Re: large organization nameservers sending icmp packets to dns servers.

2007-08-10 Thread John Kristoff

On Fri, 10 Aug 2007 16:11:04 -0700
Douglas Otis <[EMAIL PROTECTED]> wrote:

> TCP offers a means to escape UDP related issues.  On the other hand,  
> blocking TCP may offer the necessary motivation for having these UDP  
> issues fixed.  After all, only UDP should be required.  When TCP is  
> designed to readily fail, reliance upon TCP seems questionable.  As  
> DNSSEC in introduced, TCP could be relied upon in the growing number  
> of instances where UDP is improperly handled.

As a datapoint I ran some tests against a reasonably diverse and
sizeable TLD zone I work with in another forum.  I queried the name
servers listed in the parent to see if I could successfuly query
them for their corresponding domain name they are configured for
using TCP.  Out of about 9,300 unique name servers I failed to
receive any answer from about 1700 of them.  That is a bit more
than an 18% failure rate.

John


Re: Content Delivery Networks

2007-08-10 Thread Chris L. Morrow

On Aug 10, 2007, at 9:13 AM, Max Inux wrote:

>   Working for a content delivery network I can tell you that there
> are many nameservers  ignoring TTL that affect many users (AOL
> being the largest american one).  Coincidentally AOL users aren't

So, I'd also ask this, do you know it's the recursive server, or is the
behavior that you see related more to the application caching and not
respecting the TTL? (IE for instance and it's default 30 minute, I think,
ttl).

How does a CDN tell the recursive server is doing this vice the client
app?


Re: large organization nameservers sending icmp packets to dns servers.

2007-08-10 Thread Mark Andrews


> >>> On 8/9/2007 at 10:07 PM, Mark Andrews <[EMAIL PROTECTED]> wrote:
> 
> > In article <[EMAIL PROTECTED]> you write:
> >>
> >>I suspect that the origin of the myth that DNS/TCP is more
> >>dangerous than DNS/UDP is that the first root expliot of
> >>named was over TCP not UDP.  There were later exploits that
> >>were UDP only which totally busted the myth but it continues
> >>to live.
> >>
> >>Mark
> > 
> > Just to make it clear.  This was BIND 4/8 code and the bugs
> > were addressed in the last millennia.
> > 
> > To date there are no known root exploits for BIND 9.
> 
> Because who runs BIND as root anymore?

Lots of people.  It's the only way you can handle some
events.

Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: [EMAIL PROTECTED]


Re: large organization nameservers sending icmp packets to dns servers.

2007-08-10 Thread Roland Dobbins



On Aug 10, 2007, at 4:41 PM, Paul Vixie wrote:

On the other hand, potentially larger messages may offer the  
necessary

motivation for adding ACLs on recursive DNS, and deploying BCP 38.


i surely do hope so.  we need those ACLs and we need that  
deployment, and if
message size and TCP fallback is a motivator, then let's turn UP  
the volume.


There are so many more larger and immediate reasons for doing these  
things that I seriously doubt message size and TCP fallback on the  
DNS will have any impact at all in terms of motivating the non- 
motivated.


But, one can always hope.

;>

---
Roland Dobbins <[EMAIL PROTECTED]> // 408.527.6376 voice

Culture eats strategy for breakfast.

   -- Ford Motor Company




Re: large organization nameservers sending icmp packets to dns servers.

2007-08-10 Thread Paul Vixie

> Your comments have helped.

groovy.

> When TCP is designed to readily fail, reliance upon TCP seems questionable.

i caution against being overly cautious about DNS TCP if you're using RFC 1035
section 4.2.2 as your basis for special caution.  DNS TCP only competes
directly against other DNS TCP.  there are only two situations where a DNS TCP
state blob is present in a DNS target ("server") long enough to be in any
danger: when doing work upstream to fulfill the query, and in zone transfers.

when answering DNS TCP queries in an authority server, there is by definition
no "upstream work" to be done, other than possible backend database lookups
which are beyond the scope of this discussion.  these responses will usually
be generated synchronous to the receipt of the last octet of a query, and the
response will be put into the TCP window (if it's open, which it usually is),
and the DNS target ("server") will then wait for the initiator ("client") to
close the connection or send another query.  (usually it's a close.)

when answering DNS TCP zone transfer requests in an authority server, there is
a much larger window of doom, during which spontaneous network congestion can
close the outgoing TCP window and cause a DNS target ("server") to think that
a TCP session is "idle" for the purpose of RFC 1035 section 4.2.2 TCP resource
management.  while incremental zone transfer is slightly less prone to this
kind of doom than full zone transfer, since the sessions are shorter, it can
take some time for the authority server to compute incremental zone "diffs",
during which the TCP session may appear "idle" through no fault of the DNS
initiator ("client") who is avidly waiting for its response.

lastly, when answering DNS TCP queries in a recursive caching nameserver, it
can take a while (one or more round trips to one or more authority servers)
before there is enough local state to satisfy the query, during which time the
TCP resources held by that query might be reclaimed under RFC 1035 section
4.2.2's rules.

the reason why not to be overly cautious about TCP is that in the case where
you're an authority server answering a normal query, the time window during
which network congestion could close the outbound TCP window long enough for
RFC 1034 section 4.2.2's rules to come into effect, is vanishingly short.  so
while it's incredibly unwise to depend on zone transfer working from a small
number of targets to a large number of initiators, and it is in fact wise to
firewall or ACL your stealth master server so that only your designated
secondary servers can reach it, none of this comes into play for normal
queries to authority servers -- only zone transfers to authority servers.

the unmanageable risk is when a recursive caching nameserver receives a 
query by TCP and forwards/iterates upstream.  if this happens too often, then
the RFC 1035 section 4.2.2 rules will really hurt.  and thus, it's wise, just
as you say, to try to make sure other people don't have to use TCP to fetch
data about your zone.  the counterintuitive thing is that you won't be able
to measure the problems at your authority server since that's not where they
will manifest.  they'll manifest at caching recursive servers downstream.

