Re: More long AS-sets announced

2005-06-21 Thread Jerry Pasker


Hank wrote:




Wrong again.  You used both AS1221 and AS2121:



I logged pretty much the same thing with max-as limit 
blocking/logging the announcements (of course, the paths, and time 
stamp seconds are  different, YMMV)   Perhaps the unforeseen 
technical difficulties have something to do with not sticking to the 
original plan?  Announce something different to get around filters, 
and thus, detect who put filters in place?  Or more innocent. 
maybe fat fingers, or copy/paste gone horribly wrong?


Doesn't really matter what happened though, because a controlled 
announce is a lot better than a malicious one. Since a stupid person 
is the most dangerous type of person (fifth basic law of human 
stupidity), a malicious  announcement is even safer than a clueless 
one.  I'd much rather see this done by someone with clue that's going 
to announce and withdraw them, then check for damage, than by someone 
that might not know what the heck they're doing.  If there is damage, 
we'll all hear about it, and figure out how to stop it in the future 
when someone else tries to be malicious.  Or when someone else is 
just plain clueless.


Apparently that's not the case since this whole experiment was so 
disruptive that it took 16 hours for someone to notice and point out 
on NANOG that it neither did nor did not go off as previously 
announced.


(I'm guilty of looking it over in the logs, and not even noticing the 
difference between 2121 and 1221)


The internet is our playground... can't we just all get along?  If 
someone's going to load 50 kids on a merry-go-round, and get 50 more 
kids to push it I'll just stand over by the monkey bars and try 
to avoid the flying vomit.  :-)


-Jerry


Re: [NON-OPERATIONAL] Re: NANOG Evolution

2005-06-21 Thread Randy Bush

 It shouldn't be complicated. I think members are looking
 for Operator experience. I don't think it's too hard to make that
 easily discernable as long as it's fair. 
 Members aren't looking for Operator experience (sic). Members are 
 looking for talks that do not suck.

i think you mean to s/members/meeting attendees/
which is a small subset of those with a stake in
nanog.

randy



Re: [NON-OPERATIONAL] Re: NANOG Evolution

2005-06-21 Thread Brad Knowles


At 10:18 PM -0700 2005-06-20, Tony Li wrote:


 It is true that the PC will not get enough of these if it continues to
 rely on contributions.  Which of us *wants* to present?  Public speaking
 is the number one common fear, bar none.


	Speaking only for myself, I'm not afraid of public speaking.  It 
does have to be a topic I feel comfortable with, which usually means 
either re-using a talk that I have previously done before (albeit 
updated), or updating a topic that I've talked on before.


	The former is easier for me, as I can take an existing 
presentation and re-work it (more or less).  The latter is more 
difficult but probably more interesting for many in the audience who 
may have seen the presentation before.



	All you gotta do is help me get there, help me with the cost of 
staying there, and fit into my schedule.  I don't require any 
speakers fees, and for small conferences I'd be willing to help more 
with the expenses, but larger conferences would need to provide more 
of the funding themselves.  However, I will consider all offers.


	My registration at the SAGE Speakers Bureau (see 
http://www.sage.org/speakers/speakerhtml/15.mm) is a little old, 
but mostly still correct.



 p.s. No, I'm not a candidate.  If elected, I will not serve.  ;-)


	I'm not a candidate either, and will not serve if anyone was 
stupid enough to try to elect me.


But I'd be happy to speak, if someone was interested in hearing me.

--
Brad Knowles, [EMAIL PROTECTED]

Those who would give up essential Liberty, to purchase a little
temporary Safety, deserve neither Liberty nor Safety.

-- Benjamin Franklin (1706-1790), reply of the Pennsylvania
Assembly to the Governor, November 11, 1755

  SAGE member since 1995.  See http://www.sage.org/ for more info.


RE: [NON-OPERATIONAL] Re: NANOG Evolution

2005-06-21 Thread Steve Gibbard


On Mon, 20 Jun 2005, Hannigan, Martin wrote:


Ultimately, the SC is elected to represent the membership and
carry out it's will and that should be uniformly actionable
across the board in order for the SC to be taken seriously
by the group and by Merit.


I'm not sure what you mean here.


It means that it doesn't make a lot of sense to handcuff
the SC out of the gate on a supposition that they will do
'something bad' to the PC.

Anyhow, it's a window dressing handcuffing. Looks like anyone can be
removed with a 5 to 7 vote of the SC. You've all read the revised
Charter, top to bottom? Kind of makes 6.2.1 ceremonial. It should
be removed based on that alone.


As the charter is currently written, every future steering committee will 
be stuck with a specific half of the program committee, left over from the 
previous year.  The first steering committee gets to decide which of the 
current program committee members are in the half that they're stuck with, 
so they're much more powerful when it comes to program committee selection 
than any future steering committee will be.


In the draft that several of us worked on, the first steering committee 
had even more power than that, as they could have fired the entire program 
committee and started over.  Merit changed that, and gave lots of time for 
people to object, but nobody did.  As a result, we've got a system where 
all program committee members will have been chosen by the steering 
committee immediately, but half of them will have been chosen from a 
limited pool.  A year later, we'll have a program committee that has been 
entirely chosen by the first two elected steering committees.


In the original draft, we staggered the steering committee terms because 
we wanted continuity.  In Merit's version, that continuity was extended to 
the first year.


As Marty points out, a super-majority of the steering committee could 
remove more program committee members.  The super-majority requirement was 
put in to make it hard to do -- something that should happen when there's 
consensus that somebody isn't working out.  I don't think it would be 
appropriate or necessary for the steering committee to use that power to 
override the intent of the charter, nor do I think it would be a good idea 
for the steering committee to get rid of even half of the program 
committee at once.  If Marty is feeling constrained by that section of the 
charter (I'm not sure if he is, or if he's just making noise), then we've 
found at least one difference between two of the candidates. ;)


-Steve


Re: NANOG Evolution

2005-06-21 Thread Herb Leong

Randy Bush wrote:
#  The candidates for the Steering Committee are:
# Joe Abley
# Randy Bush
# Christopher Chin
# Ron da Silva
# Vince Fuller
# Steve Gibbard
# Dan Golding
# Martin Hannigan
# Dorian Kim
# Mark Kosters
# Jared Mauch
# Chris Morrow
# William B. Norton
# Philip Smith
# Josh Snowhorn
# Dave Wodelet
# Lixia Zhang
# 
# could you annotate which of these candidates actually work
# at an isp or large content provider?
# 
# randy

Better yet, what about links to resumes/backgrounds?

