Re: Spam (un)blocking

2005-04-06 Thread Hank Nussbacher
At 06:43 PM 06-04-05 -0400, Daniel Senie wrote:
Since the uptake on IRT has been slow, and after much internal discussion, 
RIPE has decided to add an "abuse-mailbox" attribute.  For further details see:
https://www.ripe.net/ripe/maillists/archives/db-wg/2005/msg00015.html

-Hank

At 06:10 PM 4/6/2005, JP Velders wrote:

> Date: Wed, 6 Apr 2005 14:54:08 -0400
> From: Adam Jacob Muller <[EMAIL PROTECTED]>
> Subject: Spam (un)blocking
> [ ... ]
> Second, is there some way to mark my block of addresses is owned by
> responsible responsive system administrators.
Over here in "RIPE land" so to speak, several ISP's (most notably
FIRST members) have put a lot of effort in getting 'IRT' objects in
the RipeDB.
$ whois -h whois.ripe.net -r 194.171.31.0 | egrep 
'^(inetnum|remarks|mnt-irt):'
inetnum:  194.171.31.0 - 194.171.31.255
remarks:  utilized by 802.1x authenticated guests utilizing EduRoam
remarks:  see http://www.eduroam.nl/ for more information
remarks:  in case of abuse: [EMAIL PROTECTED] and [EMAIL PROTECTED]
mnt-irt:  irt-SURFnet-CERT
And this is MUCH appreciated. When trying to figure out where to send spam 
complaints, a network that's taken the time to put their abuse address in 
their records certainly appears to at least care, and so gets better treatment.

That IRT object (I believe there were efforts underway for a similar
system in the ARINdb, but I haven't followed it for over a year :( )
is an object to identify the "Incident Response Team" which can be
contacted regarding certain blocks of space.
$ whois -h whois.ripe.net -r irt-SURFnet-CERT | egrep 
'^(irt|signature|encryption|remarks|mnt-by):'
irt:  irt-SURFNET-CERT
signature:PGPKEY-A6D57ECE
encryption:   PGPKEY-A6D57ECE
remarks:  SURFNET-CERT is the Computer Emergency
remarks:  Response Team of SURFnet
remarks:  This is a TI accredited CSIRT
remarks:  (see http://www.ti.terena.nl/teams/level2.html)
mnt-by:   TRUSTED-INTRODUCER-MNT

More information can be found in Google, or on the FAQ by Jan Meijer:
http://www.surfnetters.nl/meijer/tf-csirt/irt-object-faq.html
> We have tech support on duty 24/7 and abuse complaints are dealt
> with in a timely manner, so I am wondering if there is a way to
> communicate our willingness to help in the fight against spam.
Replace spam with abuse and you have something like the IRT object. ;D
No doubt someone on NANOG knows what's happening with the ARIN version ;)
(or if there will be one, if people want it, etc.)
SWIPs can hold abuse contact info. Again, this is a good thing for folks 
to do.

+++
This Mail Was Scanned By Mail-seCure System
at the Tel-Aviv University CC.



Re: The power of default configurations

2005-04-06 Thread Mark Andrews


In article <[EMAIL PROTECTED]> you write:
>
>
>On 4/6/2005 5:00 PM, Sean Donelan wrote:
>
>> Why does BIND forward lookups for RFC1918 addresses by default?
>
>As has been pointed out already, caches need to be able to ask other
>(local) servers for the PTRs.
>
>OTOH, it might make a good feature (and eventually maybe a BCP) to block
>PTR queries for 1918 space from going to the roots and TLD servers.
>
>-- 
>Eric A. Hallhttp://www.ehsco.com/
>Internet Core Protocols  http://www.oreilly.com/catalog/coreprot/

The first step in getting these sorts queries stomped on
in the right places is coming with the rewording of the ULA
draft DNS Issues section which allows nameservers to default
to returning rcode 3 (NXDOMAIN/Name Error).

The next step is to do this as a general draft which covers
all the different suffixes.

Mark

4.4 DNS Issues


At the present time  and PTR records for locally assigned local
IPv6 addresses are not recommended to be installed in the global
DNS.

For background on this recommendation, one of the concerns about
adding  and PTR records to the global DNS for locally assigned
Local IPv6 addresses stems from the lack of complete assurance that
the prefixes are unique. There is a small possibility that the same
locally assigned IPv6 Local addresses will be used by two different
organizations both claiming to be authoritative with different
contents. In this scenario, it is likely there will be a connection
attempt to the closest host with the corresponding locally assigned
IPv6 Local address. This may result in connection timeouts, connection
failures indicated by ICMP Destination Unreachable messages, or
successful connections to the wrong host. Due to this concern,
adding  records for these addresses to the global DNS is thought
to be unwise.