> As DNSSEC in introduced, TCP could be relied upon in the growing number of
> instances where UDP is improperly handled.

this would be true if TCP fallback was used when EDNS failed.  it's not.
if EDNS fails, then EDNS will not be used, either via UDP or TCP.  so if
improper handling of UDP prevents EDNS from working, then EDNS and anything
that depends on EDNS, including DNSSEC, will not be used.

> UDP handling may have been easier had EDNS been limited to 1280 bytes.

if you mean, had EDNS been limited to nonfragmentation cases, then i think
you might mean 576 bytes or even 296 bytes.  1280 is an IPv6 (new era) limit.

> On the other hand, potentially larger messages may offer the necessary
> motivation for adding ACLs on recursive DNS, and deploying BCP 38.

i surely do hope so.  we need those ACLs and we need that deployment, and if
message size and TCP fallback is a motivator, then let's turn UP the volume.


Re: Content Delivery Networks

2007-08-10 Thread Crist Clark

>>> On 8/10/2007 at 11:55 AM, "Patrick W. Gilmore" <[EMAIL PROTECTED]>
wrote:

> On Aug 10, 2007, at 12:46 PM, John Levine wrote:
> 
>>> Very interesting.  We've all heard and probably all passed along  
>>> that little
>>> bromide at one time or another.  Is it possible that at one time  
>>> it was true
>>> (even possibly for AOL) but with the rise of CDNs, policies of not 

>>> honoring
>>> TTL's have fallen by the wayside?
>>
>> I think you'll still see it in spam zombies, some of which have the 

>> DNS info
>> pre-loaded into them in order to avoid split-horizon anti-spam  
>> techniques.
>>
>> Not much we can do about that until we get sufficient backbone to
deal
>> with the zombie problem and its software enablers.
> 
> Actually, I think the fact Zombies do not honor TTLs is a feature.
:)

Fast-flux my MX records to avoid spam? Throw the spammers'
technology back at 'em!

I changed some MX records in mid-July for a domain. Spam was
still flowing into the old MX hosts until I closed the firewall
25/tcp holes just today. Now just logging those zombies still
banging on the gates.
-- 

Crist J. Clark  
[EMAIL PROTECTED]
Globalstar Communications(408)
933-4387


BĀ¼information contained in this e-mail message is confidential, intended
only for the use of the individual or entity named above. If the reader
of this e-mail is not the intended recipient, or the employee or agent
responsible to deliver it to the intended recipient, you are hereby
notified that any review, dissemination, distribution or copying of this
communication is strictly prohibited. If you have received this e-mail
in error, please contact [EMAIL PROTECTED] 


Re: large organization nameservers sending icmp packets to dns servers.

2007-08-10 Thread Crist Clark

>>> On 8/9/2007 at 10:07 PM, Mark Andrews <[EMAIL PROTECTED]> wrote:

> In article <[EMAIL PROTECTED]> you write:
>>
>>  I suspect that the origin of the myth that DNS/TCP is more
>>  dangerous than DNS/UDP is that the first root expliot of
>>  named was over TCP not UDP.  There were later exploits that
>>  were UDP only which totally busted the myth but it continues
>>  to live.
>>
>>  Mark
> 
>   Just to make it clear.  This was BIND 4/8 code and the bugs
>   were addressed in the last millennia.
> 
>   To date there are no known root exploits for BIND 9.

Because who runs BIND as root anymore?
-- 

Crist J. Clark  
[EMAIL PROTECTED]
Globalstar Communications(408)
933-4387


BĀ¼information contained in this e-mail message is confidential, intended
only for the use of the individual or entity named above. If the reader
of this e-mail is not the intended recipient, or the employee or agent
responsible to deliver it to the intended recipient, you are hereby
notified that any review, dissemination, distribution or copying of this
communication is strictly prohibited. If you have received this e-mail
in error, please contact [EMAIL PROTECTED] 


Re: large organization nameservers sending icmp packets to dns servers.

2007-08-10 Thread Douglas Otis



On Aug 9, 2007, at 2:05 PM, Paul Vixie wrote:

Your comments have helped.

i think you're advising folks to monitor their authority servers to  
find out how many truncated responses are going out and how many  
TCP sessions result from these truncations and how many of these  
TCP sessions are killed by the RFC1035 4.2.2 connection management  
logic, and if the numbers seem high, then they ought to change  
their applications and DNS content so that truncations no longer  
result.


Monitoring is a good recommendation, as many incorrectly estimate  
record limits.  Wildcard resources should also be checked against  
maximal labels.  Fallback may occur with resource records  
encompassing a bit more than a couple hundred bytes.  The assurance  
TCP will fail first is heartening.  How this protection interacts  
with an emerging exploit could be interesting.  I'll try to setup  
some tests and be less pragmatic.


or perhaps you're asking that EDNS be more widely implemented, that  
it not be blocked by firewalls or perverted by hotelroom DNS  
middleboxes, and that firewalls start allowing UDP fragments (which  
don't have port numbers and therefore won't be allowed by UDP/53  
rules).