/herb


Re: More long AS-sets announced

2005-06-21 Thread MarcoH

On Tue, Jun 21, 2005 at 08:13:08AM +0300, Hank Nussbacher wrote:
  due to unforeseen technical difficulties, we have been forced to
  postpone these experiments. We plan to make the announcements at the
  same times on Monday 20 June.
 
  The prefixes will be the same (84.205.73.0/24 and 84.205.89.0/24) and
  will be originated by AS12654 as before, but the AS-set will consist of
  AS2121 repeated n times, so the paths will look like 12654 {2121, 2121,
  .., 2121}. AS2121 is the RIPE meeting AS, which is reserved for RIPE
  meetings and does not currently appear in the global routing table.
 
 Wrong again.  You used both AS1221 and AS2121:

Yups, smells like a small but very dangerous typo.

From a netcitizen's perpesctive and as being involved in operating a part
of the internet, I'm starting to dislike this whole experiment more and
more. I understand, as people already commented, the internet in fact is
one big experiment, but this is getting out-of-hand.

Can the people responsible for this please reconsider and put things on
hold until certain conditions are met:

Publish a detailed workplan including AS-es used, windows and risk
analysis to the various mailinglists.

A reasonable time between annoucements and the experiment instead of 24
hours.

Some assurance that input files are checked for typos.

Take another look wether it is smart to use 'production' AS-es for it,
such as the RIS or meeting AS numbers, instead of a seperate set. I think
people are going to get real unhappy if somewhere in October they found
out the meeting network is blocked at various places.

Just my 2 cents,

MarcoH


Re: More long AS-sets announced

2005-06-21 Thread Randy Bush

 Can the people responsible for this please reconsider and put things on
 hold until certain conditions are met:
 Publish a detailed workplan including AS-es used, windows and risk
 analysis to the various mailinglists.

given they are using their own prefixes, can you please tell
us what risk there might be.

 Some assurance that input files are checked for typos.

hopefully better than the mean of operators doing so :-)/2

randy



MCI routing loop near Chicago

2005-06-21 Thread James Couzens
MCI administrator(s):

Whilst attempting to contact host '64.195.130.100' (NS1.USR.COM).

From Net-Nation (TIER-1 peering with BIG PIPE, LEVEL 3, MCI, VAIX):
 
 3  r1.netnation.com (64.40.105.1)  0.580 ms  0.716 ms  0.618 ms
 4  122.ATM2-0.GW1.VAN1.ALTER.NET (209.167.46.101)  0.727 ms  0.898 ms  1.122 ms
 5  0.so-1-0-0.XL2.VAN1.ALTER.NET (152.63.137.134)  1.518 ms  1.171 ms  1.150 ms
 6  0.so-6-0-0.XL2.CHI6.ALTER.NET (152.63.65.126)  47.873 ms  48.239 ms  47.895 
ms
 7  POS7-0.GW6.CHI6.ALTER.NET (152.63.68.189)  47.759 ms  47.986 ms  47.879 ms
 8  mci28259-gw.customer.alter.net (63.84.148.170)  50.134 ms  50.505 ms  
49.439 ms
 9  Serial4-8.GW6.CHI6.ALTER.NET (63.84.148.169)  49.412 ms  49.208 ms  49.800 
ms
10  mci28259-gw.customer.alter.net (63.84.148.170)  51.736 ms  50.326 ms  
50.194 ms
11  Serial4-8.GW6.CHI6.ALTER.NET (63.84.148.169)  50.191 ms  49.972 ms  50.192 
ms
12  mci28259-gw.customer.alter.net (63.84.148.170)  51.314 ms  51.605 ms  
52.499 ms
13  Serial4-8.GW6.CHI6.ALTER.NET (63.84.148.169)  54.37 ms  53.607 ms  54.81 ms

For what its worth if someone from US Robotics is listening, neither of
your two listed nameservers are reachable from Western Canada as tested
from Net-Nation, the Shaw and Telus residential networks, and the Telus
business network.

Cheers,

James

-- 
James Couzens,
Programmer

http://libspf.org   - ANSI C Sender Policy Framework library
http://ses.codeshare.ca - Signed Envelope Sender, A comprehensive
and simple solution to stopping SMTP forgery.   Please review our
work and find any flaws in our protocol.


signature.asc
Description: This is a digitally signed message part


Re: NANOG Evolution

2005-06-21 Thread Alex Rubenstein




Perhaps using the ARIN model for this would be a good idea.

IIRC, after someone in nominated, they are asked to fill out a small 
questionnaire. Things like Organization, Org URL, Why do you want to serve 
on the AC?, Describe how your professional goals and experience are 
relevant, Describe your technical (especially IP) and professional 
qualifications for filling an AC seat, etc.


Also, an important question is:

Please provide detailed biographical information to include all 
experience, activities, associations, and affiliations (national and 
international) relevant to serving on the AC. Describe positions held, and 
your specific duties, achievements, and levels of responsibility. Include 
the names of organizations served and dates of service.


Realising the above is specific to the AC, I believe with simple 
modifications, these questions would serve the NANOG community well in 
letting us feel comfortable with the nominees.









On Tue, 21 Jun 2005, Herb Leong wrote:



Randy Bush wrote:
#  The candidates for the Steering Committee are:
# Joe Abley
# Randy Bush
# Christopher Chin
# Ron da Silva
# Vince Fuller
# Steve Gibbard
# Dan Golding
# Martin Hannigan
# Dorian Kim
# Mark Kosters
# Jared Mauch
# Chris Morrow
# William B. Norton
# Philip Smith
# Josh Snowhorn
# Dave Wodelet
# Lixia Zhang
#
# could you annotate which of these candidates actually work
# at an isp or large content provider?
#
# randy

Better yet, what about links to resumes/backgrounds?

/herb



--
Alex Rubenstein, AR97, K2AHR, [EMAIL PROTECTED], latency, Al Reuben
Net Access Corporation, 800-NET-ME-36, http://www.nac.net



Re: MCI routing loop near Chicago

2005-06-21 Thread Alexander Koch

On Tue, 21 June 2005 04:52:44 -0700, James Couzens wrote:
 MCI administrator(s):

Ehm... seriously, you as a customer should know the NOC
email address of them, right? At least that traceroute
indicates you are one, or the host from where it starts.

 From Net-Nation (TIER-1 peering with BIG PIPE, LEVEL 3, MCI, VAIX):

And that is crap, sorry to say.

