RE: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Tomas L. Byrnes

"Well then they wouldn't be peering with this route reflector "

Well then, the utility is probably close to 0, isn't it? 

I doubt most of the sources of DDOS traffic, especially those without
ingress source filtering, are going to peer with your route reflector.
What's their economic incentive to expend the engineering time to do so?


I sincerely doubt that any backbone provider will filter at a /32. That
means they have to check EVERY PACKET AT FULL IP DEST against your AS
advertised routes. Since most backbone routers build circuits at the /18
and above mask on MPLS, just to keep up with traffic, I sincerely doubt
they are going to expend the CPU, and potentially RAM, never mind prefix
table entries (you know, those things we're running out of) to have a
full table of every host that every hoster says is being DDOSed. In this
case, there's a clear economic cost, for no economic benefit (they do
actually make money delivering that DDOS traffic).

A better approach would be to move your DDOS target and all the rest of
its co-subnet hosts into a different /24, update the DNS RRs, and cease
advertising that /24. 

If you really want to be nice, they don't need to renumber, you just
need to stop advertising the target subnet, change the DNS RR's and NAT
at your borders, if you control DNS and IP. The added benefit of this is
that you can swap them back when the DDOs is over, and they get to stay
up while it's happening. All you need to do this is some spare, never to
be allocated, IP space.

Works with the existing infrastructure, doesn't require an "Internet
God", and in general, is likely to be more effective in the real world.

That whole "rough consensus and running code" ethos of the IETF thing,
as opposed to the "Cathedral" mentality of the ITU (and ICANNt), which
your approach would imply.

You control which routes you advertise, after all.

Plus, AT&T's legal beagles don't get to send you a dunning notice when
their patent gets granted.

> -Original Message-
> From: Ben Butler [mailto:[EMAIL PROTECTED] 
> Sent: Saturday, February 02, 2008 2:42 PM
> To: Tomas L. Byrnes; nanog@merit.edu
> Subject: RE: Blackholes and IXs and Completing the Attack.
> 
>  "If you're trying to do it on a /32 basis, I doubt you'd 
> find too many border router operators interested in accepting 
> a route that small, but I may be wrong."
> 
> Well then they wouldn't be peering with this route reflector 
> in the first place.
> 
> -Original Message-
> From: Tomas L. Byrnes [mailto:[EMAIL PROTECTED]
> Sent: 02 February 2008 20:39
> To: Ben Butler; Paul Vixie; nanog@merit.edu
> Subject: RE: Blackholes and IXs and Completing the Attack.
> 
> You could achieve the exact same result simply by not 
> advertising the network to your peers, or by advertising a 
> bogus route (prefixing a known bogon AS for the addresses you 
> want null-routed). I realize you would have to 
> subnet/deaggregate your netblocks, and therefore could wind 
> up with a prefix-length issue for peers who won't accept 
> routes longer than a certain mask, in some cases, but if you 
> are already being DDOSed, this should represent SOME improvement.
> 
> If you're trying to do it on a /32 basis, I doubt you'd find 
> too many border router operators interested in accepting a 
> route that small, but I may be wrong.
> 
> The bigger issue with all these approaches is that they run 
> afoul of a patent applied for by AT&T:
> 
> http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HI
TOFF&p=1&u
> =%2Fnetahtml%2FPTO%2Fsearch-bool.html&r=1&f=G&l=50&co1=AND&d=P
G01&s1=200
> 60031575&OS=20060031575&RS=20060031575
> 
> USPTO App Number 20060031575 
> 
> 
> 
> > -Original Message-
> > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
> On Behalf 
> > Of Ben Butler
> > Sent: Saturday, February 02, 2008 12:17 PM
> > To: Paul Vixie; nanog@merit.edu
> > Subject: RE: Blackholes and IXs and Completing the Attack.
> > 
> > 
> > Hi,
> > 
> > I was not proposing he Null routing of the attack source in 
> the other 
> > ISPs network but the destination in my network being Null 
> routed as a 
> > destination from your network out.
> > 
> > This has no danger to the other network as it is my network that is 
> > going to be my IP space that is blackholed in your network, and the 
> > space blackholed is going to be an address that is being knocked of 
> > the air anyway under DoS and we are trying to minimise collateral 
> > damage.  I cant see where the risk to the large NSP is - given that 
> > the route reflector will only reflect /32s that 
> legitimately originate
> 
> > (as a destination not a source) in the AS announcing them as please 
> > blackhole.
> > 
> > For complete clarity: AS13005 announces 213.170.128.0/19 
> and has its 
> > route object in RIPE as being announced by AS13005.
> > My router at IX - BENIX say - announces 213.170.128.1/32 to 
> the router
> 
> > reflector their, the announcement from my IX assigned address 
> > 21

Re: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Rick Astley
I see your point, but I think maintaining the box for the control session
would also require a decent amount of work.
Presumably, since you must all adhere to some quasi-standard to communicate
with the control peer, you could probably also agree on creating a standard
BGP community (ie. 64666:666 & no-export) to use and just skip the middle
man.

Granted, I am kind of new as well, and I assume if the solution were that
simple more people would be using it.


On Feb 2, 2008 9:07 PM, Ben Butler <[EMAIL PROTECTED]> wrote:

>  Hi,
>
> Agreed, but when you have >100 peers that is still a fair bit of work.  I
> know technically how to do it and am doing this with transits but then there
> are only seven of those.  It is not a question of how or can, but should /
> is it valuable / constructive?
>
> The starting point in the thought process having just done it for transits
> was right ok, now how do we sensibly scale this to apply it at IXes without
> everyone having to run round contacting everyone else and to see if there
> was an easier way of doing things, hence the suggestion.  Plus it keeps
> things nice a separated, your IX peering sessions announce just the main
> prefixes, the session to the "blackhole reflector" can be in a separate
> peer-group and you only send the /32s to the reflector.  You don't have to
> worry about who uses which communities as each member that chooses to peer
> with the reflector is able to apply an inbound routemaps of their own
> choosing to any prefixes they receive from this reflector at each individual
> IX.
>
> Given that an ISP has elected to Complete the attack on a host that is
> being DoSed, for whatever reason, and they have chosen to send blackhole
> announcements to transit the logical extension seems to be to automate the
> sending of them to IXs to try to further cut down on traffic.  This seems
> like a easy way, internally you just community tag on the trigger box for
> where you want the announcement to go, transit, internal, customers, IX
> all,1 2 not 3 - whatever - and BGP sends it out. Easy, and a single system
> to send out all updates when you choose to and easy to remove when you want
> to take it out again.
>
> If you subscribe to completing the attack as a strategy, then the
> suggestion seemed like an easy way of rolling it out to the next logical
> point after transit.
>
> Kind Regards
>
> Ben
>
>


Re: Jeanette Symons (1962-2008) a commerical Internet Pioneer

2008-02-02 Thread Randy Bush


hh no!

info on where to send, e.g. brother george's current address etc, please?

randy


Re: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Christopher Morrow

On Feb 2, 2008 11:40 PM, Tomas L. Byrnes <[EMAIL PROTECTED]> wrote:
> ATT has no reason to pull their application, what needs to happen is
> that the publisher of the prior art contact the USPTO.
>
> If ATT willingly failed to note the prior art in their app, that may be
> a problem, but it isn't their duty to report ALL prior art, just the
> stuff they know about.
>

sweetness, hopefully Wayne or Verizon (they have lots of lawyers) or
Juniper will ping USPTO... or not, I suppose I don't care directly
anymore :)