TCP offers a means to escape UDP related issues.  On the other hand,  
blocking TCP may offer the necessary motivation for having these UDP  
issues fixed.  After all, only UDP should be required.  When TCP is  
designed to readily fail, reliance upon TCP seems questionable.  As  
DNSSEC in introduced, TCP could be relied upon in the growing number  
of instances where UDP is improperly handled.  UDP handling may have  
been easier had EDNS been limited to 1280 bytes.  On the other hand,  
potentially larger messages may offer the necessary motivation for  
adding ACLs on recursive DNS, and deploying BCP 38.


No pain, no gain might be a motto that applies equally to DNS as it  
does for weight lifting.


-Doug


Re: Client information?

2007-08-10 Thread Jay Hennigan


Carl Karsten wrote:




I guess yes. They might implement a non swimmers basin for the
windows people and a sharks only basin for the rest of us.


what is a non swimmers basin ?


A toilet?

Or maybe a kiddie wading pool.

--
Jay Hennigan - CCIE #7880 - Network Engineering - [EMAIL PROTECTED]
Impulse Internet Service  -  http://www.impulse.net/
Your local telephone and internet company - 805 884-6323 - WB6RDV


Re: Client information?

2007-08-10 Thread Paul Atkins
Hello Guys,


Thanks for the information. What I was thinking was if you get more
information, can you make any use of it? Can you provide a bundled service
per se? Can it help you in remote management of home consoles?

Thanks


On 8/10/07, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
>
> On Fri, 10 Aug 2007 09:45:39 CDT, Carl Karsten said:
>
> > thanks.  I kinda figured it was something like that, but it was just a
> bit too
> > unfamiliar, and around here (US) they just have 2 sides of the pool,
> know as
> > "the shallow end" and "the deep end".
>
> I think Peter was referring to the "Wading Pool" - you know, the one that
> has maybe 6 inches of water in it, for the *really* tiny ones that even
> the
> shallow end is too deep
>
>


Re: Content Delivery Networks

2007-08-10 Thread Patrick W. Gilmore


On Aug 10, 2007, at 12:46 PM, John Levine wrote:

Very interesting.  We've all heard and probably all passed along  
that little
bromide at one time or another.  Is it possible that at one time  
it was true
(even possibly for AOL) but with the rise of CDNs, policies of not  
honoring

TTL's have fallen by the wayside?


I think you'll still see it in spam zombies, some of which have the  
DNS info
pre-loaded into them in order to avoid split-horizon anti-spam  
techniques.


Not much we can do about that until we get sufficient backbone to deal
with the zombie problem and its software enablers.


Actually, I think the fact Zombies do not honor TTLs is a feature. :)

--
TTFN,
patrick



Weekly Routing Table Report

2007-08-10 Thread Routing Analysis Role Account

This is an automated weekly mailing describing the state of the Internet
Routing Table as seen from APNIC's router in Japan.
Daily listings are sent to [EMAIL PROTECTED]

For historical data, please see http://thyme.apnic.net.

If you have any comments please contact Philip Smith <[EMAIL PROTECTED]>.

Routing Table Report   04:00 +10GMT Sat 11 Aug, 2007

Report Website: http://thyme.apnic.net
This report:http://thyme.apnic.net/ap-data/2007/08/11/0400

Analysis Summary


BGP routing table entries examined:  227875
Prefixes after maximum aggregation:  119464
Deaggregation factor:  1.91
Unique aggregates announced to Internet: 110970
Total ASes present in the Internet Routing Table: 25926
Prefixes per ASN:  8.79
Origin-only ASes present in the Internet Routing Table:   22589
Origin ASes announcing only one prefix:   11046
Transit ASes present in the Internet Routing Table:3337
Transit-only ASes present in the Internet Routing Table: 75
Average AS path length visible in the Internet Routing Table:   3.6
Max AS path length visible:  21
Max AS path prepend of ASN (35389)   16
Prefixes from unregistered ASNs in the Routing Table: 7
Unregistered ASNs in the Routing Table:   3
Prefixes from 32-bit ASNs in the Routing Table:   5
Special use prefixes present in the Routing Table:0
Prefixes being announced from unallocated address space: 11
Number of addresses announced to Internet:   1749388768
Equivalent to 104 /8s, 69 /16s and 141 /24s
Percentage of available address space announced:   47.2
Percentage of allocated address space announced:   61.8
Percentage of available address space allocated:   76.4
Total number of prefixes smaller than registry allocations:  120402

APNIC Region Analysis Summary
-

Prefixes being announced by APNIC Region ASes:53191
Total APNIC prefixes after maximum aggregation:   20712
APNIC Deaggregation factor:2.57
Prefixes being announced from the APNIC address blocks:   50139
Unique aggregates announced from the APNIC address blocks:22150
APNIC Region origin ASes present in the Internet Routing Table:3031
APNIC Prefixes per ASN:   16.54
APNIC Region origin ASes announcing only one prefix:824
APNIC Region transit ASes present in the Internet Routing Table:462
Average APNIC Region AS path length visible:3.6
Max APNIC Region AS path length visible: 15
Number of APNIC addresses announced to Internet:  311122080
Equivalent to 18 /8s, 139 /16s and 88 /24s
Percentage of available APNIC address space announced: 77.1

