Re: ICANN registrar supporting v6 glue?

2007-06-29 Thread Edward Lewis




I'm pretty disappointed now,


Searching the ICANN web site I found this:

http://www.icann.org/committees/security/sac018.pdf

Does anyone know what's been happening in the wake of that document?
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

Think glocally.  Act confused.


Re: ICANN registrar supporting v6 glue?

2007-06-29 Thread Edward Lewis


At 9:23 -0700 6/29/07, Barrett Lyon wrote:


I would like to support v6 so a native v6 only user can still communicate
with my network, dns and all, apparently in practice that is not easy to
do, which is somewhat ironic given all of the v6 push lately.  It also
seems like the roots are not even fully supporting this properly?


Given that the ARIN BoT has published a call to move to IPv6:
 http://www.arin.net/media/releases/070521-v6-resolution.pdf
and that LACNIC and .MX have made these statements:
 http://lacnic.net/en/anuncios/2007_agotamiento_ipv4.html
 http://www.nic.mx/es/Noticias_2?NEWS=220
and ICANN has been studying the issue:
 http://www.icann.org/committees/security/sac018.pdf

What possibly can be done to get the root zone really available on 
IPv6? http://www.root-servers.org/ lists a few root servers as having 
IPv6 addresses, so really means having


for i in a b c d e f g h i j k l m; do dig $i.root-servers.net  
+norec; done


return at least one  in the answer section.

What's the hold up?  What's getting worked on?  Is there a 
dns-root-on-ipv6-deployment task force anywhere?  Is there someone 
that can give an authoritative update on where we are on the road to 
being able to accomplish what is requested above?  Part of my 
reaction is to the quip given all of the v6 push lately juxtaposed 
with NANOG 40 that barely mentioned IPv6 in the agenda.


If we can't get one application (DNS) to do IPv6 how can we expect 
the ISPs to just up and deploy it?  I would suspect that getting the 
roots - or just some of them - to legitimize their IPv6 presence 
would be easier than getting ISPs rolling.

--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

Think glocally.  Act confused.


Re: The Choice: IPv4 Exhaustion or Transition to IPv6

2007-06-28 Thread Edward Lewis


At 17:42 +0100 6/28/07, Stephen Wilcox wrote:


- that less than 50% of the v4 space is currently routed. scarcity will
presumably cause these non-routed blocks to be:
 :- used and routes
 :- reclaimed and reassigned
 :- sold on


There's also the possibility:

  :- continued to be used as they are, just not seen on the Internet.

Unrouted address space isn't always missing matter.

(E.g., see GSMA PRD IR.40, http://www.gsmworld.com/documents/ireg/ir4040.pdf)
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

Think glocally.  Act confused.


why same names, was Re: NANOG 40 agenda posted

2007-05-29 Thread Edward Lewis


At 8:22 -0700 5/29/07, David Conrad wrote:

Jordi,

On May 29, 2007, at 6:50 AM, JORDI PALET MARTINEZ wrote:

 This is useless. Users need to use the same name for both IPv4 and IPv6,


Why?

The IETF chose to create a new protocol instead of extending the old protocol.
Even the way you ask for names is different (A vs. ). Why should anyone
assume a one-to-one mapping between the two Internets based on those 
protocols?


I'll take a stab at why?

First - the way you ask for names is not different at the 
application level, it is different in the layer in which you find 
where to shoot packets.  It's like paying at a cash register - you 
pay but by cash, charge, atm, ...


But why need - okay, need is a strong word, but, if the user is 
coming from a search engine result page, the search engine is going 
to hand a URL with a machine name.  The search engine doesn't know if 
the user to service has a v6 pipe (or a v4 pipe even), so the URL 
won't be customized for v4/v6.


If the user types in the domain label (like nanog) and the 
application then adds on TLDs and such, the application would have to 
try the likely set of IPv6 labels to pre-pend.


As far as any other encoding of the name, whether IPv6 is working is 
something that the encoder cannot know as the code will probably be 
run from different points of the collective IP4 and IP6 network.


OTOH - in the presentation I gave in May '04 (three years ago - and I 
didn't think it was pioneering even then, but who knew) I did have 
some gotchas about using the same name.

--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

Sarcasm doesn't scale.


Re: Interesting new dns failures

2007-05-21 Thread Edward Lewis


At 3:50 PM -0500 5/21/07, Gadi Evron wrote:


As to NS fastflux, I think you are right. But it may also be an issue of
policy. Is there a reason today to allow any domain to change NSs
constantly?


Although I rarely find analogies useful when trying to explain 
something, I want to use one now to see if I understand this.


Let's say you rob convenience stores as a career choice.  Once your 
deed is done, you need to get away fast.  So moving fast is a real 
help to criminals.  Since moving fast is rarely helpful for decent 
folk, maybe we should just slow every one down - this certainly would 
make it easier for law enforcement to catch the criminals.


If the above is not an accurate analogy to the NS fastflux issue, I'd 
like to know what the deviations are.  I don't doubt there are any, 
but from what little I've gathered, the problem isn't the NS fastflux 
but the activity that it hides - if it is indeed hiding activity.  As 
in, not every one speeding around town is running from the law.

--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

Sarcasm doesn't scale.


Re: UK ISP threatens security researcher

2007-04-19 Thread Edward Lewis


At 18:30 -0500 4/17/07, Gadi Evron wrote:

http://www.theregister.com/2007/04/17/hackers_service_terminated/

A 21-year-old college student in London had his internet service
terminated and was threatened with legal action after publishing details
of a critical vulnerability that can compromise the security of the ISP's
subscribers.


I don't see any part of the story that indicates that the ISP did 
wrong, I see plenty that the student did wrong.  E.g., did the 
student ever try to discreetly raise the issue with the ISP before 
going public?

--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

Sarcasm doesn't scale.


Re: UK ISP threatens security researcher

2007-04-19 Thread Edward Lewis


At 11:32 -0700 4/19/07, Owen DeLong wrote:

Being that I know nothing more than what is in the article, I will go 
along with the assessment that the ISP could have done a better job 
in running their network.  But I don't think that their reaction is 
uncalled for (given again that the article is all that I have to go 
on).



He was definitely in a gray area and could have handled things better,
but, the ISPs actions are way over the top and beyond reason for the
situation in question.


The article fails to mention whether the student did try to use 
proper channels.  Perhaps he did - that would change my assessment. 
Passing judgement on so little data - and data in the press at that - 
is only as good as, well, the data presented.


Employing official channels is preferable to public humiliation. 
Complaints that postmaster@ isn't set up correctly take on bigger 
importance when we can say we tried to contact you via proper 
channels but then had to take our complaint public.


When I hear about such stunts, I wonder if the student did this all 
for self-promotion.

--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

Sarcasm doesn't scale.


Re: Every incident is an opportunity

2007-02-13 Thread Edward Lewis


At 5:12 + 2/13/07, Paul Vixie wrote:

[EMAIL PROTECTED] (Barry Shein) writes:


 ... If your goal is invasion then value preservation is important
 (factories, bridges, civilian infrastructure, etc.) ...


so if the last remaining superpower were to bomb a country in the middle
east in preparation for invasion, regime change, etc., that superpower
would be well advised to avoid hitting civilian infrastructure, assuming
that its bombs were smart enough to target like that?

(i'm sorry, but your theory doesn't sound plausible given recent events.)


What theory is plausible?  DNSSEC even sounded good on the drawing board. ;)

I think that war strategists have always only wanted to attack the 
other side's war machine and political machine.  (Said 
sarcastically:) A bullet in a civilian is a waste of metal after all. 
The problem is that theory and operations don't mesh well.


A bomb that killed only warriors and their infrastructure and left 
schools and  children safe is as likely to exist as an electronic 
messaging protocol that prevented spam but let good email through. 
(How's that at trying to come back to being on topic?)


--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

Two years ago you said we had 5-7 years, now you are saying 3-5.  What I
need from you is a consistent story...


motivating security, was Re: Every incident...

2007-02-12 Thread Edward Lewis


I've worked in security for some time, not that it makes me an expert 
but I have seen how it is promoted/advertised.


On Feb/12/07, someone wrote:


Consumers are cheap and lazy.


I think that is the wrong place to start.  It isn't the consumer's 
fault that they have a device more dangerous than they think.  Look 
at what the are being sold - a device to store memories, a device to 
entertain them, a device to connect with people they want to talk to.


Everyone economizes on what they think is unimportant.  A consumer 
doesn't care for the software, they care for the person on the other 
side of the connection.  They care about the colors in the office, 
the taste of the food, etc.  So it may appear they low-ball that 
part of the computer equation.


My point is that it is convenient to blame this on the consumers when 
the problem is that the technology is still just half-baked.



What they need is a serious incentive to care about security.


I find this to be a particularly revolting thought with regards to 
security.  Security is never something I should want, it is always 
something I have to have.  Not need but something I am resigned to 
have to have.  This is like saying folks will have to die before a 
traffic signal is put here or more planes will have to be taken by 
hijackers before the TSA is given the funding it needs.  Security 
shouldn't wait for a disaster to promote it - you might as well be 
chasing ambulances.  Security has to resign itself to being 
second-class in the hearts and minds of society.  Security has to be 
provided in response to it's environment and not complain about it's 
lot in life.


(I realize that this post doesn't say anything about people dying - 
I've heard that in other contexts.)



Society holds individuals accountable for many forms of irresponsible
behaviour.


This is true, but individuals are not held entirely accountable.  A 
reckless driver can cause a multi-car accident on an exit ramps and 
cause a tie up for the entire morning rush.  Are the victims of 
this compensated?  What about the person who loses a job offer 
because of a missed interview and suffers fallout from that?


And maybe it isn't recklessness.  A failed water pump may cause a 
breakdown, followed by an accident, etc.  Mentioned just to spread 
the analogy out.



There's no need to make exceptions for
computer users. Make computer-owners/users pay in full for damages
caused by their equipment with no discount for incompetence.


If that happened, then computer users would be the exception.  I 
can't think of any situation in which an accident might occur and the 
one causing the accident pays in full to everyone.



Insecure
products might then be considered inappropriate for public consumption
and that would be a powerful signal to the IT industry to change their
ways. Maybe the market also finally would challenge the validity (or
even existence) of std.disclaimer statements common in today's software
licences.


I used to work for a gov't facility whose mission was science.  They 
had a serious telecommunications problem on their hands.  Although it 
was important to solve, they funded science first - up until all the 
telecom problems became too annoying and money was allocated to 
solve the problem.  There are IT security problems.  But there are 
other priorities in life.  Instead of complaining that IP security is 
under appreciated, the case has to be made that the situation is more 
serious than some other problem.  If that case can't be made, than 
may be IT security is not that big if a deal (to anyone other than 
you).


Don't get frustrated, present a better case.  And be prepared that 
you still may not win.  But never wish ill-will (as serious 
incentive alludes to) on someone to prove your point.


BTW-This isn't meant to be a critique on one message.  It's my 
reaction to quite a few messages that are similar and to some 
comments I have heard.  Sorry if it seems like I'm attacking a single 
messenger.


--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

Two years ago you said we had 5-7 years, now you are saying 3-5.  What I
need from you is a consistent story...


Re: motivating security, was Re: Every incident...

2007-02-12 Thread Edward Lewis


At 14:59 + 2/12/07, Alexander Harrowell wrote:


The whole logic of modern computing is that everything migrates towards
users. Why shouldn't security? After all, if people didn't let the nasties
in, 'twould be very hard to start a botnet..


Regarding letting the users in there was a story on the news while 
we were meeting in Toronto.  A woman put her child in her car while 
it was warming and then went back into the house for 10 seconds.  A 
thief jumped in the car, drove a while, crashed and fled the scene, 
stealing another car (that was also idling) to get away.  The TV 
reports were very sympathetic to the woman and her husband (who was 
painted a hero for chasing down the suspect to the crash).


A week earlier, in the DC metro area, there was a story about the 
police ticketing people for letting their cards idle unattended.  The 
reason for the report was awareness of a new enforcement of the law 
that had been put on the books to stem auto theft in that county. 
One woman was ticketed having left some small children in the car 
while she went back into get one more item.  The reporter asked what 
if someone ran here and just drove off?


What I found interesting is the differences in the way the car owners 
were portrayed.  It's not a US v. Canada thing, but just a point of 
view.  Similarly, are the people who are running exploitable machines 
the cause of the problem or victims of those exploiting the machines?


I don't mean to say that the car owners or computer users are free 
from blame.  But holding a sentiment of just blaming users is not 
helpful.  OTOH, if there was something the operators could clearly do 
to stop this, someone would have suggested it by now.  (There are all 
them laws about snooping traffic, etc.)


I thought I had a conclusion ... but I don't.
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

Two years ago you said we had 5-7 years, now you are saying 3-5.  What I
need from you is a consistent story...


on a different manners topic, was Re: Phishing...

2007-01-03 Thread Edward Lewis


I'm not going to pick on the it's (grammatically correct, but it 
refers the email disclaimers which I don't feel like commenting on) 
but I want to say that I've come to appreciate top-posting.  With 
top-posts, there is no need to scroll down the list, and it is more 
like a conversation than injecting comments in-line.


Some say that top-posting reverses the conversation, but if you are 
thumbing through the archives of top-posted threads, each 
contribution is on the first screen and you can navigate message to 
message in time-order.  In my personal opinion, reading through 
archives of in-lined threads is much more of a problem - for one 
because threads take off in other directions and an in-line 
conversation never stands alone.  Usually with a few nested in-lines 
I loose who said what context too.


(As an exercise, try to prepare a reply in-line and then as a 
top-post.  You will see that in-line means less typing, as you don't 
have to rephrase the question.  In-line is less work to render, but 
I think it is a poor communication style.)


As far as the HTML, I don't think I use it, but I fail to see why 
it's rude.  Sorry, it is newer technology and it does screw up old 
tools.  (I do get bit by it - the hotels seem to love HTML 
confirmations that I can't read on my work mailer.)  It's my/reader's 
choice to not use newer tools.


