NANOG via RSS

2005-01-19 Thread Mike Callahan

By any chance is this list available via xml/rss?

Thanks,

Mike


Re: NANOG via RSS

2005-01-19 Thread Joe Abley

On 19 Jan 2005, at 08:17, Mike Callahan wrote:
By any chance is this list available via xml/rss?
Try http://rss.gmane.org/gmane.org.operators.nanog
Joe


Re: NANOG via RSS

2005-01-19 Thread Robert E . Seastrom


Mike Callahan [EMAIL PROTECTED] writes:

 By any chance is this list available via xml/rss?

There are several email to rss gateway software packages out there; it
would be trivial to roll your own.

YMMV, but after reading a couple of other mailing lists that were
gatewayed to rss, my sense is that RSS is not the right technology for
reading NANOG unless one were to create a first article only feed.
Due to different ways of looking at data than one would usually think
of when designing a mail or usenet reader, all RSS readers of my
admittedly fairly narrow acquaintance are lacking in one critical
(imnsho) feature for reading NANOG-L: kill thread.

---Rob



Re: NANOG via RSS

2005-01-19 Thread Suresh Ramasubramanian

On Wed, 19 Jan 2005 09:11:20 -0500, Robert E. Seastrom [EMAIL PROTECTED] 
wrote:
 YMMV, but after reading a couple of other mailing lists that were
 gatewayed to rss, my sense is that RSS is not the right technology for
 reading NANOG unless one were to create a first article only feed.
 Due to different ways of looking at data than one would usually think
 of when designing a mail or usenet reader, all RSS readers of my
 admittedly fairly narrow acquaintance are lacking in one critical
 (imnsho) feature for reading NANOG-L: kill thread.

This is a much better way than RSS -
http://blog.gmane.org/gmane.org.operators.nanog?set_skin=zawodny

-- 
Suresh Ramasubramanian ([EMAIL PROTECTED])


Re: NANOG via RSS

2005-01-19 Thread Suresh Ramasubramanian

Mike Callahan [EMAIL PROTECTED] writes:

 
 By any chance is this list available via xml/rss?
 
 Thanks,
 
 Mike
 

You can get it via blog and rss format from here -
http://blog.gmane.org/gmane.org.operators.nanog?set_skin=zawodny

-srs



Re: NANOG via RSS

2005-01-19 Thread Jeroen Massar
On Wed, 2005-01-19 at 09:11 -0500, Robert E.Seastrom wrote:
 
 Mike Callahan [EMAIL PROTECTED] writes:
 
  By any chance is this list available via xml/rss?
 
 There are several email to rss gateway software packages out there; it
 would be trivial to roll your own.
 
 YMMV, but after reading a couple of other mailing lists that were
 gatewayed to rss, my sense is that RSS is not the right technology for
 reading NANOG unless one were to create a first article only feed.

I am actually wonder if RSS has an advantage at all compared to a
mailinglist, especially as RSS is a pull mechanism, if there is nothing
or not a lot happening it will be polling the server a lot of times
needlessy, thus causing server resources. While of course a mailinglist
has the overhead of the email headers. But I am quite convinced of the
idea that a push * 25.000 subscribers is lighter load on the server than
having a continues pull by those 25.000 subscribers...

Next to that, my mailbox simply shows the articles I have not read and I
throw out what I did read and can easily reply to what I like to reply
to. Personally thus RSS has not much value, just like NNTP actually,
even though NNTP comes quite close to email.

Greets,
 Jeroen



signature.asc
Description: This is a digitally signed message part


Re: Registrars serve no useful purpose

2005-01-19 Thread William Allen Simpson
[EMAIL PROTECTED] wrote:
It is a matter of choosing a registrar that has the right business model
and services to suit the registrant.
   

What if a company doesn't want to deal with
any registrar? What if they just want to
register their domain name and have it stay
registered. For some companies, their registered
domain name is a critical part of their network
infrastructure. Why should these companies be forced
to deal with third parties who add no value to
the service?
 

I disagree, in part. 

(1) The purpose of registrars is processing paperwork for verification
of registrants.
(2) The purpose of the registry is to run servers, as efficiently and
inexpensively as possible. 

It's a reasonable division of labor.
There is no free market when ICANN forces
companies to deal with 3rd parties rather than
deal directly with the registry that provides the
mission critical DNS service for their domain name.
 

There's only 1 registry, so there's never a free market there --
that's a monopoly by design.
The competition between registrars is a good thing that has brought
the registration process to a commodity market.
However, having any market requires penalties when the registrars
fail to perform their function.  And not just a reputation penalty,
although that's certainly germaine.  An actual financial penalty. 
Markets are all about financial exchange.

That's why (as originally designed) every registrar posts a large
performance bond up front.
Clearly, Mel-IT failed in its responsibilty to correctly process the
paperwork for registration.  That Mel-IT has a business model where
they farm out the registration to incompetent third parties called
resellers is of no interest.  The third party is acting as an agent
for Mel-IT, and Mel-IT is ultimately responsible.
Moreover, the Mel-IT president/CEO/attorney/et alia egregiously
demonstrated negligence when notified of the problem.
I expect that Mel-IT will be assessed a reasonable penalty for their
failure.  The usual penalty is 3 times actual (liquidated) damages.
Since Mel-IT has already demonstrated a failure to perform, in addition
their performance bond to continue as a registrar should be raised to
at least 10% of their annualized gross income.  It costs money to clean
up their messes.
Those are the things required for a free market.
Accountability.  Responsibility.  Free markets are not without cost.
Perhaps this is another area where a membership-based
NANOG could help by standing up and explaining the 
operational importance of DNS stability to the 
bureaucrats in ICANN.
 

We have a membership-based NANOG.  Everybody who joins NANOG is on this
mailing list.  Everybody who joins this mailing list is part of NANOG.
We (in NANOG) have an interest in ensuring that the bureaucrats assess
the penalty on behalf of our members -- that panix.com is made whole.
Accountability.  Responsibility.
--
William Allen Simpson
   Key fingerprint =  17 40 5E 67 15 6F 31 26  DD 0D B9 9B 6A 15 2C 32


209.225.34.161 (vsc.gsa.gov)

2005-01-19 Thread Richard J. Sears

Can someone from this network contact me offlist - we are having routing
issues with your network.

Thanks

**
Richard J. Sears
Vice President 
American Internet Services  

[EMAIL PROTECTED]
http://www.adnc.com

858.576.4272 - Phone
858.427.2401 - Fax
INOC-DBA - 6130


I fly because it releases my mind 
from the tyranny of petty things . . 


Work like you don't need the money, love like you've
never been hurt and dance like you do when nobody's
watching.



Re: NANOG via RSS

2005-01-19 Thread chip

On Wed, 19 Jan 2005 15:55:19 +0100, Jeroen Massar [EMAIL PROTECTED] wrote:
 On Wed, 2005-01-19 at 09:11 -0500, Robert E.Seastrom wrote:
 
  Mike Callahan [EMAIL PROTECTED] writes:
 
   By any chance is this list available via xml/rss?
 
  There are several email to rss gateway software packages out there; it
  would be trivial to roll your own.
 
  YMMV, but after reading a couple of other mailing lists that were
  gatewayed to rss, my sense is that RSS is not the right technology for
  reading NANOG unless one were to create a first article only feed.
 
 I am actually wonder if RSS has an advantage at all compared to a
 mailinglist, especially as RSS is a pull mechanism, if there is nothing
 or not a lot happening it will be polling the server a lot of times
 needlessy, thus causing server resources. While of course a mailinglist
 has the overhead of the email headers. But I am quite convinced of the
 idea that a push * 25.000 subscribers is lighter load on the server than
 having a continues pull by those 25.000 subscribers...
 
 Next to that, my mailbox simply shows the articles I have not read and I
 throw out what I did read and can easily reply to what I like to reply
 to. Personally thus RSS has not much value, just like NNTP actually,
 even though NNTP comes quite close to email.
 
 Greets,
  Jeroen
 

Try pointing your subscription to Gmail.   Plenty of space to hold a
nice archive.  Quickly Searchable, accessible from anywhere, automatic
threading.  Make a label and matching filter for each
mailing-list...make's thing nice and sorted automatically.  Your Gmail
acc't can be accessed via rss too, so there's that.
  
