RE: Is there another NANOG somewhere?

2007-02-16 Thread michael.dillon
 
 the copying and reposting of others'
 ideas and work, ...  

This is an odd comment to see regarding the NANOG mailing list. NANOG is
not an academic research publishing venue. It is an information sharing
venue for people working in Internet operations. Copying and reposting
of others ideas and work is a *GOOD* thing! That is what information
sharing is all about.

I don't see anything in the AUP that requires list members to only post
their own original work.

--Michael Dillon



Throwing out the NANOG AUP

2007-02-16 Thread Martin Hannigan


I created a draft Wiki article to try and bring together everything we've
argued^H^H^H^H^H^H^H discussed over the last few years and I 
it boils down to a few standards (duh).

http://nanog.cluepon.net/index.php/Will_of_the_Members

I don't know if this will work, but my motiviation is an 
experiment I read about in Drachten, NL where all traffic
signals were removed as an experiment and only a few standards
are implemented. The rest is left up to the community. Apparently,
the roads are proving to be safer. Perhaps this concept can
work in this community? The NANOG AUP and all associated order
from past Politburos are way out of date and overly complex.

The AUP and all the subsequent FAQ's around posting, etc
are outdated and archane. It should be thrown out entirely.

-M


Re: botnets: web servers, end-systems and Vint Cerf

2007-02-16 Thread Sean Donelan


On Fri, 16 Feb 2007, [EMAIL PROTECTED] wrote:

And most ISPs don't provide in-house tech support and an orientation lecture
when you sign up - though some *do* provide the free A/V these days. :)


Working a day on the help desk at the *other* ISPs, which ever ISP you
want to point fingers at, is always an eye-opening experience.

Even when you think things should be the same, they sometimes have very
different problems to solve.




BGP Update Report

2007-02-16 Thread cidr-report

BGP Update Report
Interval: 02-Feb-07 -to- 15-Feb-07 (14 days)
Observation Point: BGP Peering with AS4637

TOP 20 Unstable Origin AS
Rank ASNUpds %  Upds/PfxAS-Name
 1 - AS413415620  1.0%  12.3 -- CHINANET-BACKBONE 
No.31,Jin-rong Street
 2 - AS939414262  0.9%   4.8 -- CRNET CHINA RAILWAY 
Internet(CRNET)
 3 - AS17974   13915  0.9%  26.6 -- TELKOMNET-AS2-AP PT 
TELEKOMUNIKASI INDONESIA
 4 - AS15611   13178  0.9% 149.8 -- Iranian Research Organisation
 5 - AS702 11831  0.8%  16.6 -- AS702 MCI EMEA - Commercial IP 
service provider in Europe
 6 - AS24731   10513  0.7% 250.3 -- ASN-NESMA National Engineering 
Services and Marketing Company Ltd. (NESMA)
 7 - AS477510195  0.7%  39.8 -- GLOBE-TELECOM-AS Telecom 
Carrier  /  ISP Plus +
 8 - AS8151 9927  0.6%   9.7 -- Uninet S.A. de C.V.
 9 - AS4323 9606  0.6%   7.3 -- TWTC - Time Warner Telecom, Inc.
10 - AS243269217  0.6%  83.8 -- TTT-AS-AP TTT Public Company 
Limited, Service Provider,Bangkok
11 - AS287518576  0.6%  35.6 -- CAUCASUS-NET-AS Caucasus 
Network Tbilisi, Georgia
12 - AS204267715  0.5%1928.8 -- PWC-AS - 
PriceWaterhouseCoopers, LLP
13 - AS306  7515  0.5%  41.3 -- DNIC - DoD Network Information 
Center
14 - AS7018 7304  0.5%   4.7 -- ATT-INTERNET4 - ATT WorldNet 
Services
15 - AS126547063  0.5% 172.3 -- RIPE-NCC-RIS-AS RIPE NCC RIS 
project
16 - AS9737 7041  0.5%  60.2 -- TOTNET-TH-AS-AP Telephone 
Organization of Thailand
17 - AS308907015  0.5%  32.2 -- EVOLVA Evolva Telecom
18 - AS701  6913  0.5%   7.2 -- UUNET - MCI Communications 
Services, Inc. d/b/a Verizon Business
19 - AS7545 6428  0.4%  11.1 -- TPG-INTERNET-AP TPG Internet 
Pty Ltd
20 - AS4249 6352  0.4%  45.7 -- LILLY-AS - Eli Lilly and Company


TOP 20 Unstable Origin AS (Updates per announced prefix)
Rank ASNUpds %  Upds/PfxAS-Name
 1 - AS315944455  0.3%4455.0 -- FORTESS-AS Fortess LLC Network
 2 - AS204267715  0.5%1928.8 -- PWC-AS - 
PriceWaterhouseCoopers, LLP
 3 - AS157741830  0.1%1830.0 -- MEDIANAT LLC MEDIANAT, ISP 
primarily for educational institution
 4 - AS313071139  0.1%1139.0 -- YKYATIRIM YAPI KREDI YATIRIM
 5 - AS381511032  0.1%1032.0 -- ENUM-AS-ID APJII-RD
 6 - AS4587 3028  0.2%1009.3 -- ONEWORLD2 - One World 
Internetworking, Inc
 7 - AS34378 955  0.1% 955.0 -- RUG-AS Razguliay-UKRROS Group
 8 - AS3727  831  0.1% 831.0 -- SHRUBB - Shrubbery Networks
 9 - AS14548 785  0.1% 785.0 -- LISTEN-SF-1 - Listen.com
10 - AS316243797  0.2% 759.4 -- VFMNL-AS Verza Facility 
Management BV
11 - AS307072081  0.1% 693.7 -- SICOR-US-CA-IRVINE - SICOR 
Pharmaceuticals, Inc.
12 - AS21761 661  0.0% 661.0 -- BERTS-MEGA-MALL - BERT'S MEGA 
MALL
13 - AS12408 654  0.0% 654.0 -- BIKENT-AS Bikent Ltd. 
Autonomous system
14 - AS3043 3118  0.2% 623.6 -- AMPHIB-AS - Amphibian Media 
Corporation
15 - AS331881038  0.1% 519.0 -- SCS-NETWORK-1 - Sono Corporate 
Suites
16 - AS83478  0.2% 496.9 -- COMTECK - ComTeck
17 - AS20050 959  0.1% 479.5 -- SPPINTERNET01 - Southwest Power 
Pool
18 - AS35489 958  0.1% 479.0 -- TOTO-TECH-AS Toto Ltd.
19 - AS29630 478  0.0% 478.0 -- AZRENA-AS Azerbaijan Research 
and Educational Networking
20 - AS36893 477  0.0% 477.0 -- DURAVITEG-AS