I do agree that full quoting is a pain - especially when the message 
is less than 1% new content.  Especially when all them new headers 
(DKIM keys and what not) fill up my screen first anyway. Yeah, I 
know, upgrade.


There.  I've said it...oh, and the disclaimers don't give me 
heartburn.  I just ignore them.


At 8:03 -0500 1/3/07, Rich Kulawiec wrote:


Because it's very rude -- like top-posting, or full-quoting, or sending
email marked up with HTML.  Because it's an unprovoked threat.  Because


--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

Dessert - aka Service Pack 1 for lunch.


today's Wash Post Business section

2006-12-20 Thread Edward Lewis


Maybe OT, but surprising enough -

On this link to a graphic printed in today's Washington Post:

http://www.washingtonpost.com/wp-dyn/content/graphic/2006/12/20/GR200612289.html

The #10 google search in the Who Is category (leading off with 
Borat, Hezbollah, EU, hot, ...) is IP Who Is.


I'm not sure what to make of that.  Has google replaced the whois client?

The article for the graphic is on this link:
http://www.washingtonpost.com/wp-dyn/content/article/2006/12/19/AR2006121901471.html
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

Dessert - aka Service Pack 1 for lunch.


Re: today's Wash Post Business section

2006-12-20 Thread Edward Lewis


At 19:31 -0800 12/20/06, Thomas Leavitt wrote:

Many people don't understand anything about how they access the Internet, they
have a vague idea that they need to type a domain name into a box somewhere...
so they type www.myspace.com into the Google search box, the result set pops
up, and then they click on the first result to get to the web site in
question... I've seen it more than once.

Thomas


Yeah, granted anyone looking for myspace might meet that demographic, 
but how many neophytes would use Google for a IP Who Is search? 
That's the listing I thought odd.


--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

Dessert - aka Service Pack 1 for lunch.


Re: IP adresss management verification

2006-11-13 Thread Edward Lewis


At 10:36 -0500 11/13/06, John Curran wrote:


A more interesting question might be:  How does the community think an
RIR should best verify information in the application process today, and
should that change as we approach the IPv4 event horizon?


IRIS. ;)

ARIN is in a tricky place.  It has to be open, fair, efficient, and 
able to keep a secret.  Open - listens to the industry without 
requiring any membership.  Fair - policies apply to all on face 
value.  Efficient - low cost to the industry.  Keeping secrets - 
holding confidential data used to justify resource allocations.


As long as there is trust, the most efficient way is to rely on what 
an applicant (for space) claims.  Once trust breaks down, all sorts 
of verification is needed.


There are two parts to this.  One is what is appropriate for ARIN to 
rely upon to verify an application.  The other is what is an 
appropriate way for a third party to question the allocation of 
resources.


I mentioned IRIS above because it is more or less WhoIs-on-steroids. 
One of it's features is the ability to authenticate the client, 
therefore various clients can be authorized to see different (in 
detail) data.  E.g., to the casual observer, 258.127.3.123 belongs to 
private residence but to ARIN it belongs to Homer Simpson of 
Springfield.   (ARIN can then verify that the addresses in 
258.127.3/24 are assigned to different residences.)


I'm guilty here of throwing out a solution before the problem.  I'm 
doing this to say that although there is a problem (not as in we 
gotta solve this now problem) and it is quite undefined (how does a 
third party appeal an allocation, and how does ARIN defend a 
decision?), we have tools available to work on this already.


Ooh, look, something that looks like a nail.  Let me hit it with my 
IRIS hammer.


--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

I didn't miss the meeting, I left it before I arrived.


Re: Collocation Access

2006-10-23 Thread Edward Lewis




But, I always thought that the purpose of most security was psychological
reassurance anyway...


Reacting to this and the story of just walking through the backdoor to get in -

I think there's an element of self-fulfilling prophecy here.  If the 
legitimate power users of the security system (i.e., the royal 
we/us) don't take it seriously, the security system will be useless 
against the nefarious element.  It might be that the reason security 
is often so poorly implemented is that the job is often left to the 
unmotivated or the untrained (or differently trained - I mean in a 
good way).  Perhaps these folks realize that their tasks are scoffed 
at, further lowering their gruntlement.  (As in disgruntled.)


What would be different if, instead of exploiting the open back door, 
the open back door is pointed out to the folks responsible for the 
facility? I don't mean mentioning this to the security guards who may 
have interests in back doors remaining open and/or just not reported. 
Whether the door was left open on purpose or not, a guard may lose a 
job over it - if the facility management took it seriously.


(What would happen if someone actually obeyed the speed limit in the US?)

One personality trait I find strong in this community is that desire 
to be able to cut through formality and red-tape and to push 
convention aside.  This can be good for quick and productive 
innovation but at the same time detracts from the importance of the 
task at hand.


Security by its nature is not fun, not productive, a drain on 
resources and time.  Security is something we need only because there 
are bad things out there - nefarious activity, inadvertent neglect, 
design flaws, etc.  At best you have to put up with security, don't 
expect to enjoy it.


Arguing about any policy with someone hired to follow it is not 
productive.  The hired can't do much about it, and there is no 
incentive for them to fix their job.  At worst they can lose it by 
wasting time questioning their supervisors.  Concerns about policy 
have to be raised to the level of those who can do something about it 
and have an incentive to fix it.  No one is going to lay out more 
money for no more revenue if there's no other upside to it, that has 
to be kept in mind too.


--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

Secrets of Success #107: Why arrive at 7am for the good parking space?
Come in at 11am while the early birds drive out to lunch.


Re: Need help explaining in-addr.arpa to Limelight

2006-10-23 Thread Edward Lewis


At 18:48 -0400 10/23/06, Joseph S D Yao wrote:


No, because in fact you can.  There is nothing magic about an
in-addr.arpa domain.


I'd say there is some magic.  Possibly.

If an admin were granted the authority for a /25 worth of space, then 
you can't just delegate that part of the in-addr.arpa domain.  That's 
the RFC Joe Abley cited.


A /24 can be delegated (assuming we are talking about 255 addresses, 
from .0 to .255).  Perhaps, and this is weak speculation, the ISP in 
question is not used to SWIPing /24 and has an institutional policy 
of using RFC 2317 in all cases.


As far as the DNS protocol goes, there's nothing different between 
the forward and reverse.  But there are differences in the 
conventions used for placing data.

--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

Secrets of Success #107: Why arrive at 7am for the good parking space?
Come in at 11am while the early birds drive out to lunch.


Re: that 4byte ASN you were considering...

2006-10-10 Thread Edward Lewis


At 9:44 +0100 10/10/06, [EMAIL PROTECTED] wrote:


It breaks any applications which recognize IP address-like
objects by seeing a dot in an otherwise numeric token.


I can't believe grown engineers are afraid of a dot.


We all know that the Internet is awash in homegrown scripts
written in PERL or TCL or bash or Ruby or Python. It is likely


I find that more of a reason to do a change than to leave well
enough alone.  What's gonna happen when all of the current generation (the
writers of the scripts) retire and close the door on their careers?
How will the Internet live on?

Shouldn't a technical beast be able to thrive on technical changes?
But that question isn't germane to the issue at hand.


The real question is what does the notation 1.0 add that the
notation 65536 does not provide?


Fair enough - my answer is it provides the same as the dotted
quad for IP, it makes it easier for human to human conveyance.
It also makes the transition from 2 byte to 4 byte more obvious
in the interim.


If the IETF had really wanted to create a universal notation


The IETF really doesn't want to create anything.  The IETF is
just a forum where folks can gather to discuss an issue like this.
(Pardon my second non-germane comment on this thread.)


When IP addresses were created, it was important to indicate
the boundaries between the network number and the host address.
Originally, the periods represented this boundary for the
three classes of IP address, class A, class B and class C.
Long ago, we removed this classfulness attribute, but the
notation remains because lots of applications expect this
notation. So why on earth are we changing AS number notation
today?


For the same reason - to distinguish the boundaries between what
the old engineers know from what the future young engineers will
take for granted.  The dot would outlast the old engineers just
as the dotted quad persists into the CIDR age.

Why on earth?  Because there aren't [m]any IP addresses on the moon.

--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

Secrets of Success #107: Why arrive at 7am for the good parking space?
Come in at 11am while the early birds drive out to lunch.


Re: rDNS naming conventions (was: Re: SORBS Contact)

2006-08-10 Thread Edward Lewis


At 15:47 + 8/10/06, [EMAIL PROTECTED] wrote:

On Thu, Aug 10, 2006 at 10:21:45AM -0400, Steven Champeon wrote:

 on Thu, Aug 10, 2006 at 01:11:50AM -0700, william(at)elan.net wrote:
  On Aug 9, 2006, at 1:06 PM, Matthew Sullivan wrote:
   
http://www.ietf.org/internet-drafts/draft-msullivan-dnsop-generic-naming-schemes-00.txt

 
  The reason I do not like RDNS naming scheme is because it forces
  one particular policy as part of the name.

 Fair enough. FWIW, I've seen a wide variety of naming schemes (I've
 got a project that collects these as an antispam/anti-botnet measure,
 and so far we've got around 16K conventions documented for 11K domains).


first...  as a draft, it carries ZERO weight. -IF- it becomes an
RFC, its targeted status in INFORMATIONAL, e.g no standard of any kind.
So no one is going to -force- you to implement it.

hum...  why does this draft remind me of the (in)famous WKS RR?
what is WKS?  you know, that RR type that specified  the well known
services running on/at the particular lable.

WKS was depricated, in part due to the fact that black hats would
use WKS to groom thair attack profiles.  Use of the conventions
outlined in this draft would be very useful in building targeted
attacks.  To paraphrase Randy Bush, I encourage all my competition to
implement these guidelines.


Piling on here ...

The effort is to infer the intent of a packet based on ancillary 
data.  The twin dangers here are inference of intent and exposure of 
the ancillary data.


The first part is like asking would I want to have security research 
done by a company on Glenwood Road or on Shady Lane?  (Ya, know 
shady in security.)  Legend has it that one research company moved 
it's location because of this, or maybe it was a joke that came 
afterwards.


The second part is what ancillary data is exposed.  You can require, 
you can request, or you can assume you won't get the data you need. 
Sometimes you won't get it because the giver doesn't want the 
headache of providing it or because the giver is afraid of the 
ancillary data going to nefarious uses.


My point is that inferring intent based on incomplete data is faulty, 
but it seems to be useable in real life.  However, once heuristics 
get encoded in deterministic algorithms, the results generally are 
not so good - mostly because the encoding of the heuristics fails. 
The answer is to include things like RFC 3514, (Note the pub date.) 
or ancillary data.  But the solution of adding ancillary data maybe 
worse than the disease.  This is just one of the hard problems.


--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

Soccer/Futbol. IPv6.  Both have lots of 1's and 0's and have a hard time
catching on in North America.


gated communities - was Re: mitigating botnet

2006-08-02 Thread Edward Lewis


At 6:29 AM + 8/2/06, Paul Vixie wrote:


as was true of spam when i said this about spam ten years ago, it is true
now of botnets that the only technical solution is gated communities.  but
the internet's culture, which merely mirrors the biases of those who use it,
requires the ability for children to go door to door selling girl scout
cookies, without necessarily having the key code to every one of the doors.


I agree with this in a number of dimensions.

One, look at mankind's physical security over the centuries.  Walled 
cities were once in vogue for defense.  (Sieges were a DOS attack.) 
Walled defenses evolved over time, yet there was always a need to 
have gates for commerce.  Eventually walls have become unimportant 
(mere tourist curiosities) as wealth has shifted from the physical to 
monetary realm (and then from gold bars to electronic accounts).


The goals of attacks, and the methods of attack shift.  Defensive 
strategies must, okay, ought to shift too.


Two, look at the DHS recommendation to secure the Internet via DNSSEC 
and enhancing BGP.  What amounts to an unfunded mandate to everyone 
to protect themselves hasn't given much impetus to everybody 
pitching in and making a safer Internet.  My recommendation would 
have been for the DHS to say to the (US Federal) government the 
Internet's an unsafe place, protect your self in dealing with 
contractors and bidders but requiring all transactions be done with 
suitable security.  Basically protect your own first, recommend 
safer actions for others, and allow those that want to be at risk to 
continue doing so.


What I mean here is that building a gated community is more likely to 
happen around the assets the government needs to protect than the 
government is going to get others to voluntarily spend more resources 
to defend against boogymen that may or may not exist.  Money is more 
easily spent to answer a need you know than to follow a 
recommendation from someone you don't.


What is considered an acceptable level of safety is relative.  For 
those who get to ride in cars (taxis) around the world, how many 
times have you been in a cab that has done something illegal in your 
home country but is considered safe in another (because the action is 
'expected')?


Gated communities, wall gardens, same thing.  Both are counter to the 
philosophy of which spawned the Internet.  But they may also be the 
only way to make the Internet a reliable tool for mankind and not 
just an academic exercise run amok.


--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

Soccer/Futbol. IPv6.  Both have lots of 1's and 0's and have a hard time
catching on in North America.


Re: gated communities - was Re: mitigating botnet

2006-08-02 Thread Edward Lewis


It was pointed out to me that I'm even less of a historian than a 
lawyer...walls became unimportant (security-wise) when warfare 
changed.  But still, what's being defended has also changed.


At 10:22 AM -0400 8/2/06, Edward Lewis wrote:

At 6:29 AM + 8/2/06, Paul Vixie wrote:


as was true of spam when i said this about spam ten years ago, it is true
now of botnets that the only technical solution is gated communities.  but
the internet's culture, which merely mirrors the biases of those who use it,
requires the ability for children to go door to door selling girl scout
cookies, without necessarily having the key code to every one of the doors.


I agree with this in a number of dimensions.

One, look at mankind's physical security over the centuries.  Walled 
cities were once in vogue for defense.  (Sieges were a DOS attack.) 
Walled defenses evolved over time, yet there was always a need to 
have gates for commerce.  Eventually walls have become unimportant 
(mere tourist curiosities) as wealth has shifted from the physical 
to monetary realm (and then from gold bars to electronic accounts).