APNIC AS Blocks4608-4864, 7467-7722, 9216-10239, 17408-18431
(pre-ERX allocations)  23552-24575, 37888-38911
APNIC Address Blocks   58/7, 60/7, 116/6, 120/6, 124/7, 126/8, 202/7
   210/7, 218/7, 220/7 and 222/8

ARIN Region Analysis Summary


Prefixes being announced by ARIN Region ASes:107833
Total ARIN prefixes after maximum aggregation:62588
ARIN Deaggregation factor: 1.72
Prefixes being announced from the ARIN address blocks:79381
Unique aggregates announced from the ARIN address blocks: 31831
ARIN Region origin ASes present in the Internet Routing Table:11735
ARIN Prefixes per ASN: 6.76
ARIN Region origin ASes announcing only one prefix:4526
ARIN Region transit ASes present in the Internet Routing Table:1069
Average ARIN Region AS path length visible: 3.4
Max ARIN Region AS path length visible:  16
Number of ARIN addresses announced to Internet:   341862144
Equivalent to 20 /8s, 96 /16s and 103 /24s
Percentage of available ARIN address space announced:  75.5

ARIN AS Blocks 1-1876, 1902-2042, 2044-2046, 2048-2106
(pre-ERX allocations)  2138-2584, 2615-2772, 2823-2829, 2880-3153
   3354-4607, 4865-5119, 5632-6655, 6912-7466
   7723-8191, 10240-12287, 13312-15359, 16384-17407
   18432-20479, 21504-23551, 25600-26591,
   26624-27647, 29696-30719, 31744-33791
   35840-36863, 39936-40959
ARIN Address Blocks24/8, 63/

Re: Content Delivery Networks

2007-08-10 Thread Warren Kumari



On Aug 10, 2007, at 1:55 AM, Paul Reubens wrote:

How do you engineer around enterprise and ISP recursors that don't  
honor TTL, instead caching DNS records for a week or more?




A friend of mine was working for a place that performed some service  
on data (not important what, you send them some data (through this  
really ugly client app that they wrote in-house) and they sent you  
back something...).


Anyway, for various reasons they needed to move out of their current  
data-center to a new provider. They had this truly monumental plan  
for doing this that they had been working on for months --- MS  
Project printouts that covered entire walls in this huge rainbow of  
colors, 400 or so pages of plans, etc etc etc -- it all boiled down  
to: Decrease the TTL, then swap in the new A record at midnight on  
Friday. As soon as the TTL expired everything would start working in  
the new place and it will all be transparent to the end users...


Anyway, my friend calls me at like 3 in the morning on Saturday --  
they have updated DNS and none of their clients are connecting to the  
new place... It seems that they have burnt some bridges with the old  
provider and will be shut off on Saturday evening -- he's really  
desperate, so I agree to wander over and take a look...


I arrive to find utter confusion -- the CEO is screaming at the CTO,  
who appears to have decided that the best way to fix things is by  
getting drunk, random other people are screaming (apparently just for  
fun), etc I manage to get someone to calm down for long enough to  
explain the summary of the plan to me and run nslookup.. Sure enough  
the TTL is really low and the new IP is being handed out, etc.


I ask how long it took for the client to fail over during their tests  
-- "Oh, no, we didn't test like that, we didn't want to impact the  
current service, so we tested with a different domain and checked how  
long it took for a IE to pick up the change... It was less than 10  
minutes..."


We track down one of the developers and talk to him. He explains this  
long and involved system with the client performing heath-checks on  
the server and reconnecting wit exponential back-off, etc etc etc.  
Its all great -- apart from the fact that he calls gethostbyname()  
during startup, and then never again


This is a *really* common issue

W




On 8/7/07, Patrick W.Gilmore <[EMAIL PROTECTED]> wrote:
On Aug 7, 2007, at 10:05 AM, Michal Krsek wrote:

>>> 5) User redirection
>>> - You have to implement a scalable mechanisms that redirects
>>> users  to the closes POP. You can use application redirect (fast,
>>> but not  so much scalable), DNS redirect (scalable, but not so
>>> fast) or  anycasting (this needs cooperation with ISP).
>>
>> What is slow about handing back different answers to the same
>> query  via DNS, especially when they are pre-calculated?  Seems
>> very fast to  me.
>
> Yes DNS-based redirection scales very pretty.
>
> But there are two problems:
> 1) Client may not be in same network as DNS server (I'm using my
> home DNS server even if I'm at IETF or I2 meeting on other side of
> globe)

This has been discussed.  Operational experience posted here by Owen
shows < 10% of users are "far" from their recursive NS.

You are the tiny minority.  (Don't feel bad, so am I. :)  Most
"users" either use the NS handed out by their local DHCP server, or
they are VPN'ing anyway.


> 2) DNS TTL makes realtime traffic management inpossible. Remember
> you may not distribute network traffic, but sometimes also server
> load. If one server/POP fails or is overloaded, you need to
> redirect users to another one in realtime.

Define "real time"?  To do it in 1 second or less is nigh
impossible.  But I challenge you to fail anything over in 1 second
when IP communication with end users not on your LAN is involved.

I've seen TTLs as low as 20s, giving you a mean fail-over time of 10
seconds.  That's more than fast enough for most applications these  
days.


