Re: BGP Filtering

2008-01-15 Thread Dave Israel



William Herrin wrote:

On Jan 15, 2008 12:51 PM, Dave Israel <[EMAIL PROTECTED]> wrote:
  

   I think I understand what you want, and you don't want it.  If you
receive a route for, say, 204.91.0.0/16,  204.91.0.0/17, and
204.91.128.0/17, you want to drop the /17s and just care about the /16.  But
a change in topology does not generally result in a complete update of the
BGP table.  Route changes result in route adds and draws, not a flood event.
So if you forgot about the /17s and just kept the /16, and the /16 was
subsequently withdrawn, your router would not magically remember that it had
/17s to route to as well.



Dave,

That's half-true.
  

[discussion of FIB vs RIB deleted]

But, as you said yourself:

Ben, coming back to your question: I don't think there is a way to
make the software filter the routes inserted into the FIB. I don't see
a reason why it couldn't be programmed to do that. But the fine folks
at Cisco didn't see fit to write that software. Its a pity 'cause it
would be very useful.
  
Ergo, why I didn't discuss the FIB in my email.  If you want to filter 
routes, you generally have to filter them at the RIB.


How you move data from the RIB to the FIB is one of those questions that 
keep router engineers up all night.  The transfer must be fast, 
reliable, and cheap on the CPU.  Often, this means keeping logic out of 
it.  A paradigm is decided upon early, and if it takes ten years to 
actually come back to haunt them, they haven't done too badly.  Fixing 
something that far down in the nuts and bolts isn't easy.  (I am not 
saying the presence of a revenue-generating hardware fix doesn't 
influence the decision not to make a risky change to the software; I'm 
just saying there's a lot of grey area to play in.)


-Dave


Re: BGP Filtering

2008-01-15 Thread Dave Israel


The /17 isn't sitting there still being filtered; it was never there to 
begin with.  Your router heard the /17, saw that it didn't want it 
because of your filter settings, and promptly forgot it.  You can tell 
your router to remember routes it doesn't install; it's called soft 
reconfiguration on a Cisco and is the normal mode of operation for a 
Juniper.  But if you do that, you're not saving memory; an inactive 
route does not take less RAM than an active one. 

I am pretty sure that there isn't a way to match a route on whether a 
larger aggregate exists using the current route map/policy statement 
verbage on the routers I have worked with.  Doing so would be a 
reasonably simple code tweak, but without a purpose it isn't a tweak 
you're going to see any time soon.


-Dave

Ben Butler wrote:

Hi Dave,
 
Yes that is what I was thinking I want to do - so I am guessing here - 
I think what we are saying is the /17s never get re-added when the /16 
is withdrawn because this does not - for very good reasons when I 
think about it- cause the filter to be evaluated upon the withdrawal 
of a prefix, only on when it is newly announced does it get checked - 
or maybe the odd table scan in the code?? But basically the /17s just 
sit there and continue to be filtered.  Is that approximately correct?
 
so umm, yes a default would be needed, ummm.
 
Is it even technically possible to easily achieve though?
 
Ben


----
*From:* Dave Israel [mailto:[EMAIL PROTECTED]
*Sent:* 15 January 2008 17:51
*To:* Ben Butler
*Cc:* nanog@merit.edu
*Subject:* Re: BGP Filtering


Ben,

  I think I understand what you want, and you don't want it.  If you 
receive a route for, say, 204.91.0.0/16,  204.91.0.0/17, and 
204.91.128.0/17, you want to drop the /17s and just care about the 
/16.  But a change in topology does not generally result in a complete 
update of the BGP table.  Route changes result in route adds and 
draws, not a flood event.  So if you forgot about the /17s and just 
kept the /16, and the /16 was subsequently withdrawn, your router 
would not magically remember that it had /17s to route to as well.  
You'd drop traffic, unless you had a default, in which case you'd just 
route it suboptimally.


-Dave


Ben Butler wrote:

Hi,

Agreed that is why I have lots of RAM - doesn't mean I should carry on
upgrading my tower of babble though to make it ever higher and higher if
there is a better way of doing things.

I still don't see how a default route to a portioned pop is going to
help in the slightest - you are saved by getting the prefixes from an
alternate transit and the default doesn't get used.  Where is does help
is to capture anything which has been filtered out completely and then
there is no prefix from the alternate transit provider anyway - so
whichever default gets used and takes its chances.

Bogons - obviously.

My question was if what I was asking was possible.

Kind Regards

Ben


-Original Message-
From: Joe Abley [mailto:[EMAIL PROTECTED] 
Sent: 15 January 2008 17:07

To: Ben Butler
Cc: nanog@merit.edu
Subject: Re: BGP Filtering


On 15-Jan-2008, at 11:40, Ben Butler wrote:

  
Defaults wont work because a routing decision has to be made, my 
transit originating a default or me pointing a default at them does 
not guarantee the reachability of all prefixes..



Taking a table that won't fit in RAM similarly won't guarantee
reachability of anything :-)

Filter on assignment boundaries and supplement with a default. That
ought to mean that you have a reasonable shot at surviving de-peering/
partitioning events, and the defaults will pick up the slack in the
event that you don't.

For extra credit, supplement with a bunch of null routes for bogons so
packets with bogon destination addresses don't leave your network, and
maybe make exceptions for "golden prefixes".

  
I am struggling to see a defensible position for why just shy of 50% 
of all routes appears to be mostly comprised of de-aggregated routes 
when aggregation is one of the aims RIRs make the LIRs strive to 
achieve.  If we cant clean the mess up because there is no incentive 
than cant I simply ignore the duplicates.



You can search the archives I'm sure for more detailed discussion of
this. However, you can't necessarily always attribute the presence of
covered prefixes to incompetence.


Joe
  


Re: BGP Filtering

2008-01-15 Thread Dave Israel


Ben,

 I think I understand what you want, and you don't want it.  If you 
receive a route for, say, 204.91.0.0/16,  204.91.0.0/17, and 
204.91.128.0/17, you want to drop the /17s and just care about the /16.  
But a change in topology does not generally result in a complete update 
of the BGP table.  Route changes result in route adds and draws, not a 
flood event.  So if you forgot about the /17s and just kept the /16, and 
the /16 was subsequently withdrawn, your router would not magically 
remember that it had /17s to route to as well.  You'd drop traffic, 
unless you had a default, in which case you'd just route it suboptimally.


-Dave


Ben Butler wrote:

Hi,

Agreed that is why I have lots of RAM - doesn't mean I should carry on
upgrading my tower of babble though to make it ever higher and higher if
there is a better way of doing things.

I still don't see how a default route to a portioned pop is going to
help in the slightest - you are saved by getting the prefixes from an
alternate transit and the default doesn't get used.  Where is does help
is to capture anything which has been filtered out completely and then
there is no prefix from the alternate transit provider anyway - so
whichever default gets used and takes its chances.

Bogons - obviously.

My question was if what I was asking was possible.

Kind Regards

Ben


-Original Message-
From: Joe Abley [mailto:[EMAIL PROTECTED] 
Sent: 15 January 2008 17:07

To: Ben Butler
Cc: nanog@merit.edu
Subject: Re: BGP Filtering


On 15-Jan-2008, at 11:40, Ben Butler wrote:

  
Defaults wont work because a routing decision has to be made, my 
transit originating a default or me pointing a default at them does 
not guarantee the reachability of all prefixes..



Taking a table that won't fit in RAM similarly won't guarantee
reachability of anything :-)

Filter on assignment boundaries and supplement with a default. That
ought to mean that you have a reasonable shot at surviving de-peering/
partitioning events, and the defaults will pick up the slack in the
event that you don't.