The goals of attacks, and the methods of attack shift.  Defensive 
strategies must, okay, ought to shift too.


Two, look at the DHS recommendation to secure the Internet via 
DNSSEC and enhancing BGP.  What amounts to an unfunded mandate to 
everyone to protect themselves hasn't given much impetus to 
everybody pitching in and making a safer Internet.  My 
recommendation would have been for the DHS to say to the (US 
Federal) government the Internet's an unsafe place, protect your 
self in dealing with contractors and bidders but requiring all 
transactions be done with suitable security.  Basically protect 
your own first, recommend safer actions for others, and allow those 
that want to be at risk to continue doing so.


What I mean here is that building a gated community is more likely 
to happen around the assets the government needs to protect than the 
government is going to get others to voluntarily spend more 
resources to defend against boogymen that may or may not exist. 
Money is more easily spent to answer a need you know than to follow 
a recommendation from someone you don't.


What is considered an acceptable level of safety is relative.  For 
those who get to ride in cars (taxis) around the world, how many 
times have you been in a cab that has done something illegal in your 
home country but is considered safe in another (because the action 
is 'expected')?


Gated communities, wall gardens, same thing.  Both are counter to 
the philosophy of which spawned the Internet.  But they may also be 
the only way to make the Internet a reliable tool for mankind and 
not just an academic exercise run amok.


--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

Soccer/Futbol. IPv6.  Both have lots of 1's and 0's and have a hard time
catching on in North America.


--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

Soccer/Futbol. IPv6.  Both have lots of 1's and 0's and have a hard time
catching on in North America.


Re: DNSSEC in Plain English

2006-06-15 Thread Edward Lewis


At 11:11 +0100 6/15/06, [EMAIL PROTECTED] wrote:


certificates, and so on. This is fine for a
technical audience but it won't help explain the
issue to the decision makers who spend the money.


We should be clear on who the decision makers are.  I've spent a long 
time trying to trick folks with engineering budgets and policy roles 
into doing DNSSEC.  As much as they have been sympathetic to the 
cause, they can't find the justification they need to make DNSSEC 
happen.  It's not that they are ignorant.  It's that they answer to 
other authorities - not the *gasp* engineers.


The people who have investments in the Internet are the decision 
makers here.  The consumers of the Internet, those who buy its 
services and turn them around for a profit, are the decision makers. 
They are the ones exposed to risk, they are the ones to best judge if 
DNSSEC fills a need.


Unfortunately, I don't speak their language.  Shucks, I'm just a 
simple country engineer from the old days.


I do not mean to say we should stop technical discussions of DNSSEC 
nor stop the education process happening today.  I also don't mean to 
say that we ought to give up on developing tools that will make 
DNSSEC less onerous.  I mean to say that the effort to deploy DNSSEC 
has to consider (or increase what's done now) reaching out to those 
who we think are the consumers or beneficiaries of DNSSEC.


--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

Nothin' more exciting than going to the printer to watch the toner drain...


Re: wrt joao damas' DLV talk on wednesday

2006-06-14 Thread Edward Lewis


At 10:20 +0100 6/14/06, [EMAIL PROTECTED] wrote:

Has anyone ever considered trying to come up
with a way that these crypto projects could be
explained in plain English? I think a lot of


Over and over and over and over again.
(Not to say we've done enough! but we've done all we can think of.)

1) Google for DNSSEC introduction
2) Look at http://www.dnssec.net/
3) This has no crypto: http://apricot.net/apricot2005/slides/T11-3.pdf
(a discussion of what it means to registries to pull it off)
4) Or this, for a NANOG presentation:
(NANOG 32) http://www.nanog.org/mtg-0410/pdf/crocker.pdf

If what you see isn't clear, ask the respective presenters.  Maybe we 
haven't been clear enough. But, many have considered...maybe the only 
beneficiary has been the travel industry (through our buying of 
tickets/rooms).

--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

Nothin' more exciting than going to the printer to watch the toner drain...


Re: wrt joao damas' DLV talk on wednesday

2006-06-13 Thread Edward Lewis


At 11:37 -0700 6/13/06, Randy Bush wrote:


can you say does not scale?  or how about works poorly when a
zone is transferred?


There are two ways to look at scaling.  Scaling in volume and 
scaling across generations.  DLV definitely does not scale across 
generations with such a person-to-person protocol backing it up.  But 
if it's just a bootstrap mechanism, then I think it's acceptable.


As far as volume scale, DLV puts more work onto whomever configures 
DLV repository data in resolvers.  A DLV per TLD might lower the work 
for the TLD, and possibly remove the need to develop NSEC3 and 
opt-in.  (As DLV only lists the DNSSEC'd zones.)



i think there is no question that you and isc mean well.  but we've
entered the the twisty passages of security.


DLV at least lets those who are able and willing to take the risk to 
gain first hand experience.  If the ISC DLV runs for 5 years without 
an incident, even with the non-scalable approach as documented, it'll 
be seen as a winner.  The longer it runs without incident, the more 
trustworthy it'll (appear to) be, right up until the point that it no 
longer scales.  If there's an incident, then it won't be trusted but 
we will probably learn from the experience.  Hopefully the lesson 
will come cheap.


--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

Nothin' more exciting than going to the printer to watch the toner drain...


to DLV or not

2006-06-12 Thread Edward Lewis


My background and position on this is best summed up as one of the 
early implementers of DNSSEC and now working for a gTLD/ccTLD 
registry.  In between I spent a lot of time developing, redeveloping 
DNSSEC in the face of operational realities.  (To those who are 
critics of DNSSEC, I ask forgiveness for my wasted middle-age.)


DLV is a concept that someone somewhere in the past few years came up 
with to put needed DNSSEC data in a special location.  Although DLV 
per se is novel in the development of DNSSEC, it is well in-line with 
the earliest intentions of the protocol dreamers.


The original DNSSEC design was to allow any resolver (client) to 
decide how it would collect the needed records to substantiate an 
answer.  In the mid to late 90's we tried to figure out how to first 
express a policy and then come up with something that could take the 
policy and direct the operation of a DNS validator (the thing that 
gives a thumbs up or down to an answer after checking the DNSSEC 
stuff).  We punted, resulting in RFC 3008, which said that the only 
common policy was to follow the tree, i.e., root signs tlds, tlds, 
sign down, etc.  A few years later, a project called FMESHD to reopen 
the policy to be more general.  Again, the problem proved too big to 
solve.


Why DLV is different from these two failures is that we had been 
trying to solve the general case without a validator in hand.  (We 
did have validators, but nothing that was integrated with a real name 
server.)  DLV is starting from an implementation and is a pragmatic 
attack on the problem.  DLV is not as general as the original idea, 
but wider than RFC 3008.


The main concern with DLV is that is it not scaleable.  That's 
inherent in the problem so I am not surprised.  The tradeoff is that 
you can go off the tree but at the cost of knowing where you are 
going off the tree.


Some folks feel that DLV will compete with TLD registries and delay 
their interest.  Or maybe, for the same reason, spur their interest. 
My opinion is neither, DLV is orthogonal to the TLDs.  DLV may be a 
good measure of interest in DNSSEC though.  Either there will be no 
interest, a quick spike in interest, or a sustained growth.  My guess 
is the middle option - a lot of early registrations and then slow 
growth.  If that's the case, scaling isn't the concern and it won't 
spur the registries to add DNSSEC.


So, ISC's DLV operation?  The developers of BIND are free to 
distribute code with a validation policy that looks up data in their 
DLV.  If all works, then all is good.  If it's a disaster, ISC's DLV 
will cease and the code will cease to have the feature.  Let the 
market decide.  I don't think that what the pro-s and anti-s *think* 
matters as much as having tangible data on what *happened*.


If the techies still rule the Internet, something like DLV ought to 
be given a try.  Show off a technical solution and use that as an 
example of the way forward.  We've been stalling long enough trying 
to move policy makers to sign the root zone.

--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

Nothin' more exciting than going to the printer to watch the toner drain...


Re: How to tell if something is anycasted?

2006-05-17 Thread Edward Lewis


At 15:45 -0700 5/16/06, Steve Gibbard wrote:


The approach I settled on was to ask lots of questions, and then do some
traceroutes to verify once I knew where to look.  If I knew there was supposed
to be a server in location x, a looking glass near location x would probably
find it for me.


From my experience, passively detecting how something is assembled on 
the Internet has gotten harder with each passing year.  Whether it is 
from intentional obfuscation or just evolutionary new operational 
practices, you can tell a lot less about a set up now that in the 
past.


What Steve says is the right thing to do.  Get off-net ask questions 
and then verify on-net.  Not just for anycasting, for just about 
anything.  The network is a lot less obvious that it used to be.  For 
better or worse, depending on your point of view.


--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

Nothin' more exciting than going to the printer to watch the toner drain...


Re: do bogon filters still help?

2006-01-11 Thread Edward Lewis


No data, but I thought I should add...RFC 3330 Special-Use IPv4 
Addresses lists the obvious stuff.  I just went through an 
exercise in de-bogonizing and needed that reference. 
[http://www.ietf.org/rfc/rfc3330.txt]


Be careful though. It lists 24.0.0.0/8 as special, explaining that 
this went to cable operators (and eventually administered via ARIN). 
So don't just use the Summary Table in section 3 blindly.


At 13:03 -0500 1/11/06, Steven M. Bellovin wrote:

Every time IANA allocates new prefixes, we're treated to complaints about
sites that are not reachable because they're in the new space and some
places haven't updated their bogon filters.  My question is this:  have we
reached a point where the bogon filters are causing more pain than they're
worth?

The Team Cymru web page (http://www.cymru.com/Bogons/index.html) gives
some justification, but I think the question should be revisited.  First,
as the page (and the associated presentation) note, most of the
benefit comes from filtering obvious stuff -- 0/8, 127/8, and
class D and E source addresses.  Second, the study is about 5
years old, maybe more; attack patterns have changed since then.
Third, considerably more address space has been allocated; this
means that the percentage of address space that can be considered bogus is
significantly smaller.  Possibly, there are more sites doing edge
filtering, but I'd hate to count on that.

So -- I'd like people to re-examine the question.  Does anyone have more
recent data on the frequency of bogons as a percentage of attack
packets?  What would that number look like if you filtered just the
obvious -- the ranges given above, plus the RFC 1918 prefixes?  Are
your defenses against non-spoofed attacks really helped by the extra
filtering?

--Steven M. Bellovin, http://www.cs.columbia.edu/~smb



--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

Inactionable unintelligence is bliss.


Re: do bogon filters still help?

2006-01-11 Thread Edward Lewis


At 20:28 +0100 1/11/06, Florian Weimer wrote:

* Martin Hannigan:


 You should move 192.88.99.0/24 from SPECIAL to YES (although you
 shouldn't see source addresses from that prefix, no matter what the
 folks at bit.nl think).  169.254.0.0/16 should be NO (otherwise it
 wouldn't be link-local).



 Good example as to why to use authoratative sources only.


But most authoritative sources are too shy to make explicit
operational recommendations. 8-)


The authoritative sources put the data out there.  What more can you 
ask of them?  What more do you want?  It's been said that the neutral 
parties (the authorities are supposed to be neutral) should not make 
business decisions for the industry.  Recommending route filters is a 
business decision.  Operational recommendations in general are 
business decisions.


Consider it lucky you have a choice here.  The plain official 
version, William's marked up copy, and edits to William's on the 
list.  You have a choice here, you can't beat that.

--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

Inactionable unintelligence is bliss.


RE: Let's talk about ICANN

2005-12-12 Thread Edward Lewis


At 7:56 -0800 12/12/05, william(at)elan.net wrote:

On Mon, 12 Dec 2005, Hannigan, Martin wrote:


 I would think that ICANN is off topic for NANOG?


Are you saying there is no operational impact in the decisions made by ICANN?


That's not how I read the comment.

The impact of ICANN on NANOG would be on topic.  A general let's 
talk about ICANN is best done in a forum designed for discussing 
ICANN.


It's not a sin to discuss ICANN on NANOG, but it's barking up the 
wrong tree.  If anyone has any questions or concerns about any 
organization, go to an appropriate forum.  Don't talk about an 
organization (or person) behind its back.


--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

3 months to the next trip.  I guess it's finally time to settle down and
find a grocery store.


Re: Viral Cure Could 'Immunise' The Internet

2005-12-09 Thread Edward Lewis


At 9:30 -0500 12/9/05, [EMAIL PROTECTED] wrote:

Thought folks might find this interesting

http://www.newscientist.com/article.ns?id=dn8403

Viral Cure Could 'Immunise' The Internet, New Scientist

Excerpts: A cure for computer viruses that spreads in a viral fashion could
immunise the internet, even against pests that travel at lightning speed, a
mathematical study reveals.

Most conventional anti-virus programs use signatures to identify and block
viruses. But experts must first analyse a virus before sending out the fix.
This means that rapidly spreading viruses can cause widespread damage before
being stopped.


Source: Viral Cure Could 'Immunise' The Internet, Kurt Kleiner, NewScientist,
05/12/01


This has been thought of many times.  My spin around this was 
attached to DARPA's Active Network 
(http://www.darpa.mil/ato/programs/AN/).


The eternal question in security is what are you defending against? 
Because of that, security will always have a strong reactionary 
element.


I can't cite any, but I recall hearing some claims that viruses in 
the past were meant to fix problems or highlight in a benign way the 
presence of problems.  It's been tried in real life, I don't see that 
a mathematical study is going to come up with a result that is more 
meaningful.

--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

3 months to the next trip.  I guess it's finally time to settle down and
find a grocery store.


cross-registry interactions was Re: BGP ... PKI...

2005-12-07 Thread Edward Lewis


At 17:06 -1000 11/23/05, Randy Bush wrote:


i have been whining about the problems of cross-registry operation
for over a decade, formally, informally, presos, ...  i have had it
on every rir's meeting agenda (except lacnic) for many years.  do i
need to iterate for every ort of service the registries provide?


