Re: fiber switch for gig

2008-04-02 Thread Justin Shore


Are you wanting hardened devices for an outside cabinet install (if it's 
going outside then you'd better want hardened devices) or is this for an 
internal environmentally-sound install?  What's your definition of long 
distance?  1800ft, 10km, 20km, 40km, 70, 80, 110?  Assuming SMF, do you 
need simplex or duplex?


Have you considered talking to a FTTx vendor?  We use Occam here and 
they make some cost-effective fiber products built with FTTx in mind. 
I'm not sure how they compare price-wise with products you listed below 
but it might be worth checking out.


Justin


Andrew Staples wrote:

Speaking of running gig long distances, does anyone on the list have
suggestions on a 8 port L2 switch with fiber ports based on personal
experience?  Lots of 48 port gig switches have 2-4 fiber uplink ports, but
this means daisy-chains instead of hub/spoke.  Looking for a central switch
for a star topography to home fiber runs that is cost effective and works.

Considering:
DLink DXS-3326GSR
NetGear GSM7312
Foundry SX-FI12GM-4
Zyxel GS-4012F

I realize not all these switches are IEEE 802.3ae, Clause 49 or IEEE 802.3aq
capable.

Andrew


Re: rack power question

2008-03-25 Thread Justin Shore


Dorn Hetzel wrote:
Of course, my chemistry is a little rusty, so I'm not sure about the 
prospects for a non-toxic, non-flammable, non-conductive substance with 
workable fluid flow and heat transfer properties :)


Mineral oil?  I'm not sure about the non-flammable part though.  Not all 
oils burn but I'm not sure if mineral oil is one of them.  It is used 
for immersion cooling though.


Justin



Re: 10GE router resource

2008-03-24 Thread Justin Shore


Joel Snyder wrote:


  Also I'd love to hear recommendatios for budget 10GE
  routers. The budget router would be used to hook up
  client networks through one 10GE interface and connect
  to different transit providers through two 10GE
  interfaces.

If you don't need BGP-ish power, David Newman just published his test of 
10GigE switches today in Network World. He was focusing mostly on 
switching in the enterprise, but he has a variety of other performance 
metrics and results which may be helpful:


http://www.networkworld.com/reviews/2008/032408-switch-test.html?t51hb


The author's specifications eliminated Cisco's 4900M from the 
competition.  That not unexpected though since it was a evaluation of 
access switches w/ 10G uplinks.  The 4900M has 8 on-board 10G interfaces 
and expansion modules that can carry 8 more (not oversubscribed) or 16 
(oversubscribed).  It has has GigE support via TwinGig modules in the 
expansion module bays.  It also has a 320Gbps backplane and can handle 
up to 200k v4 routes.  It's an impressive little switch if you need 10G 
aggregation.  It can't handle a full table of course but it still has a 
lot of use.  No MPLS options.  It's based on the 4500's Sup 6-E.


http://www.cisco.com/en/US/products/ps9310/index.html

The base unit starts at $16k.

Justin


Re: Customer-facing ACLs

2008-03-10 Thread Justin Shore


Adrian Chadd wrote:

Does anyone have any handy links to actual raw data and papers about this?

I'm sure we've all got our own personal datapoints to support automated
network probes but I'd prefer to stuff something slightly more concrete
and official(!) into the Wiki.


SANS ISC might have some useful reports.  I see a few links in this article:

http://www.incidents.org/diary.html?storyid=4045

Justin



Re: Customer-facing ACLs

2008-03-10 Thread Justin Shore


Ang Kah Yik wrote:


However, considering the number of mobile workers out there who send 
email via their laptops to corporate SMTP servers, won't blocking 
outbound SMTP affect them?


After all, there are also those who frequently move from place to place 
so they're going to have to keep changing SMTP servers every time they 
go to a new place that's on a different ISP.


Thanks for joining the discussion.  Frankly I'd be surprised to find 
many corps with an externally-accessible SMTP server that would accept 
mail on tcp/25.  The only way they'd do it is with SMTP AUTH which 
(hopefully) implies the use of SMTP TLS as well.  I know of very few 
corps that actually do this.  Most of the corps I can think of are 
either running Exchange and utilizing RPC over HTTP, simply point their 
users to their company's webmail server, or require that their users VPN 
back to HQ to access their internal MTA.  The sites that I can think of 
with external user-accessible SMTP daemons are entities with highly 
technical users.  They utilize SMTP AUTH, TLS, and the Mail Submission 
Port on tcp/587.  I'm afraid they are in the minority though.


The MSP port is the best way to get around the blocks with decent MTAs. 
 Your local MTA's support for other non-standard mechanisms for 
relaying mail from untrusted networks may also help with this problem 
(RPC over HTTP).  Other than that I don't think there's enough demand 
for outgoing SMTP from the masses to warrant not blocking it. 
Redirecting generally takes care of that anyway.


Thanks for the input though.  All thoughts are welcome.
 Justin


Re: Customer-facing ACLs

2008-03-09 Thread Justin Shore


Dave Pooser wrote:

I can understand the logic of dropping the port, but theres some
additional thought involved when looking at Port 22 - maybe i'm not
well-read enough, but the bots I've seen that are doing SSH scans, etc,
are not usually on Windows systems. I can figure them working on Linux,
MacOS systems - but surely the vast majority of 'vulnerable' hosts are
those running OS's coming from our favourite megacorp?  Which typically
don't come shipped with neither SSH server nor SSH client... ?


They typically don't ship with an SMTP server either. Considering that my
preferred SSH client for Windows weighs in as a single 412k .exe, I'd
imagine that bot designers are just writing their own SSH clients for
brute-forcing.


Or are simply writing a bot that sens TCP SYNs to port 22 and are 
reporting those hosts that responds with a SYN ACK back to the CC. 
Then the CC can direct other compromised hosts with a more complete 
rootkit (or compromised *nix host) to do brute-force userid/password 
guessing.



Half the Mac users? You think? I know a dozen or so sysadmins who use Macs,
and about a hundred users who wouldn't know SSH from PCP; I think that's
probably a slightly skewed sample considering I'm a Mac geek who hangs
around with Mac geeks, and I'd guess the consumer users are a larger
percentage of the real-life population. I'd expect the number of folks who
want SSH unblocked to be under 1% of a consumer broadband network, and
probably closer to 0.1% or so. And again, it ought to be trivial to let your
users unblock the system, either via phone call or via self-service Web page
(though in the latter case you'd better use a captcha or something so the
bot doesn't automatically unblock itself).


Agreed.  I don't think the end-user's OS makes them more or less likely 
to be using SSH unless the OS is a BSD or Linux (then I suspect you'd 
get a disproportionate # of SSH users compared to the other more simple 
OSs).


