Re: dnsstealer.com

2006-03-13 Thread Martin Hannigan


At 12:37 AM 3/14/2006, David Ulevitch wrote:


On Mar 13, 2006, at 8:16 PM, Martin Hannigan wrote:


Better yet, why don't the registrars police themselves?


Many do.  They just don't police each other.



Sure seems like security is AWOL on the registrars agenda:

http://www.google.com/search?hl=en&lr=&domains=icann.org&q=botnet&btnG=Search&sitesearch=icann.org
http://www.google.com/search?hl=en&lr=&domains=icann.org&q=zombie&btnG=Search&sitesearch=icann.org


-M<







--
Martin Hannigan(c) 617-388-2663
Renesys Corporation(w) 617-395-8574
Member of Technical Staff  Network Operations
   [EMAIL PROTECTED]  



Re: dnsstealer.com

2006-03-13 Thread David Ulevitch



On Mar 13, 2006, at 8:16 PM, Martin Hannigan wrote:


Better yet, why don't the registrars police themselves?


Many do.  They just don't police each other.

-david


Re: dnsstealer.com

2006-03-13 Thread Randy Bush

>> isn't this a job for super-icann?
> Better yet, why don't the registrars police themselves?

what you mean is why don't the registrars seriously vet
their customers?

i suspect the job is non-trivial, to say the least.  and
where is the financial motivation?  at $10/year, what do
you suggest they actually do?

as a teensie registrar (for a half dozen small cctlds),
and one who actually does try to verify that the admin
poc answers the phone, etc. as well as server ops, 2182,
etc, lemme tell you it is a major pita for me and for
the folk who help vet.

randy



Re: dnsstealer.com

2006-03-13 Thread Martin Hannigan


At 11:00 PM 3/13/2006, Eric Brunner-Williams wrote:


isn't this a job for super-icann?



Better yet, why don't the registrars police themselves?


-M<





--
Martin Hannigan(c) 617-388-2663
Renesys Corporation(w) 617-395-8574
Member of Technical Staff  Network Operations
   [EMAIL PROTECTED]  



Re: dnsstealer.com

2006-03-13 Thread Eric Brunner-Williams

isn't this a job for super-icann?


Re: dnsstealer.com

2006-03-13 Thread Randy Bush

add http://pny.metalfeels.com/clk/53708695.76.251.101



Re: dnsstealer.com

2006-03-13 Thread Steven Kalcevich


I think your missing out on the $250 JC Penny card. You can buy a lot of 
swag with that!




Randy Bush wrote:


i think someone needs to nuke this domain

randy


From: "Shopping" <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: Confirmation: JC Penney Card
Date: Mon, 13 Mar 2006 20:23:05 -0600

Dear [EMAIL PROTECTED],

We are attempting to contact you about the $250 JCPenney(R) Card and request 
you to complete your email address below:

http://pny.dnsstealer.com/clk/53708886.15.251.101

Thank you for taking your time and on this offer.

My best,

List Manager

If you no longer wish to receive Exclusive Gift Cards emails, visit the 
Exclusive Gift Cards site or visit the url: 
http://pny.dnsstealer.com/clk/53708886.15.251.102  Or, print a copy of this 
email and send it along with your request to: Exclusive Gift Cards, 13900 Jog 
Road, Suite 203-251, Delray Beach, FL 33446.

http://pny.dnsstealer.com/uns/53708886.15.251

848 N. Rainbow Blvd. #1688
Las Vegas, NV 89107 -1020468834
 





dnsstealer.com

2006-03-13 Thread Randy Bush

i think someone needs to nuke this domain

randy


From: "Shopping" <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: Confirmation: JC Penney Card
Date: Mon, 13 Mar 2006 20:23:05 -0600

Dear [EMAIL PROTECTED],

We are attempting to contact you about the $250 JCPenney(R) Card and request 
you to complete your email address below:

http://pny.dnsstealer.com/clk/53708886.15.251.101

Thank you for taking your time and on this offer.

