Re: OpenTransit (france telecom) depeers cogent

2005-04-17 Thread Michael Sinatra

John van Oppen wrote:
> All,
> 
> 
> Here is an output of show ip bgp regexp _5511_ on my cogent facing router (ie 
> with a full cogent feed)...Most of the prefixes with best paths that are 
> not through cogent don't exist in my cogent route feed at all (even via a non 
> FT path).   It looks like things are still a bit wonky.
> 
> http://as23265.net/cogent.txt
> 
> Thanks,
> John van Oppen
> PocketiNet Communications
> AS23265
> 
> 
> -Ursprüngliche Nachricht-
> Von: Patrick W. Gilmore [mailto:[EMAIL PROTECTED] 
> Gesendet: Sunday, April 17, 2005 10:26 PM
> An: nanog@merit.edu
> Cc: Patrick W. Gilmore
> Betreff: Re: OpenTransit (france telecom) depeers cogent
> 
> 
> 
> On Apr 17, 2005, at 11:16 PM, Patrick W. Gilmore wrote:
> 
> 
>>On Apr 17, 2005, at 10:49 PM, John van Oppen wrote:
>>
>>
>>
>>>As a cogent customer, I still see no routes to 217.167.0.0/16 (the
>>>route that holds www.francetelecom.com) via my cogent feed.
>>>
>>>That /16 also appears to be unreachable from the looking glass on
>>>cogent's website still.
>>>
>>
>>I can trace from Cogent to FT just fine.
>>
>>Haven't checked all possible end points, but my spot check shows  
>>connectivity.
> 
> 
> Replying to my own post, I still see some Cogent <-> FT strangeness.
> 
> Tracing to www.opentransit.net works fine, but www.fracetelecom.com  
> dies on the first hop.
> 
> Spot checking other IPs in FT, they seem to work.  Is it just the  
> 'fracetelecom.com' sub-network that is still not connected?
> 
> Anyone have any more info?
> 

I am seeing wonkiness too.  I have a default-free router peering
exclusively with AS174 that's not seeing routes for hosts in rain.fr and
francetelecom.com, and traces to those hosts die two hops into AS174.
The same hosts are reachable via level3 and their traces go through on
our routers that have multiple peerings.

Note that the authoritative nameservers for francetelecom.com are in
rain.fr and are not reachable via an exclusive cogent path.  Hence, I am
not able to even get DNS resolution on the cogent-only path.

michael


Re: Memory leak cause of Comcast DNS problems

2005-04-17 Thread David Conrad
Hi,
On Apr 17, 2005, at 8:20 PM, Eric A. Hall wrote:
| The maximum amount of memory to use for the server's cache, in
| bytes. [...] The default is unlimited, meaning that records are
| purged from the cache only when their TTLs expire.
That was my first guess too.
Most DNS servers don't even have this switch.
Actually, I suspect most servers now do, at least in the context of 
Internet service provision.  I believe BINDv9 + dnscache + CNS (don't 
know about maradns, powerdns, or posadis but I believe their relative 
percentage isn't significant) outnumber BINDv4 and BINDv8.  Don't know 
if Microsoft DNS allows you to limit memory consumption, but I don't 
think it is used in an ISP context that frequently (although I might be 
wrong).

Rgds,
-drc


RE: OpenTransit (france telecom) depeers cogent

2005-04-17 Thread John van Oppen

All,


Here is an output of show ip bgp regexp _5511_ on my cogent facing router (ie 
with a full cogent feed)...Most of the prefixes with best paths that are 
not through cogent don't exist in my cogent route feed at all (even via a non 
FT path).   It looks like things are still a bit wonky.

http://as23265.net/cogent.txt

Thanks,
John van Oppen
PocketiNet Communications
AS23265


-Ursprüngliche Nachricht-
Von: Patrick W. Gilmore [mailto:[EMAIL PROTECTED] 
Gesendet: Sunday, April 17, 2005 10:26 PM
An: nanog@merit.edu
Cc: Patrick W. Gilmore
Betreff: Re: OpenTransit (france telecom) depeers cogent



On Apr 17, 2005, at 11:16 PM, Patrick W. Gilmore wrote:

> On Apr 17, 2005, at 10:49 PM, John van Oppen wrote:
>
>
>> As a cogent customer, I still see no routes to 217.167.0.0/16 (the
>> route that holds www.francetelecom.com) via my cogent feed.
>>
>> That /16 also appears to be unreachable from the looking glass on
>> cogent's website still.
>>
>
> I can trace from Cogent to FT just fine.
>
> Haven't checked all possible end points, but my spot check shows  
> connectivity.

Replying to my own post, I still see some Cogent <-> FT strangeness.

Tracing to www.opentransit.net works fine, but www.fracetelecom.com  
dies on the first hop.

Spot checking other IPs in FT, they seem to work.  Is it just the  
'fracetelecom.com' sub-network that is still not connected?

Anyone have any more info?

-- 
TTFN,
patrick


Re: OpenTransit (france telecom) depeers cogent

2005-04-17 Thread Patrick W. Gilmore
On Apr 17, 2005, at 11:16 PM, Patrick W. Gilmore wrote:
On Apr 17, 2005, at 10:49 PM, John van Oppen wrote:

As a cogent customer, I still see no routes to 217.167.0.0/16 (the  
route that holds www.francetelecom.com) via my cogent feed.

That /16 also appears to be unreachable from the looking glass on  
cogent's website still.

I can trace from Cogent to FT just fine.
Haven't checked all possible end points, but my spot check shows  
connectivity.
Replying to my own post, I still see some Cogent <-> FT strangeness.
Tracing to www.opentransit.net works fine, but www.fracetelecom.com  
dies on the first hop.

Spot checking other IPs in FT, they seem to work.  Is it just the  
'fracetelecom.com' sub-network that is still not connected?

Anyone have any more info?
--
TTFN,
patrick


Re: cost of doing business (was:Re: OpenTransit (france telecom) depeers cogent)

2005-04-17 Thread Mikael Abrahamsson
On Sun, 17 Apr 2005, Randy Bush wrote:

Do you have any idea what sort of underprovisioning is typical for this
sort of service in Japan ? Do they really have anything like a symmetric
100 Mbps all the way back to the backbone ?
yep
Do you have any reference for this?
Provisioning 10G distribution links for every 100 customers doesn't seem a 
viable business model considering the cost of equipment today. Where is 
the aggregation done and at what traffic level?

--
Mikael Abrahamssonemail: [EMAIL PROTECTED]


Re: BCP for ISP to block worms at PEs and NAS

2005-04-17 Thread Sean Donelan

On Sun, 17 Apr 2005, Randy Bush wrote:
> celebrate diversity (aka i wish all my competitors did that:-)

What did people think would happen if they try to hold third-parties
liable for the actions of others?  Third-parties have very little
interest in defending your diversity.  And if the FCC starts extending
multi-million dollar fines from television to cable and Internet, you'll
find very few providers you can migrate quickly, or otherwise, too.

Look at the US Federal EnergyStar program.  It is nearly impossible to
buy a PC which doesn't comply with EnergyStar requirements, and even
Microsoft was forced to change Windows default settings to comply.

If there was a SecurityStar logo, would PC makers and providers have
to comply with it?




Re: Memory leak cause of Comcast DNS problems

2005-04-17 Thread Eric A. Hall


On 4/16/2005 10:03 PM, Sean Donelan wrote:

> Should other ISPs be concerned they might have the same latent problem
> in their systems?