Justin


Re: Customer-facing ACLs

2008-03-08 Thread Justin Shore


Mark Foster wrote:


Port 22 outbound? And 23?  Telnet and SSH _outbound_ cause that much of 
a concern? I can only assume it's to stop clients exploited boxen being 
used to anonymise further telnet/ssh attempts - but have to admit this 
discussion is the first i've heard of it being done 'en masse'.


I don't think there's much to be gained from blocking ingress 22 from 
customers.  I don't see any SSH scans originating from my customers 
(though there is always the potential).  I wouldn't have any issues with 
blocking outbound telnet though but I can't really justify it either 
since I don't see a real big problem with that kind of traffic 
originating on my network either.


Now inbound SSH and Telnet (destined for my customers) should be blocked 
IMHO.  Doing a little prodding around our netspace I've found most SSH 
installs to be of a known vulnerable version or at least an old version 
yet to have any vulnerabilities found in.  Nothing positive could come 
from letting them get compromised.  We would of course offer a way for 
users to get around the block.  Our current approach is to have them 
sign up for a static IP (another $5/month).  The fee keeps everyone from 
automatically signing up for is as free stuff but still gives the 
legit users an inexpensive way to get what they need.


It'd frustrate me if I jacked into a friends Internet in order to do 
some legitimate SSH based server administration, I imagine...


Agreed but remember that people like you, I and the rest of the readers 
of NANOG are a teeny tiny minority on the Internet.  I could pick a 
couple thousand of my users at random and not find one that knows what 
SSH is.


Is this not 'reaching' or is there a genuine benefit in blocking these 
ports as well?


I don't think there's much to be gained from blocking telnet  SSH from 
the customers to the Internet.  Blocking SMTP in the same direction is 
critical IMHO.  Blocking the same 3 ports back to the customer makes 
sense to me though.  I think there is a real and tangible benefit to the 
exercise.


Justin



Re: Customer-facing ACLs

2008-03-08 Thread Justin Shore


It varies widely.  I see some extremely slow scans (1 SYN every 2-5 
minutes).  This is what someone on the SANS ISC page mentioned I believe.


I've also seen scans last for up to 10 minutes.  The consistency of the 
speeds made me think that perhaps the scanning computer was on a slow link.


The worst scans are the ones that last a second or two and hit us with a 
SYN for every IP in our allocations.  That kind of scan and its flood of 
packets is the one that I don't think I can stop without some sort of QoS.


I've seen coordinated scans with everything from 2 to about a dozen 
different hosts scanning seemingly random IPs across our network.  I 
know it's coordinated though because together they hit every IP but 
never hit the same IP by more than one scanner.


I've seen scans that clearly learn where the accessible SSH daemons are, 
that then feed this info back to the puppet master so he can command a 
different compromised host (or hosts) to then handle the attacks.  I've 
also see a scanner first scan our network and then immediately start 
pounding on the accessible daemons.  Finally I've see the scanner stop 
its scan in mid-stream, pound on an accessible daemon for a while with a 
pre-defined set of userids and then continue on with the scans.


Clearly there's some variation in the scanning methods.

Justin

Frank Bulk wrote:

The last few spam incidents I measured an outflow of about 2 messages per
second.  Does anyone know how aggressive Telnet and SSH scanning is?  Even
if it was greater, it's my guess there are many more hosts spewing spam than
there are running abusive telnet and SSH scans.  




Rogue traffic commonly perceived as noise (was: Scan traffic from 121.8.0.0/16)

2008-03-07 Thread Justin Shore


Yeah, much of it is noise.  However there is a a lot of coordination to 
much of what I'm seeing.  Many of the scans stop at hosts with 
accessible SSH daemons and pound on them for minutes to hours.  Others 
are more subtle.  I'll see one host scan our ranges and pick out the IPs 
running SSH.  Then, a short time later, those specific hosts are 
directly targeted from a different compromised host implying that there 
is communication on the back-end about IPs w/ SSH daemons.  I tested the 
theory by disabling SSH on a few of the hosts picked up in earlier mass 
scans.  The targeted attacks are still aimed at those hosts learned in 
the earlier scan even though their SSH daemons we effectively offline. 
Some scans are so slow they're barely noticeable (as was reports on the 
SANS ISC site recently).


Even though much of this is simply noise and typical life on the 
Internet, I have to wonder how much of this noise is actual 
reconnaissance against SPs and their customers.  A certain large SE 
Asian country's military is widely reported to be performing recon and 
attacks against IP resources around the globe.  How much of what people 
believe is noise is actually malicious traffic or a prelude to some 
future event?


Frankly the scans on my network have been significantly reduced by being 
a little more proactive with my monitoring.  I've found that network 
generating SSH scans are also being used for telnet, MS-SQL and SMTP 
scans.  Unfortunately the processes I'm utilizing are very labor 
intensive and I can't keep doing this forever.  I would love to find a 
tool that could help me automate some of this process and hopefully 
react faster than I can.


While typing this 69.13.181.99 just scanned one of our /19s.  The flood 
of packets was so fast I wouldn't have been able to null route it even 
if I'd been actively watching the flows.  The only way I could have 
slowed it down would have been to rate-limit SYNs.  That leads to a good 
question for NANOG at large which I'll post separately.


Justin


Martin Hannigan wrote:
 Scans are really a dime a dozen and noise that buries good data on
 real problems.  Be careful!



 On 3/6/08, Justin Shore [EMAIL PROTECTED] wrote:
 Rich Sena wrote:
 Anyone seeing anything similar - trying to determine if this is spoofed
 etc...
 I haven't picked up any SSH or telnet scans from that network.  That's
 what I'm looking for at the moment.  The amount of scans we're getting
 are quite impressive at times.  I wish there was an easy way to automate
 the care and feeding of my RTBH with this data (and some sanity checks).

 Justin


Customer-facing ACLs

2008-03-07 Thread Justin Shore


This question will probably get lost in the Friday afternoon lull but 
we'll give it a try anyway.


What kind of customer-facing filtering do you do (ingress and egress)? 
This of course is dependent on the type of customer, so lets assume 
we're talking about an average residential customer.


Do you block SYNs destined to your customers?  Do you rate-limit SYNs 
destined for your customers?  SYNs on privileged ports?


Do you block any customer-facing egress traffic at all?  What about 
ingress?  SMTP, NetBIOS, MS-SQL, common proxy ports (3128, 6588)?


What ICMP types do you allow or disallow?

I'm assuming everyone uses uRPF at all their edges already so that 
eliminates the need for specific ACEs with ingress/egress network 
verification checks.


Do you filter anything destined to your network infrastructure on your 
customer-facing edges?  Does anyone filter traffic destined to the PE 
side of a PE-CE link from the outside world?


For those of you with cable networks, what all do you block with the CM? 
 We're considering blocking NetBIOS and DHCP server traffic (DHCP 
server packets are already blocked at the CMTS but this would keep that 
junk off our infrastructure).


