Re: YAY! Re: Atrivo/Intercage: NO Upstream depeer

2008-09-23 Thread Russell Mitchell
Hello John Doe,

I welcome any further comments you have.
We have to get past people such as yourself, and your blasphemous and false 
statements.

This is the same issue with the recent media and self-proclaimed "Security 
Researchers". Fly-by-night mind you.

To help you out in your claims:
Yes, we did house a client whom had quite a run with their client's 
from various locations, such as Russia.
That Client is no longer hosted on our network. I myself spent all of monday 
afternoon, night, and tuesday morning shutting off EVERY machine they had 
leased in our Billing System. I'm currently working to scan further and see if 
there's anything I may have missed.

Yes, Russia is very well known for Virus and Malware writer's.

Yes, we have had issues with malware distribution from our network.
This was directly and near singularly related to the former client of ours. We 
did have another client, Hostfresh, whom had their share of malware issues.

Both have been completely and effectively removed. The server's leased to both 
of them have been canceled, and their machines have been shutoff.

Let me know if there's anything else you'd like me to state to the public.
We're on a rocky road right now. But it IS starting to smooth out.

Thank you for your time. Have a great day.
 ---
Russell Mitchell

InterCage, Inc.



- Original Message 
From: Mark Foo <[EMAIL PROTECTED]>
To: Bruce Williams <[EMAIL PROTECTED]>
Cc: Christopher Morrow <[EMAIL PROTECTED]>; nanog@nanog.org; Joe Greco <[EMAIL 
PROTECTED]>
Sent: Tuesday, September 23, 2008 11:08:21 PM
Subject: Re: YAY! Re: Atrivo/Intercage: NO Upstream depeer

NANOG:

Look, the people posting here who are trashing Intercage are pure security
analysts -- they
know and understand the evil that is Intercage. STOP TRYING TO ASSIST
INTERCAGE
-- you are effectively aiding and abetting the enemy.

Intercage/Atrivo hosts the malware c&c botnets that DDoS your systems and
networks.

Intercage/Atrivo hosts the spyware that compromises your users' passwords.

Intercage/Atrivo hosts the adware that slows your customers' machines.

Don't take my word for it, DO YOUR OWN RESEARCH:
http://www.google.com/search?hl=en&q=intercage+malware

You don't get called the ***American RBN*** for hosting a couple bad
machines. They
have and will continue to host much of the malware pumped out of America.
THEY
ARE NOT YOUR COMRADES..

These people represent the most HIGHLY ORGANZIED CRIME you will ever
come across. Most people were afraid to speak out against them until this
recent ground swell.

This is the MALWARE CARTEL. GET THE PICTURE?

Many links have been posted here that prove this already -- instead of
asking
what customers they cut off, let them show WHAT CUSTOMERS ARE LEGIT--
because there are NONE.





> >> I would suggest a different Step 1.  Instead of killing power, simply
> >> isolate the affected machine.  This might be as simple as putting up a
> >> firewall rule or two, if it is simply sending outgoing SMTP spam, or
> > it's probably easiest (depending on the network gear of course) to
> > just put the lan port into an isolated VLAN. It's not the 100%
> > solution (some badness rm's itself once it loses connectivity to the
> > internets) but it'd make things simpler for the client/LEA when they
> > need to figure out what happened.
> >
> > -chris
> >
> >
>
>








Re: YAY! Re: Atrivo/Intercage: NO Upstream depeer

2008-09-23 Thread Pedram M
Wow, this topic has really gotten old.


On Tue, Sep 23, 2008 at 11:31 PM, Paul Ferguson <[EMAIL PROTECTED]>wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> On Tue, Sep 23, 2008 at 11:28 PM, Russell Mitchell <[EMAIL PROTECTED]>
> wrote:
>
>
> > Sorry I didn't make this clear enough in the previous responses.
> >
> > The prefixes that are registered to Inhoster belong to Esthost.
> > I'm not sure how or why you think those prefixes belong to us.
> >
> > These prefixes belong DIRECTLY to us:
> > - 69.50.160.0/19  Withdrawn
> > - 216.255.176.0/20Withdrawn
> >
> > These prefixes belong DIRECTLY to nLayer, and were LEASED to us:
> > - 69.22.162.0/23  Withdrawn
> > - 69.22.168.0/21  Withdrawn
> > - 69.22.184.0/22  Withdrawn
> > - 69.31.64.0/20  Withdrawn
> >
> > The prefixes LEASED to us BY nLayer are being reclaimed at the end of
> > this month 09/30/08, as the lease contract is set to cease at that time.
> >
> > Hopefully, that is clear enough for you.
> >
> > Thank you for your time. Have a great day.
> > ---
> > Russell Mitchell
> >
> > InterCage, Inc.
> >
>
> Clear as mud, thanks.
>
> - - ferg
>
> -BEGIN PGP SIGNATURE-
> Version: PGP Desktop 9.6.3 (Build 3017)
>
> wj8DBQFI2d6uq1pz9mNUZTMRAmkcAJ4toRsggJ325VfjkqK8QJKWQG4UegCg84x+
> KwcuyxtFp7/x3/vScFTkP3I=
> =/vFy
> -END PGP SIGNATURE-
>
>
> --
> "Fergie", a.k.a. Paul Ferguson
>  Engineering Architecture for the Internet
>  fergdawgster(at)gmail.com
>  ferg's tech blog: http://fergdawg.blogspot.com/
>
>


Re: YAY! Re: Atrivo/Intercage: NO Upstream depeer

2008-09-23 Thread Paul Ferguson
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Tue, Sep 23, 2008 at 11:28 PM, Russell Mitchell <[EMAIL PROTECTED]>
wrote:


> Sorry I didn't make this clear enough in the previous responses.
>
> The prefixes that are registered to Inhoster belong to Esthost.
> I'm not sure how or why you think those prefixes belong to us.
>
> These prefixes belong DIRECTLY to us:
> - 69.50.160.0/19  Withdrawn
> - 216.255.176.0/20Withdrawn
>
> These prefixes belong DIRECTLY to nLayer, and were LEASED to us:
> - 69.22.162.0/23  Withdrawn
> - 69.22.168.0/21  Withdrawn
> - 69.22.184.0/22  Withdrawn
> - 69.31.64.0/20  Withdrawn
>
> The prefixes LEASED to us BY nLayer are being reclaimed at the end of
> this month 09/30/08, as the lease contract is set to cease at that time.
>
> Hopefully, that is clear enough for you.
>
> Thank you for your time. Have a great day.
> ---
> Russell Mitchell
>
> InterCage, Inc.
>

Clear as mud, thanks.