"ps v -C " will tell you how badly you're hurting

Anybody that does a bunch of lookups -- whether this is forward lookups
for customers or blacklist lookups on mail or whatever -- is probably
using more than they think. I don't know of many directly related crash
scenarios but there are other penalties like shallow caching which aren't
entirely trivial.

The churning strategy employed is the question that doesn't get answered.
Some servers do FIFO, some do random discards, some use swap space... This
whole area is treated like the embarrassing aunt in the cellar.

-- 
Eric A. Hallhttp://www.ehsco.com/
Internet Core Protocols  http://www.oreilly.com/catalog/coreprot/


Re: Memory leak cause of Comcast DNS problems

2005-04-17 Thread Eric A. Hall


On 4/17/2005 12:29 PM, Florian Weimer wrote:
> * Sean Donelan:
> 
>>Perhaps your DNS software also has a memory leak?  Anyone know which
>>software Comcast was using?  Should other ISPs be concerned they might
>>have the same latent problem in their systems?
> 
> Probably yes, especially if they don't read documentation of their DNS
> software.
> 
> | The maximum amount of memory to use for the server's cache, in
> | bytes. [...] The default is unlimited, meaning that records are
> | purged from the cache only when their TTLs expire.

That was my first guess too.

Most DNS servers don't even have this switch.

-- 
Eric A. Hallhttp://www.ehsco.com/
Internet Core Protocols  http://www.oreilly.com/catalog/coreprot/


Re: OpenTransit (france telecom) depeers cogent

2005-04-17 Thread Patrick W. Gilmore
On Apr 17, 2005, at 10:49 PM, John van Oppen wrote:
As a cogent customer, I still see no routes to 217.167.0.0/16 (the  
route that holds www.francetelecom.com) via my cogent feed.

That /16 also appears to be unreachable from the looking glass on  
cogent's website still.
I can trace from Cogent to FT just fine.
Haven't checked all possible end points, but my spot check shows  
connectivity.

--
TTFN,
patrick

-Ursprüngliche Nachricht-
Von: Jonas Frey [mailto:[EMAIL PROTECTED]
Gesendet: Sunday, April 17, 2005 7:36 PM
An: [EMAIL PROTECTED]
Betreff: Re: OpenTransit (france telecom) depeers cogent

Cogent is now reachable from OT and vice versa, apparently Cogent  
dropped the filters, i see everything passing verio now. Not sure  
since when this works again.

Regards,
Jonas



RE: OpenTransit (france telecom) depeers cogent

2005-04-17 Thread John van Oppen

As a cogent customer, I still see no routes to 217.167.0.0/16 (the route that 
holds www.francetelecom.com) via my cogent feed.

That /16 also appears to be unreachable from the looking glass on cogent's 
website still.


John van Oppen
PocketiNet Communications
AS23265 

-Ursprüngliche Nachricht-
Von: Jonas Frey [mailto:[EMAIL PROTECTED] 
Gesendet: Sunday, April 17, 2005 7:36 PM
An: [EMAIL PROTECTED]
Betreff: Re: OpenTransit (france telecom) depeers cogent



Cogent is now reachable from OT and vice versa, apparently Cogent dropped the 
filters, i see everything passing verio now. Not sure since when this works 
again.

Regards,
Jonas



Re: Topics for NANOG 34

2005-04-17 Thread Steve Feldman

On Sun, Apr 17, 2005 at 10:20:24AM -0700, william(at)elan.net wrote:
> 
> This is not parallel track sessions yet, right?

At the moment, we have neither enough meeting space or content for
real parallel track sessions this time.  We might do something like
split off the peering topics and BOF (for example) into a separate
semi-track if we can find a logical way to do it, but we won't know
until closer to the meeting.

Steve


Re: BCP for ISP to block worms at PEs and NAS

2005-04-17 Thread Randy Bush

> interesting... everytime we have filtered in the core we've gotten
> complaints, I believe many folks filtered/rate-limited in their cores for
> welchia/nachia and got bunches of complaints about it as well... Hrm,
> maybe all of these folks are just grumpy-geeks?

i suspect that the remaining small dial-up and other local consumer
providers have customer bases who just want their mtv.  larger isps
and big backbone isps have customer bases with wider usage patterns,
and hence become quite unhappy when all they can get is mtv and 500
channels of home shopping.

and the customers of the former who don't like partial service, have
enough clue to quickly migrate to the latter.

celebrate diversity (aka i wish all my competitors did that:-)

randy



Re: BCP for ISP to block worms at PEs and NAS

2005-04-17 Thread Christopher L. Morrow


On Sun, 17 Apr 2005, Randy Bush wrote:

> >>> On my Cisco-based SP network with RPMs in MGX chassis acting as
> >>> PEs: I have the ACL below applied on many network devices to
> >>> block the common worms ports,
> >> if you are a service provider, perhaps filtering in the core
> >> will not be appreciated by some customers.  of course, as a
> >> provider, you can choose what 'service' you are providing.  but,
> >> if you filter ports, it is not clear you are providing internet
> >> service.
> > one approach might be radius installed filters? some contract
> > language to allow 'customers' to request standard templated
> > filters at little/no-extra cost to them. Allow them to make the
> > decision to filter themselves (where 'themselves' may be a dial
> > reseller, of course).  Making them responsible means when
> > odd-application-12 comes along to utilize tcp/135 you won't have
> > to poke spot holes through your filters to permit this access.
>
> yep.  but note that kim says "ACL below applied on many network
> devices," and went on to mention ras, which i, possibly mistakenly,
> took to mean not just the radius-able edge.

whoops, I read his original note as: "i have a large dial/dsl plant for a
network and I want to offer filtered Internet" So I lept to: "wow, use
radius applied acls for your users, let them choose to have it or not,
make standard templates available."

If there is no need to filter 'all links' just 'customer links' (and
'customer links' == dial/dsl/radius-authed-connection-types) then the
radius filters thing might be a boone to Kim's productivity.


Re: OpenTransit (france telecom) depeers cogent

2005-04-17 Thread Jonas Frey

Cogent is now reachable from OT and vice versa, apparently Cogent
dropped the filters, i see everything passing verio now. Not sure
since when this works again.

Regards,
Jonas



Re: BCP for ISP to block worms at PEs and NAS

2005-04-17 Thread Christopher L. Morrow



On Sun, 17 Apr 2005, J.D. Falk wrote:

>
> On 04/17/05, John Kristoff <[EMAIL PROTECTED]> wrote:
>
> > >  deny   tcp any any range 135 139
> > >  deny   udp any any range 135 netbios-ss
> > >  deny   tcp any any eq 445
> > >  deny   udp any any eq 1026
> >
> > Similar as before, you are going to be removing some legitimate
> > traffic.
>
>   Is this really true?  All of the ports listed above are used by
>   LAN protocols that were never intended to communicate directly
>   across backbone networks -- that's why VPNs were invented.

and people use them all the time across the real Internet :( It's dumb, we
can argue about it's 'correctness' or 'localness' or whatever until we are
blue in the face, but people still do it.

