Re: IPv6 Firewalls

2007-01-31 Thread JORDI PALET MARTINEZ

I guess this can be helpful to find not just firewalls but any
IPv6-compliant product/service.

http://www.ipv6-to-standard.org

Regards,
Jordi




 De: Joseph S D Yao [EMAIL PROTECTED]
 Responder a: [EMAIL PROTECTED]
 Fecha: Tue, 30 Jan 2007 17:36:58 -0500
 Para: J. Oquendo [EMAIL PROTECTED]
 CC: nanog@merit.edu
 Asunto: Re: IPv6 Firewalls
 
 
 On Tue, Jan 30, 2007 at 09:43:52PM -0500, J. Oquendo wrote:
 ...
 A lot of vendor information on this, etc. can be summarized over at
 http://www.moonv6.org/ (or at least the hype of it)
 ...
 
 
 This is why I asked: at some point last year, those guys said NO
 firewalls were IPv6-ready yet.
 
 
 -- 
 Joe Yao
 ---
This message is not an official statement of OSIS Center policies.




**
The IPv6 Portal: http://www.ipv6tf.org

Bye 6Bone. Hi, IPv6 !
http://www.ipv6day.org

This electronic message contains information which may be privileged or 
confidential. The information is intended to be for the use of the 
individual(s) named above. If you are not the intended recipient be aware that 
any disclosure, copying, distribution or use of the contents of this 
information, including attached files, is prohibited.





Cisco Security Advisory: SIP Packet Reloads IOS Devices Not Configured for SIP

2007-01-31 Thread Cisco Systems Product Security Incident Response Team

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Cisco Security Advisory: SIP Packet Reloads IOS Devices Not
Configured for SIP

Advisory ID: cisco-sa-20070131-sip

http://www.cisco.com/warp/public/707/cisco-sa-20070131-sip.shtml

Revision 1.0

For Public Release 2007 Jan 31 0900 UTC (GMT)

- -

Summary
===

Cisco devices running IOS which support voice and are not configured
for Session Initiated Protocol (SIP) are vulnerable to a crash under
yet to be determined conditions, but isolated to traffic destined to
Port 5060. SIP is enabled by default on all Advanced images which
support voice and do not contain the fix for CSCsb25337. There are no
reports of this vulnerability on the devices which are properly
configured for SIP processing. Workarounds exist to mitigate the
effects of this problem.

This advisory is posted at
http://www.cisco.com/warp/public/707/cisco-sa-20070131-sip.shtml

Affected Products
=

IOS releases that include voice support after 12.3(14)T, 12.3(8)YC1,
12.3(8)YG and all of 12.4 are affected. Please see the fixed software
table for a complete list of fixed and vulnerable trains.

To determine if your device has SIP enabled, enter the commands 'show
ip sockets' and 'show tcp brief all'. Below is an example of a router
running code without the fix, and without the workaround enabled. The
router in this example is vulnerable to this issue. IOS image in
example: 7200-p-mz.124-3.bin

Router#show ip sockets
ProtoRemote  Port  Local   Port  In Out Stat TTY OutputIF
17 0.0.0.0 0  --any--  5060   0   0  211   0
17 0.0.0.0 0 192.168.100.2   67   0   0 2211   0
17 0.0.0.0 0 192.168.100.2 2517   0   0   11   0
   


The first line with UDP Port 5060 shows that UDP SIP is enabled.

Router#show tcp brief all
TCB   Local Address   Foreign Address(state)
2051E680  *.5060  *.*LISTEN
2051E680  *.5060  *.*LISTEN


The above lines with *.5060 show that TCP SIP is enabled.

Vulnerable Products
+--

The following is a list of products that support voice and could be
affected by this vulnerability.

  * 815
  * 871
  * 876
  * 877
  * 878
  * 1701
  * 1711
  * 1712
  * 1721
  * 1751
  * 1751-V
  * 1760
  * 1801
  * 1802
  * 1803
  * 1811
  * 1812
  * 1841
  * 2610XM-2611XM
  * 2620XM-2621XM
  * 2650XM-2651XM
  * 2691
  * 2801
  * 2811
  * 2821
  * 2851
  * 3220
  * 3250
  * 3270
  * 3725
  * 3745
  * 3825
  * 3845
  * 7200
  * 7200-NPE-G2
  * 7301

Products Confirmed Not Vulnerable
+

Devices which do not support voice are not affected by this issue.
Devices which are properly configured for SIP processing are not
affected by this issue. We have no reports of this vunerability on
devices that are configured for SIP processing. We also have no
reports of affected IOS-XR devices, CatOS devices, or any device
which does not run IOS, but can not conclusively rule them out
without further testing. This advisory will be updated with more
information as it becomes available. Below is an example of a router 
not vulnerable to this issue. The router in this example is running
the fixed release c7200-js-mz.124-5b.bin.

Router#show tcp brief all

Router#show ip sockets
ProtoRemote  Port  Local   Port  In Out Stat TTY OutputIF
17 0.0.0.0 0 192.168.100.2  67   0   0 2211   0


No lines with UDP Port 5060 are shown and UDP SIP is not enabled. In
this example UDP port 67 is used by DHCP is not related to this
vulnerability.

Details
===

SIP is a protocol designed for use in IP phone networks, and is
widely used for Voice over Internet Protocol (VOIP) communications
worldwide. Cisco devices running an affected image which supports
voice services automatically enable SIP, which opens a listening port
on UDP port 5060. TCP port 5060 is also opened, but does not appear
to be related to the IOS crash detailed in this advisory.

CSCsb25337 turns off the listening ports TCP and UDP 5060, and there
have been no reports of this vulnerability in any images with this
fix integrated.

Impact
==

Successful exploitation of the vulnerability may result in a reload
of the device. The issue may be repeatedly exploited, leading to an
extended Denial Of Service (DOS) condition.