TOP 20 Unstable Prefixes
Rank Prefix Upds % Origin AS -- AS Name
 1 - 155.201.48.0/217702  0.4%   AS20426 -- PWC-AS - 
PriceWaterhouseCoopers, LLP
 2 - 194.242.124.0/22   4455  0.2%   AS31594 -- FORTESS-AS Fortess LLC Network
 3 - 89.4.128.0/24  3443  0.2%   AS24731 -- ASN-NESMA National Engineering 
Services and Marketing Company Ltd. (NESMA)
 4 - 89.4.129.0/24  3237  0.2%   AS24731 -- ASN-NESMA National Engineering 
Services and Marketing Company Ltd. (NESMA)
 5 - 203.177.144.0/23   3208  0.2%   AS4775  -- GLOBE-TELECOM-AS Telecom 
Carrier  /  ISP Plus +
 6 - 209.140.24.0/243061  0.1%   AS3043  -- AMPHIB-AS - Amphibian Media 
Corporation
 7 - 89.4.131.0/24  3046  0.1%   AS24731 -- ASN-NESMA National Engineering 
Services and Marketing Company Ltd. (NESMA)
 8 - 146.222.76.0/242709  0.1%   AS9502  -- OOCL-HKG-AP Hong Kong 
Headquarters
 9 - 216.32.206.0/242552  0.1%   AS20473 -- AS-CHOOPA - Choopa, LLC
10 - 62.89.226.0/24 2130  0.1%   AS20663 -- INAR-VOLOGDA-AS Autonomous 
System of Vologda
11 - 64.95.193.0/24 2060  0.1%   AS30707 -- SICOR-US-CA-IRVINE - SICOR 
Pharmaceuticals, Inc.
12 - 62.68.143.0/24 1830  0.1%   

The Cidr Report

2007-02-16 Thread cidr-report

This report has been generated at Fri Feb 16 21:46:52 2007 AEST.
The report analyses the BGP Routing Table of an AS4637 (Reach) router
and generates a report on aggregation potential within the table.

Check http://www.cidr-report.org/as4637 for a current version of this report.

Recent Table History
Date  PrefixesCIDR Agg
09-02-07207532  134730
10-02-07207587  134670
11-02-07207535  134728
12-02-07207502  134837
13-02-07207542  135067
14-02-07207922  135243
15-02-07208070  135655
16-02-07208954  135562


AS Summary
 24276  Number of ASes in routing system
 10245  Number of ASes announcing only one prefix
  1485  Largest number of prefixes announced by an AS
AS7018 : ATT-INTERNET4 - ATT WorldNet Services
  90478336  Largest address span announced by an AS (/32s)
AS721  : DISA-ASNBLK - DoD Network Information Center


Aggregation Summary
The algorithm used in this report proposes aggregation only
when there is a precise match using the AS path, so as 
to preserve traffic transit policies. Aggregation is also
proposed across non-advertised address space ('holes').

 --- 16Feb07 ---
ASnumNetsNow NetsAggr  NetGain   % Gain   Description

Table 209067   1356437342435.1%   All ASes

AS18566  990   28  96297.2%   COVAD - Covad Communications
   Co.
AS4134  1242  309  93375.1%   CHINANET-BACKBONE
   No.31,Jin-rong Street
AS4755  1063  190  87382.1%   VSNL-AS Videsh Sanchar Nigam
   Ltd. Autonomous System
AS9498   955  140  81585.3%   BBIL-AP BHARTI BT INTERNET
   LTD.
AS4323  1293  512  78160.4%   TWTC - Time Warner Telecom,
   Inc.
AS6478  1130  400  73064.6%   ATT-INTERNET3 - ATT WorldNet
   Services
AS22773  725   47  67893.5%   CCINET-2 - Cox Communications
   Inc.
AS11492  959  342  61764.3%   CABLEONE - CABLE ONE
AS17488  598   54  54491.0%   HATHWAY-NET-AP Hathway IP Over
   Cable Internet
AS8151  1018  483  53552.6%   Uninet S.A. de C.V.
AS19262  711  179  53274.8%   VZGNI-TRANSIT - Verizon
   Internet Services Inc.
AS6197  1016  506  51050.2%   BATI-ATL - BellSouth Network
   Solutions, Inc
AS7018  1485  980  50534.0%   ATT-INTERNET4 - ATT WorldNet
   Services
AS19916  568   71  49787.5%   ASTRUM-0001 - OLM LLC
AS18101  521   33  48893.7%   RIL-IDC Reliance Infocom Ltd
   Internet Data Centre,
AS17676  502   65  43787.1%   JPNIC-JP-ASN-BLOCK Japan
   Network Information Center
AS4812   492   74  41885.0%   CHINANET-SH-AP China Telecom
   (Group)
AS15270  504   87  41782.7%   AS-PAETEC-NET - PaeTec.net -a
   division of
   PaeTecCommunications, Inc.
AS4766   727  315  41256.7%   KIXS-AS-KR Korea Telecom
AS2386  1108  736  37233.6%   INS-AS - ATT Data
   Communications Services
AS721635  276  35956.5%   DISA-ASNBLK - DoD Network
   Information Center
AS3602   526  187  33964.4%   AS3602-RTI - Rogers Telecom
   Inc.
AS16852  393   70  32382.2%   BROADWING-FOCAL - Broadwing
   Communications Services, Inc.
AS7011   786  475  31139.6%   FRONTIER-AND-CITIZENS -
   Frontier Communications, Inc.
AS33588  432  127  30570.6%   BRESNAN-AS - Bresnan
   Communications, LLC.
AS6198   556  266  29052.2%   BATI-MIA - BellSouth Network
   Solutions, Inc
AS6517   405  120  28570.4%   YIPESCOM - Yipes
   Communications, Inc.
AS7029   509  224  28556.0%   WINDSTREAM - Windstream
   

Re: wifi for 600, alex

2007-02-16 Thread Alexander Harrowell

Another mobile-land feature 802.11 could do with - dynamic TX power
management.  All the cellular systems have the ability to dial down the
transmitter power the nearer to the BTS/Node B you get. This is not just
good for batteries, but also good for radio, as s/n has diminishing returns
to transmitter power. WLAN, though, shouts as loud next to the AP as on the
other side of the street, which is Not Good for a system that operates in
unlicensed spectrum.