For extra credit, supplement with a bunch of null routes for bogons so
packets with bogon destination addresses don't leave your network, and
maybe make exceptions for "golden prefixes".

  
I am struggling to see a defensible position for why just shy of 50% 
of all routes appears to be mostly comprised of de-aggregated routes 
when aggregation is one of the aims RIRs make the LIRs strive to 
achieve.  If we cant clean the mess up because there is no incentive 
than cant I simply ignore the duplicates.



You can search the archives I'm sure for more detailed discussion of
this. However, you can't necessarily always attribute the presence of
covered prefixes to incompetence.


Joe
  


Re: The Choice: IPv4 Exhaustion or Transition to IPv6

2007-06-28 Thread Dave Israel




Adrian Chadd wrote:


You don't believe the killer app will be "sorry, no more IP addresses?"


I bet it won't.  There are too many people willing to patch what we have 
rather than toss it out and start over.  As the IP addresses run ever 
lower, ISPs will probably patrol usage even more and reclaim IPs.  Then 
router vendors will probably propose new routing schemes that don't 
require bit boundaries, so allocations can be made outside the powers of 
two, and ISPs will reclaim more and reallocate it.  The routing tables 
will get bigger, but since memory is getting cheaper, we can work around 
that, too.   IPv4 will probably become more and more of a kludge, but 
until somebody actually comes up with something IPv6 can do that cannot 
be backported to IPv4, customers are not going to give a rodent's behind 
about IPv6.  There is a chance that some people will be roped in with 
"IPv6: It's Shiny and the Japanese Are Doing It," but not enough to make 
IPv6 a customer-driven initiative.  IPv6 will most liekly be deployed 
and refined outside of the mass market: cell phones, personal nets, 
educational and research facilities, etc.  Providers might slowly start 
building elaborate proxies to allow IPv4 clients to attach to IPv6 hosts 
(which will be hysterical: now with IPv6, everybody's a NAT client) as 
they convert their individual backbones to v4, or perhaps those proxies, 
like digital TV converter boxes, will live at the endpoints.  But any 
dreams anybody may have of a flag day where IPv4 is turned off and IPv6 
turned on are never going to come true unless the industry decides to do 
it en masse, so that all the customers who will be deeply offended have 
nowhere else to go.


If you want IPv6, you're seriously going to need to think of how it can 
happen slowly and with as much of the pain as possible put upon the 
network engineers, who know what they are working for, and not the end 
users, who don't care how it works as long as their flash games, 
lolcatz, and porn keep working.





Re: Security gain from NAT

2007-06-04 Thread Dave Israel




[EMAIL PROTECTED] wrote:

On Mon, 04 Jun 2007 11:32:39 PDT, Jim Shankland said:

*No* security gain?  No protection against port scans from Bucharest?
No protection for a machine that is used in practice only on the
local, office LAN?  Or to access a single, corporate Web site?


Nope. Zip. Zero. Ziltch.  Nothing over and above what a good properly
configured stateful *non*-NAT firewall should be doing for you already.



What the firewall *should* be doing?  The end devices *should* not need 
protection in the first place, because they *should* be secure as 
individual devices.  But they are not.  So you put a firewall in front 
of them, and that device *should* give them all the protection they 
need.  But sometimes, it doesn't.  So you make end devices unaddressable 
by normal means, and while it shouldn't give them more security, it 
turns out it does.  No matter how much it shouldn't, and how much we 
wish it didn't, it does.


The difference between theory and practice is that in theory, there is 
no difference, but in practice, there is.




Re: Network end users to pull down 2 gigabytes a day, continuously?

2007-01-15 Thread Dave Israel

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
 
Bora Akyol wrote:
>
> The question I asked earlier was, whether the last-mile SP networks
> can handle 24x7 100% link utilization for all of their customers. I
> don't think they can. And frankly, I don't know how they are going
> to get revenue from the content distributors to upgrade the
> networks. Does Apple reimburse Comcast (my SP) when I download a
> song? I don't think so? What about a movie? Again, I don't think
> so.
>
> You see where I am going with this.

The past solution to repetitive requests for the same content has been
caching, either reactive (webcaching) or proactive (Akamaizing.)  I
think it is the latter we will see; service providers will push
reasonably cheap servers close to the edge where they aren't too
oversubscribed, and stuff their content there.  A cluster of servers
with terabytes of disk at a regional POP will cost a lot less than
upgrading the upstream links.  And even if the SPs do not want to
invest in developing this product platform for themselves, the price
will likely be paid by the content providers who need performance to
keep subscribers.

I think the biggest stumbling block isn't technical.  It is a question
of getting enough content to attract viewers, or alternately, getting
enough viewers to attract content.  Plus, you're going to a format
where the ability to fast-forward commercials is a fact, not a risk,
and you'll have to find a way to get advertisers' products in front of
the viewer to move past pay-per-view.  It's all economics and politics
now.

- -Dave

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
 
iD8DBQFFq/hz+dqB2cHPe1URAkNIAJ9/juPTl45djTF3ijZdYubXdFJoqwCgiZDm
Sv2cacmnM6Lld0cRRFo9vlo=
=tFPO
-END PGP SIGNATURE-



Re: sniffer/promisc detector

2004-01-21 Thread Dave Israel


Clipped for brevity...

On 1/21/2004 at 10:52:00 +, [EMAIL PROTECTED] said:
> 
> >> > Uhm, that would be wrong.  This is simply "security through 
> obscurity".
> >> Yes, it is wrong for the _smart books_. But it works in real life. 
> 
> >Actually, an automated script or manual scan can find it trivially.
> 
> If security through obscurity was useless then the USAF
> would never have developed the stealth bomber. [...]

Yes.  But making a bomber "stealth" means designing it to be difficult
to detect by an opponent.  It doesn't mean painting "I am Not a
Bomber, I Am The Ice Cream Man" on the side and hoping nobody takes a
second glance at it.  

Somebody else pointed out that nmap in its basic mode isn't terribly
fast.  That's true.  But redesigning for speed wouldn't be that hard.
Scan lots of ports in parallel, checking just for an ACK back from a
SYN, then go through those that responded in order of likelihood (22,
then unassigned ports, then assigned ones), and having it stop when it
finds ssh, and you reduce the time required by several orders of
magnitude.  And that's assuming you don't have the help of tons of
zombies.  If everybody tries to get obscure with their ports, then
this will become common, and it will be the people who are
legitimately trying to connect who get annoyed by the obscurity.  And
if you're only trying to provide services for members of your
organization, a VPNish solution makes a lot more sense than
complicated custom port juggling.

So, okay, sure, like many other things, if a small number of clueful
people are doing this, then they will reap benefits for it.  If it
becomes widely spread practice, there will be more harm than good from
it, and people will start ignoring it, working around it, and/or
taking direct action against it that will render it pointless or
harmful to the user.  Lots of things have hit this death and been
forgotten or relegated back to the fringe.  I'll risk the wrath of
many and mention multicast.  Somewhere out there, Randy Bush is
probably thinking of his vision of the future of deaggregated /24s.

-Dave




Re: sniffer/promisc detector

2004-01-20 Thread Dave Israel


On 1/20/2004 at 09:18:07 -0800, Alexei Roudnev said:
> 
> 
> >
> > Uhm, that would be wrong.  This is simply "security through obscurity".
> Yes, it is wrong for the _smart books_. But it works in real life. Of
> course, it should not be the last line of defense; but it works as a first
> line very effectively.
> 
> If I rate safety as a number (10 is the best, 0 is the worst):
> - unpatched sshd on port 22 - safety is zero (will be hacked by automated
> script in a few weeks)
> - patched sshd on port 22 - safety is 5 (even patched sshd have a bugs, and
> I do not know, what happen first - I patch next bug or hacker's script find
> this sshd and hack it)
> - unpatched sshd on port 30013 - safety is 7 (higher) because no one
> automated script can find it, and no one manual scan find it in reality
> - patched sshd on port 30013 - safety is 9
> - turn off power - safety is 10. Secure system, is a dark system.
> 
> (I did not rated firewalls etc).