For SMTP we permit access to our SMTP servers on tcp/25 to all our 
broadband users.  We also permit our customers with static IPs 
(residential and business) to send SMTP without restrictions.  After 
those permits we explicitly block tcp/25.  This has worked fairly well 
for us.  It sure makes it easy to find infected PCs with spambots.  We 
don't touch tcp/587.


For ICMP we permit echo, replies, packet-too-big, and time-exceeded. 
Everything else gets dropped.  Frags are explicitly dropped before any 
permits.


We also block common proxy ports to and from the customers (the to 
includes ports not always used for proxies).  This has been very 
effective in catching a number of bots that scanned for open Squid 
proxies or script kiddie junk that used WinGate with the default settings.



Is there a BCP for customer-facing ACLs?

Justin


Re: Customer-facing ACLs

2008-03-07 Thread Justin Shore


[EMAIL PROTECTED] wrote:

On Fri, 07 Mar 2008 13:55:05 CST, Justin Shore said:

I'm assuming everyone uses uRPF at all their edges already so that 
eliminates the need for specific ACEs with ingress/egress network 
verification checks.


You're new here, aren't you? :)


Hopefully optimistic.  Don't bum me out going into a weekend...  :-)

From the looks of my ingress BOGON ACLs on my borders (yes, I'm using 
ACLs and not null routes for a reason) I'd most people not reading NANOG 
(and maybe even some of them!) are not doing any ingress filtering on 
their customer source IPs.  Sad


Justin


Re: Customer-facing ACLs

2008-03-07 Thread Justin Shore


Scott Weeks wrote:


fire + gasoline = religious argument on this issue that we've had *many* times 
in the past...  ;-)


I wore my flame-retardent tidy whiteys today though so I'm prepared. :-)

I can understand the problem from both camps.  As a tech-savvy user I 
don't want my provider to filter my Internet (I pay for both halves!). 
However having spent more time that I care to admit doing customer 
support and as a SP engineer I recognize the need to protect the masses 
who can't (or can't be bothered to) do it for themselves.  SPs are 
really damned if we do and damned if we don't.  Frankly I would rather 
do something than nothing.  My overhead will increase in all categories 
if I do nothing.  Infected hosts consume a significant portion of my 
resources.  Tackling the problem reduces my overall support costs, 
increases 99% of my customers' overall satisfaction with our prices and 
services, but increases my labor costs and will spurn the ire of the 1% 
of my users who are tech-savvy enough to want/need unfiltered Internet 
access (or even understand the full implications of it, beyond the 
they're filtering something that was sent to me! limited thought 
process).


To me there is no question of whether or not you filter traffic for 
residential broadband customers.  The only thing beyond that is whether 
you as a SP also offer unfiltered packages.  I personally thought the 
old SpeakEasy model was a nice approach.  The unfiltered SysAdmin 
package was the perfect solution in my opinion.  With my userbase I can 
think of only a tiny fraction of the users who would need such an 
offering.  This would provide an acceptable solution for that very small 
percentage of users that need this kind of access.  The other 99% of the 
users reap the benefits of our filtering.  Problem solved IMHO.


So that only leaves the question of what ports to block or rate-limit. 
Minimizing FPs is important.  I think one could probably block 90% of 
the common crap without too much overhead.  The remaining 10% would 
likely require too much labor to be worthwhile unless you were a sizable 
entity and could justify you RD by the sheer mass of your userbase.


Justin



Re: Customer-facing ACLs

2008-03-07 Thread Justin Shore


Scott Weeks wrote:

We need to take this off-line.  All long timers are groaning, rolling their 
eyes and putting this in their kill file.


Are the long-timers groaning and ignoring this thread?  I certainly hope 
not.  It's threads like these that need the benefit of their experience 
the most.  Perhaps the long-timers could recommend a better destination 
for queries like these because I have more questions I want to ask (my 
next being about walled gardens).  If they're tired of answering the 
same threads over and over again, then the query must be common enough 
to warrant a BCP or at the very least a couple documents in a 
knowledgebase somewhere.  Perhaps my Google-fu isn't what it used to be 
but I couldn't manage to find any relevant docs online; not even a NANOG 
presentation.



Try convincing your product managers to create a new product just to appease 
'sysadmin types'.


We're not in the business of alienating any customers.  If we can create 
a bundle that meets a group of potential customers' needs we will.  It's 
just another paragraph on the sales literature that we give our CSRs and 
a little more work that I'll have to do in configuration.  I'm planning 
on rolling out SOHO and Gamer packages this year.  Adding a SysAdmin 
package wouldn't be much additional work.  I predict the adoption rate 
to be the highest with the Gamer package, followed by the SOHO package 
and finally the SysAdmin package.


I hope this thread isn't destined for an untimely death.  I've received 
a number of off-list queries for summary information because those 
individuals are also interested in customer-facing ACLs.  The 
information I have to summarize at this point is brief and incomplete.


Justin


Re: Scan traffic from 121.8.0.0/16

2008-03-06 Thread Justin Shore


Rich Sena wrote:


Anyone seeing anything similar - trying to determine if this is spoofed 
etc...


I haven't picked up any SSH or telnet scans from that network.  That's 
what I'm looking for at the moment.  The amount of scans we're getting 
are quite impressive at times.  I wish there was an easy way to automate 
the care and feeding of my RTBH with this data (and some sanity checks).


Justin



Re: YouTube IP Hijacking

2008-02-25 Thread Justin Shore


Christopher Morrow wrote:

On Sun, Feb 24, 2008 at 8:42 PM, Patrick W. Gilmore [EMAIL PROTECTED] wrote:
except that even the 'good guys' make mistakes. Belt + suspenders
please... is it really that hard for a network service provider to
have a prefix-list on their customer bgp sessions?? L3 does it, ATT
does it, Sprint does it, as do UUNET/vzb, NTT, GlobalCrossing ...
seriously, it's not that hard.


I know of one tier-1 on that list that made a filtering mistake on one 
of my own circuits no more than a few months ago.  Even some of the 
biggest players make mistakes.


Justin


Re: ISP's who where affected by the misconfiguration: start using IRR and checking your BGP updates (Was: YouTube IP Hijacking)

2008-02-24 Thread Justin Shore


Jeroen Massar wrote:

* PHAS: A Prefix Hijack Alert System
  http://irl.cs.ucla.edu/papers/originChange.pdf
  (A live/direct BGP-feed version of this would be neat)


Does PHAS still work?  I tried to submit a request to subscribe a few 
weeks ago and never heard back from their automated system.  I figured 
the project was terminated but the site was still up.


Justin


Re: Blackholing traffic by ASN

2008-01-31 Thread Justin Shore


Justin Shore wrote:
The ASN I'm referring to is that of the Russian Business Network.  A 
Google search should turn up plenty of info for those that haven't heard 
of them.


Thanks for the replies.  They were along the lines of what I was 
expecting (as-path ACL filtering  route-maps).  I was wondering if 
there was some new trick that was easier and more robust.  This will 
work though!