UMTS, for example, has a peak tx wattage an order of magnitude greater than
WLAN, but due to the power management, in a picocell environment comparable
to a WLAN the mean tx wattage is less by a factor of 10.


Re: botnets: web servers, end-systems and Vint Cerf

2007-02-16 Thread Valdis . Kletnieks
On Fri, 16 Feb 2007 03:55:58 EST, Sean Donelan said:
 On Fri, 16 Feb 2007, [EMAIL PROTECTED] wrote:
  And most ISPs don't provide in-house tech support and an orientation lecture
  when you sign up - though some *do* provide the free A/V these days. :)
 
 Working a day on the help desk at the *other* ISPs, which ever ISP you
 want to point fingers at, is always an eye-opening experience.

I hear enough from people who *do* work at Some Other Place. :)

 Even when you think things should be the same, they sometimes have very
 different problems to solve.

Never claimed *our* solution would work everywhere (heck, I even admit it
isn't 100% effective for *us*).  A very large chunk of what *we* do would be
doomed to failure at any organization where the problem set includes make a
profit selling connectivity to cost-conscious general consumers.

I just often wish Vint's 140 million would switch to Some Other ISP where
the traffic I see from them didn't cause operational issues for *my*
organization. (And yes, that was carefully phrased - there's multiple
solutions that work for customer and ISP *and* get them off my radar. But
there's no *single* workable solution.)





pgp6mQBaR9D6W.pgp
Description: PGP signature


Re: botnets: web servers, end-systems and Vint Cerf

2007-02-16 Thread Eric Gauthier

Heya,

  And the fact that web servers are getting botted is just the cycle of
  reincarnation - it wasn't that long ago that .edu's had a reputation of
  getting pwned for the exact same reasons that webservers are targets now:
  easy to attack, and usually lots of bang-for-buck in pipe size and similar.
 
 You mean they aren't now? Do we have any EDU admins around who want to
 tell us how bad it still is, despite attempts at working on this?
 
 Dorms are basically large honey nets. :)

I run the network for a University with about 12,000 students and 12,000
computers in our dormitories.  We, like many other Universities, have spent the 
last five or six years putting systems in place that are both reactive and 
preventative.  From my perspective, the issues are still there but I'm not 
sure that I agree with your implications.

Do we still have compromised systems?  Yes.  
Is the number of compromosed systems at any time large?  No.
Is the situation out of control?  No.

Email me off-list if you want more details.  IMHO, Its too bad broadband 
providers have not yet picked up on what the Universities have done.

Eric :)



Re: botnets: web servers, end-systems and Vint Cerf

2007-02-16 Thread Gadi Evron

On Fri, 16 Feb 2007, Eric Gauthier wrote:
 Heya,
 
   And the fact that web servers are getting botted is just the cycle of
   reincarnation - it wasn't that long ago that .edu's had a reputation of
   getting pwned for the exact same reasons that webservers are targets now:
   easy to attack, and usually lots of bang-for-buck in pipe size and 
   similar.
  
  You mean they aren't now? Do we have any EDU admins around who want to
  tell us how bad it still is, despite attempts at working on this?
  
  Dorms are basically large honey nets. :)
 
 I run the network for a University with about 12,000 students and 12,000
 computers in our dormitories.  We, like many other Universities, have spent 
 the 
 last five or six years putting systems in place that are both reactive and 
 preventative.  From my perspective, the issues are still there but I'm not 
 sure that I agree with your implications.
 
 Do we still have compromised systems?  Yes.  
 Is the number of compromosed systems at any time large?  No.
 Is the situation out of control?  No.
 
 Email me off-list if you want more details.  IMHO, Its too bad broadband 

Will do, and also below...

 providers have not yet picked up on what the Universities have done.

Thank you Eric. :)

Can you elaborate a bit on what universities have done which would be
relevant to service providers here?

 
 Eric :)
 



Re: botnets: web servers, end-systems and Vint Cerf

2007-02-16 Thread Sean Donelan


On Fri, 16 Feb 2007, [EMAIL PROTECTED] wrote:

I hear enough from people who *do* work at Some Other Place. :)


Hearing about it is not the same as experiencing it first-hand.



Never claimed *our* solution would work everywhere (heck, I even admit it
isn't 100% effective for *us*).  A very large chunk of what *we* do would be
doomed to failure at any organization where the problem set includes make a
profit selling connectivity to cost-conscious general consumers.


The Other ISPs do all of the things you mentioned, except they don't give
their techs free rooms.  Instead they give out $50 or $100 gift cards for 
in-home or in-store techs from several consumer electronics chains to fix 
customer computers; which may be similar to the level of expertise you
would get from unpaid residential dorm techs.  However, the environment 
and populations aren't necessarily comparable.


Understanding why those things have been doomed to failure is an important 
difference. It isn't because ISPs unwilling to try them. But instead

its because ISPs have tried those things (and many other things).  They
fail not because of the cost side of the equation, but because they don't 
have much effect on the problem over the long-term in that environment and 
population.


If someone (vendor, academic, etc) comes up with something that works 
well for the environment and population facing the general public ISP,
there are a lot of ISPs with money constantly asking what can they 
buy/pay/do to fix it.  However, they are also very skeptical, because

this is a well-travelled road, and they've seen a lot of claims that
didn't pan out.


resnets and naming (was: Re: botnets: web servers, end-systems and Vint Cerf)

2007-02-16 Thread Steven Champeon

on Fri, Feb 16, 2007 at 07:43:38AM -0500, Eric Gauthier wrote:
  Dorms are basically large honey nets. :)
 
 I run the network for a University with about 12,000 students and
 12,000 computers in our dormitories. We, like many other Universities,
 have spent the last five or six years putting systems in place that
 are both reactive and preventative. From my perspective, the issues
 are still there but I'm not sure that I agree with your implications.
 
 Do we still have compromised systems?  Yes.  
 Is the number of compromosed systems at any time large?  No.
 Is the situation out of control?  No.
 
 Email me off-list if you want more details.  IMHO, Its too bad broadband 
 providers have not yet picked up on what the Universities have done.