> IANAL, but I have filed some patents, and reviewed a bunch more.
>
>
>
> > -Original Message-
> > From: [EMAIL PROTECTED]
> > [mailto:[EMAIL PROTECTED] On Behalf Of Christopher Morrow
> > Sent: Saturday, February 02, 2008 12:58 PM
> > To: Tomas L. Byrnes
> > Cc: Ben Butler; Paul Vixie; nanog@merit.edu
> > Subject: Re: Blackholes and IXs and Completing the Attack.
> >
>
> > On Feb 2, 2008 3:39 PM, Tomas L. Byrnes <[EMAIL PROTECTED]> wrote:
> >
> > > The bigger issue with all these approaches is that they run
> > afoul of a
> > > patent applied for by AT&T:
> > >
> > >
> > http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1
> > > &u
> > >
> > =%2Fnetahtml%2FPTO%2Fsearch-bool.html&r=1&f=G&l=50&co1=AND&d=PG01&s1=2
> > > 00
> > > 60031575&OS=20060031575&RS=20060031575
> > >
> > > USPTO App Number 20060031575
> >
> > Somene from ATT may want to consider pulling this patent
> > application since it seems to fail on prior art...
> >
> > http://www.nanog.org/mtg-0410/soricelli.html
> >
> > presented  by a juniper employee (Joe Soricelli ) and Wayne
> > Gustavus from Verizon. IANAL though...
> >
>


Jeanette Symons (1962-2008) a commerical Internet Pioneer

2008-02-02 Thread John Lee
It was with great sadness that I read about the un-timely death of my friend 
and colleague Jeanette in a plane crash in Maine. Jeanette died flying, which 
was one of the activities she loved to do. I meet her before she started flying 
and when she moved back to California she took up flying. We would be talking 
on the phone and she would say that it was VFR and she needed to go. VFR - 
Visual Flight Rules for flying without instruments which was all she was rated 
for at the time. 

 

I meet Jeanette at Hayes Microcomputer Products where we were working on a 
project together. People would think that we were brother and sister since we 
both had curly back hair and looked alike. When she wanted to move back to 
California, which she missed, I introduced her to Rob Ryan the head of Haye's 
West coast operations. When she was in Georgia we would eat Chinese, made by my 
wife, at my place. When we were in California we would eat Sushi at several of 
her favorite places in Western San Francisco and Oakland.

 

Jeanette, Rob, Jay Duncanson and Steve Speckenbach left Hayes to start Ascend 
Communications and developed the TNT central site dial up modem, ISDN and 
Ethernet switch that handled most of the dial up Internet traffic for years. 
Ascend was purchased by Lucent and she and Mori started Zhone Technologies.

 

Her new venture was started because her children wanted to blog with their 
friends and she was worried about them being on line.

 

Jeanette will be missed.

 

John Lee

 



RE: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Tomas L. Byrnes

ATT has no reason to pull their application, what needs to happen is
that the publisher of the prior art contact the USPTO.

If ATT willingly failed to note the prior art in their app, that may be
a problem, but it isn't their duty to report ALL prior art, just the
stuff they know about.

IANAL, but I have filed some patents, and reviewed a bunch more.

 

> -Original Message-
> From: [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED] On Behalf Of Christopher Morrow
> Sent: Saturday, February 02, 2008 12:58 PM
> To: Tomas L. Byrnes
> Cc: Ben Butler; Paul Vixie; nanog@merit.edu
> Subject: Re: Blackholes and IXs and Completing the Attack.
> 
> On Feb 2, 2008 3:39 PM, Tomas L. Byrnes <[EMAIL PROTECTED]> wrote:
> 
> > The bigger issue with all these approaches is that they run 
> afoul of a 
> > patent applied for by AT&T:
> >
> > 
> http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1
> > &u 
> > 
> =%2Fnetahtml%2FPTO%2Fsearch-bool.html&r=1&f=G&l=50&co1=AND&d=PG01&s1=2
> > 00
> > 60031575&OS=20060031575&RS=20060031575
> >
> > USPTO App Number 20060031575
> 
> Somene from ATT may want to consider pulling this patent 
> application since it seems to fail on prior art...
> 
> http://www.nanog.org/mtg-0410/soricelli.html
> 
> presented  by a juniper employee (Joe Soricelli ) and Wayne 
> Gustavus from Verizon. IANAL though...
> 


Re: IPv6 Connectivity Saga (part n+1)

2008-02-02 Thread Christopher Morrow

On Feb 2, 2008 6:24 PM, Thomas Kühne <[EMAIL PROTECTED]> wrote:

> > Another factor is that with IPv4, you need to be pragmatic, because if
> > you don't, you have no connectivity. With IPv6, you can impose
> > arbitrary restrictions as much as you want, because IPv4 makes sure
> > there is always fallback connectivity anyway.
>
> Maybe, but the most frequently encountered errors were time outs and
> those usually degrade performance drastically.

one might also consider that there may not be v4 conectivity in all
cases, so if you offer up a  please make sure the services on the
relevant /A are consistent/available.

-Chris


Re: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Paul Ferguson

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -- Roland Dobbins <[EMAIL PROTECTED]> wrote:

>On Feb 3, 2008, at 4:50 AM, Paul Ferguson wrote:
>
>> We (Trend Micro) do something similar to this -- a black-hole BGP
>> feed of known botnet C&Cs, such that the C&C channel is effectively
>> black-holed.
>
>What's the trigger (pardon the pun, heh) and process for removing IPs  
from the blackhole list post-cleanup, in Trend's case?
>

We have a team that does the vetting/validation and when the C&Cs
are taken down (or "decommissioned") they are removed from the
feed.

>Is there a notification mechanism so that folks who may not subscribe  
to Trend's service but who are unwittingly hosting a botnet C&C are  
made aware of same?
>

Well, we try to notify the owners of the identified hosts, but it
is not always successful... and sometimes the sheer churn is
prohibitive.

- - ferg

-BEGIN PGP SIGNATURE-
Version: PGP Desktop 9.6.3 (Build 3017)

wj8DBQFHpTu1q1pz9mNUZTMRAu+CAJ94j6AgqZgrMQ6b8HoPLyy4zBRcNgCfejWn
dAE2T+i2MtvpAJ2PNJmdTpc=
=N+iF
-END PGP SIGNATURE-

--
"Fergie", a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 fergdawg(at)netzero.net
 ferg's tech blog: http://fergdawg.blogspot.com/



FW: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Ben Butler

Hi,
 
Agreed, but when you have >100 peers that is still a fair bit of work.
I know technically how to do it and am doing this with transits but then
there are only seven of those.  It is not a question of how or can, but
should / is it valuable / constructive?
 
The starting point in the thought process having just done it for
transits was right ok, now how do we sensibly scale this to apply it at
IXes without everyone having to run round contacting everyone else and
to see if there was an easier way of doing things, hence the suggestion.
Plus it keeps things nice and separated, your IX peering sessions
announce just the main prefixes, the session to the "blackhole
reflector" can be in a separate peer-group and you only send the /32s to
the reflector.  You don't have to worry about who uses which communities
as each member that chooses to peer with the reflector is able to apply
an inbound routemap of their own choosing to any prefixes they receive
from this reflector at each individual IX.
 
Given that an ISP has elected to Complete the attack on a host that is
being DoSed, for whatever reason, and they have chosen to send blackhole
announcements to transit the logical extension seems to be to automate
the sending of them to IXs to try to further cut down on traffic.  I
guess the alernative is that if your IX interconnect is getting hammered
the only other option is to admin down all the sesions over the IX and
let all the traffic flow into transit and let them blackhole it.  But
this also seems like there might be a better way that was less
disruptive.