Sometimes I think you are right about this and sometimes I think you 
are wrong about this.  It just may be that you are thinking only 
about the right half, but operation of the registry to some means 
the policy process too.


Where I see this as wrong is: There are five distinct RIRs for a 
reason, to be attuned to local needs.  The domain name industry has 
one RIR asserting authority and we see the political fallout of 
that.  Having the five RIRs locked together would certainly benefit 
(usually the larger) organizations that deal across RIR boundaries, 
most likely (and I say that without certainty or accusation) to the 
detriment of smaller organizations tuned to the needs within one RIR.


I think it's very important that we keep the policy processes - the 
decision making part, and even discussion - separate.  Yes, that 
means it takes a long time to get a global (effectively, one 
involving IANA) policy through.


On the other hand, you are right when it comes to the technical 
services rendered and the interfaces used.  That's because the use of 
the data is global, no doubt about that.  A student sending mail from 
Africa to Asia will traverse two or three RIR area networks, just to 
show how 1 consumer can cause a cross-RIR event.


One of the dynamics I see happening now is that the RIRs are 
independently developing some advanced services.  RIPE into DNSSEC, 
APNIC into certificates, LACNIC into IRIS and unifying the RIR WhoIs 
data.  These advancements happen locally much faster than globally, 
as is true with any innovation. Failed attempts at advancement will 
be easier to recover from too.  Eventually we want these services to 
be global, but in development I expect differences.



we are the registries' customers.  many of us, especially the ones
who pay the registries the most, have to deal with multiple
registries.  can the registries please get over the inter-registry
rivalry and make life more reasonable for us, the paying members?


Keep in mind that the RIRs were originally cobbled together out of 
different cloth.  Unifying the service interface will take an 
investment in doing that.  This is why I have made comments at ARIN 
meetings about providing technical input to ARIN - trying to define a 
way to have the community, or even just the membership, inform ARIN 
on what service interfaces we would like to see in an open, 
reviewable arena.  ARIN has this for policies, but the path towards 
service upgrades is not as well defined.


It's one thing to lay heat at the feet of organizations, it's another 
to make clear the reason for the heat.



where as before i was merely inclined, this has just made me an
extremely strong proponent of the isp web of trust identity model.


The upside of this is that it directly addresses the routing problem 
- ISPs get to determine who they trust for the data they rely on.  On 
the other hand, ultimately a web of trust has to fair to newcomers, 
not rely on superficial popularity, and obviously scaleable.

--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

3 months to the next trip.  I guess it's finally time to settle down and
find a grocery store.


Re: BGP Security and PKI Hierarchies

2005-12-07 Thread Edward Lewis


After reading this thread well after it has ended...why does it seem 
that a lot of folks equate trust with paying money?


Trust isn't about who can pay what but maintaining a system that 
conveys trust does *cost* money.


The RIRs are not-for-profit themselves.  That doesn't mean 
service-for-no-fee.  I don't see that an RIR has any obligation to 
speak on behalf of (in this case, issue certificates for) any other 
organization that holds IP space and has not established any 
arrangement with the RIR.  On the other hand, any such organization 
cannot expect an RIR to do something for them for free.


If the ISP industry wants there to be certificates for the so-called 
swamp space (badly enough), what would stop them from subsidizing the 
the work?


--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

3 months to the next trip.  I guess it's finally time to settle down and
find a grocery store.


Re: IAB and private numbering

2005-11-17 Thread Edward Lewis


At 13:59 -0800 11/11/05, Tony Tauber wrote:


There are some resources, like IP addresses and AS numbers, the proper
operation of which hinges on their uniqueness.


...


Does this concern make sense?
Does this course of action make sense?
Is there a(nother) better venue than the IAB?
What do people think?


(Yeah, I did read the rest of the thread, but am replying to the 
original message.)


I think there are a few dilemmas in this topic.

One stems from the RIR's duty to provide stewardship of the number 
resources they administer.  The other is the dividing line between 
protocol design (IAB) and operations (RIRs).


One concern from this is number resources depletion, which is why, in 
my estimation, there are people measuring things like announced space 
and time to network with AS numbers.  (I'm referring to work Geoff 
Huston, Tony Hain, and Henk U of RIPE have presented in numerous 
locations in the past few months.)


When a resource is becoming scarce, there's a push to try and be 
certain that it is being used efficiently, with efficiency measured 
in terms of time to depletion.  With this in mind, if a resource is 
used privately, why can't it be used publicly too by some deserving? 
(I ask this rhetorically as an example.)


Stewardship also means uniqueness too, or at least uniqueness in some 
scope.  (A 48 bit number could be a hardware address or a 
combination IPv4 and port number, as an example of stretching.)  To 
achieve this, the RIRs would naturally assign an number to anyone 
deserving, regardless of how the network is connected.


Combine that with a third dimension, that the RIRs are run in the 
context of some sort of public trust, there are folks that will want 
to check up on them.  That's where we get folks probing the exposed 
data (via whois, say) and seeing what they can get to.  I think this 
is where the assumption of a public internet comes from.


This is a three-way conflict centered on the RIRs.  There's the whole 
matter of the benefit vs. pain of scoped (as in site local, link 
local, RFC 1918) addressing.  That's a matter for the protocol 
engineers to figure out, I think that is something the IAB would be 
concerned about - if not so already.


I don't think that you want to have the directory services of the 
RIRs (whois today) flag addresses as public use or private use, but 
you do what the defined protocol scope clearly indicated.  The reason 
for not labelling public or private is that there are multiple 
private (if there is indeed one true public).  If you see two private 
addresses, can they see each other?


In as much as we don't want the RIR's in the routers, we shouldn't 
put the routers into the RIRs.  The outcome of this is that folks 
probing and prodding the data in the RIRs ought to not expect to see 
all the resources registered therein on the public Internet.


It would tempting to say not to worry about unseen resources, to 
assume they are in the private areas of the world.  However, there 
are probably resources that are lost - allocated in the days when 
IANA was a small part of ISI and things were done on paper.  In the 
effort to stop depletion, these should be reclaimed, but deciding 
what is lost versus what is in private use is ... a dilemma.


My experience in this is tied to DNS and lame delegations.  Just like 
the routing table issue, we have delegations into places that are not 
reachable.  A name server may be situated in a way in which it can 
see out but we cannot see in.  The problem with these seems to be 
some past implementations of DNS that looped as a result of lame 
delegations (in this case situations in which the desired name 
server[s] are not reachable).


Maybe this is where the IAB steps in, and looks for documents showing 
how members of a network, whether the public or a private network, 
can either protect themselves from trying to reach unreachable areas, 
or to set up stub or proxy services to absorb ill-fated traffic 
destined to an unreachable address.  I'm not sure this is feasible - 
the DNSOP WG seems to have killed, or is about to kill a document on 
don't publish unreachable things in the DNS.  As much as that 
sounds useful, there was no energy in the group to finish the 
document.  A lack of energy tells me something.


Scoped addresses do run afoul of the theory that a network is a 
collection on mutually reachable endpoints.  Once you scope an 
address, you've lost the theory of the network layer.  Still, it does 
work to do this, so it's not that it's impossible, it's that the 
theory needs to be, umm, scoped.  I've thought far less about this, 
but that's the kind of thing that the IAB might weigh in on, if there 
is the energy to do so.


--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

3 months to the next trip.  I guess it's finally time to settle down and
find a grocery store.


Re: multi homing pressure

2005-10-19 Thread Edward Lewis


At 12:20 -0400 10/19/05, Todd Vierling wrote:

That's why SLAs exist.


Do SLA's say if you are out of the water for 30 minutes we will also 
cover your lost business revenue?  There are some times with service 
guarantees just are not enough (e.g., manned space flight support).


--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

True story:
Only a routing expert would fly London-Minneapolis-Dallas-Minneapolis
to get home from a conference.  (Cities changed to protect his identity.)


Re: (What If?) ccTLD Delegation Question

2005-10-03 Thread Edward Lewis


http://www.iana.org/cctld/cctld-establishment-procedures-19mar03.htm


At 16:28 -0500 10/3/05, Joe Johnson wrote:
Call it Monday Boredom, if you will, but a funny DNS question just 
popped into my head: if I were to, say, win the lotto and buy my own 
Island (which, of course, would technically be its own country), 
would I be able to receive a ccTLD for said island nation?  Kind of 
like .joejohnsonisland  or .jji?


If so, would the DNS have to be actually contained inside of said 
island?  I think not, as it was mentioned earlier that .iq was run 
from Texas, but it's always good to ask.




Joe Johnson
[EMAIL PROTECTED]


--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

If you knew what I was thinking, you'd understand what I was saying.


off-list Re: Weird DNS issues for domains

2005-09-29 Thread Edward Lewis

;; ANSWER SECTION:
sanderson.mtrsd.k12.ma.us. 604800 INNS  dns-auth1.crocker.com.
sanderson.mtrsd.k12.ma.us. 604800 INNS  dns-auth2.crocker.com.

;; ADDITIONAL SECTION:
dns-auth1.crocker.com.  151957  IN  A   204.97.12.58
dns-auth2.crocker.com.  151957  IN  A   204.97.12.57

;; Query time: 119 msec
;; SERVER: 68.100.16.25#53(68.100.16.25)
;; WHEN: Thu Sep 29 11:36:31 2005
;; MSG SIZE  rcvd: 134

$ dig www.sanderson.mtrsd.k12.ma.us. a

;  DiG 9.3.1  www.sanderson.mtrsd.k12.ma.us. a
;; global options:  printcmd
;; Got answer:
;; -HEADER- opcode: QUERY, status: NOERROR, id: 4869
;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 2, ADDITIONAL: 2

;; QUESTION SECTION:
;www.sanderson.mtrsd.k12.ma.us. IN  A

;; ANSWER SECTION:
www.sanderson.mtrsd.k12.ma.us. 604800 IN CNAME  www.mtrsd.k12.ma.us.
www.mtrsd.k12.ma.us.604800  IN  A   159.250.29.161

;; AUTHORITY SECTION:
mtrsd.k12.ma.us.604800  IN  NS  dns-auth1.crocker.com.
mtrsd.k12.ma.us.604800  IN  NS  dns-auth2.crocker.com.

;; ADDITIONAL SECTION:
dns-auth1.crocker.com.  151950  IN  A   204.97.12.58
dns-auth2.crocker.com.  151950  IN  A   204.97.12.57

;; Query time: 58 msec
;; SERVER: 68.100.16.25#53(68.100.16.25)
;; WHEN: Thu Sep 29 11:36:38 2005
;; MSG SIZE  rcvd: 172


--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

If you knew what I was thinking, you'd understand what I was saying.


Re: off-list Re: Weird DNS issues for domains

2005-09-29 Thread Edward Lewis


whoops...sorry for the extraneous data...
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

If you knew what I was thinking, you'd understand what I was saying.


Re: Why use ccTLDs?

2005-09-28 Thread Edward Lewis


At 20:42 -0700 9/27/05, Steve Gibbard wrote:

some stuff


Following on Steve's coattails, I'd like to put a plug in for the 
Swedish TLD (.SE) and applaud their introduction of DNSSEC:

   http://www.nic.se/english/nyheter/pr/2005-09-14?lang=en

May we all benefit from their experience.

PS - The RIPE NCC has also been introducing DNSSEC, but they aren't a ccTLD:
http://www.ripe.net/ripe/maillists/archives/dns-wg/2005/msg00159.html
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

If you knew what I was thinking, you'd understand what I was saying.


Re: Anyone seen 172.15/16 lately?

2005-09-28 Thread Edward Lewis


But that doesn't answer the question: (;))

NetRange:   172.16.0.0 - 172.31.255.255
CIDR:   172.16.0.0/12
NetName:IANA-BBLK-RESERVED

That's the reserved range, he's looking for the /16 before that.

Signed,

A curious bystander who spent a few moments on this out of curiosity.

At 11:11 -0700 9/28/05, Roy wrote:

172.16/12 is RFC1918 space

Mark Boolootian wrote:


Can anyone tell me to whom 172.15/16 is allocated?  IANA says

  172/8   May 93   Various Registries

but checks with ARIN, RIPE, APNIC, AFRNIC, and LACNIC don't
show anything.

gr33tz to Team Furry!!

mb
---
Mark BoolootianUC Santa Cruz
Dislaimer:  Any operational content in this email is intentional



--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

If you knew what I was thinking, you'd understand what I was saying.


RE: Anyone seen 172.15/16 lately?

2005-09-28 Thread Edward Lewis


At 14:35 -0400 9/28/05, Hannigan, Martin wrote:

Isn't 172.15/16 legacy Sun example space pre 1918? It's
all over CCO and Sunsolve in examples and defaults.


I poked some more and the LACNIC server says it is unallocated.  That 
was the most straightforward answer of the bunch.


It's an interesting exercise to see what the 5 RIRs return and what 
IANA doesn't. ;)


ARIN - no records found
APNIC - ' 172.0.0.0 is not allocated to APNIC' but lists CC of AU
AFRINIC - '0/0', CC of EU
LACNIC - unallocated
RIPE - pretty much the same answer as AfriNIC
IANA - doesn't query for numbers

Didn't see a WhoIs box on the NRO site.
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

If you knew what I was thinking, you'd understand what I was saying.


RE: Anyone seen 172.15/16 lately?

2005-09-28 Thread Edward Lewis


At 21:10 +0200 9/28/05, Jeroen Massar wrote:


Thus all nicely return Unknown, which is consistent.


No argument about that, but they do say it in different ways.  Hence 
a plug for the deployment of IRIS to tie the registry lookups 
together.


IRIS - http://www.ietf.org/html.charters/crisp-charter.html, the IETF 
WG developing it.

--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

If you knew what I was thinking, you'd understand what I was saying.