- - ferg

-BEGIN PGP SIGNATURE-
Version: PGP Desktop 9.6.3 (Build 3017)

wj8DBQFI2d6uq1pz9mNUZTMRAmkcAJ4toRsggJ325VfjkqK8QJKWQG4UegCg84x+
KwcuyxtFp7/x3/vScFTkP3I=
=/vFy
-END PGP SIGNATURE-


-- 
"Fergie", a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 fergdawgster(at)gmail.com
 ferg's tech blog: http://fergdawg.blogspot.com/



Re: YAY! Re: Atrivo/Intercage: NO Upstream depeer

2008-09-23 Thread Russell Mitchell
Hello Paul,

Sorry I didn't make this clear enough in the previous responses.

The prefixes that are registered to Inhoster belong to Esthost.
I'm not sure how or why you think those prefixes belong to us.

These prefixes belong DIRECTLY to us:
- 69.50.160.0/19              Withdrawn
- 216.255.176.0/20            Withdrawn

These prefixes belong DIRECTLY to nLayer, and were LEASED to us:
- 69.22.162.0/23              Withdrawn
- 69.22.168.0/21              Withdrawn
- 69.22.184.0/22              Withdrawn
- 69.31.64.0/20              Withdrawn
 
The prefixes LEASED to us BY nLayer are being reclaimed at the end of this 
month 09/30/08, as the lease contract is set to cease at that time.

Hopefully, that is clear enough for you.

Thank you for your time. Have a great day.
---
Russell Mitchell

InterCage, Inc.



- Original Message 
From: Paul Ferguson <[EMAIL PROTECTED]>
To: Russell Mitchell <[EMAIL PROTECTED]>
Cc: nanog@nanog.org
Sent: Tuesday, September 23, 2008 11:11:39 PM
Subject: Re: YAY! Re: Atrivo/Intercage: NO Upstream depeer

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Tue, Sep 23, 2008 at 10:52 PM, Paul Ferguson <[EMAIL PROTECTED]>
wrote:

> On Tue, Sep 23, 2008 at 10:13 PM, Russell Mitchell <[EMAIL PROTECTED]>
> wrote:
>
>> I believe the blocks your referring to are their 85.255 Blocks?
>> Registered to "InHoster". I believe those prefixes are an entity of
>> their's, though I don't know for sure. Perhaps ask them?
>>
>
> Thanks, thats right -- Inhoster. Operating out of Odessa and blacklisted
> virtually everywhere.
>

Sorry, my last post on this issue.

As you may (or may not) know, Inhoster's domain(s) were suspended due to
criminal activity:

http://whois.domaintools.com/inhoster.com

The prefixes you mention, were deliberately being originated by AS27595  up
until the recent kerfluffle and disconnect on Saturday night:

    Prefixes added and withdrawn by this origin AS in the past 7 days.

          - 64.28.176.0/20              Withdrawn
          - 67.210.0.0/21              Withdrawn
          - 67.210.8.0/22              Withdrawn
          - 67.210.14.0/23              Withdrawn
          - 69.22.162.0/23              Withdrawn
          - 69.22.168.0/21              Withdrawn
          - 69.22.184.0/22              Withdrawn
          - 69.31.64.0/20              Withdrawn
          - 69.50.160.0/19              Withdrawn
          - 85.255.113.0/24            Withdrawn
          - 85.255.114.0/23            Withdrawn
          - 85.255.116.0/22            Withdrawn
          - 85.255.120.0/23            Withdrawn
          - 85.255.122.0/24            Withdrawn
          - 216.255.176.0/20            Withdrawn
          - 216.255.176.0/22            Withdrawn
          - 216.255.180.0/22            Withdrawn
          - 216.255.184.0/22            Withdrawn
          - 216.255.188.0/22            Withdrawn

And they magically reappeared in Cernel (AS36445) almost immediately:

Prefix              AS Path
  64.28.187.0/24      12654 3257 36445
  67.210.12.0/23      12654 3257 36445
  85.255.112.0/20      12654 3257 36445
  93.188.161.0/24      12654 3257 36445
  93.188.166.0/24      12654 3257 36445


This was not an accident.

So what you are saying is that these prefixes have always belonged to
Inhoster?

Thanks,

- - ferg

-BEGIN PGP SIGNATURE-
Version: PGP Desktop 9.6.3 (Build 3017)

wj8DBQFI2doTq1pz9mNUZTMRAupwAKDxEF9kyS/UoTb/Hl2FwEGM1tsj2gCfYF16
qyG0vUAmfxfdQg/vqHFCxbw=
=T+0o
-END PGP SIGNATURE-


-- 
"Fergie", a.k.a. Paul Ferguson
Engineering Architecture for the Internet
fergdawgster(at)gmail.com
ferg's tech blog: http://fergdawg.blogspot.com/








Re: Atrivo/Intercage

2008-09-23 Thread Jo Rhett

On Sep 23, 2008, at 8:12 PM, Joe Greco wrote:

Which is not acceptable.  You answer your abuse complaints, you shut
down your spammers.  Period, end of subject.


That's a bit '90's.  I'll settle for s/answer/handle/, because I don't
think that most sites are willing to actually discuss abuse issues  
with

random folks submitting complaints, and so that leaves you with either
sending a form letter of some sort, or not saying anything.


I went out of my way to get it written into our customer contract that  
we can discuss abuse issues with the affected parties.


And I am simply an employee, neither an executive nor an owner, so  
this took a bit of doing.  But it has given me great pleasure the few  
times that we made a mistake with a customer, and I got to tell the  
affected parties that the abuser is now homeless ;-)


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness






Re: YAY! Re: Atrivo/Intercage: NO Upstream depeer

2008-09-23 Thread Paul Ferguson
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Tue, Sep 23, 2008 at 10:52 PM, Paul Ferguson <[EMAIL PROTECTED]>
wrote:

> On Tue, Sep 23, 2008 at 10:13 PM, Russell Mitchell <[EMAIL PROTECTED]>
> wrote:
>
>> I believe the blocks your referring to are their 85.255 Blocks?
>> Registered to "InHoster". I believe those prefixes are an entity of
>> their's, though I don't know for sure. Perhaps ask them?
>>
>
> Thanks, thats right -- Inhoster. Operating out of Odessa and blacklisted
> virtually everywhere.
>

Sorry, my last post on this issue.