--chip
Just my $.02, your mileage may vary,  batteries not included, etc


Re: NANOG via RSS

2005-01-19 Thread Jeroen Massar
On Wed, 2005-01-19 at 11:36 -0500, chip wrote:
SNIP
 Try pointing your subscription to Gmail.

Why the peep would I want to rely on a service provider like Gmail or
Hotmail or whatever for something as as important as my email ?
I also like to use my own domain for sending mail, it will never change
unless I go bankrupt or the internet disappears completely.

Especially folks in the ISP business should be able to pretty easily
setup much more sophisticated systems without having to rely on a third
party at all. You can then pick any combination of tools you want to use
to process it ranging from a Windows95 box to a superduper Earth
Simulator, just depending on the size of your pocket (and the money that
will not be in it afterwards) and your own capabilities.

Do you have any idea how much mail you can store on your local
NetApp ? :)

 Plenty of space to hold a
 nice archive.  Quickly Searchable, accessible from anywhere, automatic
 threading.  Make a label and matching filter for each
 mailing-list...make's thing nice and sorted automatically.

People call this procmail and their other favourite tool of choice ;)

 Your Gmail acc't can be accessed via rss too, so there's that.

If you didn't notice from my message I don't see the need for RSS at all
because it is not at all useful for many things, especially as email
gateways.

Greets,
 Jeroen

PS: Another nice feature of your own mail system is that you can
actually configure your real name completely and nicely capitalized in
the from address ;)


signature.asc
Description: This is a digitally signed message part


Re: NANOG via RSS

2005-01-19 Thread Paul Vixie

[EMAIL PROTECTED] (Robert E.Seastrom) writes:

  By any chance is this list available via xml/rss?
 ...
 Due to different ways of looking at data than one would usually think
 of when designing a mail or usenet reader, all RSS readers of my
 admittedly fairly narrow acquaintance are lacking in one critical
 (imnsho) feature for reading NANOG-L: kill thread.

we gateway nanog@ (it's not called NANOG-L, really, plz stop saying that)
into a local usenet newsgroup here.  the netnews feature i use most often
isn't actually kill by thread, but rather kill by author.  i can't
imagine how any of you read this forum using a normal e-mail tool.
-- 
Paul Vixie


RE: NANOG via RSS

2005-01-19 Thread Hannigan, Martin

 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of
 Paul Vixie
 Sent: Wednesday, January 19, 2005 11:59 AM
 To: nanog@merit.edu
 Subject: Re: NANOG via RSS
 
 
 
 [EMAIL PROTECTED] (Robert E.Seastrom) writes:
 
   By any chance is this list available via xml/rss?
  ...
  Due to different ways of looking at data than one would 
 usually think
  of when designing a mail or usenet reader, all RSS readers of my
  admittedly fairly narrow acquaintance are lacking in one critical
  (imnsho) feature for reading NANOG-L: kill thread.
 
 we gateway nanog@ (it's not called NANOG-L, really, plz stop 
 saying that)
 into a local usenet newsgroup here.  the netnews feature i 
 use most often
 isn't actually kill by thread, but rather kill by author.  i can't
 imagine how any of you read this forum using a normal e-mail tool.

Merit could treat the mailing list as an asset 
and not allow redistribution and instead offer multiple formats for 
readers to peruse or react in near real time. RSS, NNTP, and
SMTP are all options in my mind.

It's about choices. More is better.


-M

 


Re: NANOG via RSS

2005-01-19 Thread chip

On Wed, 19 Jan 2005 17:48:07 +0100, Jeroen Massar [EMAIL PROTECTED] wrote:
 On Wed, 2005-01-19 at 11:36 -0500, chip wrote:
 SNIP
  Try pointing your subscription to Gmail.
 
 Why the peep would I want to rely on a service provider like Gmail or
 Hotmail or whatever for something as as important as my email ?
 I also like to use my own domain for sending mail, it will never change
 unless I go bankrupt or the internet disappears completely.
 
 Especially folks in the ISP business should be able to pretty easily
 setup much more sophisticated systems without having to rely on a third
 party at all. You can then pick any combination of tools you want to use
 to process it ranging from a Windows95 box to a superduper Earth
 Simulator, just depending on the size of your pocket (and the money that
 will not be in it afterwards) and your own capabilities.
 
 Do you have any idea how much mail you can store on your local
 NetApp ? :)
 
  Plenty of space to hold a
  nice archive.  Quickly Searchable, accessible from anywhere, automatic
  threading.  Make a label and matching filter for each
  mailing-list...make's thing nice and sorted automatically.
 
 People call this procmail and their other favourite tool of choice ;)
 
  Your Gmail acc't can be accessed via rss too, so there's that.
 
 If you didn't notice from my message I don't see the need for RSS at all
 because it is not at all useful for many things, especially as email
 gateways.
 
 Greets,
  Jeroen
 
 PS: Another nice feature of your own mail system is that you can
 actually configure your real name completely and nicely capitalized in
 the from address ;)
 

Jeroen,

I agree with you on pretty much everything you said.   The only thing
I use this gmail account for is mailing lists.  I don't want to
clutter up my inbox with all the stuff that happens on 10 different
lists.  I also don't want to have to deal with the spamming issues
that are a result of the lists.  And why should I pay for space,
equipment, and time when someone's giving me 1Gb for free with all the
handy tools already installed.  Anyhow, to each his own, was just
pointing out another option.


-- chip
Just my $.02, your mileage may vary,  batteries not included, etc


Re: NANOG via RSS

2005-01-19 Thread David Gethings

On Wed, 2005-01-19 at 16:59 +, Paul Vixie wrote:
 i can't
 imagine how any of you read this forum using a normal e-mail tool.
With some difficulty... ;)

-- 
Cheers

Dg off to investigate the various options proposed



Re: Registrars serve no useful purpose

2005-01-19 Thread David M. Besonen

[a dated, biased (what isn't?), insightful, and 
relevant interview]


Published on Policy DevCenter 
(http://www.oreillynet.com/policy/)
 http://www.oreillynet.com/pub/a/policy/2002/12/05/karl.html


Karl Auerbach: ICANN Out of Control
by Richard Koman
12/05/2002

Editor's note: Strong forces are reshaping the 
Internet these days. To understand these forces--
governmental, business, and technical--Richard Koman 
interviews the people in the midst of the changes.

This month, Richard talks to Karl Auerbach, a public 
board member of ICANN and one of the Internet 
governing body's strongest critics.

October's distributed, denial-of-service attack 
against the domain name system--the most serious yet, 
in which seven of the thirteen DNS roots were cut off 
from the Internet--put a spotlight on ICANN, the 
nongovernmental corporation responsible for Internet 
addressing and DNS. The security of DNS is on ICANN's 
watch. Why is it so susceptible to attack, when the 
Internet as a whole is touted as being able to 
withstand nuclear Armageddon?

It's religious dogma, says Karl Auerbach, a public 
representative to ICANN's board. There's no reason DNS 
shouldn't be decentralized, except that ICANN wants to 
maintain central control over this critical function. 
Worse, Auerbach said in a telephone interview with 
O'Reilly Network, ICANN uses its domain name dispute 
resolution process to expand the rights of trademark 
holders, routinely taking away domains from people 
with legitimate rights to them, only to reward them to 
multinational corporations with similar names.

Auerbach--who successfully sued ICANN over access to 
corporate documents (ICANN wanted him to sign a 
nondisclosure agreement before he could see the 
documents)--will only be an ICANN director for a few 
more weeks. As part of ICANN's reform process, the 
ICANN board voted last month to end public 
representation on the board. As of December 15, there 
will be zero public representatives on the ICANN 
board.

How does ICANN justify banishing the public from its 
decision-making process? Stuart Lynn, president and 
CEO of ICANN, said the change was needed to make 
ICANN's process more efficient. In a Washington Post 
online discussion, Lynn said: The board decided that 
at this time [online elections] are too open to fraud 
and capture to be practical, and we have to look for 
other ways to represent the public interest. It was 
also not clear that enough people were really 
interested in voting in these elections to create a 
large enough body of voters that could be reflective 
of the public interest. This decision could always be 
reexamined in the future. In the meantime, we are 
encouraging other forms of at-large organizations to 
self-organize and create and encourage a body of 
individuals who could provide the user input and 
public interest input into the ICANN process.

Former ICANN president Esther Dyson is also supporting 
the move away from public representation on the board. 
I did believe that it was a good idea to have a 
globally elected executive board, [but] you can't have 
a global democracy without a globally informed 
electorate, Dyson told the Post. What you really 
need [in order] to have effective end-user 
representation is to have them in the bowels (of the 
organization) rather than on the board.