Reverse (address-to-name) queries for locally assigned IPv6 Local
addresses MUST NOT be sent to name servers for the global DNS, due
to the load that such queries would create for the authoritative
name servers for the ip6.arpa zone. This form of query load is not
specific to locally assigned Local IPv6 addresses; any current form
of local addressing creates additional load of this kind, due to
reverse queries leaking out of the site. However, since allowing
such queries to escape from the site serves no useful purpose, there
is no good reason to make the existing load problems worse.

The recommended way to avoid sending such queries to nameservers
for the global DNS is for recursive name server implementations to
act as if they were authoritative for an empty d.f.ip6.arpa zone
and return RCODE 3 for any such query. Implementations that choose
this strategy should allow it to be overridden, but returning an
RCODE 3 response for such queries should be the default, both because
this will reduce the query load problem and also because, if the
site administrator has not set up the reverse tree corresponding
to the locally assigned IPv6 Local addresses in use, returning RCODE
3 is in fact the correct answer.



Re: The power of default configurations

2005-04-06 Thread Sean Donelan

On Thu, 7 Apr 2005, Florian Weimer wrote:
> > Why isn't the default not to forward RFC1918 addresses (and martian
> > addresses).
>
> Is the fraction of PTR lookups for RFC 1918 space really that high?

Ask the ASN 112 folks how many queries their servers handle.

http://www.as112.net/


RE: BGP Anywhere - Global Redundancy

2005-04-06 Thread Steve Gibbard
On Wed, 6 Apr 2005, Vandy Hamidi wrote:
I definitely want 100% of traffic going towards the Primary Site during
normal operation.
LocalPref/MED can be controlled by community strings with my direct
peers.  As you said, I'm paying them for the service, but how will the
advertisement behave after it propagates to their upstream peers?  At
that point AS Path should be the only determining factor, yes?
Nope.  You're at the mercy of whatever traffic engineering or 
local-preffing other networks decide to do, and you won't have any control 
over it.

Are ISP to ISP transit routes manipulated at MED or LocalPref levels?  I
suppose some ISPs may mark some peer with a preferential MED.
Yes.
I was turned on to BGP anywhere when reading up on UltraDNS.  Looks like
they use it for Global load balancing in which a DNS server on the East
Coast will respond to DNS queries to my East Coast DC and the same for
the west coast.  They guarantee 100% DNS response, so I imagine it works
for them.
Has anyone on the list performed BGP Anywhere?  There has to be someone
on Nanog that has done this.
This is more often known as Anycast.
I run the network infrastructure for the PCH Anycast DNS network.
It works well for trying to get traffic to come into multiple places. 
When we have a site go down, we withdraw the routing announcements from 
that location.

Trying to get traffic to go to only one place while sourcing BGP 
announcements from multiple places won't work very well.

-Steve


RE: BGP Anywhere - Global Redundancy

2005-04-06 Thread Vandy Hamidi

I definitely want 100% of traffic going towards the Primary Site during
normal operation.

LocalPref/MED can be controlled by community strings with my direct
peers.  As you said, I'm paying them for the service, but how will the
advertisement behave after it propagates to their upstream peers?  At
that point AS Path should be the only determining factor, yes?

Are ISP to ISP transit routes manipulated at MED or LocalPref levels?  I
suppose some ISPs may mark some peer with a preferential MED.

I was turned on to BGP anywhere when reading up on UltraDNS.  Looks like
they use it for Global load balancing in which a DNS server on the East
Coast will respond to DNS queries to my East Coast DC and the same for
the west coast.  They guarantee 100% DNS response, so I imagine it works
for them.

Has anyone on the list performed BGP Anywhere?  There has to be someone
on Nanog that has done this.

Anyone from UltraDNS?

-=Vandy=-



-Original Message-
From: Steve Gibbard [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, April 06, 2005 5:48 PM
To: Vandy Hamidi
Cc: nanog@merit.edu
Subject: Re: BGP Anywhere - Global Redundancy

On Wed, 6 Apr 2005, Vandy Hamidi wrote:

>
> All,
> We're an ASP and are considering adding a secondary Backup Datacenter
> (BDC) in the US to protect our web presence.
>
> My goal is to ensure automatic failover of my Primary DC's (IP)
traffic
> to the BDC in the event of a catastrophic failure of the PDC.
>
> I'm considering geographic load balancing and BGP Anywhere as the two
> options.  I'm clear on how the Geo LB works, but have some doubts
about
> BGPAW as I've never implemented it before and documentation online is
> pretty weak to non-existent.
>
> Below is how I believe it should be done.
>> From PDC:
>   -Advertise CIDR block to all peers w/good metric (0 hop count)
>> From BDC:
>   -Advertise same CIDR block to all peers w/poor metric (+20 hop
> count)

To clarify, you want no traffic coming into the backup site when the 
primary site is up, right?

Assuming a random set of peers and upstreams, this won't actually do
what 
I think you're trying to do.  Since local-preference overrides MEDs and
AS 
path lengths, and since you don't have control over what goes on in
other 
networks, you'll likely get some traffic coming into your backup site
even 
when you don't intend it to.