Re: SWIP and Rwhois in the Real World

2005-09-07 Thread Edward Lewis



NetRange:   4.0.0.0 - 4.255.255.255
ReferralServer: rwhois://rwhois.level3.net:4321

% telnet rwhois.level3.net 4321
Trying 209.244.1.179...
telnet: connect to address 209.244.1.179: Operation timed out

Doesn't seem to have made much difference yet...


Their rwhois seems to be terminally down. Can we reclaim 4/8 from them now?


Who is we?

IANA says it belongs to BBN (ARIN not mentioned):
http://www.iana.org/assignments/ipv4-address-space

   004/8   Dec 92   Bolt Beranek and Newman Inc.

(as opposed to)

   073/8   Mar 05   ARIN(whois.arin.net)
   074/8   Jun 05   ARIN(whois.arin.net)
   075/8   Jun 05   ARIN(whois.arin.net)
   076/8   Jun 05   ARIN(whois.arin.net)

Either IANA's records are out of date or the space was granted prior 
to ARIN's start (in 97 or so).  ARIN (via policies) has little say 
over this space.


--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

If you knew what I was thinking, you'd understand what I was saying.


dotUS DNS problems on July 7

2005-07-23 Thread Edward Lewis


On July 7, 2005, NeuStar received a handful of reports that DNS 
resolvers were unable to resolve dotUS domains, plus the mention of 
the problem on the NANOG list.  From the reports received, the DNS 
problem seemed to impact a limited number of independent 
organizations but was not widespread.


The reports followed a maintenance operation at one DNS site.  During 
the maintenance operation a new piece of network equipment was 
installed.  At approximately 10pm EDT (July 8 0200 UTC) the state of 
a previously operating load balancer was reset.  At that time 
affected servers at independent sites resumed resolving dotUS names.


We have reviewed and revised our maintenance procedures to prevent a 
reoccurrence of this issue.

--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

If you knew what I was thinking, you'd understand what I was saying.


Re: OMB: IPv6 by June 2008

2005-07-06 Thread Edward Lewis


At 10:57 -0400 7/6/05, Scott McGrath wrote:


IPv6 would have been adopted much sooner if the protocol had been written
as an extension of IPv4 and in this case it could have slid in under the
accounting departments radar since new equipment and applications would
not be needed.


Sliding anything past the accountants is bad practice.  Is the goal 
to run IPv6 or to run a communications medium to support society?  If 
it costs $1M to adopt IPv6 in the next quarter, what would you take 
the $1M from?  (I used to work at a science research center.  Having 
a good network wasn't the goal, doing science was.  Without good 
science, there would be no FY++ budget for a better network.)


The Internet serves society, society owes nothing to the Internet. 
Members of this list may prioritize communications technology, other 
members of society may prioritize different interests and concerns. 
That is why IPv6 must offer a benefit greater than it's cost.


--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

If you knew what I was thinking, you'd understand what I was saying.


Re: OMB: IPv6 by June 2008

2005-07-06 Thread Edward Lewis


At 19:23 +0200 7/6/05, Iljitsch van Beijnum wrote:

With the chicken little-ing again...


You are approaching the problem at the wrong end by asking what's in it for
me to adopt IPv6 now. The real question is is IPv6 inevitable in the long
run.


Pardon my skepticism, but I recall hearing about the coming of the 
world due to pollution in the 1970's and the end of the oil supply by 
the 1980's.  (E.g., see http://www.ncpa.org/pub/bg/bg159/ for a 
discussion on the latter, albeit written before the most recent oil 
'scare.')


The point isn't whether IPv6 is good or not - it's that long-range 
predictions are often wrong.  For every memex 
(http://www.iath.virginia.edu/elab/hfl0051.html) there's an oil 
crisis, Ada, GOSIP, economic default of New York City (Ford to City: 
Drop Dead! - NY Daily News, Oct 30, 1975)...



So by all means, be an IPv6 hold out as long as you like, but don't assume
that just because adopting IPv6 doesn't make economic sense for you now, it
isn't going to happen at some point in the next decade. No rush, though.


http://www.nanog.org/mtg-0405/augmentation.html

Been there, done that, documented and shared results.  (Yes, got the 
T-Shirt too.  It was a NANOG, after all.)  That wasn't even the first 
go-round I had with IPv6.


My experiences were that IPv6 was painful - I ran into a lot of 
application bugs, OS's didn't deal with it well, and the ISP's were 
tough to deal with - as in, not many suppliers, not enough expertise 
to deliver on promises.


Maybe things are better now (note the use of past tense in the 
previous paragraph), I don't deal with IPv6 at this time.


--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

If you knew what I was thinking, you'd understand what I was saying.


Re: Enable BIND cache server to resolve chinese domain name?

2005-07-04 Thread Edward Lewis


At 9:39 +0800 7/4/05, Joe Shen wrote:

Hi,


Some of our customer complaint they could not visit
back to their web site, which use chinese domain name.
I google the net and found some one recommend to use
public-root.com servers in hint file.

I found domain name like xn--8pru44h.xn--55qx5d could
not be resolved either.

Our cache server runs BIND9.3.1 with root server list
from rs.internic.net.

Do I need to modify our cache server configuration to
enable it?


Yes.

In order to get BIND to resolve a domain name under the xn--55qx5d. 
TLD, you have to configure BIND's root hints to point to root 
servers making that delegation.  If you do this you won't be able to 
simultaneously use the rs.internic.net listed servers.


--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

If you knew what I was thinking, you'd understand what I was saying.


Re: OMB: IPv6 by June 2008

2005-06-30 Thread Edward Lewis


At 11:30 -0400 6/30/05, Daniel Senie wrote:

At 10:02 AM 6/30/2005, Fergie (Paul Ferguson) wrote:



Just in case anyone was wondering, U.S. gummint agencies will
be screaming in migration agony for the next couple of years. ;-)

http://www.fcw.com/article89432-06-29-05-Web


GOSIP II anybody? Will it be different this time than it was with 
OSI? Everyone

had to scramble in the late 1980s to get OSI stuff done, then the gov't never
used it.


Having been in the US gov't (too) at the time of GOSIP, there were 
three reasons why I never used it much:


1) No budget was ever allocated to convert operations.  (We had 
products, but we weren't forced, induced, encouraged to use it.)


2) The API for the GOSIP protocols was not standard - not only 
different from the API for TCP/IP, the API for GOSIP varied by 
platform.  (POSIX had just begun.)


3) There was no tidbit of information available over the network that 
was on a server that spoke only GOSIP and not TCP/IP.  (No compelling 
reason.)


So, the questions are: will OMB fund the transfer of the US gov't 
sites?  Will there ever be a US gov't web site only on IPv6?  (I 
think the API issue has been solved.)

--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

If you knew what I was thinking, you'd understand what I was saying.


Re: OMB: IPv6 by June 2008

2005-06-30 Thread Edward Lewis


At 21:29 -0400 6/30/05, Todd Underwood wrote:


the rest of fred's comment stands with useful information but i'm
still looking for the tipping point where people migrate, en-masse,
away from the Internet to this new, incompatible network.


You can color me skeptical on IPv6 - basing this on attending way too 
many PPT presentations on the subject and only limited hands on 
experience.  But while I think the tipping point doesn't exist today, 
I bet it will sooner or later.


IPv6 is not all that incompatible with IPv4 really, it's a lot 
closer than CLNP and UDP.  It's not that IPv6 is chasing what IPv4 
already offers.  A lot of the improvements to IPv4 are thanks to 
IPv6.  The fact remains that IPv6's expanded address range will be 
what makes it trump IPv4 eventually.


It's not GOSIP all over again.  But the USG's OMB statement may not 
be the panacea to the fans of IPv6.

--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

If you knew what I was thinking, you'd understand what I was saying.


Re: ATM

2005-06-29 Thread Edward Lewis



 ATM is a great technology.


indeed!  i use them often.  remember when you had to go into the
bank and wait in a queue for a teller?


When FIX-East was in College Park (Maryland), FIX-E was in an 
building NSI (as in NASA Science Internet) labelled the Maryland 
National Bank building.  It appeared on all the network map slides.


QA time -

Why have you hooked up a bank building?

Because of ATM

What does that get you?

It's how we get our funding from HQ.

--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

If you knew what I was thinking, you'd understand what I was saying.


Re: Stanford Hack Exposes 10,000

2005-05-26 Thread Edward Lewis



Yes, that seems obvious, but it doesn't happen. Considering the sort of free
wheeling environment prevalent in University networks, you would think they
would be a bastion of high security. Sadly, this isn't the case.


This isn't meant to be a bashing session on universities and other 
educational systems, just an observation.  I would think, and I may 
be wrong, that a educational network would be subject to - 
stakeholders (students, faculty, alumni) that turn over quickly, 
calendar-tied fluctuations in activity, and a user base that tends to 
be more liberal and risk-tolerant than a typical end user network.  I 
would think that these traits would work against the accumulation of 
tested operational techniques, appreciation of the time and cost of a 
reliable service, and stiff enough penalties for anti-cyber-social 
behavior.  Also working against this is the availability of time 
(like between semesters) when major upgrades can be done, because in 
the rush to do so sound techniques can be over looked.


I don't mean to cast dispersions on educational campus IT functions. 
There is a lot of good security research and energy available in 
those environment.  I'm just saying the environment is harsher than 
for other end users.  No - I'm not leading up to a suggestion to 
quarantine them from the rest of the Internet.


Stories like this just serve as the example headlines of why any 
organization ought to take preventative measures when it comes to 
this kind of data.  Hopefully, whatever vulnerabilities that were 
exploited will be patched, even if there is no public disclosure. 
(Word will get around when it needs to.)


PS - I was more surprised by the case of identity data that was lost 
when a laptop was stolen.  Why was something so valuable left in such 
a mobile form?

http://informationweek.com/story/showArticle.jhtml?articleID=159907962
An example of following bad practices.  Is the solution more consultants? ;)
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

If you knew what I was thinking, you'd understand what I was saying.


Re: soBGP deployment

2005-05-23 Thread Edward Lewis


At 11:27 -0400 5/23/05, Larry J. Blunk wrote:


   I suspect this was due to the fact that template submissions
were not fully automated at the time and required human
review (disclaimer: I worked for the MichNet side of Merit
back then and was not intimately familiar with PRDB
operations).


It could have been the tools.  (I can't argue, I wasn't there.)

Here's another thought.  Much like the comparison of SSH and DNSSEC 
in this reply of mine from last March:

http://www.merit.edu/mail.archives/nanog/2005-03/msg00694.html

I.e., the mythical core needs work.  This time it's the address 
organizations and routing elements.


Yet another thought.  Skimming through this thread, and only being 
slightly aware of sBGP and soBGP in past years, some concepts remind 
me of work under DARPA's Active Nets research done in the late 90's. 
(http://www.darpa.mil/ato/programs/activenetworks/actnet.htm)


Some things I learned then:

1) Keep the security ancillary data nearby.  You might need it when 
the source of the data is unreachable (perhaps because of an incident 
like a flood).


2) Appending signatures is dicey.  It has to be all public key and 
there's never a guarantee that the latest signer hasn't stripped out 
previous entries.  (That could make a longer path seem shorter in 
order to redirect traffic.)


IMHO - the inherent problem is that a router is trying to work inside 
the plane of activity (meaning it can only talk to it's nearest 
neighbors), but it takes the view point of something with ubiquitous 
knowledge to know if every thing is cool.  How can you do this 
without a trusted third party involved somewhere, in a way that is 
not obtrusive (whether at registration time or at run time)?


Dijkstra's shortest path algorithms (an example IGP) work in the 
plane because it manages to mimic the ubiquitous view.  You aren't 
afraid that someone is not playing my the rules.  When you are 
working with security (algorithms), you don't have that safety belt.


And a final thought...

Security ought to not make the system being protected brittle.  Like 
the example of routing changes being held up until the paperwork went 
through - maybe an improvement in tools will enable this.  But think 
of the long term impact - who will be paying to keep the tools and 
system up to date?


--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

If you knew what I was thinking, you'd understand what I was saying.


Re: soBGP deployment

2005-05-23 Thread Edward Lewis


At 10:37 -0700 5/23/05, william(at)elan.net wrote:


You do need trusted third party to act as PKI root signer. We're lucky
because unlike other places, we do have hierarchy with ip addresses and
ASNs and NIR is the root organization.


Don't confuse cryptography with security.

You need one trusted third party to arrange for the cryptography to 
scale (work).  You need a different third party to help authenticate 
(secure) the routing data.


IMHO, you don't necessarily want these two third parties to be the same.

--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

If you knew what I was thinking, you'd understand what I was saying.


Re: soBGP deployment

2005-05-23 Thread Edward Lewis


At 14:00 -0400 5/23/05, Daniel Golding wrote:

My reply is mostly tongue-in-cheek.  I think it's always healthy to 
explore alternatives.



Why not do something simple? The in-addr.arpa reverse delegation tree is
pretty accurate. We use it for lots of different things. Why not just give
IP address blocks a new RR (or use a TXT record) to identify ASN? This
solves the biggest problem we have right now, which is stealing of address
blocks. It requires little processor overhead, and only a few additional DNS
lookups. Its reasonably foolproof.


I'll ignore that you said (or use a TXT record). ;)

Without DNSSEC, what does this buy?  Secure information on a 
non-secure channel.


If, by stealing addresses you mean that the RIR records are 
changed, then changing the name servers is trivial - changing to 
servers that have the hijacker's preferred data (or none!).



Why create reliance on more databases? The RIRs are iffy. We rely on DNS
right now. Why not keep relying on it? This solution doesn't solve all of
our problems, but it does help, its easy, and people will implement it.


Who populates the DNS (well, the .arpa domain)?  The RIRs do.


Ok, please start flaming now :)


Brave to make such a request on a Monday afternoon.
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

If you knew what I was thinking, you'd understand what I was saying.