Please, post to NANOG if you have to and if there is no way
out. And kindly explain what you did before and what did not
work when you post such stuff.

Alexander



Re: MCI routing loop near Chicago

2005-06-21 Thread James Couzens
On Tue, 2005-06-21 at 04:52 -0700, James Couzens wrote:
 MCI routing loop near Chicago

As Alexander Koch pointed out I could have been more detailed in my post
with respect to methods attempted to notify the relevant parties prior
to posting to the NANOG list.

With that in mind, after roughly two hours of attempting to notify MCI
through the available channels receiving only two responses, both from
MCI (US Robotics can not respond, their poor DNS setup has left me with
no means to contact them via e-mail (NS2.RACKSPACE.COM doesn't appear to
know about USR and their primary is unreachable to me and additionally
through several on-line DNS lookup engines I tried)) I felt that I would
post to NANOG as a last resort.

For what its worth the auto-generated ticket number I received from
MCI's [EMAIL PROTECTED] address was:  2005062102342.  The other response
I received was an Out of Office Autoreply from [EMAIL PROTECTED]

Hope that helps,

Cheers,

James

-- 
James Couzens,
Programmer

http://libspf.org   - ANSI C Sender Policy Framework library
http://ses.codeshare.ca - Signed Envelope Sender, A comprehensive
and simple solution to stopping SMTP forgery.   Please review our
work and find any flaws in our protocol.
-
PGP: http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x7A7C7DCF

This is not quite as crazy as it sounds, since people knew how
 to write small, efficient programs in those days, a skill that
 has subsequently been lost. -- Andrew S. Tanenbaum


signature.asc
Description: This is a digitally signed message part


Re: NANOG Evolution

2005-06-21 Thread Dorian Kim

On Tue, Jun 21, 2005 at 07:40:43AM -0400, Alex Rubenstein wrote:
 Perhaps using the ARIN model for this would be a good idea.
 
 IIRC, after someone in nominated, they are asked to fill out a small 
 questionnaire. Things like Organization, Org URL, Why do you want to serve 
 on the AC?, Describe how your professional goals and experience are 
 relevant, Describe your technical (especially IP) and professional 
 qualifications for filling an AC seat, etc.
 
 Also, an important question is:
 
 Please provide detailed biographical information to include all 
 experience, activities, associations, and affiliations (national and 
 international) relevant to serving on the AC. Describe positions held, and 
 your specific duties, achievements, and levels of responsibility. Include 
 the names of organizations served and dates of service.
 
 Realising the above is specific to the AC, I believe with simple 
 modifications, these questions would serve the NANOG community well in 
 letting us feel comfortable with the nominees.

While it's not quite as specific as above, don't the candidate bios
http://www.nanog.org/candidates05.html serve much the same purpose?

Quick glance at the bios seem to fairly cogently list candidates' 
current employment and responsibilities as well as relevant activities.

So, are we missing something? Should we be adding candidate position 
statements and such? 

-dorian


Re: NANOG Evolution

2005-06-21 Thread Randy Bush

 While it's not quite as specific as above, don't the candidate bios
 http://www.nanog.org/candidates05.html serve much the same purpose?

there are at least two folk on the list who are pretty much
purely marketing.  hard to tell from that page.

randy



Re: [NON-OPERATIONAL] Re: NANOG Evolution

2005-06-21 Thread Susan Harris



There's a mailing list for this.  Betty announced it last week, I
can't remember off the top of my head.  I think it was pre-populated
with the list of eligible voters.  (I hope there's a way to get
off, for those who may  not want to receive campaign ads.


It's [EMAIL PROTECTED]  Everyone who was subscribed to 
nanog-futures has been added, and we'll soon (today) add all the eligible 
voters listed at www.nanog.org/voters05.html.  To cover all bases, 
there's subscription info here:


www.nanog.org/email.html

It would be *great* if we could move this discussion over there.


Re: More long AS-sets announced

2005-06-21 Thread MarcoH

On Tue, Jun 21, 2005 at 10:27:18AM +0100, Randy Bush wrote:
  Can the people responsible for this please reconsider and put things on
  hold until certain conditions are met:
  Publish a detailed workplan including AS-es used, windows and risk
  analysis to the various mailinglists.
 
 given they are using their own prefixes, can you please tell
 us what risk there might be.

Not much, but I guess people in the audience might get happy from the
small note that labtests showed IOS won't crash when it encounters these
annoucements.

MarcoH


Re: [NON-OPERATIONAL] Re: NANOG Evolution

2005-06-21 Thread Daniel Golding


The PC has 16 seats. Finding eight qualified people will be doable. Finding
16 qualified people, capable of hitting the ground running, with a
conference 4 months in their future to plan, would be untenable. It takes a
non-trivial amount of time to recruit and organize that many folks. I'm not
crazy about this being written into the bylaws, but in practice, its the
most efficient approach and probably the one that would have been taken in
any case.

The other issue is, when looking at the current composition of the PC, there
are at least 8 qualified, dedicated people. The idea of moving the PC to a
be more representative of the operational and infrastructure community is a
good one. The PC has, in the past, been too heavily weighted towards vendors
and ex-Merit folks. Appointing 8 new folks will move the PC in the direction
that the community wants to take.

I don't think we should be worried about the power of the SC. Instead, we
should be concerned about being able to effect the necessary changes that
the community wants - a more representative PC, better talks on a wider and
more interesting range of topics, etc. Part of this will involve changed to
the mission of the PC...

- an expectation that each PC member will actively recruit/present/moderate
at least one quality session per conference.

- expanding the scope of presentations to include new (to us) topics such as
those related to providing VoIP services, hosting, access networks
(DSL/Broadband/Wireless), network security, MPLS VPN scalability and
interconnection issues, etc. I'd rather have a great talk on WiMax (IEEE
802.16-2000) than a bad talk on BGP any day.

- Finding ways to inject the material we've seen in recent BOFs into the
plenary or tracking sessions. The BOF material has been the most innovative
stuff due to a relative lack of oversight combined with a freer format.

- Maintaining and expanding the educational aspects of NANOG's mission
through tutorials and other sessions.

PC folks who are ok with this, old or new, will be able to contribute to and
lead this effort.