You could *maybe* get around this by having the same transit provider 
(probably just one in this case, which is scary for other reasons) in
both 
locations.  If you're paying somebody money, you have a much better
chance 
of getting them to follow your desired routing policy.  Still, it's
really 
not good to be making a routing announcement somewhere where you don't 
want to receive traffic.

You'd probably be better off looking into Cisco's "conditional routing" 
feature (I assume other vendors do something similar).  This allows you
to 
set a router to make an announcement only if it stops receiving some 
route, so you could have your backup site look for the primary site to
go 
away and then start sourcing the route.

Failover time would probably be at most a minute or two, maybe better.

You could also look into various DNS-based ways of doing this.

-Steve



Re: The power of default configurations

2005-04-06 Thread Eric A. Hall


On 4/6/2005 5:00 PM, Sean Donelan wrote:

> Why does BIND forward lookups for RFC1918 addresses by default?

As has been pointed out already, caches need to be able to ask other
(local) servers for the PTRs.

OTOH, it might make a good feature (and eventually maybe a BCP) to block
PTR queries for 1918 space from going to the roots and TLD servers.

-- 
Eric A. Hallhttp://www.ehsco.com/
Internet Core Protocols  http://www.oreilly.com/catalog/coreprot/


Re: The power of default configurations

2005-04-06 Thread Florian Weimer

* Sean Donelan:

> On Mon, 4 Apr 2005, Paul Vixie wrote:
>> adding more.  oh and as long as you're considering whether to restrict
>> things to your LAN/campus/ISP, i'm ready to see rfc1918 filters deployed...
>
> Why does BIND forward lookups for RFC1918 addresses by default?

I think Paul complained about DNS queries with source addresses from
RFC 1918 space.  It's hard to stop this without using connected UDP
sockets.

> Why isn't the default not to forward RFC1918 addresses (and martian
> addresses).

Is the fraction of PTR lookups for RFC 1918 space really that high?

> If a sysadmin is using BIND in a local network which uses RFC1918
> address, those sysdmins can change their configuration?

They already have to, otherwise the queries won't hit their
authoritative servers.


Re: BGP Anywhere - Global Redundancy

2005-04-06 Thread Steve Gibbard
On Wed, 6 Apr 2005, Vandy Hamidi wrote:
All,
We're an ASP and are considering adding a secondary Backup Datacenter
(BDC) in the US to protect our web presence.
My goal is to ensure automatic failover of my Primary DC's (IP) traffic
to the BDC in the event of a catastrophic failure of the PDC.
I'm considering geographic load balancing and BGP Anywhere as the two
options.  I'm clear on how the Geo LB works, but have some doubts about
BGPAW as I've never implemented it before and documentation online is
pretty weak to non-existent.
Below is how I believe it should be done.
From PDC:
	-Advertise CIDR block to all peers w/good metric (0 hop count)
From BDC:
-Advertise same CIDR block to all peers w/poor metric (+20 hop
count)
To clarify, you want no traffic coming into the backup site when the 
primary site is up, right?

Assuming a random set of peers and upstreams, this won't actually do what 
I think you're trying to do.  Since local-preference overrides MEDs and AS 
path lengths, and since you don't have control over what goes on in other 
networks, you'll likely get some traffic coming into your backup site even 
when you don't intend it to.

You could *maybe* get around this by having the same transit provider 
(probably just one in this case, which is scary for other reasons) in both 
locations.  If you're paying somebody money, you have a much better chance 
of getting them to follow your desired routing policy.  Still, it's really 
not good to be making a routing announcement somewhere where you don't 
want to receive traffic.

You'd probably be better off looking into Cisco's "conditional routing" 
feature (I assume other vendors do something similar).  This allows you to 
set a router to make an announcement only if it stops receiving some 
route, so you could have your backup site look for the primary site to go 
away and then start sourcing the route.

Failover time would probably be at most a minute or two, maybe better.
You could also look into various DNS-based ways of doing this.
-Steve


BGP Anywhere - Global Redundancy

2005-04-06 Thread Vandy Hamidi

All,
We're an ASP and are considering adding a secondary Backup Datacenter
(BDC) in the US to protect our web presence. 

My goal is to ensure automatic failover of my Primary DC's (IP) traffic
to the BDC in the event of a catastrophic failure of the PDC.

I'm considering geographic load balancing and BGP Anywhere as the two
options.  I'm clear on how the Geo LB works, but have some doubts about
BGPAW as I've never implemented it before and documentation online is
pretty weak to non-existent.

Below is how I believe it should be done.
>From PDC:
-Advertise CIDR block to all peers w/good metric (0 hop count)
>From BDC:
-Advertise same CIDR block to all peers w/poor metric (+20 hop
count)

During normal operation, all ASes will route production traffic to PDC.
In the event of catastrophic failure at PDC; PDC advertisements will
cease, BDC route will become the only one on the net and traffic will
route to the BDC.