As you may (or may not) know, Inhoster's domain(s) were suspended due to
criminal activity:

http://whois.domaintools.com/inhoster.com

The prefixes you mention, were deliberately being originated by AS27595  up
until the recent kerfluffle and disconnect on Saturday night:

 Prefixes added and withdrawn by this origin AS in the past 7 days.

  - 64.28.176.0/20  Withdrawn
  - 67.210.0.0/21   Withdrawn
  - 67.210.8.0/22   Withdrawn
  - 67.210.14.0/23  Withdrawn
  - 69.22.162.0/23  Withdrawn
  - 69.22.168.0/21  Withdrawn
  - 69.22.184.0/22  Withdrawn
  - 69.31.64.0/20   Withdrawn
  - 69.50.160.0/19  Withdrawn
  - 85.255.113.0/24 Withdrawn
  - 85.255.114.0/23 Withdrawn
  - 85.255.116.0/22 Withdrawn
  - 85.255.120.0/23 Withdrawn
  - 85.255.122.0/24 Withdrawn
  - 216.255.176.0/20Withdrawn
  - 216.255.176.0/22Withdrawn
  - 216.255.180.0/22Withdrawn
  - 216.255.184.0/22Withdrawn
  - 216.255.188.0/22Withdrawn

And they magically reappeared in Cernel (AS36445) almost immediately:

Prefix   AS Path
  64.28.187.0/24   12654 3257 36445
  67.210.12.0/23   12654 3257 36445
  85.255.112.0/20  12654 3257 36445
  93.188.161.0/24  12654 3257 36445
  93.188.166.0/24  12654 3257 36445


This was not an accident.

So what you are saying is that these prefixes have always belonged to
Inhoster?

Thanks,

- - ferg

-BEGIN PGP SIGNATURE-
Version: PGP Desktop 9.6.3 (Build 3017)

wj8DBQFI2doTq1pz9mNUZTMRAupwAKDxEF9kyS/UoTb/Hl2FwEGM1tsj2gCfYF16
qyG0vUAmfxfdQg/vqHFCxbw=
=T+0o
-END PGP SIGNATURE-


-- 
"Fergie", a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 fergdawgster(at)gmail.com
 ferg's tech blog: http://fergdawg.blogspot.com/



Re: YAY! Re: Atrivo/Intercage: NO Upstream depeer

2008-09-23 Thread Mark Foo
NANOG:

Look, the people posting here who are trashing Intercage are pure security
analysts -- they
know and understand the evil that is Intercage. STOP TRYING TO ASSIST
INTERCAGE
-- you are effectively aiding and abetting the enemy.

Intercage/Atrivo hosts the malware c&c botnets that DDoS your systems and
networks.

Intercage/Atrivo hosts the spyware that compromises your users' passwords.

Intercage/Atrivo hosts the adware that slows your customers' machines.

Don't take my word for it, DO YOUR OWN RESEARCH:
http://www.google.com/search?hl=en&q=intercage+malware

You don't get called the ***American RBN*** for hosting a couple bad
machines. They
have and will continue to host much of the malware pumped out of America.
THEY
ARE NOT YOUR COMRADES.

These people represent the most HIGHLY ORGANZIED CRIME you will ever
come across. Most people were afraid to speak out against them until this
recent ground swell.

This is the MALWARE CARTEL. GET THE PICTURE?

Many links have been posted here that prove this already -- instead of
asking
what customers they cut off, let them show WHAT CUSTOMERS ARE LEGIT--
because there are NONE.





> >> I would suggest a different Step 1.  Instead of killing power, simply
> >> isolate the affected machine.  This might be as simple as putting up a
> >> firewall rule or two, if it is simply sending outgoing SMTP spam, or
> > it's probably easiest (depending on the network gear of course) to
> > just put the lan port into an isolated VLAN. It's not the 100%
> > solution (some badness rm's itself once it loses connectivity to the
> > internets) but it'd make things simpler for the client/LEA when they
> > need to figure out what happened.
> >
> > -chris
> >
> >
>
>


Re: YAY! Re: Atrivo/Intercage: NO Upstream depeer

2008-09-23 Thread Paul Ferguson
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Tue, Sep 23, 2008 at 10:13 PM, Russell Mitchell <[EMAIL PROTECTED]>
wrote:

> I believe the blocks your referring to are their 85.255 Blocks?
> Registered to "InHoster". I believe those prefixes are an entity of
> their's, though I don't know for sure. Perhaps ask them?
>

Thanks, thats right -- Inhoster. Operating out of Odessa and blacklisted
virtually everywhere.

Cheers,

- - ferg

-BEGIN PGP SIGNATURE-
Version: PGP Desktop 9.6.3 (Build 3017)

wj8DBQFI2dV3q1pz9mNUZTMRAvOwAKCQtLCPC+ZC3M1SVErh8kYGJ3Zp5ACaA/sE
eHXtt63emWJNy/0NnVAuI6o=
=xUzo
-END PGP SIGNATURE-


-- 
"Fergie", a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 fergdawgster(at)gmail.com
 ferg's tech blog: http://fergdawg.blogspot.com/



Re: YAY! Re: Atrivo/Intercage: NO Upstream depeer

2008-09-23 Thread Russell Mitchell
Hello Joe,

If we can't power down the machine, due to evidence loss. We can't nullroute 
the IP, as stated, some malware will delete itself or alter itself when Net 
Access is lost.
Now we can filter a single port, in the case of spam, phishing, etc?

I'll look further into the JunOS. I'm not too familiar with the rules on the 
Juniper, so I'll take a look further, and see how to achieve this on a single 
IP rather then the network.

Thank you for your time. Have a great day.
 ---
Russell Mitchell

InterCage, Inc.