(BTW, for those responding or posting to this thread or others which are
similar, please include a non-op tag in the subject line so that folks who
don't want to read about political machinations can procmail us efficiently)

- Daniel Golding

On 6/21/05 3:03 AM, Steve Gibbard [EMAIL PROTECTED] wrote:

 On Mon, 20 Jun 2005, Hannigan, Martin wrote:
 
 Ultimately, the SC is elected to represent the membership and
 carry out it's will and that should be uniformly actionable
 across the board in order for the SC to be taken seriously
 by the group and by Merit.
 
 I'm not sure what you mean here.
 
 It means that it doesn't make a lot of sense to handcuff
 the SC out of the gate on a supposition that they will do
 'something bad' to the PC.
 
 Anyhow, it's a window dressing handcuffing. Looks like anyone can be
 removed with a 5 to 7 vote of the SC. You've all read the revised
 Charter, top to bottom? Kind of makes 6.2.1 ceremonial. It should
 be removed based on that alone.
 
 As the charter is currently written, every future steering committee will
 be stuck with a specific half of the program committee, left over from the
 previous year.  The first steering committee gets to decide which of the
 current program committee members are in the half that they're stuck with,
 so they're much more powerful when it comes to program committee selection
 than any future steering committee will be.
 
[snip] 
 -Steve






Re: More long AS-sets announced

2005-06-21 Thread Randy Bush

 Can the people responsible for this please reconsider and put things on
 hold until certain conditions are met:
 Publish a detailed workplan including AS-es used, windows and risk
 analysis to the various mailinglists.
 given they are using their own prefixes, can you please tell
 us what risk there might be.
 Not much, but I guess people in the audience might get happy from the
 small note that labtests showed IOS won't crash when it encounters these
 annoucements.

showing that ios won't crash is very difficult because the number
of versions of ios, and the amazing dependencies of things on which
blade is in which slot and what phase is the moon.

but reading the roma gang's papers and the main email note leads me
to feel they have done as good a job on this as we can reasonably
expect.

considering that we have fellow isps dumping horrifying garbage in
the rib, it's amusing how we attack a seemingly well-run very small
experiment.

randy



Re: Email peering

2005-06-21 Thread Rich Kulawiec

On Fri, Jun 17, 2005 at 11:48:58AM -0400, Ben Hubbard wrote:
 You seem to repeatedly describe a solution that becomes so big that it (at
 least substantially) replaces 25/SMTP. That's what I don't think will
 work, or is needed.

Please let me borrow Ben's point and expand on it.

Spam as it's usually discussed (spam propagated via SMTP) is only part of
the spam problem.  We've seen Usenet spam, chat room spam, http referrer
log spam, blog spam, and so on.  And all of those bundled together and
labeled as spam are only part of the overall network abuse problem --
which also involves phishing, zombies, DoS attacks, spyware, etc.
And these are all (increasingly) interelated problems, e.g. spam is used to
phish people to sites which forcibly download spyware, and so on.

We could (and some already have) spend an enormous amount of time devising
very clever solutions to these and deploying them.  But as we've seen,
doing so usually results only in a shift in the nature of the abuse, not
an overall reduction in it.

So even if we had The Perfect Solution to SMTP spam and it was globally
deployed tomorrow and had no adverse side-effects...we'd buy ourselves
a brief respite, no better.

I'm not saying some of the technical approaches aren't clever.  They are.
But none of them are going to solve the problem for any acceptable value
of solve, not because there's anything wrong with them per se, but
because they're technological attempts to solve the problem at its
end points -- rather than its source points.

The best place to stop abuse is as near its source as possible.

Meaning: it's far easier for network X to stop abuse from leaving its
network than it is for 100,000 other networks to defend themselves from it.
Especially since techniques for doing so (for instance, controlling
outbound SMTP spam) are well-known, heavily documented, and easily put
into service.

The problem is that network X, for many values of X (see the data
compiled by Spamhaus or SPEWS or any number of others) hasn't done so.
Whether that failure is due to incompetence, greed, laziness, negligence
or anything else is an interesting question...but really doesn't matter,
because regardless of the cause, the fastest way to get it fixed is to
make it X's problem...*not everyone else's*.  (It's often impressive
how fast X can move--despite protestations otherwise--when this situation
is created.)

Those who have been around a long long time know that this is how it
used to be.  If your network started spewing crap, and didn't stop spewing
crap in a fairly timely manner, you got a phone call or email explaining
that someone had their hand on your plug and was going to pull it.


The point?  The point is that there is no need for any new technology
to deal with the spam/abuse probem.  What there is a desperate need
for is the *will* to use the technology we already have -- to shift
the burden of dealing with abuse onto those who are permitting it
to originate from their network.  This can be done in a number of
ways: using DNSBLs, firewalls, routers, whatever.

Because if it's not done, then Network X, for many values of X,
will be perfectly happy to watch everyone else innovate and scramble
and spend money to defend themselves *as long as X doesn't have to*.
As we've seen.  For many years.  Over and over and over again.

After all, why should they?  There's nothing in it for them and no
downside if they don't.

[...] if you give people the means to hurt you, and they do it,
and you take no action except to continue giving them the means
to hurt you, and they take no action except to keep hurting you,
then one of the ways you can describe the situation is it isn't
scaling well.

--- Paul Vixie

So either the collective we has the will to stop putting up with this
nonsense -- or we don't.  If it's the former, then we already have all
the tools we need.  If it's the latter, then nothing we come up with,
no matter who clever it is, is going to make any real difference.

---Rsk


OSPF -vs- ISIS

2005-06-21 Thread Dan Evans

All,

Can anyone point me to information on what the top N service providers
are using for their IGP? I'm trying to build a case for switching from
OSPF to IS-IS. Those on this list who are currently running IS-IS, do
you find better scalability and stability running IS-IS than OSPF? I
understand that this question is a lot more complex than a simple yes
or no since factors like design and routing policy will certainly
affect the protocols behavior.

Any insights or experiences that you can share would be most helpful.

Thanks,

Daniel Evans
Alltel Communications


Re: OSPF -vs- ISIS

2005-06-21 Thread Eric Gauthier

 Can anyone point me to information on what the top N service providers
 are using for their IGP?

Can we expand this to include enterprise networks as well?  The University
that I work for is planning to do a switch-over from OSPF to ISIS, but 
I'd like to know if we're really a one off.

Eric :)


Re: OSPF -vs- ISIS

2005-06-21 Thread Erik Haagsman

On Tue, 2005-06-21 at 09:04 -0500, Dan Evans wrote:
 Can anyone point me to information on what the top N service providers
 are using for their IGP? I'm trying to build a case for switching from
 OSPF to IS-IS.