Questions:
1) Will this work?
2) Other suggestions or alternatives?
3) Any chance that traffic could flow to BDC for any reason?
4) Any internet etiquette I could be ignoring?
5) What would you estimate the failover time would be?
6) Assuming the routers at PDC and BDC pull down full routing table, how
will the receipt of the PDC CIDR advertisement be treated?  BGP rules
say it will be dropped as a routing loop.  What alternatives would I
have if I want to be able to route that CIDR block traffic from the BDC
to the PDC.  Confed?  Cisco conditional advertisements?


Thanks all.  This is the only place I can think of that would have the
expertise to comment.

-=Vandy=-



Re: Router choice for medium size hosting provider

2005-04-06 Thread Bill Woodcock

> Do  you need BGP?  That's going to make a big difference in what you
> want to use.   An idea on the number/type of interfaces you need would
> be helpful as well.

A 2811 will do BGP just fine...  760mb of RAM and plenty of CPU.  In terms 
of interfaces, it can nominally take four GigE and eighteen 100Base-T 
interfaces, though I believe it's only rated for 4.8gbps total throughput.  
How real that number actually is I don't guess we'll know until someone 
tries it in the lab.  I haven't had time yet.

-Bill



Re: Router choice for medium size hosting provider

2005-04-06 Thread Mark Radabaugh
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Alex Campbell wrote:
|
| Hi everyone,
|
| I'm looking for a new router to connect our data center to our tier
| 1 ISP via a 50mbps fibre link.  Does anyone have any advice about
| what level of Cisco router would be required to saturate this link?
|
|
| We're looking at the 2811 but I can't get any real world data about
| whether it can route packets at 50mbps - this seems doubtful
| although unclear from the information on the Cisco data sheets.
|
| (I'm aware that a cheap PC running Linux could provide similar
| throughput to a $2 Cisco router but for a variety of reasons
| I'm reluctant to follow this path).
|
| Thanks,
|
| Alex
|
Do  you need BGP?  That's going to make a big difference in what you
want to use.   An idea on the number/type of interfaces you need would
be helpful as well.
Mark Radabaugh
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.0 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFCVHtNg0PQSWMG2wsRArOOAKCWwM70hEx2dxGDBU/yWK1Jn+4AnACdFGpD
7fJ9wZFncJ2Mq4OJPDyqWPQ=
=TQfK
-END PGP SIGNATURE-


Router choice for medium size hosting provider

2005-04-06 Thread Alex Campbell


Hi everyone,

I'm looking for a new router to connect our data center to our tier 1 ISP
via a 50mbps fibre link.  Does anyone have any advice about what level of
Cisco router would be required to saturate this link?

We're looking at the 2811 but I can't get any real world data about whether
it can route packets at 50mbps - this seems doubtful although unclear from
the information on the Cisco data sheets.

(I'm aware that a cheap PC running Linux could provide similar throughput to
a $2 Cisco router but for a variety of reasons I'm reluctant to follow
this path).

Thanks,

Alex




Re: Spam (un)blocking

2005-04-06 Thread Daniel Senie
At 06:10 PM 4/6/2005, JP Velders wrote:

> Date: Wed, 6 Apr 2005 14:54:08 -0400
> From: Adam Jacob Muller <[EMAIL PROTECTED]>
> Subject: Spam (un)blocking
> [ ... ]
> Second, is there some way to mark my block of addresses is owned by
> responsible responsive system administrators.
Over here in "RIPE land" so to speak, several ISP's (most notably
FIRST members) have put a lot of effort in getting 'IRT' objects in
the RipeDB.
$ whois -h whois.ripe.net -r 194.171.31.0 | egrep 
'^(inetnum|remarks|mnt-irt):'
inetnum:  194.171.31.0 - 194.171.31.255
remarks:  utilized by 802.1x authenticated guests utilizing EduRoam
remarks:  see http://www.eduroam.nl/ for more information
remarks:  in case of abuse: [EMAIL PROTECTED] and [EMAIL PROTECTED]
mnt-irt:  irt-SURFnet-CERT
And this is MUCH appreciated. When trying to figure out where to send spam 
complaints, a network that's taken the time to put their abuse address in 
their records certainly appears to at least care, and so gets better treatment.