--
TTFN,
patrick






Re: Content Delivery Networks

2007-08-10 Thread Rodney Joffe



On Aug 10, 2007, at 9:13 AM, Max Inux wrote:

  Working for a content delivery network I can tell you that there  
are many nameservers  ignoring TTL that affect many users (AOL  
being the largest american one).  Coincidentally AOL users aren't  
nearly so affected by that as they are that their data goes to  
Virginia to enter the internet negating close-to-end-user  
acceleration benefits.


 Additionally there are several networks off of Singtel (Singapore/ 
Southern asia/oceania), Many in Australia (Likely due to Squid  
caches to prevent egress), and in Europe (Mostly France) that I  
have specifically ran into that had this disregard for TTL impact  
them.  In short, they are out there, and they will bite you from  
time to time if your network is widely enough used.


Specifics? Off list is fine.



Re: Client information?

2007-08-10 Thread Valdis . Kletnieks
On Fri, 10 Aug 2007 09:45:39 CDT, Carl Karsten said:

> thanks.  I kinda figured it was something like that, but it was just a bit 
> too 
> unfamiliar, and around here (US) they just have 2 sides of the pool, know as 
> "the shallow end" and "the deep end".

I think Peter was referring to the "Wading Pool" - you know, the one that
has maybe 6 inches of water in it, for the *really* tiny ones that even the
shallow end is too deep


pgp3ggqf6JiDF.pgp
Description: PGP signature


Re: large organization nameservers sending icmp packets to dns servers.

2007-08-10 Thread Valdis . Kletnieks
On Thu, 09 Aug 2007 22:58:40 -, Paul Vixie said:

> > How does the (eventual) deployment of DNSSEC change these numbers?
> 
> DNSSEC cannot be signalled except in EDNS.

Right. Elsewhere in this thread, somebody discussed ugly patches to keep
the packet size under 512.  I dread to think how many different ways of
"protecting" DNS are deployed that will break EDNS, and just haven't been
noticed because there's little enough *actual* EDNS breakage that it's down
in the noise of *other* "random voodoo" breakage at those sites.

> > And who's likely to feel *that* pain first?
> 
> the DNSSEC design seems to distribute pain very fairly.

I actually meant "which 800 pound gorilla is going to try this first and
find all the bustifications", but your answer is good too.. :)



pgpFy1Ds4pwV8.pgp
Description: PGP signature


RE: Content Delivery Networks

2007-08-10 Thread andrew2

Rodney Joffe wrote:
> On Aug 9, 2007, at 10:55 PM, Paul Reubens wrote:
> 
>> How do you engineer around enterprise and ISP recursors that don't
>> honor TTL, instead caching DNS records for a week or more?
>> 
> 
> In my "little" bit of research and experience over the last 10 years
> in this field, I have often pursued this "urban myth". It remains
> largely just that.
> 
> The most common  supposed violator of this was AOL. I found myself in
> a position at one stage to get to the "root" of this, and was rather
> impressed to find that it was indeed a myth.
> 
> We've just finished a small research project where we looked at
> approximately 16 million recursive servers. The only ones violating
> this were some CPE devices that ran local recursive services, and
> they were generally along the lines of returning the appropriate TTL
> the first time they were queried, and if the TTL was zero, they
> returned a higher TTL (1 seconds) to subsequent queries for a
> short period (5 minutes). It may have been a code bug, or a designed
> behavior given that these were CPE devices.


Very interesting.  We've all heard and probably all passed along that little
bromide at one time or another.  Is it possible that at one time it was true
(even possibly for AOL) but with the rise of CDNs, policies of not honoring
TTL's have fallen by the wayside?

Andrew



Re: Content Delivery Networks

2007-08-10 Thread Rodney Joffe



On Aug 9, 2007, at 10:55 PM, Paul Reubens wrote:

How do you engineer around enterprise and ISP recursors that don't  
honor TTL, instead caching DNS records for a week or more?




In my "little" bit of research and experience over the last 10 years  
in this field, I have often pursued this "urban myth". It remains  
largely just that.


The most common  supposed violator of this was AOL. I found myself in  
a position at one stage to get to the "root" of this, and was rather  
impressed to find that it was indeed a myth.


We've just finished a small research project where we looked at  
approximately 16 million recursive servers. The only ones violating  
this were some CPE devices that ran local recursive services, and  
they were generally along the lines of returning the appropriate TTL  
the first time they were queried, and if the TTL was zero, they  
returned a higher TTL (1 seconds) to subsequent queries for a  
short period (5 minutes). It may have been a code bug, or a designed  
behavior given that these were CPE devices.


Do you have any real examples of significant recursive servers doing  
this?





Re: Client information?

2007-08-10 Thread Carl Karsten


Peter Dambier wrote:


Carl Karsten wrote:




I guess yes. They might implement a non swimmers basin for the
windows people and a sharks only basin for the rest of us.



what is a non swimmers basin ?




Hi Carl,

in germany our public swimming pools have pools for swimmers
and pools for people who cannot swim. If swimmers accidently
fall into the the non swimmers and get drowned by all those
non swimmers permanently plunging onto them, its their
problem and not a fault of the people running the pool :)

The shark basin and the non swimmers basin are very much
used in popular language here - but maybe my translation
is horrible.



thanks.  I kinda figured it was something like that, but it was just a bit too 
unfamiliar, and around here (US) they just have 2 sides of the pool, know as 
"the shallow end" and "the deep end".