Why are you trying to build a case...? Would you already have
operational benefit from switching and are you building a case round
that and if not, why switch...? Switching IGP in a non-trivial network
isn't something you'd want to do unless you've got a clear motive and it
gives you some operational advantage...

Cheers,

-- 
---
Erik Haagsman
Network Architect
We Dare BV
Tel: +31(0)10-7507008
Fax: +31(0)10-7507005
http://www.we-dare.nl




Re: OSPF -vs- ISIS

2005-06-21 Thread vijay gill


Dan Evans wrote:

All,

Can anyone point me to information on what the top N service providers
are using for their IGP? I'm trying to build a case for switching from
OSPF to IS-IS. Those on this list who are currently running IS-IS, do
you find better scalability and stability running IS-IS than OSPF? I
understand that this question is a lot more complex than a simple yes
or no since factors like design and routing policy will certainly
affect the protocols behavior.

Any insights or experiences that you can share would be most helpful.

Thanks,

Daniel Evans
Alltel Communications


Daniel, in short, we've found ISIS to be slightly easier to maintain and 
run, with slightly more peace of mind in terms of securitiy than OSPF. 
Performance and stability wise, no major difference that was noticable.


For more information, see the talk by Dave Katz at 
http://www.nanog.org/mtg-0006/katz.html


Also, AOL's experience in switching from OSPF to ISIS is covered at 
http://www.nanog.org/mtg-0310/gill.html
the PDF on that page is actually an older version. The full version I 
used at NANOG is available at http://www.vijaygill.com/oi.pdf


/vijay



Re: MCI routing loop near Chicago

2005-06-21 Thread Christopher L. Morrow



On Tue, 21 Jun 2005, James Couzens wrote:

 On Tue, 2005-06-21 at 04:52 -0700, James Couzens wrote:
  MCI routing loop near Chicago

 As Alexander Koch pointed out I could have been more detailed in my post
 with respect to methods attempted to notify the relevant parties prior
 to posting to the NANOG list.

 With that in mind, after roughly two hours of attempting to notify MCI
 through the available channels receiving only two responses, both from
 MCI (US Robotics can not respond, their poor DNS setup has left me with
 no means to contact them via e-mail (NS2.RACKSPACE.COM doesn't appear to
 know about USR and their primary is unreachable to me and additionally
 through several on-line DNS lookup engines I tried)) I felt that I would
 post to NANOG as a last resort.

 For what its worth the auto-generated ticket number I received from
 MCI's [EMAIL PROTECTED] address was:  2005062102342.  The other response

and help4u probably isn't going to fix this as it's clearly the customer's
loop, not mci's... traffic looping from

11  Serial4-8.GW6.CHI6.ALTER.NET (63.84.148.169)  50.191 ms  49.972 ms
50.192
ms
12  mci28259-gw.customer.alter.net (63.84.148.170)  51.314 ms  51.605 ms
52.499 ms

(gw == edge/aggregation device, 'customer.alter.net' == cpe)

is a 'customer problem'. Help4u will likely have responded with a 'not our
problem, but thanks' (or something polite and along those lines). Thanks
though.

-Chris




Re: OSPF -vs- ISIS

2005-06-21 Thread Dan Evans

We're currently running OSPF. Believe me, I understand that switching
IGP's is not a simple undertaking. There are several benefits that I'm
looking at, some of which have already been mentioned in replies to my
original thread. Security is one, the other being IPv6 support. I'm
going to have to turn on another protocol in order to support IPv6. My
two choices are OSFPv3 or IS-IS. The decision then becomes, do I have
a single IGP protocol that maintains both IPv4 and IPv6 information,
or do I run two seperate (although closely related) protocols.

-Dan


On 6/21/05, Dan Evans [EMAIL PROTECTED] wrote:
 All,
 
 Can anyone point me to information on what the top N service providers
 are using for their IGP? I'm trying to build a case for switching from
 OSPF to IS-IS. Those on this list who are currently running IS-IS, do
 you find better scalability and stability running IS-IS than OSPF? I
 understand that this question is a lot more complex than a simple yes
 or no since factors like design and routing policy will certainly
 affect the protocols behavior.
 
 Any insights or experiences that you can share would be most helpful.
 
 Thanks,
 
 Daniel Evans
 Alltel Communications



Re: OSPF -vs- ISIS

2005-06-21 Thread Fergie (Paul Ferguson)


It is a dangerous thing when, in the course of engineering,
you have a solution looking for a problem, instead of a problem
looking for a solution.

I'd say that the biggest benefit in using IS-IS over OSPF is
the tuning of route metrics, but aside from that, I'd say that
the two routing protocols are substantially similar enough to
warrant close consideration of exactly what one would want bad
enough to switch from one to the other.

- ferg

-- Erik Haagsman [EMAIL PROTECTED] wrote:

On Tue, 2005-06-21 at 09:04 -0500, Dan Evans wrote:
 Can anyone point me to information on what the top N service providers
 are using for their IGP? I'm trying to build a case for switching from
 OSPF to IS-IS.

Why are you trying to build a case...? Would you already have
operational benefit from switching and are you building a case round
that and if not, why switch...? Switching IGP in a non-trivial network
isn't something you'd want to do unless you've got a clear motive and it
gives you some operational advantage...


--
Fergie, a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 [EMAIL PROTECTED] or [EMAIL PROTECTED]
 ferg's tech blog: http://fergdawg.blogspot.com/


RE: OSPF -vs- ISIS

2005-06-21 Thread Mike Bernico

The State of Illinois converted to ISIS in 2002 from EIGRP and it has
definitely been a good thing for us.  It's been operationally bullet
proof, and simple to maintain.  

We typically get features faster than we would if we ran OSPF.  For
example, we have a desire in the future to use IPFRR.  Every indication
from the vendor is that this feature will be available to ISIS first,
most likely because of either the extensibility of ISIS or more likely
because ISIS is in so many larger providers.  

Mike Bernico





-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
vijay gill
Sent: Tuesday, June 21, 2005 9:20 AM
To: Dan Evans
Cc: nanog@merit.edu
Subject: Re: OSPF -vs- ISIS


Dan Evans wrote:
 All,
 
 Can anyone point me to information on what the top N service providers
 are using for their IGP? I'm trying to build a case for switching from
 OSPF to IS-IS. Those on this list who are currently running IS-IS, do
 you find better scalability and stability running IS-IS than OSPF? I
 understand that this question is a lot more complex than a simple yes
 or no since factors like design and routing policy will certainly
 affect the protocols behavior.
 