>
>   Or, is your argument that some system somewhere MIGHT ignore the
>   offical port numbers allocated by IANA and try to pass some
>   other kind of traffic there instead?
>

Certainly, ssh over tcp/80 is common, other protocols can become agile as
well... people SHOULD use the IANA port numbers, in practice they don't
always abide by them :(

> > Perhaps set the rules to permit and log first, let it run for awhile
> > and then see what you'll be missing.
>
>   Yep, this is always good advice.  But don't give up just because
>   of some naysayers rolling out the usual FUD.  In the real world,
>   security for the many outweighs the extremely unlikely edge cases
>   of the few.
>

Or... use a system where your users can 'subscribe' to a 'better Internet'
(define 'better Internet' as you like)


Re: BCP for ISP to block worms at PEs and NAS

2005-04-17 Thread Christopher L. Morrow


On Sun, 17 Apr 2005, J.D. Falk wrote:

>
> On 04/17/05, Randy Bush <[EMAIL PROTECTED]> wrote:
>
> > > On my Cisco-based SP network with RPMs in MGX chassis acting as PEs:
> > > I have the ACL below applied on many network devices to block the
> > > common worms ports,
> >
> > if you are a service provider, perhaps filtering in the core will
> > not be appreciated by some customers.  of course, as a provider,
> > you can choose what 'service' you are providing.  but, if you
> > filter ports, it is not clear you are providing internet service.
>
>   In practice, it is nearly certain that your users won't care (or
>   even notice) -- but grumpygeeks will argue about it anyway.

interesting... everytime we have filtered in the core we've gotten
complaints, I believe many folks filtered/rate-limited in their cores for
welchia/nachia and got bunches of complaints about it as well... Hrm,
maybe all of these folks are just grumpy-geeks?


Re: Memory leak cause of Comcast DNS problems

2005-04-17 Thread Christopher L. Morrow


On Sun, 17 Apr 2005, Fergie (Paul Ferguson) wrote:

>
>
> Not to my knowledge, or at least, none that has been
> publicly acknowledged.
>
> >From a Washington Post article yesterday (posted via Yahoo!
> News), Comcast said that the problem manifested itself when
> they were in the process of upgrading their DNS servers:
>
> http://story.news.yahoo.com/news?tmpl=story&ncid=1212&e=3&u=/washpost/20050416/tc_washpost/a56223_2005apr15&sid=96168964
>
> -- Florian Weimer <[EMAIL PROTECTED]> wrote:
>
> > Regardless of whether it actually _was_ a memory leak,
> > or not, it appears that the impact was on a rather
> > large enough scale.

So, 'wide scale' because they, presuming of course the article is on the
level, upgraded all devices at approximately the same time...


Re: BCP for ISP to block worms at PEs and NAS

2005-04-17 Thread Sean Donelan

On Sun, 17 Apr 2005, Christopher L. Morrow wrote:
> one approach might be radius installed filters? some contract language to
> allow 'customers' to request standard templated filters at little/no-extra
> cost to them. Allow them to make the decision to filter themselves (where
> 'themselves' may be a dial reseller, of course).  Making them responsible
> means when odd-application-12 comes along to utilize tcp/135 you won't
> have to poke spot holes through your filters to permit this access.

Microsoft (the company that cares about security) has already done that
for you by implementing RPC-over-HTTP complete with the same
vulnerabilities as RPC-over-135. The sad thing is the number of computers
using RPC/Netbios outnumbers the number of computers using SSH.

Most former @Home cable providers have blocked various rpc/netbios
(network neighborhood) ports for years because people used to be able to
see their neighbor's computers in the Windows rpc/netbios browser.  You
probably want to be a bit careful, because some people use remote
Exchange/Outlook which uses RPC.  Ephemeral ports can be used by
anything, although in practice they are not randomly distributed.
Programmers are humans, and they tend to have favorites and those
favorites are exploited by attackers.

If we lived in a perfect world, everything would be perfect. But we
live in a world were 300 million computers do stupid things and Microsoft
sells over 10 million new Windows licenses a month.  On the other hand,
the number of people who actually want to use RPC over the Internet is a
very small number.  Is it more practical for the few people who want to
use RPC over the Internet to make special arrangements; or to keep
millions of computers at risk?

A few other comments.  Port 136 is not used by Microsoft.  Port 5554 is
probably too specific to a single worm, which is on the decline.



Re: BCP for ISP to block worms at PEs and NAS

2005-04-17 Thread John Kristoff

On Sun, 17 Apr 2005 13:00:30 -0700
"J.D. Falk" <[EMAIL PROTECTED]> wrote:

> > >  deny   udp any any eq 1026
> > 
> > Similar as before, you are going to be removing some legitimate
> > traffic.
> 
>   Is this really true?  All of the ports listed above are used by
>   LAN protocols that were never intended to communicate directly 
>   across backbone networks -- that's why VPNs were invented.

I was speaking to the last UDP rule as shown above, but a port number
is becoming increasingly more ambiguous as applications adapt when
specific ports are filtered.

There is also the idea of a 'port switching' process.  Find an
archived copy of draft-shepard-tcp-reassign-port-number for an
example.  Or even consider how TFTP works (port 69 is only in use
for the initial packet to the TFTP server).  Such a process
actually has two 'good' properties, that are often add odds in
many deployments.  One is to foster transparency back into the
network and the other is to improve resiliency from attackers
attempting to insert spoofed packets into the communications.

John


Re: cost of doing business (was:Re: OpenTransit (france telecom) depeers cogent)

2005-04-17 Thread Randy Bush

> Do you have any idea what sort of underprovisioning is typical for this
> sort of service in Japan ? Do they really have anything like a symmetric
> 100 Mbps all the way back to the backbone ?

yep

randy



Re: grrr

2005-04-17 Thread Will Yardley

On Sun, Apr 17, 2005 at 03:15:04PM -0400, David Lesher wrote:
> 
> As far as I can tell, eBay reads NO mail addresses.  I am in a minor
> issue re: a purchase, and while I send off responses to their
> boilerplate "We are here to help you" messages; I merely get different
> boilerplate messages back.

I have dealt with some real people at Ebay, and I will say that they are
one of the few organizations that actually DOES try to do something
about phishing scams etc. My experience is that they do read, and take
action based on, spoof reports.

w



Re: ATT.net Security Contact

2005-04-17 Thread Mike Tancsa
At 04:39 PM 17/04/2005, Joseph W. Breu wrote:
Can someone from ATT.net security contact me offlist RE: our network in 
their RBL?
Try [EMAIL PROTECTED] Humans do seem to read it. During the week they 
responded within a few hrs.  However, when I asked why they blacklisted us 
in the first place, I never got an answer--  Only a few dozen auto ticket 
responses for some reason.  Not sure if that was a hint that was lost on 
me, or something broken.

---Mike 



Re: grrr

2005-04-17 Thread Owen DeLong
Indeed, it does appear that eBay is attempting to use Eliza to perform
all of their customer service.

Owen


pgpoKiy1tfq5g.pgp
Description: PGP signature


ATT.net Security Contact

2005-04-17 Thread Joseph W. Breu
Can someone from ATT.net security contact me offlist RE: our network in 
their RBL?

--
Thanks,
-
Joseph W. Breu, CCNA  phone : +1.319.268.5228
Senior Network Administratorfax : +1.319.266.8158
Cedar Falls Utilities  cell : +1.319.493.1686
support: +1.319.268.5221 url : http://www.cfu.net


Re: BCP for ISP to block worms at PEs and NAS

2005-04-17 Thread Steven M. Bellovin

In message <[EMAIL PROTECTED]>, "J.D. Falk" writes:
>
>On 04/17/05, John Kristoff <[EMAIL PROTECTED]> wrote: 
>
>> >  deny   tcp any any range 135 139
>> >  deny   udp any any range 135 netbios-ss
>> >  deny   tcp any any eq 445
>> >  deny   udp any any eq 1026
>> 
>> Similar as before, you are going to be removing some legitimate
>> traffic.
>
>   Is this really true?  All of the ports listed above are used by
>   LAN protocols that were never intended to communicate directly 
>   across backbone networks -- that's why VPNs were invented.
>
>   Or, is your argument that some system somewhere MIGHT ignore the
>   offical port numbers allocated by IANA and try to pass some
>   other kind of traffic there instead?


