Re: Researchers ping through first full 'Internet census' in 25 years

2007-10-12 Thread Paul Ferguson

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -- Roy [EMAIL PROTECTED] wrote:

http://www.networkworld.com/community/node/20390?netht=101107dailynews2n
ladname=101107dailynews  

Credit where credit is due:

 http://www.xkcd.com/195/

-BEGIN PGP SIGNATURE-
Version: PGP Desktop 9.6.3 (Build 3017)

wj8DBQFHDw5Lq1pz9mNUZTMRAsFvAJ9yF2eAO3RMX8g1Txv31nxmHCZTWgCghUfK
NKHh3kxqyPA9Wuu5dkBUqpc=
=roun
-END PGP SIGNATURE-


--
Fergie, a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 fergdawg(at)netzero.net
 ferg's tech blog: http://fergdawg.blogspot.com/



Re: Researchers ping through first full 'Internet census' in 25 years

2007-10-12 Thread Randy Bush

 http://www.networkworld.com/community/node/20390?netht=101107dailynews2nladname=101107dailynews
   
 Credit where credit is due:
 http://www.xkcd.com/195/

i guess you did not read the article, eh?

randy


Re: Researchers ping through first full 'Internet census' in 25 years

2007-10-12 Thread Paul Ferguson

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -- Randy Bush [EMAIL PROTECTED] wrote:

 http://www.networkworld.com/community/node/20390?netht=101107dailynews2
 nladname=101107dailynews   
 Credit where credit is due:
 http://www.xkcd.com/195/

i guess you did not read the article, eh?


Since you brought it up, of course I did:

http://fergdawg.blogspot.com/2007/10/from-xkcd-to-reality-ant-censuses-of.h
tml

- - ferg

-BEGIN PGP SIGNATURE-
Version: PGP Desktop 9.6.3 (Build 3017)

wj8DBQFHDxQGq1pz9mNUZTMRAp9tAJ0XP/MtQtsNy5StUTDNgo2V7M5e+gCeOoCz
ia9SPyl4Sw6vfmr+Zmerkg0=
=VxBk
-END PGP SIGNATURE-


--
Fergie, a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 fergdawg(at)netzero.net
 ferg's tech blog: http://fergdawg.blogspot.com/



Re: Researchers ping through first full 'Internet census' in 25 years

2007-10-12 Thread Hank Nussbacher


On Thu, 11 Oct 2007, Roy wrote:

You will want:
http://www.isi.edu/ant/address/index.html
-Hank



I guess no one told them that someone might consider this an attack?  I
have set up detectors where pinging consecutive honeypot ip addresses
results in the source IP address being blacklisted for a day or two.



Researchers ping through first full 'Internet census' in 25 years

No door-to-door canvassing here: This census involved the direction of
some 3 billion pings toward 2.8 billion allocated Internet addresses
from three machines over the course of two months.

http://www.networkworld.com/community/node/20390?netht=101107dailynews2nladname=101107dailynews

or

http://tinyurl.com/37fgua


The press release is located at

http://www.isi.edu/news/news.php?story=178



Re: Researchers ping through first full 'Internet census' in 25 years

2007-10-12 Thread Duane Wessels



ISI folks have been taking this census since at least mid 2003.

We vizualized their data using our tool and then made a movie showing
the changes from 2003 to late 2006.  If you have 27 MB and a few
minutes to spare you can download it from here:
http://maps.measurement-factory.com/gallery/USC-LANDER-Census/

Duane W.


Re: Researchers ping through first full 'Internet census' in 25 years

2007-10-12 Thread Leigh Porter


27MB? I duno, that's quite a lot.. I'll have to delete some mp3s first..

Duane Wessels wrote:


 ISI folks have been taking this census since at least mid 2003.

 We vizualized their data using our tool and then made a movie showing
 the changes from 2003 to late 2006.  If you have 27 MB and a few
 minutes to spare you can download it from here:
 http://maps.measurement-factory.com/gallery/USC-LANDER-Census/

 Duane W.


Re: Researchers ping through first full 'Internet census' in 25 years

2007-10-12 Thread Justin M. Streiner


On Fri, 12 Oct 2007, Chris Owen wrote:

You can't consider every wacko on the net when doing something like this. 
Anyone who considers a ping an attack probably isn't worth worrying about.


I tend to agree, but back when I manned the abuse desk (among others) at 
my former employer, I would see abuse reports come in all the time that 
were basically a report from whatever security software someone was 
running on their PC, accompanied by a message that was usually something 
along the lines of this:


HOST x.x.x.x ON YOUR NETWORK PINGED ME  I TAKE MY SECURITY 
SERIOUSLY!!  I'M CALLING THE FBI!!!