Auerbach isn't buying. ICANN is pursuing various spin 
stories to pretend that they haven't abandoned the 
public interest, he says in this interview. ICANN is 
trying to create a situation where individuals are not 
allowed in and the only organizations that are allowed 
in are those that hew to ICANN's party line.

In this interview, Auerbach makes a number of strong 
criticisms of ICANN, beyond the issue of public 
access:

* ICANN uses its domain name dispute resolution 
process to expand the rights of trademark holders, 
routinely taking away domains from people with 
legitimate rights to them, only to reward them to 
multinational corps with similar names, Auerbach says.
* ICANN unnecessarily maintains the domain name 
system as a centralized database, making it vulnerable 
to attack.
* ICANN has failed to improve network security 
since September 11 and has ignored Auerbach's 
suggestions for improving DNS security.
* ICANN staff takes actions without consulting the 
board, withholds information from the board, and 
misleads board members.
* Finally, Auerbach charges that ICANN is guilty 
of corporate malfeasance.

Koman: On October 21, there was a denial-of-service 
attack on DNS, which was widely reported as the most 
serious yet. Something like seven of the thirteen root 
servers were unavailable for as long as three hours. 
What is ICANN's responsibility for DNS, and how 
vulnerable is it to attack?

Auerbach: On the Internet, there are a couple of areas 
that arguably need some centralized authority. One of 
these is IP address allocation--addresses need to 
handed out with some notion of 

RE: NANOG via RSS

2005-01-19 Thread Joseph Johnson

 i can't imagine how any of you read this forum using a normal e-mail tool.

I've used Outlook 2003 since Beta, and couldn't imagine not using it for
emailing.  Just setup a rule to send NANOG emails to their own folder and
let 'em roll in.  I'll browse every so often and decide I don't care about a
topic and just mark that day's emails as read.

Plus my phone/pda can sync across the Sprint network with Exchange and
download the most recent emails when I get bored on the train or at lunch.


Joe Johnson



Re: Registrars serve no useful purpose

2005-01-19 Thread David M. Besonen

the panix.com incident, a few nights of dreaming 
solutions, and this interview lead me wonder about 
p2p dns.

david


Re: Registrars serve no useful purpose

2005-01-19 Thread Fergie (Paul Ferguson)


And, on this point, I believe Karl was right.

$.02,

- ferg


-- David M. Besonen [EMAIL PROTECTED] wrote:

Auerbach: The public interest is not being served.

--
Fergie, a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 [EMAIL PROTECTED] or
 [EMAIL PROTECTED]



Please Check Filters - BOGON Filtering IP Space 72.14.128.0/19

2005-01-19 Thread Richard J. Sears
___

From: [EMAIL PROTECTED] 
Sent: Wednesday, January 19, 2005 9:58 AM
To: 'nanog@merit.edu'
Subject: BOGON Filtering IP Space?

 

 

Our NOC is opening a lot of tickets for customers that live on our
72.14.128.0/19 network going towards local and federal government sites
in particular.  I'm curious if providers / vendors / managed service
providers are BOGON filtering this network range as it's relatively new
IP space allocated by ARIN that used to be BOGON space.

 

If anyone has these in the BOGON list, please remove - it's real space.
:-)

 

 

I'd appreciate any feedback on ways to notify / check if providers are
BOGON filtering this network.

 

 

 

Regards,

 

 

 

James Laszko

Pipeline Communications, Inc.

[EMAIL PROTECTED]

760-807-5129 24x7 NOC contact

951-541-9688 office


---BeginMessage---








Can you forward this to the nanog list for
me? It doesnt appear to be showing up at all when I send it in.











From:
[EMAIL PROTECTED] 
Sent: Wednesday, January 19, 2005
9:58 AM
To: 'nanog@merit.edu'
Subject: BOGON Filtering IP Space?







Our NOC is opening a lot of tickets for customers that live
on our 72.14.128.0/19 network going towards local and federal government sites
in particular. Im curious if providers / vendors / managed service
providers are BOGON filtering this network range as its relatively new
IP space allocated by ARIN that used to be BOGON space.



If anyone has these in the BOGON list, please remove 
its real space. J





Id appreciate any feedback on ways to notify / check
if providers are BOGON filtering this network.







Regards,







James Laszko

Pipeline Communications, Inc.

[EMAIL PROTECTED]

760-807-5129 24x7 NOC contact

951-541-9688 office






---End Message---


Re: Please Check Filters - BOGON Filtering IP Space 72.14.128.0/19

2005-01-19 Thread Richard J. Sears

Yes - the space in question was allocated last January - it looks like
not everyone has updated their bogon access lists to remove this space
from the bogon list.


On Wed, 19 Jan 2005 13:51:11 -0500
Kurt Kruegel [EMAIL PROTECTED] wrote:

 
 from http://www.cymru.com/Documents/bogon-list.html
 
 Changes in version 2.5 (02 AUG 2004)
 71/8 and 72/8 allocated to ARIN (AUG 2004). Removed from the bogon lists. 
 Changes in version 2.4 (28 APR 2004)
 58/8 and 59/8 allocated to the APNIC (APR 2004). Removed from the bogon
 lists. 
 Changes in version 2.3 (01 APR 2004)
 85/8, 86/8, 87/8, and 88/8 allocated to the RIPE NCC (APR 2004). Removed
 from the bogon lists. 
 Changes in version 2.2 (15 JAN 2004)
 70/8 allocated to ARIN (JAN 2004). Removed from the bogon lists. 
 
 
 At 10:20 AM 1/19/2005 -0800, Richard J. Sears wrote:
 ___  From: [EMAIL PROTECTED]  Sent: Wednesday,
 January 19, 2005 9:58 AM To: 'nanog@merit.edu' Subject: BOGON Filtering IP
 Space?Our NOC is opening a lot of tickets for customers that live
 on our 72.14.128.0/19 network going towards local and federal government
 sites in particular.  I'm curious if providers / vendors / managed service
 providers are BOGON filtering this network range as it's relatively new IP
 space allocated by ARIN that used to be BOGON space. If anyone has
 these in the BOGON list, please remove - it's real space. :-)I'd
 appreciate any feedback on ways to notify / check if providers are BOGON
 filtering this network.   Regards,   James Laszko  Pipeline
 Communications, Inc.  [EMAIL PROTECTED]  760-807-5129 24x7 NOC contact 
 951-541-9688 office   Return-Path:  X-Original-To:
 [EMAIL PROTECTED] Delivered-To: [EMAIL PROTECTED]
 Received: from smtp01.adnc.com (smtp01.adnc.com [206.251.248.151]) by
 pop3-02.adnc.com (Postfix) with ESMTP id D869735C056 for ; Wed, 19 Jan 2005
 10:18:22 -0800 (PST) Received: from localhost (localhost.localdomain
 [127.0.0.1]) by smtp01.adnc.com (Postfix) with ESMTP id BA3601BCC6D for ;
 Wed, 19 Jan 2005 10:17:17 -0800 (PST) Received: from smtp01.adnc.com
 ([127.0.0.1]) by localhost (smtp01.adnc.com [127.0.0.1]) (amavisd-new, port
 10026) with LMTP id 20263-01-59 for ; Wed, 19 Jan 2005 10:17:15 -0800 (PST)
 Received: from sandcaexch01.pcipros.net (unknown [207.158.33.163]) by
 smtp01.adnc.com (Postfix) with ESMTP id 2B9E01BC7DA for ; Wed, 19 Jan 2005
 10:17:15 -0800 (PST) X-MimeOLE: Produced By Microsoft Exchange V6.5.7226.0
 MIME-Version: 1.0 Subject: FW: BOGON Filtering IP Space? Date: Wed, 19 Jan
 2005 10:24:27 -0800 Message-ID:  X-MS-Has-Attach:  X-MS-TNEF-Correlator: 
 Thread-Topic: BOGON Filtering IP Space? Thread-Index:
 AcT+TgcBXRcsgfNZT8u0oENeEuZ2VQAAjpjgAADzviA= From: James Laszko  To:
 Richard J. Sears  X-Virus-Scanned: by amavisd-new at smtp01.adnc.com
 X-Spam-Checker-Version: SpamAssassin 2.61 (1.212.2.1-2003-12-09-exp) on 
 pop3-02.adnc.com X-Spam-Status: No, hits=-4.6 required=3.0
 tests=BAYES_00,HTML_70_80, HTML_FONTCOLOR_UNKNOWN,HTML_MESSAGE autolearn=no
 version=2.61 X-Spam-Level:  X-UIDL:   It doesn#8217;t appear to be
 showing up at all when I send it in#8230;#8230;#8230;. From:
 [EMAIL PROTECTED] 
  Sent: Wednesday, January 19, 2005 9:58 AM
  To: 'nanog@merit.edu'
  Subject: BOGON Filtering IP Space?I#8217;m curious if
 providers / vendors / managed service providers are BOGON filtering this
 network range as it#8217;s relatively new IP space allocated by ARIN that
 used to be BOGON space. If anyone has these in the BOGON list, please
 remove #8211; it#8217;s real space. JI#8217;d appreciate any
 feedback on ways to notify / check if providers are BOGON filtering this
 network.   Regards,   James Laszko  Pipeline
 Communications, Inc.  [EMAIL PROTECTED]  760-807-5129 24x7 NOC contact 
 951-541-9688 office   
 