Hear, hear. It's also too bad that there are still so many .edus without
rDNS that identifies their resnets and dynamic/anonymous space easily,
though the situation seems to be improving. Not knowing which .edu is
yours, I'll refrain from further comment, but I will give some examples
from some that I know about:

Good examples:
[0-9a-z\-]+\.[0-9a-z\-]+\.resnet\.ubc\.ca
[0-9a-z\-]+\.[0-9a-z]+\.resnet\.yorku\.ca
ip\-[0-9]+\.student\.appstate\.edu
r[0-9]+\.resnet\.cornell\.edu
ip\-[0-9]+\-[0-9]+\.resnet\.emich\.edu
[0-9a-z\-]+\.resnet\.emory\.edu
dynamic\-[0-9]+\-[0-9]+\.dorm\.natpool\.uc\.edu

Bad examples:
resnet\-[0-9]+\.saultc\.on\.ca
[0-9a-z\-]+\.(brooks|camp|congdon|cubley|graham|hamlin|moore|powers|price|townhouse|woodstock)\.clarkson\.edu
[a-z]+\.(andr|carm|ford|laws|stev|thom|ucrt)[0-9]+\.eiu\.edu
(linden|parkave|ruthdorm|ucrt|village)[0-9a-z]+\-[0-9a-z]+\.fdu\.edu
resnet[0-9]+\.saintmarys\.edu
[0-9a-z\-]+(aolcom|uncgedu)\.uncg\.edu **
(l[0-9]+stf|bl)[0-9]+\.bluford\.ncat\.edu

The general idea is, as has been mentioned before, to use a naming
convention that can easily be blocked in sendmail and other MTAs by the
simple addition of a domain tail or substring to an ACL, such as
'resnet.miskatonic.edu' or 'dyn.miskatonic.edu'. As interesting it can
be to explore the campus map trying to figure out whether a given DNS
token represents a lab, the administration building, the faculty lounge,
or a dorm, over and over again, there's gotta be some activity that is
more rewarding in the long run, such as skeet shooting or helping people
disinfect their computers (or, joy of joys - both simultaenously!)

** I'd like to single out uncg.edu for special ridicule here - I hope
they're still not doing this, but at one point over the last three years
at least, their DHCP addresses were comprised of the end user's email
address, sans '.' and '@', AS THE HOSTNAME in an otherwise non-subdomained
whole:

e.g., '[EMAIL PROTECTED]' got the hostname 'britney1986aolcom.uncg.edu',
'[EMAIL PROTECTED]' got 'billguncgedu.uncg.edu', etc.

I'm sure the spammers who plague uncg.edu today didn't get their entire
computer-literate student body's addresses through an rDNS scan. After
all, not /all/ of the addresses were in uncg.edu. The rest were in AOLland
or at hotmail or a few other obvious freemail providers.

-- 
hesketh.com/inc. v: +1(919)834-2552 f: +1(919)834-2553 w: http://hesketh.com/
antispam news, solutions for sendmail, exim, postfix: http://enemieslist.com/
rambling, amusements, edifications and suchlike: http://interrupt-driven.com/


Information about Foundry Layer 4-7 Switches

2007-02-16 Thread MARLON BORBA

Fellow NANOGers,

Are there in this list someone which worked with Foundry Layer 4-7
switches? Are they up with manufacturer's promises? Please shed some
light on this subject, testimonials, experience. I am specially
interested in Application Load Balancing solutions.

Foundry's web site is at

http://www.foundrynet.com/solutions/sol-app-switch/sol-app-avail/

TIA,

Marlon Borba, CISSP.


Re: RBL for bots?

2007-02-16 Thread J. Oquendo
I had started to create a list for brute forcers and have been updating 
them when I can. It's sort of like a personal RBL list with solely the 
ip address of the offender based off of some scripts that I wrote. For 
those interested, the script is twofold:


1) Script runs from cron checking /var/log/*secure/messages/etc, 
depending on the system. If it finds an attacker it blocks them via 
/etc/hosts.deny and or iptables

2) My version posts the attacking host to www.infiltrated.net/bruteforcers

When I started it, I hadn't heard of or used Denyhosts else I would have 
modified that script in itself. When I first wrote sharpener, I had 
intended on finding the abuse contact for the offending attacker and 
send an automated reply with the date, time, host address and log file 
information. Scenario:


Attack begins
Script sees attack
Script blocks out attack
Script checks the owner of the netblock and finds their abuse contact
Script sends an automated message stating something like: At 02/17/07 
10:20am EST, our host was attacked from a machine in your netblock. The 
offending IP address is xxx.xxx.xxx.xxx


I hadn't had the time to finish the whois $attacker|grep -i abuse 
portion of it though, then I got bored, sidetracked. What I instead do 
now is, I use the bruteforcer list from cron on all machines I 
maintain/manage and have those machines auto block out attackers. The 
theory is if one machine is getting attacked from luzerA, all machines 
should block luzerA, and they do now:


http://www.infiltrated.net/sharpener for those interested in 
modifying/finishing/tweaking the script.


As for creating an RBL such as SORBS or something along those lines. 
Last I need is a packet attack or political Take my netblock off! 
crap. Hence me not really wanting to bother updating it for the Interweb 
folk. For those who find it useful, kudos... For those who want to 
ramble on I have mail filters for you so don't bother.


--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
sil . infiltrated @ net http://www.infiltrated.net 


The happiness of society is the end of government.
John Adams



smime.p7s
Description: S/MIME Cryptographic Signature


RE: botnets: web servers, end-systems and Vint Cerf

2007-02-16 Thread michael.dillon


 I've concluded three things (by doing experiements like 
 that).  (a) Where
 there are Windows boxes, there are zombies.  Securing 
 Microsoft operating
 systems adequately for use on the Internet is not a solved problem in
 computing.  

I disagree. Since 1994 I have been in the habit of setting up MS Windows
boxes with Win98 and up, by installing from CD, connecting to the net
and installing various patches and updates from the Windows Update
service. I've never had a virus infection, a bot, a root kit or
whatever. The secret is simple. These machines never connected directly
to the Internet but went through a NAT box. Way back when it was a
FreeBSD machine running TIS Firewalls Toolkit. These days it is an
off-the-shelf Ethernet switch with DSL modem and NAT built-in.

