks. The head of security technology
for a major ISP named in the article said:

"Why should ISPs do something? It's very much as if people want
something for nothing. This noise is superfluous and silly."

The thinking is this. There are two operational problems
here, one big and one small. The big one is when your
customer is the target of DDoS. The small one is when
your customers originate the DDoS. 

I think the writer is telling us to treat these as two sides of the
same problem. If management buys into this view then it
would make the business case for the operational effort
needed to clean up botnets.

And if enough people clean up the bots on their network,
then a case can be made for depeering (or severely damping)
networks that don't clean up their act.

--Michael Dillon



Re: [OT] Re: Banned on NANOG

2004-12-06 Thread nanog gonan


--- Alex Bligh <[EMAIL PROTECTED]> wrote:
> --On 04 December 2004 17:35 + Paul Vixie
> <[EMAIL PROTECTED]> wrote:
> 
> > third and last, there are a number of principles
> > up for grabs right now, and the folks who want to
> > grab them aren't universal in their motives or
> > goals.  some folks think that rules are bad. 
> > others think that susan is bad or that merit is
> > bad.  some say that rules are ok if the community
> > has visibility and ultimate control.
> 
> I'd add: if people don't like NANOG, demand a full
> refund for your year's membership. Then go set up
> your own mail-server and work out your own
> moderation policies. If you do a better job, you'll
> win clueful subscribers.


It isn't we don't like NANOG, it's obvious we all do
or
we wouldn't be here.  It's we don't want the clueful
folks eliminated.  It reduces the S of the list and
has
little effect on N.  There is very little chance
someone's going to start a new NOG list and get the
quality of folks that're here.  Folks have too much
time invested here.  The question is, as Paul
proposed,
how can we get the community more visibility into the
process of banishment and more control over who is
banned?

How long are randy and the other cluefolks banned for?
(no I don't expect an answer...)



__ 
Do you Yahoo!? 
Meet the all-new My Yahoo! - Try it today! 
http://my.yahoo.com 
 



Re: Banned on NANOG

2004-12-06 Thread Bill Nash
On Mon, 6 Dec 2004, Hannigan, Martin wrote:
You expect? Bill, nothing personal, but your S:N is 0:6 at this point. Not
one single op post ever. No meeting attendance. Not one answered technical
question. How about earning a few stripes before making demands of NANOG?
Srh may be in need of a config change, but she's one of us. Show some
respect.
Actually, that's incorrect. I've been in the underside of network ops for 
years. Just because you've personally never seen me, just as I was unaware 
of who Susan was, makes neither of us nonexistant. I'm as much a user of 
this list as you are, and if you look carefully, you'll see some posts 
with my name in them, because I was having an offlist conversation with 
someone who posted a chunk of it back. I can appreciate what you're 
saying, but on the same token, this list is as much a tool to do my job as 
any code or policy I've ever written. To paraphrase the Vix, what I've 
said doesn't matter, it's what I'm saying that's important.

If you'd *prefer* I keep my cantankerous carcass in the public light, I 
guess I could make some posts. But given my posting habits and bad people 
skills, I think it's best that I don't, and I'm perfectly fine to lurk. 
Those on the list who do know me and work/have worked with me would 
probably agree with me.

As I said before, I'm not a routing engineer, nor representative of a 
large provider. I do, however, work for a reasonably large network traffic 
consumer and have to be aware of external conditions and issues, as well 
as developing technologies, legislation, and trends. I have no idea what 
you do, other than that shiny domain on your email address, but I'm not 
going to make the assumption that you're useless and have no place here, 
simply because I don't know you personally.

I don't think my expectation for a response for adjustment of the charter 
to make moderation, well, moderate, is unreasonable. We're all 
professionals here, aren't we? As for my S/N ratio, not a single post I've 
made yet has been offtopic, and apply directly to the lists functional 
operation, if you want to nitpick. I just want it fixed before all the 
clue leaks out.

- billn


Re: Banned on NANOG

2004-12-06 Thread Hannigan, Martin


You expect? Bill, nothing personal, but your S:N is 0:6 at this point. Not
one single op post ever. No meeting attendance. Not one answered technical
question. How about earning a few stripes before making demands of NANOG?
Srh may be in need of a config change, but she's one of us. Show some
respect.  

/plonk

-M
 


---
Martin Hannigan
[EMAIL PROTECTED]
Verisign, Inc.


-Original Message-
From: [EMAIL PROTECTED] <[EMAIL PROTECTED]>
To: J.D. Falk <[EMAIL PROTECTED]>
CC: my network has a second name, it's n-a-n-o-g <[EMAIL PROTECTED]>
Sent: Sun Dec 05 00:09:58 2004
Subject: Re: Banned on NANOG


On Sat, 4 Dec 2004, J.D. Falk wrote:

> On 12/04/04, Patrick W Gilmore <[EMAIL PROTECTED]> wrote:
>
>> I also think that makes it nearly impossible to run a good, informative
>> list.  Certainly FAR more difficult than just leaving the list
>> completely unmoderated.  I do not believe anyone here would argue those
>> points either (besides, obviously, the moderator herself).
>
>   ...who has been silent during this whole debate, which only
>   serves to feed the flames (and the flamers) as we all make wild
>   guesses regarding motive and intent.

My last email contained an explicit request for a responst. I expect to 
see one.

- billn


Bangladesh gets itself an IXP

2004-12-06 Thread Suresh Ramasubramanian

http://www.bdix.net looks quite good to me.

Open peering, with over 10 local ISPs peering there.

What a change from the joke that is NIXI (www.nixi.org) in India ..

srs (depressed)


Re: LG close to MCI Japan anyone?

2004-12-06 Thread Suresh Ramasubramanian
Elmar K. Bins wrote:
I'm currently searching for a looking glass close to AS703 in Japan.
Unfortunately, JPIX doesn't offer one (would have been to easy anyway).
http://neptune.dti.ad.jp/


LG close to MCI Japan anyone?

2004-12-06 Thread Elmar K. Bins

Hi there,

I'm currently searching for a looking glass close to AS703 in Japan.
Unfortunately, JPIX doesn't offer one (would have been to easy anyway).

Any pointers?

Yours,
Elmar.

PS: Whoever maintains traceroute.org and is on the list: Very many of the
listed RS and LGs are offline and some have been for quite a while.




Re: Bogon filtering (don't ban me)

2004-12-06 Thread Michael . Dillon

> The whole point that started this discussion is that bogon filtering is 
> HARMFUL a good part of the time. 

This may be so, but there are things that you
can do with an up to date bogon feed other
than filtering. That's why I suggested that
BGP may not be the best form for the feed but
for some reason LDAP is feared by people who
don't run mailservers or large LANs.

For instance, if you reflect all incoming
BGP announcements into a management system
then that system could compare them with 
an up-to-date bogin feed and alert the ops
staff when questionable announcements are
seen. Or it could trigger additional data
collection to be used in network forensics.

The point is that the bogon feed doesn't
need to be hooked directly into your routers.
This is what Patrick Gilmore does, i.e.
he takes the bogon feed into a managenment
system, generates an ACL and then periodically
applies the ACL to his routers. Presumably
that ACL gets checked by a clueful person
before it goes out.

Perhaps what we really need here is a BCP
document that describes the ways in which
a bogon feed can be integrated into network
operations. If you do RPF, then maybe it's not
needed for blocking traffic but you still
might like to know who is trying to announce
these bogon blocks to you.

--Michael Dillon