Actually, an automated script or manual scan can find it trivially.
All you have to do is a quick port scan, looking for this:

12:31 biohazard~>telnet [somewhere] [port]
Trying [ip_address]...
Connected to localhost.
Escape character is '^]'.
SSH-1.99-OpenSSH_3.4p1c


Plus, if you put it on a non-standard port, you tend to use the same
one across the enterprise, so it is only really obscure once.  Moving
port numbers only protects you against idle vandalism; it is useless
against people who truly wish you harm.

You really need a firewall, particularly one that can detect a port
scan and shut off the scanner, for changing ports to have any real
security.  It is kind of like a 4-digit PIN being useless for a bank
card without the 3-try limit.

-Dave


Re: data request on Sitefinder

2003-10-20 Thread Dave Israel

On 10/20/2003 at 16:31:45 -0400, Steven M. Bellovin said:
> 
> A number of people havce responded that they don't want to be forced to 
> pay for a change that will benefit Verisign.  That's a policy issue I'm 
> trying to avoid here.  I'm looking for pure technical answers -- how 
> much lead time do you need to make such changes safely?

  I think that the policy problem adds to the technical one.  If the
community were behind Sitefinder and supported Verisign's design
goals, it would be possible to hammer out everything in a short period
of time.  But because the hearts and minds of those who would make the
changes are not won, those responsible for implementing changes would
drag their feet, hoard necessary resources, and use the incomplete
state of their implementation as an obstacle to change and, should the
change happen anyway, use this "evidence" of Verisign's "bad behavior"
as an excuse to act openly against the service, on ways that have
already been demonstrated.  Thus, the human factor will make any
purely technical estimate useless.

  Sadly, I do not feel qualified to give a detailed estimate on your
question, as presented, which I find intriguing from a purely
theoretical point of view, except to say that there are always going
to be one-offs, unique builds, etc that willneed to be changed
individually, and even without the sour feeling towards Sitefinder,
there will be procrastination and compteting priorities.  This is not,
and never will be, the only thing that needs working on.  Even with
complete technical buy-in, I wouldn't expect the mass of users to be
covered by these changes until the middle of next year if work started
today.

-Dave


RE: Port blocking last resort in fight against virus

2003-08-14 Thread Dave Israel

On 8/12/2003 at 12:40:19 -0400, McBurnett, Jim said:
> who in there right mind would pass NB traffic in the wild?

That's the problem; not all customers are in their right mind.  All
they know is that it was working yesterday, and not today, because you
blocked a port.

The question of port blocking for most sizable ISPs comes down to
principle vs principle.  One the one hand, you have the principle of
network invisibility.  You agreed to pass customer traffic, not pass
judgement on it.  If it's a valid IP packet, you'll deliver it.  And
you don't slow down or stop traffic because you're spending cycles
examining packets.*  That's what customers expect.

On the other hand, you have the principle of being a good network
citizen.  You try to keep your tables clean and your peers from
flapping.  You accept valid routes and inform your peers when you get
invalid ones, so they have a chance to fix them.  You are properly
embarrassed when you find a spammer on your network or your name on
the CIDR report.  And you don't spew other people's networks with worm
traffic.  That is what other providers expect.

Port blocking is therefore a quandry: do you stick with your customer
principle, or your provider principle?  I think most of us weigh the
damage of the attack vs the damage of losing the port, and make
individual judgement calls.  It would be nice if there were some
central consensus on when to block ports; then individual providers 
wouldn't need to take abuse from customers or other networks when their
judgement wasn't exactly the same as somebody else's.

-Dave

* Before the holy war starts, yeah, some hardware doesn't slow down
when blocking ports, and this is only an issue if your hardware isn't
that breed.  My point is that this might be an issue for some hardware,
and that "Buy vendor X" isn't really a solution for everyone.






Re: WANTED: ISPs with DDoS defense solutions

2003-07-31 Thread Dave Israel

On 7/31/2003 at 18:30:12 +, Paul Vixie said:
> 
> > However, since improvements are always welcome, please recommend tools
> > which would allow us to progress "above and beyond" C and it's deficencies.
> 
> I've never been able to program a buffer overrun vulnerability in
> Modula 3, or Perl, or any version of Lisp or Scheme.  It's possible
> that the physics has advanced enough that "low level programming"
> now costs more than it saves.

On the other hand, compiled C is still significantly faster than, say,
Perl or Java.  That may not be important for some apps, but when
you're pushing hardware to its very limits (you know, the most
important stuff on the Net, like playing games and serving porn) you
can really feel it.  And if there's a security hole or exploitable bug
in Perl or Java itself, it exists in every program written with it.

There's nothing wrong with low level languages, and with the proper
libraries, they gain some of the advantages of high level languages.
Personally, it'll be a long time before I'm convinced that I want my
routers running Java.  (Like how I brought that almost back on topic
in the end, there?)




Re: Learning more about authentication and passwords

2003-07-29 Thread Dave Israel

On 7/29/2003 at 04:37:01 -0400, Sean Donelan said:
> 
> 
> If you would like to learn more about the strengths and weaknesses
> of various authentication methods, I highly recommend the book
> 
> Authentication: From Passwords to Public Keys
> by Richard E. Smith ISBN: 0201615991
> 

I'll add:

Network Security: Private Communication in a Public World
by Charlie Kaufman, Radia Perlman, Mike Speciner, Charles Kaufman 
Prentice Hall PTR
ISBN: 0130460192 

I have not read the 2nd Edition, but the 1st was excellent.

-- 
Dave Israel
Director, Data Engineering
Allegiance Telecom


Re: IPv6

2003-06-13 Thread Dave Israel

On 6/13/2003 at 07:54:01 -0700, [EMAIL PROTECTED] said:
>
>   I saw a DISA memo yesterday that mandates IPv6 compliance 
>   by 2008.

Ah, government memos.  There's been ones mandating OSI protocols,
UNIX workstations for all government employees...

Government mandates aren't going to force a protocol by themselves.
The marketplace is where v6 will be made or broken, and history shows
the marketplace has two requirements: need and painlessness.  This
might give the vendors a nudge, but it isn't going to be the reason
the Great Changeover happens.

-Dave


Re: IPv6

2003-06-12 Thread Dave Israel

On 6/12/2003 at 15:00:17 -0400, Eric Gauthier said:
> 
> > >So, how does IPv6 go from the shores of Japan and the minds of geeks across
> > America to being the primary protocol
> > >used on the net?
> > 
> 
> Free gay porn?
> 
> Eric :)

And there's the secret.  As many governments and universities can
demand v6 as you like; the real conversion won't happen until the
users need v6 to reach their pornography.

-Dave



Re: IPv6

2003-06-12 Thread Dave Israel

On 6/12/2003 at 13:14:30 -0400, Andy Dills said:
> 
> On Thu, 12 Jun 2003, Jared Mauch wrote:
> 
> > I honestly see most of the backbone providers offering
> > native IPv4 and IPv6 services in the next few years.  Contact
> > your provider as you can probally get in on any beta service
> > offerings they currently have.
> 
> Am I the only one that thinks IPv6 is a minimum of ten years out before
> you see actual non-geek demand?
 
I don't know about timeframe, but I certainly don't see it soon.
 