And this seems like a easy way, internally you just community tag on the
trigger box for where you want the announcement to go, transit,
internal, customers, IX all,1 2 not 3 - whatever - and BGP sends it out.
Easy, and a single system to send out all updates when you choose to and
easy to remove when you want to take it out again.
 
If you subscribe to completing the attack as a strategy, then the
suggestion seemed like an easy way of rolling it out to the next logical
point after transit.
 
Kind Regards
 
Ben
 



From: Rick Astley [mailto:[EMAIL PROTECTED] 
Sent: 03 February 2008 01:02
To: Ben Butler
Cc: nanog@merit.edu
Subject: Re: Blackholes and IXs and Completing the Attack.


While I am not sure I fully understand your suggestion, I don't think it
would be that hard to set up manually.

Sure it would require asking the individual peers for their black hole
communities, but of they don't have one they are unlikely to honor the
infrastructure you describe anyway.

Assume your network is set up to discard packets marked with community
13005:666 

Get a list of your peers blackhole communities, when you announce the
route from a location on your network, tag it with community 13005:666
but also :777,  :888 etc. for the individual peers from the
source. This prevents you from having to update multiple policies in
multiple locations for each attack.

As long as they accept the /32 announced to them with their black hole
community, they should discard the traffic without sending it to you.

Not all peers will have a blackhole community, but you need some way to
know when the attack is over to know when to withdraw the route, and
they are useful for this.

If you are real lazy, on the router you announce the black hole from,
add an export policy that says from community 13005:666, then community
add :777, :888 etc.

This way you only need to:

1. Update one policy in one place when peers change
2. Announce the route from one location adding one community to it.



Re: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Roland Dobbins



On Feb 3, 2008, at 4:50 AM, Paul Ferguson wrote:


We (Trend Micro) do something similar to this -- a black-hole BGP
feed of known botnet C&Cs, such that the C&C channel is effectively
black-holed.


What's the trigger (pardon the pun, heh) and process for removing IPs  
from the blackhole list post-cleanup, in Trend's case?


Is there a notification mechanism so that folks who may not subscribe  
to Trend's service but who are unwittingly hosting a botnet C&C are  
made aware of same?


---
Roland Dobbins <[EMAIL PROTECTED]> // 408.527.6376 voice

Culture eats strategy for breakfast.

   -- Ford Motor Company





Re: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Rick Astley
While I am not sure I fully understand your suggestion, I don't think it
would be that hard to set up manually.

Sure it would require asking the individual peers for their black hole
communities, but of they don't have one they are unlikely to honor the
infrastructure you describe anyway.

Assume your network is set up to discard packets marked with community
13005:666

Get a list of your peers blackhole communities, when you announce the route
from a location on your network, tag it with community 13005:666 but also
:777,  :888 etc. for the individual peers from the source. This
prevents you from having to update multiple policies in multiple locations
for each attack.

As long as they accept the /32 announced to them with their black hole
community, they should discard the traffic without sending it to you.

Not all peers will have a blackhole community, but you need some way to know
when the attack is over to know when to withdraw the route, and they are
useful for this.

If you are real lazy, on the router you announce the black hole from, add an
export policy that says from community 13005:666, then community add
:777, :888 etc.

This way you only need to:

1. Update one policy in one place when peers change
2. Announce the route from one location adding one community to it.


Re: IPv6 Connectivity Saga (part n+1)

2008-02-02 Thread Michael Sinatra


Thomas Kühne wrote:

On Saturday February 2 2008, Iljitsch van Beijnum wrote:

On 2 feb 2008, at 11:42, Thomas Kühne wrote:

I took a DMOZ[1] dump

What's a DMOZ dump?


DMOZ: http://www.dmoz.org/about.html
# The Open Directory Project is the largest, most comprehensive human-edited
# directory of the Web. It is constructed and maintained by a vast, global
# community of volunteer editors.

A DMOZ dump is the complete data set including directory structure, links and
descriptions. I've use this source because other lists are either too small or
contain a lot of spam.


I'd like to hear more about the methods that led to your summary, and, 
if possible, take a look at the raw data.  It sounds to me like you took 
the dump file and parsed it so that all of the URLs could be sorted by 
domain.  Did you then do DNS lookups on each domain name (or hostname?) 
and see how many had  records?  Did you also look at NS records (I 
am assuming you did)?  I understand what TLDs and NSes are, but I don't 
quite know what you mean when you say things like "thus a cross check 
via TLDs' NS."


As for raw data, at the very least, it would be useful to get a list of 
the resources that have some form of IPv6 brokenness, so that those of 
us who would actually like to provide our information resources over 
both IPv4 and IPv6 can get to work on fixing it.


I personally am concerned that there are some islands of poor v6 
connectivity out there that are having problems reaching v6 resources, 
even though other parts of the v6 world are able to reach those 
resources just fine.  Because we may only be able to test from "good" v6 
locations, we can't see what's wrong at the "bad" v6 locations.


michael


Re: IPv6 Connectivity Saga (part n+1)

2008-02-02 Thread Thomas Kühne

On Saturday February 2 2008, Iljitsch van Beijnum wrote:
> On 2 feb 2008, at 11:42, Thomas Kühne wrote:
> > I took a DMOZ[1] dump
>
> What's a DMOZ dump?

DMOZ: http://www.dmoz.org/about.html
# The Open Directory Project is the largest, most comprehensive human-edited
# directory of the Web. It is constructed and maintained by a vast, global
# community of volunteer editors.

A DMOZ dump is the complete data set including directory structure, links and
descriptions. I've use this source because other lists are either too small or
contain a lot of spam.

> > IPv6 failure rates of 4.3% (TLD) and 6.1% (NS)
>
> What does TLD and NS mean?

TLD: Top Level Domain (e.g. .com, .us. org)
NS: Name Server - in this case Domain Name Server (DNS)

> >  43 : broadcast address
>
> ?

Sorry, the same error message is also triggered by some firewalls.

> Another factor is that with IPv4, you need to be pragmatic, because if
> you don't, you have no connectivity. With IPv6, you can impose
> arbitrary restrictions as much as you want, because IPv4 makes sure
> there is always fallback connectivity anyway.

Maybe, but the most frequently encountered errors were time outs and
those usually degrade performance drastically.

Thomas


RE: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Ben Butler

 "If you're trying to do it on a /32 basis, I doubt you'd find too many
border router operators interested in accepting a route that small, but
I may be wrong."

Well then they wouldn't be peering with this route reflector in the
first place.

-Original Message-
From: Tomas L. Byrnes [mailto:[EMAIL PROTECTED] 
Sent: 02 February 2008 20:39
To: Ben Butler; Paul Vixie; nanog@merit.edu
Subject: RE: Blackholes and IXs and Completing the Attack.

You could achieve the exact same result simply by not advertising the
network to your peers, or by advertising a bogus route (prefixing a
known bogon AS for the addresses you want null-routed). I realize you
would have to subnet/deaggregate your netblocks, and therefore could
wind up with a prefix-length issue for peers who won't accept routes
longer than a certain mask, in some cases, but if you are already being
DDOSed, this should represent SOME improvement.

If you're trying to do it on a /32 basis, I doubt you'd find too many
border router operators interested in accepting a route that small, but
I may be wrong.