The knee-jerk reaction is rarely the right one :)

jms


Re: Researchers ping through first full 'Internet census' in 25 years

2007-10-12 Thread Gadi Evron


On Fri, 12 Oct 2007, Leigh Porter wrote:



You are more likely to get 5000 zonealarm emails


Or a place on dshield's top 10.




Justin M. Streiner wrote:


On Fri, 12 Oct 2007, Chris Owen wrote:


You can't consider every wacko on the net when doing something like
this. Anyone who considers a ping an attack probably isn't worth
worrying about.


I tend to agree, but back when I manned the abuse desk (among others)
at my former employer, I would see abuse reports come in all the time
that were basically a report from whatever security software someone
was running on their PC, accompanied by a message that was usually
something along the lines of this:

HOST x.x.x.x ON YOUR NETWORK PINGED ME  I TAKE MY SECURITY
SERIOUSLY!!  I'M CALLING THE FBI!!!

The knee-jerk reaction is rarely the right one :)

jms




Re: Why do some ISP's have bandwidth quotas?

2007-10-12 Thread Brandon Galbraith
On 10/12/07, Tony Finch [EMAIL PROTECTED] wrote:


 On Thu, 11 Oct 2007, Mikael Abrahamsson wrote:
 
  If it's multicast TV I don't see the problem, it doesn't increase your
  backbone traffic linearly with the number of people doing it.

 However if you have UK-style ADSL ppp backhaul then multicast doesn't
 help.

 Tony.


Not to drag this too far off topic, but have serious studies been done
looking at moving switching fabric closer to the DSLAMs (versus doing
everything PPPoE)? I know this sort of goes opposite of how ILECs are setup
to dish out DSL, but as more traffic is being pushed user to user, it may
make economic/technical sense.

-brandon


Re: Why do some ISP's have bandwidth quotas?

2007-10-12 Thread Tony Finch

On Thu, 11 Oct 2007, Mikael Abrahamsson wrote:

 If it's multicast TV I don't see the problem, it doesn't increase your
 backbone traffic linearly with the number of people doing it.

However if you have UK-style ADSL ppp backhaul then multicast doesn't
help.

Tony.
-- 
f.a.n.finch  [EMAIL PROTECTED]  http://dotat.at/
IRISH SEA: SOUTHERLY, BACKING NORTHEASTERLY FOR A TIME, 3 OR 4. SLIGHT OR
MODERATE. SHOWERS. MODERATE OR GOOD, OCCASIONALLY POOR.


Re: Researchers ping through first full 'Internet census' in 25 years

2007-10-12 Thread Tim Franklin

On Fri, October 12, 2007 2:49 pm, Justin M. Streiner wrote:

 HOST x.x.x.x ON YOUR NETWORK PINGED ME  I TAKE MY SECURITY
 SERIOUSLY!!  I'M CALLING THE FBI!!!

That I can *sort* of understand - it's the flaming zealotry of ALL ICMP
IS EEEVIL! trickling down from 99% of firewall admins working in
enterprises to end users who just heard it from someone in IT.

It's the Your server www.whatever.com is attacking me from port 80! ones
that leave me torn between laughing, crying, and seriously thinking about
a cull...





Re: Researchers ping through first full 'Internet census' in 25 years

2007-10-12 Thread Chris Owen


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Oct 12, 2007, at 12:50 AM, Roy wrote:


I guess no one told them that someone might consider this an attack?


You can't consider every wacko on the net when doing something like  
this.  Anyone who considers a ping an attack probably isn't worth  
worrying about.


Chris

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (Darwin)

iD8DBQFHD3eTElUlCLUT2d0RAmyaAKCjU8XWlNEb7PWuWY+zz7nYc9LCBACgrp/r
pPnxCKmRAwm1No9pMOGT3YI=
=/0ak
-END PGP SIGNATURE-


Re: Researchers ping through first full 'Internet census' in 25 years

2007-10-12 Thread Justin M. Streiner


On Fri, 12 Oct 2007, Leigh Porter wrote:


You are more likely to get 5000 zonealarm emails


Got tons of those...
...and BlackIce, DShield, Norton, SamSpade, and all the rest :)

But there were also lots of people who took time out of their busy day to 
personally write their own flaming emails, rather than just relying on the 
boilerplate reports many of the packages above commonly send out.  I felt 
honored :)


jms


Justin M. Streiner wrote:


On Fri, 12 Oct 2007, Chris Owen wrote:


You can't consider every wacko on the net when doing something like
this. Anyone who considers a ping an attack probably isn't worth
worrying about.