My best,

List Manager

If you no longer wish to receive Exclusive Gift Cards emails, visit the 
Exclusive Gift Cards site or visit the url: 
http://pny.dnsstealer.com/clk/53708886.15.251.102  Or, print a copy of this 
email and send it along with your request to: Exclusive Gift Cards, 13900 Jog 
Road, Suite 203-251, Delray Beach, FL 33446.

http://pny.dnsstealer.com/uns/53708886.15.251

848 N. Rainbow Blvd. #1688
Las Vegas, NV 89107 -1020468834



Re: Wiltel has gone pink.

2006-03-13 Thread Christopher L. Morrow



On Mon, 13 Mar 2006, Jo Rhett wrote:

> I went through 4 levels of management, and was informed that they no longer
> had an abuse team -- that this was disbanded in a recent reorganization.
>
> In short, it would appear that Wiltel is now selling pink contracts.
>

what? no more dave rossbach?


Re: Wiltel has gone pink.

2006-03-13 Thread Roy


Jo Rhett wrote:

This morning we have started receive an abundance of spam from Wiltel
customers, pointing boldly back to websites hosted in Wiltel space.

OrgAbuseHandle: WAC18-ARIN
OrgAbuseName:   Wiltel Abuse Contact
OrgAbusePhone:  +1-918-547-2000
OrgAbuseEmail:  [EMAIL PROTECTED]

Messages to [EMAIL PROTECTED] are being rejected.

This phone number goes to their "conferencing group", which doesn't know
what 'abuse' is, or even what an IP network is.

I went through 4 levels of management, and was informed that they no longer
had an abuse team -- that this was disbanded in a recent reorganization. 


In short, it would appear that Wiltel is now selling pink contracts.

  
WilTel's abuse department has long been MIA.  I never even got an 
acknowledgment from them much less getting the problem fixed.  The only 
difference now is that they are bouncing the messages rather than 
dev-nulling them


They also don't believe in edge filtering.. Here are some stats for today

   10 deny ip 0.0.0.0 1.255.255.255 any (111 matches)
   20 deny ip 2.0.0.0 0.255.255.255 any (97 matches)
   30 deny ip 5.0.0.0 0.255.255.255 any (102 matches)
   40 deny ip 7.0.0.0 0.255.255.255 any (106 matches)
   50 deny ip 10.0.0.0 0.255.255.255 any (6487 matches)
   60 deny ip 23.0.0.0 0.255.255.255 any (120 matches)
   70 deny ip 27.0.0.0 0.255.255.255 any (126 matches)
   80 deny ip 31.0.0.0 0.255.255.255 any (107 matches)
   90 deny ip 36.0.0.0 1.255.255.255 any (1458 matches)
   100 deny ip 39.0.0.0 0.255.255.255 any (137 matches)
   110 deny ip 42.0.0.0 0.255.255.255 any (127 matches)
   120 deny ip 49.0.0.0 0.255.255.255 any (146 matches)
   130 deny ip 50.0.0.0 0.255.255.255 any (124 matches)
   140 deny ip 77.0.0.0 0.255.255.255 any (138 matches)
   150 deny ip 78.0.0.0 1.255.255.255 any (243 matches)
   160 deny ip 92.0.0.0 3.255.255.255 any (868 matches)
   170 deny ip 96.0.0.0 15.255.255.255 any (2754 matches)
   180 deny ip 112.0.0.0 7.255.255.255 any (1896 matches)
   190 deny ip 120.0.0.0 0.255.255.255 any (337 matches)
   200 deny ip 169.254.0.0 0.0.255.255 any (744 matches)
   210 deny ip 172.16.0.0 0.15.255.255 any (827 matches)
   220 deny ip 173.0.0.0 0.255.255.255 any (150 matches)
   230 deny ip 174.0.0.0 1.255.255.255 any (870 matches)
   240 deny ip 176.0.0.0 7.255.255.255 any (3860 matches)
   250 deny ip 184.0.0.0 3.255.255.255 any (765 matches)
   260 deny ip 192.0.2.0 0.0.0.255 any
   270 deny ip 192.168.0.0 0.0.255.255 any (873 matches)
   280 deny ip 197.0.0.0 0.255.255.255 any (127 matches)
   290 deny ip 198.18.0.0 0.1.255.255 any
   300 deny ip 223.0.0.0 0.255.255.255 any (121 matches)
   310 deny ip 224.0.0.0 31.255.255.255 any

Maybe Level3 can straighten some of it out.