The bigger issue with all these approaches is that they run afoul of a
patent applied for by AT&T:

http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u
=%2Fnetahtml%2FPTO%2Fsearch-bool.html&r=1&f=G&l=50&co1=AND&d=PG01&s1=200
60031575&OS=20060031575&RS=20060031575

USPTO App Number 20060031575 



> -Original Message-
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf 
> Of Ben Butler
> Sent: Saturday, February 02, 2008 12:17 PM
> To: Paul Vixie; nanog@merit.edu
> Subject: RE: Blackholes and IXs and Completing the Attack.
> 
> 
> Hi,
> 
> I was not proposing he Null routing of the attack source in the other 
> ISPs network but the destination in my network being Null routed as a 
> destination from your network out.
> 
> This has no danger to the other network as it is my network that is 
> going to be my IP space that is blackholed in your network, and the 
> space blackholed is going to be an address that is being knocked of 
> the air anyway under DoS and we are trying to minimise collateral 
> damage.  I cant see where the risk to the large NSP is - given that 
> the route reflector will only reflect /32s that legitimately originate

> (as a destination not a source) in the AS announcing them as please 
> blackhole.
> 
> For complete clarity: AS13005 announces 213.170.128.0/19 and has its 
> route object in RIPE as being announced by AS13005.
> My router at IX - BENIX say - announces 213.170.128.1/32 to the router

> reflector their, the announcement from my IX assigned address 
> 212.121.34.30 is known to be my router on the exchange, and I am 
> announcing a /32 from my AS for a route object registered as being 
> announced by my AS - so the reflector accepts my announcement and 
> reflects it to any other members that choose to peer with this 
> reflector - effectively this is a please blackhole this destination in
> AS13005 - the other members that receive this announcement can then 
> deal with it in anyway they see fit from ignoring it to setting 
> next-hop 192.0.2.1 -> Null0.
> 
> The effect of this would be that any BotNet controlled hosts in the 
> other member network would now be able to drop any attack traffic in 
> their network on destination at their customer aggregation routers.
> 
> I think you might have thought I was suggesting we blackhole sources 
> in other peoples networks - this is definatly not what I was saying.
> 
> So, given we all now understand each other - why is no one doing the 
> above?
> 
> At the end of the day if an IX member doesn't want the announcements 
> don't peer with the blackhole reflector, simple, and it will get Null 
> routed as soon as it hits my edge router at the IX - it would just 
> seem more sensible to enable people to block the traffic before it 
> traverses the IX and further back in their own networks.
> 
> So?
> 
> Ben
> 
> 
> 
> -Original Message-
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf 
> Of Paul Vixie
> Sent: 02 February 2008 17:32
> To: nanog@merit.edu
> Subject: Re: Blackholes and IXs and Completing the Attack.
> 
> 
> [EMAIL PROTECTED] ("Ben Butler") writes:
> 
> > ...
> > This hopefully will ensure a relatively protected router
> that is only
> > accessible from the edge routers we want and also secured to only 
> > accept filtered announcements for black holing and in consequence 
> > enable the system to be trusted similar to Team Cymaru.
> > ...
> 
> This sounds like another attempt to separate the Internet's control 
> plane from its data plane, and most such attempts do succeed and are 
> helpful (like NSP OOB, or like enterprise-level anycast of DNS).
> However, I'm not sure that remote triggered blackholes are a good 
> direction, worthy of the protection you're proposing, for three 
> reasons.
> 
> First, because large NSP's simply cannot afford the risk associated 
> with letting a third party, a

RE: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Ben Butler

 Hi,

"i explained why this is bad -- it lowers the attacker's costs in what
amounts to an economics war.  they can get a web site taken down by its
own provider just by attacking it.  they need fewer resources for their
attack once they know the provider's going to blackhole the victim."

I thought the cold war nuclear arms race had shown up to be truly MAD.
Who is paying for this ever escalating capacity of infrastructure as a
way to survive large DoS attacks.

Smaller attacks can be absorbed, but I really cant see a strategy of
endlessly upgrading network router and WAN infrastructure to ensure
enough head room ideal capacity is a particularly economically sensible
approach to the problem.

Ben

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Paul Vixie
Sent: 02 February 2008 21:37
To: Ben Butler
Cc: nanog@merit.edu
Subject: Re: Blackholes and IXs and Completing the Attack. 

> I was not proposing he Null routing of the attack source in the other 
> ISPs network but the destination in my network being Null routed as a 
> destination from your network out.

i explained why this is bad -- it lowers the attacker's costs in what
amounts to an economics war.  they can get a web site taken down by its
own provider just by attacking it.  they need fewer resources for their
attack once they know the provider's going to blackhole the victim.

> This has no danger to the other network as it is my network that is 
> going to be my IP space that is blackholed in your network, and the 
> space blackholed is going to be an address that is being knocked of 
> the air anyway under DoS and we are trying to minimise collateral
damage.

your collateral damage is of precious little interest to someone else's
backbone staff, unless they can route-filter the potential announcements
so that you are unable to also remotely blackhole addresses you don't
advertise.  i explained this as an insurance/ISO9000 problem.

> I think you might have thought I was suggesting we blackhole sources 
> in other peoples networks - this is definatly not what I was saying.

i explained why this would be a more sensible approach, but STILL
unworkable.

> So, given we all now understand each other - why is no one doing the
above?

now that we've rehashed what we both said, i think we're done here.


RE: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Ben Butler

"destination-based blackhole routing for mitigation *effectively
completes the attack*, which is often times undesirable.  Inter-domain
source-based blackhole routing is pretty much a non-option." 

That is why I put Completing the Attack in my subject line - and didnt
attempt to sujest this as an approach for source based filtering.

"If you do implement something like this you may wish to scope
advertisement only to adjacent ASes via NO_EXPORT or the like, to scope
both more-specific propagation, and to ensure that some lack of
consistent drop community semantic interpretation doesn't hose
something."

It is upto the receiving AS what they do with the announcement and
whether they advertise it to their BGP customers or not - they shouldnt
be announcing to anyone else anyway.  I would sugest they dont, but I
wouldnt presume.  Advertisments to transits do not get propigated
outside their AS.

"I suppose if folks rely on it for native peering then it might be
reasonable."

This is envisage to be used between members of the same Internet
Exchange only.  Where there are so many peers the overhead of trying to
do this on a peer peer basis / agreeing comunities is going to be a pain
in the arse.  And that this gives an easier way to get to the goal - we
do after all trust the IX operator to run the critical bit of
infrastrucutre which is the exchange.

Kind Regards

Ben

-Original Message-
From: Danny McPherson [mailto:[EMAIL PROTECTED] 
Sent: 02 February 2008 20:49
To: Ben Butler
Cc: NANOG NANOG
Subject: Re: Blackholes and IXs and Completing the Attack.


On Feb 2, 2008, at 1:16 PM, Ben Butler wrote:
>
> So, given we all now understand each other - why is no one doing the 
> above?

Some folks are doing this, just not via some third-party
route servers.   For example, either via customer peering
sessions, or other BGP interconnections between peers.
E.g.:

http://www.nanog.org/mtg-0402/morrow.html

I'm not sure it's ideal to employ third-party route servers for this
purpose, as it only increases the attacks/error surface.  I suppose if
folks rely on it for native peering then it might be reasonable.

> At the end of the day if an IX member doesn't want the announcements 
> don't peer with the blackhole reflector, simple, and it will get Null 
> routed as soon as it hits my edge router at the IX - it would just 
> seem more sensible to enable people to block the traffic before it 
> traverses the IX and further back in their own networks.