Carl K


Re: large organization nameservers sending icmp packets to dns servers.

2007-08-10 Thread Matthew Black


On Thu, 9 Aug 2007 15:53:12 -0700 (PDT)
 Doug Barton <[EMAIL PROTECTED]> wrote:


How many bytes of shell code can you stuff into a 4096 byte EDNS0 UDP 
packet? :)



Probably a lot. People used to have 4-line signatures
with the PGP encryption or DECSS. I have a 152-byte C
program that calculates 32K digits of PI.

matthew black
network services
california state university, long beach


Re: Client information?

2007-08-10 Thread Hyunseog Ryu



For ISP, I don't care what applications customers are running.
As long as they are legitimate, it's o.k. with me.
Only concern will be whether they are running malicious code such as 
Virus, Spam, DDoS client, or not, which means abusing network resources 
and other people's resource.

For that purpose, pretty much nmap is performing basic function.
Then if you need, you can capture the info from network.
So I don't see the reason to spend additional money for finding more 
info about the host that connect to us.


Hyun


Paul Atkins wrote:


Hello,
 
I am a network researcher. One question I want to ask the ISPs here 
are that if they have a choice of finding more information about the 
hosts that connect to them, is it something they will like to spend 
money on? For example if the ISP can find out what applications is the 
host running etc. would it be useful for the ISPs?
 
Thanks




Re: Client information?

2007-08-10 Thread Peter Dambier


Carl Karsten wrote:




I guess yes. They might implement a non swimmers basin for the
windows people and a sharks only basin for the rest of us.



what is a non swimmers basin ?




Hi Carl,

in germany our public swimming pools have pools for swimmers
and pools for people who cannot swim. If swimmers accidently
fall into the the non swimmers and get drowned by all those
non swimmers permanently plunging onto them, its their
problem and not a fault of the people running the pool :)

The shark basin and the non swimmers basin are very much
used in popular language here - but maybe my translation
is horrible.

Cheers
Peter and Karin

--
Peter and Karin Dambier
Cesidian Root - Radice Cesidiana
Rimbacher Strasse 16
D-69509 Moerlenbach-Bonsweiher
+49(6209)795-816 (Telekom)
+49(6252)750-308 (VoIP: sipgate.de)
mail: [EMAIL PROTECTED]
mail: [EMAIL PROTECTED]
http://iason.site.voila.fr/
https://sourceforge.net/projects/iason/
http://www.cesidianroot.com/



Re: Client information?

2007-08-10 Thread Carl Karsten




I guess yes. They might implement a non swimmers basin for the
windows people and a sharks only basin for the rest of us.


what is a non swimmers basin ?

Carl K


Re: Client information?

2007-08-10 Thread Peter Dambier


Paul Atkins wrote:


Hello,
 
I am a network researcher. One question I want to ask the ISPs here are 
that if they have a choice of finding more information about the hosts 
that connect to them, is it something they will like to spend money on? 
For example if the ISP can find out what applications is the host 
running etc. would it be useful for the ISPs?
 
Thanks


I am not exactly an ISP.

Sometimes somebody is nocking at my door. If it sounds like they are
knocking with a pick and a hoe, I forget about good manners and ask
back with nmap.

Depending an what IASON and nmap are reporting I might give
botnet Gadi an email - but I dont take money for that sevice
nor is that so interesting I would pay money to know more.

And I see netbios ports open most of the time, so I guess it
must be windows mostly and the application is a bot.

The friendlier guys keep telling me their os and browser via the
html interface. If they disguise a Linux Konqeror as a Winows IE
that is no big problem.

Would it be useful for ISPs?

I guess yes. They might implement a non swimmers basin for the
windows people and a sharks only basin for the rest of us.

But I as a costumer would not want that. And paying money for
that "sevice" - beware.


Kind regards
Peter and Karin

--
Peter and Karin Dambier
Cesidian Root - Radice Cesidiana
Rimbacher Strasse 16
D-69509 Moerlenbach-Bonsweiher
+49(6209)795-816 (Telekom)
+49(6252)750-308 (VoIP: sipgate.de)
mail: [EMAIL PROTECTED]
mail: [EMAIL PROTECTED]
http://iason.site.voila.fr/
https://sourceforge.net/projects/iason/
http://www.cesidianroot.com/



The Cidr Report

2007-08-10 Thread cidr-report

This report has been generated at Fri Aug 10 21:19:42 2007 AEST.
The report analyses the BGP Routing Table of AS2.0 router
and generates a report on aggregation potential within the table.

Check http://www.cidr-report.org for a current version of this report.

Recent Table History
Date  PrefixesCIDR Agg
03-08-07231908  149811
04-08-07231815  150435
05-08-07232179  150461
06-08-07232046  150894
07-08-07231724  151796
08-08-07232316  152211
09-08-07232457  152616
10-08-07232344  152285


AS Summary
 26003  Number of ASes in routing system
 11020  Number of ASes announcing only one prefix
  1503  Largest number of prefixes announced by an AS
AS7018 : ATT-INTERNET4 - AT&T WorldNet Services
  88826880  Largest address span announced by an AS (/32s)
AS721  : DISA-ASNBLK - DoD Network Information Center


Aggregation Summary
The algorithm used in this report proposes aggregation only
when there is a precise match using the AS path, so as 
to preserve traffic transit policies. Aggregation is also
proposed across non-advertised address space ('holes').