Software Version and Fixes
==

When considering software upgrades, also consult
http://www.cisco.com/go/psirt and any subsequent advisories to
determine exposure and a complete upgrade solution.

In all cases, customers should exercise caution to be certain the
devices to be upgraded contain sufficient memory and that current
hardware and software configurations will continue to be supported
properly by the new release

Re: Best way to supply colo customer with specific provider

2007-01-31 Thread matthew zeier




Steve Gibbard wrote:


If you actually want to do this, you've got four choices:

- Policy route, as mentioned below.
- Get the customer their own connection to Cogent.
- Have a border router that only talks to Cogent and doesn't receive full
  routes from your core, and connect the customer directly to that.
- Do something involving route servers and switches outside your border
  routers, a-la-Equinix Direct.


What about an MPLS VPN?


NANOG39 (Sheraton Centre Toronto)

2007-01-31 Thread Carol Wadsworth


NANOG 39 Meeting Attendees,

Please note if you are staying in the Sheraton Centre Toronto and have 
a room reservation in the NANOG room block at the NANOG rate, you are 
entitled to receive complimentary in-room Internet access, 
complimentary access to the fitness center, and discounted valet 
parking on a space available basis.   Charges for these services, if 
utilized, will be billed to a guest's folio and then rebated back on a 
daily basis or at the conclusion of one's stay.  Again, in order to 
receive these benefits, your reservation *must* be under the NANOG room 
block at the NANOG group rate.


See you there!



Re: Google wants to be your Internet

2007-01-31 Thread Joseph S D Yao

On Tue, Jan 30, 2007 at 08:19:12AM -, [EMAIL PROTECTED] wrote:
 
  
   IPv6 makes NAT obsolete because IPv6 firewalls can provide all
   the useful features of IPv4 NAT without any of the downsides.
  
  IPv6 firewalls?  Where?  Good ones?
 
 Why good ones. NAT is a basic IPv4 firewall. All IPv6 needs to obsolete
 NAT is a firewall that offers all the features of NAT without requiring
 the address translation. Then, instead of setting up a port translation
 for a particular incoming protocol, you simply open up that port without
 modifying the packets as they flow through. Suddenly, SIP works and
 incoming VoIP phonecalls work just like on the phone network.


There is more to firewalls than NAT and packet filtering, no matter what
the Cisco Pix people say.


-- 
Joe Yao
---
   This message is not an official statement of OSIS Center policies.


Re: Google wants to be your Internet

2007-01-31 Thread Joseph S D Yao

On Tue, Jan 30, 2007 at 08:04:25PM -, Mark D. Kaye wrote:
 
 Hi,
 
 PIX/ASA Supports IPv6 Apparently, see below.
 
 Don't know anyone who has tested it yet though ;-)
 
 http://www.cisco.com/en/US/products/ps6120/products_configuration_guide_
 chapter09186a0080636f44.html

Note Failover does not support IPv6. The ipv6 address command does not
support setting standby addresses for failover configurations. The
failover interface ip command does not support using IPv6 addresses on
the failover and Stateful Failover interfaces.

The following inspection engines support IPv6:
* FTP
* HTTP
* ICMP
* SMTP
* TCP
* UDP

as opposed to 23 separate application inspection engines listed in a
table later on.  Granted, some of those protocols don't exist on IPv6,
but hardly 17 of 23.


-- 
Joe Yao
---
   This message is not an official statement of OSIS Center policies.


what the heck do i do now?

2007-01-31 Thread Paul Vixie

bear with me, this appears to be about DNS but it's actually about e-mail.

maps.vix.com has been gone since 1999 or so.  mail-abuse.org is the new thing.
i've tried just about everything to get traffic toward the old domain name to
stop... right now there's a DNAME but it made no real difference.  i've taken
the maps.vix.com domain away.  i've set its NS to localhost.  i've put long
TTL's on both good and bad data.  the traffic continues.  clearly this is my
pennance for starting MAPS, and i hear you giggling about it, but i need some
advice.  once upon a time, someone more insane than myself wanted to close an
RBL and did so by replacing it with a wildcard entry.  we all hated that since
it caused a lot of mail to bounce.  (all mail that would otherwise have been
received by that RBL's subscribers, in fact.)  it did however have the effect
of causing the subscribers to reconfigure their mailers to stop querying the
now-dead RBL in question.  what's the current thinking on this?

oh and even though this isn't about bgp i can put some numbers in so that it
will seem on-topic.  out of 100K DNS queries received by a vix.com nameserver
(which is about five minutes worth), here are the toptalkers for maps.vix.com.
(and we all know by now that public shaming and notification won't work, i'm
not sure why this is relevant, but it looks good, so here it is.)  thoughts?