- Original Message 
From: Joe Greco <[EMAIL PROTECTED]>
To: Russell Mitchell <[EMAIL PROTECTED]>
Cc: nanog@nanog.org
Sent: Tuesday, September 23, 2008 8:20:18 PM
Subject: Re: YAY! Re: Atrivo/Intercage: NO Upstream depeer

> Hello All,=0A=A0=0AIt seems you all missed the memo.=0AAs of about 11PM PST=
>  Last night 09/22/08, Esthost has been ENTIRELY Shutdown. They no longer ha=
> ve ANY Machine on my network.=0A=A0=0AI'm currently starting to monitor som=
> e of the public media, such as google, DroneBL, as well as several Anti-Mal=
> ware community websites for abuse.=0A=A0=0ABeing that Esthost is now entire=
> ly GONE, we should not have any further issues.=0AIn the case that somethin=
> g=A0does arise, such as an exploited host, we're currently developing a gam=
> e plan for=A0response to=A0the issues.=0ATo make the best effort towards co=
> mbatting=A0abuse on our network, here's what I have planned so far for ANY =
> Type of abuse:=0AStep 1,=A0Suspend Power to the affected machine.=0AStep 2,=
>  Call/Email the client whom the affected machine is leased to.=0AStep 3, Al=
> low the client=A0the option to=A0investigate the machine further (Nullroute=
>  access via KVM)=0AStep=A04, Verify the=A0reported content, domain, user, o=
> r exploit=A0is patched/eliminated from the machine.=0AStep 5,=A0Remove the =
> Nullroute. Allow the machine to return to the network.=0A=A0=0AAny comments=
> ? =0A=A0=0AThis is=A0the result of a zero tolerance policy regarding abuse.=
>  If it's clear that the server owner is the cause of the abusive material e=
> tc, the client will then be immediately cancelled. No questions.=A0=0A=0A=
> =0AIt seems that this approach will be the best supported by the anti-abuse=
>  communities, so please let me know your input.=0A=0AThank you for your tim=
> e. Have a great day.=0A=A0---=0ARussell Mitchell=0A=0AInterCage, Inc.=0A=0A=
> =0A=0A- Original Message =0AFrom: Paul Wall <[EMAIL PROTECTED]>=
> =0ATo: Mark Foo <[EMAIL PROTECTED]>=0ACc: [EMAIL PROTECTED]: Tues=
> day, September 23, 2008 5:46:58 PM=0ASubject: Re: YAY! Re: Atrivo/Intercage=
> : NO Upstream depeer=0A=0AHold the rejoicing, Atrivo is back, this time on =
> UnitedLayer.=0A=0AI'd contact them, only they seem to change CTOs every mon=
> th or two,=0Adoes anybody know who's currently in charge?=0A=0AThank you, a=
> nd Drive Slow,=0APaul Wall=0A=0A=0A      

Speaking of missing memos...  mailing lists are not highly compatible 
with HTML or some clients that like to encode list mail.  The above is 
what your mail looked like to some people.

I would suggest a different Step 1.  Instead of killing power, simply
isolate the affected machine.  This might be as simple as putting up a
firewall rule or two, if it is simply sending outgoing SMTP spam, or
for more complex issues, downing the port facing the machine in question.
Killing the power may destroy useful forensic clues about what happened 
to the system, and may damage the system.

... JG
-- 
Joe Greco - sol.net Network Services - Milwaukee, WI - http://www.sol.net
"We call it the 'one bite at the apple' rule. Give me one chance [and] then I
won't contact you again." - Direct Marketing Ass'n position on e-mail spam(CNN)
With 24 million small businesses in the US alone, that's way too many apples.








Re: YAY! Re: Atrivo/Intercage: NO Upstream depeer

2008-09-23 Thread Russell Mitchell
Hello Paul,

Those are their IP Blocks. We were simply routing them, as they were our client.
They've owned these blocks for quite a while. They seem to have moved that 
after a day of being down.

I haven't been monitoring their blocks, and made the decision Sunday Night that 
they were no longer going to be allowed on our network.
I believe the blocks your referring to are their 85.255 Blocks? Registered to 
"InHoster". I believe those prefixes are an entity of their's, though I don't 
know for sure. Perhaps ask them?
Cernel is their own ASN. It's not associated with our company.

Thank you for your time. Have a great day. 
---
Russell Mitchell

InterCage, Inc.



- Original Message 
From: Paul Ferguson <[EMAIL PROTECTED]>
To: Russell Mitchell <[EMAIL PROTECTED]>
Cc: nanog@nanog.org
Sent: Tuesday, September 23, 2008 9:22:03 PM
Subject: Re: YAY! Re: Atrivo/Intercage: NO Upstream depeer

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi Russ,

While I think that is great and everything, can you explain why Cernel is
now originating prefixes which were originally originated by
Atrivo/Intercage?

I'd be curious as to your explanation.

Thanks,

- - ferg


On Tue, Sep 23, 2008 at 9:05 PM, Russell Mitchell <[EMAIL PROTECTED]>
wrote:
> Apologies, Yahoo was set to "Rich Text" :(
>
> -
>
> Hello All,
>
> It seems you all missed the memo.As of about 11PM PST
> Last night 09/22/08, Esthost has been ENTIRELY Shutdown.
> They no longer have ANY Machine on my network.
>
> I'm currently starting to monitor some of the public media, such as
> google, DroneBL, as well as several Anti-Malware community websites for
> abuse. Being that Esthost is now entirely GONE, we should not have any
> further issues. In the case that something does arise, such as an
> exploited host, we're currently developing a game plan for response to
> the issues.
>
> To make the best effort towards combatting abuse on our network, here's
> what I have planned so far for ANY Type of abuse: Step 1, Suspend Power
> to the affected machine.
> Step 2, Call/Email the client whom the affected machine is leased to.
> Step 3, Allow the client the option to investigate the machine further
> (Nullroute access via KVM)= Step 4, Verify the reported content, domain,
> user, or exploit is patched/eliminated from the machine. Step 5, Remove
> the Nullroute. Allow the machine to return to the network.
>
> Any comments? This is the result of a zero tolerance policy regarding
> abuse.
>
> If it's clear that the server owner is the cause of the abusive material
> etc, the client will then be immediately cancelled. No questions. It
> seems that this approach will be the best supported by the anti-abuse
> communities, so please let me know your input.
>
> Thank you for your time. Have a great day.
>
> ---
> Russell Mitchell
> InterCage, Inc.
>
>
>
>
>
>