 
 
 
 
 Kurt A Kruegel, CCNP, DP, SP, CISSP#30711
 Senior Network Administrator
 Network Systems
 American Museum of Natural History
 Central Park West at 79th Street
 New York, New York 10024
 (P)   212-496-3601
 (F)   212-496-3555
 (E)   [EMAIL PROTECTED]
 (W)   http://www.amnh.org


**
Richard J. Sears
Vice President 
American Internet Services  

[EMAIL PROTECTED]
http://www.adnc.com

858.576.4272 - Phone
858.427.2401 - Fax
INOC-DBA - 6130


I fly because it releases my mind 
from the tyranny of petty things . . 


Work like you don't need the money, love like you've
never been hurt and dance like you do when nobody's
watching.



Re: Please Check Filters - BOGON Filtering IP Space 72.14.128.0/19

2005-01-19 Thread David Barak


--- Richard J. Sears [EMAIL PROTECTED] wrote:

 
 Yes - the space in question was allocated last
 January - it looks like
 not everyone has updated their bogon access lists to
 remove this space
 from the bogon list.

I think that Cisco's Autosecure feature is part of the
problem here:

http://www.cisco.com/en/US/products/sw/iosswrel/ps5187/products_feature_guide09186a008017d101.html

While it says that bogon filters change, and provides
a URL to check it, what percentage of folks who would
use a feature like autosecure would ever update
their filters?  

sigh.

=
David Barak
Need Geek Rock?  Try The Franchise: 
http://www.listentothefranchise.com



__ 
Do you Yahoo!? 
Read only the mail you want - Yahoo! Mail SpamGuard. 
http://promotions.yahoo.com/new_mail 


72.18.160.0/19 Please Check Filters - BOGON Filtering IP Space 72.0.0.0/8

2005-01-19 Thread Bryan Bradsby


 Our NOC is opening a lot of tickets for customers that live on our
 72.14.128.0/19 network going towards local and federal government sites
 in particular.

Our customer - Angelo State U was recently assigned IP space
72.18.160.0/19.  They have also seen some issues getting packets to
government and other sites.

For example, USGS.gov was filtering based on an old bogon list.

Rob T - this should be a periodic FAQ:

   http://www.cymru.com/Bogons/

At your service,
-bryan bradsby

DIR Capnet
Texas State Government Net
NOC: 512-475-2432  877-472-4848




[Fwd: Cisco Security Advisory: Vulnerability in Cisco IOS Embedded Call Processing Solutions]

2005-01-19 Thread Gadi Evron
 .
FYI if you haven't seen this yet.
	Gadi.
---BeginMessage---
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Cisco Security Advisory: Vulnerability in Cisco IOS Embedded Call
Processing Solutions

Revision 1.0

For Public Release 2005 January 19 1500 UTC

+--

Contents


Summary
Affected Products
Details
Impact
Software Versions and Fixes
Obtaining Fixed Software
Workarounds
Exploitation and Public Announcements
Status of This Notice: FINAL
Distribution
Revision History
Cisco Security Procedures

+--

Summary
===

Cisco Internetwork Operating System (IOS®) Software release trains
12.1YD, 12.2T, 12.3 and 12.3T, when configured for the Cisco IOS
Telephony Service (ITS), Cisco CallManager Express (CME) or Survivable
Remote Site Telephony (SRST) may contain a vulnerability in processing
certain malformed control protocol messages.

A successful exploitation of this vulnerability may cause a reload of
the device and could be exploited repeatedly to produce a Denial of
Service (DoS). This advisory is available at
http://www.cisco.com/warp/public/707/cisco-sa-20050119-itscme.shtml

Cisco has made free software upgrades available to address this
vulnerability for all affected customers. There are workarounds
available to mitigate the effects of the vulnerability.

This vulnerability is documented by Cisco bug ID CSCee08584.

Affected Products
=

Vulnerable Products
+--

This issue affects all Cisco devices running any unfixed version of
Cisco IOS code that supports, and is configured for ITS, CME or SRST.

A Cisco device running ITS or CME will have the following line in the
configuration:

telephony-service


A Cisco device running SRST will have the following line in the
configuration:

call-manager-fallback


To determine the software running on a Cisco product, log in to the
device and issue the show version command to display the system banner.
Cisco IOS Software will identify itself as Internetwork Operating
System Software or simply IOS. On the next line of output, the image
name will be displayed between parentheses, followed by Version and
the IOS release name. Other Cisco devices will not have the show
version command or will give different output.

The following example identifies a Cisco product running IOS release
12.0(3) with an installed image name of C2500-IS-L:

Cisco Internetwork Operating System Software IOS (TM)

2500 Software (C2500-IS-L), Version 12.0(3), RELEASE SOFTWARE


The release train label is 12.0.

The next example shows a product running IOS release 12.3(6) with an
image name of C2600-JS-MZ:

Cisco Internetwork Operating System Software IOS (tm)

C2600 Software (C2600-JS-MZ), Version 12.3(6), RELEASE SOFTWARE (fc1)


Additional information about Cisco IOS release naming can be found at 
http://www.cisco.com/warp/public/620/1.html.

Products Confirmed Not Vulnerable
+

ITS, CME and SRST are IOS-only features. Devices that do not run IOS
are not vulnerable.

Details


More information about Cisco's IOS Telephony Service (ITS) and Cisco
CallManager Express (CME) can be found here:

http://www.cisco.com/en/US/products/sw/voicesw/ps4625/index.html

More information on Cisco's Survivable Remote Site Telephony (SRST) can
be found here:

http://www.cisco.com/en/US/products/sw/voicesw/ps2169/index.html

ITS, CME and SRST are features that allow a Cisco device running IOS to
control IP Phones using the Skinny Call Control Protocol (SCCP). SCCP
is the Cisco CallManager native signaling protocol.

Certain malformed packets sent to the SCCP port on an IOS device
configured for ITS, CME or SRST may cause the target device to reload.
This issue is documented in Cisco bug ID CSCee08584.

The following commands can be used to determine if ITS or CME are
running. A device that does not have ITS or CME enabled will display:

Router#show telephony-service
telephony-service is not enabled


A device that has ITS or CME enabled will show something similar to:

Router#show telephony-service
CONFIG (Version=3.0)
=   
Cisco CallManager Express   
ip source-address 192.168.1.1 port 2000
max-ephones 2   
max-dn 2
max-conferences 8   
max-redirect 5  
time-format 12  
date-format mm-dd-yy
keepalive 30
timeout interdigit 10   
timeout busy 10 
timeout ringing 180 
edit DN through Web:  disabled. 
edit TIME

Large Enterprise IP mgmt

2005-01-19 Thread Network.Security


The archives didn't show a hit for IP address management when it comes
to a large MS AD shop.  We went from NetID to home-grown scripts...  Men
and Mice have given some presentations on their tool.  Any others out
there that do not force a switch to some other vendor's DNS/DHCP
servers?  Just looking to manage the MS AD...

Thanks, 
Brad


Graphing Peering

2005-01-19 Thread andrew matthews

Anyone have any suggestions on graphing peering on a cisco router? I'm
using mrtg and i did mac address accounting but the numbers are off.

Thank i appreciate it in advance.

Andrew


Re: 72.18.160.0/19 Please Check Filters - BOGON Filtering IP Space 72.0.0.0/8

2005-01-19 Thread Rob Thomas

Hi, Bryan.