2208 68.216.187.10
2156 192.106.1.99
1348 213.239.240.162
1024 192.106.1.100
 808 192.106.1.1
 742 216.156.2.29
 659 216.55.144.5
 594 192.203.136.10
 592 80.247.227.1
 556 24.111.1.180
 535 217.18.160.2
 523 87.127.246.222
 438 192.106.1.9
 430 192.203.136.1
 384 69.20.2.227
 378 213.249.17.10
 355 87.98.222.35
 353 216.218.185.16
 331 213.251.136.18
 319 72.41.223.229
 274 216.65.0.148
 264 61.194.193.9
 257 200.75.51.132
 251 213.234.128.211
 248 213.251.134.167
 222 69.38.230.2
 208 219.232.224.89
 193 213.249.17.11
 178 200.75.51.133
 175 204.212.38.12
 170 209.244.4.235
 167 211.5.1.220
 158 200.62.191.36
 150 195.178.70.10
 147 212.125.128.91
 147 192.247.72.254
 145 202.180.64.9
 144 216.46.201.220
 135 164.164.149.13
 134 203.97.32.3
 132 66.98.240.151
 129 84.14.44.250
 122 206.40.201.230
 118 195.14.50.1
 108 211.5.1.219
 102 64.234.192.7
  98 66.235.216.48
  88 200.205.163.168
  85 69.20.2.243
  85 69.20.2.231
  85 146.83.183.94
  80 202.239.113.18
  79 199.60.229.4
  79 140.186.4.4
  78 68.125.191.131
  78 203.97.32.5
  72 80.88.192.200
  71 192.189.54.17
  70 82.210.64.18
  69 217.106.235.214
  68 202.229.192.20
  66 202.154.3.2
  64 217.19.24.18
  61 213.203.124.146
  61 195.96.33.249
  57 168.95.1.128
  56 203.94.129.130
  56 200.69.193.111
  56 168.95.1.133
  55 72.3.128.125
  54 168.95.1.145
  53 216.231.41.2
  53 210.119.192.6
  52 203.141.32.247
  52 168.95.1.132
  50 80.80.231.223
  50 204.145.230.31
  49 213.225.90.203
  48 61.129.66.75
  48 38.115.131.10
  47 195.220.32.99
  46 64.60.208.40
  46 207.12.35.170
  46 168.95.1.129
  46 168.95.1.126
  44 212.42.168.116
  44 209.128.208.11
  44 168.95.1.148
  43 84.14.176.166
  43 200.62.191.38
  43 154.11.147.2
  42 168.95.1.144
  41 168.95.1.131
  41 168.95.1.127
  40 81.240.254.45
  40 218.223.31.252
  40 209.82.111.202
  39 69.20.2.237
  39 217.22.50.3
  39 211.72.171.75
  39 131.188.3.89
  38 203.166.97.12
  38 199.201.145.162
  38 168.95.1.147
  38 12.98.160.66
  37 69.36.241.228
  37 168.95.1.146
  37 131.130.199.155
  36 200.31.192.18
  34 216.174.17.6
  34 209.61.163.233
  34 200.207.88.142
  34 168.95.1.92
  32 80.247.228.1
  32 69.60.117.147
  31 67.18.97.50
  30 202.175.151.10
  27 168.95.1.99
  26 216.127.136.207
  26 212.245.255.2
  26 195.2.96.2
  25 216.244.191.38
  25 212.86.129.142
  25 199.64.0.252
  24 212.55.197.117
  24 199.166.210.2
  24 154.11.136.2
  23 216.65.0.156
  23 198.63.210.55
  23 194.204.0.1
  22 202.134.64.12
  21 84.22.6.100
  21 211.125.124.33
  21 203.198.7.66
  21 203.144.168.6
  21 203.116.1.94
  21 202.96.102.3
  21 158.234.250.70
  20 65.106.2.117
  20 213.191.73.65
  19 66.77.137.9
  19 64.65.208.6
  19 64.122.97.116
  19 203.23.72.2
  19 194.106.218.42
  17 80.255.128.145
  17 168.95.192.81
  16 194.242.40.3
  16 168.95.192.83
  15 69.20.2.225
  15 210.104.1.13
  15 207.7.4.66
  15 207.218.192.26
  15 207.106.1.2
  15 168.95.192.89
  15 168.95.192.84
  15 140.123.181.1
  14 217.10.104.109
  14 216.145.96.10
  14 212.45.26.98
  14 210.238.234.242
  14 210.236.36.2
  14 193.50.240.2
  14 193.225.16.111
  14 168.95.192.86
  14 150.186.1.1
  13 24.96.32.18
  13 218.232.110.37
  13 213.130.10.10
  13 202.237.13.66
  13 161.142.201.17
  12 168.95.192.80
  11 62.252.64.17
  11 213.171.195.168
  11 211.125.124.34
  11 210.253.165.8
  11 203.30.161.1
  11 202.45.84.68
  10 216.127.136.213
  10 212.49.128.65
  10 203.10.110.104
  10 202.134.99.162
  10 192.114.65.50
  10 168.95.192.88
  10 168.95.192.85
...


Re: what the heck do i do now?

2007-01-31 Thread Randy Bush

 once upon a time, someone more insane than myself wanted to close an 
 RBL and did so by replacing it with a wildcard entry.  we all hated
 that since it caused a lot of mail to bounce.  (all mail that would
 otherwise have been received by that RBL's subscribers, in fact.)  it
 did however have the effect of causing the subscribers to reconfigure
 their mailers to stop querying the now-dead RBL in question.  what's
 the current thinking on this?

one problem with this is that the pain is not felt by the misconfigured
folk, but by distant innocents.

randy


Re: what the heck do i do now?

2007-01-31 Thread Derek J. Balling

Randy Bush wrote:
once upon a time, someone more insane than myself wanted to close an 
RBL and did so by replacing it with a wildcard entry.  we all hated

that since it caused a lot of mail to bounce.  (all mail that would
otherwise have been received by that RBL's subscribers, in fact.)  it
did however have the effect of causing the subscribers to reconfigure
their mailers to stop querying the now-dead RBL in question.  what's
the current thinking on this?


one problem with this is that the pain is not felt by the misconfigured
folk, but by distant innocents.


I don't necessarily agree with that. First off, if you set up your mail 
server to use maps.vix.com, you did it a LONG time ago, before scoring 
systems were all the rage. In all likelihood people are using this in a 
binary operation accept or don't based on this DNSBL entry's return 
code. Flipping that switch will completely break mail for the offending 
site, and (in all likelihood) they'll notice it pretty quick and stop. 
Or they won't, in which case, they're pretty much an unattended domain, 
and who really cares what happens to them anyway?


I think that at some poing, Paul has a right to attempt to reclaim the 
sane use of his domain name, and considering how long the DNSBL in 
question has been out of commission, and people who use it should know 
that by now, the carrot needs to be traded in for a stick.