 Any insights or experiences that you can share would be most helpful.
 
 Thanks,
 
 Daniel Evans
 Alltel Communications

Daniel, in short, we've found ISIS to be slightly easier to maintain and

run, with slightly more peace of mind in terms of securitiy than OSPF. 
Performance and stability wise, no major difference that was noticable.

For more information, see the talk by Dave Katz at 
http://www.nanog.org/mtg-0006/katz.html

Also, AOL's experience in switching from OSPF to ISIS is covered at 
http://www.nanog.org/mtg-0310/gill.html
the PDF on that page is actually an older version. The full version I 
used at NANOG is available at http://www.vijaygill.com/oi.pdf

/vijay



Re: OSPF -vs- ISIS

2005-06-21 Thread Fergie (Paul Ferguson)


Isn't that because Dave re-wrote all of the IS-IS code? ;-)

- ferg


-- vijay gill [EMAIL PROTECTED] wrote:

Daniel, in short, we've found ISIS to be slightly easier to maintain and 
run, with slightly more peace of mind in terms of securitiy than OSPF. 
Performance and stability wise, no major difference that was noticable.

For more information, see the talk by Dave Katz at 
http://www.nanog.org/mtg-0006/katz.html

Also, AOL's experience in switching from OSPF to ISIS is covered at 
http://www.nanog.org/mtg-0310/gill.html
the PDF on that page is actually an older version. The full version I 
used at NANOG is available at http://www.vijaygill.com/oi.pdf

/vijay

--
Fergie, a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 [EMAIL PROTECTED] or [EMAIL PROTECTED]
 ferg's tech blog: http://fergdawg.blogspot.com/


Re: More long AS-sets announced

2005-06-21 Thread Pete Templin


Randy Bush wrote:


showing that ios won't crash is very difficult because the number
of versions of ios, and the amazing dependencies of things on which
blade is in which slot and what phase is the moon.


Thank you.  You've provided a clean, concise counter to Lorenzo's 
original claim that long AS sets won't trip on IOS bugs.


This may be a well-run, very small experiment, but it's experimenting 
with a space that's rarely explored and therefore less likely to have 
encountered the same level of operational testing that horrifying 
garbage leaks have tested.  As such, I'm frustrated that the testers 
consider requests to provide more advance notice to be so obtuse.


Many of us in the operational community are required to conduct testing 
in lab environments, followed by well-announced maintenance windows. 
Why is this operational test supposed to be given freer reign on the 
'net than our own operations?  Alternatively, why can't the test be 
conducted in a lab, with interested operators providing router 
configurations and xOS versions to give the test bed the most realistic 
sample of the 'net, without using the production 'net?


pt


Re: More long AS-sets announced

2005-06-21 Thread Bruce Campbell



On Tue, 21 Jun 2005, Pete Templin wrote:


Randy Bush wrote:


showing that ios won't crash is very difficult because the number
of versions of ios, and the amazing dependencies of things on which
blade is in which slot and what phase is the moon.


Thank you.  You've provided a clean, concise counter to Lorenzo's original 
claim that long AS sets won't trip on IOS bugs.



..
Alternatively, why can't the test be conducted in a lab, with 
interested operators providing router configurations and xOS versions to give 
the test bed the most realistic sample of the 'net, without using the 
production 'net?


Has anyone considered that the project may have indeed done testing of 
available IOS/$ROUTER versions in a lab environment before even 
considering testing on the 'live' internet?  Reading the cited material 
might be of benefit to the vocal complainers.


I think Lorenzo would be the first to admit that the timing of operator 
notifications, and more importantly the wording, may be less than desired, 
however this does not detract from the caution, and professionalism 
exhibited thus far in this set of experiments.


This may be a well-run, very small experiment, but it's experimenting with a 
space that's rarely explored and therefore less likely to have encountered 
the same level of operational testing that horrifying garbage leaks have 
tested.


Part of the problem is that because it is, as you put it, a rarely 
explored problem space, the number of interested parties with sufficient 
and varied resources is extremely small, resulting in a less-than-complete 
testing environment.


Another part of the problem is that you cannot put the concept back in the 
box.  The black-hats do read operational lists, and with all the fuss 
being made over possible breakage caused by AS-sets, some of them will do 
will perform their own, possibly destructive experiments in order to find 
out what specific $ROUTER versions do under various inputs.


So, which would you prefer.. Lorenzo at a known contact number with known 
working hours (+31 20 535 , 10am to 5pm GMT +1), and with the 
Internet's best interests at heart, or some malcontent with unknown 
contacts, unknown hours, and very definitely not your best interests at 
heart ?


--==--
Bruce.

Unfortunately, option 3, do nothing to see whether it is actually 
a problem, is no longer valid.




Re: More long AS-sets announced

2005-06-21 Thread Edward B. Dreger

RB Date: Tue, 21 Jun 2005 14:40:47 +0100
RB From: Randy Bush

[ trimming CC list ]


RB considering that we have fellow isps dumping horrifying garbage in
RB the rib, it's amusing how we attack a seemingly well-run very small
RB experiment.

Bears would rather attack fish than wolverines.

Considering Lorenzo's attitude, I'm sure he's taking into account the 
requests for more heads up.  If he tickles an IOS bug, I'd rather have 
it happen in this scenario than when a less-clued individual or a 
miscreant tries announcing wacky routes.


Eddy
--
Everquick Internet - http://www.everquick.net/
A division of Brotsman  Dreger, Inc. - http://www.brotsman.com/
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 785 865 5885 Lawrence and [inter]national
Phone: +1 316 794 8922 Wichita

DO NOT send mail to the following addresses:
[EMAIL PROTECTED] -*- [EMAIL PROTECTED] -*- [EMAIL PROTECTED]
Sending mail to spambait addresses is a great way to get blocked.
Ditto for broken OOO autoresponders and foolish AV software backscatter.


Re: More long AS-sets announced

2005-06-21 Thread Randy Bush

 Thank you.  You've provided a clean, concise counter to Lorenzo's 
 original claim that long AS sets won't trip on IOS bugs.

no problem.  you're quite welcome.

 This may be a well-run, very small experiment, but it's experimenting 
 with a space that's rarely explored and therefore less likely to have 
 encountered the same level of operational testing that horrifying 
 garbage leaks have tested.  As such, I'm frustrated that the testers 
 consider requests to provide more advance notice to be so obtuse.

could you please give me the command to configure ios to not crash
if given advance notice?