Roy Engehausen





Re: Security problem in PPPoE connection

2006-03-13 Thread Matt Buford


From: "Martin Hannigan" <[EMAIL PROTECTED]>
As well, pvlans are prone to fail if not a forethought of architecture 
instead of
an after effect. Trying to put legacy networks into a pvlan architecture 
is like

putting square pegs in round holes.

My experience has been pvlans cause more trouble than they are worth.


Could you elaborate on this a bit?  My situation is different, as I am a 
server hosting provider dealing with thousands of customer servers instead 
of thousands of customer residential WAN links (and thus, no PPPoE), but so 
far I've had good results with pvlans and local-proxy-arp.  I've found it to 
be almost a drop-in replacement for large VLANs, solving 95% of the standard 
huge-l2-network issues with near-zero additional hassle.


Perhaps my different situation avoids whatever issues you ran into.  I'm 
just curious what sort of trouble you had just to make sure I avoid them 
myself.  I've already migrated thousands of customer servers to this over 
the past few years, but I still have thousands to go.  :) 



Covad contact?

2006-03-13 Thread Mcintyre, Ken

Hello,

Could someone from Covad please contact me off list? 

Thank you,
Ken - 




RE: Security problem in PPPoE connection

2006-03-13 Thread Martin Hannigan


At 03:25 PM 3/13/2006, James R. Cutler wrote:

At 3/13/2006 11:16 AM -0800, Bora Akyol wrote:

"Any info on percentages of users that use routers vs Windows boxes? "

Almost 100% of Careful Windows Users use routers.
Almost 100% of Potential Victims connect directly.

Now, you really meant to ask, what is the ratio of Victims to 
Careful.  Too big, whatever it is.



That depends, maybe you mean Windows->NAT vs. Windows non NAT. I 
think there's implications

in router, unless your assuming NAT.

As well, pvlans are prone to fail if not a forethought of 
architecture instead of
an after effect. Trying to put legacy networks into a pvlan 
architecture is like

putting square pegs in round holes.

My experience has been pvlans cause more trouble than they are worth.



-M<





--
Martin Hannigan(c) 617-388-2663
Renesys Corporation(w) 617-395-8574
Member of Technical Staff  Network Operations
   [EMAIL PROTECTED]  



Wiltel has gone pink.

2006-03-13 Thread Jo Rhett

This morning we have started receive an abundance of spam from Wiltel
customers, pointing boldly back to websites hosted in Wiltel space.

OrgAbuseHandle: WAC18-ARIN
OrgAbuseName:   Wiltel Abuse Contact
OrgAbusePhone:  +1-918-547-2000
OrgAbuseEmail:  [EMAIL PROTECTED]

Messages to [EMAIL PROTECTED] are being rejected.

This phone number goes to their "conferencing group", which doesn't know
what 'abuse' is, or even what an IP network is.

I went through 4 levels of management, and was informed that they no longer
had an abuse team -- that this was disbanded in a recent reorganization. 

In short, it would appear that Wiltel is now selling pink contracts.

-- 
Jo Rhett
senior geek
SVcolo : Silicon Valley Colocation


RE: Wiltel has gone pink.

2006-03-13 Thread Edward W. Ray

Wiltel is owned by Level3 now.  Try contacting them, although with the
integration just starting I suspect it will be difficult.

 




RE: Wiltel has gone pink.

2006-03-13 Thread andrew2

[EMAIL PROTECTED] wrote:
> This morning we have started receive an abundance of spam
> from Wiltel customers, pointing boldly back to websites
> hosted in Wiltel space.
> 
> OrgAbuseHandle: WAC18-ARIN
> OrgAbuseName:   Wiltel Abuse Contact
> OrgAbusePhone:  +1-918-547-2000
> OrgAbuseEmail:  [EMAIL PROTECTED]
> 
> Messages to [EMAIL PROTECTED] are being rejected.
> 
> This phone number goes to their "conferencing group", which
> doesn't know what 'abuse' is, or even what an IP network is.
> 
> I went through 4 levels of management, and was informed that
> they no longer had an abuse team -- that this was disbanded
> in a recent reorganization.
> 
> In short, it would appear that Wiltel is now selling pink contracts.