I tend to agree, but back when I manned the abuse desk (among others)
at my former employer, I would see abuse reports come in all the time
that were basically a report from whatever security software someone
was running on their PC, accompanied by a message that was usually
something along the lines of this:

HOST x.x.x.x ON YOUR NETWORK PINGED ME  I TAKE MY SECURITY
SERIOUSLY!!  I'M CALLING THE FBI!!!

The knee-jerk reaction is rarely the right one :)

jms




Re: Researchers ping through first full 'Internet census' in 25 years

2007-10-12 Thread Leigh Porter


You are more likely to get 5000 zonealarm emails

Justin M. Streiner wrote:

 On Fri, 12 Oct 2007, Chris Owen wrote:

 You can't consider every wacko on the net when doing something like
 this. Anyone who considers a ping an attack probably isn't worth
 worrying about.

 I tend to agree, but back when I manned the abuse desk (among others)
 at my former employer, I would see abuse reports come in all the time
 that were basically a report from whatever security software someone
 was running on their PC, accompanied by a message that was usually
 something along the lines of this:

 HOST x.x.x.x ON YOUR NETWORK PINGED ME  I TAKE MY SECURITY
 SERIOUSLY!!  I'M CALLING THE FBI!!!

 The knee-jerk reaction is rarely the right one :)

 jms


The Cidr Report

2007-10-12 Thread cidr-report

This report has been generated at Fri Oct 12 21:14:04 2007 AEST.
The report analyses the BGP Routing Table of AS2.0 router
and generates a report on aggregation potential within the table.

Check http://www.cidr-report.org for a current version of this report.

Recent Table History
Date  PrefixesCIDR Agg
05-10-07239308  153665
06-10-07239204  153876
07-10-07239300  154113
08-10-07239286  154297
09-10-07239339  154503
10-10-07239547  153951
11-10-07239659  151909
12-10-07239733  154384


AS Summary
 26555  Number of ASes in routing system
 11198  Number of ASes announcing only one prefix
  1950  Largest number of prefixes announced by an AS
AS4538 : ERX-CERNET-BKB China Education and Research Network 
Center
  88942080  Largest address span announced by an AS (/32s)
AS721  : DISA-ASNBLK - DoD Network Information Center


Aggregation Summary
The algorithm used in this report proposes aggregation only
when there is a precise match using the AS path, so as 
to preserve traffic transit policies. Aggregation is also
proposed across non-advertised address space ('holes').

 --- 12Oct07 ---
ASnumNetsNow NetsAggr  NetGain   % Gain   Description

Table 239660   1543598530135.6%   All ASes

AS4538  1950  711 123963.5%   ERX-CERNET-BKB China Education
   and Research Network Center
AS4755  1440  382 105873.5%   VSNL-AS Videsh Sanchar Nigam
   Ltd. Autonomous System
AS9498  1009   73  93692.8%   BBIL-AP BHARTI BT INTERNET
   LTD.
AS11492 1158  367  79168.3%   CABLEONE - CABLE ONE
AS4323  1358  601  75755.7%   TWTC - Time Warner Telecom,
   Inc.
AS22773  793   71  72291.0%   CCINET-2 - Cox Communications
   Inc.
AS4134  1102  407  69563.1%   CHINANET-BACKBONE
   No.31,Jin-rong Street
AS6478  1127  433  69461.6%   ATT-INTERNET3 - ATT WorldNet
   Services
AS18566 1028  353  67565.7%   COVAD - Covad Communications
   Co.
AS8151  1057  434  62358.9%   Uninet S.A. de C.V.
AS19262  786  184  60276.6%   VZGNI-TRANSIT - Verizon
   Internet Services Inc.
AS17488  825  267  55867.6%   HATHWAY-NET-AP Hathway IP Over
   Cable Internet
AS18101  602   72  53088.0%   RIL-IDC Reliance Infocom Ltd
   Internet Data Centre,
AS15270  584   70  51488.0%   AS-PAETEC-NET - PaeTec
   Communications, Inc.
AS7545   741  231  51068.8%   TPG-INTERNET-AP TPG Internet
   Pty Ltd
AS6197  1028  531  49748.3%   BATI-ATL - BellSouth Network
   Solutions, Inc
AS7018  1494 1005  48932.7%   ATT-INTERNET4 - ATT WorldNet
   Services
AS2386  1231  755  47638.7%   INS-AS - ATT Data
   Communications Services
AS4668   518   68  45086.9%   LGNET-AS-KR LG CNS
AS4812   548  105  44380.8%   CHINANET-SH-AP China Telecom
   (Group)
AS4766   810  374  43653.8%   KIXS-AS-KR Korea Telecom
AS4802   575  158  41772.5%   ASN-IINET iiNet Limited
AS9443   465   78  38783.2%   INTERNETPRIMUS-AS-AP Primus
   Telecommunications
AS4808   490  121  36975.3%   CHINA169-BJ CNCGROUP IP
   network China169 Beijing
   Province Network
AS7011   958  594  36438.0%   FRONTIER-AND-CITIZENS -
   Frontier Communications of
   America, Inc.
AS19916  568  205  36363.9%   ASTRUM-0001 - OLM LLC
AS17676  502  142  36071.7%   JPNIC-JP-ASN-BLOCK Japan
   Network Information Center
AS5668   654  299  35554.3%   AS-5668 - CenturyTel Internet
   Holdings, Inc.
AS3602   430   77  35382.1%   