Therefore, I assert that securing systems adequately for use on the
Internet is indeed a SOLVED PROBLEM in computing. However, it isn't yet
solved in a social or business sense. On the business side, I wonder why
PC's don't come with a built-in firewall/NAT device. It is cheap enough
to do these days. This means that a computer would have no Ethernet
ports on it. Instead, an internal Ethernet port would be directly
connected to a NAT/firewall device on the same circuit board (or via
PCI/PCMCIA/etc.). The external Ethernet port would belong to the
firewall/NAT device. On the social side, people don't realize that such
a solution is possible and therefore they aren't demanding computer
vendors to build it in. The box vendors only build what the OS vendors
want and the OS vendors are not interested in a piece of hardware that
runs its own OS, most likely FreeBSD or Linux.

In the UK, companies who sell TV services (cable and satellite) give
there customers a box to connect with. Why can't ISPs also sell their
services with a proper box included? By proper, I mean a NAT/firewall,
not a USB-connected DSL modem. 

 (c) Amusingly, it's possible
 to detect new end-user allocations and service rollouts by noting when
 spam starts to arrive from them.  (e.g. the Verizon FIOS 
 deployment, if I
 may use hostnames of the form *.fios.verizon.net as a guide, is going
 well in NYC, Dallas, DC, Tampa, Philly, LA, Boston and 
 Newark, but lags
 behind in Seattle, Pittsburgh, Buffalo and Syracuse.)

I wonder if Verizon is violating any SEC rules by not reporting this
information publicly? This is a good example of something that would not
be revealed if they provided a NAT/firewall box to every customer who
didn't already have one.

Has anyone implemented a tool that ISPs could use to detect whether or
not a NAT/firewall device is present? Perhaps based on OS
fingerprinting? Or even based on an agent that must be installed by the
customer? If such tools are available then an ISP could offer customers
a discount for being compliant with a NAT/firewall rule in their
contract.

--Michael Dillon



Re: botnets: web servers, end-systems and Vint Cerf

2007-02-16 Thread Niels Bakker


* [EMAIL PROTECTED] ([EMAIL PROTECTED]) [Fri 16 Feb 2007, 17:31 CET]:
[..]
Therefore, I assert that securing systems adequately for use on the 
Internet is indeed a SOLVED PROBLEM in computing.


A HUNDRED MILLION machines beg to differ.


-- Niels.

--


Re: wifi for 600, alex

2007-02-16 Thread Alexander Harrowell

On 2/16/07, JAKO Andras [EMAIL PROTECTED] wrote:

Please don't forget that 802.11 uses the CSMA/CA protocol. All nodes,

including the AP and _all_ the clients should hear each others'
transmissions so that they can decide when to transmit (when the medium is
idle).



Yes. But so long as they can all interfere with each other, you're still
going to pay a cost in informational overhead to sort it out at a higher
protocol layer, and you're still going to have the electronic warfare in a
phone box problem at places like NANOG meetings. 3GSM is the same - even
the presence of ~10,000 RF engineers doesn't prevent the dozens of
contending networks..

Essentially, this is a problem that perhaps shouldn't be fixed. Having an
open-slather RF design and sorting it out in meta means that WLAN is quick,
cheap, and hackable. Trust me, you don't want to think about radio spectrum
licensing. On the other hand, that particular sufficiently advanced
technology is indistinguishable from magic quality about it causes
problems.

Intentionally limiting the clients' TX powers to the minimum needed to

communicate with the AP makes RTS/CTS almost obligatory, which may be
considered a bad thing. Once again, in the ideal situation all nodes hear
each other, at least from the CSMA/CA's point of view.

Regards,
Andras



I'm not sure that's ideal in my point of view, in so far as we're talking
about a point-to-multipoint network rather than a mesh. And why would anyone
ever want to use more power/create more entropy than necessary?

This argument sailed around in the early days of WiMAX, when people were
talking about running it in unlicensed 5.8GHz spectrum and finally getting
away from the telcos and the government, until they realised that it's not
big wi-fi and isn't designed to cope with contending networks..

Alex


North East fiber cut?

2007-02-16 Thread German Martinez
Hello,
Anyone seeing fiber cut issues around DC area?

Thanks
German


pgpdip6eue4kS.pgp
Description: PGP signature


RE: botnets: web servers, end-systems and Vint Cerf

2007-02-16 Thread michael.dillon

 Therefore, I assert that securing systems adequately for use on the 
 Internet is indeed a SOLVED PROBLEM in computing.
 
 A HUNDRED MILLION machines beg to differ.

You misunderstand. The problem of securing machines *IS* solved. It is
possible. It is regularly done with servers connected to the Internet.
There is no *COMPUTING* problem or technical problem. 

The problem of the 100 million machines is a social or business problem.
We know how they can be secured, but the solution is not being
implemented.

--Michael Dillon



Re: botnets: web servers, end-systems and Vint Cerf

2007-02-16 Thread Mark Boolootian


 You misunderstand. The problem of securing machines *IS* solved. It is
 possible. It is regularly done with servers connected to the Internet.
 There is no *COMPUTING* problem or technical problem. 
 
 The problem of the 100 million machines is a social or business problem.
 We know how they can be secured, but the solution is not being
 implemented.

Eh?  Sure, we can secure servers, but that's not where the trouble is.
It's the client systems with browsers and P2P software and people
mindlessly banging on keyboards running arbitrary executables.  I'm
interested in hearing how they can be secured, since you seem to believe
this is a solved problem.  


Re: wifi for 600, alex

2007-02-16 Thread Todd Vierling


On 2/15/07, Pickett, McLean (OCTO) [EMAIL PROTECTED] wrote:

Works well if everyone has 802.11a/g card. That's been my biggest concern
with deploying 802.11a recently.

-Original Message-
The oft-overlooked 802.11a is great for this purpose when there isn't
enough wiring infrastructure to drop a RJ45 in all the necessary
conference rooms.


I was mainly referring to the conference infra network, used for
presentations and such.  Rather than a scattered AP layout, a
semi-point-to-point system targeted only to the critical resources
works well with 11a.  If you keep attendees tethered to 2.4GHz, you
probably only need to alternate between at most two 5.xGHz channels to
cover the necessary endpoints, and can locate the APs in a less dense
pattern.

As for whether presenters have 11a cards, there's the alternate
possibility of running another 11a AP in AP-client mode (inside the
conference hall) in a wired-to-wireless-to-wired sort of setup.  This
could also work for a terminal room setup.