>  Is IPv6 better than IPv4? Yes. 

I'm not sure that is widely agreed on.  Specifically, I am not sure
there are many features of v6 that are wanted and haven't been ported
back to v4.

> Enough for it to motivate everybody to switch? Debateable.

Some of the new features in ipv6 have already been tried in other
protocols... protocols that ipv4 has already replaced in the market.
They won't be the adoption drivers people seem to think they are.  v4
may not be as efficient as v6, but it is efficient enough, and until
it cannot handle the apps the mainstream users need, the mainstream
won't use it.

Fortunately, unlike VHS vs Betamax, you can quietly include support
for both in a single device with no or little excess cost, and, like
cassettes vs CDs, you will be able to have one mass market for the
good enough right now, and one smaller market for the -philes, and
slowly shift from one to the other.  First, though, you have to make
ipv6 perform.  ipv4 has been worked on by some very competent people
for a long time; to pull out yet another comparison, like rotary vs
piston engines, even if ipv6 is theoretically better than v4, the
implementation and support have to catch up before the wide deployment
can really get started.

-Dave


Re: Allegiance telecom boston colo down?

2003-03-28 Thread Dave Israel

On 3/28/2003 at 16:19:03 -0500, Sean Donelan said:
> On Fri, 28 Mar 2003, Dave Israel wrote:
> > I seriously doubt that, if a 12-year-old from Nebraska called the NOC
> > at AT&T and asked for a list of all their network failures in the past
> > two years, the NOC person would feel obliged to spend their time on
> 
> I try to point out when providers are doing a good job.
> 
> AT&T has set up their system so their NOC people don't have to get bogged
> down answering phones.  AT&T has a very nice news system where you can
> read about network issues.  AT&T's customer care people post regular
> updates about POP problems, circuits down, etc.  I suppose if the 12-year
> old from Nebraska archived the news system for two years, he could read
> about all their network issues.

That may be true.  However, we weren't talking about network outage
notifications in general, we were talking specifically about calling
our NOCC to ask about an outage.  No, it isn't apples to oranges, but
it is Red Deliciouses to Granny Smiths. ;-)

> While there is always room for improvement, and some providers have
> goofed up, there are providers who attempt to keep their network users
> (even if they aren't direct customers) informed.

And if you're a network operator who is flinging packets across our
network and they aren't arriving, and you want to know why, that
generally fits the descripton of "good reason," in my book.  

I'll admit, it isn't perfect.  As somebody else pointed out, "good
reason" is not an easy metric; it depends on who you are, who you have
reached, the nature of the outage, how busy the NOCC is, the phase of
the moon, etc, etc.

-Dave






Re: Allegiance telecom boston colo down?

2003-03-28 Thread Dave Israel


At the risk of starting a debate that will go nowhere and annoy
the readership...

On 3/28/2003 at 14:44:00 -0500, Sean Donelan said:
> 
> I guess we'll have to wait for Allegiance customers "leak" the
> information.  The leaks may not be as accurate as if the information
> came directly from Allegiance.  Other providers such as AT&T, Earthlink,
> MFN, RCN have a different philosophy about providing information
> concerning their network status.  Not all NOC's are the same.

I seriously doubt that, if a 12-year-old from Nebraska called the NOC
at AT&T and asked for a list of all their network failures in the past
two years, the NOC person would feel obliged to spend their time on
it.  Furthermore, if that NOC tech could be helping to fix the
problem, and I were a customer, I'd be upset that he is wasting time
chatting on the phone with a non-customer.  NOCs have limited
resources.  More importantly, they often don't know what's wrong until
after it was fixed, and sharing what may be a wrong assessment with
people who have no vested interest in the problem is asking for a lot
more trouble, especially since they probably will never know or care
what the real solution was.

-Dave





Re: Allegiance telecom boston colo down?

2003-03-28 Thread Dave Israel

On 3/28/2003 at 14:02:36 -0500, Sean Donelan said:
> 
> On Fri, 28 Mar 2003, Dave Israel wrote:
> > I do.  But I won't discuss it in this forum.
> >
> > My best advice in general, is when you have a backbone problem with
> > Allegiance, call the NOCC (866 696 2794, options 3,1,4).  They've got
> > the most data on that, and if you're a customer of Allegiance, they'll
> > gladly share.
> 
> And if you're not a customer...

...then if you have a good reason to ask, they'll help you, and if
not, they won't.  This should not surprise anybody; that's how NOCCs
are.



Re: Allegiance telecom boston colo down?

2003-03-28 Thread Dave Israel


I do.  But I won't discuss it in this forum.

My best advice in general, is when you have a backbone problem with
Allegiance, call the NOCC (866 696 2794, options 3,1,4).  They've got
the most data on that, and if you're a customer of Allegiance, they'll
gladly share.

-Dave


On 3/28/2003 at 13:42:26 -0500, Eric Gauthier said:
> 
> Heya,
> 
> We've got a business unit hosted in Allegiance Telecom's boston colo
> that's been down for a bit and all they can get out of Allegiance is
> "um... we're not sure what's going on".  I'm guessing that boston.com,
> which is also down, is affected by this...
> 
> If you go to the Allegiance Telecom looking glass 
> (http://nitrous.digex.net/mae/mae-lg.html) and enter an IP from their
> colo you get a "network not in table" so my guess is that the colo
> is FUBAR...
> 
> Anyone know whats up?
> 
> Eric :)

-- 
Dave Israel
Senior Manager, Backbone Eng
Allegiance Telecom


Re: [OT: FW: About your using mailer]

2003-03-28 Thread Dave Israel


I got one, and my mailer is compliant.

Maybe he's confirming e-mail addresses for spam?

On 3/28/2003 at 13:01:00 -0500, Joshua Smith said:
> 
> i got one too - i was going to ask if anyone else minded that my
> mua was fully rfc 2822 compliant (before telling usa.net that they
> have to rewrite their webmail app)...
> 
> i like how the examples cited are crap-html/mime oriented (msn, 
> exchange, and aol?)
> 
> Mike Damm <[EMAIL PROTECTED]> wrote:
> > 
> > 
> > Is anyone else getting this junk regarding the list? And can we put a stop
> > to it?
> > 
> > Granted in a perfect world everyone runs software throughout the entire
> > enterprise that is on the bleeding edge of the latest proposed standards,
> > but some of us only have so big of a budget.
> > 
> > ---
> > Michael Damm, MIS Department, Irwin Research & Development
> > V: 509.457.5080 x298 F: 509.577.0301 E: [EMAIL PROTECTED]
> > 
> > 
> > -Original Message-
> > From: Miyoko Shioda [mailto:[EMAIL PROTECTED] 
> > Sent: Friday, March 28, 2003 9:30 AM
> > To: Mike Damm
> > Subject: Re: About your using mailer
> > 
> > 
> > dear Mike Damm,
> > 
> > Sorry, I am talking about NANOG mailing list.
> > Please please change your MUA in mainling list...
> > 
> > Regards,
> > 
> > On Fri, 28 Mar 2003 09:28:17 -0800
> > Mike Damm <[EMAIL PROTECTED]> wrote:
> > 
> > > What mailing list are you talking about?
> > > 
> > > ---
> > > Michael Damm, MIS Department, Irwin Research & Development
> > > V: 509.457.5080 x298 F: 509.577.0301 E: [EMAIL PROTECTED]
> > > 
> > > 
> > > -Original Message-
> > > From: Miyoko Shioda [mailto:[EMAIL PROTECTED] 
> > > Sent: Thursday, March 27, 2003 5:16 PM
> > > To: [EMAIL PROTECTED]
> > > Subject: About your using mailer
> > > 
> > > 
> > > Hi,
> > > I read your messages in mailing list.
> > > 
> > > Your using mailer(MUA) does not seems to support In-Reply-To nor
> > References
> > > field. These field is defined in RFC-2822.
> > > If these field does not be outputted when you reply, tree construction
> > > will be break every time you post the messages to mailing list.
> > > It is inconvenient for the others.
> > > 
> > > Please please change your mailer for the public good,
> > > at least when you post to mailing list.
> > > 
> > > Today almost mailers support these field(at least In-Reply-To)
> > > except for the following mailers.
> > > 
> > > MSN hotmail
> > > Exchange Server <= 2000 (Exchange Server 2003 will support In-Reply-To.)
> > > Lotus Notes < 6.0
> > > MIME-Tools
> > > AOL mailer
> > > dtmail
> > > Novell GroupWise
> > > foxmail
> > > 
> > > regards,
> > > 
> > > --
> > > Miyoko Shioda
> > > [EMAIL PROTECTED]
> > > 
> > 
> > -- 
> > Miyoko Shioda <[EMAIL PROTECTED]>
> > 
> 
> 
> 
> "Walk with me through the Universe,
>  And along the way see how all of us are Connected.
>  Feast the eyes of your Soul,
>  On the Love that abounds.
>  In all places at once, seemingly endless,
>  Like your own existence."
>  - Stephen Hawking -