-BEGIN PGP SIGNATURE-
Version: PGP Desktop 9.6.3 (Build 3017)

wj8DBQFI2cBUq1pz9mNUZTMRAtbAAJwKk/H/9Pz4YelIgnYvtuCCDhmuswCfcrfV
PTUD/SyPo8+zHpACucRPqk4=
=+rwg
-END PGP SIGNATURE-


-- 
"Fergie", a.k.a. Paul Ferguson
Engineering Architecture for the Internet
fergdawgster(at)gmail.com
ferg's tech blog: http://fergdawg.blogspot.com/








Re: Yahoo Email

2008-09-23 Thread Mark Andrews
In article <[EMAIL PROTECTED]> you write:
>> Hello All,=0A=A0=0AIt seems you all missed the memo.=0AAs of about 11PM PST=
>>  Last night 09/22/08, Esthost has been ENTIRELY Shutdown. They no longer ha=
>> ve ANY Machine on my network.=0A=A0=0AI'm currently starting to monitor som=
>> e of the public media, such as google, DroneBL, as well as several Anti-Mal=
>> ware community websites for abuse.=0A=A0=0ABeing that Esthost is now entire=

[snipped]
>Speaking of missing memos...  mailing lists are not highly compatible 
>with HTML or some clients that like to encode list mail.  The above is 
>what your mail looked like to some people.

Most email from Yahoo is like this.  Yahoo doesn't know how
to do quoted-printable properly.  It displays ok if you
speak mime but not if you don't.  The intent of quoted-printable
is to display ASCII nicely if you don't have a mime compliant
reader.

Mark

RFC 2045.

   The Quoted-Printable encoding is intended to represent data that
   largely consists of octets that correspond to printable characters in
   the US-ASCII character set.  It encodes the data in such a way that
   the resulting octets are unlikely to be modified by mail transport.
   If the data being encoded are mostly US-ASCII text, the encoded form
   of the data remains largely recognizable by humans.  A body which is
   entirely US-ASCII may also be encoded in Quoted-Printable to ensure
   the integrity of the data should the message pass through a
   character-translating, and/or line-wrapping gateway.

also

(4)   (Line Breaks) A line break in a text body, represented
  as a CRLF sequence in the text canonical form, must be
  represented by a (RFC 822) line break, which is also a
  CRLF sequence, in the Quoted-Printable encoding.  Since
  the canonical representation of media types other than
  text do not generally include the representation of
  line breaks as CRLF sequences, no hard line breaks
  (i.e. line breaks that are intended to be meaningful
  and to be displayed to the user) can occur in the
  quoted-printable encoding of such types.  Sequences
  like "=0D", "=0A", "=0A=0D" and "=0D=0A" will routinely
  appear in non-text data represented in quoted-
  printable, of course.



Re: YAY! Re: Atrivo/Intercage: NO Upstream depeer

2008-09-23 Thread Paul Ferguson
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

It may be true that Estdomains has moved a couple of the external-facing a
hosting hosts into the a Netherlands hosting provider in conjunction with
this whole situation -- folks are watching very carefully.

estdomains.com A 94.102.49.3
storefront.estdomains.com A 94.102.49.5
www.estdomains.com A 94.102.49.4
www.estsecure.com A 94.102.49.5

AS  | IP   | AS Name
29073   | 94.102.49.3  | ECATEL-AS AS29073, Ecatel Network

% Information related to '94.102.48.0 - 94.102.63.255'

inetnum: 94.102.48.0 - 94.102.63.255
netname: NL-ECATEL-20080829
descr: Ecatel LTD
country: NL
org: ORG-EL38-RIPE
admin-c: RvE16-RIPE
tech-c: RvE16-RIPE
status: ALLOCATED PA
mnt-by: RIPE-NCC-HM-MNT
mnt-lower: ECATEL-MNT
mnt-routes: ECATEL-MNT
source: RIPE # Filtered

organisation: ORG-EL38-RIPE
org-name: Ecatel LTD
org-type: LIR
address: Ecatel LTD
Reinier van Eeden
P.O.Box 19533
2521 CA The Hague
NETHERLANDS
phone: +31702204015
fax-no: +31702204015
e-mail: [EMAIL PROTECTED]
admin-c: RvE16-RIPE
mnt-ref: ECATEL-MNT
mnt-ref: RIPE-NCC-HM-MNT
mnt-by: RIPE-NCC-HM-MNT
source: RIPE # Filtered


DNSLogger:

estdomains.com   A  94.102.49.3
estdomains.com   A  216.255.176.238
estdomains.com   NS ans1.esthost.com
estdomains.com   NS ans2.esthost.com
estdomains.com   NS temp1.estdomains.com
estdomains.com   NS ns1.estdomains.com
estdomains.com   NS temp2.estdomains.com
estdomains.com   NS ns2.estdomains.com

http://www.bfk.de/bfk_dnslogger.html

Thanks,

- - ferg

On Tue, Sep 23, 2008 at 9:05 PM, Russell Mitchell <[EMAIL PROTECTED]>
wrote:
> Apologies, Yahoo was set to "Rich Text" :(
>
> -
>
> Hello All,
>
> It seems you all missed the memo.As of about 11PM PST
> Last night 09/22/08, Esthost has been ENTIRELY Shutdown.
> They no longer have ANY Machine on my network.
>

-BEGIN PGP SIGNATURE-
Version: PGP Desktop 9.6.3 (Build 3017)

wj8DBQFI2cVCq1pz9mNUZTMRAtC1AJ9UK326w0H3C8lpB1cxz6EJC6KbqwCgjlwA
3WvkkgfWuVapwt1OKbys4dk=
=B4vI
-END PGP SIGNATURE-

-- 
"Fergie", a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 fergdawgster(at)gmail.com
 ferg's tech blog: http://fergdawg.blogspot.com/



Re: YAY! Re: Atrivo/Intercage: NO Upstream depeer

2008-09-23 Thread Paul Ferguson
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi Russ,

While I think that is great and everything, can you explain why Cernel is
now originating prefixes which were originally originated by
Atrivo/Intercage?

I'd be curious as to your explanation.