Or perhaps there's a more reasonable explanation like being assimilated
with Level3 and perhaps some contact info. is a little stale at this
point in the merger process...  Never attribute to malfeasance what can
be explained by everyday corporate beauracracy.

Andrew Cruse




RE: Security problem in PPPoE connection

2006-03-13 Thread James R. Cutler


At 3/13/2006 11:16 AM -0800, Bora Akyol wrote:
"Any info on percentages of users that use routers vs Windows boxes?
"
Almost 100% of Careful Windows Users use routers.
Almost 100% of Potential Victims connect directly.
Now, you really meant to ask, what is the ratio of Victims to
Careful.  Too big, whatever it is.

-
James R. Cutler
[EMAIL PROTECTED]




RE: Security problem in PPPoE connection

2006-03-13 Thread Bora Akyol

Any info on percentages of users that use routers vs Windows boxes? 


> 
> Microsoft has some suggestions for configuring PPPOE for MS-Windows.
> 
> http://www.microsoft.com/technet/prodtechnol/winxppro/maintain
> /pppoe.mspx
> 
> A problem is many of your customers won't follow the 
> directions, and may still be vulnerable to man-in-the-middle 
> attacks for the login if they don't disable PAP. Because 
> things will appear to work, i.e. Windows will use CHAP first 
> and fallback to PAP, your customers may not notice when an 
> attack does occur.
> 
> Although PPPOE is a layer 2 protocol, the user data may be 
> vulnerable to many of the same ethernet CAM table, denial of 
> service and sniffing weaknesses even if the login credentials 
> are kept secret with CHAP (or more advanced EAP options).  
> PPPOE and PPP tend to assume the access networks are 1) 
> "free" and 2) "secure."  This may be constrained using 
> point-to-point connections, but often require additional 
> configuration of multi-access networks.
> 
> The configuration details will vary by equipment vendor.  But 
> you should find some good information by doing a few web 
> searches for metro ethernet security, private vlan, broadcast 
> security.
> 
> 



Re: Security problem in PPPoE connection

2006-03-13 Thread Sean Donelan

On Mon, 13 Mar 2006, Joe Shen wrote:
> > >What's your method to deal with such problem? Will
> > CHAP in PPPoE help?
> >
> > That may help against password sniffing but won't
> > help against sniffing
> > traffic by an active attacker once the session has
> > been established.
> > Also, you'll have to revisit all CPE to explicitly
> > disable PAP, or an
> > active attacker could still steal the password if he
> > impersonates the
> > real PPPoE server.
>
> If we enable CHAP on BRAS, is it enough that asking
> subscriber to enable Chap on MS-windows dial
> connection or Linux ?  Need we install some other
> tools?

Microsoft has some suggestions for configuring PPPOE for MS-Windows.

http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/pppoe.mspx

A problem is many of your customers won't follow the directions, and may
still be vulnerable to man-in-the-middle attacks for the login if they
don't disable PAP. Because things will appear to work, i.e. Windows will
use CHAP first and fallback to PAP, your customers may not notice when an
attack does occur.

Although PPPOE is a layer 2 protocol, the user data may be vulnerable to
many of the same ethernet CAM table, denial of service and sniffing
weaknesses even if the login credentials are kept secret with CHAP (or
more advanced EAP options).  PPPOE and PPP tend to assume the access
networks are 1) "free" and 2) "secure."  This may be constrained using
point-to-point connections, but often require additional configuration
of multi-access networks.

The configuration details will vary by equipment vendor.  But you should
find some good information by doing a few web searches for metro ethernet
security, private vlan, broadcast security.


Need remote hands in Marin (San Rafael, CA)

2006-03-13 Thread chuck goolsbee


Familiarity with Copper Mountain Copper Edge 150 DSLAM a bonus.

Will exchange cash or  at a future 
NANOG meeting for assistance.



Call or email if available:
p. 206-838-1630, option 1, ext 2001

e. [EMAIL PROTECTED]

Thanks,

--chuck goolsbee, digital.forest, seattle