] Rob T - this should be a periodic FAQ:
]
]http://www.cymru.com/Bogons/

That's a great idea!  Everyone knows I don't send out nearly enough
email.  :)  Seriously, we'll try to be better about sending out
regular reminders.

Thanks!
Rob.
-- 
Rob Thomas
http://www.cymru.com
ASSERT(coffee != empty);



NANOG 33 Peering BOF VIII

2005-01-19 Thread William B. Norton
Peering Coordinators attending NANOG in Las Vegas -
We have a very exciting (and very full) Peering BOF agenda...Let me give 
you a flavor for what we are doing this year.

At 9PM we'll start out with a State of the Peering Internet and, with the 
audience, identify a few key trends and the most pressing issues of the 
Peering Coordinator Community.

Next we repeat last year's highly successful Great Debate, this time on 
the topic of Remote Peering : the good vs. the bad and the ugly. Remote 
Peering is peering without a local physical presence : tunneling ethernet 
frames across the ocean over MPLS into a peering fabric for 
example.  Stephen Wilcox has graciously stepped up to present the con 
position - the bad and the ugly of remote peering. I have a couple 
volunteers to present the pro position, but I would prefer to have a 
Peering Coordinator that is actually using remote peering to advocate its 
use. If noone volunteers I have two backup debaters that have agreed to 
present the pro side of the debate and to debate Stephen on this matter. At 
the end, the audience will vote by show of hands for who made the more 
compelling case. If anyone would like to volunteer a prize for the winner 
please let me know ;-)

Next, Richard Steenbergen will briefly share his Peering Coordinator 
community work with peeringdb.com, a resource for Peering Coordinators to 
obtain and share contact information.

We will finish off with the Peering Personals, a chance for Peering 
Coordinators to introduce themselves to the group, talk about their 
network, what they are looking for in a peer, where they peer, their AS# 
and contact info, etc.  I will use the RSVP form below to make sure that 
the relevant information is ready for Peering Coordinators in the audience 
to jot down in case they don't meet up with the speaker. We have found in 
the past that Peering Personals is very effective in facilitating peering.

If you are a Peering Coordinator and would like to participate in Peering 
Personals, it is a great way for others to put a face to a network and AS, 
and to meet the North American Peering Coordinator Community. Please fill 
out the following form and e-mail to me ([EMAIL PROTECTED]). We only have 
time for about 10 Peering Coordinators, so please respond asap:

Name:
Email:
Title:
Company:
AS#:
Check each that applies:
___ We are an ISP (sell access to the Internet)
--OR--
___ We are a Non-ISP (content company, etc.)
___ We are Content-Heavy
--OR--
___ We are Access-Heavy
___ Peering with Content Players or Content Heavy ISPs is OK by us
___ We generally require peering in multiple locations
OR
___ We will peer with anyone in any single location
___ We have huge volumes of traffic (lots of users and/or lots of content) 
(huge:  1 Gbps total outbound traffic to peers and transit providers)
___ We have a global network
___ We require Contracts for Peering

Current Peering Locations: ___
Planned (3-6 mos) Peering Locations: ___
After the BOF we will break for beers and exchange of business cards.
Bill


Re: Graphing Peering

2005-01-19 Thread andrew matthews

no i mean graph bgp sessions...

it's a single interface, and i want to graph every bgp session so i
can see how much traffic i'm doing between each peer.


On Wed, 19 Jan 2005 22:25:37 + (GMT), Stephen J. Wilcox
[EMAIL PROTECTED] wrote:
 On Wed, 19 Jan 2005, andrew matthews wrote:
 
  Anyone have any suggestions on graphing peering on a cisco router? I'm
  using mrtg and i did mac address accounting but the numbers are off.
 
 do you mean how to graph traffic to each host on a lan..?
 
 what platform do you have?
 
 Steve
 



RE: Graphing Peering

2005-01-19 Thread Claydon, Tom

Andrew,

You could probably whip something up with a shell script, and pipe the
results to something like cacti (www.cacti.net).

Cacti is one of the easiest utilities I've worked with to graph other
types of data besides bits in/out. Check it out.

= TC

-Original Message-
From: andrew matthews [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, January 19, 2005 4:38 PM
To: nanog@merit.edu
Subject: Re: Graphing Peering


no i mean graph bgp sessions...

it's a single interface, and i want to graph every bgp session so i can
see how much traffic i'm doing between each peer.


On Wed, 19 Jan 2005 22:25:37 + (GMT), Stephen J. Wilcox
[EMAIL PROTECTED] wrote:
 On Wed, 19 Jan 2005, andrew matthews wrote:
 
  Anyone have any suggestions on graphing peering on a cisco router? 
  I'm using mrtg and i did mac address accounting but the numbers are
off.
 
 do you mean how to graph traffic to each host on a lan..?
 
 what platform do you have?
 
 Steve
 





Re: Graphing Peering

2005-01-19 Thread Bill Nash

If you're already using MRTG, hopefully you're at least passingly familiar 
with perl and SNMP. If so, you can do some hackery to identify your BGP 
peer interfaces automatically and then use it to reference existing 
interface graphs.

Take a peek in the BGP4 mib, specifically at the BgpPeerEntry subtree. You 
may need to do some correlation inside the ifTable or maybe even ifX, 
depending on platform and implementation, to correctly identify the 
interface of your peer.

- billn
On Wed, 19 Jan 2005, andrew matthews wrote:
no i mean graph bgp sessions...
it's a single interface, and i want to graph every bgp session so i
can see how much traffic i'm doing between each peer.
On Wed, 19 Jan 2005 22:25:37 + (GMT), Stephen J. Wilcox
[EMAIL PROTECTED] wrote:
On Wed, 19 Jan 2005, andrew matthews wrote:
Anyone have any suggestions on graphing peering on a cisco router? I'm
using mrtg and i did mac address accounting but the numbers are off.
do you mean how to graph traffic to each host on a lan..?
what platform do you have?
Steve




Re: Graphing Peering

2005-01-19 Thread Daniel Golding



Andrew's issue is this - he's got an Ethernet port on a public peering
switch with a bunch of peers. He can see the interface stats just fine but
he's having trouble figuring out how much traffic is going to (or coming
from) each peer. One interface, many peers, confusing problem. There isn't
one VLAN per peer on most public peering switches - its one big Ethernet
segment with each peer getting an IP out of a common subnet. Welcome to the
world of broadcast multi-access peering.

The classical way to do this is mac accounting. This can be pretty rough -
its not really useful for anything more than a ratio, from what I've seen -
the numbers tend to not add up properly.

Another possibility (on Cisco) is using BGP Policy Accounting, although
support can be spotty depending on hardware.

For other platforms, there's some good information here:
http://www.switch.ch/misc/leinen/snmp/monitoring/bucket-accounting.html

The link on that page for Juniper's Destination Class Usage (DCU) is broken.
Try this one instead:
http://www.juniper.net/techpubs/software/junos/junos70/swconfig70-interfaces
/html/interfaces-family-config25.html

- Dan


On 1/19/05 5:56 PM, Bill Nash [EMAIL PROTECTED] wrote:

 
 
 If you're already using MRTG, hopefully you're at least passingly familiar
 with perl and SNMP. If so, you can do some hackery to identify your BGP
 peer interfaces automatically and then use it to reference existing
 interface graphs.
 
 Take a peek in the BGP4 mib, specifically at the BgpPeerEntry subtree. You
 may need to do some correlation inside the ifTable or maybe even ifX,
 depending on platform and implementation, to correctly identify the
 interface of your peer.
 
 - billn
 
 
 On Wed, 19 Jan 2005, andrew matthews wrote:
 
 
 no i mean graph bgp sessions...
 
 it's a single interface, and i want to graph every bgp session so i
 can see how much traffic i'm doing between each peer.
 
 
 On Wed, 19 Jan 2005 22:25:37 + (GMT), Stephen J. Wilcox
 [EMAIL PROTECTED] wrote:
 On Wed, 19 Jan 2005, andrew matthews wrote:
 
 Anyone have any suggestions on graphing peering on a cisco router? I'm
 using mrtg and i did mac address accounting but the numbers are off.
 
 do you mean how to graph traffic to each host on a lan..?
 
 what platform do you have?
 
