Re: Cisco moves even more to china.

2004-09-25 Thread Hani Mustafa

Ricardo,

If I were you, I'd atleast pipe my shit through aspell a couple hundred times, before 
I even consider hitting 'y'.

 That's euphemism.  And to you believe everything the liberal news
 media says?  As I recall, this whole thread (which, I might add, is

You mean And do you..., right?

 not in the least bit operational, nor relevent) was started in

relevant

 response to a sound bite you heard on TV, whcih you were unable to

which


~Hani Mustafa

P.S As a random exercise, compose a sentence from the following scrambled words: 
house, stones, glass, throw


Re: Strange public traceroutes return private RFC1918 addresses

2004-02-04 Thread Hani Mustafa

How does a 50Mbyte MTU sound like?

http://www.psc.edu/~mathis/MTU/

~Hani Mustafa


Re: Minimum Internet MTU

2003-12-22 Thread Hani Mustafa

 by GRE or IPSec. With this in mind, would we be safe to flag/drop/what
 ever all fragments smaller than 1200 bytes that are not last fragments
 (i.e., more fragments is still set)? 

No. Check previous thread about IPSec and MTU. Some IPSec implementations split the 
greater-than-mtu sized packet in half in order to avoid the possibility of further 
fragmentation down the road, thus better performance.

~Hani Mustafa


Re: IANA down?

2003-12-21 Thread Hani Mustafa

Same here, pings work but thats about it.

Tracing the path to www.iana.org (192.0.34.162) on TCP port 80, 30 hops max
[..]
21  ge-1-2.a00.lsanca17.us.ra.verio.net (129.250.29.115)  237.909 ms  238.172 ms  
242.828 ms
22  ge-1-0.a01.lsanca02.us.ra.verio.net (129.250.29.131)  252.537 ms  237.021 ms  
237.937 ms
23  ge-2-3-0.a02.lsanca02.us.ce.verio.net (198.172.117.163)  240.271 ms  242.279 ms  
242.292 ms
24  lngw2-isi-1-atm.ln.net (130.152.180.22)  249.493 ms  245.855 ms  247.489 ms
25  207.151.118.18 (207.151.118.18)  242.645 ms  240.595 ms  241.951 ms
26  * * *
27  *

traceroute to www.iana.org (192.0.34.162), 64 hops max, 64 byte packets [ICMP]
21  ge-1-2.a00.lsanca17.us.ra.verio.net (129.250.29.115)  251.679 ms  248.011 ms  
251.487 ms
22  ge-1-0.a01.lsanca02.us.ra.verio.net (129.250.29.131)  247.610 ms  252.168 ms  
246.358 ms
23  ge-2-3-0.a02.lsanca02.us.ce.verio.net (198.172.117.163)  245.831 ms  240.880 ms  
253.079 ms
24  lngw2-isi-1-atm.ln.net (130.152.180.22)  243.358 ms  246.593 ms  243.768 ms
25  207.151.118.18 (207.151.118.18)  252.022 ms  249.046 ms  251.480 ms
26  www.iana.org (192.0.34.162)  248.092 ms  242.184 ms  248.283 ms

~Hani Mustafa


Re: Quarantaine network for infected hosts?

2003-12-01 Thread Hani Mustafa

Eric,

 I wrote up a quick note on what we do at:
 
   http://www.roxanne.org/~eric/blaster.html

Quote from Known Issues:

One of the unfortunate side effects of it is that some spyware/adware either 
overrides your DNS settings with their own or makes an HTTP call to their website 
before allowing the browser to download a page normally.

A different way to tackle this problem (instead of the dns views approach), is to do 
it at a lower level. Something like Cisco's SSG (*) can be used to do the equivilant 
of DNAT for a specified set of source addressees.

This being a static configuration, I wonder if SSG's original purpose can be used as a 
solution which does not need DHCP. In this case, all network users would, by default, 
be redirected to a verification website (whatever verification method is used to 
determine whether this host is infected), after which the user is allowed to pass 
through the gateway without manipulating the packets IF the box was confirmed clean.

On a seperate note, with the complexity of setting up ssg aside, you can easily 
implement something like this using iptables' REDIRECT target. (iptables -s 
10.0.0.0/8 -j REDIRECT ... or something)

~Hani Mustafa

(*) http://www.cisco.com/warp/public/cc/pd/as/6400/prodlit/ssgw_ds.htm