Of course, a lot of the convenience of frequency segregation will go
out the window in a few years when the final 11n document exists, as
it now looks like 11n will be earmarked for use in all three bands
(2.4GHz and both 5GHz ranges).

I'll just hope that my residential neighbors stay out of my 5GHz space
a little while longer.  8-)

--
-- Todd Vierling [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]


Re: botnets: web servers, end-systems and Vint Cerf

2007-02-16 Thread Roland Dobbins



On Feb 16, 2007, at 9:12 AM, [EMAIL PROTECTED] wrote:


It is regularly done with servers connected to the Internet.
There is no *COMPUTING* problem or technical problem.


I beg to differ.  Yes, it is possible for tech-savvy users to secure  
their machines pretty effectively.  But the level of technical  
knowledge required to do so is completely out of line with, say, the  
level of automotive knowledge required to safely operate an automobile.


The problem of the 100 million machines is a social or business  
problem.

We know how they can be secured, but the solution is not being
implemented.


We know how -people with specialized knowledge- can secure them, not  
ordinary people - and I submit that we in fact do not know how to  
clean and validate compromised systems running modern general-purpose  
operating systems, that the only sane option is re-installation of OS  
and applications from scratch.


There have been very real strides in increasing the default security  
posture of general-purpose operating systems and applications in  
recent years, but there is still a large gap in terms of what a  
consumer ought to be able to reasonably expect in terms of security  
and resiliency from his operating systems/applications, and what he  
actually gets.  This gap has been narrowed, but is still quite wide,  
and will be for the foreseeable future (witness the current  
renaissance in the area of browser/HTML/XSS/Javascript  
vulnerabilities as an example of how the miscreants can change their  
focus as needs must).


---
Roland Dobbins [EMAIL PROTECTED] // 408.527.6376 voice

  The telephone demands complete participation.

  -- Marshall McLuhan



Re: botnets: web servers, end-systems and Vint Cerf

2007-02-16 Thread Niels Bakker


Therefore, I assert that securing systems adequately for use on the 
Internet is indeed a SOLVED PROBLEM in computing.

A HUNDRED MILLION machines beg to differ.


* [EMAIL PROTECTED] [Fri 16 Feb 2007, 18:27 CET]:
You misunderstand. The problem of securing machines *IS* solved. It is 
possible. It is regularly done with servers connected to the Internet. 


Given that even NASA has issues writing correct programs I would call it 
far from solved for any reasonable definition of the word, even in 
hyper-correct environments such as programming spacecraft where time and 
budget constraints are secondary to safety (security).


Or did you forget to mention that your secured machine is powered off?



There is no *COMPUTING* problem or technical problem.


Denying that there is a technical problem with a hundred million 
machines out there not under full control of its owners is delusional.




The problem of the 100 million machines is a social or business problem.
We know how they can be secured, but the solution is not being 
implemented.


Clearly the solution you have in your mind isn't obvious to us out here 
in the real world, nor simple, as we haven't figured it out yet.



-- Niels.


RE: North East fiber cut?

2007-02-16 Thread Mills, Charles

Not seeing any evidence of it in Pittsburgh.   Several of the local
providers peer between here and DC and no one has reported anything.

Chuck

Charles L. Mills
Senior Network Engineer
Access Data Corporation
Pittsburgh, PA 15238
(412) 968-4024
cmills at accessdc dot com
http://www.accessdc.com
Hosting, Colocation, Disaster Recovery and Managed Services

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
German Martinez
Sent: Friday, February 16, 2007 12:18 PM
To: nanog@merit.edu
Subject: North East fiber cut?

Hello,
Anyone seeing fiber cut issues around DC area?

Thanks
German


Re: botnets: web servers, end-systems and Vint Cerf

2007-02-16 Thread James Blessing

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

[EMAIL PROTECTED] wrote:

 You misunderstand. The problem of securing machines *IS* solved. It is
 possible. It is regularly done with servers connected to the Internet.
 There is no *COMPUTING* problem or technical problem. 

True *BUT* (and this is a really big but) it requires that you do something
*BEFORE* you connect it to the Internet.

 The problem of the 100 million machines is a social or business problem.
 We know how they can be secured, but the solution is not being
 implemented.

Whilst the problem is social in terms of people not knowing/wanting to do the
securing before connecting, the technical solution is to make the software
secure by default. If you think anything else then you are delusional.

J

- --
COO
Entanet International
T: 0870 770 9580
http://www.enta.net/
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFF1fBaR+KszLBLUT8RAo+AAJ97RxMBhyZY2MQMRAFs3KWM7EPkHACgqebN
g/nOPkbZffyEDoWAIEvQUK0=
=w0iC
-END PGP SIGNATURE-


Weekly Routing Table Report

2007-02-16 Thread Routing Analysis Role Account

This is an automated weekly mailing describing the state of the Internet
Routing Table as seen from APNIC's router in Japan.
Daily listings are sent to [EMAIL PROTECTED]

For historical data, please see http://thyme.apnic.net.

If you have any comments please contact Philip Smith [EMAIL PROTECTED].

Routing Table Report   04:00 +10GMT Sat 17 Feb, 2007

Analysis Summary


BGP routing table entries examined:  212075
Prefixes after maximum aggregation:  114136
Deaggregation factor:  1.86
Unique aggregates announced to Internet: 103539
Total ASes present in the Internet Routing Table: 24373
Origin-only ASes present in the Internet Routing Table:   21224
Origin ASes announcing only one prefix:   10245
Transit ASes present in the Internet Routing Table:3149
Transit-only ASes present in the Internet Routing Table: 76
Average AS path length visible in the Internet Routing Table:   3.6
Max AS path length visible:  32
Max AS path prepend of ASN (20858)   18
Prefixes from unregistered ASNs in the Routing Table: 4
Unregistered ASNs in the Routing Table:   6
Special use prefixes present in the Routing Table:0
Prefixes being announced from unallocated address space: 13
Number of addresses announced to Internet:   1685198316
Equivalent to 100 /8s, 114 /16s and 21 /24s
Percentage of available address space announced:   45.5
Percentage of allocated address space announced:   62.5
Percentage of available address space allocated:   72.8
Total number of prefixes smaller than registry allocations:  109306