 Steve
 
 
 

-- 
Daniel Golding
Network and Telecommunications Strategies
Burton Group




Re: Graphing Peering

2005-01-19 Thread Bill Nash

Ah, completely different animal altogether, that. Thanks for the 
clarification. My initial read was multiple peers on separate interfaces, 
which isn't overly complex to track.

- billn
On Wed, 19 Jan 2005, Daniel Golding wrote:

Andrew's issue is this - he's got an Ethernet port on a public peering
switch with a bunch of peers. He can see the interface stats just fine but
he's having trouble figuring out how much traffic is going to (or coming
from) each peer. One interface, many peers, confusing problem. There isn't
one VLAN per peer on most public peering switches - its one big Ethernet
segment with each peer getting an IP out of a common subnet. Welcome to the
world of broadcast multi-access peering.
The classical way to do this is mac accounting. This can be pretty rough -
its not really useful for anything more than a ratio, from what I've seen -
the numbers tend to not add up properly.
Another possibility (on Cisco) is using BGP Policy Accounting, although
support can be spotty depending on hardware.
For other platforms, there's some good information here:
http://www.switch.ch/misc/leinen/snmp/monitoring/bucket-accounting.html
The link on that page for Juniper's Destination Class Usage (DCU) is broken.
Try this one instead:
http://www.juniper.net/techpubs/software/junos/junos70/swconfig70-interfaces
/html/interfaces-family-config25.html
- Dan
On 1/19/05 5:56 PM, Bill Nash [EMAIL PROTECTED] wrote:

If you're already using MRTG, hopefully you're at least passingly familiar
with perl and SNMP. If so, you can do some hackery to identify your BGP
peer interfaces automatically and then use it to reference existing
interface graphs.
Take a peek in the BGP4 mib, specifically at the BgpPeerEntry subtree. You
may need to do some correlation inside the ifTable or maybe even ifX,
depending on platform and implementation, to correctly identify the
interface of your peer.
- billn
On Wed, 19 Jan 2005, andrew matthews wrote:
no i mean graph bgp sessions...
it's a single interface, and i want to graph every bgp session so i
can see how much traffic i'm doing between each peer.
On Wed, 19 Jan 2005 22:25:37 + (GMT), Stephen J. Wilcox
[EMAIL PROTECTED] wrote:
On Wed, 19 Jan 2005, andrew matthews wrote:
Anyone have any suggestions on graphing peering on a cisco router? I'm
using mrtg and i did mac address accounting but the numbers are off.
do you mean how to graph traffic to each host on a lan..?
what platform do you have?
Steve





Re: panix hijack press

2005-01-19 Thread Darrell Greenwood

http://www.theregister.co.uk/2005/01/19/panix_hijack_more/

Panix.com hijack: Aussie firm shoulders blame
By Lucy Sherriff
Published Wednesday 19th January 2005 16:49 GMT

An Australian domain registrar has admitted to its part in last
weekend's domain name hijack. of a New York ISP. Melbourne IT says it
failed to properly confirm a transfer request for the Panix.com
domain.

Ed Ravin, a Panix system administrator, says the Melbourne IT error
enabled fraudsters using stolen credit cards to assume control of the
domain. Thousands of Panix.com customers lost email access for the
duration of the occupation, and many emails will never be recovered.


The mistake was compounded by the unavailability of Melbourne IT
staff over the weekend - the company rectified its mistake late on
Sunday evening, US time. Speaking to ComputerWorld Ravin said he was
unable to contact anyone in support at Melbourne IT until the
company's offices opened on Monday morning.

Bruce Tonkin, Melbourne IT's CTO, offered the following explanation:

In the case of Panix.com, evidence so far indicates that a third
party that holds an account with a reseller [UK based Fibranet] of
Melbourne IT, fraudulently initiated the transfer. The third party
appears to have used stolen credit cards to establish this account
and pay for the transfer. That reseller is analysing its logs and
cooperating with law enforcement.

A loophole that allowed the error, that caused the problem has now
been closed, he added.

The roots of the affair lie in new rules governing the transfer of
domain name ownership. These rules, which came into effect last
November, mean that inter-registry transfer requests are
automatically approved after five days unless countermanded by the
owner of a domain.

When ICANN proposed the new procedures, many in the industry warned
that as well as making it easier to move domains around, the change
would make it easier for people to hijack domains. Network Solutions,
for example, took the precautionary step of locking all its
customers' domains. Panix.com says its domain name was locked, and
that despite this, it was still transferred. ®


Re: panix hijack press

2005-01-19 Thread Dan Hollis

On Wed, 19 Jan 2005, Darrell Greenwood wrote:
 customers' domains. Panix.com says its domain name was locked, and
 that despite this, it was still transferred. ®

I seem to recall someone saying it wasnt locked, now theyre saying it was?

-Dan



Re: [NANOG-LIST] Re: Graphing Peering

2005-01-19 Thread andrew matthews

Well with mac accounting i've found that the results are not correct
number they have to multiplied or something.

I have a GigE and it has multiple peering sessions on it. Flowscan
can't keep up, i have to export it in samples and that just defeats
the purpose. I'm trying to find a way to graph indivual peers with
totals. If there was a way to do it in perl i would... but i can't
find the traffic on a per session basis.

I'm running a cisco 12000 series router, with a current ios.

I know juniper makes it really easy, but i have cisco :)

Thanks everyone who has contributed. I really do appreciate it.


On Wed, 19 Jan 2005 16:41:18 -0800, Brent Van Dussen [EMAIL PROTECTED] wrote:
 Hello,
 
 Something like this would be possible with an Sflow stream if your ethernet
 device supports it.  By parsing out the src/dst mac addresses you could at
 least visualize which MAC is using up most of your ethernet.
 
 -Brent
 
 
 At 02:37 PM 1/19/2005, you wrote:
 
 no i mean graph bgp sessions...
 
 it's a single interface, and i want to graph every bgp session so i
 can see how much traffic i'm doing between each peer.
 
 
 On Wed, 19 Jan 2005 22:25:37 + (GMT), Stephen J. Wilcox
 [EMAIL PROTECTED] wrote:
   On Wed, 19 Jan 2005, andrew matthews wrote:
  
Anyone have any suggestions on graphing peering on a cisco router? I'm
using mrtg and i did mac address accounting but the numbers are off.
  
   do you mean how to graph traffic to each host on a lan..?
  
   what platform do you have?
  
   Steve
  
  
 



Re: panix hijack press

2005-01-19 Thread Thornton

On Wed, 2005-01-19 at 15:51 -0800, Dan Hollis wrote:
 On Wed, 19 Jan 2005, Darrell Greenwood wrote:
  customers' domains. Panix.com says its domain name was locked, and
  that despite this, it was still transferred. 
 
 I seem to recall someone saying it wasnt locked, now theyre saying it was?
 
 -Dan
 
 
panix claims it was locked but I dont think it was.  Like was mentioned
they locked there other domains after panix.com was taken over.  Why
would they just lock one domain?





Re: panix hijack press

2005-01-19 Thread William Allen Simpson
Thornton wrote:
On Wed, 2005-01-19 at 15:51 -0800, Dan Hollis wrote:
 

On Wed, 19 Jan 2005, Darrell Greenwood wrote:
   

customers' domains. Panix.com says its domain name was locked, and
that despite this, it was still transferred. 
 

I seem to recall someone saying it wasnt locked, now theyre saying it was?
   

panix claims it was locked but I dont think it was.  Like was mentioned
they locked there other domains after panix.com was taken over.  Why
would they just lock one domain?
 

Upon what verifiable facts do you base your endless speculation?
(1) Stop blaming the victim!
(2) Registrants can't lock domains, it's a registrar-lock.  Users
can only ask that domains be locked.  Stupid policy, bad results.
(3) This is a red-herring issue anyway, since there is no evidence
that Mel-IT ever sent notification, or even waited 5 days for a
response.  The domain was hijacked in the middle of the night, in the
middle of a weekend -- a very odd time for confirming responses by a
staff that wasn't in the office answering the phones
(4) Mel-IT has admitted it failed to properly confirm, and a
loophole caused the error.
(5) Mel-IT has an executive and a lawyer that were both notified about
the problem, and refused to mitigate the damage.
(6) Stop blaming the victim!
--
William Allen Simpson
   Key fingerprint =  17 40 5E 67 15 6F 31 26  DD 0D B9 9B 6A 15 2C 32



Re: panix hijack press

2005-01-19 Thread Mark Jeftovic


On Wed, 19 Jan 2005, William Allen Simpson wrote:
 (2) Registrants can't lock domains, it's a registrar-lock.  Users
 can only ask that domains be locked.  Stupid policy, bad results.