Re: Underscores in host names

2005-05-19 Thread Edward Lewis
At 8:04 -0700 5/19/05, Roger Marquis wrote:
Laurent Frigault wrote:
 gethostbyaddr (and may be other functions) will return NULL under at
 least FreeBSD/NetBSD for ANY PTR having the _ character.
As it should.  I wish it would also return a null for hostnames
containing sequential non-alphanumerics (--, ---, __, ___, ...).
If null were returned for all host names containing -- then IDN 
names wouldn't work.  (See RFC 3490, section 5.)
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

If you knew what I was thinking, you'd understand what I was saying.


Re: Underscores in host names

2005-05-19 Thread Edward Lewis
At 12:01 -0300 5/19/05, MARLON BORBA wrote:
Hmm, they've always teached to me that . (dot) at the end of hostnames
indicates the (hidden) Root domain:
blah.domain.com.[Root]
And my teachers always said that we don't need to write the final . because
every domain belongs to the Root domain.
This thread needs to consider the layering of applications.  E.g.,
 Applications:   Mail, Web, things using gethostbyname(host names, etc.)

 Infrastructure: DNS, etc, (such as X.500)(domain names)
Apps deal with host names, DNS deals with domain names.  To the DNS, 
host names are a subset of domain names.  To applications, domain 
names per DNS are behind that interface.  Apps deal with host names 
and other names, all of which, if running over DNS, are mapped into 
domain names.

Referring to the above text, yes, a full qualified domain name ends 
in a dot.  Whenever talking to or among DNS elements, the dot 
terminates the FQDN.  It must syntactically - a zero length label is 
the null termination of the domain name.

Applications passing domain names to the DNS (not strings of domain 
names) must have this terminating null.  However, this does not mean 
that the applications have to make the user or GUI require the null, 
as that interface is likely to be dealing with a string version of 
the name.

Some DNS applications, such as dig, don't require a dot at the end of 
the name - if one is missing, the dot is appended.  The user is 
alleviated of the burden of adding the dot - but on the other hand - 
the dot is forced upon the user.

Some applications, being agnostic, won't add anything to the user's 
input.  (This is true for non-DNS applications too.)  This gives the 
knowledgeable user more power - unique things can be done.  But it 
means that novices have more to learn.

Some applications assume the user is lazy and adds the dot in all 
instances.  Knowledgeable users get burned because now here are two 
terminating dots at times - until these users remember to fall back 
to not terminating domain names.

I've seen all three kinds of applications.  The latter ones tend to 
be the quick and dirty prototypes that don't see the light of day.

The moral is that applications are choosing when to add the 
terminating dot.  It's always there in DNS, but people don't access 
the DNS without going through an application.

As far as whether an _ is legal in a host name, you can attack 
the question in many ways.

When cast into a domain name, _ is legal.  DNS assigns no special 
meaning to that character in domain names.  Not even in the SRV 
record - if one reads the document carefully, there is no special 
meaning assigned by DNS, only a convention proffered that uses the 
_.  The convention is a function of the applications using the SRV, 
not the manipulation of the SRV within the DNS.

When cast into a host name, _ is not among the legal characters 
specified in the ancient documents.  But documents are just documents 
- arguing over what's legal according to them is about as useful as 
watching haircuts.  (Unless you are on a software design  
implementation team.)

When thrown into applications, _ may or may not have a special 
meaning.  Some applications will raise exception to _.  The more 
interesting question is why?  Is this simply because of the ancient 
documents' restrictions?  Is there some parsing consideration?  Is 
there a special semantic inferred?

It really isn't important whether the character is legal or not 
(until there is a network police force).  What is more important is 
whether the character will work in all environments in which the name 
is needed.

Will the _ work in DNS domain names?  Yes, unless there is a but in 
the DNS implementation (always a caveat).  Will the _ work in a 
host name?  Only if the applications in use, referring to the host, 
can handle such a name.

--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar
If you knew what I was thinking, you'd understand what I was saying.


Re: Underscores in host names

2005-05-19 Thread Edward Lewis
At 8:52 -0700 5/19/05, Roger Marquis wrote:
On Thu, 19 May 2005 [EMAIL PROTECTED] wrote:
...
 Don't like RFC3490 and its xn-- hostnames? ;)
xn--... aren't host names, they are domain names.  The host name 
corresponding to that would be something my simple minded mail 
application can't accept as input.

Most definitely not, and if this were 1985 I'd be {rf}commenting on
the inadvisability of such hostnames, and those beginning or ending
with -, TLD names shorter than 2 or longer than 4 characters,
spaces in hostnames, [^a-z0-9\\-\\.], and other such marginally
useful but infinitely problematic features.
There is real value in KIS, and not just from the perspective of a
security-minded coder...
KIS is great, if it gets the job done.  Systems that are too simple 
are useless too.

Supporting IDN is a necessary job.  That's been made clear to the 
Internet community.  If it complicates things, well, then that's 
what has to be done.  If the Internet is to be global, it can't 
restrict the world to just a few convenient languages.

It's true that the xn-- convention isn't the best way to encode 
IDN's, but it has proven to be the optimal one in design (at least). 
It would have been nice to use a new domain name label type, but 
we've about run out of them.  It would have been nice to use domain 
classes and use this to create a new domain name syntax, but that 
can't be done either.  Encoding IDNs this way (xn--) is optimal 
according to the considered opinion of the IETF, at least those 
working on RFC 3490 (published in 2003), when you consider impacts on 
other protocols and applications.

--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar
If you knew what I was thinking, you'd understand what I was saying.


Re: Underscores in host names

2005-05-19 Thread Edward Lewis
At 17:53 -0400 5/19/05, Eric A. Hall wrote:
Edward Lewis wrote:
 It's true that the xn-- convention isn't the best way to encode
 IDN's, but it has proven to be the optimal one in design (at least).
It's the necessary minimum for compatibilty purposes, but not anywhere
near the optimal design.
Moreover, those have nothing to do with each other.
Optimal is so subjective.  ;)
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar
If you knew what I was thinking, you'd understand what I was saying.


Re: Schneier: ISPs should bear security burden

2005-04-27 Thread Edward Lewis

clean it up from pollutants [spam, ddos], add antibacterial 
[antivirus] agents,
;)  My hotel confirmation for NANOG 34 was marked as spam. 
Thankfully, the ISP let it through anyway.

It would be nice if the ISPs protected me from bad stuff on the 
Internet - but why are they to be held to a higher standard than 
similar services?

E.g., (not intended as a water-tight analogy) the roads around me 
have laws and enforcement (sometimes).  If I am hit by someone who 
breaks a rule, my insurance takes care of that.  But the road system 
offers no protection to guarantee my on-time arrival at a Wednesday 
night beering session.  (No over-provisioning there.)

If we can't make it easy to get to happy hour, how are we going to 
make the Internet safe?
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

If you knew what I was thinking, you'd understand what I was saying.


Re: Problems with NS*.worldnic.com

2005-04-26 Thread Edward Lewis
At 21:34 -0700 4/25/05, Rodney Joffe wrote:
The culprit is dig.
Ahh, dig.  What version?  You have to be running the latest at all 
times these days...so many changes...

In my experiences with v6 the problems I have come down two are:
1) Broken testing tools.  (See change 1610 in the BIND CHANGES file for one.)
2) Broken route policy.  (Dasterdly ISP's!)
3) Broken OS API's. (Have we learned nothing since or from Berkeley Sockets?)
#1 - I've had to reevaluate everything I know about debugging since I 
met IPv6.  Now there's an entirely alternate universe of failure to 
consider.

One day I was sitting in RIPE NCC's offices and couldn't 'dig 
@ns.ripe.net'.  So I walked to the ops room and asked, umm, is your 
big machine down.  After a good laugh, we figured that my Mac was 
trying v6 where v6 wasn't *really* live.

#2 - When I first got real live IPv6 service from a provider, I tried 
tracerouting to all the machines I knew about - the roots as listed 
on root-servers.org, the RIPE machines.  I'd get about halfway there 
and fail.  I asked for reverse traces from the other side and see 
failures about the same place.

We had to work with ISPs to loosen route policies.
#3 - I have seen all sorts of mistakes involving OS's, OS API's, and 
app software API's.  Mapped addresses are mishandled, having more 
than one address to try is something apps don't deal with.  (Like 
they've been force fed one kind of food their entire life, and now 
have to choose from a menu.)

At NANOG last year I related my problems with ssh (choosing v6 over 
v4 - and me assigning the same domain name to two machines, one on a 
v4 net and one on a v6 net).  Stupid me...

The biggest problem was that one type of machine kept dropping its 
statically configured default v6 route.  Packets would get in, but 
they didn't know where to go next.  The machine logged all activity 
as good though...it didn't know.
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

If you knew what I was thinking, you'd understand what I was saying.


Re: AUP for NANOG?

2005-04-14 Thread Edward Lewis
At 7:48 -0700 4/14/05, Matthew Black wrote:
Do we have an Acceptable Usage Policy fot this NANOG mailing list?
http://nanog.org/aup.html
I suspect that the question above is rather rhetorical, nevertheless.
Of late this forum has become a forum for ad hominem rather than a
friendly discussion of technical issues.
I agree.  IMHO, I don't place much credibility in what I learn via 
this list.  I wish I could.

--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar
If you knew what I was thinking, you'd understand what I was saying.


Re: report of .biz outage...

2005-04-04 Thread Edward Lewis
At 10:03 -0400 4/4/05, Eric Brunner-Williams in Portland Maine wrote:
The occasional connectivity problems with Neulevel of March 31st persist.
I can assure you that our registration services have been up and 
running continually during the time period in question.

In the spirit of diligent troubleshooting, I suggest that you consult 
with any intermediary parties that may be involved.
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

Achieving total enlightenment has taught me that ignorance is bliss.


Re: Telcordia report on ICANN .net RFP Evaluation

2005-04-01 Thread Edward Lewis
At 8:48 +0530 3/30/05, someone wrote:
Telcordia ranking VRSN way ahead does seem to be raising some hackles here
Telcordia did not rank VRSN way ahead of the rest.
Being that I work for one of the bidding teams (Sentan), I merely 
want to point out that the above statement is untrue.  Below are two 
quotes from the report that contradict way ahead.

From the report's section 1.2 (Executive Summary of the Findings):
  The evaluators find that all of the vendors have the
   capability to run the .NET registry.
and later in the section,
  VeriSign has a small numerical edge over Sentan that
   is not statistically significant given the methodology
   used to rate the RFP responses.
I encourage concerned folks to draw opinions from reading the report 
itself, at least the executive summary.

Here is the link to the ICANN page announcing the report:
http://www.icann.org/announcements/announcement-28mar05.htm
And the report itself:
http://www.icann.org/tlds/dotnet-reassignment/net-rfp-finalreport-28mar05.pdf
FYI, For discussions on the evaluation report, ICANN's web page says:
ICANN Opens Public Comment Forum on .NET Evaluators' Report
29 March 2005
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar
Achieving total enlightenment has taught me that ignorance is bliss.


report of .biz outage...

2005-03-31 Thread Edward Lewis
Eric,
Assuming that the first item of work email refers to mail today 
(March 31), or even in the past couple of days, I can say that we 
(NeuLevel) have had no outages, neither planned nor unplanned, of our 
SRS in that time.

If you can give us some more information (off-line), we can look into 
whatever may have caused you to see such an email.  I'm about to hit 
the road, so a response from me will be delayed.  For a more 
immediate answer, contact our registry services help desk (support 
(at) neulevel.biz).

Ed
At 15:48 -0500 3/31/05, Eric Brunner-Williams in Portland Maine wrote:
funny, the first item of work email i read today was this:
the Neulevel SRS is currently down, .biz registrations are
therefore not possible.
We will inform you as soon as the registry is online again.
your metric for match may vary.
eric
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar
Achieving total enlightenment has taught me that ignorance is bliss.


Re: DNS cache poisoning attacks -- are they real?

2005-03-28 Thread Edward Lewis
At 20:15 -0500 3/26/05, Sean Donelan wrote:
effort.  Why has SSH been so successful, and DNSSEC stumbled so badly?
Short answer to that question alone.  (Believe me, I've considered it too.)
SSH is an example of innovation that requires only the end points to 
cooperate - e.g., like TCP doing congestion control at the edges.  In 
particular, the key exchange in SSH is simplistic...

DNSSEC is a change to the operations at the mythical core of the 
Internet.  DNSSEC won't work until third parties are involved, i.e., 
the parents (et.al.) of the server are involved, not just the server 
and client.  In particular, the key exchange in DNSSEC has been the 
sore spot.

Mythical core: in this case, the administration of the root zone, the 
TLDs, etc., not the routing/transit/peering core.
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

Achieving total enlightenment has taught me that ignorance is bliss.


ARIN, was Re: 72/8 friendly reminder

2005-03-24 Thread Edward Lewis
At 15:17 + 3/24/05, [EMAIL PROTECTED] wrote:
To begin with, nothing I have to say here has any bearing on the 
other IRR's.  There is a reason there are 4-5 IRRs, each should be 
tuned to local sensibilities.

However, ARIN today is a very dysfunctional organization.
That is a very brash statement, one that is easily misinterpreted, 
one that may be simply wrong, or a statement that has an element of 
truth.  The tone of this statement is why I am bothering to reply.

First, distinguish between ARIN staff and ARIN membership.
The staff at ARIN go to great lengths to respond to what the 
membership - and the public at large - ask ARIN to do.  Note - NOT 
JUST membership.  This is why there are open policy discussions, and 
open mics.  (Sessions are webcast, the public policy mailing list is 
free to join.)

Of course, membership does control the bounds of ARIN's response, 
including that of the staff, which is why there is also a member-only 
meeting on the last day of the conference.

ARIN's staff is to fairly and equitably execute the policies that the 
membership organization has put into play.  (I won't split hairs on 
the Advisory Council or the Board's roles, this can be learned by 
starting with ARIN's web site, http://www.arin.net.)

This has two consequences.
One is that it means the staff should not go and try to set the 
agenda for how ARIN operates.  It it beneficial if the staff is 
involved to educate the members on the reality of running the 
registry.  It the staff goes further, they are potentially disrupting 
an otherwise level playing field.