I saw that AS40989 fell off the 'Net a while back.  That happened once 
or twice before if memory serves me correctly and they came back a while 
later in force.  We'll see what happens this time.  Some of RBN's old 
netblocks are also no longer in the global tables.  I'm not sure what's 
going on with that but...   I'm going to have to do a little more 
research on their current Inet sources to see if I can locate them.  It 
looks like Wikipedia has a fair amount of information and a large number 
of links to additional information.


http://en.wikipedia.org/wiki/Russian_Business_Network

I'm going to have to put a little more effort towards getting my 
blackhole operational.  If anyone has any good links to docs or advice 
on what not to do I'd love to see them.  I've found a great deal of 
information on the 'Net but lessons learned from those who've already 
been there done that is always welcome.


I hadn't considered what Danny pointed out about the origin AS 
advertising other routes to create an effective DoS mechanism.  That 
would be a concern and would require a great deal of forethought.  Null 
routing prefixes would probably be the best course of action.


Thanks for the insight.
 Justin


Blackholing traffic by ASN

2008-01-30 Thread Justin Shore


I'm sure all of us have parts of the Internet that we block for one 
reason or another.  I have existing methods for null routing traffic 
from annoying hosts and subnets on our border routers today (I'm still 
working on a network blackhole).  However I've never tackled the problem 
by targeting a bad guy's ASN.  What's the best option for null routing 
traffic by ASN?  I could always add another deny statement in my inbound 
eBGP route-maps to match a new as-path ACL for _BAD-ASN_ to keep from 
accepting their routes to begin with.  Are there any other good tricks 
that I can employ?


I have another question along those same lines.  Once I do have my 
blackhole up and running I can easily funnel hosts or subnets into the 
blackhole.  What about funneling all routes to a particular ASN into the 
blackhole?  Are there any useful tricks here?


The ASN I'm referring to is that of the Russian Business Network.  A 
Google search should turn up plenty of info for those that haven't heard 
of them.


Thanks
 Justin



Level3 in the Midwest is KIA

2008-01-23 Thread Justin Shore


L3 dropped us at 13:30CST.  I've been told that whatever happened took 
out everything from KC to Wichita to Little Rock to Houston.  No word on 
the cause and no ETA yet.  They're handing us 37 routes which is a far 
cry from the roughly 237,000 we'd normally get.  I recognize 3 of the 
routes too as routes local to the Wichita area.


FYI
 Justin


Re: Level3 in the Midwest is KIA

2008-01-23 Thread Justin Shore


I've been told that there are 2 issues.  One was fiber cut, I believe in 
the Houston area.  The second issue was a card failure, also in the 
Houston area.  Both failures contributed to a loss on a backbone ring 
that covers a portion of the Midwest.  The master ticket number is 
2332102 for those who want updates.


Justin


Justin Shore wrote:


L3 dropped us at 13:30CST.  I've been told that whatever happened took 
out everything from KC to Wichita to Little Rock to Houston.  No word on 
the cause and no ETA yet.  They're handing us 37 routes which is a far 
cry from the roughly 237,000 we'd normally get.  I recognize 3 of the 
routes too as routes local to the Wichita area.


FYI
 Justin




Re: RIR filtering Level3

2007-11-15 Thread Justin Shore


Just to followup with the list, there was a small omission in the 
filtering of the routes on our peering session.  That accounts for the 
more specific routes we were seeing.  L3 made the filtering change on 
their side and we're back down to within a percent or less of our other 
BGP peers.  It wasn't hurting us; our hardware isn't up against any 
resource limits; I just happened to notice it and thought I'd take the 
opportunity to inquire about RIR filtering with the group.  Thanks for 
the quick work on this one, Roy and Kevin.


I am still interested in implementing some minimum allocation filtering 
on our borders.  I can't think of any reason to accept anything below 
the minimum of a /24.  Can anyone else?  None of the DNS root servers 
are on anything smaller than a /24 are they?  Does anyone have any 
suggestions for implementing this in a sane manner?  I'm assuming 
matching 0.0.0.0/0 ge 24 would be sufficient unless there are some 
exceptions like perhaps the root servers.


Thanks
 Justin


Justin Shore wrote:


Are any other L3 customers seeing the large number of /25 and smaller 
routes from L3?




RIR filtering Level3

2007-11-14 Thread Justin Shore


Are any other L3 customers seeing the large number of /25 and smaller 
routes from L3?  I'm seeing almost 2500 of these routes in 4/8, some but 
not as many in 8/8 and still more in L3's non-US allocations.  Looking 
at the AS paths for a handful of those specific networks I only see them 
via our L3 connection and not via our other 2 upstreams.  I'm seeing 
paths to the larger aggregate networks via our other upstreams of 
course; the Oregon and ATT route servers see the same aggregates too. 
To be more accurate we actually touch L3's acquisition form a year or so 
ago, Telcove (19094).  All of the small routes are originating from L3 
though (3356).


Best I can tell L3 is aggregating before it advertises to a peer but not 
before it advertises to a customer.  Or, on the otherhand, perhaps L3 is 
advertising without aggregation to Telcove and Telcove is not 
aggregating before advertising to us.


So, that said, what is everyone else doing to perform sanity checks on 
their learned routes?  Are a good many implementing RIR filtering and 
dropping everything smaller than a /24?  L3 of course isn't the only 
source of these tiny routes but it's so obvious I saw it and wasn't even 
looking for it.  This would explain why I'm getting so many more routes 
from L3 too.  I'm getting 232k from ATT, 233.5k from Cox and 244k from L3.


Thanks
 Justin


Another DNS blacklist is taken down

2003-09-24 Thread Justin Shore

I thought ya'll might be interested to hear that yet another DNS blacklist
has been taken down out of fear of the DDoS attacks that took down
Osirusoft, Monkeys.com, and the OpenRBL.  Blackholes.compu.net suffered a
joe-job earlier this week.  Apparently the joe-jobbing was enough to
convince some extremely ignorant mail admins that Compu.net is spamming
and blocked mail from compu.net.  Compu.net has also seen the effects of
DDoS attacks on other DNS blacklist maintainers.  They've decided that the
risk to their actual business is too great and they are pulling the plug
on their DNS blacklist before they come under the gun by spammers.

http://groups.google.com/groups?hl=enlr=ie=UTF-8oe=UTF-8selm=3f70e839%241%40dimaggio.newszilla.com

Ron Guilmette, maintainer of the Monkeys.com blacklists has posted a 
farewell from Monkeys.com to news.admin.net-abuse.email.  Ron cites the 
total lack of interest in the attacks by both big network providers and 
law enforcement authorities as the ultimate reason he's pulling the plug.

http://groups.google.com/groups?q=%22Now+retired+from+spam+fighting%22hl=enlr=ie=UTF-8oe=UTF-8selm=vn1lufn8h6r38%40corp.supernews.comrnum=4

It's truely a sad day for spam fighters everywhere.