That IRT object (I believe there were efforts underway for a similar
system in the ARINdb, but I haven't followed it for over a year :( )
is an object to identify the "Incident Response Team" which can be
contacted regarding certain blocks of space.
$ whois -h whois.ripe.net -r irt-SURFnet-CERT | egrep 
'^(irt|signature|encryption|remarks|mnt-by):'
irt:  irt-SURFNET-CERT
signature:PGPKEY-A6D57ECE
encryption:   PGPKEY-A6D57ECE
remarks:  SURFNET-CERT is the Computer Emergency
remarks:  Response Team of SURFnet
remarks:  This is a TI accredited CSIRT
remarks:  (see http://www.ti.terena.nl/teams/level2.html)
mnt-by:   TRUSTED-INTRODUCER-MNT

More information can be found in Google, or on the FAQ by Jan Meijer:
http://www.surfnetters.nl/meijer/tf-csirt/irt-object-faq.html
> We have tech support on duty 24/7 and abuse complaints are dealt
> with in a timely manner, so I am wondering if there is a way to
> communicate our willingness to help in the fight against spam.
Replace spam with abuse and you have something like the IRT object. ;D
No doubt someone on NANOG knows what's happening with the ARIN version ;)
(or if there will be one, if people want it, etc.)
SWIPs can hold abuse contact info. Again, this is a good thing for folks to 
do.



Re: The power of default configurations

2005-04-06 Thread JP Velders


> Date: Wed, 6 Apr 2005 18:00:05 -0400 (EDT)
> From: Sean Donelan <[EMAIL PROTECTED]>
> To: nanog@merit.edu
> Subject: The power of default configurations

> On Mon, 4 Apr 2005, Paul Vixie wrote:
> > adding more.  oh and as long as you're considering whether to restrict
> > things to your LAN/campus/ISP, i'm ready to see rfc1918 filters deployed...

> Why does BIND forward lookups for RFC1918 addresses by default?  Why isn't
> the default not to forward RFC1918 addresses (and martian addresses).  If
> a sysadmin is using BIND in a local network which uses RFC1918 address,
> those sysdmins can change their configuration?

RFC1918 space is space you can use inside of an organization in the
same way you could use non-RFC1918 space. If a program would treat it
differently that would only make sense if that program could only be
used in such a way that it would *have* to treat it differently.

Regards,
JP Velders


Re: Spam (un)blocking

2005-04-06 Thread JP Velders


> Date: Wed, 6 Apr 2005 14:54:08 -0400
> From: Adam Jacob Muller <[EMAIL PROTECTED]>
> Subject: Spam (un)blocking

> [ ... ]
> Second, is there some way to mark my block of addresses is owned by
> responsible responsive system administrators.

Over here in "RIPE land" so to speak, several ISP's (most notably
FIRST members) have put a lot of effort in getting 'IRT' objects in
the RipeDB.

$ whois -h whois.ripe.net -r 194.171.31.0 | egrep '^(inetnum|remarks|mnt-irt):'
inetnum:  194.171.31.0 - 194.171.31.255
remarks:  utilized by 802.1x authenticated guests utilizing EduRoam
remarks:  see http://www.eduroam.nl/ for more information
remarks:  in case of abuse: [EMAIL PROTECTED] and [EMAIL PROTECTED]
mnt-irt:  irt-SURFnet-CERT

That IRT object (I believe there were efforts underway for a similar
system in the ARINdb, but I haven't followed it for over a year :( )
is an object to identify the "Incident Response Team" which can be
contacted regarding certain blocks of space.

$ whois -h whois.ripe.net -r irt-SURFnet-CERT | egrep 
'^(irt|signature|encryption|remarks|mnt-by):'
irt:  irt-SURFNET-CERT
signature:PGPKEY-A6D57ECE
encryption:   PGPKEY-A6D57ECE
remarks:  SURFNET-CERT is the Computer Emergency
remarks:  Response Team of SURFnet
remarks:  This is a TI accredited CSIRT
remarks:  (see http://www.ti.terena.nl/teams/level2.html)
mnt-by:   TRUSTED-INTRODUCER-MNT

More information can be found in Google, or on the FAQ by Jan Meijer:
http://www.surfnetters.nl/meijer/tf-csirt/irt-object-faq.html

> We have tech support on duty 24/7 and abuse complaints are dealt
> with in a timely manner, so I am wondering if there is a way to
> communicate our willingness to help in the fight against spam.

Replace spam with abuse and you have something like the IRT object. ;D

No doubt someone on NANOG knows what's happening with the ARIN version ;)
(or if there will be one, if people want it, etc.)

Regards,
JP Velders


The power of default configurations

2005-04-06 Thread Sean Donelan

On Mon, 4 Apr 2005, Paul Vixie wrote:
> adding more.  oh and as long as you're considering whether to restrict
> things to your LAN/campus/ISP, i'm ready to see rfc1918 filters deployed...

Why does BIND forward lookups for RFC1918 addresses by default?  Why isn't
the default not to forward RFC1918 addresses (and martian addresses).  If
a sysadmin is using BIND in a local network which uses RFC1918 address,
those sysdmins can change their configuration?




ping from the arone armies list

2005-04-06 Thread Gadi Evron
Okay, we have slowly expanded our monthly reports to include more 
details. From what vendors actually do something about the problem, 
their success rates, numbers, etc.