The other consequence is that the membership takes on the 
responsibility for ARIN's actions.  Not the staff's actions, but 
ARIN's actions.  If there is any dysfunction in ARIN, I suspect that 
it lay here.  I do not mean to infer that there is a problem, but I 
think this is where the largest misunderstanding of ARIN's role 
exists.  I also do not demean the efforts of those who do take the 
time to participate, they are the ones heading in the right 
direction, no matter whether I agree with the opinions I hear.

One question does haunt me about how the operations community views 
ARIN.  Most ARIN policies are concerned with address allocation, 
reporting, and such.  There are not many policies regarding the 
functional role ARIN plays in the Internet, the only one that leaps 
to mind is a lame delegation policy under discussion.

The (haunting) question is whether the operations community feels 
that there should be operational policies put before ARIN.  E.g., 
support for secure routing - when a concrete approach is defined that 
needs RIR input, should ARIN play?

Is there a feeling within the operator community that ARIN is...
Most ARIN members seem to view ARIN as a distant regulatory
agency to whom they must regularly burn incense and make
sacrifices in order for the ARIN gods to bestow IP addresses
upon the unworthy network operator. The result is that there
is little participation by ARIN members in monitoring and
governing ARIN. And therefore, ARIN does what it has always
done without changing or innovating.
Oh, that's was where I was going.  Is that the case?  If so, then 
there is a dysfunction.

I want to make it clear that any lack of change or innovation is not 
something that the staff has caused.  (By design the staff is in 
reaction mode.)  The lack of change or innovation is the motivation 
for the haunting question above.

that ARIN carries a big stick like the FCC. The fault is not
with the people involved in ARIN; the fault is with the majority
of IP network operators who do not get involved with ARIN.
I don't like fault, it implies that there is something seriously 
broken.  For the most part, things are working fairly well.  Maybe at 
the operator level we see ways the world would be much better if we 
ruled things, but to the general public, the Internet is making 
things better.  (Maybe for just some, but you have to admit overall 
things are better.)

But, the point is taken that ARIN would be much more useful to the 
Internet if there was a change in participation.  However, the 
improvement is not in the demographics of the participation, but in 
the content of the participation.  If the content of the 
participation was well-balanced, then the demographics will follow.

After all, if the policies ARIN membership were perfect now and 
into the future, there's no longer a need for the membership to steer 
the staff. The only thing the staff would have to do is execute the 
(benevolent, perfect) bureaucracy. ;)

PS - I think my response to Michael is not so much an opposing view, 
but a slightly different emphasis in where improvements may lie.  I 
really don't think Michael is trying to stick it to the staff.  (I 
hope he's not.)  But a lot of times people confuse the ARIN staff 
with the ARIN membership organization.

--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis

Re: ARIN, was Re: 72/8 friendly reminder

2005-03-24 Thread Edward Lewis
At 17:01 + 3/24/05, Andrew Dul wrote:
I agree, I'd certainly like to see more people actively participate in the
process.  If nanog folks believe that the ARIN membership is not getting the
right stuff done...  How do we fix this problem?   How do we get more
operators involved and active in the RIRs?
In the spirit of cart and horse, it's not about getting more 
operators involved in ARIN.  It's about getting operators to use ARIN 
as a resource in the proper way.  (I'm addressing operators here as 
this is NANOG.)

What do operators expect from ARIN?  Most ARIN policies are centered 
on the administrative function of allocation of address space and AS 
numbers.  Is that all there is?  Are the existing policies all that 
are needed?

Are there concerns about the live-in-the-network registry services 
like WhoIs, DNS, IRIS, routing registry?  There are not many policy 
proposals (lame delegations, privacy concerns with WhoIs) in play 
covering operational considerations.

ARIN staff has begun work on documenting the registry service level 
agreements, there was a presentation on this in October.  There has 
been little discussion on this by anyone since the presentation.  If 
WhoIs is out, reports fly on NANOG.  But has anyone ever tried to 
quantify what level of service is expected of ARIN's computing 
facilities?  If the staff is doing a good thing by documenting SLA's, 
then they should be encouraged to continue.

There is routing security research work that would require the RIR's 
to issue certificates for use in route update validation.  I would 
hope that someday, before anything goes live, there are operator-led 
tests involving support from ARIN.

I think colocating 1 ARIN meeting/per year with Nanog in the fall has been a
help.
I would caution that attending meetings is neither a sign of 
contribution nor a sign of progress.  Don't get me wrong, making 
meetings easier to attend is good, but we shouldn't attend meetings 
because it is easy, fun or entertaining.  I prefer to have fun at 
home.

ARIN isn't perfect but it could be a lot worse.  In some ways I think the
issue you describe is an industry wide problem.  There are many different
groups (RIRs, ICANN, IETF, Nanogs, etc...)  and participating in all of them
is a lot of effort, especially when most of us already have full-time jobs.
Participating in all of them *is* a full-time job. ;)
We could of course create a huge beuarcratcy with lots of people to study the
issues and make policy, but that hasn't been the way the Internet has
developed and is counter to what many operators think is best for the
Internet.  That also requires money.  Is that what people want?  I don't
think so, but I could be wrong.
One the one hand, what built the Internet isn't what will maintain 
it.  A bureaucracy will be needed, the challenge isn't to prevent it 
but to build the best one possible.

If ARIN goes unchecked it'll either be a weakened organization unable 
to serve the community (chaos ensues) or it will become an ogre, 
burdening the community (suffocation).  It benefits operators to be 
involved, but the real trick is to realize what kind of involvement 
is needed.

--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar
Achieving total enlightenment has taught me that ignorance is bliss.


Re: ARIN, was Re: 72/8 friendly reminder

2005-03-24 Thread Edward Lewis
At 12:53 -0800 3/24/05, Owen DeLong wrote:
NO.  Operational specifications and routing are the domain of the IETF
and _NOT_ ARIN.  ARIN is responsible for the stewardship of assigned
numbers within the ARIN region.  This includes IP addresses, Autonomous
System Numbers, and, DNS delegations for reverses on IP addresses.
While ARIN should consider routing issues and the operational impact
of ARIN stewardship policies, and, ARIN also has an educational role
in helping the community to understand BCP including operational
BCP as it relates to IP Addresses, ASNs, and DNS, ARIN has no role
in dictating or driving operational practices.
My question is not related to specification development but 
operational requirements of ARIN itself providing a service based on 
specifications.

E.g., picking something a bit more concrete that secure routing, 
should ARIN deploy DNSSEC support, once it is published (again), in 6 
months?  12 months? 10 years?  This will tell the staff what level of 
staffing is needed to accomplish the work.  The policy discussion 
will let membership know whether it is willing to pay for this. 
(Open to the public or not, the membership determines what it pays.)

Discretionary funding for supporting research within the IETF should 
exist too, to cover participation in development of specifications at 
an appropriate level of effort.

Let's say DNSSEC is ready for deployment.  Does the impetus come from 
the ARIN staff or from the membership?  (Maybe it comes from outside, 
but does it need to be made into a policy before the staff implements 
it?)

I'm not sure ARIN has a change or innovation role.  It is not unlikely
that responsible stewardship includes a minimum of change and a
preservation of stability and consistency.
ARIN has two definite roles when it comes to innovation.  1) Don't 
get in the way of innovation by the community and 2) provide expert 
advice when it comes to the development of specifications related to 
RIR functions.  And ARIN ought to be wary of trends in the 
improvement of its internal operations.

An example of role number 1 is providing DNS services over IPv6 
transport.  An example of role number 2 is contributing to the 
discussion of the IRIS definitions for address registries.  In 
neither case is ARIN leading the charge, but is playing a part in 
innovation.

To come back to secure routing, the reason ARIN would be involved is 
that ARIN would be asked to publish information on who is allocated 
number resources.  Although this is done in WhoIs now, there is a 
need to do this via whatever format is required by secure routing. 
I'm sure the specification of secure routing will describe how to 
operate the protocol, but not address the server capacity nor 
topology needed.

Perhaps policies aren't the vehicle, but then how does the 
operational community get ARIN to supply services?

--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar
Achieving total enlightenment has taught me that ignorance is bliss.


Re: ARIN, was Re: 72/8 friendly reminder

2005-03-24 Thread Edward Lewis
At 13:01 -0800 3/24/05, Owen DeLong wrote:
There are not many such proposals in play at the moment because the ARIN
community reached consensus around most of these issues over the last
two years.  There seems to be general agreement that the current state of
things is acceptable in terms of Whois and DNS.  While ARIN runs a Routing
Registry as part of it's public service focus, I do not believe that ARIN
should have a defining role in the IRR process.  In general, that also
is the purview of the IETF.
Here's my dilemma.  On the one hand I hear calls for greater 
operational input to ARIN.  On the other hand is empirical evidence 
that there isn't much input being given.

What I have been trying to do extract what latent operational input 
might be fed to ARIN, judging from discussions I have seen at other 
RIRs, the IETF, etc.  If there aren't follow ups to these ideas, then 
I would conclude that ARIN isn't dysfunctional and is operating as it 
should be, an idea supported by what is above.  If there are ideas 
forthcoming, then maybe there is a need to encourage participation.

This thread was ignited by the desire to have a pingable address in 
newly allocated blocks (from IANA to ARIN), and maybe Randy's 
suggestion is all that is needed - simply asking ARIN to do this. 
Maybe policies aren't the only way to influence ARIN's operation.

--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar
Achieving total enlightenment has taught me that ignorance is bliss.


Re: Delegating /24's from a /19

2005-03-17 Thread Edward Lewis
At 23:54 -0800 3/16/05, Owen DeLong wrote:
Ed's comments:

If that were true, then, there would be no such thing as recursive resolvers
and all clients would have to have recursive libraries.  If I ask a recursive
resolver for a foreign A record, I usually get an A record in response.
If I ask a non-recursive server, I usually get NS records in response.
I was going to respond with a really long tutorial on reading DNS 
responses, but I figure this is not the forum.  In short, yes, the 
responses are as you say, but to really understand this you have to 
dig deeper into the protocol details to see the difference between a 
referral and an answer.

Perhaps, but, as long as the referrals consistently point to an
end and not a loop, in general, it seems to work.
In the IPv4 reverse space, you only have the following zones...
root, arpa, in-addr.arpa, /8, maybe the /16, and /24
In operations, four or five referral possibilities, tops.  DNAME and 
CNAME kind of change this, but they aren't referrals in the DNS 
dictionary, they rewrite the query.

In theory, DNS referrals only loop if the there is a break in the 
protocol.  DNS is a tree, which means there's only one path between 
any two points.  If you turn the tree into a bush, you've broken it.

 1) Send a reassign-detailed or reallocate template (in ARIN lingo) for
 the space to the RIR.  Then the next set of DNS zone files generated will
 delegate to the customer's name servers.
Obviously, in most circumstances, I'd agree that this is preferred.
If that's the case, I don't know why this thread is being continued.
I responded under the presumption you were about to propose some 
other way to do this.  From your earlier message you mentioned 
sideways delegations and this is what is proposed.  Before 
proposing a change to DNS, the details of the protocol have to be 
clearly understood.

--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar
Achieving total enlightenment has taught me that ignorance is bliss.


Re: Delegating /24's from a /19

2005-03-16 Thread Edward Lewis
 work just fine.  Nothing really to debug.
I think the above two paragraphs are on the same side of the page.
Delegation is the DNS is strictly hierachical.
I don't see where the above breaks this.
It's the incoherency in your example that is the breakage.
You either SWIP the new servers or you slave the zones
from the customer.  In both cases you are following the
delegation heirarchy.  Note even if you slave the zones
you still have to ensure the delegation is correct.
I guess we will have to agree to disagree on this.  I will point out that
the above solution is working in a number of networks without problem.
Sure, if you screw it up, it doesn't work.  That's true of DNS generally.
If the delegation from the /8 zone is to the /24 level (as opposed to 
the /16 level) there are three options for an ISP to transfer the 
delegation to the customer.

1) Send a reassign-detailed or reallocate template (in ARIN lingo) 
for the space to the RIR.  Then the next set of DNS zone files 
generated will delegate to the customer's name servers.

2) Use DNAME, RFC 2672.  Good luck.
(http://www.isc.org/index.pl?/pubs/tn/index.pl?tn=isc-tn-2002-1.html)
3) Use RFC 2317.  I encourage my competitors to operate this way.
'Course, the ISP is free to have the customer just update the ISP's 
name servers, whether by dynamic update or be zone transfers from 
hidden masters.

--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar
Achieving total enlightenment has taught me that ignorance is bliss.


Re: Delegating /24's from a /19

2005-03-16 Thread Edward Lewis
At 13:48 -0800 3/16/05, David Raistrick wrote:
On Wed, 16 Mar 2005, Edward Lewis wrote:

 aside) to uphold.  In the global DNS, no matter where you ask
 question, you should get the same answer.
Really?
Yes.

 dig @ns1.arin.net 124.16.172.in-addr.arpa. IN NS
 and
 dig @ns1.foobar.com 124.16.172.in-addr.apra. IN NS
 had better return the same NS RRSet.
An example modeled after the above using real servers:
dig 48.173.209.in-addr.arpa ns @a.root-servers.net
;; AUTHORITY SECTION:
209.in-addr.arpa.   1D IN NSchia.ARIN.NET.
209.in-addr.arpa.   1D IN NSdill.ARIN.NET.
209.in-addr.arpa.   1D IN NSBASIL.ARIN.NET.
209.in-addr.arpa.   1D IN NShenna.ARIN.NET.
209.in-addr.arpa.   1D IN NSindigo.ARIN.NET.
209.in-addr.arpa.   1D IN NSepazote.ARIN.NET.
209.in-addr.arpa.   1D IN NSfigwort.ARIN.NET.
dig 48.173.209.in-addr.arpa ns @chia.ARIN.NET
;; AUTHORITY SECTION:
48.173.209.in-addr.arpa.  1D IN NS  oak.neustar.com.
48.173.209.in-addr.arpa.  1D IN NS  pine.neustar.com.
48.173.209.in-addr.arpa.  1D IN NS  willow.neustar.com.
48.173.209.in-addr.arpa.  1D IN NS  cypress.neustar.com.
And that is correct.  Both are referring you to another zone.  The 
set of servers in the first belong to 209/8, the latter to 
209.173.48/8.