This is not correct, prior to the new policy many registrars were
already putting control over the regsitrar-lock directly into
the registrants' hands and under the new policy if the registrar
employs it they must provide access to the registrant.

It's just called a registrar-lock to differentiate it from
the registry-lock, basically to describe at what level the
lock is set.

-mark

-- 
Mark Jeftovic [EMAIL PROTECTED]
Co-founder, easyDNS Technologies Inc.
ph. +1-(416)-535-8672 ext 225
fx. +1-(416)-535-0237


Regarding registrar LOCK for panix.com

2005-01-19 Thread Bruce Tonkin

 

 
 On Wed, 19 Jan 2005, Darrell Greenwood wrote:
  customers' domains. Panix.com says its domain name was locked, and 
  that despite this, it was still transferred. (r)
 
 I seem to recall someone saying it wasnt locked, now theyre 
 saying it was?

The information we have so far, indicates that it was not on Registrar
LOCK at the registry at the time of the transfer.

Regards,
Bruce Tonkin


Re: panix hijack press

2005-01-19 Thread Thornton

 Upon what verifiable facts do you base your endless speculation?
 
 (1) Stop blaming the victim!
 
 (2) Registrants can't lock domains, it's a registrar-lock.  Users
 can only ask that domains be locked.  Stupid policy, bad results.
 
 (3) This is a red-herring issue anyway, since there is no evidence
 that Mel-IT ever sent notification, or even waited 5 days for a
 response.  The domain was hijacked in the middle of the night, in the
 middle of a weekend -- a very odd time for confirming responses by a
 staff that wasn't in the office answering the phones
 
 (4) Mel-IT has admitted it failed to properly confirm, and a
 loophole caused the error.
 
 (5) Mel-IT has an executive and a lawyer that were both notified about
 the problem, and refused to mitigate the damage.
 
 (6) Stop blaming the victim!

i dont think anyone is blaming the victim...what evidence do you have to
support the domain being locked?

a user can lock a domain..they can login to the control panel for there
registrar and select registrar lock, registrar-lock, or lock and i am
sure there are other registrars that word it even differently. once you
select that it effectively locks your domain so it cant be transfered.



Re: [NANOG-LIST] Re: Graphing Peering

2005-01-19 Thread Christopher L. Morrow


On Wed, 19 Jan 2005, andrew matthews wrote:


 Well with mac accounting i've found that the results are not correct
 number they have to multiplied or something.

 I have a GigE and it has multiple peering sessions on it. Flowscan
 can't keep up, i have to export it in samples and that just defeats
 the purpose. I'm trying to find a way to graph indivual peers with
 totals. If there was a way to do it in perl i would... but i can't
 find the traffic on a per session basis.

 I'm running a cisco 12000 series router, with a current ios.

the ingress/egress linecards make a large difference in your stats
collection efforts... so you might want to mention what they are so those
that have tackled this before can better assist.

-Chris


Date of transfer request (was: Regarding registrar LOCK for panix.com)

2005-01-19 Thread Richard Parker

on 1/19/05 6:46 PM, Bruce Tonkin at [EMAIL PROTECTED] wrote:

 The information we have so far, indicates that it was not on Registrar
 LOCK at the registry at the time of the transfer.

Bruce,

It is well known that the date of transfer of the panix.com domain from
Dotster to Melbourne IT was on January 15 (EST).  Can you tell us the date
when the transfer request was initially solicited by the client of Melbourne
IT's reseller?

-Richard



Re: [NANOG-LIST] Re: Graphing Peering

2005-01-19 Thread Jared Mauch

On Thu, Jan 20, 2005 at 03:14:24AM +, Christopher L. Morrow wrote:
 
 
 On Wed, 19 Jan 2005, andrew matthews wrote:
 
 
  Well with mac accounting i've found that the results are not correct
  number they have to multiplied or something.
 
  I have a GigE and it has multiple peering sessions on it. Flowscan
  can't keep up, i have to export it in samples and that just defeats
  the purpose. I'm trying to find a way to graph indivual peers with
  totals. If there was a way to do it in perl i would... but i can't
  find the traffic on a per session basis.

ip accounting mac-address input
ip accounting mac-address output

then collect sh arp and sh int mac-accounting to sync
up with your bgp sessions and ips, and you're all set.

- jared

  I'm running a cisco 12000 series router, with a current ios.
 
 the ingress/egress linecards make a large difference in your stats
 collection efforts... so you might want to mention what they are so those
 that have tackled this before can better assist.
 
 -Chris

-- 
Jared Mauch  | pgp key available via finger from [EMAIL PROTECTED]
clue++;  | http://puck.nether.net/~jared/  My statements are only mine.


Re: Regarding registrar LOCK for panix.com

2005-01-19 Thread Eric Brunner-Williams in Portland Maine

Oki all,

I wasn't going to discuss this because it is potentially confusing,
but as we're ratholing on registrar lock ...

---

Some 60 plus days after a party acquired a domain, s/he initiated an
UNLOCK at the user interface of the operator that had arrainged to
acquire this particular domain. The transaction completed.

The loosing registrar showed unlocked, the gaining registrar
saw the unlocked and proceeded with a transfer, which failed.

The rrp.unlock() call actually never was made from the registrar
to the registry, due to a transient network event between the operator
network, and the loosing registrar network.

The point is that locks aren't what they seem. This is a distributed
system with many points of failure, not completely coherent, and it
does matter from where one looks. Shorter form: error is possible.

---

The registrant asked me to help. I called the operator. The CSR who
took the call observed the inconsistency and re-issued the rrp.unlock().

Domain unlocked by jrandom-3rd-party in under two minutes. Granted, it
was in an unusual state and the caller (me) knew more than the nice CSR.

---

Posit a backhoe of unusual size operating near MIT, or that MIT does
business out of Sri Lanka and the State of Nagaland has just dragged
anchor across the SEA-ME-WE-III (again), or any of a dozen other real
life events. 

We'd be chatting about the state in the central registry, not the
failure to trigger a state change at the periphery of the system.

---

It is possible to run a domain name based network service off of addresses
provisioned by dhcp. It is possible to acquire a contiguous block, and to
hold them for quite a long time. But that doesn't mean that it is sensible
to build a network infrastructure for dynmaically provisioned resources.

The transformation of the dns service from 1990 to the present has created
dynmaic provisioned name resources -- the property absent in 1990, the
competitive registrar, is dynamic, and hence so is everything else.

I picked 1990 because Panix is 15 year old.

I think the fundamental issue is that things that ought to be wicked
stable, are in fact not.

Everyone is free to draw their own conclusions, and act as they see
fit, its all just risk management anyway, but if the design respected
this user community, we wouldn't be reading that the correct competitive
registrar can manage the risk.

---

This is my last note on the subject.

Eric


Re: Graphing Peering

2005-01-19 Thread Kevin

On Wed, 19 Jan 2005 14:37:54 -0800, andrew matthews [EMAIL PROTECTED] wrote:
 no i mean graph bgp sessions...
 
 it's a single interface, and i want to graph every bgp session so i
 can see how much traffic i'm doing between each peer.

If you are looking to graph statistics about the BGP peering sessions,
(rather than graphing transit router bytes in/out as suggested elsewhere),
you might take a look at the sample-config for the Cricket graphing tool,
specifically ~cricket/cricket-1.0.4/sample-config/routing

Unfortunately this graphs counts of BGP peering messages, not bytes.

Cricket can track BGP route announcements,  including graphing counts
(rates) of peer updates in/out along along with total BGP messages,
for each peering session.  You could use Cricket itself to view the data,
extract the collected data from 'rrdtool', or just look at the sources to
get an idea of the requisite Cisco OIDs to use in another tool entirely.

More information on Cricket is available from http://cricket.sourceforge.net/


Kevin


Re: panix hijack press

2005-01-19 Thread William Allen Simpson
Mark Jeftovic wrote:
On Wed, 19 Jan 2005, William Allen Simpson wrote:
 

(2) Registrants can't lock domains, it's a registrar-lock.  Users
can only ask that domains be locked.  Stupid policy, bad results.
   

 under the new policy if the registrar
employs it they must provide access to the registrant.
 

I stand corrected (although I cannot find it actually _in_ the policy);
it's good to learn something new every day. 