 --- 10Aug07 ---
ASnumNetsNow NetsAggr  NetGain   % Gain   Description

Table 232733   1524178031634.5%   All ASes

AS18566 1018   99  91990.3%   COVAD - Covad Communications
   Co.
AS4755  1319  466  85364.7%   VSNL-AS Videsh Sanchar Nigam
   Ltd. Autonomous System
AS6478  1115  286  82974.3%   ATT-INTERNET3 - AT&T WorldNet
   Services
AS4134  1329  565  76457.5%   CHINANET-BACKBONE
   No.31,Jin-rong Street
AS11492   367  74467.0%   CABLEONE - CABLE ONE
AS4323  1323  601  72254.6%   TWTC - Time Warner Telecom,
   Inc.
AS9394   844  233  61172.4%   CRNET CHINA RAILWAY
   Internet(CRNET)
AS19262  766  232  53469.7%   VZGNI-TRANSIT - Verizon
   Internet Services Inc.
AS9498   994  466  52853.1%   BBIL-AP BHARTI BT INTERNET
   LTD.
AS15270  566   72  49487.3%   AS-PAETEC-NET - PaeTec.net -a
   division of
   PaeTecCommunications, Inc.
AS7545   719  230  48968.0%   TPG-INTERNET-AP TPG Internet
   Pty Ltd
AS17488  742  253  48965.9%   HATHWAY-NET-AP Hathway IP Over
   Cable Internet
AS7018  1503 1015  48832.5%   ATT-INTERNET4 - AT&T WorldNet
   Services
AS18101  580  109  47181.2%   RIL-IDC Reliance Infocom Ltd
   Internet Data Centre,
AS19916  568  101  46782.2%   ASTRUM-0001 - OLM LLC
AS2386  1205  744  46138.3%   INS-AS - AT&T Data
   Communications Services
AS8151   916  463  45349.5%   Uninet S.A. de C.V.
AS17676  504   66  43886.9%   JPNIC-JP-ASN-BLOCK Japan
   Network Information Center
AS4812   529  112  41778.8%   CHINANET-SH-AP China Telecom
   (Group)
AS4766   800  384  41652.0%   KIXS-AS-KR Korea Telecom
AS9443   482   82  40083.0%   INTERNETPRIMUS-AS-AP Primus
   Telecommunications
AS6197  1029  645  38437.3%   BATI-ATL - BellSouth Network
   Solutions, Inc
AS22773  753  372  38150.6%   CCINET-2 - Cox Communications
   Inc.
AS4808   478  115  36375.9%   CHINA169-BJ CNCGROUP IP
   network China169 Beijing
   Province Network
AS4668   512  168  34467.2%   LGNET-AS-KR LG CNS
AS16814  426   86  34079.8%   NSS S.A.
AS9942   438  120  31872.6%   COMINDICO-AP SOUL Converged
   Communications Australia
AS7011   905  595  31034.3%   FRONTIER-AND-CITIZENS -
   Frontier Communications of
   America, Inc.
AS577573  266

BGP Update Report

2007-08-10 Thread cidr-report

BGP Update Report
Interval: 09-Jul-07 -to- 09-Aug-07 (32 days)
Observation Point: BGP Peering with AS2.0

TOP 20 Unstable Origin AS
Rank ASNUpds %  Upds/PfxAS-Name
 1 - AS14906  205364  2.8%   41072.8 -- 
 2 - AS9583   150849  2.1% 129.3 -- SIFY-AS-IN Sify Limited
 3 - AS701872005  1.0%  46.7 -- ATT-INTERNET4 - AT&T WorldNet 
Services
 4 - AS21452   66724  0.9%9532.0 -- skannet-ibadan
 5 - AS30850   62116  0.8%   31058.0 -- DESMIE-AS Hellenic Trasmission 
System Operator S.A.
 6 - AS14201   61218  0.8%6121.8 -- 
 7 - AS24731   60661  0.8%1444.3 -- ASN-NESMA National Engineering 
Services and Marketing Company Ltd. (NESMA)
 8 - AS13285   48611  0.7%6944.4 -- OPALTELECOM-AS Opal Telecom
 9 - AS462146489  0.6% 314.1 -- UNSPECIFIED UNINET-TH
10 - AS27685   40747  0.6%2396.9 -- PEOPLE ONLINE
11 - AS815140486  0.6%  44.0 -- Uninet S.A. de C.V.
12 - AS24326   39123  0.5% 222.3 -- TTT-AS-AP Maxnet, Internet 
Service Provider, Bangkok
13 - AS19444   36729  0.5% 573.9 -- CHARTER-STL - CHARTER 
COMMUNICATIONS
14 - AS24863   36588  0.5% 100.5 -- LINKdotNET-AS
15 - AS702 35249  0.5%  53.0 -- AS702 Verizon Business EMEA - 
Commercial IP service provider in Europe
16 - AS21332   32858  0.5%1314.3 -- NTC-AS New Telephone Company
17 - AS20115   30490  0.4%  20.1 -- CHARTER-NET-HKY-NC - Charter 
Communications
18 - AS876430201  0.4%  18.1 -- TEOLTAB TEO LT AB Autonomous 
System
19 - AS11830   29722  0.4%  49.2 -- Instituto Costarricense de 
Electricidad y Telecom.
20 - AS26210   29459  0.4% 283.3 -- AES Communications Bolivia S.A.