Yes, helping to ease effects of collateral damage from large-scale
attacks by conveying drop policies to upstream ASes for prefixes which
you originate.  And perhaps as significant, being able to allow the
target AS to remove those policies dynamically, rather than having to
contact each upstream AS that appears to have imposed them manually
out-of-band.

I think Paul's comments were more regarding the fact that
destination-based blackhole routing for mitigation *effectively
completes the attack*, which is often times undesirable.  Inter-domain
source-based blackhole routing is pretty much a non-option.

One other offshoot is that advertised more-specifics are going to
further contribute to routing AND forwarding table bloat, and a single
new prefixes might result in
10+ new paths in the iBGP RIBs.

If you do implement something like this you may wish to scope
advertisement only to adjacent ASes via NO_EXPORT or the like, to scope
both more-specific propagation, and to ensure that some lack of
consistent drop community semantic interpretation doesn't hose
something.

Also, if you impose this as a standard attack response mechanism recall
that you lose visibility of attack scales, and knowing just when to
resume normal forwarding policies is a bit more complex.  As such, your
policy sets may want to provide hooks that enable selective prefix
advertise/withdraw drop policies so that it can be applied or removed
incrementally.

-danny


RE: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Paul Ferguson

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -- "Ben Butler" <[EMAIL PROTECTED]> wrote:

>The effect of this would be that any BotNet controlled hosts in the
>other member network would now be able to drop any attack traffic in
>their network on destination at their customer aggregation routers.
>
>I think you might have thought I was suggesting we blackhole sources in
>other peoples networks - this is definatly not what I was saying.
>
>So, given we all now understand each other - why is no one doing the
>above?

We (Trend Micro) do something similar to this -- a black-hole BGP
feed of known botnet C&Cs, such that the C&C channel is effectively
black-holed.

At least that way, people can deal with cleaning up the end-systems
in their own way, at their own pace, while the amount of malicious
activity is effectively "crippled".

- - ferg

-BEGIN PGP SIGNATURE-
Version: PGP Desktop 9.6.3 (Build 3017)

wj8DBQFHpOWyq1pz9mNUZTMRAhtLAJwLNH9Ie+mE0106NlY6Qdy43uag1gCgv7wq
le4yfSlaa2kUHtchC2X+bbQ=
=4P1g
-END PGP SIGNATURE-



--
"Fergie", a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 fergdawg(at)netzero.net
 ferg's tech blog: http://fergdawg.blogspot.com/



Re: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Paul Vixie

> I was not proposing he Null routing of the attack source in the other
> ISPs network but the destination in my network being Null routed as a
> destination from your network out.

i explained why this is bad -- it lowers the attacker's costs in what
amounts to an economics war.  they can get a web site taken down by its
own provider just by attacking it.  they need fewer resources for their
attack once they know the provider's going to blackhole the victim.

> This has no danger to the other network as it is my network that is
> going to be my IP space that is blackholed in your network, and the
> space blackholed is going to be an address that is being knocked of the
> air anyway under DoS and we are trying to minimise collateral damage.

your collateral damage is of precious little interest to someone else's
backbone staff, unless they can route-filter the potential announcements
so that you are unable to also remotely blackhole addresses you don't
advertise.  i explained this as an insurance/ISO9000 problem.

> I think you might have thought I was suggesting we blackhole sources in
> other peoples networks - this is definatly not what I was saying.

i explained why this would be a more sensible approach, but STILL unworkable.

> So, given we all now understand each other - why is no one doing the above?

now that we've rehashed what we both said, i think we're done here.


Re: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Christopher Morrow

On Feb 2, 2008 3:39 PM, Tomas L. Byrnes <[EMAIL PROTECTED]> wrote:

> The bigger issue with all these approaches is that they run afoul of a
> patent applied for by AT&T:
>
> http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u
> =%2Fnetahtml%2FPTO%2Fsearch-bool.html&r=1&f=G&l=50&co1=AND&d=PG01&s1=200
> 60031575&OS=20060031575&RS=20060031575
>
> USPTO App Number 20060031575

Somene from ATT may want to consider pulling this patent application
since it seems to fail on prior art...

http://www.nanog.org/mtg-0410/soricelli.html

presented  by a juniper employee (Joe Soricelli ) and Wayne Gustavus
from Verizon. IANAL though...


Re: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Danny McPherson



On Feb 2, 2008, at 1:16 PM, Ben Butler wrote:


So, given we all now understand each other - why is no one doing the
above?


Some folks are doing this, just not via some third-party
route servers.   For example, either via customer peering
sessions, or other BGP interconnections between peers.
E.g.:

http://www.nanog.org/mtg-0402/morrow.html

I'm not sure it's ideal to employ third-party route servers
for this purpose, as it only increases the attacks/error
surface.  I suppose if folks rely on it for native peering
then it might be reasonable.


At the end of the day if an IX member doesn't want the announcements
don't peer with the blackhole reflector, simple, and it will get Null
routed as soon as it hits my edge router at the IX - it would just  
seem
more sensible to enable people to block the traffic before it  
traverses

the IX and further back in their own networks.


Yes, helping to ease effects of collateral damage from
large-scale attacks by conveying drop policies to upstream
ASes for prefixes which you originate.  And perhaps as
significant, being able to allow the target AS to remove
those policies dynamically, rather than having to contact
each upstream AS that appears to have imposed them
manually out-of-band.

I think Paul's comments were more regarding the fact
that destination-based blackhole routing for mitigation
*effectively completes the attack*, which is often times
undesirable.  Inter-domain source-based blackhole
routing is pretty much a non-option.

One other offshoot is that advertised more-specifics
are going to further contribute to routing AND forwarding
table bloat, and a single new prefixes might result in
10+ new paths in the iBGP RIBs.

If you do implement something like this you may wish to
scope advertisement only to adjacent ASes via
NO_EXPORT or the like, to scope both more-specific
propagation, and to ensure that some lack of consistent
drop community semantic interpretation doesn't hose
something.

Also, if you impose this as a standard attack response
mechanism recall that you lose visibility of attack scales,
and knowing just when to resume normal forwarding
policies is a bit more complex.  As such, your policy sets
may want to provide hooks that enable selective prefix
advertise/withdraw drop policies so that it can be applied
or removed incrementally.

-danny


RE: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Tomas L. Byrnes

You could achieve the exact same result simply by not advertising the
network to your peers, or by advertising a bogus route (prefixing a
known bogon AS for the addresses you want null-routed). I realize you
would have to subnet/deaggregate your netblocks, and therefore could
wind up with a prefix-length issue for peers who won't accept routes
longer than a certain mask, in some cases, but if you are already being
DDOSed, this should represent SOME improvement.

If you're trying to do it on a /32 basis, I doubt you'd find too many
border router operators interested in accepting a route that small, but
I may be wrong.