Cheers,
D


--
Derek J. Balling
Manager of Systems Administration
Vassar College
124 Raymond Ave
Box 0406 - Computer Center 217
Poughkeepsie, NY 12604
W: (845) 437-7231
C: (845) 249-9731


smime.p7s
Description: S/MIME Cryptographic Signature


Re: what the heck do i do now?

2007-01-31 Thread Paul Vixie

  ... the effect of causing the subscribers to reconfigure their mailers to
  stop querying the now-dead RBL in question.  what's the current thinking
  on this?
 
 one problem with this is that the pain is not felt by the misconfigured
 folk, but by distant innocents.

i am one of those who believes that e-mail is a shared benefit.  so in my
worldview, both the intended recipients and actual senders would feel pain.
(bulk e-mail disproportionately benefits the sender, but i'm thinking 1x1
e-mail in this thought experiment.)


Re: what the heck do i do now?

2007-01-31 Thread Paul Vixie

 One thing you might consider is putting together a script to harvest email
 addresses from whois records that correspond to the PTR for the querying
 IPs.  Add to that list abuse, postmaster, webmaster, hostmaster, etc @ the
 poorly run domain.  Then fire off a message explaining the situation and
 that you'll be adding a wildcard record on such and such date (preferably
 not 4/1).  Script all of this and run it every couple of days until the
 date you gave and then follow through with the wildcard entry.  This
 undoubtedly won't stop all of the whining but you can at least say you
 tried.

volunteers are welcome to apply for that job.

 Perhaps you can get CNet or InfoWorld to pick it and write a story about the
 service and the impending change.

that, conversely, would be fun.

 When it comes right down to it, you've got to do what you've got to do to
 recover your domain.  You provided a service that many of us relied upon.
 The responsibility rests on our shoulders to keep up with the changing
 times.  7-8 years is more than enough time for even the laziest of mail
 admins to update their config.  Think about how much bandwidth has been
 wasted over the years with these errant queries...

about 1 billionth as much as has been wasted by RFC1918-sourced DNS queries
sent to the root name servers OR RFC1918-domained DNS updates sent to AS112.
therefore i treat it as a personal annoyance but NOT a waste in its own right.


Re: what the heck do i do now?

2007-01-31 Thread Steve Sobol

On Wed, 31 Jan 2007, Derek J. Balling wrote:

 I think that at some poing, Paul has a right to attempt to reclaim the 
 sane use of his domain name, and considering how long the DNSBL in 
 question has been out of commission, and people who use it should know 
 that by now, the carrot needs to be traded in for a stick.

100% in agreement with everything Derek says. In the immediate term, it's 
*very* rude to just return false positives for everything, but 
maps.vix.com hasn't been a live DNSBL since 1999...

-- 
Steve Sobol, Professional Geek ** Java/VB/VC/PHP/Perl ** Linux/*BSD/Windows
Victorville, California PGP:0xE3AE35ED

It's all fun and games until someone starts a bonfire in the living room.



Re: what the heck do i do now?

2007-01-31 Thread John Levine

it caused a lot of mail to bounce.  (all mail that would otherwise
have been received by that RBL's subscribers, in fact.)  it did
however have the effect of causing the subscribers to reconfigure
their mailers to stop querying the now-dead RBL in question.  what's
the current thinking on this?

I know the guy, in fact was talking to him on the phone earlier this
afternoon and it wasn't as effective as you might hope.  He may have
had to abandon the domain.

A probably not surprising number of people have decided that my
abuse.net is a DNSBL, and nothing I've been able to do makes a serious
dent.  Look up the TXT record for any n.n.n.n.abuse.net where the n's
are decimal numbers.

2208 68.216.187.10

This is Integrity On Line, which purports to be a filtered solution
provider, which I presume means a big thick firewall that keeps out
anything that might upset their subscribers.  It might be illuminating
to give them a call, express concern that a computer in their center
is sending 400 unwanted messages a minute to you, and see if you can
find anyone who has any idea how the mail servers are configured.  I
realize they're only a tiny percentage of your junk traffic, but their
clue level is probably typical.

Regards,
John Levine, [EMAIL PROTECTED], Primary Perpetrator of The Internet for 
Dummies,
Information Superhighwayman wanna-be, http://www.johnlevine.com, Mayor
More Wiener schnitzel, please, said Tom, revealingly.



Re: what the heck do i do now?

2007-01-31 Thread Barry Shein


 one problem with this is that the pain is not felt by the misconfigured
 folk, but by distant innocents.

etc.


One problem we have is that we tend to see the internet as a perfect
simulation of a fair and just system, at least as a first goal.

I don't know if that's possible or not. I don't know if anyone has
actually explored the issue deeply. One problem is that there are many
different notions of justice present globally. Probably thousands with
significant real-world referents.

-- 
-Barry Shein

The World  | [EMAIL PROTECTED]   | http://www.TheWorld.com
Purveyors to the Trade | Voice: 800-THE-WRLD| Login: Nationwide
Software Tool  Die| Public Access Internet | SINCE 1989 *oo*


Re: what the heck do i do now?

2007-01-31 Thread David Ulevitch


Paul Vixie wrote:

bear with me, this appears to be about DNS but it's actually about e-mail.

maps.vix.com has been gone since 1999 or so.  mail-abuse.org is the new thing.
i've tried just about everything to get traffic toward the old domain name to
stop... right now there's a DNAME but it made no real difference.  

Paul,

Not offering a solution but a bit of an explanation perhaps...

From: http://cr.yp.to/ucspi-tcp/rblsmtpd.html
If you do not supply any -r options, rblsmtpd tries an RBL source of 
rbl.maps.vix.com. This will be changed in subsequent versions.


So checking the last released version:
/ucspi-tcp-0.88# grep -hn maps.vix.com rblsmtpd.c
193:  if (flagwantdefaultrbl) rbl(rbl.maps.vix.com);

Looks like that could be a cause of some of your pain...
Not everyone runs rblsmptd on their mailserver, but I know lots of large 
mail servers that run rblsmptd (qmail).