Thanks,

- - ferg


On Tue, Sep 23, 2008 at 9:05 PM, Russell Mitchell <[EMAIL PROTECTED]>
wrote:
> Apologies, Yahoo was set to "Rich Text" :(
>
> -
>
> Hello All,
>
> It seems you all missed the memo.As of about 11PM PST
> Last night 09/22/08, Esthost has been ENTIRELY Shutdown.
> They no longer have ANY Machine on my network.
>
> I'm currently starting to monitor some of the public media, such as
> google, DroneBL, as well as several Anti-Malware community websites for
> abuse. Being that Esthost is now entirely GONE, we should not have any
> further issues. In the case that something does arise, such as an
> exploited host, we're currently developing a game plan for response to
> the issues.
>
> To make the best effort towards combatting abuse on our network, here's
> what I have planned so far for ANY Type of abuse: Step 1, Suspend Power
> to the affected machine.
> Step 2, Call/Email the client whom the affected machine is leased to.
> Step 3, Allow the client the option to investigate the machine further
> (Nullroute access via KVM)= Step 4, Verify the reported content, domain,
> user, or exploit is patched/eliminated from the machine. Step 5, Remove
> the Nullroute. Allow the machine to return to the network.
>
> Any comments? This is the result of a zero tolerance policy regarding
> abuse.
>
> If it's clear that the server owner is the cause of the abusive material
> etc, the client will then be immediately cancelled. No questions. It
> seems that this approach will be the best supported by the anti-abuse
> communities, so please let me know your input.
>
> Thank you for your time. Have a great day.
>
> ---
> Russell Mitchell
> InterCage, Inc.
>
>
>
>
>
>


-BEGIN PGP SIGNATURE-
Version: PGP Desktop 9.6.3 (Build 3017)

wj8DBQFI2cBUq1pz9mNUZTMRAtbAAJwKk/H/9Pz4YelIgnYvtuCCDhmuswCfcrfV
PTUD/SyPo8+zHpACucRPqk4=
=+rwg
-END PGP SIGNATURE-


-- 
"Fergie", a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 fergdawgster(at)gmail.com
 ferg's tech blog: http://fergdawg.blogspot.com/



Re: YAY! Re: Atrivo/Intercage: NO Upstream depeer

2008-09-23 Thread Russell Mitchell
Apologies, Yahoo was set to "Rich Text" :(

-

Hello All,

It seems you all missed the memo.As of about 11PM PST
Last night 09/22/08, Esthost has been ENTIRELY Shutdown. 
They no longer have ANY Machine on my network.

I'm currently starting to monitor some of the public media, such as google, 
DroneBL, as well as several Anti-Malware community websites for abuse.
Being that Esthost is now entirely GONE, we should not have any further issues.
In the case that something does arise, such as an exploited host, we're 
currently developing a game plan for response to the issues. 

To make the best effort towards combatting abuse on our network, here's what I 
have planned so far for ANY Type of abuse:
Step 1, Suspend Power to the affected machine.
Step 2, Call/Email the client whom the affected machine is leased to.
Step 3, Allow the client the option to investigate the machine further 
(Nullroute access via KVM)=
Step 4, Verify the reported content, domain, user, or exploit is 
patched/eliminated from the machine.
Step 5, Remove the Nullroute. Allow the machine to return to the network. 

Any comments? This is the result of a zero tolerance policy regarding abuse.

If it's clear that the server owner is the cause of the abusive material etc, 
the client will then be immediately cancelled. No questions. 
It seems that this approach will be the best supported by the anti-abuse 
communities, so please let me know your input.

Thank you for your time. Have a great day.

---
Russell Mitchell
InterCage, Inc.


  




Re: YAY! Re: Atrivo/Intercage: NO Upstream depeer

2008-09-23 Thread Bruce Williams
using bolt cutters on cables has a certain satisfaction...

On Tue, Sep 23, 2008 at 8:23 PM, Christopher Morrow
<[EMAIL PROTECTED]> wrote:
> On Tue, Sep 23, 2008 at 11:20 PM, Joe Greco <[EMAIL PROTECTED]> wrote:
>
>> I would suggest a different Step 1.  Instead of killing power, simply
>> isolate the affected machine.  This might be as simple as putting up a
>> firewall rule or two, if it is simply sending outgoing SMTP spam, or
>
> it's probably easiest (depending on the network gear of course) to
> just put the lan port into an isolated VLAN. It's not the 100%
> solution (some badness rm's itself once it loses connectivity to the
> internets) but it'd make things simpler for the client/LEA when they
> need to figure out what happened.
>
> -chris
>
>



RE: hat tip to .gov hostmasters

2008-09-23 Thread Frank Bulk
Pretty soon we'll have a blacklist of DNS servers that don't support DNSSEC
for .gov. =)

Frank

-Original Message-
From: Chris Owen [mailto:[EMAIL PROTECTED] 
Sent: Monday, September 22, 2008 10:02 AM
To: NANOG list
Subject: Re: hat tip to .gov hostmasters

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Sep 22, 2008, at 9:59 AM, Simon Vallet wrote:

> On Mon, 22 Sep 2008 10:52:42 -0400
> "Jason Frisvold" <[EMAIL PROTECTED]> wrote:
>
>> I'm not much up on DNSSEC, but don't you need to be using a resolver
>> that recognizes DNSSEC in order for this to be useful?
>
> You do -- and last time I checked few native resolvers actually did :
> glibc doesn't, and I'd be surprised if the Windows resolver does

Chicken, meet egg.

I think the point of the original post is that one end or the other
has to start things.  At least we have one US zone doing something on
the server end of things.

Chris


Chris Owen ~ Garden City (620) 275-1900 ~  Lottery (noun):
President  ~ Wichita (316) 858-3000 ~A stupidity tax
Hubris Communications Inc  www.hubris.net





-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (Darwin)
Comment: Public Key: http://home.hubris.net/owenc/pgpkey.txt
Comment: Public Key ID: 0xB513D9DD

iEYEARECAAYFAkjXs30ACgkQElUlCLUT2d0SfwCbB8FQ4izN061GoQQMl3fkq+NT
ga0AoJnwGG8PfBs5PaziRB6m0NQBuZwc
=68dm
-END PGP SIGNATURE-





Re: YAY! Re: Atrivo/Intercage: NO Upstream depeer

2008-09-23 Thread Christopher Morrow
On Tue, Sep 23, 2008 at 11:20 PM, Joe Greco <[EMAIL PROTECTED]> wrote:

> I would suggest a different Step 1.  Instead of killing power, simply
> isolate the affected machine.  This might be as simple as putting up a
> firewall rule or two, if it is simply sending outgoing SMTP spam, or

it's probably easiest (depending on the network gear of course) to
just put the lan port into an isolated VLAN. It's not the 100%
solution (some badness rm's itself once it loses connectivity to the
internets) but it'd make things simpler for the client/LEA when they
need to figure out what happened.