The bigger issue with all these approaches is that they run afoul of a
patent applied for by AT&T:

http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u
=%2Fnetahtml%2FPTO%2Fsearch-bool.html&r=1&f=G&l=50&co1=AND&d=PG01&s1=200
60031575&OS=20060031575&RS=20060031575

USPTO App Number 20060031575 



> -Original Message-
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On 
> Behalf Of Ben Butler
> Sent: Saturday, February 02, 2008 12:17 PM
> To: Paul Vixie; nanog@merit.edu
> Subject: RE: Blackholes and IXs and Completing the Attack.
> 
> 
> Hi,
> 
> I was not proposing he Null routing of the attack source in 
> the other ISPs network but the destination in my network 
> being Null routed as a destination from your network out.
> 
> This has no danger to the other network as it is my network 
> that is going to be my IP space that is blackholed in your 
> network, and the space blackholed is going to be an address 
> that is being knocked of the air anyway under DoS and we are 
> trying to minimise collateral damage.  I cant see where the 
> risk to the large NSP is - given that the route reflector 
> will only reflect /32s that legitimately originate (as a 
> destination not a source) in the AS announcing them as please 
> blackhole.
> 
> For complete clarity: AS13005 announces 213.170.128.0/19 and 
> has its route object in RIPE as being announced by AS13005.  
> My router at IX - BENIX say - announces 213.170.128.1/32 to 
> the router reflector their, the announcement from my IX 
> assigned address 212.121.34.30 is known to be my router on 
> the exchange, and I am announcing a /32 from my AS for a 
> route object registered as being announced by my AS - so the 
> reflector accepts my announcement and reflects it to any 
> other members that choose to peer with this reflector - 
> effectively this is a please blackhole this destination in 
> AS13005 - the other members that receive this announcement 
> can then deal with it in anyway they see fit from ignoring it 
> to setting next-hop 192.0.2.1 -> Null0.
> 
> The effect of this would be that any BotNet controlled hosts 
> in the other member network would now be able to drop any 
> attack traffic in their network on destination at their 
> customer aggregation routers.
> 
> I think you might have thought I was suggesting we blackhole 
> sources in other peoples networks - this is definatly not 
> what I was saying.
> 
> So, given we all now understand each other - why is no one 
> doing the above?
> 
> At the end of the day if an IX member doesn't want the 
> announcements don't peer with the blackhole reflector, 
> simple, and it will get Null routed as soon as it hits my 
> edge router at the IX - it would just seem more sensible to 
> enable people to block the traffic before it traverses the IX 
> and further back in their own networks.
> 
> So?
> 
> Ben
> 
> 
> 
> -Original Message-
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On 
> Behalf Of Paul Vixie
> Sent: 02 February 2008 17:32
> To: nanog@merit.edu
> Subject: Re: Blackholes and IXs and Completing the Attack.
> 
> 
> [EMAIL PROTECTED] ("Ben Butler") writes:
> 
> > ...
> > This hopefully will ensure a relatively protected router 
> that is only 
> > accessible from the edge routers we want and also secured to only 
> > accept filtered announcements for black holing and in consequence 
> > enable the system to be trusted similar to Team Cymaru.
> > ...
> 
> This sounds like another attempt to separate the Internet's 
> control plane from its data plane, and most such attempts do 
> succeed and are helpful (like NSP OOB, or like 
> enterprise-level anycast of DNS).
> However, I'm not sure that remote triggered blackholes are a 
> good direction, worthy of the protection you're proposing, 
> for three reasons.
> 
> First, because large NSP's simply cannot afford the risk 
> associated with letting a third party, automatically and 
> without controls or audits, decide in real time what sources 
> or destinations shall become unreachable.  With all respect 
> (which is a lot) for spamhaus and cymru and even MAPS (which 
> I had a hand in, back in the day), feeding BGP null-routes to 
> a multinational backbone is a privilege that ISO9000 and 
> SarBox and liability insurance providers don't usually want to extend.
> 
> Second, because ma

Re: Sicily to Egypt undersea cable disruption

2008-02-02 Thread Sean Donelan


On Sat, 2 Feb 2008, Roland Dobbins wrote:
There are always corner-cases like the Tamil Tiger incident, and people don't 
always act rationally even in the context of their own perceived (as opposed 
to actual) self-interest, but I just don't see any terrorist groups nor any 
governments involved in some kind of cable-cutting plot, as it's 
diametrically opposed to their commonality of interests (i.e., the terrorist 
groups want the comms to stay up so that they can make use of them, and the 
governments want the comms to stay up so that they can monitor the terrorist 
group comms).


History is sometimes a useful subject.  May I suggest the book
"The Invisible Weapon: Telecommunications and International Politics 
1851-1945" by Daniel Headrick. Let's cut all the cables is an old

idea, and has been tried before. As usual, things didn't go as
planned. Treaties exist because it was in everyone's self-interest
to create the treaty.

If any international terrorist or government espionage groups are
reading NANOG: Hello.  Please don't cut our cables.  Thanks.



RE: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Ben Butler

Hi,

I was not proposing he Null routing of the attack source in the other
ISPs network but the destination in my network being Null routed as a
destination from your network out.

This has no danger to the other network as it is my network that is
going to be my IP space that is blackholed in your network, and the
space blackholed is going to be an address that is being knocked of the
air anyway under DoS and we are trying to minimise collateral damage.  I
cant see where the risk to the large NSP is - given that the route
reflector will only reflect /32s that legitimately originate (as a
destination not a source) in the AS announcing them as please blackhole.

For complete clarity: AS13005 announces 213.170.128.0/19 and has its
route object in RIPE as being announced by AS13005.  My router at IX -
BENIX say - announces 213.170.128.1/32 to the router reflector their,
the announcement from my IX assigned address 212.121.34.30 is known to
be my router on the exchange, and I am announcing a /32 from my AS for a
route object registered as being announced by my AS - so the reflector
accepts my announcement and reflects it to any other members that choose
to peer with this reflector - effectively this is a please blackhole
this destination in AS13005 - the other members that receive this
announcement can then deal with it in anyway they see fit from ignoring
it to setting next-hop 192.0.2.1 -> Null0.

The effect of this would be that any BotNet controlled hosts in the
other member network would now be able to drop any attack traffic in
their network on destination at their customer aggregation routers.

I think you might have thought I was suggesting we blackhole sources in
other peoples networks - this is definatly not what I was saying.

So, given we all now understand each other - why is no one doing the
above?

At the end of the day if an IX member doesn't want the announcements
don't peer with the blackhole reflector, simple, and it will get Null
routed as soon as it hits my edge router at the IX - it would just seem
more sensible to enable people to block the traffic before it traverses
the IX and further back in their own networks.

So?

Ben



-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Paul Vixie
Sent: 02 February 2008 17:32
To: nanog@merit.edu
Subject: Re: Blackholes and IXs and Completing the Attack.


[EMAIL PROTECTED] ("Ben Butler") writes:

> ...
> This hopefully will ensure a relatively protected router that is only 
> accessible from the edge routers we want and also secured to only 
> accept filtered announcements for black holing and in consequence 
> enable the system to be trusted similar to Team Cymaru.
> ...

This sounds like another attempt to separate the Internet's control
plane from its data plane, and most such attempts do succeed and are
helpful (like NSP OOB, or like enterprise-level anycast of DNS).
However, I'm not sure that remote triggered blackholes are a good
direction, worthy of the protection you're proposing, for three reasons.

First, because large NSP's simply cannot afford the risk associated with
letting a third party, automatically and without controls or audits,
decide in real time what sources or destinations shall become
unreachable.  With all respect (which is a lot) for spamhaus and cymru
and even MAPS (which I had a hand in, back in the day), feeding BGP
null-routes to a multinational backbone is a privilege that ISO9000 and
SarBox and liability insurance providers don't usually want to extend.

Second, because many backbone routers in use today can't do policy
routing routing (which is in this case dropping packets because their
source address, not their destination address, has a particular
community associated with it) at line speed.  Note, this is many-not-all
-- I'm perfectly aware that lots of backbone routers can do this but not
everybody has them or can afford them and those who have them tend to be
the multinational NSPs discussed earlier.
To prevent our DDoS protection reflexes from lowering an attacker's cost
(by automatically blackholing victims to protect the nonvictims), we
have to be able to blackhole the abusive traffic by source, not by
destination.