-- 
Dave Israel
Senior Manager, Backbone Eng
Allegiance Telecom


Re: how to get people to upgrade? (Re: The weak link? DNS)

2003-03-26 Thread Dave Israel

On 3/26/2003 at 08:31:40 -0800, Bill Woodcock said:
> 
>   On 26 Mar 2003, Jeffrey C. Ollie wrote:
> > What I would like to see is somewhat of the idea in
> > reverse.  The ISC would host a zone that would contain TXT records with
> > security/bug advisories for every version:
> 
> I really like this solution.  It seems clean and unobjectionable, while
> getting the job done.

Plus, it is expandable to other common services that might want this
service, like sendmail or OpenSSH.




Re: how to get people to upgrade? (Re: The weak link? DNS)

2003-03-26 Thread Dave Israel

On 3/26/2003 at 15:24:18 +, Paul Vixie said:

[snip]

> so here's a proposal.  we (speaking for ISC here) could add a config option
> (default to OFF) to make bind send some kind of registration packet at boot
> time, containing an e-mail address for a technical contact for that server,
> and perhaps its hostname as well.  the destination would be configurable, and
> the format would be open, and we would include in the distribution a tool
> capable of catching these.  any campus/WAN admin who wanted to run their own
> "BIND registration system" could do so.  anyone who wanted to simply config
> their server to send registration data to ISC could do so.  for data received
> at ISC, we'd (a) keep it completely private other than public statistics,
> (b) clean it of obvious trash (some people will sent registration data for
> [EMAIL PROTECTED] just for fun; we know that), and (c) use the contact
> information only in the event that a security defect discovered in that
> version.  remember, the default would be OFF.

I'm not sure this helps.  The people who don't subscribe or pay
attention to CERT advisories are the same ones that won't turn this
option on.  It is like the cache option in Apache; the people who
would get the most benefit, the ones with mainly static web pages, are
the same ones who do not know to turn it on.

-Dave



Re: OT: Notebooks /w a serial port?

2003-03-21 Thread Dave Israel


There are relatively cheap USB-to-serial devices.  That's worked
pretty well for me.

On 3/21/2003 at 16:46:51 -0500, Drew Weaver said:
> 
>   Seems like these are all but extinct, but does anyone know of a
> 'new' notebook that has a serial port built onto it? I've found some that
> have port replicators, but that can be a pain when you need to serial into a
> router or some other device. What do you guys use?
> 
> -Drew

-- 
Dave Israel
Senior Manager, Backbone Eng
Allegiance Telecom


Re: 923 Mbps across the Ocean ...

2003-03-07 Thread Dave Israel

On 3/7/2003 at 15:50:40 -0500, Steve Goldstein said:
> At 8:34 PM + 3/7/03, Stephen J. Wilcox wrote:
> >So whats good about this?
> 
> 923 Mbps with TCP.  --S

According to CNN:

"Scientists were able to get 93 percent efficiency out of their
record-setting connection because they didn't have to share bandwidth,
they received donated equipment in excess of $1 million and they
changed the setting of Internet protocols to allow faster data
transfers, Newman said."

So, you turn down/off all the parts of TCP that allow you to share
bandwidth properly, crank up the window and packet sizes, and
suddenly, TCP is pretty damn efficient for a one-way transfer.
There's no real "science" here.  This is a geek publicity stunt.


-Dave



Re: 923 Mbps across the Ocean ...

2003-03-07 Thread Dave Israel

On 3/7/2003 at 14:57:22 -0500, Eric Germann said:
> 
> 
> http://www.cnn.com/2003/TECH/internet/03/07/speed.record/index.html
> 
> Comments folks?

Yeah.  Give me a million dollars, plus fiber from here to anywhere,
and let me muck with the TCP algorithm, and I can move a gig-e worth
of traffic, too.

-Dave



Re: RIPE Down or DOSed ?

2003-02-27 Thread Dave Israel


On 2/27/2003 at 10:44:49 -0800, Will Yardley said:
> 
> On Thu, Feb 27, 2003 at 11:09:19AM -0500, [EMAIL PROTECTED] wrote:
>  
> > And on a related topic (whois.ripe.net almost unreachable, along with
> > the rest of RIPE): rwhois.level3.net:4321 as been MIA or AWOL for
> > about 4 days: Level3 was informed, but seems to have some good reasons
> > of their own not to fix this
>  
> > $ telnet rwhois.level3.net 4321
> > Trying 209.244.1.179...
> > telnet: Unable to connect to remote host: Connection refused
> 
> There is no public access to rwhois.level3.net (it worked at one point,
> but, accurding to Level3, not intentionally). They say that they don't
> have to make this information available to anyone except ARIN. I was
> always under the impression that delegations had to be publicly visible,
> but looking at ARIN's policy more closely, it seems that the information
> only has to be available to ARIN.

If the ARIN server recurses properly, you should be able to pull it
out that way.  So hiding it from everybody but ARIN doesn't make the
information unavailable.  They're probably sheltering themselves from
security concerns in the server.

-Dave



Re: 18.0.0.0/8

2002-12-20 Thread Dave Israel

On 12/20/2002 at 13:11:56 -0500, Joe Abley said:
> 
> 
> On Friday, Dec 20, 2002, at 13:02 Canada/Eastern, jcvaraillon wrote:
> 
> > 4Today the network 18.0.0.0/8 disappeared from the Internet, it is now 
> > reachable.
> >  
> > I went to different looking glass (MAE East, LINX, GRnet) and 
> > 18.0.0.0/8 was not in their routing table.
> >  
> > Is it related to a major problem?
> 
> Yes. Not enough people understand RFC1918.

Including me, apparently, since RFC1918 makes no mention of 18/8.
And including MIT, probably, since that's their /8.

Unless somebody between MIT and the outside world screwed up something
involving RFC1918, and you're just being cryptic?



Re: UUNET is not the Internet (and neither is AOL)

2002-10-07 Thread Dave Israel


On 10/5/2002 at 12:30:36 +, Tim Thorne said:
> After reading all the stories about what supposedly happened does
> anyone know what really happened? Did UUNet US really do an IOS
> upgrade on a sizable proportion of their border routers in one go?
> This seems like suicide to me. What possible reason could there be for
> a network-wide roll out of an untested IOS apart from being in the
> mire already?