The issue is client-side port numbers -- those aren't rules that block 
only inbound SYNs.  That was clear from another paragraph of 
Kristoff's post:

  Whatever worm you're trying to mitigate above (sasser?), you will
  also be occasionally be taking out TCP sessions that happen to be
  using that port.  Most commonly where one side uses 5554 as it's
  ephemeral port.

The result will be intermittent, undiagnosed failures.  "Why isn't that 
Internet reliable?  I do the same thing twice in a row and the second 
time it fails."

--Prof. Steven M. Bellovin, http://www.cs.columbia.edu/~smb




Re: BCP for ISP to block worms at PEs and NAS

2005-04-17 Thread J.D. Falk

On 04/17/05, John Kristoff <[EMAIL PROTECTED]> wrote: 

> >  deny   tcp any any range 135 139
> >  deny   udp any any range 135 netbios-ss
> >  deny   tcp any any eq 445
> >  deny   udp any any eq 1026
> 
> Similar as before, you are going to be removing some legitimate
> traffic.

Is this really true?  All of the ports listed above are used by
LAN protocols that were never intended to communicate directly 
across backbone networks -- that's why VPNs were invented.

Or, is your argument that some system somewhere MIGHT ignore the
offical port numbers allocated by IANA and try to pass some
other kind of traffic there instead?

> Perhaps set the rules to permit and log first, let it run for awhile
> and then see what you'll be missing.

Yep, this is always good advice.  But don't give up just because
of some naysayers rolling out the usual FUD.  In the real world, 
security for the many outweighs the extremely unlikely edge cases 
of the few.

-- 
J.D. Falk   As a carpenter bends the seat of a chariot
<[EMAIL PROTECTED]>I bend this frenzy round my heart.


Re: Memory leak cause of Comcast DNS problems

2005-04-17 Thread Martin J. Levy

Steve (and all),

>At least in my neighborhood, Comcast appears to be running BIND 9.2.4rc6

Ah... Then there are to possible paths...

1) There was a real memory-leak bug and this was an unfortunate operations 
event.  The CHANGES file for 9.3.1 and bind-9.2.5rc1 show various big fixes 
related to memory leak issues.  I leave it to someone else to comment on the 
potential of being tickled within a Comcast environment.

 -or- (And on a much more cynical note.)

2) Someone checked the latest CHANGES file for bind and realized that saying it 
was a memory leak was a good cover (see quick pseudo-grep of file below.  Note 
that not all the bug's affect the running bind name server code).

Whichever it was, I wonder how it could affect so many name servers at only one 
provider and all at the same time.  This is just plain strange.  I would have 
thought that best practices for a DNS service would recommend staggered 
upgrades, heck, even forced different s/w releases.  etc. etc.

Martin

---
 awk '
 /^  --- 9\.2\.[0123][^ ]* released ---/ { print; exit; }
 /^  --- [^ ]* released ---/ { print; next; }
 /^[ ]*$/ { if (memory) { print all; } all = ""; memory = 0; next; }
 /[mM]emory/ { memory = 1; }
  { all = all "\n" $0; next }
 ' < bind-9.3.1/CHANGES
---

--- 9.3.1 released ---
--- 9.3.1rc1 released ---
--- 9.3.1beta2 released ---
--- 9.3.1beta1 released ---
--- 9.3.0 released ---
--- 9.3.0rc4 released ---
--- 9.3.0rc3 released ---
--- 9.3.0rc2 released ---

1683.   [bug]   dig +sigchase could leak memory. [RT #11445]
--- 9.3.0rc1 released ---

1643.   [bug]   dns_db_closeversion() could leak memory / node
references. [RT #11163]
--- 9.3.0beta4 released ---

1635.   [bug]   Memory leak on error in query_addds().
--- 9.3.0beta3 released ---

1599.   [bug]   Fix memory leak on error path when checking named.conf.
--- 9.3.0beta2 released ---
--- 9.3.0beta1 released ---

1562.   [bug]   isc_socket_create() and isc_socket_accept() could
leak memory under error conditions. [RT #10230]

1561.   [bug]   It was possible to release the same name twice if
named ran out of memory. [RT #10197]

1547.   [bug]   Named wasted memory recording duplicate lame zone
entries. [RT #9341]

1545.   [bug]   It was possible to leak memory if named was unable to
bind to the specified transfer source and TSIG was
being used. [RT #10120]

1364.   [func]  Log file name when unable to open memory statistics
and dump database files. [RT# 3437]

1235.   [func]  Report 'out of memory' errors from openssl.

1143.   [bug]   When a trusted-keys statement was present and named
was built without crypto support, it would leak memory.

 982.   [func]  If "memstatistics-file" is set in options the memory
statistics will be written to it.
--- 9.2.3rc1 released ---



Re: grrr

2005-04-17 Thread Jerry Pasker

http://rfc-ignorant.org/tools/lookup.php?domain=ebay.com
it's been three years, I don't think they really give a damn.
matto
On Sat, 16 Apr 2005, Scott Grayban wrote:
  If there are any eBay admin here please fix your spoof@ & abuse@
  address because it is denying every spoof complaint sent to it.
  It constantly replies back "Your email has not been delivered"
  I dont understand why this company has to be so hard headed in
  abuse issues.
[EMAIL PROTECTED]<
  The only thing necessary for the triumph
  of evil is for good men to do nothing. - Edmund Burke
This is the same company that runs Path MTU discovery on their web 
servers, and then blocks ICMP at their border.

-Jerry


RE: cost of doing business (was:Re: OpenTransit (france telecom) depeers cogent)

2005-04-17 Thread Mikael Abrahamsson
On Sun, 17 Apr 2005, Malayter, Christopher wrote:
I think you're very wrong here.  For packet delivery of video based 
services, I could see a home using 100mb/s between voice, video, and 
data within the next 12-24 months.  All of the product roadmaps I've 
been looking at contain "How to get 100mb/s to the home", "How do we 
push BRAS/Multicast deployment closer to the edge", "What is the roadmap 
for converged services past triple play?"
Really? 100 megabit/s would be six simultanious HDTV feeds (mpeg2)... I 
don't see any other content that is constant high bandwidth? And in my 
calculations I used 5 meg as the average, meaning that your 100 meg would 
mean that peak bw usage should be much higher to compensate for anyone who 
just happens not to look at 6 TV channels at the time?

The question is also about converged networks, what do we converge past 
data, video and voice?

100 meg to the home is no problem as long as each user is only using a few 
hundred kilobit/s (which seem to be the norm around the world right now on 
these networks), it's when each user is using much more than that we run 
into scalability problems (and monetary problems).

--
Mikael Abrahamssonemail: [EMAIL PROTECTED]


Re: grrr

2005-04-17 Thread Florian Weimer

* David Lesher:

> As far as I can tell, eBay reads NO mail addresses.  I am in a
> minor issue re: a purchase, and while I send off responses to
> their boilerplate "We are here to help you" messages; I merely
> get different boilerplate messages back.

I don't think Ebay is in the conflict resolution business.  You should
contact your civial action provider if you need this kind of service.