BGP Update Report

2007-10-12 Thread cidr-report

BGP Update Report
Interval: 10-Sep-07 -to- 11-Oct-07 (32 days)
Observation Point: BGP Peering with AS2.0

TOP 20 Unstable Origin AS
Rank ASNUpds %  Upds/PfxAS-Name
 1 - AS9583   647514  6.2% 552.0 -- SIFY-AS-IN Sify Limited
 2 - AS9498   159345  1.5% 154.0 -- BBIL-AP BHARTI BT INTERNET LTD.
 3 - AS4621   138397  1.3% 935.1 -- UNSPECIFIED UNINET-TH
 4 - AS8151   106223  1.0%  63.1 -- Uninet S.A. de C.V.
 5 - AS43403  100136  1.0%   50068.0 -- SVIAZ-PLUS-AS LLC Sviaz Plus
 6 - AS16637   89625  0.9%2036.9 -- MTNNS-AS
 7 - AS15611   63185  0.6% 651.4 -- Iranian Research Organisation
 8 - AS475061710  0.6% 284.4 -- CSLOXINFO-ISP-AS-AP CSLOXINFO 
Public Company Limited.
 9 - AS30619   59785  0.6%2989.2 -- TDM-AS
10 - AS17974   55438  0.5% 138.2 -- TELKOMNET-AS2-AP PT 
TELEKOMUNIKASI INDONESIA
11 - AS413452826  0.5%  47.4 -- CHINANET-BACKBONE 
No.31,Jin-rong Street
12 - AS702 46500  0.5%  71.6 -- AS702 Verizon Business EMEA - 
Commercial IP service provider in Europe
13 - AS34368   46009  0.4%1278.0 -- THEZONE Zonata - Natzkovi  
Sie LTD.
14 - AS24731   45666  0.4% 992.7 -- ASN-NESMA National Engineering 
Services and Marketing Company Ltd. (NESMA)
15 - AS453845532  0.4%  22.0 -- ERX-CERNET-BKB China Education 
and Research Network Center
16 - AS14390   41953  0.4% 749.2 -- CORENET - Coretel America, Inc.
17 - AS701839959  0.4%  25.9 -- ATT-INTERNET4 - ATT WorldNet 
Services
18 - AS912139257  0.4% 179.3 -- TTNET TTnet Autonomous System
19 - AS10275   38498  0.4%   19249.0 -- AS-UNITEDNETWORK - ABS-CBN 
International
20 - AS288 37692  0.4% 311.5 -- European Space Agency


