Re: Akamai DNS Issue?

2004-06-15 Thread variable

Hi,

We've been seeing this too, but it looks to have been fixed from here
(AS12703) as of about 2 minutes ago.

Regards,

Rich

On Tue, 15 Jun 2004, Deepak Jain wrote:

 
 
 We're seeing it too. Has AKAM lost any key talent that kept them 
 straight until a few weeks ago? Isn't this the second issue to hit Nanog 
 in as many months?
 
 DJ
 
 Blaine Christian wrote:
 
 Can someone confirm from another location?  Comments from Akamai?
  
  
  
  
  Google appears to be having DNS issues in several places...  Luckily my
  internal network cache appears to remain viable.  I can not resolve google
  from home using a more production set of DNS servers nor can a buddy of
  mine who hangs off of Verio.
  
  If you want some google IPs here is what is in my cache at work...
  
  Non-authoritative answer:
  Name:www.google.akadns.net
  Addresses:  216.239.51.147, 216.239.51.99, 216.239.51.104
  Aliases:  www.google.com
  
  
  
  
 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On 
 Behalf Of Leo Bicknell
 Sent: Tuesday, June 15, 2004 9:09 AM
 To: [EMAIL PROTECTED]
 Subject: Akamai DNS Issue?
 
 
 
  
  x
  
 -- 
Leo Bicknell - [EMAIL PROTECTED] - CCIE 3440
 PGP keys at http://www.ufp.org/~bicknell/
 Read TMBG List - [EMAIL PROTECTED], www.tmbg.org
 
  
  
  
  
 
 -- 
 Virus scanned by edNET.
 



Re: Any 1U - 2U Ethernet switches that can handle 4K VLANs?

2004-01-26 Thread variable

On Sun, 25 Jan 2004, Jeff Kell wrote:

 We're running 30 SVIs on a 3550-12 (only 10 active at the moment, we're 
 in a transition).  It is an aggregation switch that feeds back via L3.

According to the documentation on the Cisco site:

http://www.cisco.com/warp/public/473/145.html

The 3550-12 is only capable of handling 16 SVIs in hardware (regardless of 
SDM template), after that you get into resource exhaustion which means 
it add the SVIs, but will go back to software/CPU-based routing.  Does the 
3550/3750 give any indication that it's in this state (software routing) 
other than melting under high traffic volumes?

We're currently waiting on Cisco getting back to us on figures for the 
3750, but given that it has a similar TCAM setup to the 3550-12, I'd doubt 
it would be different.
 
Rich



Wirespeed 24-port L3 switches

2004-01-08 Thread variable

Hi all,

We're looking at L3 switches which have decent L3 packet forwarding
performance (wirespeed if possible), a reasonable amount of L4 ACLs/ACEs
(an average of at least 80 per port) and comes in a 24-port 10/100 port
package with a couple of GBIC slots for uplinking to the core network.  
OSPF, but no BGP.

We've looked at the Cisco 3550-24, but they seem to have resource
exhaustion issues[1] if you create more than 8 SVI's (i.e. it goes back
to software routing).  Extreme 200 switches look OK, but are limited to
about 1000 ACE[2] (averages 32 rules per port).  Allied Telesyn's
8800/Rapier series currently only manage half that figure in hardware and
don't support UDP/TCP port ranges in a single ACE[3].

Are our expectations of a 24-port switch too high?  Would it be better to
move over to higher density switches and put in large amounts of
underfloor cabling in large installations and keep putting separate
routers and switches into the smaller locations (100 ports)?

Or are L3 switches not a mature product and we should all stick to using 
switches for L2 and have L3+ dealt with by dedicated routers for the time 
being?

Cheers,

Rich

[1] http://www.cisco.com/warp/public/473/145.html
[2] 
http://www.extremenetworks.com/libraries/prodpdfs/products/summit200_24_48.asp
[3] They do support ranges, but a rule to cover a single range may require 
multiple ACEs.



Re: ethernet-based temperature sensors

2003-09-04 Thread variable

On Wed, 3 Sep 2003, matthew zeier wrote:

 I know this has been mentioned before, but other than NetBotz (too pricey),
 what are people use as ethernet-based, SNMP-probable temp sensors?

http://www.jacarta.co.uk
 
Rich



GLBX ICMP rate limiting (was RE: Tier-1 without their own backbone?)

2003-08-28 Thread variable

On Wed, 27 Aug 2003, [EMAIL PROTECTED] wrote:

 We have a similarly sized connection to MFN/AboveNet, which I won't
 recommend at this time due to some very questionable null routing they're
 doing (propogating routes to destinations, then bitbucketing traffic sent
 to them) which is causing complaints from some of our customers and
 forcing us to make routing adjustments as the customers notice
 MFN/AboveNet has broken our connectivity to these destinations.