The fact that the option is the default without being explicit means 
that at least some folks don't even know maps.vix.com zones are no 
longer present and the current failure case is not impacting them.


-david ulevitch



Re: what the heck do i do now?

2007-01-31 Thread Joseph S D Yao

Thinking this out, out loud.  Well, in black and white, anyway.

Your vix.com name servers are authoritative for the zone.

If a name server wants to do a lookup on maps.vix.com, it will get it
from cache, or send a query to the listed IP address for one of the name
servers.

You said you had tried, e.g., putting up a maps.vix.com zone with a huge
negative TTL - or did you say negative TTL? - but that would only work
for multiple queries for the same value from the same name server.  I
don't see a clean way to poison even a large number of caches to
forget about you completely.

Does a large negative TTL on vix.com really not reduce the traffic much?
But then that hurts you when you add a new record, if someone has been
trying to get to that record.  And there are name servers out there that
ignore negative TTL.

The only way for it not to arrive at the name server is for something in
the way to block it.  Perhaps a transparent filter, or perhaps the IP
addresses of the name servers are your firewalls, which will block and
pass the rest on to the real name servers behind them.

Or maybe that's more work than it's worth.  ;-)  Is anything suffering
besides your logs?

-- 
Joe Yao
---
   This message is not an official statement of OSIS Center policies.


Re: what the heck do i do now?

2007-01-31 Thread Brian Wallingford

On Wed, 31 Jan 2007, Barry Shein wrote:
:One problem we have is that we tend to see the internet as a perfect
:simulation of a fair and just system, at least as a first goal.
:
:I don't know if that's possible or not. I don't know if anyone has
:actually explored the issue deeply. One problem is that there are many
:different notions of justice present globally. Probably thousands with
:significant real-world referents.
:
:

Ultimately, the problem is that the idealism which was more or less the
rule a decade ago has taken a backseat to commercialism and what some see
as practicality;  and arguably, some consider such a reasonable excuse for
lax maintenance (to the tune of if it's not hurting me/my customers,
it's not a priority).  Considering the time passed since maps went
defunct, Paul is entirely justified in doing whatever is necessary to
cluebat the offending networks, imho.


Re: what the heck do i do now?

2007-01-31 Thread Ross Hosman


Or just have everydns [or insert other free dns provider] handle your 
primary dns and let them handle the traffic, problem solved (for you 
atleast) :-)


Personally I have no sympathy to people who are using outdated dnsbl's 
(especially from 1999), I would consider the wildcard if you want to 
actually solve the problem instead of dealing with it yourself or having to 
hand it off to someone else.


You may also take that list of ips (with over 100 queries or so) and turn on 
the dnsbl with those ips added (they will only reject mail from each other 
but it might give some a clue).


- Original Message -
From: David Ulevitch [EMAIL PROTECTED]
To: Paul Vixie [EMAIL PROTECTED]
Cc: nanog@merit.edu
Sent: Wednesday, January 31, 2007 7:15 PM
Subject: Re: what the heck do i do now?



Paul Vixie wrote:
bear with me, this appears to be about DNS but it's actually about 
e-mail.


maps.vix.com has been gone since 1999 or so.  mail-abuse.org is the new 
thing.
i've tried just about everything to get traffic toward the old domain 
name to

stop... right now there's a DNAME but it made no real difference.

Paul,

Not offering a solution but a bit of an explanation perhaps...

From: http://cr.yp.to/ucspi-tcp/rblsmtpd.html
If you do not supply any -r options, rblsmtpd tries an RBL source of 
rbl.maps.vix.com. This will be changed in subsequent versions.


So checking the last released version:
/ucspi-tcp-0.88# grep -hn maps.vix.com rblsmtpd.c
193:  if (flagwantdefaultrbl) rbl(rbl.maps.vix.com);

Looks like that could be a cause of some of your pain...
Not everyone runs rblsmptd on their mailserver, but I know lots of large 
mail servers that run rblsmptd (qmail).


The fact that the option is the default without being explicit means that 
at least some folks don't even know maps.vix.com zones are no longer 
present and the current failure case is not impacting them.


-david ulevitch




Re: what the heck do i do now?

2007-01-31 Thread Trent Lloyd

snip

 The only way for it not to arrive at the name server is for something in
 the way to block it.  Perhaps a transparent filter, or perhaps the IP
 addresses of the name servers are your firewalls, which will block and
 pass the rest on to the real name servers behind them.

The problem here is, most people that have experiences this problem, are
significantly overwhelmed with traffic of people so much as trying to do
a lookup, even if you firewall it you are still going to get an array of
queries.

In some cases, also, firewalling these queries makes it worse as servers
will query multiple times, where as if you give a response with a large
TTL they will go away.  But then you have to have enough server power to
handle these queries (and outbound bandwidth to match).

I don't know how much of an impact there is in this case but I know of
other people who've had this exact same problem and the traffic load of
the attempted queries was immense.

Cheers,
Trent


Re: what the heck do i do now?

2007-01-31 Thread Gadi Evron

On Thu, 1 Feb 2007, Trent Lloyd wrote:
 
 snip
 
  The only way for it not to arrive at the name server is for something in
  the way to block it.  Perhaps a transparent filter, or perhaps the IP
  addresses of the name servers are your firewalls, which will block and
  pass the rest on to the real name servers behind them.
 
 The problem here is, most people that have experiences this problem, are
 significantly overwhelmed with traffic of people so much as trying to do
 a lookup, even if you firewall it you are still going to get an array of
 queries.
 
 In some cases, also, firewalling these queries makes it worse as servers
 will query multiple times, where as if you give a response with a large
 TTL they will go away.  But then you have to have enough server power to
 handle these queries (and outbound bandwidth to match).
 