The assumption that it was untested is probably an unfair one.  Once a
network reaches a certain size, it is very difficult to simulate it in
a lab.  Number of routes/updates, variety of packet destinations,
different card revisions and layouts...  heck, even statistically, you
have problems.  An issue that appears 5% of the time will only show up
in a a 10-router test lab half the time, but in a 400-router network
it'll pop up on about 20 routers and wreck your whole day.  And when
you're out of cash, you can't really afford to devote lots of hardware
to a lab.

I'm not saying that their testing procedures were correct, or that they
tested the image as well as they could have... but the assumption that,
if it blew up in the field it must not have been tested at all probably
isn't accurate.

-Dave





Re: IP address fee??

2002-09-06 Thread Dave Israel


On 9/6/2002 at 13:18:54 -0400, Richard A Steenbergen said:

> And half the internet's users type "u r kewl", and think that ethernet is
> a broadband connection.
> 
> Just because a misconception is popular doesn't mean we should indulge it. 
> :)
> 
> Think of it as a public service, if you make an effort to say "/24", and 
> someone asks and you explain it, thats one less confused person 
> circulating around teaching others.

Think of it as a service towards your own future, too.  An awful lot
of the new protocols and services arise out of college environments,
and hence the proliferation of protocols that work fine in a campus
network but somehow just don't fly in the "real" world.




Re: Vulnerbilities of Interconnection

2002-09-06 Thread Dave Israel



[EMAIL PROTECTED] said:

>Taking out an a collo would more than just increase time to download porn
>for a few days.

and went on to say:

> > > Is there a general consensus that cyber/internal attacks are more
> > > effective/dangerous than physical attacks.  Anecdotally it seems the
> > > largest Internet downages have been from physical cuts or failures.
> > 
> > It depends on what you consider and internet outage. Or how you define
> > that. IMHO.
> 
> Lets bring this discussion to a some common ground -
> 
> What kind of implact on the global internet would we see should we observe
> nearly simultaneous detonation of 500 kilogramms of high explosives at N of the
> major known interconnect facilities? 

The answer to the first thing is "Yes, it would be back at full speed
in 24 hours" and the second thing is "Unless N is unreasonably large,
not much."  The reason is that people like us work on running the
internet.

In case 1, suppose I am a porn magnate.  (Obviously, I am not, or I
would dress better and work less, but stay with me for a moment.)  I
sell two products: pictures, and online strippers.  The pictures are a
static gold mine, so chances are, I have them backed up.  The
strippers are at a studio near my hosting/colocation site, and
backhauled via your favorite fiber-based protocol.  I get a call
saying, "Hey, a terrorist from group X walked into the colo facility
with a 12008 chassis filled with plastique, and, well, the entire site
is a charred hole in the ground."  After a few seconds of horror,
greed takes over, and I call other nearby providers to see who can get
me back up today, pay the telco a nice hefty fee to reroute my SONET
connection to that provider, and the money is rolling in before
sunset.

In case 2, suppose it is 4 major peering points.  No big deal for the
bulk of traffic, because the bulk of traffic goes between the big
players, and they are all privately peering.  So are many of the
medium-sized folks.  Smaller folks often buy transit from a larger
provider to reach everybody they cannot peer with.  And even if you
don't buy transit and don't have overseas peering and lose your
connectivity because they picked your 4 favorite sites, you're not
going to be down for long, because somewhere, you are close enough to
a UUnet or a AT&T or a Level 3 who can toss you a cable until you can
get back on your feet.

Yeah, an attack can make the Internet uncomfortable and cause a lot of
scurrying and odd deals, but the provider who is completely screwed by
an attack on 1 colo or 4 peering points is going to be an exception,
not the rule.

-Dave




RE: Vulnerbilities of Interconnection

2002-09-05 Thread Dave Israel



My explanation accounts for suicide bombers in the statement: "Even
terrorist that will die to kill will probably not die to
inconvenience."  This does not presume a western value system, either,
as somebody suggested.  Many a terrorist will gladly give their lives
to destroy a hated enemy, or to terrify them, or to change their way
of life.  I cannot believe, however, that there are people who will
give their lives to increase the download times for porn for a few
days.

-Dave

On 9/5/2002 at 13:49:29 -0700, Al Rowland said:
> To reinforce a dissenting opinion, And your explanation accounts for
> suicide bombers how? I would think a smoking hole in the ground
> containing a train or whatever, particularly if lose of life is
> involved, would be much more appealing to the motivations of most
> terrorists than a couple of computers with blue screens of death. I
> would think 9-11 would provide a compelling example of current terrorist
> practice.
> 
> Just my 2¢
> 
> Best regards,
> _
> Alan Rowland
> 
> -Original Message-
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of
> Dave Israel
> Sent: Thursday, September 05, 2002 1:29 PM
> To: [EMAIL PROTECTED]
> Cc: Dave Israel; [EMAIL PROTECTED]; [EMAIL PROTECTED]
> Subject: Re: Vulnerbilities of Interconnection
> 
> 
> 
> On 9/5/2002 at 16:01:02 -0400, [EMAIL PROTECTED] said:
> > > 
> > > The thing is, the major cuts are not "attacks;" the backhoe 
> > > operators aren't gunning for our fiber (no matter how much it seems 
> > > like they are).  If I wanted to disrupt traffic, intentionally and 
> > > maliciously, I would not derail a train into a fiber path.  Doing so
> 
> > > would be very difficult, and the legal ramifications (murder, 
> > > destruction of property, etc, etc) are quite clear and severe.  
> > > However, if I ping-bomb you from a thousand "0wn3d" PCs on cable 
> > > modems, I never had to leave my parents' basement, I'm harder to 
> > > trace by normal police methods, and the question of which laws that 
> > > can be applied to me is less clear.
> > 
> > This fails to address how this affects someone who has no problem with
> 
> > legal ramfications - i.e. a terrorist.
> 
> Even a terrorist will tend towards things that allow him to continue to
> be a terrorist.  If I can do X amount of damage, and get caught, or do X
> amount of damage, and not get caught, then he'll do the second. Even a
> terrorist that will die to kill will probably not die to inconvenience.
> 
> 
> 

-- 
Dave Israel
Senior Manager, DNE SE



Re: Vulnerbilities of Interconnection

2002-09-05 Thread Dave Israel


On 9/5/2002 at 16:01:02 -0400, [EMAIL PROTECTED] said:
> > 
> > The thing is, the major cuts are not "attacks;" the backhoe operators
> > aren't gunning for our fiber (no matter how much it seems like they
> > are).  If I wanted to disrupt traffic, intentionally and maliciously,
> > I would not derail a train into a fiber path.  Doing so would be very
> > difficult, and the legal ramifications (murder, destruction of
> > property, etc, etc) are quite clear and severe.  However, if I
> > ping-bomb you from a thousand "0wn3d" PCs on cable modems, I never had
> > to leave my parents' basement, I'm harder to trace by normal police
> > methods, and the question of which laws that can be applied to me is
> > less clear. 
> 
> This fails to address how this affects someone who has no problem with legal
> ramfications - i.e. a terrorist.

Even a terrorist will tend towards things that allow him to continue
to be a terrorist.  If I can do X amount of damage, and get caught, or
do X amount of damage, and not get caught, then he'll do the second.
Even a terrorist that will die to kill will probably not die to
inconvenience.