We've noticed that one of our upstreams (Global Crossing) has introduced 
ICMP rate limiting 4/5 days ago.  This means that any traceroutes/pings 
through them look awful (up to 60% apparent packet loss).  After 
contacting their NOC, they said that the directive to install the ICMP 
rate limiting was from the Homeland Security folks and that they would not 
remove them or change the rate at which they limit in the foreseeable 
future.

What are other transit providers doing about this or is it just GLBX?

Cheers,

Rich



Windows update down again?

2003-08-17 Thread variable

Hi all,

I was just updating a couple of Windows machines and had been using 
Windows Update without any problems until about 5 mins ago (22:10 GMT) 
when I've started getting this:

Thank you for your interest in Windows Update

Windows Update is the online extension of Windows that helps you get the 
most out of your computer.

The latest version of Windows Update is available on computers that are 
running Microsoft Windows 98, Windows 98 Second Edition, Windows 
Millennium Edition, Windows 2000 (except Windows 2000 Datacenter Server), 
Windows XP, and the Windows Server 2003 family.

URL is http://v4.windowsupdate.microsoft.com/default.asp which redirects 
to http://v4.windowsupdate.microsoft.com/en/thanks.asp.  Also happens for 
http://windowsupdate.microsoft.com/.

This is from multiple machines running Windows 2000 (Pro and Server) and 
Windows 2003 server.  Anyone else seeing this yet?

Does anyone know of an alternative URL for Windows Update in the meantime?

Rich



Re: Windows update down again?

2003-08-17 Thread variable

It's just come back now.  Must have been a temporary holding page while 
they did some maintenance.

On Sun, 17 Aug 2003, [EMAIL PROTECTED] wrote:

 
 Hi all,
 
 I was just updating a couple of Windows machines and had been using 
 Windows Update without any problems until about 5 mins ago (22:10 GMT) 
 when I've started getting this:
 
 Thank you for your interest in Windows Update
 
 Windows Update is the online extension of Windows that helps you get the 
 most out of your computer.
 
 The latest version of Windows Update is available on computers that are 
 running Microsoft Windows 98, Windows 98 Second Edition, Windows 
 Millennium Edition, Windows 2000 (except Windows 2000 Datacenter Server), 
 Windows XP, and the Windows Server 2003 family.
 
 URL is http://v4.windowsupdate.microsoft.com/default.asp which redirects 
 to http://v4.windowsupdate.microsoft.com/en/thanks.asp.  Also happens for 
 http://windowsupdate.microsoft.com/.
 
 This is from multiple machines running Windows 2000 (Pro and Server) and 
 Windows 2003 server.  Anyone else seeing this yet?
 
 Does anyone know of an alternative URL for Windows Update in the meantime?
 
 Rich
 
 -- 
 Virus scanned by edNET.
 



RE: How much longer..

2003-08-14 Thread variable

On Thu, 14 Aug 2003, St. Clair, James wrote:

 Cars did not become more popular because owners had to learn how to swap
 more parts. 

The good ole computers as cars metaphor.  In the UK:
 
1) In order to drive a car, you have to have a license.

2) In order to have the car on the road, you have to have it taxed and 
have a qualified mechanic certify it for basic road worthiness.

Neither of these rules currently apply to computers.  Maybe they should.

Rich



RE: How much longer..

2003-08-14 Thread variable

On Thu, 14 Aug 2003, St. Clair, James wrote:

  I've lived in the UK, and never had a license to maintain or update the
 engine.

See point number 2:
 
  2) In order to have the car on the road, you have to have it taxed and
  have a qualified mechanic certify it for basic road worthiness.

 The computers as cars analogy applies to commoditization of a utility. 

A computer is a computer.  Analogies like this only serve to add to the
confusion.

Rich



Re: WANTED: ISPs with DDoS defense solutions

2003-07-30 Thread variable

On Wed, 30 Jul 2003, Mike Tancsa wrote:

 I recall one of our users was involved in a DoS once a few years back
 when the giant pings could crash MS boxes. The fact that his perceived
 anonymity was removed was enough to keep him from repeating his
 attacks

That's the heart of the problem.  Anyone who's owned enough boxes can sit 
there happily running a DDoS anonymously against a target because:

1) The OS/software/default settings for a lot of internet connected 
machines are weak, making it easy to attack from multiple locations.

2) A lot of networks have no customer or egress filtering and make it a 
lot more difficult to trace DDoS traffic because it generally uses faked 
source addresses.

If these issues are addressed then it becomes a lot harder to remain 
anonymous and starting DDoS attacks against targets that can trace you 
becomes a lot less attractive.

Cheers,

Rich



Re: source filtering (Re: rfc1918 ignorant)

2003-07-24 Thread variable

On Wed, 23 Jul 2003, Jared Mauch wrote:

   I think you'll see more and more networks slowly over
 time move closer to bcp38.   

Is there anywhere that this is recorded?  It would be interesting to see 
what the actual state of play on implementation of BCP38 was.

 I believe that ATT is the only tier-1 provider that is in full
 compliance with this.