TOP 20 Unstable Origin AS (Updates per announced prefix)
Rank ASNUpds %  Upds/PfxAS-Name
 1 - AS43403  100136  1.0%   50068.0 -- SVIAZ-PLUS-AS LLC Sviaz Plus
 2 - AS10275   38498  0.4%   19249.0 -- AS-UNITEDNETWORK - ABS-CBN 
International
 3 - AS26829   15133  0.1%   15133.0 -- YKK-USA - YKK USA,INC
 4 - AS175409744  0.1%9744.0 -- MTL-AP Modern Terminals Limited
 5 - AS343828026  0.1%8026.0 -- ASSYRUS-SRL-AS Assyrus Srl 
Maintainer
 6 - AS36011   11998  0.1%5999.0 -- AHSYS-ASN - Atlantic Health 
System
 7 - AS30707   14309  0.1%4769.7 -- 
 8 - AS926412739  0.1%4246.3 -- ASNET Academic Sinica
 9 - AS426113539  0.0%3539.0 -- HOSTUA-AS hosing.com.ua AS
10 - AS326503342  0.0%3342.0 -- SANDHILLS-SW - SANDHILLS 
PUBLISHING
11 - AS200073057  0.0%3057.0 -- AS-ALOGI - ALOGIENT INC.
12 - AS30619   59785  0.6%2989.2 -- TDM-AS
13 - AS246975377  0.1%2688.5 -- SATURN-ASN Saturn ISP AS
14 - AS6174 5051  0.1%2525.5 -- SPRINTLINK8 - Sprint
15 - AS287337304  0.1%2434.7 -- AVIGAL-AS IT master LLC
16 - AS39396   13272  0.1%2212.0 -- NBIS-AS NBI Systems Ltd.
17 - AS34770   15254  0.1%2179.1 -- ELITSAT-AS Elit SAT AD - Rousse
18 - AS16637   89625  0.9%2036.9 -- MTNNS-AS
19 - AS270931970  0.0%1970.0 -- DDN-ASNBLK1 - DoD Network 
Information Center
20 - AS319491606  0.0%1606.0 -- APEXDIGITAL - Apex Digital


TOP 20 Unstable Prefixes
Rank Prefix Upds % Origin AS -- AS Name
 1 - 203.101.87.0/24   63160  0.6%   AS9498  -- BBIL-AP BHARTI BT INTERNET LTD.
 2 - 202.56.250.0/24   60693  0.6%   AS9498  -- BBIL-AP BHARTI BT INTERNET LTD.
 3 - 210.18.10.0/2456553  0.5%   AS9583  -- SIFY-AS-IN Sify Limited
 4 - 221.135.22.0/24   52442  0.5%   AS9583  -- SIFY-AS-IN Sify Limited
 5 - 193.46.60.0/2451836  0.5%   AS43403 -- SVIAZ-PLUS-AS LLC Sviaz Plus
 6 - 221.135.113.0/24  50596  0.5%   AS9583  -- SIFY-AS-IN Sify Limited
 7 - 91.194.244.0/24   48300  0.4%   AS43403 -- SVIAZ-PLUS-AS LLC Sviaz Plus
 8 - 192.96.14.0/2444387  0.4%   AS16637 -- MTNNS-AS
 9 - 192.96.13.0/2444376  0.4%   AS16637 -- MTNNS-AS
10 - 210.214.177.0/24  43484  0.4%   AS9583  -- SIFY-AS-IN Sify Limited
11 - 210.214.173.0/24  43195  0.4%   AS9583  -- SIFY-AS-IN Sify Limited
12 - 221.135.77.0/24   43057  0.4%   AS9583  -- SIFY-AS-IN Sify Limited
13 - 210.214.221.0/24  43054  0.4%   AS9583  -- SIFY-AS-IN Sify Limited
14 - 210.214.210.0/24  42956  0.4%   AS9583  -- SIFY-AS-IN Sify Limited
15 - 210.214.220.0/24  42898  0.4%   AS9583  -- SIFY-AS-IN Sify Limited
16 - 210.214.211.0/24  42808  0.4%   AS9583  -- SIFY-AS-IN Sify Limited
17 - 210.214.172.0/24  42708  0.4%   AS9583  -- SIFY-AS-IN Sify Limited
18 - 209.163.125.0/24  40119  0.4%   AS14390 -- CORENET - Coretel America, Inc.
19 - 210.214.179.0/24  28320  0.3%   AS9583  -- SIFY-AS-IN Sify Limited
20 - 210.214.183.0/24  28153  0.3%   AS9583  -- SIFY-AS-IN Sify 

Re: Researchers ping through first full 'Internet census' in 25 years

2007-10-12 Thread Deepak Jain


Ok.

To make my own contribution to this thread hijack somewhat operational...

How many people have had to add to their NOC/Abuse desk SOP:

When someone calls threatening that they are the FBI/CIA/NSA/Your 
grandmother returned from the dead...


something, something, something

but essentially, Don't Panic. And they are basically a crackpot.

Deepak



Gadi Evron wrote:


On Fri, 12 Oct 2007, Leigh Porter wrote:



You are more likely to get 5000 zonealarm emails


Or a place on dshield's top 10.




Justin M. Streiner wrote:


On Fri, 12 Oct 2007, Chris Owen wrote:


You can't consider every wacko on the net when doing something like
this. Anyone who considers a ping an attack probably isn't worth
worrying about.