Third, because many OPNs (other people's networks) still don't filter on
source address on their customer-facing edge, and thus allow
spoofed-source traffic to exit toward "the core" or toward a victim's
NSP who cannot filter by source due to path ambiguities inherent in "the
core", any wide scale implementation of this, even if we could get
trusted automation of it at scale and even if everybody had
policy-routing-at-like-speed, would just push the attackers toward
spoofed-source.  That means a huge amount of work and money for the
world, without changing the endgame for attackers and victims at all.
(See BCP38 and SAC004 for prior rants on this controversial topic.)


RE: Another cablecut - sri lanka to suez Re: Sicily to Egypt undersea cable disruption

2008-02-02 Thread Rod Beck
Gentlemen, 

This is my last comment on this subject. 

Paranoia is not a virtue. And security establishments are notorious for 
exaggerating threats (Soviet Union's economy and hence ability to wage war was  
half of what the CIA estimated). They are interest groups just like the rest of 
us ... They pursue their self interest as General Eisenhower noted about a 
certain's military establishment. 

:)

If you know the undersea cable industry, you know that several cables can be 
down at the same time without malice playing a role...

Last year both undersea cables into Pakistan were severed. The two cables were 
laid within several feet of each other along a stretch of shallow water. 

When a ship sank, it crushed both cables.

In December of 2006, three Irish sea cables went dead. One was cut in twenty 
feet of water. One was cut on land and a third damaged in the middle of the 
Irish sea.

It happens all the time.

Terrorists are clearly looking for more high profile events than disrupting 
unmanned undersea cable systems. It doesn't make for great television shots ... 
It is really to get shots of an undersea severed cable ...

Have a good weekend. 

Regards, 

Roderick S. Beck
Director of European Sales
Hibernia Atlantic
1, Passage du Chantier, 75012 Paris
http://www.hiberniaatlantic.com
Wireless: 1-212-444-8829. 
Landline: 33-1-4346-3209.
French Wireless: 33-6-14-33-48-97.
AOL Messenger: GlobalBandwidth
[EMAIL PROTECTED]
[EMAIL PROTECTED]
``Unthinking respect for authority is the greatest enemy of truth.'' Albert 
Einstein. 



-Original Message-
From: [EMAIL PROTECTED] on behalf of Robert Bonomi
Sent: Sat 2/2/2008 7:20 PM
To: nanog@merit.edu
Subject: Re: Another cablecut - sri lanka to suez Re: Sicily to Egypt undersea 
cable disruption
 

> Date: Fri, 1 Feb 2008 14:21:00 -0800
> From: "Scott Francis" <[EMAIL PROTECTED]>
> Subject: Re: Another cablecut - sri lanka to suez Re: Sicily to Egypt 
> undersea cable disruption
>
>
> On Feb 1, 2008 6:37 AM, Suresh Ramasubramanian <[EMAIL PROTECTED]> wrote:
> >
> > http://www.marketwatch.com/news/story/third-undersea-cable-reportedly-cut/story.aspx?guid={1AAB2A79-E983-4E0E-BC39-68A120DC16D9}
> >
> >  "We had another cut today between Dubai and Muscat three hours back.
> > The cable was about 80G capacity, it had telephone, Internet data,
> > everything," one Flag official, who declined to be named, told Zawya
> > Dow Jones.
> > The cable, known as Falcon, delivers services to countries in the
> > Mediterranean and Gulf region, he added.
>
> this (3 undersea cables in about a week, serving the same geographic
> area, with two of the cuts happening on the same day!) is leaving the
> realm of improbability and approaching the realm of conspiracy ...

  "Never ascribe to malice that which can be explained by incompetence"
  comes to mind.






Re: Another cablecut - sri lanka to suez Re: Sicily to Egypt undersea cable disruption

2008-02-02 Thread Robert Bonomi

> Date: Fri, 1 Feb 2008 14:21:00 -0800
> From: "Scott Francis" <[EMAIL PROTECTED]>
> Subject: Re: Another cablecut - sri lanka to suez Re: Sicily to Egypt 
> undersea cable disruption
>
>
> On Feb 1, 2008 6:37 AM, Suresh Ramasubramanian <[EMAIL PROTECTED]> wrote:
> >
> > http://www.marketwatch.com/news/story/third-undersea-cable-reportedly-cut/story.aspx?guid={1AAB2A79-E983-4E0E-BC39-68A120DC16D9}
> >
> >  "We had another cut today between Dubai and Muscat three hours back.
> > The cable was about 80G capacity, it had telephone, Internet data,
> > everything," one Flag official, who declined to be named, told Zawya
> > Dow Jones.
> > The cable, known as Falcon, delivers services to countries in the
> > Mediterranean and Gulf region, he added.
>
> this (3 undersea cables in about a week, serving the same geographic
> area, with two of the cuts happening on the same day!) is leaving the
> realm of improbability and approaching the realm of conspiracy ...

  "Never ascribe to malice that which can be explained by incompetence"
  comes to mind.



Re: Another cablecut - sri lanka to suez Re: Sicily to Egypt undersea cable disruption

2008-02-02 Thread Martin Barry

$quoted_author = "Scott Francis" ;
> 
> maybe there's a lot more overlap in shipping lanes and cable runs than
> I thought ...

In confined waters like the Suez, Red Sea et. al. there is a lot of overlap.
Which makes three cables cuts in that area during bad weather not such a
stretch of the imagination.

Open waters like trans-Atlantic and trans-Pacific have less overlap with
shipping lanes but still need to cross fishing areas etc.etc. But you'd be a
little more suspicious if those sites had a similar cluster of cuts unless
there was something in common (i.e. same landing station, cuts close to
shore).

cheers
marty

-- 
"Life's Little Mysteries. Noel Hunter of Chippendale is one of many to be 
confused, and amused, by the pair of professionally produced No Regrets 
street signs near the corner of Greens Road and Albion Avenue, Paddington. 
Printed in the same style as No Standing signs, their proximity to the 
College of Fine Arts may give a clue to their origins. Whatever, having 
regrets while between the signs is subject to a $144 fine from the NSW 
Dept of Second Thoughts." [1]

[1] - http://www.smh.com.au/articles/2004/03/31/1080544560873.html


RE: Another cablecut - sri lanka to suez Re: Sicily to Egypt undersea cable disruption

2008-02-02 Thread Neil J. McRae

Really? What cable is that?!

-Original Message-
From: Rubens Kuhl Jr. <[EMAIL PROTECTED]>
Sent: 02 February 2008 11:33
To: nanog@merit.edu
Subject: Re: Another cablecut - sri lanka to suez Re: Sicily to Egypt undersea 
cable disruption


> "NEW YORK (AP) -- The lines that tie the globe together by carrying
> phone calls and Internet traffic are just two-thirds of an inch thick
> where they lie on the ocean floor."

And AFAIK not all kilometers of cables lie on the ocean floor; if the
ocean has high depth on a given part of the cable route, the cable
simply floats on the water on that run. It's just a matter of having
enough pressure to lift it up.



Rubens



Re: Blackholes and IXs and Completing the Attack.

2008-02-02 Thread Paul Vixie

[EMAIL PROTECTED] ("Ben Butler") writes:

> ...
> This hopefully will ensure a relatively protected router that is only
> accessible from the edge routers we want and also secured to only accept
> filtered announcements for black holing and in consequence enable the
> system to be trusted similar to Team Cymaru.
> ...

This sounds like another attempt to separate the Internet's control plane
from its data plane, and most such attempts do succeed and are helpful
(like NSP OOB, or like enterprise-level anycast of DNS).  However, I'm not
sure that remote triggered blackholes are a good direction, worthy of the
protection you're proposing, for three reasons.