So, my question for NANOG is how does one go about attracting the 
attention of law enforcement when your network is under attack?  How does 
the target of such an attack get a large network provider who's customers 
are part of the attack to pay attention?  Is media attention the only way 
to pressure a response from either group?  These DDoS attacks have 
received some attention in mainstream media:

http://www.msnbc.com/news/959094.asp?0cv=TB10
http://www.boston.com/news/nation/articles/2003/08/28/saboteurs_hit_spams_blockers

Apparently it hasn't been enough.  Legal remedies take too long and are
cost prohibitive (unless you're the DoJ).  Subpoenas and civil lawsuits
take months if not years.  Relief is needed in days if not hours.

Justin



RE: Another DNS blacklist is taken down

2003-09-24 Thread Justin Shore

On Wed, 24 Sep 2003 [EMAIL PROTECTED] wrote:

 Perhaps, but it also seems like moving an RBL onto a P2P network would
 making poisoning the RBL far too easy...

That's what I was getting ready to suggest.  As it stands now we have at 
least somewhat of an assurance that the zone we're working with isn't 
tainted.  I only use DNSBLs that offer zone transfers.  I only get an AXFR 
from authorized NSs for that DNSBL.  Assuming that NS hasn't been 
compromised I feel fairly safe in assuming that the data I'm getting is 
valid.  It might not be but I feel that it is.  If a P2P system was 
devised for distributing RBL zones then some for of validation for the 
distributed zones will have to be created.  That would most likely involve 
a central server.  Now you have a server to DDoS again.  *sigh*  We should 
just educate spammers with clue-by-fours and make the world a better 
place.

Justin



Re: what to do about joe-jobs?

2003-09-24 Thread Justin Shore

On Wed, 24 Sep 2003, Stephen L Johnson wrote:

 Please forgive my ignorance, but what is a joe-job?

I dug up some links for you.

http://www.spamfaq.net/terminology.shtml#joe_job
http://www.techtv.com/news/culture/story/0,24195,3415219,00.html
http://catb.org/~esr/jargon/html/J/joe-job.html
http://www.everything2.com/index.pl?node=Joe%20Job (might be down?)

Basically it's of spoofing the source of spam so as to appear to come from 
an innocent person.  I've been on the receiving end of it a couple of 
times.  Basically the innocent person gets flooded with bounces from 
poorly written MTAs and anti-spam scripts.  Think email-based virus 
bounces.  You didn't send the virus; you aren't even infected.  However 
some machine somewhere is infected and spoofed your address as source of 
the infected email.  You of course end up with the bounce and 
blame from uneducated people for being infected (which again you are not).

Hope that helps
 Justin



RE: Another DNS blacklist is taken down

2003-09-24 Thread Justin Shore

On Wed, 24 Sep 2003, Joel Perez wrote:

 
 Great,
 Just Great. Wasn't there a post a while back that listed what providers
 are SPAM friendly? My fingers are getting tired trying to create ACL's
 lists to block ranges of IP's without compromising my service. I wish
 the power's up above would buy the right software to try and curb the
 SPAM but that is not to be according to them. 
 
 So back to my ACL's I go!

This is one of the most likely things to happen.  DNS RBLs are effective.  
Otherwise spammers wouldn't be targeting them for abuse.  Mail admins will
eventually start running their own RBLs or rejecting mail by other means
locally.  This distributed method creates hundreds and eventually
thousands of separate points of contact for getting yourself off a RBL.  
I ran my own domain and netblock list in the past and I can say from
experience that it is a very time consuming process.  At the time it was
also extremely effective.  I didn't list open relays/proxies/formmail.cgi 
IPs.  I did however list spamming domains and providers.  It caught a 
surprising amount of spam.  It also left me with little time to do 
anything else.  There's got to be a better way.

Justin



Re: what to do about joe-jobs?

2003-09-24 Thread Justin Shore

On Wed, 24 Sep 2003, Stephen J. Wilcox wrote:

 The one that they're doing on my own domain which I mentioned on list some 
 months ago is still going strong with many Mbs of bounces per day.. I think its 
 fair to say there is very little you can do as tracking the source is almost 
 impossible..

That depends on how detailed the bounce is, to an extent.  Many of the
bounces actually contain a complete copy of the message that generated the
bounce.  Ie, the full spam and nothing but the spam.  From that you can
find the original source IP.  Of course that source IP may very well be an
open proxy.  You're screwed if that's the case.  However since you have a
complete copy of the spam you can still follow the money trail.  Spammers 
have to get their money somehow.  The actual spam will give you many 
places to start.  Of course once you have that you still have to convince 
a provider to take action against their customer.

Justin



Re: williams spamhaus blacklist

2003-09-24 Thread Justin Shore

On Wed, 24 Sep 2003 [EMAIL PROTECTED] wrote:

 Customers who use blacklists compiled by vengeance-oriented folk deserve 
 what they get: No email.
 
 Suggested solutions:
 a) whitelist williams
 b) stop using SBLs similar to spamhaus.
 
 It is a question of trust: Do you trust spamhaus to block 'evil' spammers? 
 
 Do you trust them after they blocked important mails to your clients that
 could -not- -possibly- have been spam?
 
 Make your own conclusions.
 
 -alex
 

Providers that sleep the dogs deserve exactly what they get: No email.

Suggested solutions:
a) find a ethical provider that responses to abuse complaints
b) I can't think of anything better than a.

It is a question of trust: Do you trust Williams to be ethical to their 
Internet peers and respond to abuse issues?

Do you trust them after they -repeatedly- -ignore- abuse complaints
regarding your clients receiving spam from a spamhaus on their network?

Make your own conclusions.

-justin



Re: Providers removing blocks on port 135?

2003-09-23 Thread Justin Shore

On Tue, 23 Sep 2003, Mike Tancsa wrote:

 The credit cards in our case were legit. They were different numbers, but 
 they were not stolen.

That would make a difference.  The credit card companies probably wouldn't 
care if you told them that the cards were being used by their customer for 
illegal activity.  Stolen, maybe.  Anything else they could probably care 
less about.

They are usuaully fairly responsive when it
 comes to them loosing money.  Secondly after I contacted the local police,
 state BI, and perhaps the FBI (assuming no luck could be had with any of
 them)
 
 I am in Canada, but I know that it has been stated that the FBI will not 
 investigate computer fraud if damage is under $100,000.

I didn't realize you were in Canada.  That makes a difference.  The dollar
amount with the FBI varies widely.  I've heard over $5,000, $25,000,
$50,000, now $100,000.  I don't think there's a hard set rule.  I think it
basically boils down to the old fashioned
will-it-get-us-good-PR-with-little-or-not-work rule of thumb. :)

 I doubt a porn company with international clientele would give a toss about 
 what the local media say.