I tend to agree, but back when I manned the abuse desk (among others)
at my former employer, I would see abuse reports come in all the time
that were basically a report from whatever security software someone
was running on their PC, accompanied by a message that was usually
something along the lines of this:

HOST x.x.x.x ON YOUR NETWORK PINGED ME  I TAKE MY SECURITY
SERIOUSLY!!  I'M CALLING THE FBI!!!

The knee-jerk reaction is rarely the right one :)

jms







Re: Researchers ping through first full 'Internet census' in 25 years

2007-10-12 Thread Mark Foster




On Fri, 12 Oct 2007, Tim Franklin wrote:



On Fri, October 12, 2007 2:49 pm, Justin M. Streiner wrote:


HOST x.x.x.x ON YOUR NETWORK PINGED ME  I TAKE MY SECURITY
SERIOUSLY!!  I'M CALLING THE FBI!!!


That I can *sort* of understand - it's the flaming zealotry of ALL ICMP
IS EEEVIL! trickling down from 99% of firewall admins working in
enterprises to end users who just heard it from someone in IT.

It's the Your server www.whatever.com is attacking me from port 80! ones
that leave me torn between laughing, crying, and seriously thinking about
a cull...



Its all very well for those that know better to carry on like this, but I 
would suggest that those sortsa complaints only come from people who 
don't know better.  They don't know how to interpret their Firewall 
warnings.  And they don't know whats genuine and whats not.


Heck, I remember being a little like that myself, back in the days of 
Windows + Conseal PC Firewall being the best security solution affordably 
available to home users - and from being DoS'd offline at 14400...


(And i've only been working in the industry for 10 years.)

Suggest that rather than knocking those who genuinely think that its a 
warzone out there (and isn't it?) efforts of ISPs to educate clients as to 
what is genuine abuse (and what isn't) should be rewarded.


(If some random dynamic IP host on the other side of the world started 
hitting my firewall for no apparent reason, i'd be raising my eyebrows 
too.  Of course, these days, I have a much better idea of what is 
genuinely threatening and what isn't.)


Mark.

[Sorry, but sometimes I get the distinct impression that Network 
Operators sometimes forget that the vast majority of people simply aren't 
anywhere near their level.]





Re: How to Handle ISPs Who Turn a Blind Eye to Criminal Activity?

2007-10-12 Thread Mike Lewinski


Florian Weimer wrote:


I don't know what case prompted Ferg to post his message to NANOG, but I
know that there are cases where failing to act is comparable to ignoring
the screams for help of an alleged rape victim during the alleged
crime.


I'm reminded of this story from earlier this year:

http://www.jsonline.com/story/index.aspx?id=568400

For his effort, Van Iveren was charged with criminal trespass while 
using a dangerous weapon, criminal damage to property while using a 
dangerous weapon and disorderly conduct while using a dangerous weapon, 
all criminal misdemeanors that carry a maximum total penalty of 33 
months in jail.


On a side note, now that I've gotten back on -post I will say that 
I've had pretty dismal experiences working with Law Enforcement over the 
years as a service provider. When you have to explain to the Feds just 
what IRC (for example) is, you've lost the battle :( After repeated 
attempts at getting what seems to be blatant criminal activity 
investigated, a provider might start to think If Law Enforcement 
doesn't care, why should I? (I've avoided falling into that trap, but 
it is frustrating to boot someone for illegal activities and see them go 
on to pull the same thing at another provider even after providing 
evidence to authorities.).




Re: How to Handle ISPs Who Turn a Blind Eye to Criminal Activity?

2007-10-12 Thread Mike Lewinski


Paul Ferguson wrote:


So, back to my original question: If you alert an ISP that bad and
possibly criminal activity is taking place by one of their customer,
and they do not take corrective action (even after a year), what do
you do?


In at least one case, where I knew the offender had been booted off his 
last provider, I actually stalled disconnecting him for three months 
while I tried getting help from law enforcement. I felt we had a better 
chance of getting him permanently removed from the Internet by keeping 
him around long enough to get court orders to investigate his most 
likely illegal actions that were generating abuse reports. I started out 
with the feds, went on to the state and finally the local sheriff before 
giving up and just cutting him off for lack of any other hope.


But a year is too long. If it were impacting my network, I'd probably 
drop their routes (or blackhole the offending hosts anyway).


Re: How to Handle ISPs Who Turn a Blind Eye to Criminal Activity?