Re: cost of doing business (was:Re: OpenTransit (france telecom) depeers cogent)

2005-04-17 Thread Marshall Eubanks

On Sat, 16 Apr 2005 22:23:53 -1000
 Randy Bush <[EMAIL PROTECTED]> wrote:
> 
> > Let's say for the sake of argument that by 2010 we want to give every 
> > household 5 megabit/s on average. How could this be done with technology 
> > today seen on the radar? Remember that the households should want to pay 
> > for the bandwidth as well, meaning they might be willing to pay $30 per 
> > month for the bandwidth part (this is kind of high, but let's go with it). 
> 
> fwiw, 100mb to the home costs about that in japan
> 
> randy
> 

Hi Randy;

Do you have any idea what sort of underprovisioning is typical for this sort
of service in Japan ? Do they really have anything like a symmetric 100 Mbps all
the way back to the backbone ?

Regards
Marshall Eubanks


Re: grrr

2005-04-17 Thread David Lesher

Speaking on Deep Background, the Press Secretary whispered:
> 
> 
> http://rfc-ignorant.org/tools/lookup.php?domain=ebay.com
> 
> it's been three years, I don't think they really give a damn.
> 
> matto
> 
> On Sat, 16 Apr 2005, Scott Grayban wrote:
> 
>   
>   If there are any eBay admin here please fix your spoof@ & abuse@ 
>   address because it is denying every spoof complaint sent to it.
>   
>   It constantly replies back "Your email has not been delivered"

As far as I can tell, eBay reads NO mail addresses.  I am in a
minor issue re: a purchase, and while I send off responses to
their boilerplate "We are here to help you" messages; I merely
get different boilerplate messages back.

It's rather like the conversations in Brian Aldiss's "Who Can
Replace a Man?" or that short story about the guy trying to
order a copy of Robert Louis Stevenson's classic "Kidnapped"...
 


-- 
A host is a host from coast to [EMAIL PROTECTED]
& no one will talk to a host that's close[v].(301) 56-LINUX
Unless the host (that isn't close).pob 1433
is busy, hung or dead20915-1433




Re: BCP for ISP to block worms at PEs and NAS

2005-04-17 Thread John Kristoff

On Sun, 17 Apr 2005 13:28:21 +0200
Kim Onnel <[EMAIL PROTECTED]> wrote:

> I have the ACL below applied on many network devices to block the
> common worms ports,

Beware, you are guaranteed to be blocking other, legitimate things
too with some of these rules.  More below.

> ip access-list extended worms
>  deny   tcp any any eq 5554

Whatever worm you're trying to mitigate above (sasser?), you will
also be occasionally be taking out TCP sessions that happen to be
using that port.  Most commonly where one side uses 5554 as it's
ephemeral port.

>  deny   tcp any any range 135 139
>  deny   udp any any range 135 netbios-ss
>  deny   tcp any any eq 445
>  deny   udp any any eq 1026

Similar as before, you are going to be removing some legitimate
traffic.  With UDP ephemeral ports this may most likely be DNS and
NTP traffic.

Note, many people do what you do all the time to the detriment of
both real security and robustness in my opinion, but it's your net
and you can throw away random packets if you want to.

Perhaps set the rules to permit and log first, let it run for awhile
and then see what you'll be missing.

John


Re: BCP for ISP to block worms at PEs and NAS

2005-04-17 Thread Kim Onnel

Even if they care, its consuming alot of CPU resources and bandwidth,
i had a long quarrel with my teams members on should we do it or not,
i understand that if we only provide best effort traffic without any
filtering contracted its wrong to do it, but the ACL matches are so
big, doing it on the Radius however is one nice other way to do it
IMHO, there was once a worm using port 5000 which broke IPSec, and i
had to modify it all over the place, same with MSSQL ports, a
Centralised configuration is much better, i would like to see these
methods documented anywhere (Practices for ISPs to block worms)
 

On 4/17/05, J.D. Falk <[EMAIL PROTECTED]> wrote:
> On 04/17/05, Randy Bush <[EMAIL PROTECTED]> wrote:
> 
> > > On my Cisco-based SP network with RPMs in MGX chassis acting as PEs:
> > > I have the ACL below applied on many network devices to block the
> > > common worms ports,
> >
> > if you are a service provider, perhaps filtering in the core will
> > not be appreciated by some customers.  of course, as a provider,
> > you can choose what 'service' you are providing.  but, if you
> > filter ports, it is not clear you are providing internet service.
> 
> In practice, it is nearly certain that your users won't care (or
> even notice) -- but grumpygeeks will argue about it anyway.
> 
> --
> J.D. Falk   As a carpenter bends the seat of a chariot
> <[EMAIL PROTECTED]>I bend this frenzy round my heart.
>


Re: Anyone familiar with the SBC product lingo?

2005-04-17 Thread just me

On Sun, 17 Apr 2005, Jay R. Ashworth wrote:

  So here's the 64GB/s question:
  
  If carriers are being paid to ensure physical separation between
  circuits for the life of the circuit, why is it that they haven't
  implemented change management systems (and I don't solely mean the
  software) to ensure they they *can* (not even that they will) manage to
  ensure such separation?

Simple math. The cost of the occasional SLA credit and/or circuit 
regrooming when the customer discovers a non-diverse path where one 
was specified is obviously much less than the cost of tracking, 
maintaining ( and surely providing ) path diversity.

Surely large providers have spent a lot more time and money 
developing processes and software that allow them to groom circuits 
into the least number of physical paths possible. Or at least I 
would, if I were paying for the facilities.

matto

[EMAIL PROTECTED]<
  The only thing necessary for the triumph
  of evil is for good men to do nothing. - Edmund Burke


Re: Anyone familiar with the SBC product lingo?

2005-04-17 Thread Jay R. Ashworth

On Fri, Apr 15, 2005 at 08:58:50AM -0400, David Lesher wrote:
> He describes it as a long drawn-out exercise in futility. A
> non-trivial employee has to spend eons on the task. It's a recursive
> onion peeling, or a data version of Tom Lehrer's "I Got It From
> Agnes"...
> 
> And once done... the errors found, the diversity restored, and the
> report signed off; it's soon worthless...because the carriers
> soon shuffle things around Yet Again.

So here's the 64GB/s question:

If carriers are being paid to ensure physical separation between
circuits for the life of the circuit, why is it that they haven't
implemented change management systems (and I don't solely mean the
software) to ensure they they *can* (not even that they will) manage to
ensure such separation?

A simple "don't move this circuit without investigation" flag that
would drill-up to higher level flows would seem to be enough -- though
certainly I am not familiar with the internals of the CMSen at such
scale carriers.

Cheers,
-- jra
-- 
Jay R. Ashworth[EMAIL PROTECTED]
Designer  Baylink RFC 2100
Ashworth & AssociatesThe Things I Think'87 e24
St Petersburg FL USA  http://baylink.pitas.com +1 727 647 1274

  If you can read this... thank a system administrator.  Or two.  --me


Re: grrr

2005-04-17 Thread just me

http://rfc-ignorant.org/tools/lookup.php?domain=ebay.com

it's been three years, I don't think they really give a damn.

matto

On Sat, 16 Apr 2005, Scott Grayban wrote:

  
  If there are any eBay admin here please fix your spoof@ & abuse@ 
  address because it is denying every spoof complaint sent to it.
  
  It constantly replies back "Your email has not been delivered"
  
  I dont understand why this company has to be so hard headed in 
  abuse issues.