Local media would have been useful not against the spammers but against 
the local lw enforcement that refuses to do anything about it.  Since 
however your local law enforncement can't do much about (international 
borders et al) then the local media wouldn't really care.

 Local government has nothing to do with it.  It was just some dime a dozen 
 porn company.

Ditto for what I said above.  The part about being in Canada changes 
things considerably from what I was assuming.  I must have missed that 
earlier.  Still it's worked in the past in other circumstances so the 
practice is fairly sound.  It just won't work in your case.

My only other advice would involve what's suggested in man 8 syslogd under 
SECURITY THREATS, option number 5.  Best of luck.

Justin



Re: Operations notification manager software

2003-09-22 Thread Justin Shore

On Mon, 22 Sep 2003, Stephane Bortzmeyer wrote:

 
 On Mon, Sep 22, 2003 at 12:23:35AM -0500,
  Justin Shore [EMAIL PROTECTED] wrote 
  a message of 20 lines which said:
 
   What software is available/recommended for NOC contact
   management?
  
  I've used Nagios (formerly NetSaint) in the past and have been very 
  impressed with it.
 
 I used Nagios and I fail to see what's the connection with the
 original question? It seems the original poster is looking for
 something like RequestTracker URL:http://www.bestpractical.com/rt/
 instead.

From the original message:

 - contact information refresh (regularly verify contact
 information via electronic or triggered human interaction,
 dealing with failed notification attempts)?

I need more info here such as an example.  Verify contact info against 
what?

 - complex notification (ie per-event customized notification
 by affected device/region/service, notification to
 customer-selected method based on type and urgency of
 notice)

Nagios

 - customer-friendly subscription management (including
 multiple notification methods) and notification
 archiving

Nagios

 - notification SLA's (ie re-sending multiple timed notices
 when required, tracking notifications for auditing, etc)

Nagios

 - efficiently managing multiple conduits for notification
 (email, alpha pager, text-to-voice/scripted call center, RSS
 feed, Web archives/posting)

Nagios

 - enforcing consistency in notifications (ie form-/
 rule-based notification creation and validation,
 notification review/authorization prior to distribution)

I don't know of a way to review/authorize notifications before going out 
but it wouldn't exactly be hard to script and use with Nagios.

 - handling feedback from notifications (handling customer
 responses, tracking viewing and/or reading of notifications,
 measuring effectiveness of notifications)

Nagios doesn't do this.  It can accept comments from admins responsible 
for a given system/service but that's it that I'm aware of.  Tracking 
feedback sounds more like a ticketing system to me.

 - other important features?

Nagios has numerous useful features.  One of the most useful features is
failure notification esculation.  'An email about an outage sent to the
sysadm responsible for the mail system go unanswered (ie the problem still
exists and hasn't been acknowledged)?  Esculate it.  Page the on-call
pager and let whoever is on-call call the responsible admin on the
telephone.'  Very handy feature.

IMHO I think Nagios fits most of the specifications the requesting person
wants.

Justin



Re: Providers removing blocks on port 135?

2003-09-21 Thread Justin Shore

On Sun, 21 Sep 2003, Mike Tancsa wrote:

 Yes, this is all too familiar.  Luckily it was not so acute for us.  The 
 porn company in question was using legit credit cards and we knew where 
 they were located.  We too got to the point where I had to contemplate 
 blocking dialups with no ANI as I had already blocked all access from their 
 phone numbers.  However, once they started doing that I called up their 
 office yelling and screaming law suits and I guess they figured there were 
 other ISPs that didnt care as much and moved on to them.

I don't know if you did this but if it were me I'd have contacted two
other places.  The first would have been the credit card companies with
the stolen credit cards.  They are usuaully fairly responsive when it
comes to them loosing money.  Secondly after I contacted the local police,
state BI, and perhaps the FBI (assuming no luck could be had with any of
them)  I would have given the story to the local media.  There's nothing
like a little bad PR to give law enforcement a little kick in the butt.  
If your newspapers where you're at are anything like our's, they love to 
print a good scandal involving the local government.

Justin




Re: Providers removing blocks on port 135?

2003-09-20 Thread Justin Shore

On Sat, 20 Sep 2003, Margie wrote:

 Very little spam coming off dialups and other dynamically assigned,
 residential type connections has anything to do with open relays.
 The vast majority of it is related to open proxies (which the machine
 owners do not realize they are running) and machines that have been
 compromised by various viruses and exploits.  These are machines that
 should not be running outbound mailservers, and in most cases, the
 owners neither intend nor believe that their systems are sending
 mail.  Merely stating that people shouldn't run open relays
 didn't stop spam four years ago and it is less likely to do so now. 

This veers off the original topic.  Of course I don't think any of us
recall what that was anyways...  I remember back when I first started
using the DUL.  Of all the DNSBLs I used at the time it blocked the most
spam of any of them.  I mean that by long shot.  About the time the DUL
and other MAPS lists went commericial is about the same time I noticed
fewer and fewer hits on the DUL.  We still pay for an AXFR (IXFR) of it
but it doesn't block nearly as much as it used to.

The open proxy lists block an unbelievable amount of spam.  In theory the
DUL would take care of this if it also list residential dynamically
assigned cable/dsl lines (if it doesn't already, hmmm...).  Still the 
open proxy DNSBLs seem to be more effective now.  Bottom line, use every 
DNSBL you possibly can and don't be afraid to pay for them.  I strongly 
recommend redirecting SMTP traffic for this same class of user as well.

Now I'm going to get even more off-topic.  It occurs to me that major
changes to a protocol such as SMTP getting auth should justify utilizing a
different tcp/ip port.  Think about it like this.  If authenticated forms
of SMTP used a different TCP/IP port we netadms could justify leaving that
port open on these same dynamically assigned netblocks in the theory that
they are only able to connect to other authenticated SMTP services.  
Doesn't that seem logical?

Justin



Re: Providers removing blocks on port 135?

2003-09-20 Thread Justin Shore

On Sat, 20 Sep 2003, Sean Donelan wrote:

 It costs service providers more (cpu/ram/equipment) to filter a
 connection. And even more for every exception. Should service providers
 charge customers with filtering less (even though it costs more), and
 customers without filtering more (even though it costs less)? If the
 unfiltered connection was less expensive, wouldn't everyone just buy
 that; and we would be right back to the current situation?

Abosulutely.  At least if the customer wants technical support or plans on
paying for their bandwidth.  It costs *more* resources for an ISP to *not*
filter ports and it costs them *less* resources to filter known ports that
are rarely used by Joe Blow average user but the cause of 99% of their
(our) headaches.  How many people here have ever worked in a helpdesk with
hundreds of users calling you for help when they've been infected with the
latest greatest Netbios-enabled virus and lost their report, thesis,
archived email, pictures of the kids, you name it.  I used to work at a
Unv helpdesk.  Every single time the mail server hiccuped for whatever
reason, or the personal webserver was offline for a few minutes of
maintenance in the week hours of the morning (no matter whether it was 2
minutes of 2 days) people would inundate us with complaints.  All the real
problems had to be put on hold so we could answer the phones.  Technical
support costs an ISP many times that of the neccessary CPU and RAM
resources on an access server or border router needed to filter malicious
ports.  Why don't we just wait until we identify that a user has been
infected or compromised (by whatever resource-hog of a method that
entails).  Then we can just disable their account and wait for them to
call.  Those calls are always the most pleasant of the day.