However, that still looks to me like Users can only ask that domains
be locked.  Unless you are claiming that users can send the lock
request directly to the registry, and monitor its status.
Thornton wrote:
i dont think anyone is blaming the victim...what evidence do you have to
support the domain being locked?
 

I repeat, the domain locking red-herring has absolutely nothing to do
with this domain hijacking.
Gosh officer, if she'd only had a big padlock on her purse, I wouldn't
have stolen it.
Gosh judge, if she'd only worn running shoes instead of those sexy high
heels, I couldn't catch and rape her; the shoes made me do it.
Stop blaming the victim!
a user can lock a domain..they can login to the control panel for there
registrar and select registrar lock, registrar-lock, or lock and i am
sure there are other registrars that word it even differently. once you
select that it effectively locks your domain so it cant be transfered.
 

Not that I've ever noticed.  Are you actually a network operator
anywhere?  Are you even _in_ North America?  Your email isn't
But then, the domain locking red-herring has absolutely nothing to do
with this domain hijacking.
Stop blaming the victim!
--
William Allen Simpson
   Key fingerprint =  17 40 5E 67 15 6F 31 26  DD 0D B9 9B 6A 15 2C 32


Re: Regarding registrar LOCK for panix.com

2005-01-19 Thread William Allen Simpson
Bruce Tonkin wrote:
The information we have so far, indicates that it was not on Registrar
LOCK at the registry at the time of the transfer.
 

No, the information we have so far is that it *WAS* supposed to be on 
registrar-lock!  Quoting Alexis Rosen, forwarded by TLS, Sun, 16 Jan 
2005 07:08:59 +:

 ...  Our understanding is that we had locks on all of our domains. 
 However, when we looked, locks were off on panix.net and panix.org,
 which we own but don't normally use.

[Your Honor, maybe she locked the door, but the door company didn't
install it correctly, otherwise I couldn't have ripped it off the hinges
and gone in and raped her; it's the door company's fault.]
Stop blaming the victim!  Stop blaming anybody else.
This was a Mel-IT error.
--
William Allen Simpson
   Key fingerprint =  17 40 5E 67 15 6F 31 26  DD 0D B9 9B 6A 15 2C 32


RE: Regarding registrar LOCK for panix.com

2005-01-19 Thread Bruce Tonkin

Hello William,

 
 Stop blaming the victim!  Stop blaming anybody else.
 


I at no stage have blamed the victim.   In fact I am sincerely sorry for
the damage caused to panix.com.

The transfer should NEVER have been initiated.   Melbourne IT has
consistently acknowledged the error.

I have however discussed the problem from the point of view of the
overall transfer process, as I want to improve it.   There have been
claims made on the list that the other parts of the system did not work.
I am providing factual information on what happened through the process,
and exposing the process to public review on this list.   
I have pointed out that the process can be strengthened.  This is in no
way blaming the victim.  It is the role of domain name registrars to
educate the registrants on their options.

To reiterate, for a .com name there are two optional checks/mechanisms
that can be used to further prevent an unauthorised transfer (and I will
say again, I agree that the transfer should not have ever been
initiated).

(1) A name may be placed by a registrar on Registrar-LOCK.  This is
optional, and it is up to a registrar to inform their customers of this
option.   The name was not on Registrar-LOCK at the time of the transfer
request.

(2) The Registry must advise the losing registrar of a transfer request.
I believe this happened, as I have a copy of the corresponding email
sent from the registry to the gaining registrar.  This does not mean
that the losing registrar actually received this email.

(3) The losing registrar MAY (ie it is an option available to the losing
registrar but not a requirement) send a confirmation message to the
registrant.   In this case it appears that this did not happen, possibly
because the confirmation message in (2) was never received by the losing
registrar. There is no end-to-end confirmation in the current RRP
system, for Verisign to be able to confirm that the losing registrar
actually received its notification.

To repeat again, I am not trying to escape any blame, not cast any blame
on any other party.  I am interested from an engineering point of view
in improving the process to avoid it happening again.

Regards,
Bruce








Re: panix hijack press

2005-01-19 Thread William Allen Simpson
William Allen Simpson wrote:
Not that I've ever noticed.  Are you actually a network operator
anywhere?  Are you even _in_ North America?  Your email isn't
To correct my own post, I saw Au, and assumed a shill for Mel-IT.
But it's Az, which is Arizona (still in North America this year).  My
question about actually operating a network still stands.
--
William Allen Simpson
   Key fingerprint =  17 40 5E 67 15 6F 31 26  DD 0D B9 9B 6A 15 2C 32


Confirmation of receipt of the transfer request at Verisign for panix.com

2005-01-19 Thread Bruce Tonkin

 
When a registrar sends a transfer request to the registry operator (and
the name is not on Registrar LOCK), the registry operator sends a
confirmation email to both the losing and gaining registrar.

Here is the copy of the email Melbourne IT received.

Regards,
Bruce Tonkin


 From [EMAIL PROTECTED] Sun Jan  9 12:40:35 2005
Return-Path: [EMAIL PROTECTED]
Received: from verisign-grs.org (snoopy.verisign-grs.net
[192.153.247.4])
by galahad.inww.com (8.12.9/8.12.9) with SMTP id j091eYgt003545
for ; Sun, 9 Jan 2005
12:40:35
 +1100 (EST)
Date: Sat, 8 Jan 2005 20:40:34 -0500
From: [EMAIL PROTECTED]
Message-Id: [EMAIL PROTECTED]
To: Melbourne IT
Reply-to: [EMAIL PROTECTED]
Subject: Receipt of Transfer Request: PANIX.COM


Transfer Request for:

Domain Name: PANIX.COM
Requesting Registrar: Melbourne IT, Ltd. d/b/a Internet Names Worldwide
Current Registrar: Dotster, Inc.


The VeriSign Global Registry Services has received your request to 
modify the domain name record for PANIX.COM to reflect the fact 
that the registrant has selected you to be its Registrar.  

By submitting the request using the 
Transfer command in the RRP, you have represented to the VeriSign
Global 
Registry Services and the Current Registrar that 
(1) you have obtained the 
requisite authorization from the domain name registrant listed in the
database of the 
Current Registrar, 
and (2) you have retained a copy of reliable evidence of 
the authorization.

Pursuant to established procedures, the VeriSign Global Registry 
Services has notified the Current Registrar of your request.  
If we receive an Affirmative response to our notice within 
five (5) calendar days, we will make the change to the domain name
record.  
If we receive a negative response to our notice within 
five (5) calendar days we will decline to transfer the domain name.  
If the Current Registrar takes no action within five (5) calendar days,
we 
will make the change to the record.

Sincerely,

VeriSign Global Registry Services
www.verisign-grs.com
[EMAIL PROTECTED]



improving the registrar transfer process

2005-01-19 Thread William Allen Simpson
Bruce Tonkin wrote:
To repeat again, I am not trying to escape any blame, not cast any blame
on any other party.  I am interested from an engineering point of view
in improving the process to avoid it happening again.
 

Good.  Thank you!  Early on in the process, Eric Brunner claimed you
were a decent guy, or so I interpreted it.
We know how to do 3-way handshakes.  Rather a fundamental of the
Internet.  So quickly folks forget
We knew in advance that the VRSN/NetSol/whatever protocol was terrible,
and that the ICANN policy change was not going to be helpful.
I think the notification process should parallel what anybody competent
would expect in a communications protocol.  Retry.  Several times. 
(Admittedly, I've been involved in protocol design for 28+ years, thus
have a tendency to see things that way.)

At the retry limit, declare the peer to be down.
In this case, the peer being down means taking all their domains away
and revoking their registrar status and the performance bond.
Accountability.  Responsibility.
--
William Allen Simpson
   Key fingerprint =  17 40 5E 67 15 6F 31 26  DD 0D B9 9B 6A 15 2C 32


Re: panix hijack press

2005-01-19 Thread Thornton

On Thu, 2005-01-20 at 00:49 -0500, William Allen Simpson wrote:
 William Allen Simpson wrote:
 
  Not that I've ever noticed.  Are you actually a network operator
  anywhere?  Are you even _in_ North America?  Your email isn't
 
 To correct my own post, I saw Au, and assumed a shill for Mel-IT.
 
 But it's Az, which is Arizona (still in North America this year).  My
 question about actually operating a network still stands.

Thats good..had me thinking..I'm not in North America..what...haha

and since it isn't really relevant..short answer is yes...and no that
isn't yes i am not in north America :-)