TOP 20 Unstable Origin AS (Updates per announced prefix)
Rank ASNUpds %  Upds/PfxAS-Name
 1 - AS14906  205364  2.8%   41072.8 -- 
 2 - AS30850   62116  0.8%   31058.0 -- DESMIE-AS Hellenic Trasmission 
System Operator S.A.
 3 - AS22433   16784  0.2%   16784.0 -- HRMC - Human Resource 
Management Center, Inc.
 4 - AS22072   11190  0.1%   11190.0 -- 
 5 - AS27289   11070  0.1%   11070.0 -- CLEOCOMMUNICATIONS - CLEO 
COMMUNICATIONS INC
 6 - AS21452   66724  0.9%9532.0 -- skannet-ibadan
 7 - AS268298730  0.1%8730.0 -- YKK-USA - YKK USA,INC
 8 - AS13285   48611  0.7%6944.4 -- OPALTELECOM-AS Opal Telecom
 9 - AS19001   13225  0.2%6612.5 -- AVENTCOMMTECH - Aventure 
Communications
10 - AS14201   61218  0.8%6121.8 -- 
11 - AS30707   14477  0.2%4825.7 -- 
12 - AS213489198  0.1%4599.0 -- KOPTERIFI KOPTERIFI is 
autonomous system. Located in Vammala Finland
13 - AS9833 4564  0.1%4564.0 -- HICOM-AS-AP 
http://www.plexus.net
14 - AS430434001  0.1%4001.0 -- INTERKOM-AS Interkom Sp. z o.o.
15 - AS394083037  0.0%3037.0 -- CZ-ETHERNET AVI ethernet.cz
16 - AS319492533  0.0%2533.0 -- APEXDIGITAL - Apex Digital
17 - AS9660 7396  0.1%2465.3 -- KANNET-AS-AP Telecommunication 
and ISP company
18 - AS12879   14460  0.2%2410.0 -- OJSC-STN-AS Svyaztransneft 
Autonomus System
19 - AS27685   40747  0.6%2396.9 -- PEOPLE ONLINE
20 - AS30763   18779  0.3%2347.4 -- IOS-SECONDARY-AS Internet of 
Siberia ISP


TOP 20 Unstable Prefixes
Rank Prefix Upds % Origin AS -- AS Name
 1 - 194.110.73.0/24   62090  0.8%   AS30850 -- DESMIE-AS Hellenic Trasmission 
System Operator S.A.
 2 - 62.24.238.0/2448519  0.6%   AS13285 -- OPALTELECOM-AS Opal Telecom
 3 - 12.27.90.0/24 45278  0.6%   AS14906 -- 
 4 - 12.27.91.0/24 45252  0.6%   AS14906 -- 
 5 - 221.135.22.0/24   41104  0.5%   AS9583  -- SIFY-AS-IN Sify Limited
 6 - 12.27.88.0/24 40003  0.5%   AS14906 -- 
 7 - 12.27.89.0/24 39899  0.5%   AS14906 -- 
 8 - 221.135.253.0/24  39012  0.5%   AS9583  -- SIFY-AS-IN Sify Limited
 9 - 12.27.88.0/22 34932  0.5%   AS14906 -- 
10 - 80.243.64.0/2031466  0.4%   AS21332 -- NTC-AS New Telephone Company
11 - 170.65.189.0/24   30611  0.4%   AS14201 -- 
12 - 170.65.176.0/22   30505  0.4%   AS14201 -- 
13 - 203.23.208.0/24   27307  0.3%   AS7604  -- HWY1-AS Highway 1
14 - 80.250.36.0/2322259  0.3%   AS21452 -- skannet-ibadan
15 - 80.250.44.0/2222075  0.3%   AS21452 -- skannet-ibadan
16 - 80.250.40.0/2222073  0.3%   AS21452 -- skannet-ibadan
17 - 210.214.198.0/24  20630  0.3%   AS9583  -- SIFY-AS-IN Sify Limited
18 - 200.123.224.0/24  19774  0.3%   AS27685 -- PEOPLE ONLINE
19 - 200.123.225.0/24  19771  0.2%   AS27685 -- PEOPLE ONLINE
20 - 212.109.192.0/20  18388  0.2%   AS30763 -- IOS-SECONDARY-AS Internet of 
Siberia ISP

Details at http://bgpupdates.potaroo.net

Copies of this report are mailed to:
  nanog@merit.edu
  [EMAIL PRO

Re: Content Delivery Networks

2007-08-10 Thread Brandon Butterworth

> How do you engineer around enterprise and ISP recursors that
> don't honor TTL, instead caching DNS records for a week or more?

Ask their users to tell them to stop being muppets

brandon


Re: Client information?

2007-08-10 Thread Scott Weeks



--- [EMAIL PROTECTED] wrote:
From: "Paul Atkins" <[EMAIL PROTECTED]>

I am a network researcher. One question I want to ask the ISPs here are that
if they have a choice of finding more information about the hosts that
connect to them, is it something they will like to spend money on? For
example if the ISP can find out what applications is the host running etc.
would it be useful for the ISPs?
-


No, there're too many free tools that're way fun and good.  For example: 
www.ntop.org with lsof for your particular question.  But, you're asking folks 
who aren't afraid of the technology.  Ask an exec and they'll probably give a 
much different answer.  ;-)

scott