We've asked other tier-1's about BCP38 and were completely underwhelmed by
the response.  If you believe in the BCPs then I guess you just have to
vote with your feet and try to use transit providers which comply with 
them.  

We've been trying to get transit from ATT in London for a while now, but
they're obviously spending all their efforts on blocking RFC1918 traffic
rather than talking to prospective customers.  :-S

Rich



re: rfc1918 ignorant

2003-07-23 Thread variable

On Wed, 23 Jul 2003, Dave Temkin wrote:

 Is this really an issue?  So long as they're not advertising the space I
 see no issue with routing traffic through a 10. network as transit.  If
 you have no reason to reach their router directly (and after Cisco's last
 exploit, I'd think no one would want anyone to reach their router directly
 :-) ), what's the harm done?

If Frank's seeing the IP in his traceroute then the network concerned 
isn't properly filtering traffic leaving their borders as per BCP38:

http://www.faqs.org/rfcs/bcp/bcp38.html
 
Rich



Re: BTinternet problems?

2003-06-20 Thread variable

On Thu, 19 Jun 2003, Mike wrote:

 I have sent mail to every address @BT that looks like it might possess 
 clue, to no avail. This is a general plea for help- if anyone has an 
 idea of how I might resolve this, I would be very grateful...

Point the customer at www.traceroute.org?
 
HTH,

Rich



Re: Risk of Internet collapse grows

2002-11-27 Thread variable

On Wed, 27 Nov 2002, David Diaz wrote:

 I think this is old news.  There was a cover story back in 1996 time 
 frame on  Mae_east.  We have to ask how likely is this with many of 
 the top backbones doing private peering over local loops, how much 
 damage would occur if an exchange point where hit?

It depends which exchange point is hit.  There are a couple of buildings 
in London which if hit would have a disasterous affect on UK and European 
peering.
 
What about fibre landing stations?  Are these diverse enough?  Again, most
of the transatlantic fibre (for the UK) appears to come in near Lands End.

Rich




Re: Odd DDoS, anyone else seen this?

2002-11-25 Thread variable

On Mon, 25 Nov 2002, Stephen J. Wilcox wrote:

 We saw many hundred thousand packets per second entering our network
 from various international peers, each packet was tcp destined to a
 single real end user IP address and sourced from a /16 network address
 eg 61.254.0.0, where the src was random and different on each packet but
 always x.x.0.0

Yes.  We've asked all our upstreams to block it completely (with varying
degrees of success from it being permenantly blocked at their borders to 
we can't apply filters on your interface).

For Junos (I was informed that this is only available in 5.5), you can
filter using:

0.0.0.0/0.0.255.255 

On a cisco you can block using: 

deny ip 0.0.0.0 255.255.0.0 any 

 I was unable to find out more about the data within the packet, the
 sheer volume made diagnosis impossible without killing the routers.

Looked just like a regular SYN flood to the target IP.  Not sure why they
picked source addresses that were so obviously bogus though.

Can anyone think of a reason why this sort of traffic should be routed at 
all?  Does anyone actually drop hosts on to addresses ending in x.x.x.0?

Rich




Re: Odd DDoS, anyone else seen this?

2002-11-25 Thread variable

On Mon, 25 Nov 2002, Chris Roberts wrote:

 Yer, some dial providers that I've seen do it to make use of these
 addresses, as x.x.x.0/32 is a perfectly valid host address.

I've seen this too.  Dialup boxes that use dynamic pools prefer them to
start on a subnet boundry so that they can announce a single aggregate
route for the whole pool. However we ran into problems with using x.x.x.0
before (think it was a broken TCP/IP from some vendor or another) and so 
we moved the dynamic pools further up the subnet.

Rich




no ip forged-source-address

2002-10-30 Thread variable

Hi,

I've been following the discussion on DDoS attacks over the last few weeks
and our network has also recently been the target of a sustained DDoS
attack.  I'm not alone in believing that source address filters are the
simplest way to prevent the types of DDoS traffic that we have all been
seeing with increasing regularity.  Reading the comments on this list have
lead me to believe that there is a lot of inertia involved in applying
what appears to me as very simple filters.

As with the smurf attacks a few years ago, best practice documents and
RFC's don't appear to be effective.  I realise that configuring and
applying a source address filter is trivial, but not enough network admins
seem to be taking the time to lock this down.  If the equipment had
sensible defaults (with the option to bypass them if required), then
perhaps this would be less of an issue.

Therefore, would it be a reasonable suggestion to ask router vendors to
source address filtering in as an option[1] on the interface and then move
it to being the default setting[2] after a period of time?  This appeared
to have some success with reducing the number of networks that forwarded
broadcast packets (as with no ip directed-broadcast).

Just my $0.02,


Richard Morrell
edNET

[1] For example, an IOS config might be:

interface fastethernet 1/0
 no ip forged-source-address

[2] Network admins would still have the option of turning it off, but this 
would have to be explicitly configured.