[EMAIL PROTECTED]<
  The only thing necessary for the triumph
  of evil is for good men to do nothing. - Edmund Burke


RE: cost of doing business (was:Re: OpenTransit (france telecom) depeers cogent)

2005-04-17 Thread Malayter, Christopher



> -Original Message-
> From: Mikael Abrahamsson [mailto:[EMAIL PROTECTED]
> Sent: Sunday, April 17, 2005 12:55 PM
> To: Randy Bush
> Cc: [EMAIL PROTECTED]
> Subject: Re: cost of doing business (was:Re: OpenTransit 
> (france telecom) depeers cogent)
> 
> 
> 
> On Sat, 16 Apr 2005, Randy Bush wrote:
> 
> > fwiw, 100mb to the home costs about that in japan
> 
> Well, I dont really see the average home actually using
> 100meg all the 
> time in the near future, thus my 5 meg utilization average estimate. 
> Access could be whatever speed of course, access speed not 
> used doesn't 
> cost very much.

I think you're very wrong here.  For packet delivery of video based
services, I could see a home using 100mb/s between voice, video, and data
within the next 12-24 months.  All of the product roadmaps I've been looking
at contain "How to get 100mb/s to the home", "How do we push BRAS/Multicast
deployment closer to the edge", "What is the roadmap for converged services
past triple play?"

Regards,

Chris Malayter
TDS Telecom - Network Services
Data Network Engineering
[EMAIL PROTECTED]
Phone: (608) 664-4878
FAX:(608) 664-4644


Re: Memory leak cause of Comcast DNS problems

2005-04-17 Thread Steven M. Bellovin

In message <[EMAIL PROTECTED]>, "Fergie (Paul
 Ferguson)" writes:
>
>
>Not to my knowledge, or at least, none that has been
>publicly acknowledged.
>
>>From a Washington Post article yesterday (posted via Yahoo!
>News), Comcast said that the problem manifested itself when
>they were in the process of upgrading their DNS servers:
>
>http://story.news.yahoo.com/news?tmpl=story&ncid=1212&e=3&u=/washpost/20050416
>/tc_washpost/a56223_2005apr15&sid=96168964
>


At least in my neighborhood, Comcast appears to be running BIND 9.2.4rc6

--Prof. Steven M. Bellovin, http://www.cs.columbia.edu/~smb




Re: cost of doing business (was:Re: OpenTransit (france telecom) depeers cogent)

2005-04-17 Thread Mikael Abrahamsson
On Sat, 16 Apr 2005, Randy Bush wrote:
fwiw, 100mb to the home costs about that in japan
Well, I dont really see the average home actually using 100meg all the 
time in the near future, thus my 5 meg utilization average estimate. 
Access could be whatever speed of course, access speed not used doesn't 
cost very much.

--
Mikael Abrahamssonemail: [EMAIL PROTECTED]


Re: cost of doing business

2005-04-17 Thread Andrew Odlyzko


>> Mikael Abrahamsson <[EMAIL PROTECTED]> wrote:

>> Let's say for the sake of argument that by 2010 we want to give every 
>> household 5 megabit/s on average. How could this be done with technology 
>> today seen on the radar? Remember that the households should want to pay 
>> for the bandwidth as well, meaning they might be willing to pay $30 per 
>> month for the bandwidth part (this is kind of high, but let's go with it). 



> Randy Bush <[EMAIL PROTECTED]> wrote:

> fwiw, 100mb to the home costs about that in japan



We are talking of two different things here, traffic versus access bandwidth.
It will be a while before the average household generates 5 megabit/s traffic.
Even in Korea and Hong Kong, where the average broadband link is in the
5-10 Mbps range, average traffic is about 0.1 Mbps.  The main purpose of
high speed links is to get low transaction latency (as in "I want that Web
page on my screen NOW," or "I want that song for transfer to my portable
device NOW"), so utilizations are low.

Andrew Odlyzko


RE: cost of doing business (was:Re: OpenTransit (france telecom) depeers cogent)

2005-04-17 Thread jmalcolm

Hannigan, Martin writes:
>As long as the hardware can keep up, the amount of glass in spectrum
>in the ground should make this an impossibility for the near term,
>10 years plus.

Fiber isn't useful by itself; there are two obvious things needed to
turn a piece of glass into something that can carry IP - transmission
equipment and routers. While it'll be a while before carriers need to
trench across the Rockies again, the day of needing to buy the
equipment to plug into the fiber is already here for some providers.


Re: cost of doing business (was:Re: OpenTransit (france telecom) depeers cogent)

2005-04-17 Thread jmalcolm

Brandon Butterworth writes:
>Perhaps they aim to keep driving the competition out of business
>to ensure there's a cheap supply of equipment so they can grow
>whilst charging so little?

There are several problems with such a plan, even were someone to
attempt it. One, overall traffic is still growing, so cannibalizing
the already-constructed equipment owned by others after you drive them
out of business only goes so far. (Note that low prices stimulate
demand.) Two, requirements change - for example, filtering capabilites
more or less acceptable years ago when certain linecards were released
are no longer. And then there's the fact that the world is moving in
the ethernet direction. Providers need to keep up, because their
competitors will do so. Three, vendors won't support the current
equipment forever, and once they don't, that will quickly end the
usefulness of the equipment in question.

Joe



Re: Topics for NANOG 34

2005-04-17 Thread william(at)elan.net

This is not parallel track sessions yet, right?
On Sun, 17 Apr 2005, Steve Feldman wrote:
Greetings - here are the topics we've lined up so far for Seattle.  Keep
an eye out as we post additional talks:
http://www.nanog.org/mtg-0505/topics.html
Also, just a quick reminder that the registration fee goes up $50 on
Monday, April 25, and our hotel room block rate expires on April 27.
TUTORIALS
-
 -  Challenges in Network Security Protocols
Level: Introductory
   Radia Perlman, Sun
 -  Bridges, Routers, Switches, Oh My!
Level: Introductory
   Radia Perlman, Sun
 -  Best Practices for Determining the Traffic Matrix in IP Networks
Level: Intermediate
   Thomas Telkamp, Cariden
 -  BGP Techniques for Service Providers
Level: Introductory/Intermediate
   Philip Smith, Cisco
SUNDAY EVENING COMMUNITY MEETING
---
 - A follow-up to our meeting in Las Vegas (see
   http://www.nanog.org/mtg-0505/coordination.html). Please join us!
GENERAL SESSION
---
 -  DNS Anycast Stability
   Daniel Karrenberg, RIPE
 -  Design Decisions and Architecture Analysis of a Global 10G Backbone
(We Do it, so You Don't Have To)
   Vijay Gill, Time Warner
 -  Securing Carrier VoIP: Session Border Control
   Hadriel Kaplan, Avici
 -  Anatomy of a Leak: AS9121 (or, "How We Learned To Start Worrying and
Hate Maximum Prefix Limits")
   Alin C. Popescu, Brian J. Premore, and Todd Underwood, Renesys
 -  Building Nameserver Clusters with Free Software
   Joe Abley, ISC
 -  Trust Reflection: A Distributed Approach to PGP Key Signing at
Multi-Day Events
   Joe Abley, ISC
 -  Anycast Measurements Used to Highlight Routing Instabilities
   Peter Boothe; Randy Bush, IIJ
 -  Beyond 10 Gigabit Ethernet
   Neena Pemmaraju, Force10
 -  Internet Mini-Cores: Local Communications in the Internet's "Spur"
Regions
   Steve Gibbard, PCH
 -  The Spoofer Project: Inferring the Extent of Internet Source Address
Filtering on the Internet
   Robert Beverly, MIT
 -  Network-Wide Inter-Domain Routing Policies: Design and Realization
   Olaf Maennel, RIPE; Anja Feldmann and Christian Reiser,
   Technical University Munich; Ruediger Volk and Hagen Boehm,
   Deutsche Telekom
BOFS

 -  ISP Security and NSP-SEC BOF IX
 -  Peering BOF IX
   William B. Norton, Equinix, moderator
 -  INOC-DBA BoF with INOC-DBA Operators
   Gaurab Raj Upadhaya, PCH, moderator


Re: BCP for ISP to block worms at PEs and NAS

2005-04-17 Thread J.D. Falk

On 04/17/05, Randy Bush <[EMAIL PROTECTED]> wrote: 

> > On my Cisco-based SP network with RPMs in MGX chassis acting as PEs:
> > I have the ACL below applied on many network devices to block the
> > common worms ports,
> 
> if you are a service provider, perhaps filtering in the core will
> not be appreciated by some customers.  of course, as a provider,
> you can choose what 'service' you are providing.  but, if you
> filter ports, it is not clear you are providing internet service.