 I don't know how much of an impact there is in this case but I know of
 other people who've had this exact same problem and the traffic load of
 the attempted queries was immense.

We can discuss this forever. Paul can either maintain the service until he
is sick of it, and hope they go away - or kick it. He waited long enough
that even if we don't agree, hopefully non of us will have arguments with
him.

Depending on time investment issues, contacting some of the big hitters
and seeing why they hit him may be interesting and may help stop a lot of
these.

Some generic emails to the hitters may also be an over-kill, but would
satisfy some of the prettier souls among us.

Gadi.



Re: what the heck do i do now?

2007-01-31 Thread Chris L. Morrow



On Wed, 31 Jan 2007, Brian Wallingford wrote:

 it's not a priority).  Considering the time passed since maps went
 defunct, Paul is entirely justified in doing whatever is necessary to
 cluebat the offending networks, imho.

here's the funny thing... what if the cluebat doesn't actualy change any
delivery on the mailserver end? :) now THAT would be pretty funny.

-Chris


RE: what the heck do i do now?

2007-01-31 Thread Gregory Taylor

DNS forward all queries and replies to myspace, Im sure they'll enjoy that!

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Paul
Vixie
Sent: Wednesday, January 31, 2007 3:48 PM
To: nanog@merit.edu
Subject: Re: what the heck do i do now? 


  ... the effect of causing the subscribers to reconfigure their mailers
to
  stop querying the now-dead RBL in question.  what's the current thinking
  on this?
 
 one problem with this is that the pain is not felt by the misconfigured
 folk, but by distant innocents.

i am one of those who believes that e-mail is a shared benefit.  so in my
worldview, both the intended recipients and actual senders would feel pain.
(bulk e-mail disproportionately benefits the sender, but i'm thinking 1x1
e-mail in this thought experiment.)



Re: what the heck do i do now?

2007-01-31 Thread Matthew Kaufman


Brian Wallingford wrote:

...  Considering the time passed since maps went
defunct, Paul is entirely justified in doing whatever is necessary to
cluebat the offending networks, imho.


That's my opinion too. But I do have some domain name server addresses 
that get a lot of traffic due to historical misconfiguration by people 
who are likely too clueless to adjust it properly.


And I tried some interesting experiments around providing wrong 
wildcard answers to queries that were received.


And then, after getting some nasty complaints (including threats of 
legal action) from people who, for instance, didn't like that whenever 
their PC tried to use me as a resolver, they couldn't get to their 
favorite web sites any more and who weren't interested in removing me 
from their resolver list... I talked to my lawyer. And while I am not a 
lawyer, I can tell you that my lawyer pointed out several interesting 
legal theories under which I could have some serious liability, and so I 
don't do that any more. (As an example, consider what happens *to you* 
if a hospital stops getting emailed results back from their outside 
laboratory service because their email firewall is checking your 
server, and someone dies as a result of the delay)


So while I think you'd be justified in doing it, I think you'd find that 
1) lots of people wouldn't change their configs at all, and 2) you might 
find that your liability insurance doesn't cover deliberate acts.


Matthew Kaufman
[EMAIL PROTECTED]


gmail admin anywhere?

2007-01-31 Thread Mark Jeftovic



Is there a gmail admin around?

Could you give me a shout offlist?

-mark

--
Mark Jeftovic [EMAIL PROTECTED]
Founder  President, easyDNS Technologies Inc.
ph. +1-(416)-535-8672 ext 225
fx. +1-(866) 273-2892


Re: what the heck do i do now?

2007-01-31 Thread Mark Foster


list... I talked to my lawyer. And while I am not a lawyer, I can tell you 
that my lawyer pointed out several interesting legal theories under which I 
could have some serious liability, and so I don't do that any more. (As an 
example, consider what happens *to you* if a hospital stops getting emailed 
results back from their outside laboratory service because their email 
firewall is checking your server, and someone dies as a result of the delay)


So while I think you'd be justified in doing it, I think you'd find that 1) 
lots of people wouldn't change their configs at all, and 2) you might find 
that your liability insurance doesn't cover deliberate acts.




Uhm.  I don't follow?

Once you've taken all reasonable measures to tell said hospital that 
you're no responsible, nor inclined, to forward their mail - and they 
continue to ignore your warnings - surely responsibility passes to the 
person who ignores the warnings? (Hospital Systems Engineer and/or IT 
Management? Or the person who relied on Email for a life-or-death 
application?)


If theres no contract between you and said hospital, and you've taken 
reasonable steps to prevent a mishap, how is it your liability?


Or is this where I get to say 'only in America' ??

To be more relevant to the original problem, I think Paul has every right 
to do what he wishes with the DNS entry, short of causing anyone else a 
Denial of Service.  (Can't be said hes denying service to any of the 
clients involved, as they've had no 'service' from him since 1999, as 
stated...)


Mark.





Re: what the heck do i do now?

2007-01-31 Thread Chris Owen


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Jan 31, 2007, at 9:16 PM, Mark Foster wrote:

list... I talked to my lawyer. And while I am not a lawyer, I can  
tell you that my lawyer pointed out several interesting legal  
theories under which I could have some serious liability, and so I  
don't do that any more. (As an example, consider what happens *to  
you* if a hospital stops getting emailed results back from their  
outside laboratory service because their email firewall is  
checking your server, and someone dies as a result of the delay)


So while I think you'd be justified in doing it, I think you'd  
find that 1) lots of people wouldn't change their configs at all,  
and 2) you might find that your liability insurance doesn't cover  
deliberate acts.




Uhm.  I don't follow?


I my experience, people who tell stories like this really just need  
to get a better lawyer.  I've had several lawyers contact us on  
things about this lame and have found that that the one sentence  
reply letter is often the most effective:


Dear Sir:

Kiss my what?

Never hear from them again.