2007-10-12 Thread Paul Ferguson

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -- Mike Lewinski [EMAIL PROTECTED] wrote:

On a side note, now that I've gotten back on -post I will say that 
I've had pretty dismal experiences working with Law Enforcement over the 
years as a service provider. When you have to explain to the Feds just 
what IRC (for example) is, you've lost the battle :( After repeated 
attempts at getting what seems to be blatant criminal activity 
investigated, a provider might start to think If Law Enforcement 
doesn't care, why should I? (I've avoided falling into that trap, but 
it is frustrating to boot someone for illegal activities and see them go 
on to pull the same thing at another provider even after providing 
evidence to authorities.).


Exactly.

Sometimes I think to myself that ...ISPs have Terms of Service and
Acceptable Use Policies, so they have the scope and tools they need
to boot a 'customer who break the rules.

But all too often, it would appear, the potential loss of revenue
seems to win out over enforcing those policies.

And as you say, if the ISP boots them, they just set up shop elsewhere.

So, back to my original question: If you alert an ISP that bad and
possibly criminal activity is taking place by one of their customer,
and they do not take corrective action (even after a year), what do
you do?

- - ferg

-BEGIN PGP SIGNATURE-
Version: PGP Desktop 9.6.3 (Build 3017)

wj8DBQFHD+XAq1pz9mNUZTMRAub9AKDGpuf2fwYYS2Q1rF/v4EtB76wr5wCcDSFY
Ya7MTzjQcUJ+qL5UfSe5gw0=
=2pba
-END PGP SIGNATURE-


--
Fergie, a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 fergdawg(at)netzero.net
 ferg's tech blog: http://fergdawg.blogspot.com/



Re: Researchers ping through first full 'Internet census' in 25 years

2007-10-12 Thread Steve Atkins



On Oct 12, 2007, at 5:08 PM, Mark Foster wrote:




(If some random dynamic IP host on the other side of the world  
started hitting my firewall for no apparent reason, i'd be raising  
my eyebrows too.  Of course, these days, I have a much better idea  
of what is genuinely threatening and what isn't.)


If there weren't a dynamic IP host on the other side of the world  
hitting my firewall I'd be calling my provider, 'cos I'd know my  
connection had gone down.


Cheers,
  Steve



Re: How to Handle ISPs Who Turn a Blind Eye to Criminal Activity?

2007-10-12 Thread Gadi Evron


On Fri, 12 Oct 2007, Paul Ferguson wrote:



So, back to my original question: If you alert an ISP that bad and
possibly criminal activity is taking place by one of their customer,
and they do not take corrective action (even after a year), what do
you do?


That's a different question all together, not about criminal ISPs, which I 
am sure non of the members of NANOG, are.


SpamHaus has been known to eventually block their mail servers, which gets 
quick results, and law suits.


Gadi.


Sun Project Blackbox / Portable Data Center

2007-10-12 Thread Lorell Hathcock
www.sun.com/blackbox

 

Has anyone seen one of these things in real life?

 

I hear that there's been one sighted in Houston.  I would love to take a
tour.

 

Also, is anyone using anything like this?  It seems like they would make
great fiber huts.

 

Lorell

 

 



Re: How to Handle ISPs Who Turn a Blind Eye to Criminal Activity?

2007-10-12 Thread Paul Ferguson

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -- Gadi Evron [EMAIL PROTECTED] wrote:

That's a different question all together, not about criminal ISPs, which
[...]

No, not necessarily. Given  that there are Tier 1 ISPs, Tier 2, etc.,
so you can certainly have some small-ish ISP colluding with criminal
activity, in effect, by ignoring it or claiming ignorance.

However, it's kind of hard to plead ignorance when, say, people
continually alert them to the issues and they persist.

That's just one example... I can come up with more. :-)

- - ferg

-BEGIN PGP SIGNATURE-
Version: PGP Desktop 9.6.3 (Build 3017)

wj8DBQFHD/N0q1pz9mNUZTMRAqtkAKCLJifYupBbpjmqVfVGUND95NVGNwCdFYp8
SM37ObYbO88K2iCkd99fp7c=
=DjDg
-END PGP SIGNATURE-



--
Fergie, a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 fergdawg(at)netzero.net
 ferg's tech blog: http://fergdawg.blogspot.com/



RE: Sun Project Blackbox / Portable Data Center

2007-10-12 Thread Buhrmaster, Gary

 Subject: Sun Project Blackbox / Portable Data Center
 
 www.sun.com/blackbox
 
  
 
 Has anyone seen one of these things in real life?

SLAC has a blackbox (which is actually white) 
installed, and running it packed with servers
for batch computing for the high energy physics program.

http://today.slac.stanford.edu/feature/2007/blackbox1.asp

Of course, using shipping containers for data centers
(and telco/networking) is not new, but this is a 
commercialized offering, rather than custom built
(although these early ones are still essentially
custom built).  