In practice, it is nearly certain that your users won't care (or
even notice) -- but grumpygeeks will argue about it anyway.

-- 
J.D. Falk   As a carpenter bends the seat of a chariot
<[EMAIL PROTECTED]>I bend this frenzy round my heart.


Re: Memory leak cause of Comcast DNS problems

2005-04-17 Thread Fergie (Paul Ferguson)


Not to my knowledge, or at least, none that has been
publicly acknowledged.

>From a Washington Post article yesterday (posted via Yahoo!
News), Comcast said that the problem manifested itself when
they were in the process of upgrading their DNS servers:

http://story.news.yahoo.com/news?tmpl=story&ncid=1212&e=3&u=/washpost/20050416/tc_washpost/a56223_2005apr15&sid=96168964

- ferg


-- Florian Weimer <[EMAIL PROTECTED]> wrote:

> Regardless of whether it actually _was_ a memory leak,
> or not, it appears that the impact was on a rather
> large enough scale.

Have other service providers been affected, too?

--
"Fergie", a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 [EMAIL PROTECTED] or [EMAIL PROTECTED]
 ferg's tech blog: http://fergdawg.blogspot.com/


Re: Memory leak cause of Comcast DNS problems

2005-04-17 Thread Florian Weimer

> Regardless of whether it actually _was_ a memory leak,
> or not, it appears that the impact was on a rather
> large enough scale.

Have other service providers been affected, too?


Re: Memory leak cause of Comcast DNS problems

2005-04-17 Thread Fergie (Paul Ferguson)


Regardless of whether it actually _was_ a memory leak,
or not, it appears that the impact was on a rather
large enough scale.

- ferg

-- Florian Weimer <[EMAIL PROTECTED]> wrote:

| The maximum amount of memory to use for the server's cache, in
| bytes. [...] The default is unlimited, meaning that records are
| purged from the cache only when their TTLs expire.

The number of complaints I've heard that "DNS resolvers eat *so* much
memory" suggests that few people tweak the default configuration. 8-(

However, it's unlikely that this was the cause of Comcast's problems
because DNS cache overflows would have an impact on a much larger
scale.

--
"Fergie", a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 [EMAIL PROTECTED] or [EMAIL PROTECTED]
 ferg's tech blog: http://fergdawg.blogspot.com/


Re: Memory leak cause of Comcast DNS problems

2005-04-17 Thread Florian Weimer

* Sean Donelan:

> Perhaps your DNS software also has a memory leak?  Anyone know which
> software Comcast was using?  Should other ISPs be concerned they might
> have the same latent problem in their systems?

Probably yes, especially if they don't read documentation of their DNS
software.

| The maximum amount of memory to use for the server's cache, in
| bytes. [...] The default is unlimited, meaning that records are
| purged from the cache only when their TTLs expire.

The number of complaints I've heard that "DNS resolvers eat *so* much
memory" suggests that few people tweak the default configuration. 8-(

However, it's unlikely that this was the cause of Comcast's problems
because DNS cache overflows would have an impact on a much larger
scale.


Re: BCP for ISP to block worms at PEs and NAS

2005-04-17 Thread Randy Bush

>>> On my Cisco-based SP network with RPMs in MGX chassis acting as
>>> PEs: I have the ACL below applied on many network devices to
>>> block the common worms ports,
>> if you are a service provider, perhaps filtering in the core
>> will not be appreciated by some customers.  of course, as a
>> provider, you can choose what 'service' you are providing.  but,
>> if you filter ports, it is not clear you are providing internet
>> service.
> one approach might be radius installed filters? some contract
> language to allow 'customers' to request standard templated
> filters at little/no-extra cost to them. Allow them to make the
> decision to filter themselves (where 'themselves' may be a dial
> reseller, of course).  Making them responsible means when
> odd-application-12 comes along to utilize tcp/135 you won't have
> to poke spot holes through your filters to permit this access.

yep.  but note that kim says "ACL below applied on many network
devices," and went on to mention ras, which i, possibly mistakenly,
took to mean not just the radius-able edge.

randy



Re: BCP for ISP to block worms at PEs and NAS

2005-04-17 Thread Christopher L. Morrow


On Sun, 17 Apr 2005, Randy Bush wrote:

>
> > On my Cisco-based SP network with RPMs in MGX chassis acting as PEs:
> > I have the ACL below applied on many network devices to block the
> > common worms ports,
>
> if you are a service provider, perhaps filtering in the core will
> not be appreciated by some customers.  of course, as a provider,
> you can choose what 'service' you are providing.  but, if you
> filter ports, it is not clear you are providing internet service.

one approach might be radius installed filters? some contract language to
allow 'customers' to request standard templated filters at little/no-extra
cost to them. Allow them to make the decision to filter themselves (where
'themselves' may be a dial reseller, of course).  Making them responsible
means when odd-application-12 comes along to utilize tcp/135 you won't
have to poke spot holes through your filters to permit this access.


Re: BCP for ISP to block worms at PEs and NAS

2005-04-17 Thread Randy Bush

> On my Cisco-based SP network with RPMs in MGX chassis acting as PEs:
> I have the ACL below applied on many network devices to block the
> common worms ports,

if you are a service provider, perhaps filtering in the core will
not be appreciated by some customers.  of course, as a provider,
you can choose what 'service' you are providing.  but, if you
filter ports, it is not clear you are providing internet service.

randy



Re: cost of doing business (was:Re: OpenTransit (france telecom) depeers cogent)

2005-04-17 Thread Randy Bush

> Let's say for the sake of argument that by 2010 we want to give every 
> household 5 megabit/s on average. How could this be done with technology 
> today seen on the radar? Remember that the households should want to pay 
> for the bandwidth as well, meaning they might be willing to pay $30 per 
> month for the bandwidth part (this is kind of high, but let's go with it). 

fwiw, 100mb to the home costs about that in japan

randy



RE: cost of doing business (was:Re: OpenTransit (france telecom) depeers cogent)

2005-04-17 Thread Hannigan, Martin

> -Original Message-
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of
> [EMAIL PROTECTED]
> Sent: Saturday, April 16, 2005 1:58 PM
> To: [EMAIL PROTECTED]
> Subject: cost of doing business (was:Re: OpenTransit (france telecom)
> depeers cogent)
> 
> 
> 
> Mikael Abrahamsson writes:
> >So what will people do? Stop selling when their networks are 
> full? Ignore 
> >the economics and let other business carry the cost of bulk 
> internet? Go 
> >for cheaper platforms? Go bankrupt (if no other business can 
> carry the 
> >cost) ?
> 
> This problem will be fixed when the excess capacity built in the
> latter years of the boom is gone. That's not to say that the
> adjustment won't be painful - I'm sure a few more provider failures
> are in the offing - but obviously if the marginal price for bandwith
> doesn't pay for the capital costs of expansion, either eventually
> bandwidth will be more expensive, or the equipment will be cheaper.