-chris



Re: YAY! Re: Atrivo/Intercage: NO Upstream depeer

2008-09-23 Thread Christopher Morrow
please to not email in html format... yikes! Russ, could you re-mail
whatever content you just sent, in plain text?

On Tue, Sep 23, 2008 at 11:07 PM, Russell Mitchell <[EMAIL PROTECTED]> wrote:
> MIME-Version: 1.0
> Content-Type: multipart/alternative; boundary="0-593512929-125655=:9145"
>
> --0-593512929-125655=:9145
> Content-Type: text/plain; charset=iso-8859-1
> Content-Transfer-Encoding: quoted-printable
>
> Hello All,=0A=A0=0AIt seems you all missed the memo.=0AAs of about 11PM PST=
>  Last night 09/22/08, Esthost has been ENTIRELY Shutdown. They no longer ha=
> ve ANY Machine on my network.=0A=A0=0AI'm currently starting to monitor som=
> e of the public media, such as google, DroneBL, as well as several Anti-Mal=
> ware community websites for abuse.=0A=A0=0ABeing that Esthost is now entire=
> ly GONE, we should not have any further issues.=0AIn the case that somethin=
> g=A0does arise, such as an exploited host, we're currently developing a gam=
> e plan for=A0response to=A0the issues.=0ATo make the best effort towards co=
> mbatting=A0abuse on our network, here's what I have planned so far for ANY =
> Type of abuse:=0AStep 1,=A0Suspend Power to the affected machine.=0AStep 2,=
>  Call/Email the client whom the affected machine is leased to.=0AStep 3, Al=
> low the client=A0the option to=A0investigate the machine further (Nullroute=
>  access via KVM)=0AStep=A04, Verify the=A0reported content, domain, user, o=
> r exploit=A0is patched/eliminated from the machine.=0AStep 5,=A0Remove the =
> Nullroute. Allow the machine to return to the network.=0A=A0=0AAny comments=
> ? =0A=A0=0AThis is=A0the result of a zero tolerance policy regarding abuse.=
>  If it's clear that the server owner is the cause of the abusive material e=
> tc, the client will then be immediately cancelled. No questions.=A0=0A=0A=
> =0AIt seems that this approach will be the best supported by the anti-abuse=
>  communities, so please let me know your input.=0A=0AThank you for your tim=
> e. Have a great day.=0A=A0---=0ARussell Mitchell=0A=0AInterCage, Inc.=0A=0A=
> =0A=0A- Original Message =0AFrom: Paul Wall <[EMAIL PROTECTED]>=
> =0ATo: Mark Foo <[EMAIL PROTECTED]>=0ACc: [EMAIL PROTECTED]: Tues=
> day, September 23, 2008 5:46:58 PM=0ASubject: Re: YAY! Re: Atrivo/Intercage=
> : NO Upstream depeer=0A=0AHold the rejoicing, Atrivo is back, this time on =
> UnitedLayer.=0A=0AI'd contact them, only they seem to change CTOs every mon=
> th or two,=0Adoes anybody know who's currently in charge?=0A=0AThank you, a=
> nd Drive Slow,=0APaul Wall=0A=0A=0A
> --0-593512929-125655=:9145
> Content-Type: text/html; charset=us-ascii
>
> Hello All,
>  
> It seems you all missed the memo.As of about 11PM PST Last night 
> 09/22/08, Esthost has been ENTIRELY Shutdown. They no longer have ANY Machine 
> on my network.
>  
> I'm currently starting to monitor some of the public media, such as 
> google, DroneBL, as well as several Anti-Malware community websites for 
> abuse.
>  
> Being that Esthost is now entirely GONE, we should not have any further 
> issues.
> In the case that something does arise, such as an exploited host, we're 
> currently developing a game plan for response to the issues.
> To make the best effort towards combatting abuse on our network, here's 
> what I have planned so far for ANY Type of abuse:
> Step 1, Suspend Power to the affected machine.
> Step 2, Call/Email the client whom the affected machine is leased to.
> Step 3, Allow the client the option to investigate the machine further 
> (Nullroute access via KVM)
> Step 4, Verify the reported content, domain, user, or exploit is 
> patched/eliminated from the machine.
> Step 5, Remove the Nullroute. Allow the machine to return to the 
> network.
>  
> Any comments? 
>  
> This is the result of a zero tolerance policy regarding abuse. If it's 
> clear that the server owner is the cause of the abusive material etc, the 
> client will then be immediately cancelled. No questions. 
> 
> 
>  
> It seems that this approach will be the best supported by the anti-abuse 
> communities, so please let me know your input.
>  
> Thank you for your time. Have a great day. ---Russell 
> Mitchell
> InterCage, Inc.
> 
> - 
> Original Message From: Paul Wall <[EMAIL PROTECTED]>To: Mark Foo 
> <[EMAIL PROTECTED]>Cc: nanog@nanog.orgSent: Tuesday, September 23, 
> 2008 5:46:58 PMSubject: Re: YAY! Re: Atrivo/Intercage: NO Upstream 
> depeerHold the rejoicing, Atrivo is back, this time on 
> UnitedLayer.I'd contact them, only they seem to change CTOs every 
> month or two,does anybody know who's currently in charge?Thank 
> you, and Drive Slow,Paul Wall
>
>  
> --0-593512929-125655=:9145--
>
>
>