What is not apparent is that neither query is resulting in an answer. 
Instead, the reply is a go ask someone else referral.  It's like 
Joe says ask Bob and  Bob says ask Charlie.

--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar
Achieving total enlightenment has taught me that ignorance is bliss.


Re: Delegating /24's from a /19

2005-03-16 Thread Edward Lewis
At 16:56 -0500 3/16/05, Edward Lewis wrote:
servers in the first belong to 209/8, the latter to 209.173.48/8.
Whoops - the last is /24.
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar
Achieving total enlightenment has taught me that ignorance is bliss.


Re: Registrar and registry backend processes.

2005-01-21 Thread Edward Lewis
At 10:32 AM +0100 1/21/05, Stephane Bortzmeyer wrote:
Remember that the whois protocol is a mess. May be IRIS will fix that.
For those concerned with IRIS, please take time to review the 
documents listed at the bottom of this page:
   http://www.ietf.org/html.charters/crisp-charter.html

RFCs 3981, 3982, 3983 represent the review of the entire IETF 
(tacitly by most).  Although these are permanent documents, it is 
never too late to read and comment on them.  Revisions happen.

The document for the RIR's (ARIN, et.al.) hasn't completed its 
review, it can be seen at:
  http://www.ietf.org/internet-drafts/draft-ietf-crisp-iris-areg-09.txt
and there's a related draft at:
  http://www.ietf.org/internet-drafts/draft-ietf-crisp-iris-areg-urires-00.txt

It's never too late to comment on a protocol, although it maybe too 
late to comment on a document. ;)
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar

A noble spirit embiggens the smallest man. - Jebediah Springfield


Re: [registrars] Re: panix.com hijacked

2005-01-17 Thread Edward Lewis
At 13:54 -0500 1/17/05, Joe Abley wrote:
So the TTLs of records in the registry-operated zones will likely have no
impact on how long NS records for delegated zones remain in caches.
If panix (or anybody else) wants to increase the time that their NS records
stay in caches, the way to do it is to increase the TTLs on the authoritative
NS records in their own zones. For panix.com, these appear to be set to 72
hours (the non-authoritative NS records for PANIX.COM in the COM zone have
48-hour TTLs).
That's provided that the panix.com authoritative NS's are seen in the 
cache.  Not all name servers return the authoritative NS's in an 
answer.  (BIND has an option 'minimal-responses yes_or_no;' that 
control this.  The default is no, but I know of one yes user.)

The registrant's copy of the NS set is more credible (RFC 2181 speak) 
than the registry's copy, so if a cache sees both, the cache tosses 
the registry copy.  But there's no guarantee that the cache will see 
both.  Usually it does though.

--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-571-434-5468
NeuStar
A noble spirit embiggens the smallest man. - Jebediah Springfield


RE: [WAY OT]: concern over public peering points...

2004-07-08 Thread Edward Lewis

-Original Message-
Which almost begs the question - what's the oddest WTF?? anybody's willing
to admit finding under a raised floor, or up in a ceiling or cable chase or
similar location? (Feel free to change names to protect the guilty if need
be:)
In a job long ago, at a gov't facility that was non-military yet had 
a secret building...probably in 1993 give or take a year...

There was a lone Macintosh computer (not even a workstation) in an 
unsecured room of a secured building plugged into a small hub that 
was FOIRL'd (10BaseFL) out of the building, along an atrium, into the 
neighboring unsecured building.  In a nondescript office of the 
unsecured building, the FOIRL was connected to Thinnet.  The Thinnet 
snaked around the office, behind desks, etc., to a small 10BaseT hub 
which went into the wall (as Cat V).  At the other end was a 
Cabletron hub I was managing for the Campus-wide Network.

FOIRL was used because, being fiber and not EMF radiating copper, it 
was secure enough for the secured building.  At least according to 
the facility security officer.  I suppose that the thinnet was used 
because they couldn't find a FOIRL to 10BaseT repeater.

;)
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-703-227-9854
ARIN Research Engineer
I can't go to Miami.  I'm expecting calls from telemarketers. -
Grandpa Simpson.


Re: IPv6 reverse lookup - lame delegation?

2004-02-11 Thread Edward Lewis
Having been present at the meeting that gave rise to the document (at 
the IETF meetings held in London, August 2001), I'd say that the 
material quoted in the document is at fault.  (There was quite a lot 
of controversy at the meeting, perhaps my recollection isn't shared 
with all others.  But this is my story and I'm sticking to it.)

The changes in status of bit labels, the A6, and DNAME were discussed 
in the context of DNS's support of IPv6.  At the time the main debate 
was whether or not DNS records ought to be defined to support 
renumbering (among other features, but renumbering was the star).  A6 
and bit sting labels (forward and reverse) proved to be too much for 
the DNS to handle, the new thought was that such functionality ought 
to be pulled out of DNS and into tools the pre-processed zone 
definitions.  E.g., something that generated  records from a 
database, etc.

DNAME was kind of the third record in.  The change in it's status 
pertained to the role it played in supporting bit sting labels - 
which is why the reverse tree is mentioned in the deprecation. 
Looking at the document now, the document ought to have read the use 
of DNAME RRs in the support of bit string labels is deprecated - 
based on my memory.

PS - Note that DNAMEs are defined in RFC 2672, not in 2874.  If you 
want to get all IETF document lawyerish about it (;)), the quoted 
material is referencing a discussion of DNAME in the context of 
supporting renumbering, not the definition DNAME itself.

RFC 2672: Non-Terminal DNS Name Redirection
RFC 2874: DNS Extensions to Support IPv6 Address Aggregation and Renumbering
At 14:45 +0200 2/11/04, Pekka Savola wrote:
On Wed, 11 Feb 2004, Mark Andrews wrote:
RFC 3363 does NOT say that DNAME is deprecated.  All it says
is that since A6 was moving the exprimental using DNAME to
support renumbering is deprecated.
Which part of:

Therefore, in moving RFC 2874 to experimental,
   the intent of this document is that use of DNAME RRs in the reverse
   tree be deprecated.
do you difficulties in parsing?

--
Pekka Savola You each name yourselves king, yet the
Netcore Oykingdom bleeds.
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-703-227-9854
ARIN Research Engineer
History repeats, therefore my life is a rerun.


Re: Lazy Engineers and Viable Excuses

2003-08-26 Thread Edward Lewis
At 19:08 -0400 8/25/03, Haesu wrote:
 Managing a filter list on one or a few route-servers rather than an
AS with hundred edge routers is so much time saving and less humanerror-prone.
But balance that with keep the path from filter list to route-server 
short too - because if you need to adjust a filter list in response 
to a network (or utility) emergency, you want to make sure the data 
is available.

(Based on experience with a project researching DDOS response.  We 
relied on certificates distributed by a DNS server.  When the flood 
was released, accessing DNS became impossible - the security system 
drowned in the flood.)
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-703-227-9854
ARIN Research Engineer

Sponge Bob Square Pants?  I'm still trying to figure out the Macarena.


Re: Microsoft to ship new versions with firewall enabled

2003-08-14 Thread Edward Lewis

[Veering further off-topic]

Hmm...I didn't even know XP had a built-in firewall.  Any bets on how
long it is before other companies with software firewall products bring
suit against Microsoft for bundling a firewall in the OS?
Along the vein of I dislike Microsoft, but let's get over it - when 
some Linux started out with, what, ipchains/ip-something to protect 
it from network vulnerabilities, it took our little lab's folks some 
time to remember to punch holes in it for DNS, SSH, etc. each time we 
set a new one up.  Ah, live and learn.

The legacy of shipping machines open to attack predates Microsoft, it 
isn't their fault(tm).  This issue was raised in at least as far 
back as The Cuckoo's Egg (since I've met folks that don't remember 
it, by Clifford Stoll - very entertaining tale of an 
astronomer-turned-SA tracking a hacker).  In the epilogue, he 
mentions the Morris worm, so we're talking about incidents in '87 or 
so.  (The Morris thing was what, Nov 2, 1988? Give or take a week.) 
I highly recommend that book as part suspense novel and part security 
tutorial.

Every time a vendor/open-sourcer decides to stop shipping with 
security down, there's a learning curve forced on the buyers.  But 
that's why we get paid to work in air conditioned offices in the 
summer. ;)

--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-703-227-9854
ARIN Research Engineer
Sponge Bob Square Pants?  I'm still trying to figure out the Macarena.


Re: ISPs are asked to block yet another port

2003-06-23 Thread Edward Lewis
At 2:58 -0400 6/23/03, Jeff Kell wrote:
And as was noted earlier, unconditionally blocking udp/1026 will cause
a lot of collateral damage when udp/1026 outbound is used as an ephemeral port
for a legitimate UDP-based service (DNS, NTP, etc).
Jeff
It's been a long time since I did any substantial BSD-socket coding, 
but, back in the day, when you asked for socket 0 in a bind call, the 
OS would just pick one.  The first (unused) one chosen would be 1024, 
then incrementally pick the next up to some limit where it would then 
circle around.  Most clients (incl. DNS resolvers) would ask for port 
0, so, well, y'all can predict the result if you were to filter any 
of the user space ports.

--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-703-227-9854
ARIN Research Engineer
...as graceful as a blindfolded bull in a china shop...


Re: COM/NET informational message

2003-01-03 Thread Edward Lewis

At 18:31 + 1/3/03, E.B. Dreger wrote:

UTF-8 is a standard.  MS products have used two-octet chars to
support Unicode for a long time.  Any reason to add yet another
encoding?


Sounds like a question to ask of the IETF.


How about encouraging widespread adoption of EXISTING standards
instead of adding more cruft?  UTF-8 is standard.  Proper DNS
implementations are eight-bit safe.  People upgraded browsers
due to SSL, Year 2000, Javascript...


The DNS protocol is not 8-bit safe, much less any implementations of 
it.  This is because ASCII upper case characters are down cased in 
comparisons.  I.e., the following are equivalent label values in DNS: 
ABCDEF and abcdef and AbCdEf.  Each has distinct binary encodings, 
but DNS comparisons treat them as equal.
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis  +1-703-227-9854
ARIN Research Engineer



Re: COM/NET informational message

2003-01-03 Thread Edward Lewis

At 12:26 -0800 1/3/03, just me wrote:

Am I the only one that finds this perversion of the DNS protocol
abhorrent and scary? This is straight up hijacking.


It's scary but I'm not sure it's abhorrent.

The DNS is hit by a lot of bad traffic.  E.g., a presentation at the 
previous nanog (http://www.nanog.org/mtg-0210/wessels.html) mentioned 
that just about 2% of traffic at the roots is healthy traffic. 
Over the years, there have been servers for 10.in-addr.arpa just to 
suck up queries that should have never leaked out the source networks.

It's encouraging that there is an effort to try to clean up the 
reasons for bad traffic.  It's scary because in some sense the 
response is not true (I wouldn't call it hijacking), but when you are 
trying to cull out incompatible older editions of software, there's 
no safe route (no 'fail safe' method).

And yes, the approach mentioned is optimized for DNS resolution for 
web access.  Hopefully this doesn't trap, for example, unwary SSH 
connections.
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis  +1-703-227-9854
ARIN Research Engineer



Re: COM/NET informational message

2003-01-03 Thread Edward Lewis

At 17:15 -0500 1/3/03, Daniel Senie wrote:

It's so nice Verisign is pushing a solution for COM/NET. I have to wonder if
we'll have a different solution in .ORG, another in .BIZ, etc. Folks, this is
why we cooperate with competitors and produce standards.


Well, the way I look at this is: I hope it's temporary (for 
everyone's sake) and perhaps most of the problem cases will be in web 
look ups for names under com and net, so maybe this will knock a lot 
of the problem cases out.  Hopefully.
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis  +1-703-227-9854
ARIN Research Engineer



Re: Next NANOG meeting/stats

2002-11-19 Thread Edward Lewis

At 16:46 -0500 11/19/02, Randy Bush wrote:

and the World Series is a game played only by amercian teams.  and if
you don't like it, shut up or we'll bomb you.


The Toronto (Ontario) Blue Jays won the series in 1992 and 1993. 
'Course, in one of the games in Philadelphia, someone raised the 
Canadian flag upside down at the start of a game.
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis  +1-703-227-9854
ARIN Research Engineer



Re: How to secure the Internet in three easy steps

2002-10-25 Thread Edward Lewis

At 13:14 -0400 10/25/02, Sean Donelan wrote:

Are there some down-sides? Sure.  But who really needs the end-to-end
principle or uncontrolled innovation.


The context of the above is, of course, sarcastic.  But it reminded 
me of a quote that once appeared on mailing list that is germane to 
this.  The quote was uttered in 1824 or so, by the inventor of the 
telegraph.  The quote lamented that the funding needed to deploy an 
innovative concept was held by the folks that were the most 
threatened by innovation - i.e., they made money with out the latest 
new fangled thing so whatever the new fangled thing did, it was sure 
to be a threat to their current income stream.

Does anyone know this quote?
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis  +1-703-227-9854
ARIN Research Engineer



Re: Fwd: IETF Call for Nominations

2002-10-22 Thread Edward Lewis

At 19:52 -0400 10/21/02, RJ Atkinson wrote:

	Operators who are involved in IETF should consider providing input
(good/bad/other) to the IETF Nomcom -- since that is the best way to affect
the future makeup of the IESG and IAB.  Details below.


For those who want to give verbal input, at least one IETF Nomcom 
member (i.e., me) will be attending NANOG and the following ARIN 
meeting.

--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis  +1-703-227-9854
ARIN Research Engineer