APNIC Region Analysis Summary
-

Prefixes being announced by APNIC Region ASes:47744
Total APNIC prefixes after maximum aggregation:   19291
APNIC Deaggregation factor:2.47
Prefixes being announced from the APNIC address blocks:   45040
Unique aggregates announced from the APNIC address blocks:20417
APNIC Region origin ASes present in the Internet Routing Table:2858
APNIC Region origin ASes announcing only one prefix:785
APNIC Region transit ASes present in the Internet Routing Table:416
Average APNIC Region AS path length visible:3.6
Max APNIC Region AS path length visible: 16
Number of APNIC addresses announced to Internet:  290731616
Equivalent to 17 /8s, 84 /16s and 54 /24s
Percentage of available APNIC address space announced: 72.0

APNIC AS Blocks4608-4864, 7467-7722, 9216-10239, 17408-18431
(pre-ERX allocations)  23552-24575, 37888-38911
APNIC Address Blocks   58/7, 60/7, 116/6, 120/6, 124/7, 126/8, 202/7
   210/7, 218/7, 220/7 and 222/8

ARIN Region Analysis Summary


Prefixes being announced by ARIN Region ASes:103906
Total ARIN prefixes after maximum aggregation:61209
ARIN Deaggregation factor: 1.70
Prefixes being announced from the ARIN address blocks:75934
Unique aggregates announced from the ARIN address blocks: 29457
ARIN Region origin ASes present in the Internet Routing Table:11340
ARIN Region origin ASes announcing only one prefix:4339
ARIN Region transit ASes present in the Internet Routing Table:1052
Average ARIN Region AS path length visible: 3.4
Max ARIN Region AS path length visible:  21
Number of ARIN addresses announced to Internet:   318291328
Equivalent to 18 /8s, 248 /16s and 189 /24s
Percentage of available ARIN address space announced:  70.3

ARIN AS Blocks 1-1876, 1902-2042, 2044-2046, 2048-2106
(pre-ERX allocations)  2138-2584, 2615-2772, 2823-2829, 2880-3153
   3354-4607, 4865-5119, 5632-6655, 6912-7466
   7723-8191, 10240-12287, 13312-15359, 16384-17407
   18432-20479, 21504-23551, 25600-26591,
   26624-27647, 29696-30719, 31744-33791
   35840-36863, 39936-40959
ARIN Address Blocks24/8, 63/8, 64/5, 72/6, 76/8, 96/6, 199/8, 204/6,
   208/7 and 216/8

RIPE Region Analysis Summary


Prefixes being announced by RIPE Region ASes: 43881
Total RIPE prefixes after maximum aggregation:28621
RIPE Deaggregation factor: 1.53
Prefixes being announced from the 

RE: North East fiber cut?

2007-02-16 Thread Mills, Charles

And from the outages mailing list:

Word is savvis has a fiber cut from ATL to CHG of some sort and
re-routing
things through Dallas.   Atleast that's what I've seen on traces.
Savvis
has confirmed an outage on the east coast just not sure exactly where
and what all it affects.



-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Mills, Charles
Sent: Friday, February 16, 2007 12:52 PM
To: German Martinez; nanog@merit.edu
Subject: RE: North East fiber cut?


Not seeing any evidence of it in Pittsburgh.   Several of the local
providers peer between here and DC and no one has reported anything.

Chuck

Charles L. Mills
Senior Network Engineer
Access Data Corporation
Pittsburgh, PA 15238
(412) 968-4024
cmills at accessdc dot com
http://www.accessdc.com
Hosting, Colocation, Disaster Recovery and Managed Services

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
German Martinez
Sent: Friday, February 16, 2007 12:18 PM
To: nanog@merit.edu
Subject: North East fiber cut?

Hello,
Anyone seeing fiber cut issues around DC area?

Thanks
German


Re: botnets: web servers, end-systems and Vint Cerf

2007-02-16 Thread J. Oquendo

[EMAIL PROTECTED] wrote:


You misunderstand. The problem of securing machines *IS* solved. It is
possible. It is regularly done with servers connected to the Internet.
There is no *COMPUTING* problem or technical problem.
The problem of the 100 million machines is a social or business problem.
We know how they can be secured, but the solution is not being
implemented.

--Michael Dillon
  


After all these years, I'm still surprised a consortium of ISP's haven't 
figured out a way to do something a-la Packet Fence for their clients 
where - whenever an infected machine is detected after logging in, that 
machine is thrown into say a VLAN with instructions on how to clean 
their machines before they're allowed to go further and stay online. If 
you ask me, traffic providers (NSP's/NAP's) and ISP's don't mind this 
garbage coming out of their networks, if they did they'd actually ban 
together and do something about it. Its obvious those charging for 
traffic will say little. Minimized traffic means minimized revenue. All 
I see is No we despise that kind of traffic along with a shrug and 
nothing being done about it. I'm sure if some legislative body somewhere 
started levying fines against providers, the net would be a cleaner 
place. For comments on 100 million infected machines... Doubtable. 
Anyone can play fuzzy math games, heck I just strangely figured out that 
MS is costing me an arm and a leg!

http://www.merit.edu/mail.archives/nanog/msg04755.html




--

J. Oquendo
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x1383A743
sil . infiltrated @ net http://www.infiltrated.net
The happiness of society is the end of government.
John Adams



smime.p7s
Description: S/MIME Cryptographic Signature


RE: North East fiber cut?

2007-02-16 Thread Smith, Steve B

Looks like SAVVIS is having a LOT of problems in the DC area. 

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Mills, Charles
Sent: Friday, February 16, 2007 11:52 AM
To: German Martinez; nanog@merit.edu
Subject: RE: North East fiber cut?


Not seeing any evidence of it in Pittsburgh.   Several of the local
providers peer between here and DC and no one has reported anything.

Chuck

Charles L. Mills
Senior Network Engineer
Access Data Corporation
Pittsburgh, PA 15238
(412) 968-4024
cmills at accessdc dot com
http://www.accessdc.com
Hosting, Colocation, Disaster Recovery and Managed Services

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
German Martinez
Sent: Friday, February 16, 2007 12:18 PM
To: nanog@merit.edu
Subject: North East fiber cut?

Hello,
Anyone seeing fiber cut issues around DC area?