Note also that Google has (recently) patented
the modular data center

http://yro.slashdot.org/article.pl?sid=07/10/09/1543256from=rss

Gary 




Re: How to Handle ISPs Who Turn a Blind Eye to Criminal Activity?

2007-10-12 Thread Robert Bonomi

 From [EMAIL PROTECTED]  Fri Oct 12 16:26:36 2007
 Date: Fri, 12 Oct 2007 21:23:15 GMT
 Subject: Re: How to Handle ISPs Who Turn a Blind Eye to Criminal Activity?

 So, back to my original question: If you alert an ISP that bad and
 possibly criminal activity is taking place by one of their customer,
 and they do not take corrective action (even after a year), what do
 you do?


This is straying somewhat afield from 'network operations', but it is at
least tangentially relevant, so

'What do you do?' conceals a raft of other issues that have to be identified
and answered before the 'obvious' quesiton cn be addressed.

First off -- not to belabor (well, not too much, anyway) the obvious -- you 
have to identify what your 'goals' are.  Both tactical (short term), and 
strategic (long term).  And what level of resources you are willing to commit 
toward supporting those goals.

A desirable state of affairs is that every network operator _does_ actively
police its  user base, and makes 'former customers' out of anyone who egages
in activities deemed not acceptable by a large portion of the  rest of the
'net world.

Unfortuntely, commercial providers are driven by 'economic self-interest',
rather than the good of the 'community' as their _primary_ motivation.
They _will_ consider the 'good of the community' when it is not in conflict
(or at _most_, represents a *minor* conflict) with their self-interest, but
if the two are diametrically opposed, there is no doubt as to which viewpoint
_will_ prevail.


So, when you ask them to _do_something_, quote for the good of the community
unquote, and 'nothing happens'  it is reasonable to conclude that 'economic
self interest' is controlling -- either it is 'not worth the effort/expense', 
or it would cost revenues that they're not willing to give up.

I'm sure this is no surprise to anyone.  In fact, Isuspect everybody has seen
these exact sysmptoms in _their_own_ management, in varying degree.



There are only two things one can change to influence that decision --
either one 'somehow' makes 'the good of the community' more inportant,
*or* one finds a way to invoke their 'economic self-interest' on the
'right' side of the issue.

One possible way to do the latter is to look or 'sensitive' departments,
*other* than the 'abuse' contacts, who have 'hot buttons' that can be pushed.
Some possiilities for this approach include legal, investor relations, 
and Public Relations.   All the folks who have to 'deal with the mess'
when something 'embarassing' becomes public knowledge.

contacting such departments, with an 'early warning' about what could become
'very messy' public attention to policies/practices that could easily be
mis-understood, if done carefully, can be very effetive.

And, as a final alternative, there is public embarrassment, to shame them
into taking action.

One 'option' that has *never* been successfully employed would be to organize
'the community' for co-operative action in 'shunning' those provider who do
not keep a clean house.  I'd _love_ to see such an approach implemented, but
it requires ignoring short-term self-interest for the long-term 'good of the
community' -- even though the long-term good of the community _is_ in the self-
interest of each and every provider.

Back to original what do you do? 

'Viable' options are rather limited -- 

If you have _hard_ evidence, reporting to law enforcement, *WITH* notice of 
'apparent provider compliciy' --  including 'what  was given to the provider 
_when_' to establish  their 'actual knowledge' of the criminal activity and 
hence provider liability for allowing it to continue.

You can try 'public humiliation' -- calling in the press.

And, of course, you *DO* -- if you haven't already (comment: if not, _why_ 
not?) -- take 'defensive measures' to block communications in either direction 
involving those 'bad guys' and your customers.





Re: Researchers ping through first full 'Internet census' in 25 years

2007-10-12 Thread Martin Hannigan

On 10/12/07, Steve Atkins [EMAIL PROTECTED] wrote:


 On Oct 12, 2007, at 5:08 PM, Mark Foster wrote:


 
  (If some random dynamic IP host on the other side of the world
  started hitting my firewall for no apparent reason, i'd be raising
  my eyebrows too.  Of course, these days, I have a much better idea
  of what is genuinely threatening and what isn't.)

 If there weren't a dynamic IP host on the other side of the world
 hitting my firewall I'd be calling my provider, 'cos I'd know my
 connection had gone down.



Probably a good enough observation to call this thread DOA.

-M