Re: Vulnerbilities of Interconnection

2002-09-05 Thread Dave Israel
t;building that houses the facility, multiple carriers use the same 
> > manholes>for their diverse fiber and so on.
> > 
> > Fine - we both agree that no transport provider is entirely 
> > protected from 
> > physical tampering if its fiber travels through insecure 
> > passageways. Note 
> > that some transport capacity into an IX doesn't necessarily travel 
> > along 
> > the same path as the metro providers, particularly those IXes 
> > located 
> > outside a metro region. There are also a multitude of paths, 
> > proportional 
> > to the # of providers still around in the metro area, that provide 
> > alternative paths into the IX. Within an IX therefore is a 
> > concentration of 
> > alternative providers,  and these alternative providers can be 
> > used as 
> > needed in the event of a path cut.
> > 
> > 
> > > > 2) It is faster to repair physical disruptions at fewer 
> > points, leveraging
> > > > cutovers to alternative providers present in the collocation 
> > IX model, as
> > > > opposed to the Direct Circuit model where provisioning additional
> > > > capacities to many end points may take days or months.
> > >
> > >This again is great in theory, unless you are talking about 
> > someone who
> > >is planning on taking out the IX not accidently, but 
> > deliberately. To
> > >illustrate this, one just needs to recall the infamous fiber cut 
> > in McLean
> > >in 1999 when a backhoe not just cut Worldcom and Level(3) 
> > circuits, but
> > >somehow let a cement truck to pour cement into Verizon's manhole 
> > that was
> > >used by Level(3) and Worldcom.
> > 
> > Terrorists in cement trucks?
> > 
> > Again, it seems more likely and more technically effective to 
> > attack 
> > internally than physically. Focus again here on the cost/benefit 
> > analysis 
> > from both the provider and disrupter perspective and you will see 
> > what I mean.
> > 
> > 
> > >Alex
> > 
> > 
> > 
> 

-- 
Dave Israel
Senior Manager, DNE SE



RE: Broadening the IPv6 discussion

2002-08-29 Thread Dave Israel



Mmmm... me too post.

I have to agree with Dan on this.  The only people who ask me about
IPv6 are people who have heard something about it from some tech
magazine and want the Newest Thing.  Much of its useful functionality
(except the widened address space) is available in v4, and v4 is
deployed.  

There is no commercial demand for a v6 backbone.  That's the big
roadblock right now.

-Dave

On 8/29/2002 at 11:05:49 -0400, Daniel Golding said:

> Hmm. I'm afraid that I have to disagree with just about everything you've
> said :) . I haven't seen any enterprise folks demanding v6 - If VOIP and
> PDA's (?) use up their IP addresses, they can easily ask for more. The more
> you use, the more you get. There is no shortage of v4 space.
> 
> China and Japan are not mandating anything, AFAIK. I believe that v6
> deployment is being encouraged by some countries, and the spread of 3G is
> helping things along, but we have yet to see really widespread v6
> deployments anywhere.
> 
> Basically, major backbone networks will deploy v6 when it makes economic
> sense for them to do so. Right now, there is no demand and no revenue
> upside. I don't expect this to change in the near future.
> 
> v6 is, currently, a solution in search of a problem. v4 space is being
> consumed slowly, but we are quite some time from a crisis. Of course, even
> when we "consume" all such ipv4 space, there are still expedients that can
> be used, including making v4 assets tradable and fungible.
> 
> - Dan
> 
> Irwin Lazar Said...
> >
> >
> >
> > Since we're on the topic of IPv6, I wanted to gauge the current
> > attitude of
> > the ops. community toward its deployment.  We're seeing a lot
> > more interest
> > from our enterprise clients in using v6, especially as things
> > like VoIP and
> > PDAs consume their address pools, and NAT gets in the way of collaborative
> > apps such as netmeeting and business-to-business connectivity.
> > However, the
> > road-block seems to be the lack of ISPs that offer IPv6 services.
> >
> > Given that places like China & Japan are now mandating IPv6 for
> > their ISPs,
> > does anyone see anything resembling a growing momentum toward
> > IPv6 adoption,
> > or is it still a moot issue for you guys?
> >
> > Irwin
> >
> 



RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Dave Israel



Gary,

  Not sure what you have against this thread, since it is not an
anti-spammer rant, but an operational discussion about proposed
methods of controlling a major network application.  If this kind of
plan is acted on, it will affect every major internet-connected
network, and therefore seems to be precisely in the charter of NANOG.

  Besides, if you have a good mailer, one keystroke will make it all
go away.

-Dave

On 8/21/2002 at 17:01:35 -0700, Gary E. Miller said:

> I hearby proclaim all spammers to be like nazi propagandists and invoke
> godwins law to terminate this thread.
> 
> RGDS
> GARY
> ---
> Gary E. Miller Rellim 20340 Empire Blvd, Suite E-3, Bend, OR 97701
>   [EMAIL PROTECTED]  Tel:+1(541)382-8588 Fax: +1(541)382-8676
> 
> 

-- 
Dave Israel
Senior Manager, DNE SE



Re: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Dave Israel



The problem with SSL is it doesn't include certificate chain to
arbitrary authorities.  However, there's a space for web of trust in
SSL, I believe, so yeah, a new verison of SSL might be just the ticket.

On 8/22/2002 at 00:02:24 +0300, Petri Helenius said:
> 
> >
> > Treat them sort of like SSL certs now.  Charge an annual registrar fee
> > per company, not per server. (Something like $100 a year)  The more they
> > have to go out of their way to get their spam server online, the more
> > they would be deterred to do so.  They're only going to want to change
> > so many ISP's, go through SWIP and then change their legal name for the
> > registrar so many times.
> >
> Why don´t you just start using SSL certs with SMTP ? The protocol is there,
> ways to get certificates are there, no need to start smoothing a square
> piece
> to make a new wheel.
> 
> Pete
> 
> 



RE: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Dave Israel



Wow.  I turned my back on this thread to move to my new office,
and it got interesting.

The answer to your quesiton is, the cert itself can do this, if it
includes a unique/semi-unique identifier, such as an SSN, a name and
address, etc.  Many governments give their people some unique
identifier.  You sign up for my service and say you wanna send mail, I
say, "Sure!  Lemmie just check your ID against the revocation list..."

-Dave


On 8/21/2002 at 15:11:59 -0400, Mark Segal said:
> 
> > It's almost to the point to where mail servers need their own 
> > "registrar", sort of the way domains are tracked now, track 
> > mail servers.  Give mail server admins the option to accept 
> > mail from registered mail servers only or from any mail 
> > server.  Of course there would need to be a ramp up period, 
> > like six months to a year, to make sure all of your mail 
> > servers are registered.  And of course one should only be 
> > able to register mail servers if the IP space is actually 
> > SWIP to them.  If the IP space is NOT SWIP, it would need to 
> > be registered by the customer ISP or via owners rwhois 
> > server.  Just my $.02; for what it's worth 
> 
> Really good idea (no sarcasm, I actually like it).. But what stops spammers
> from registering their mail server?..Ie..
>   1) Get a dsl account
>   2) Ips get swipped to you
>   3) Register the server
>   4) SPAM 
>   5) Apologize, get a second chance
>   6) get booted off
>   7) Call the next ISP with a zero install
>   8) Rinse and repeat.
> 
> 
> Regards,
> Mark
> 
> --
> Mark Segal
> Director, Data Services
> Futureway Communications Inc.
> Tel: (905)326-1570

-- 
Dave Israel
Senior Manager, DNE SE



Re: IETF SMTP Working Group Proposal at smtpng.org

2002-08-21 Thread Dave Israel



On 8/21/2002 at 10:53:19 -0400, Ron da Silva said:
> 
> On Wed, Aug 21, 2002 at 10:00:02AM -0400, [EMAIL PROTECTED] wrote:
> > 
> > > what are the more basic problems you're trying to fix?
> >
> >  I'd like to be able to publish DNS records announcing my domain's *outbound*
> > mail servers, with nice abbreviated forms to say "they're the same as my
> > inbound (MX) records" or "any IP in x.y.z/24".  Then cooperative ISPs (like say
> > America Online) could refuse any email from my domain that originated from some
> > random cable modem, instead of accepting it and then flooding me with 2
> > bounce messages.
> 
> What about this email from you which came to me from Merit and not your
> mail server?  Would break mailing lists and listserves unless the from
> field is overwritten.