Thanks
German

*

The information transmitted is intended only for the person or entity to which 
it is addressed and may contain confidential, proprietary, and/or privileged 
material. Any review, retransmission, dissemination or other use of, or taking 
of any action in reliance upon this information by persons or entities other 
than the intended recipient is prohibited. If you received this in error, 
please contact the sender and delete the material from all computers. GA623




RPSL question

2007-02-16 Thread Andreas Voellmy

Hi,

I'm trying to learn about BGP and just ran across RPSL. I've seen
www.radb.net and know that lots of people are registering their policies
here. Are organizations also using these RPSL policies to compile
configuration files for their routers (via RtConfig)? Or do they just
maintain their RPSL policies and router configurations separately?

Thanks, Andreas


Re: botnets: web servers, end-systems and Vint Cerf

2007-02-16 Thread Simon Lyall

On Fri, 16 Feb 2007, J. Oquendo wrote:
 After all these years, I'm still surprised a consortium of ISP's haven't
 figured out a way to do something a-la Packet Fence for their clients
 where - whenever an infected machine is detected after logging in, that
 machine is thrown into say a VLAN with instructions on how to clean
 their machines before they're allowed to go further and stay online.

All very nice. This sort of things has been detailed a few dozen times by
various people. Doing this is not hard from a technical point of view
(which isn't to say it won't cost a lot of money to impliment).

The hard bit is creating a business case to show how spending the money to
impliment it and then wearing the cost of pissed off customers results in
a net gain to the bottom line.

If someone could actually do a survey to show how much each bot infested
customer is costing their ISP then people might be able to do something.
Right now AFAIK an extra 10,000 botted customers costs the average ISP no
more than a dozen heavy p2p users.

On the other hand Port 25 filtering probably is something that has low
enough negatives vs the positives for people to actually do.

-- 
Simon J. Lyall  |  Very Busy  |  Web: http://www.darkmere.gen.nz/
To stay awake all night adds a day to your life - Stilgar | eMT.



Re: botnets: web servers, end-systems and Vint Cerf

2007-02-16 Thread Sean Donelan


On Fri, 16 Feb 2007, Eric Gauthier wrote:

I run the network for a University with about 12,000 students and 12,000
computers in our dormitories.  We, like many other Universities, have spent the
last five or six years putting systems in place that are both reactive and
preventative.  From my perspective, the issues are still there but I'm not
sure that I agree with your implications.

Do we still have compromised systems?  Yes.
Is the number of compromosed systems at any time large?  No.
Is the situation out of control?  No.

Email me off-list if you want more details.  IMHO, Its too bad broadband
providers have not yet picked up on what the Universities have done.


Why do you claim broadband providers haven't picked up on what 
universities have done?


Couldn't broadband providers say the same thing
 Do we still have compromised systems?  Yes.
 Is the number of compromosed systems at any time large?  No.
 Is the situation out of control?  No.

If you compare infection rates of a broadband provider with 10 million 
subscribers, which probably translates to at least 30 million devices with 
NAT, WiFi and mobile devices; would its infection rate be significantly 
different from a university with 12,000 students with 1 computer each?


If your university's upstream ISP implemented a policy of cutting off the
university's Internet connection anytime a device in the university 
network was compromised; how many hours a year would the university

be down?  What if the university's ISP had a three-strikes policy, would
the university have used up all of its three-strikes?  What proof should
the univeristy's upstream ISP accept the problem is corrected?

Is there some infection rate of university networks that upstream ISPs 
should accept as normal?  Or should ISPs have a zero-tolorance policy

for universities becoming infected repeatedly?

How is the acceptable infection rate for universities different than the 
infection rate of other types of networks?





RE: botnets: web servers, end-systems and Vint Cerf

2007-02-16 Thread Sean Donelan


On Fri, 16 Feb 2007, Nicholas J. Shank wrote:

How is the acceptable infection rate for universities different than

the

infection rate of other types of networks?


Because other types of networks are expected (expected being the
keyword) to have competent administrators.


Expected by whom?

How many home networks or even small business networks have competent
administrators?

What is the infection rate for the network at a typical NANOG meeting full 
of Internet experts?  What was the infection rate at the RSA security 
conference network earlier this month?


Although some specific individual networks may have higher or lower 
infection rates, I haven't see a significant difference in infection

rates between types of networks or industries.  For universities with
low infection rates, there are just as many universities with high 
infection rates.  For government networks with low infection rates, there

are just as many government networks with high infection rates.

Would taking the practices from the specific individual networks with low 
infection rates and using them elsewhere change the infection rate of

other networks?


Re: botnets: web servers, end-systems and Vint Cerf

2007-02-16 Thread Petri Helenius


J. Oquendo wrote:


After all these years, I'm still surprised a consortium of ISP's 
haven't figured out a way to do something a-la Packet Fence for their 
clients where - whenever an infected machine is detected after logging 
in, that machine is thrown into say a VLAN with instructions on how to 
clean their machines before they're allowed to go further and stay 
online.
This has been commercially available for quite some time so it would be 
only up to the providers to implement it.


Pete








tracking fiber assets

2007-02-16 Thread Frank Coluccio

Daniel,

Ordinarily, I might suggest a straightforward 
software-based cable management system. However,
since your list of concerns also includes active 
elements and their wavelength and probably sub-
lambda derivatives, you'll probably want something 
that's rule-based with a bit more smarts.

Give a look at the One Plan system from
VPIsystems Inc (Holmdel, NJ). It was written 
up recently in Lightwave Magazine:
  
http://tinyurl.com/25q88n

One Plan has a photonic-layer inventory and
configuration module that will very likely 
satisfy your needs at the cable, strand and 
multimplexed levels, and then some. Whether 
or not it is available as a standalone module, 
however, I can't rightly say. Good Luck.

Frank A. Coluccio
DTI Consulting Inc.
New York City
347-526-6788
[EMAIL PROTECTED]
---

On Thu Feb 15 18:52 , Daniel J McDonald  sent:


What do people use to keep track of fiber-optic assets?  We own fiber on
electric transmission lines - a hundred spans or so, mostly 24-48 count,
about 800-900 total route-miles.  But we lack a tool to keep track of
what is in use, which customers would be affected when we perform
maintenance, and the like.

Any suggestions for good tools to manage this would be most appreciated.
Our spreadsheets, CAD drawings, and directories full of OTDR shots are
just not cutting it.


-- 
Daniel J McDonald, CCIE # 2495, CISSP # 78281, CNX
Austin Energy
http://www.austinenergy.com