 Why is this operational test supposed to be given freer reign on the 
 'net than our own operations?  Alternatively, why can't the test be 
 conducted in a lab, with interested operators providing router 
 configurations and xOS versions to give the test bed the most realistic 
 sample of the 'net, without using the production 'net?

the first announcement of this experiment was months ago.

randy



Re: OSPF -vs- ISIS

2005-06-21 Thread Stephen Sprunk

Thus spake Mike Bernico [EMAIL PROTECTED]
 The State of Illinois converted to ISIS in 2002 from EIGRP and it
 has definitely been a good thing for us.  It's been operationally
 bullet proof, and simple to maintain.

 We typically get features faster than we would if we ran OSPF.
 For example, we have a desire in the future to use IPFRR.  Every
 indication from the vendor is that this feature will be available to
 ISIS first, most likely because of either the extensibility of ISIS
 or more likely because ISIS is in so many larger providers.

This points to something that's really unrelated to the minor technical
differences between the two protocols: how they're viewed by your vendor.

One vendor in particular sees ISIS as an ISP protocol and OSPF as an
enterprise protocol.  Their implementation of the latter has often gotten
many enterprise-oriented features (e.g. dial-on-demand link support) that
the other didn't, whereas the former was known for reliability because the
coders were admonished to touch it rarely and test the heck out of every
change because screwing up might break the Internet.

The difference in stability is less apparent today, but the mindset is still
quite alive.  That means ISIS gets ISP features faster, and the code still
tends to be more solid than OSPF even though ISIS might now be getting
changes more frequently than it did in the past.

S

Stephen Sprunk  Those people who think they know everything
CCIE #3723 are a great annoyance to those of us who do.
K5SSS --Isaac Asimov



Re: OSPF -vs- ISIS

2005-06-21 Thread Wayne E. Bouchard

On Tue, Jun 21, 2005 at 11:50:59AM -0500, Stephen Sprunk wrote:
 
 Thus spake Mike Bernico [EMAIL PROTECTED]
  The State of Illinois converted to ISIS in 2002 from EIGRP and it
  has definitely been a good thing for us.  It's been operationally
  bullet proof, and simple to maintain.
 
  We typically get features faster than we would if we ran OSPF.
  For example, we have a desire in the future to use IPFRR.  Every
  indication from the vendor is that this feature will be available to
  ISIS first, most likely because of either the extensibility of ISIS
  or more likely because ISIS is in so many larger providers.
 
 This points to something that's really unrelated to the minor technical
 differences between the two protocols: how they're viewed by your vendor.
 
 One vendor in particular sees ISIS as an ISP protocol and OSPF as an
 enterprise protocol.  Their implementation of the latter has often gotten
 many enterprise-oriented features (e.g. dial-on-demand link support) that
 the other didn't, whereas the former was known for reliability because the
 coders were admonished to touch it rarely and test the heck out of every
 change because screwing up might break the Internet.

To that end, you also need to be aware that outside of the major
vendors, most don't even know what ISIS is. So if you're trying to
integrate other vendors' equipment into your network, you may have no
choice but OSPF.

 The difference in stability is less apparent today, but the mindset is still
 quite alive.  That means ISIS gets ISP features faster, and the code still
 tends to be more solid than OSPF even though ISIS might now be getting
 changes more frequently than it did in the past.

Personally, I still favor ISIS in provider style networks, especially
as they grow larger but with the passage of time, there really isn't a
great deal of difference between ISIS level 2 only and one great big
area 0 these days. (Personal experience has suggested to me that ISIS
tends to handle that somewhat better but that doesn't say you won't be
just as happy with OSPF.)

So the long and short of it really boils down to your personal
preference.

---
Wayne Bouchard
[EMAIL PROTECTED]
Network Dude
http://www.typo.org/~web/


Re: OSPF -vs- ISIS

2005-06-21 Thread Robert E . Seastrom


Wayne E. Bouchard [EMAIL PROTECTED] writes:

 One vendor in particular sees ISIS as an ISP protocol and OSPF as an
 enterprise protocol.  Their implementation of the latter has often gotten
 many enterprise-oriented features (e.g. dial-on-demand link support) that
 the other didn't, whereas the former was known for reliability because the
 coders were admonished to touch it rarely and test the heck out of every
 change because screwing up might break the Internet.

 To that end, you also need to be aware that outside of the major
 vendors, most don't even know what ISIS is. So if you're trying to
 integrate other vendors' equipment into your network, you may have no
 choice but OSPF.

The other edge of that sword is that letting someone outside of the
major vendors' OSPF (1) talk to your cloud qualifies as risky
behavior.

---rob


(1) where major vendors means widely deployed, not widely
deployed for money.  the question is whether installing on your
network is an unspoke part of their beta testing strategy.




Re: More long AS-sets announced

2005-06-21 Thread Jon Lewis

On Tue, 21 Jun 2005, Bruce Campbell wrote:

 Has anyone considered that the project may have indeed done testing of
 available IOS/$ROUTER versions in a lab environment before even
 considering testing on the 'live' internet?  Reading the cited material
 might be of benefit to the vocal complainers.

Not everyone runs IOS.  Wasn't it something similar to this that crashed
gated and possibly other BGP implementations a few years ago?  Is this
test intended to make sure everyone upgraded / nobody's deployed new gear
with old affected code?

And finally, we're doing it, we're not doing it, Surprise, we did it
is a crappy way to notify the community that they're about to piss in
the global pool.  At least there was some level of notification, but why
bother if you're not going to stick to what you publicize?

--
 Jon Lewis   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_


Re: Email peering

2005-06-21 Thread Petri Helenius


Rich Kulawiec wrote:


The best place to stop abuse is as near its source as possible.

Meaning: it's far easier for network X to stop abuse from leaving its
network than it is for 100,000 other networks to defend themselves from it.
Especially since techniques for doing so (for instance, controlling
outbound SMTP spam) are well-known, heavily documented, and easily put
into service.
 

The problem with countermeasures that would actually hurt the source of 
junk heavily enough would also have to hurt legitimate traffic making 
you an immediate lawsuit magnet. If that would not be the case, or some 
larger parties feel they could stand despite this fact, the problem 
would be fairly straightforward to reduce to a fraction in a few months 
time.