We intend to release more information in the future.
This is a ping, to see what kind of other information you'd like to see.
We'd appreciate your input.
	Gadi Evron.


Re: Spam (un)blocking

2005-04-06 Thread Larry Smith

On Wednesday 06 April 2005 13:54, Adam Jacob Muller wrote:
> Hi,
> I'm a network operator at a small hosting company that has about a /20
> slice of IP addresses. Recently we have suffered a few break-ins (and
> some fraud) which caused a large quantity of spam to find it's way onto
> the internet.
> This has resulted in some of our network space being listed in several
> DNS blacklists, and being blacklisted by individual ISPs.
> So my question is this.
> Firstly, what is the best way to remove myself from each of these
> blacklists, if there is anything aside from going to each one
> individually and saying "i'm not spamming anymore".
> Second, is there some way to mark my block of addresses is owned by
> responsible responsive system administrators.
> We have tech support on duty 24/7 and abuse complaints are dealt with
> in a timely manner, so I am wondering if there is a way to communicate
> our willingness to help in the fight against spam.
>
>
> Thanks,
> Adam Jacob Muller

Adam,

  As JD already mentioned, many will most probably go away within a few days 
if there is not other "spam" from the IP space to keep the entry active.  
Quite a few have web space, so if you know the BL that is blocking, you might 
look and see if there are "remove" instructions/capability.

Only other thing I can think of would be to register your domain(s) with 
abuse.net.  Personally that is one of the first places I check domains 
against (if they have a "valid" abuse address) then I report first and block 
second or third. (meaning if the spam continues after reporting)...

-- 
Larry Smith
SysAd ECSIS.NET
[EMAIL PROTECTED]




Re: Spam (un)blocking

2005-04-06 Thread J.D. Falk

On 04/06/05, Adam Jacob Muller <[EMAIL PROTECTED]> wrote: 

> Firstly, what is the best way to remove myself from each of these 
> blacklists, if there is anything aside from going to each one 
> individually and saying "i'm not spamming anymore".

Right now, that's about it -- but many folks only do temporary
blocking based on recent traffic patterns, so you can also just 
wait a few days and I bet some of the problem will go away.

> Second, is there some way to mark my block of addresses is owned by 
> responsible responsive system administrators.

If there was, the spammers would be the first to adopt it.

> We have tech support on duty 24/7 and abuse complaints are dealt with 
> in a timely manner, so I am wondering if there is a way to communicate 
> our willingness to help in the fight against spam.

http://www.maawg.org/ is probably the best industry group
focused on these issues right now.

-- 
J.D. Falk   As a carpenter bends the seat of a chariot
<[EMAIL PROTECTED]>I bend this frenzy round my heart.


Spam (un)blocking

2005-04-06 Thread Adam Jacob Muller
Hi,
I'm a network operator at a small hosting company that has about a /20 
slice of IP addresses. Recently we have suffered a few break-ins (and 
some fraud) which caused a large quantity of spam to find it's way onto 
the internet.
This has resulted in some of our network space being listed in several 
DNS blacklists, and being blacklisted by individual ISPs.
So my question is this.
Firstly, what is the best way to remove myself from each of these 
blacklists, if there is anything aside from going to each one 
individually and saying "i'm not spamming anymore".
Second, is there some way to mark my block of addresses is owned by 
responsible responsive system administrators.
We have tech support on duty 24/7 and abuse complaints are dealt with 
in a timely manner, so I am wondering if there is a way to communicate 
our willingness to help in the fight against spam.

Thanks,
Adam Jacob Muller


Cisco Security Advisory: Vulnerabilities in Cisco IOS Secure Shell Server

2005-04-06 Thread Cisco Systems Product Security Incident Response Team

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Cisco Security Advisory:
===
Vulnerabilities in Cisco IOS Secure Shell Server


Revision 1.0

For Public Release 2005 April 06 1600 UTC (GMT)

- ---

Contents


Summary
Affected Products
Details
Impact
Software Versions and Fixes
Obtaining Fixed Software
Workarounds
Exploitation and Public Announcements
Status of This Notice: FINAL
Distribution
Revision History
Cisco Security Procedures

- ---

Summary
===

Certain release trains of Cisco Internetwork Operating System (IOS),
when configured to use the IOS Secure Shell (SSH) server in combination
with Terminal Access Controller Access Control System Plus (TACACS+) as
a means to perform remote management tasks on IOS devices, may contain
two vulnerabilities that can potentially cause IOS devices to exhaust
resources and reload. Repeated exploitation of these vulnerabilities
can result in a Denial of Service (DoS) condition. Use of SSH with
Remote Authentication Dial In User Service (RADIUS) is not affected by
these vulnerabilities.

Cisco has made free software available to address these vulnerabilities
for all affected customers. There are workarounds available to mitigate
the effects of the vulnerability (see the Workarounds section.)