Chris

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (Darwin)

iD8DBQFFwV6ZElUlCLUT2d0RArP9AKC4JaEP5QJiB70SfrCWGkI9eTdxBwCcC+wA
+DFKKXKMUqluFDF1DNCBJ0o=
=sndk
-END PGP SIGNATURE-


Re: what the heck do i do now?

2007-01-31 Thread Jon Lewis


On Thu, 1 Feb 2007, Paul Vixie wrote:


One thing you might consider is putting together a script to harvest email
addresses from whois records that correspond to the PTR for the querying
IPs.  Add to that list abuse, postmaster, webmaster, hostmaster, etc @ the
poorly run domain.  Then fire off a message explaining the situation and
that you'll be adding a wildcard record on such and such date (preferably
not 4/1).  Script all of this and run it every couple of days until the
date you gave and then follow through with the wildcard entry.  This
undoubtedly won't stop all of the whining but you can at least say you
tried.


volunteers are welcome to apply for that job.


It's actually a trivial thing to do.  Start with something like the 
geektools whois proxy.  That'll handle getting the queries to the right 
RIR's whois server.  Then all you need to do is parse the output for email 
addresses.  For extra credit, you can look for common abuse addresses in 
the output and ignore other addresses in outputs where an abuse address 
is found.


As for trying to make it stop, the two methods thought to be most 
successful are:


1) maps.vix.com.604800  IN  NS  .

2) maps.vix.com.604800  IN  NS  u1.vix.com.
   maps.vix.com.604800  IN  NS  u2.vix.com.
   maps.vix.com.604800  IN  NS  u3.vix.com.
   ... [as many as you like]
   u1.vix.com.  604800  IN  A   192.0.2.1
   u2.vix.com.  604800  IN  A   192.0.2.2
   u3.vix.com.  604800  IN  A   192.0.2.3
   ... [as many as you like]

1) just tells them there is no NS, go away.

2) gives them someone unreachable to try, which they'll do, and do, and 
do, wasting lots of retransmitted queries and the time it takes them to 
timeout.  If you're lucky, the timeouts might be noticed as increased load 
and mail slowdown on the servers sending these queries.


Either way, a properly functioning caching DNS should leave you alone for 
a while after caching the fact that there (is no NS for maps.vix.com||the 
NS's for maps.vix.com are unreachable/unresponsive).  i.e. Either of these 
should mitigate the traffic far better than simply returning NXDOMAIN for 
every maps.vix.com dnsbl query.


Successful here doesn't necessarily mean the traffic stopped but rather 
the traffic has been mitigated as much as is possible without actually 
getting people to fix their systems and stop querying the dead zone.


--
 Jon Lewis   |  I route
 Senior Network Engineer |  therefore you are
 Atlantic Net|
_ http://www.lewis.org/~jlewis/pgp for PGP public key_


WTH does Paul do now?

2007-01-31 Thread Jon Lewis


Why do I even bother?

-- Forwarded message --
Date: Wed, 31 Jan 2007 23:08:22 -0500
From: Mail Delivery Subsystem [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Returned mail: see transcript for details

The original message was received at Wed, 31 Jan 2007 23:08:18 -0500
from localhost.localdomain [127.0.0.1]

   - The following addresses had permanent fatal errors -
[EMAIL PROTECTED]
(reason: 553 5.7.1 Service unavailable; Client host [69.28.69.2] blocked 
using reject-all.vix.com; reason / created)

   - Transcript of session follows -
... while talking to sa.vix.com.:

RCPT To:[EMAIL PROTECTED]

 553 5.7.1 Service unavailable; Client host [69.28.69.2] blocked using 
reject-all.vix.com; reason / created
550 5.1.1 [EMAIL PROTECTED]... User unknown


Re: what the heck do i do now?

2007-01-31 Thread Michael Froomkin - U.Miami School of Law


As an, ahem, lawyer, I think what you do and how you do it matter a lot 
here.  And it would be prudent to talk to someone who understood your 
facts and situation before doing some of the things discussed in this 
thread.  (I won't be more specific for fear of sounding like I'm giving 
legal advice, YMMV, probably not admitted where you live, if this were 
advice it would trigger a bill, see generally disclaimers at 
http://www.law.tm/disclaimers.html .)


Pulling a plug after reasonable/lots of warnings (did you miss anyone? how 
do you know for sure?) is on the safer end of the legal spectrum.


Trying something that has the noble intention of directing cluebat to 
cranial density... well, that's different.  It has the ability to be spun 
as malicious.  Will the judge and jury get it?  Who will pay for the 
lawyer who will explain it to them?  What if it was a government computer 
that got hosed?  Will this be civil or criminal liability?


Bottom line is that in the absence of a promise -- explicit or implicit 
(!) -- to the contrary, you can usually turn off your gear and get on with 
your life (but would you want to if it was a hospital that got hosed? how 
would you feel in the morning?).  The more your actions deviate from that, 
the more likely you are taking on some level of risk.  In some scenarios 
it's an acceptable level, but it all depends.


It is impossible to know with any confidence without knowing more details, 
but from the face of it, it is far from obvious to me that Mark Foster's 
lawyer got this wrong.


(Meanwhile, this will make a great exam question some day.)


On Wed, 31 Jan 2007, Chris Owen wrote:



-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Jan 31, 2007, at 9:16 PM, Mark Foster wrote:

list... I talked to my lawyer. And while I am not a lawyer, I can tell you 
that my lawyer pointed out several interesting legal theories under which 
I could have some serious liability, and so I don't do that any more. (As 
an example, consider what happens *to you* if a hospital stops getting 
emailed results back from their outside laboratory service because their 
email firewall is checking your server, and someone dies as a result of 
the delay)


So while I think you'd be justified in doing it, I think you'd find that 
1) lots of people wouldn't change their configs at all, and 2) you might 
find that your liability insurance doesn't cover deliberate acts.