First, because large NSP's simply cannot afford the risk associated with
letting a third party, automatically and without controls or audits, decide
in real time what sources or destinations shall become unreachable.  With
all respect (which is a lot) for spamhaus and cymru and even MAPS (which I
had a hand in, back in the day), feeding BGP null-routes to a multinational
backbone is a privilege that ISO9000 and SarBox and liability insurance
providers don't usually want to extend.

Second, because many backbone routers in use today can't do policy routing
routing (which is in this case dropping packets because their source address,
not their destination address, has a particular community associated with it)
at line speed.  Note, this is many-not-all -- I'm perfectly aware that lots
of backbone routers can do this but not everybody has them or can afford them
and those who have them tend to be the multinational NSPs discussed earlier.
To prevent our DDoS protection reflexes from lowering an attacker's cost (by
automatically blackholing victims to protect the nonvictims), we have to be
able to blackhole the abusive traffic by source, not by destination.

Third, because many OPNs (other people's networks) still don't filter on
source address on their customer-facing edge, and thus allow spoofed-source
traffic to exit toward "the core" or toward a victim's NSP who cannot filter
by source due to path ambiguities inherent in "the core", any wide scale
implementation of this, even if we could get trusted automation of it at
scale and even if everybody had policy-routing-at-like-speed, would just push
the attackers toward spoofed-source.  That means a huge amount of work and
money for the world, without changing the endgame for attackers and victims
at all.  (See BCP38 and SAC004 for prior rants on this controversial topic.)


Re: IPv6 Connectivity Saga (part n+1)

2008-02-02 Thread Iljitsch van Beijnum


On 2 feb 2008, at 11:42, Thomas Kühne wrote:


I took a DMOZ[1] dump


What's a DMOZ dump?


33.4% of all services that advertised IPv6 failed to deliver or in
other words the IPv6 failure rate is ten times the NS failure rate.


"failing to deliver" is not necessarily a failure condition, in my  
opinion.



IPv6 failure rates of 4.3% (TLD) and 6.1% (NS)


What does TLD and NS mean?


About 4 days later I did a more detailed check of the hosts with
broken IPv6:



1624 : hosts total
827 : connection timed out


That would be bad.


382 : no route to host


Not quite as bad, but also not good.


249 : connection refused


Although it would be better to avoid this condition, I wouldn't count  
it as a failure. This typically happens when a host has an IPv6  
address in the DNS, but a service isn't reachable over IPv6. Since  
reasonable implementations will retry over IPv4 after a round trip,  
this doesn't cause any real trouble.



 43 : broadcast address


?


 22 : IPv6 assignments reclaimed (3ffe::/16)


Which shows that installing IPv6 (or anything, really) is pretty much  
"install and forget", which goes to the "use it or lose it" doctrine:  
only services that are actually used will remain operational.



Issues(cases not marked with a star) do tend to arise
but why are fundamental issues like "connection timed out",
"no route to host" and "connection refused" so frequent?


Like I said: if something isn't used, it doesn't get fixed if it  
doesn't work. Interestingly, if something new is set up incorrectly  
and then someone comes along who wants to use the new option, and it  
doesn't work, the blame is laid at the person who decided to use the  
new option, rather than the person who offered a service over it but  
didn't make sure it worked correctly.


I've been downloading files from the FTP servers of the five RIRs a  
few times a week for several years now. I haven't kept track of it,  
but it seems that it's gotten harder to reach these FTP servers over  
IPv6 the past year or so. This could very well have something to do  
with IPv6 becoming more mainstream, so it's no longer some  
experimental thing that can be enabled without trouble, but a  
production service that must be firewalled. This seems to be the  
source of much trouble, especially with ARIN, which I can't  
successfully reach over IPv6 anymore, probably because of a routing  
issue between their and my ISPs. But before that, I had path MTU  
problems towards them on several occasions.


Another factor is that with IPv4, you need to be pragmatic, because if  
you don't, you have no connectivity. With IPv6, you can impose  
arbitrary restrictions as much as you want, because IPv4 makes sure  
there is always fallback connectivity anyway.

Re: Another cablecut - sri lanka to suez Re: Sicily to Egypt undersea cable disruption

2008-02-02 Thread Randy Bush



And AFAIK not all kilometers of cables lie on the ocean floor; if the
ocean has high depth on a given part of the cable route, the cable
simply floats on the water on that run. It's just a matter of having
enough pressure to lift it up.


and for the difficult parts, they pump helium in and get it above flight 
paths.


randy


Re: Another cablecut - sri lanka to suez Re: Sicily to Egypt undersea cable disruption

2008-02-02 Thread Rubens Kuhl Jr.

> "NEW YORK (AP) -- The lines that tie the globe together by carrying
> phone calls and Internet traffic are just two-thirds of an inch thick
> where they lie on the ocean floor."

And AFAIK not all kilometers of cables lie on the ocean floor; if the
ocean has high depth on a given part of the cable route, the cable
simply floats on the water on that run. It's just a matter of having
enough pressure to lift it up.



Rubens


IPv6 Connectivity Saga (part n+1)

2008-02-02 Thread Thomas Kühne

I took a DMOZ[1] dump, extracted all unique domain-name port combinations
and checked their IPv6 connectivity.

3 388 012 : 100.000% : total
3 260 296 :  96.230% : IPv4 only
  122 560 :   3.620% : bad NS
3 372 :   0.100% : IPv6 working
1 694 :   0.050% : broken or "fake" IPv6 

broken: TCP connect failed
fake: IPv6 mapped IPv4 addresses (e.g. :::1.2.3.4)

33.4% of all services that advertised IPv6 failed to deliver or in
other words the IPv6 failure rate is ten times the NS failure rate.

Seems high, thus a cross check via TLDs' NS:

270 : 100.0% : TLD total (excluding the IDN tests)
268 :  99.3% : IPv4 working
  2 :   0.7% : IPv4 broken (HM and KP)
177 :  65.6% : IPv6 working
  8 :   3.0% : IPv6 broken

1910 : 100.0% : NS total
1500 :  78.5% : IPv4 only
  31 :   1.6% : IPv4 broken
 356 :  19.1% : IPv6 working
  23 :   1.2% : IPv6 broken

IPv6 failure rates of 4.3% (TLD) and 6.1% (NS) is lower than the above
33.4% but are still significantly higher than the IPv4 failure rates of
0.7% (TLD) and 1.6% (NS). TLD root-NSs usually are managed by dedicated
infrastructure organisations thus better trouble shooting than the DMOZ
listed ones get is expected and suggests the above 33.4% failure rate
isn't some kind of sampling artifact.

About 4 days later I did a more detailed check of the hosts with
broken IPv6:

1624 : hosts total
 827 : connection timed out
 382 : no route to host
 249 : connection refused
  95 : network unreachable
  54 : SixXS never received a route announcement for that block
  43 : broadcast address
  30 : * IPv4 in IPv6
  22 : IPv6 assignments reclaimed (3ffe::/16)
  16 : * no IPv6 (::)
  12 : * IPv4 only
  10 : * IPv6 working
   4 : IPv6 never assigned
   4 : local (fe80::/10)
   2 : local (::1)
   2 : broken NS

Issues(cases not marked with a star) do tend to arise
but why are fundamental issues like "connection timed out",
"no route to host" and "connection refused" so frequent?

(testing was done from 2a01:4d0:102::31)

Thomas

[1] http://www.dmoz.org/help/getdata.html