This advisory will be posted at
http://www.cisco.com/warp/public/707/cisco-sa-20050406-ssh.shtml.

Affected Products
=

Vulnerable Products
+--

These issues affect any Cisco device running an unfixed version of
Cisco IOS that supports, and is configured to use, the SSH server
functionality.

To determine the software running on a Cisco product, log in to the
device and issue the show version command to display the system banner.
Cisco IOS Software will identify itself as "Internetwork Operating
System Software" or simply "IOS." The image name will be displayed
between parentheses shortly after this identification (possibly in the
next line), followed by "Version" and the IOS release name. Other Cisco
devices will not have the show version command or will give different
output.

The following example identifies a Cisco device running IOS release
12.2(15)T14 (release train label "12.2T") with an installed image name
of C806-K9OSY6-M:

Router1>show version
Cisco Internetwork Operating System Software
IOS (tm) C806 Software (C806-K9OSY6-M), Version 12.2(15)T14, RELEASE 
SOFTWARE (fc4)
[...]


The next example shows a device running IOS release 12.3(10) (release
train label "12.3 mainline") with an image name of C2600-IK9OS3-M:

Router2>show version
Cisco Internetwork Operating System Software
IOS (tm) C2600 Software (C2600-IK9O3S3-M), Version 12.3(10), RELEASE 
SOFTWARE (fc3)
[...]


Additional information about Cisco IOS release naming can be found at
http://www.cisco.com/warp/public/620/1.html.

SSH protocol was introduced in the following IOS release trains:

  * IOS 12.0S (SSH version 1)
  * IOS 12.1T (SSH version 1)
  * IOS 12.2 (SSH version 1)
  * IOS 12.2T (SSH version 1)
  * IOS 12.3T (SSH version 2)

To determine if the IOS image that your IOS device is running supports
the server side of the SSH protocol, whether it is enabled (if
supported), and the SSH protocol version being used (if SSH is
supported and enabled), use the show ip ssh command in global mode:

Router>show ip ssh
SSH Enabled - version 1.5
Authentication timeout: 120 secs; Authentication retries: 3


The previous output shows that SSH is enabled on this device and that
the SSH protocol major version that is being supported is 1. Possible
values for the SSH protocol version reported by IOS are:

  * 1.5: only SSH protocol version 1 is enabled.
  * 1.99: SSH protocol version 2 with SSH protocol version 1
compatibility enabled.
  * 2.0: only SSH protocol version 2 is enabled.

For more information about SSH versions in IOS, please check the
following URL:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123newft/123t/123t_7/gt_ssh2.htm.

Note:  SSH protocols versions 1 and 2 cannot interoperate, but usually
a SSH server knows how to handle connections from clients using either
version of the protocol, but in most cases the server has to be
explicitly configured to do this. The latest revision of protocol
version 1 is "1.5", which is documented in a now expired Internet
Engineering Task Force (IETF) draft.

The show ip ssh command was introduced in IOS release 12.1(1)T. If this
command is not available then the IOS image in use does not have SSH
server support and therefore it is not vulnerable to the issues
discussed in this advisory.

As you will see in the Details section, the behavio

Cisco Security Advisory: Vulnerabilities in the Internet Key Exchange Xauth Implementation

2005-04-06 Thread Cisco Systems Product Security Incident Response Team

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Cisco Security Advisory: 

Vulnerabilities in the Internet Key Exchange Xauth Implementation
=

Revision 1.0

For Public Release 2005 April 6 1600 UTC

- 
---

Contents

Summary
Affected Products
Details
Impact
Software Versions and Fixes
Obtaining Fixed Software
Workarounds
Exploitation and Public Announcements
Status of This Notice: FINAL
Distribution
Revision History
Cisco Security Procedures

- 
---

Summary
===

Cisco Internetwork Operating System (IOS) Software release trains 12.2T, 12.3
and 12.3T may contain vulnerabilities in processing certain Internet Key
Exchange (IKE) Xauth messages when configured to be an Easy VPN Server.

Successful exploitation of these vulnerabilities may permit an unauthorized
user to complete authentication and potentially access network resources.

This advisory will be posted to 
http://www.cisco.com/warp/public/707/cisco-sa-20050406-xauth.shtml

Cisco has made free software available to address this vulnerability for
affected customers.

Affected Products
=

Vulnerable Products
+--

This issue affects all Cisco devices running any unfixed version of Cisco IOS
that supports, and is configured for, Cisco Easy VPN Server Xauth version 6
authentication.

A Cisco device running Easy VPN Server and configured for Xauth authentication
will have the following line in the configuration:

  crypto map  client authentication list 

The Easy VPN Server XAUTH feature may also be enabled underneath an ISAKMP
profile via a configuration similar to:

  crypto isakmp profile  
match identity group 
client authentication list 
isakmp authentication list 
client configuration address respond
qos-group 2

To determine the software running on a Cisco product, log in to the device and
issue the 'show version' command to display the system banner. Cisco IOS
Software will identify itself as "Internetwork Operating System Software" or
simply "IOS." On the next line of output, the image name will be displayed
between parentheses, followed by "Version" and the IOS release name. Other
Cisco devices will not have the show version command or will give different
output.