Pete



Re: More long AS-sets announced

2005-06-21 Thread Pete Templin


Randy Bush wrote:


could you please give me the command to configure ios to not crash
if given advance notice?


telnet your.mail.server 25
helo your.pc
mail.from you
mail.to you
data
Be sure to sit near a terminal with OOB access to your network at XYZ 
while an experiment is conducted with the Internet.  Have vendor support 
contracts handy, and find a PC with a dialup connection in case IOS crashes.

.





Re: More long AS-sets announced

2005-06-21 Thread Pete Templin


Edward B. Dreger wrote:

Considering Lorenzo's attitude, I'm sure he's taking into account the 
requests for more heads up.  If he tickles an IOS bug, I'd rather have 
it happen in this scenario than when a less-clued individual or a 
miscreant tries announcing wacky routes.


Bull.  His attitude (at least to me) was he needed a consensus of the 
operational community before he would feel compelled to provide more 
notice and/or postpone the testing to provide said notice.


pt


Re: More long AS-sets announced

2005-06-21 Thread Tony Li

 And finally, we're doing it, we're not doing it, Surprise, we did it
 is a crappy way to notify the community that they're about to piss in
 the global pool.  At least there was some level of notification, but why
 bother if you're not going to stick to what you publicize?

One might suspect that the change of plans was due to the impact of
operational reality.  I would expect some small amount of sympathy from
those on this list for those types of events.

Tony


Re: More long AS-sets announced

2005-06-21 Thread Jon Lewis

On Tue, 21 Jun 2005, Tony Li wrote:

  And finally, we're doing it, we're not doing it, Surprise, we did it
  is a crappy way to notify the community that they're about to piss in
  the global pool.  At least there was some level of notification, but why
  bother if you're not going to stick to what you publicize?

 One might suspect that the change of plans was due to the impact of
 operational reality.  I would expect some small amount of sympathy from
 those on this list for those types of events.

So send out another email.

Hey people, something came up and we couldn't get started on schedule.
We've rescheduled the test to begin at 16:00 UTC, June 20.

Incidentally, I got a small flurry of MAXAS-LIMIT messages from our
transit routers, but only saw the {2121,...} set.

--
 Jon Lewis   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_


IANA IPv4 allocations and bogon updates: 74/8, 75/8, 76/8, 189/8, 190/8

2005-06-21 Thread Rob Thomas


-BEGIN PGP SIGNED MESSAGE-


[ Apologies to those of you who receive this note in multiple forums. ]

Hi, all.

The numerous Team Cymru bogon projects have been updated as of 17 JUN 2005 to
reflect the following IANA allocation made on 17 JUN 2005:

  074/8   Jun 05   ARIN(whois.arin.net)
  075/8   Jun 05   ARIN(whois.arin.net)
  076/8   Jun 05   ARIN(whois.arin.net)

  189/8   Jun 05   LACNIC  (whois.lacnic.net)
  190/8   Jun 05   LACNIC  (whois.lacnic.net)

IANA allocations change over time, so please check regularly to ensure you have
the latest filters if you are not using the bogon BGP feed(s).  We do announce
updates to the bogon projects to sundry lists, such as the bogon-announce list.
We can not stress this point strongly enough - these allocations change. If you
do not adjust your filters, you will be unable to access perhaps large portions
of the Internet.  Worse yet, you may end up blocking access for people who
transit through you.

Please do not apply any filters or blocks to your network without carefully
considering the ramifications of doing so.

As a point of reference, the Team Cymru master Bogon Reference Page can be found
here:

  http://www.cymru.com/Bogons/

A quick summary of the documents and projects that have been updated include the
following:

  HTTP
The Bogon List
- http://www.cymru.com/Documents/bogon-list.html
The Text Bogon Lists
- http://www.cymru.com/Documents/bogon-bn-nonagg.txt
- http://www.cymru.com/Documents/bogon-bn-agg.txt
Secure BIND Template
- http://www.cymru.com/Documents/secure-bind-template.html
Secure IOS Template (Cisco)
- http://www.cymru.com/Documents/secure-ios-template.html
Secure BGP Template (Cisco)
- http://www.cymru.com/Documents/secure-bgp-template.html
Secure JUNOS Template (Juniper)
- http://www.cymru.com/gillsr/documents/junos-template.htm
Secure JUNOS BGP Template (Juniper)
- http://www.cymru.com/gillsr/documents/junos-bgp-template.htm
Ingress Prefix Filter Templates, Loose and Strict (Cisco)
- ftp://ftp-eng.cisco.com/cons/isp/security/Ingress-Prefix-Filter-
Templates/
Ingress Prefix Filter Template, Loose (Juniper)
- http://www.cymru.com/gillsr/documents/junos-isp-prefix-filter-loose.htm
Ingress Prefix Filter Template, Strict (Juniper)
- http://www.cymru.com/gillsr/documents/junos-isp-prefix-filter-strict.htm

  BGP
Bogon route-server for AUTOMATED updates of bogon filters
- All bogon route-server peers have already received the
  appropriate BGP prefix updates.
- http://www.cymru.com/BGP/bogon-rs.html

  RADb
fltr-unallocated
fltr-martian
fltr-bogons
- http://www.cymru.com/Bogons/index.html#radb

  RIPE NCC
fltr-unallocated
fltr-martian
fltr-bogons
- http://www.cymru.com/Bogons/index.html#ripe

  DNS
Bogon (bogons.cymru.com) zone
- http://www.cymru.com/Bogons/index.html#dns

  Monitoring
Bogon prefix monitoring
- http://www.cymru.com/BGP/robbgp-bogon.html
Bogus ASN monitoring
- http://www.cymru.com/BGP/asnbogusrep.html

Please feel free to contact Team Cymru [EMAIL PROTECTED] with any comments,
questions, or concerns.

Thank you for your continued support.
Rob, for Team Cymru.
- -- 
Rob Thomas
http://www.cymru.com
Shaving with Occam's razor since 1999.


-BEGIN PGP SIGNATURE-
Version: PGP 6.5.2

iQCVAwUBQrjLPlkX3QAo5sgJAQFHwAP/Z8KrLp9id6PD51KNEjAlveJCxRnvP4ev
RofqRMex1SB5itogkB4O6JmrpSqIjqgM2GsnAUREZr5/r2ekdAZwejT85zHftl92
3ExvEec3P2PVDdfWF5v9TSVWfzwwbMW2HWwymzUYT7klWpjblcUUPdAWl+khD+FU
/C8cCA2b8qk=
=JvMq
-END PGP SIGNATURE-