When did proactive security measures become criminal?  Was there a memo I 
missed?

Justin



RE: Providers removing blocks on port 135?

2003-09-19 Thread Justin Shore

On Fri, 19 Sep 2003, Matthew Kaufman wrote:

 
 I agree entirely with this. You shouldn't call yourself an ISP unless you
 can transport the whole Internet, including those bad Microsoft ports,
 between the world and your customers.

I disagree.  In my opinion a NSP shouldn't filter traffic unless one of
its customers requests it.  However I strongly believe that an ISP (where
it's customers are Joe Blow average citizen and Susy Homemaker) should
take every reasonable step to protect it's users from malicious traffic
and that includes filtering ports.  For example I have no reservation
about NATing basic dialup users.  I also have no problem with filtering
ports for services they shouldn't be running on a dialup connection (HTTP,
FTP, DNS)  or for services that IMHO have no business on the public
internet (including every single Microsoft port I can identify).  To not
do so is IMHO to run a network in an extremely negligent manner.

We do this very thing with email.  We filter known malicious messages, 
attachments, and spam from email.  I don't think there's a reasonable 
person among us that can complain about that.  Why not do it to network 
traffic then?  If we should allow every bit of traffic to pass unmolested 
by ACLs then we should allow all email to pass by unmolested by anti-virus 
and spam checks.  It's a two-way street.

 On the other hand, what's a provider to do when their access hardware can't
 deal with a pathological set of flows or arp entries? There isn't a good
 business case to forklift out your DSLAMs and every customer's matching CPE
 when a couple of ACLs will fix the problem. For that matter, there isn't a
 very good business case for transporting Nachi's ICMP floods across an
 international backbone network when you can do a bit of rate-limiting and
 cut your pipe requirements by 10-20%.

A good point.  

Justin



Re: Worst design decisions?

2003-09-18 Thread Justin Shore

On Thu, 18 Sep 2003, David Barak wrote:

 
 
 --- Matt [EMAIL PROTECTED] wrote:
  I've got a couple others in my head from 3Com and a
  couple of others, 
  but I thought I'd get the ball rolling.  So, what do
  you think?
  
 
 Personally my issues are console-cable related: is
 there a benefit to the HUGE variety of console pinouts
 used by the various hardware vendors?  Just look at
 vendor C as an example (I can think of four types
 immediately) - not only are the types of console port
 not standardized, but process for determining the
 location of the port clearly involved the reading of
 entrails...

Applause

I can think of 6 different console cable pinouts and connectors that 
Enterasys (Cabletron) has used over the years.  No wait, make that 7.  How 
could I forget the inherited Fore ATM architecture and subsequent blades.  
Could people just pick ONE pinout and connector and stick with it?  
Please!  Of course I also have a Cisco 675 that I've been unable to use 
for years simply because I have yet to figure out what ungodly pinout 
Cisco used in it.

Justin



Re: Worst design decisions?

2003-09-18 Thread Justin Shore

On Thu, 18 Sep 2003, Todd Vierling wrote:

 
 On Thu, 18 Sep 2003 [EMAIL PROTECTED] wrote:
 
 : Without a question:  PS/2 style keyboard and mouse connectors.  Impossible
 : to tell from each other,
 
 And this part is somewhat funny, too, because the PS/2 connector layout is
 capable of having both devices share the same bus (there's two unconnected
 pins, which some laptops use to provide alternate CLK/DATA signals).
 
 If PS/2 mice used the unconnected pins rather than the same CLK/DATA pins as
 the keyboard, all machines could simply have two connectors using all six
 pins and you'd be able to plug either device into either socket.

In other words it should work like Apple's ADB (Apple Desktop Bus) ports 
do (did until they moved to USB).  I really miss those ports.

Justin



Re: Change to .com/.net behavior

2003-09-17 Thread Justin Shore

On Mon, 15 Sep 2003, Christopher X. Candreva wrote:

 
 On Mon, 15 Sep 2003, Vadim Antonov wrote:
 
  I'm going to hack my BIND so it'll discard wildcard RRs in TLDs, as a
  matter of reducing the flood of advertising junk reaching my desktop.
 
 Please share your hack !

I've implemented the official ISC Bind hack on every single one of my name 
servers and am pushing it and the configuration changes out to my 
customers as a *required* upgrade.

Justin



Re: Sabotage not backhoes: More cable cuts

2003-09-17 Thread Justin Shore

On Sun, 14 Sep 2003, Sean Donelan wrote:

 
 Someone climbed a 15-foot tower in Southern Arizona cutting a fiber optic
 cable used by Broadwing and Tucson Electric Power.  This was within five
 feet of the 138,000-volt power line.  The site was also guarded by barbed
 wire.

At least it's just Broadwing.  I mean it not like it's anybody important 
anyways...

Justin



RE: Sabotage not backhoes: More cable cuts

2003-09-17 Thread Justin Shore

Who Broadwing?  Alan Ralsky maybe.  I've had Broadwing's 3 /14s and some
small misc netblocks in my Sendmail reject list for going on two years.  
I can't think of anything worthwhile I've missed. :)

On Wed, 17 Sep 2003, Winslow, Michael wrote:

 I'm sure they are important to someone
 
 -Original Message-
 From: Justin Shore [mailto:[EMAIL PROTECTED]
 Sent: Wednesday, September 17, 2003 12:53 PM
 To: Sean Donelan
 Cc: [EMAIL PROTECTED]
 Subject: Re: Sabotage not backhoes: More cable cuts
 
 
 
 On Sun, 14 Sep 2003, Sean Donelan wrote:
 
  
  Someone climbed a 15-foot tower in Southern Arizona cutting a fiber optic
  cable used by Broadwing and Tucson Electric Power.  This was within five
  feet of the 138,000-volt power line.  The site was also guarded by barbed
  wire.
 
 At least it's just Broadwing.  I mean it not like it's anybody important 
 anyways...
 
 Justin
 
 



Re: Blocking port 135?

2003-08-03 Thread Justin Shore

On Fri, 1 Aug 2003, Crist Clark wrote:

 And for this crowd, I should point out that blocking 135/udp blocks
 DCE-RPC which is used rather heavily by HP OpenView by default.
 
 You may hear some shrieks of pain should you chose to block 135/udp.