The following example identifies a Cisco product running IOS release 12.3(6)
with an installed image name of C3640-I-M:

   Cisco Internetwork Operating System Software
   IOS (tm) 3600 Software (C3640-I-M), Version 12.3(6), RELEASE SOFTWARE (fc3)

The next example shows a product running IOS release 12.3(11)T3 with an image
name of C3845-ADVIPSERVICESK9-M:

   Cisco IOS Software, 3800 Software (C3845-ADVIPSERVICESK9-M), Version 
12.3(11)T3, RELEASE SOFTWARE (fc4)
   Technical Support: http://www.cisco.com/techsupport
   Copyright (c) 1986-2005 by Cisco Systems, Inc.

Additional information about Cisco IOS release naming can be found at 
http://www.cisco.com/warp/public/620/1.html.

Cisco Easy VPN Server is an IOS-only feature. Devices that do not run IOS are
not vulnerable.

No other Cisco products are currently known to be affected by these
vulnerabilities.

Details
===

IPSec is a framework of open standards that provides data confidentiality, data
integrity, and data authentication between participating peers. IPSec provides
these security services at the IP layer allowing for data to be transmitted
across a public network without fear of observation, modification, or spoofing,
thus enabling applications such as Virtual Private Networks (VPNs). IPSec uses
the Internet Key Exchange (IKE) protocol to provide authentication of the IPSec
peers, negotiate IPSec security associations (SA), and establish IPSec keys.

Extended Authentication (XAUTH) is an extension to IKE defined in an expired
Internet Engineering Task Force (IETF) Internet Draft,
draft-ietf-ipsec-isakmp-xauth-06.txt, which allows for organizations to utilize
existing legacy authentication methods in order to manage remote access.

Successful VPN establishment consists of two levels of SA's known as phases.
Phase 1 authentication establishes session keys. Using the Xauth feature, the
client waits for a "username/password" challenge after the IKE Phase 1 SA has
been established. When the end user responds to the challenge, the response is
forwarded to the IPsec peers for an additional level of authentication.

The Cisco IOS Easy VPN Server feature introduced in IOS 12.2(8)T allows an IOS
device to act as a VPN concentrator, providing authentication and encrypted
access to network resources.

To determine if Cisco's Easy VPN Server XAUTH feature is enabled, check the
device's configuration

Re: rack-mount tool drawers/chests?

2005-04-06 Thread Brandon Butterworth

Depends on your choice of tools but these are handy -

http://www.canford.co.uk/commerce/resources/catdetails/2458.pdf
http://www.canford.co.uk/commerce/resources/catdetails/2457.pdf
http://www.canford.co.uk/commerce/resources/catdetails/2628.pdf



Re: rack-mount tool drawers/chests?

2005-04-06 Thread Dan Armstrong
http://www.middleatlantic.com/

Eric A. Hall wrote:
anybody recommend any 19" rackmount tool drawers or chests? like, a
Snap-On red metal tool chest with locking drawers and such? I've looked
around but can't find anything, although I'm probably not looking in the
right places.
thanks
 




RE: rack-mount tool drawers/chests?

2005-04-06 Thread Mark Borchers

> anybody recommend any 19" rackmount tool drawers or chests? like, a
> Snap-On red metal tool chest with locking drawers and such? 
> I've looked
> around but can't find anything, although I'm probably not 
> looking in the
> right places.
> 
Chatsworth has some accessories that might suit your requirement.
For example:
http://www.chatsworth.com/catalog/section2/sec2pgQ.asp




rack-mount tool drawers/chests?

2005-04-06 Thread Eric A. Hall


anybody recommend any 19" rackmount tool drawers or chests? like, a
Snap-On red metal tool chest with locking drawers and such? I've looked
around but can't find anything, although I'm probably not looking in the
right places.

thanks

-- 
Eric A. Hallhttp://www.ehsco.com/
Internet Core Protocols  http://www.oreilly.com/catalog/coreprot/


Re: RIPE50: Peering BoF

2005-04-06 Thread Elmar K. Bins

Hi Cara,

> Since quite a few of you are also attending the RIPE meetings Susan
> though it would be a good idea for me to mention that a (European)
> Peering BoF will take place in Stockholm at RIPE50 on Sunday 1st May
> 2005 and from 18.00 to around 21.00. 

Unfortunately for me, this comes a little late. I'll join the mob
on monday. Have fun discussing peerings and remember to announce
earlier next time.

Elmar.




Keeping up with daylight savings time, datacenter style

2005-04-06 Thread Bill Woodcock

http://www.inovadisplays.com/clocks/poe.php
-Bill