As long as the hardware can keep up, the amount of glass in spectrum
in the ground should make this an impossibility for the near term,
10 years plus.

-M< 


Re: BCP for ISP to block worms at PEs and NAS

2005-04-17 Thread Suresh Ramasubramanian

On 4/17/05, Kim Onnel <[EMAIL PROTECTED]> wrote:
> 
> Can someone confirm if my approach explained below is sufficient and
> if there is other/better ways to do this ? something i am missing.
> 

blocking netbios and 2..3 other ports is one way to go.

however, what you need is fast detection and nullrouting / walled
garden setup for infected machines on your LAN

Joe St.Sauver's presentation at
http://darkwing.uoregon.edu/~joe/zombies.pdf should help

-- 
Suresh Ramasubramanian ([EMAIL PROTECTED])


BCP for ISP to block worms at PEs and NAS

2005-04-17 Thread Kim Onnel

Hello,

Can someone confirm if my approach explained below is sufficient and
if there is other/better ways to do this ? something i am missing.

On my Cisco-based SP network with RPMs in MGX chassis acting as PEs:

I have the ACL below applied on many network devices to block the
common worms ports,

On the NAS, i have placed the worm on the Group-Async interfaces so
the worms will not propagate between user who dial up on the same NAS,
and on the uplink ethernet interface.(in and out)

On the PEs, i have placed it on the interface switches for the
customers and on the uplink too, and then on the aggregating routers
and on the gateway for all these.

ip access-list extended worms
 deny   tcp any any eq 5554
 deny   tcp any any range 135 139
 deny   udp any any range 135 netbios-ss
 deny   tcp any any eq 445
 deny   udp any any eq 1026
 permit ip any any


Regards


Re: cost of doing business (was:Re: OpenTransit (france telecom) depeers cogent)

2005-04-17 Thread Mikael Abrahamsson
On Sun, 17 Apr 2005, Mike Leber wrote:
H, router and optical gear capabilities are growing faster than the 
market.  Can you say "permanent state of affairs".
Do you have any facts to back up this statement, as I am of another 
opinion. We're seeing doubling in traffic growth each year and the optics 
seem to quadruple every 3-4 years.

Of course if equipment cost goes up the vendors will have more resources 
to make more expensive gear, but I believe the price per bit has to come 
down rather than the opposite.

moores law > market growth
Well, speaking of that, the performance increase in harddrives and CPUs 
seem to have degenerated over the past year and the hefty price per bit 
decrease in harddrive space we saw 1999-2003 seem to have stopped in 2004.

A better (healthier? more sane?) metric is revenue per customer.
Increase in usage is of course driven by the price of bandwidth going 
down.

Let's say for the sake of argument that by 2010 we want to give every 
household 5 megabit/s on average. How could this be done with technology 
today seen on the radar? Remember that the households should want to pay 
for the bandwidth as well, meaning they might be willing to pay $30 per 
month for the bandwidth part (this is kind of high, but let's go with it). 
5 megabit/s at $30 is $6 per meg, with no oversubscription. It also means 
that for a large city with a million households we need to shuffle around 
1M*5M=5Tbit/s in that city alone. We probably need 10Tb national backbone 
to handle it, how do you do that with 40G or 100G links? That's a lot of 
parallell DWDM links :/

So the distributed p2p networks of the future will probably have to wait, 
and instead we'll do regular 1-many broadcasting via these networks and 
we'll be an interactive cable TV distribution instead.

--
Mikael Abrahamssonemail: [EMAIL PROTECTED]


Re: cost of doing business (was:Re: OpenTransit (france telecom) depeers cogent)

2005-04-17 Thread Mike Leber


On Sat, 16 Apr 2005 [EMAIL PROTECTED] wrote:
> Mikael Abrahamsson writes:
> >So what will people do? Stop selling when their networks are full? Ignore 
> >the economics and let other business carry the cost of bulk internet? Go 
> >for cheaper platforms? Go bankrupt (if no other business can carry the 
> >cost) ?
> 
> This problem will be fixed when the excess capacity built in the
> latter years of the boom is gone. That's not to say that the
> adjustment won't be painful - I'm sure a few more provider failures
> are in the offing - but obviously if the marginal price for bandwith
> doesn't pay for the capital costs of expansion, either eventually
> bandwidth will be more expensive, or the equipment will be cheaper.

H, router and optical gear capabilities are growing faster than the
market.  Can you say "permanent state of affairs".

moores law > market growth

A better (healthier? more sane?) metric is revenue per customer.

Mike.

+- H U R R I C A N E - E L E C T R I C -+
| Mike Leber   Direct Internet Connections   Voice 510 580 4100 |
| Hurricane Electric Web Hosting  Colocation   Fax 510 580 4151 |
| [EMAIL PROTECTED]   http://www.he.net |
+---+




Topics for NANOG 34

2005-04-17 Thread Steve Feldman

Greetings - here are the topics we've lined up so far for Seattle.  Keep
an eye out as we post additional talks:

http://www.nanog.org/mtg-0505/topics.html

Also, just a quick reminder that the registration fee goes up $50 on
Monday, April 25, and our hotel room block rate expires on April 27.


TUTORIALS
-
  -  Challenges in Network Security Protocols
 Level: Introductory
Radia Perlman, Sun

  -  Bridges, Routers, Switches, Oh My!
 Level: Introductory
Radia Perlman, Sun

  -  Best Practices for Determining the Traffic Matrix in IP Networks
 Level: Intermediate
Thomas Telkamp, Cariden

  -  BGP Techniques for Service Providers
 Level: Introductory/Intermediate
Philip Smith, Cisco

SUNDAY EVENING COMMUNITY MEETING
---
  - A follow-up to our meeting in Las Vegas (see
http://www.nanog.org/mtg-0505/coordination.html). Please join us!

GENERAL SESSION
---
  -  DNS Anycast Stability
Daniel Karrenberg, RIPE

  -  Design Decisions and Architecture Analysis of a Global 10G Backbone
 (We Do it, so You Don't Have To)
Vijay Gill, Time Warner

  -  Securing Carrier VoIP: Session Border Control
Hadriel Kaplan, Avici

  -  Anatomy of a Leak: AS9121 (or, "How We Learned To Start Worrying and
 Hate Maximum Prefix Limits")
Alin C. Popescu, Brian J. Premore, and Todd Underwood, Renesys

  -  Building Nameserver Clusters with Free Software
Joe Abley, ISC

  -  Trust Reflection: A Distributed Approach to PGP Key Signing at
 Multi-Day Events
Joe Abley, ISC

  -  Anycast Measurements Used to Highlight Routing Instabilities
Peter Boothe; Randy Bush, IIJ

  -  Beyond 10 Gigabit Ethernet
Neena Pemmaraju, Force10

  -  Internet Mini-Cores: Local Communications in the Internet's "Spur"
 Regions
Steve Gibbard, PCH

  -  The Spoofer Project: Inferring the Extent of Internet Source Address
 Filtering on the Internet
Robert Beverly, MIT

  -  Network-Wide Inter-Domain Routing Policies: Design and Realization
Olaf Maennel, RIPE; Anja Feldmann and Christian Reiser,
Technical University Munich; Ruediger Volk and Hagen Boehm,
Deutsche Telekom

BOFS

  -  ISP Security and NSP-SEC BOF IX

  -  Peering BOF IX
William B. Norton, Equinix, moderator

  -  INOC-DBA BoF with INOC-DBA Operators
Gaurab Raj Upadhaya, PCH, moderator