I bidirectionally blocked all NetBIOS ports (tcp and udp) a long time back
and have yet to have any problems.  In fact I have blocked every single
port that's unique to a Microsoft product including the MS SQL ports.  I
haven't seen any downside to doing that.  I also block all Apple AFP ports
for the same reasons.  For that matter SunRPC is also blocked.  Basically
I weeded out all the ports that have major security issues and no valid
use for my users.  Now I'm not a backbone provider but for my many users
we have experienced no problems and have avoided numerous security issues
because of it.  A little preventative maintenance can go a long way.

My $.02
 Justin



Re: Complaint of the week: Ebay abuse mail (slightly OT)

2003-08-03 Thread Justin Shore

I submitted ebay.com to rfc-ignorant.org for this RFC violation almost a
year ago (which they of course accepted):

http://www.rfc-ignorant.org/tools/detail.php?domain=ebay.comsubmitted=1029353643table=abuse

Companies like this could simply care less.  If you don't run a mail 
system with customers expecting to receive mail from ebay then I'd 
recommend blocking ebay.com.  That would include their subsidiary,
paypal.com, which BTW is also listed on RFCi.  At the least I'd score 
their mail against the RFCi RHSBLs and add a score of 1.

Justin


On Sun, 3 Aug 2003, David G. Andersen wrote:

 
 To add to the eternally annoying list of companies that ignore
 abuse@ mail... ebay now requires that you fill in their lovely
 little web form to send them a note.  Even if, say, you're
 trying to let them know about another scam going around that
 tries to use the machine www.hnstech.co.kr to extract people's
 credit card information.
 
 Has anyone had success in convincing companies that this is just
 A Bad Idea (ignoring abuse mail), and if so, how did you manage
 to do it?
 
 Sorry for the slightly non-operational content, but I've had it with
 ebay on this one.
 
   -Dave



Re: Network discovery and mapping

2003-06-22 Thread Justin Shore

On Sun, 22 Jun 2003, Sean Donelan wrote:

 
 Its been a few years since I looked at network discovery and mapping
 tools.  Openview/et al did the job, but was always a pain to move all
 the boxes to the right spots on the resulting maps.
 
 Has network discovery and mapping improved for medium-scale wide
 area networks for ISPs (e.g. 1,000 networks, 100,000 network devices)?
 I've found lots of discovery tools, but intelligent mapping/layout still
 seems to be a problem. The usual requirements for SNMP smart discovery,
 interface/subnet mapping, device identification and connecting the right
 symbols with the right lines to all the other symbols.

Cheops and Cheops-ng might be useful to you.

http://www.marko.net/cheops/

http://cheops-ng.sourceforge.net/

Justin



RE: Spam and following the money

2003-06-21 Thread Justin Shore

On Thu, 19 Jun 2003, Jay Hennigan wrote:

 
 On Wed, 18 Jun 2003, Lars Higham wrote:
 
  Joe,
 
  While I agree with all of your points individually, I would say that
  only one of them doesn't work for 'following the money'.  This one being
  the pump-and-dump.  Everything else involves a sale of some sort -
 
 Send those to [EMAIL PROTECTED].  They work quietly and in the
 background, but they carry an impressive mallet.

I prefer to call it a cluestick but whatever floats your boat will work. 
:)  I especially like option number 5 under SECURITY THREATS in man 8 
syslogd.

Additional reporting addresses:

FDA [EMAIL PROTECTED]
Send all food and drug (pharmacueticals) complaints here.  ie, 
weight-loss products, sexual stimulants and enhancements, etc..

FTC [EMAIL PROTECTED]
Bounce *all* spam here.  Period.

SEC [EMAIL PROTECTED]
Send all stock scams here.

Pyramid/Ponzi scams [EMAIL PROTECTED], [EMAIL PROTECTED]
Send these jewels to these folks if they use the USPS.

Nigerian Money Scams/419 Scams [EMAIL PROTECTED]
Send these to the US Secret Service.  Also, if you're feeling bored and
want to give a 419 scammer the run around, respond to them with your
telephone number ((202) 406-5850) and fax number ((202) 406-5031).  Tell
them how overjoyed you are to be helping them with their financial
problems.  Take note that the numbers above are for the United States
Secret Service, Financial Crimes Division. :)

It my understanding that some people send their 419 complaints to the 
Nigerian Police at these addresses:

[EMAIL PROTECTED], [EMAIL PROTECTED]

It was my understanding that the many actual members of the Nigerian 
government are involved in these scams so YMMV and of course I could be 
wrong.

Justin



Re: OT: question re. the Volume of unwanted email (fwd)

2003-06-21 Thread Justin Shore

On Wed, 18 Jun 2003, Miles Fidelman wrote:

 It occurs to me that a lot of people on this list might have that sort of
 quantitative data - so... any comments?

You might find this useful.

http://zebulon.miester.org/spam/

Justin



Re: Net-24 top prefix generating bogus RFC-1918 queries

2003-06-02 Thread Justin Shore

On Sat, 31 May 2003, John Brown wrote:

 
  
  Why does 65/8 generate almost as many queries as 24/8?
 
 because there are lots of cable and DSL users in those
 prefix's
 
 My cable at home is net-65

My SBC DSL that this email is coming from is in 65.

Justin



Re: dnsbl's? - an informal survey

2003-06-01 Thread Justin Shore

On Sat, 31 May 2003 [EMAIL PROTECTED] wrote:

 
 On Sat, 31 May 2003, Mr. James W. Laferriere wrote:
 
   White listing comes with any blacklist. The blacklists in particular
   being discussed were the @dynamics, like the PDL and dynablock at
   easynet. Both lists quite clearly state how they build their lists and
   what they are designed to block (dynablock only takes out dialup, and
   PDL takes out all dynamic addressing).
  Query ,  How is it determined that the address in question is
  dynamic or not ?  Who/how/what makes that determination ?
  This is the core of my concerns .
 
 It's usually determined via in-addr.arpa, whois data, or direct
 information from the provider.  When MAPS was freely available, I used to
 periodically email them updates on our IP space (please add these dial
 ranges, please remove these others).  I'm sure others did the same.
 AFAIK, they had at least one FTE who's job it was to maintain the DUL.

Many providers list their own dynamically assigned blocks voluntarily.  
It helps the fight against spam to an extent; plus it's good PR.

Someday I expect to either see someone create a list of known MTAs through 
which you must register it with some entity, or a list of everything that 
isn't an MTA--every statically/dynamically assigned desktop, laptop, home 
node, etc...  If that ever happens the results should be quite 
interesting.

 Those large providers who stole copies of the DUL before MAPS pulled the 
 plug on them, and continued to use them without maintenance still annoy 
 me as we've run into issues multiple times with space removed from the DUL 
 still being in their private copies.

I agree.  Something like that could have large chunks go stale in a hurry.  
If you toss in the number of providers going belly-up since MAPS went
commercial, then that's a lot netblocks that shouldn't be in the DUL and
aren't if people are paying for a current copy (like we do).

Justin