Uhm.  I don't follow?


I my experience, people who tell stories like this really just need to get a 
better lawyer.  I've had several lawyers contact us on things about this lame 
and have found that that the one sentence reply letter is often the most 
effective:


Dear Sir:

Kiss my what?

Never hear from them again.

Chris

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (Darwin)

iD8DBQFFwV6ZElUlCLUT2d0RArP9AKC4JaEP5QJiB70SfrCWGkI9eTdxBwCcC+wA
+DFKKXKMUqluFDF1DNCBJ0o=
=sndk
-END PGP SIGNATURE-


--
http://www.icannwatch.org   Personal Blog: http://www.discourse.net
A. Michael Froomkin   |Professor of Law|   [EMAIL PROTECTED]
U. Miami School of Law, P.O. Box 248087, Coral Gables, FL 33124 USA
+1 (305) 284-4285  |  +1 (305) 284-6506 (fax)  |  http://www.law.tm
   --It's warm here.--


Re: what the heck do i do now?

2007-01-31 Thread Mark Foster


It is impossible to know with any confidence without knowing more details, 
but from the face of it, it is far from obvious to me that Mark Foster's 
lawyer got this wrong.


(Meanwhile, this will make a great exam question some day.)


I agree, except it wasn't my Laywer.
You mean Matthew Kaufman.

Note the number of quotede layers. I made the mistake of removing the 
quote-intro-line when I posted, apologies.





On Wed, 31 Jan 2007, Chris Owen wrote:



-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Jan 31, 2007, at 9:16 PM, Mark Foster wrote:

list... I talked to my lawyer. And while I am not a lawyer, I can tell 
you that my lawyer pointed out several interesting legal theories under 
which I could have some serious liability, and so I don't do that any 
more. (As an example, consider what happens *to you* if a hospital stops 
getting emailed results back from their outside laboratory service 
because their email firewall is checking your server, and someone dies 
as a result of the delay)


So while I think you'd be justified in doing it, I think you'd find that 
1) lots of people wouldn't change their configs at all, and 2) you might 
find that your liability insurance doesn't cover deliberate acts.




Uhm.  I don't follow?


I my experience, people who tell stories like this really just need to get 
a better lawyer.  I've had several lawyers contact us on things about this 
lame and have found that that the one sentence reply letter is often the 
most effective:


Dear Sir:

Kiss my what?

Never hear from them again.

Chris



*snip*




Re: Best way to supply colo customer with specific provider

2007-01-31 Thread Andrew Gristina

another way is tunnel them to a border router that
interfaces with Cogent and deal with it at the border
router.  QinQ tunnel, GRE, IPSec, or whatever tunnel
type you can support and will service the type of
traffic your customer needs (L2 or L3).  If you have
multiple Cogent connections you might even be able to
DMVPN to the relevant points.  MPLS is another elegant
way to handle it, but if you have MPLS infrastructure,
you probably would have said so.


--- Steve Gibbard [EMAIL PROTECTED] wrote:

 
 If you actually want to do this, you've got four
 choices:
 
 - Policy route, as mentioned below.
 - Get the customer their own connection to Cogent.
 - Have a border router that only talks to Cogent and
 doesn't receive full
routes from your core, and connect the customer
 directly to that.
 - Do something involving route servers and switches
 outside your border
routers, a-la-Equinix Direct.
 
 The policy routing idea will work, for some
 definition of work.  I forget 
 whether Cisco now has a fast
 (non-processor-switched) path for policy 
 routed traffic; they didn't yet when somebody
 convinced me to try this 
 many years ago.  If nothing else, it will make a
 mess of configuration and 
 troubleshooting.
 
 Getting the customer their own Cogent connection is
 likely the least 
 trouble, but may not save you as much on the
 bandwidth cost as aggregating 
 the customer's traffic into the rest of your traffic
 would.
 
 Connecting the customer to a Cogent-only border
 router works fine if you 
 already have such a border router.  If not, it may
 require significant 
 reengineering.
 
 The route server suggestion is thrown out mainly as
 a conceptual exercise. 
 It would require a lot of design work.
 
 All that said, if you're paying your engineers and
 operations people 
 developed world salaries, and paying major
 well-connected city bandwidth 
 rates, none of these suggestions should make your
 accountants or your 
 customer's accountants happy.  You'll be saving a
 bit on bandwidth costs 
 while putting in large amounts of engineering time
 that at best will do 
 nothing useful for your other customers.  Any way
 you do this, you'll 
 probably find that it costs you considerably more
 than it would to give 
 the customer your standard product.
 
 -Steve
 
 On Tue, 30 Jan 2007, Rick Kunkel wrote:
 
 
  Hello all,
 
  Being relatively new to the colocation business,
 we run into a fair number
  of issues that we've never run into before.  Got a
 new one today, and
  although I can think of kludgey ways to accomplish
 what he wants, I'd
  rather get some other ideas first...
 
  We just had our first customer that's requesting
 bandwidth exclusively
  through a particular provider of ours (Cogent) at
 less expensive pricing.
  The money people here are up for it, but
 obviously, they want to make sure
  that he's confined to that Cogent connection.
 
  So now of course we're attempting to figure out
 the best way to do this,
  and I figured that rather than reinventing the
 wheel, I'd check to see how
  others accomplish things like this.
 
  The way I can imagine doing it is by using
 route-maps to steer all of this
  customer's traffic out the Cogent pipe, and
 modifying our BGP
  announcements by AS prepending on whatever block
 or blocks we set aside to
  be Cogent-exclusive.
 
  Again though, this seems to me to lack a certain
 amount of, for lack of a
  better word, grace.
 
  Any other suggestions?
 
  Thanks,
 
  Rick Kunkel
 



 

Never miss an email again!
Yahoo! Toolbar alerts you the instant new Mail arrives.
http://tools.search.yahoo.com/toolbar/features/mail/