A user/server certification system would be nice, as long as the
certificate issuers held the right balance between ease of getting a
cert and security in proving the identity of the cert holder.  That
would take away the anonymous nature of SPAM, and make enforcement
possible.  If an authority consistently fails to respond to
complaints, you don't accept mail certified from them.  And a
certificate train will get you mail from small folks (I trust ALGX's
CA, ALGX trusts AOL's, therefore AOL will accept my mail until I screw
up, and ALGX revokes my server cert and/or turns me in to the FBI, or
fails to and AOL revokes their trust of ALGX.)

The only down side is the politics involved. 

-Dave



Re: SPEWS?

2002-06-20 Thread Dave Israel



I'll probably get flamed for saying this, but the fact of the matter
is, if SPEWS behavior is abusive towards a network, that network does
have a limited recourse: null-route SPEWS.  Thus, the more providers
they anger, the less network they can reach.  Some users may complain,
but if SPEWS is abusing your customer base, I think it's a valid
response.  It's a powerful threat, and incentive for SPEWs to play
fair.

On 6/20/2002 at 20:33:43 +0100, Chrisy Luke said:
> 
> Steven J. Sobol wrote (on Jun 20):
> > If the offending ISP does not respond, and you have exhausted all avenues
> > available to you to get the ISP to get its customer to stop spamming - 
> > whether by TOS'ing the customer, education or whatever - then escalation 
> > may work if the collateral damage caused by escalation is enough to get 
> > the spammers' neighbors to complain to the ISP.
> 
> Can't find the terrorists you're looking for so start killing bystanders
> until someone submits? Sounds militia to me.
> 
> The service providers are not the enemies. If you treat them like enemies
> then enemies they will become.
> 
> Perhaps we should move mail transfer to a peering model. You wanna send
> email to my SMTP server? Where's the peering contract? BGP-equivalent for
> SMTP anyone?
> 
> -C
> (tired of getting bounces for email I never sent!)




Re: Routers vs. PC's for routing - was list problems?

2002-05-23 Thread Dave Israel



Then why ot boot from a CD-ROM?  Sure, it moves, but only for the
few minutes it takes to boot.  Then it spins down and sits idle for
the n days/weeks/months until the next reboot.  It would probably
last as long as the solid state drive, and would be cheaper.  

The big problem here, of course, is software upgrades.  Personally,
I'd just use a hard drive and initrd (under linux) and leave the hd
controller out of the kernel.  When it comes time to upgrade, reboot
to an alternate kernel that has the hd support code.  But that's more
of a discussion for a Linux list than here.

-Dave

On 5/23/2002 at 18:01:03 -0400, Steven J. Sobol said:
> 
> On Thu, 23 May 2002, E.B. Dreger wrote:
> 
> > SJS> a basic question, but the only EIDE mass-storage devices
> > SJS> I've used are more traditional drives.
> > 
> > Why not partition wisely, then mount the desired partition as
> > read-only?  Or I guess one _could_ mount each partition as RO...
> > 
> > But why?
> 
> The box I want to build is passing packets between the rest of my network 
> (and the public Internet) and one server that will hold sensitive data.
> It'll be a Linux box with the TCP/IP stack running in bridged mode, with
> two ethernet adapters installed. The box just needs to boot up and run. It
> doesn't need to log anything.
> 
> -- 
> Steve Sobol, CTO (Server Guru, Network Janitor and Head Geek)
> JustThe.net LLC, Mentor On The Lake, OH  888.480.4NET   http://JustThe.net
> "In a 32-bit world, you're a 2-bit user/You've got your own newsgroup:
> alt.total.loser"   - "Weird Al" Yankovic, "It's All About the Pentiums"
> 
> 
> 

-- 
Dave Israel
Senior Manager, IP Backbone Engineering



Re: anybody else been spammed by "no-ip.com" yet?

2002-05-03 Thread Dave Israel



Content providers have to recieve and hold spam mail before they
delete it.  People and mailing lists who have well-published addresses
can recieve hundreds of spam messages a day.  I know that, without my
filters, I would easily spend 30-45 minutes a day downloading,
identifying, and deleting spam mail.  Not counting the frustration,
that's costing the company money.

I heard somewhere that ~$2 of an AOL users' monthly bill goes towards
spam management.  (IS there an AOLer who can confirm or deny?)  AOL
has some 10 million users.  That's a lot of dough a month to handle
what appears to be no big deal.  SPAM is a milder version, but it is
no better than if telemarketers called you collect to try to sell you
crap.

-Dave

p.s. Also, if you're a parent, do you think the spammer knows how old
you are before sending you "Teenage Girls Doing Farm Animals! Click
here?" 


On 5/3/2002 at 15:27:08 -0700, Scott Granados said:
> 
> I realize this statement I'm about to make is going to open a huge... 
> can o worms but ... and hoefully everyone knows I mean this in the most 
> friendly responsible way ever but I'm not sure entirely what the big 
> deal with spam is.  Honestly sure I get it like everyone else, in some 
> of my accounts more than others but I also get a real truckload in my 
> snailmail box.  Just as with all the pottery barn catalogs  to pottery barn I guess>:) I have a delete key just like my trash can.  
> I know at one time the argument was made, and quite correctly that 
> people were paying to receive this service and these messages cost them 
> money. Today with flat rate access and many people not paying on a per 
> packet basis it seems to me that the responsibility lies with the end 
> user to filter properly and or dress that delete key.  I always shut 
> down customers who spam and disrupt service simply because I don't want 
> the backlash or want specific ips blocked but in a way I don't feel its 
> right that the carriers do the filtering it seems tome up to the end 
> user.
> 
> On Fri, 3 May 2002, Mitch Halmu wrote:
> 
> > 
> > 
> > On Fri, 3 May 2002, Paul Vixie wrote:
> > 
> > > > I hate to sound like the big idiot here, but what exactly in the email
> > > > you received indicates no-ip.com spammed? It looks to me like you just
> > > > have some secret "admirer" who thought you wanted a no-ip.com account,
> > > > and no-ip.com emailed you to confirm that you do want the account.
> > > 
> > > spam is like pollution in that (a) whenever you're not sure if you're
> > > doing it, you probably are, and (b) if everybody did whatever it is,
> > > life would be universally worse for, well, everybody.
> > > 
> > > > Random disclaimer: Yes, we're a competitor of no-ip.com's... And yes, we
> > > > used to send similar emails to people signing up for an account,
> > > > although nowadays instead of sending them an initial password we send a
> > > > confirm URL instead.
> > > 
> > > that's the right approach.  no-ip's problem was they presumed my permission.
> > >
> > 
> > You don't even have to be in the "big idiot" league to figure out that in 
> > both the "wrong" and the "right" approach as sanctioned above by a higher 
> > authority, an email message (aka spam) is sent to the presumed subscriber.
> > 
> > One sends a password, one asks for permission to issue a password on their
> > site. What's the difference in the annoy factor, if indeed one were to be 
> > subscribed by a secret "admirer"?
> > 
> > Mr. Halmu chose to think, rather than bindly obey...
> > 
> > --Mitch
> > NetSide
> > 
> 

-- 
Dave Israel
Senior Manager, IP Backbone Engineering