Re: YAY! Re: Atrivo/Intercage: NO Upstream depeer

2008-09-23 Thread Joe Greco
> Hello All,=0A=A0=0AIt seems you all missed the memo.=0AAs of about 11PM PST=
>  Last night 09/22/08, Esthost has been ENTIRELY Shutdown. They no longer ha=
> ve ANY Machine on my network.=0A=A0=0AI'm currently starting to monitor som=
> e of the public media, such as google, DroneBL, as well as several Anti-Mal=
> ware community websites for abuse.=0A=A0=0ABeing that Esthost is now entire=
> ly GONE, we should not have any further issues.=0AIn the case that somethin=
> g=A0does arise, such as an exploited host, we're currently developing a gam=
> e plan for=A0response to=A0the issues.=0ATo make the best effort towards co=
> mbatting=A0abuse on our network, here's what I have planned so far for ANY =
> Type of abuse:=0AStep 1,=A0Suspend Power to the affected machine.=0AStep 2,=
>  Call/Email the client whom the affected machine is leased to.=0AStep 3, Al=
> low the client=A0the option to=A0investigate the machine further (Nullroute=
>  access via KVM)=0AStep=A04, Verify the=A0reported content, domain, user, o=
> r exploit=A0is patched/eliminated from the machine.=0AStep 5,=A0Remove the =
> Nullroute. Allow the machine to return to the network.=0A=A0=0AAny comments=
> ? =0A=A0=0AThis is=A0the result of a zero tolerance policy regarding abuse.=
>  If it's clear that the server owner is the cause of the abusive material e=
> tc, the client will then be immediately cancelled. No questions.=A0=0A=0A=
> =0AIt seems that this approach will be the best supported by the anti-abuse=
>  communities, so please let me know your input.=0A=0AThank you for your tim=
> e. Have a great day.=0A=A0---=0ARussell Mitchell=0A=0AInterCage, Inc.=0A=0A=
> =0A=0A- Original Message =0AFrom: Paul Wall <[EMAIL PROTECTED]>=
> =0ATo: Mark Foo <[EMAIL PROTECTED]>=0ACc: [EMAIL PROTECTED]: Tues=
> day, September 23, 2008 5:46:58 PM=0ASubject: Re: YAY! Re: Atrivo/Intercage=
> : NO Upstream depeer=0A=0AHold the rejoicing, Atrivo is back, this time on =
> UnitedLayer.=0A=0AI'd contact them, only they seem to change CTOs every mon=
> th or two,=0Adoes anybody know who's currently in charge?=0A=0AThank you, a=
> nd Drive Slow,=0APaul Wall=0A=0A=0A  

Speaking of missing memos...  mailing lists are not highly compatible 
with HTML or some clients that like to encode list mail.  The above is 
what your mail looked like to some people.

I would suggest a different Step 1.  Instead of killing power, simply
isolate the affected machine.  This might be as simple as putting up a
firewall rule or two, if it is simply sending outgoing SMTP spam, or
for more complex issues, downing the port facing the machine in question.
Killing the power may destroy useful forensic clues about what happened 
to the system, and may damage the system.

... JG
-- 
Joe Greco - sol.net Network Services - Milwaukee, WI - http://www.sol.net
"We call it the 'one bite at the apple' rule. Give me one chance [and] then I
won't contact you again." - Direct Marketing Ass'n position on e-mail spam(CNN)
With 24 million small businesses in the US alone, that's way too many apples.



Re: Atrivo/Intercage

2008-09-23 Thread Joe Greco
> On Sep 22, 2008, at 1:33 PM, Tom Sparks (Applied Operations) wrote:
> > I also don't believe Intercage was complicit in any
> > net-crime; Thats not to say it didn't exist, but more along the lines
> > of they got lost in the noise of running a business.
> 
> Which is not acceptable.  You answer your abuse complaints, you shut  
> down your spammers.  Period, end of subject.

That's a bit '90's.  I'll settle for s/answer/handle/, because I don't
think that most sites are willing to actually discuss abuse issues with
random folks submitting complaints, and so that leaves you with either
sending a form letter of some sort, or not saying anything.  Further,
many places seem to send form letters but not do anything.  I am not
sure that there is much (or any) value-add in sending a response, unless
further information is needed.

>From my point of view, the best response is when the problem simply goes
away.  A personal reply (rather than a form letter) is also generally a
really good sign that someone cares enough to show that they're doing
something, but again that seems to be the exception rather than the
norm.  The Afterburner experience, however, should be an excellent 
example for the difference that simply *showing* you care and are doing
something makes.

... JG
-- 
Joe Greco - sol.net Network Services - Milwaukee, WI - http://www.sol.net
"We call it the 'one bite at the apple' rule. Give me one chance [and] then I
won't contact you again." - Direct Marketing Ass'n position on e-mail spam(CNN)
With 24 million small businesses in the US alone, that's way too many apples.



Re: YAY! Re: Atrivo/Intercage: NO Upstream depeer

2008-09-23 Thread Russell Mitchell
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="0-593512929-125655=:9145"

--0-593512929-125655=:9145
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

Hello All,=0A=A0=0AIt seems you all missed the memo.=0AAs of about 11PM PST=
 Last night 09/22/08, Esthost has been ENTIRELY Shutdown. They no longer ha=
ve ANY Machine on my network.=0A=A0=0AI'm currently starting to monitor som=
e of the public media, such as google, DroneBL, as well as several Anti-Mal=
ware community websites for abuse.=0A=A0=0ABeing that Esthost is now entire=
ly GONE, we should not have any further issues.=0AIn the case that somethin=
g=A0does arise, such as an exploited host, we're currently developing a gam=
e plan for=A0response to=A0the issues.=0ATo make the best effort towards co=
mbatting=A0abuse on our network, here's what I have planned so far for ANY =
Type of abuse:=0AStep 1,=A0Suspend Power to the affected machine.=0AStep 2,=
 Call/Email the client whom the affected machine is leased to.=0AStep 3, Al=
low the client=A0the option to=A0investigate the machine further (Nullroute=
 access via KVM)=0AStep=A04, Verify the=A0reported content, domain, user, o=
r exploit=A0is patched/eliminated from the machine.=0AStep 5,=A0Remove the =
Nullroute. Allow the machine to return to the network.=0A=A0=0AAny comments=
? =0A=A0=0AThis is=A0the result of a zero tolerance policy regarding abuse.=
 If it's clear that the server owner is the cause of the abusive material e=
tc, the client will then be immediately cancelled. No questions.=A0=0A=0A=
=0AIt seems that this approach will be the best supported by the anti-abuse=
 communities, so please let me know your input.=0A=0AThank you for your tim=
e. Have a great day.=0A=A0---=0ARussell Mitchell=0A=0AInterCage, Inc.=0A=0A=
=0A=0A- Original Message =0AFrom: Paul Wall <[EMAIL PROTECTED]>=
=0ATo: Mark Foo <[EMAIL PROTECTED]>=0ACc: [EMAIL PROTECTED]: Tues=
day, September 23, 2008 5:46:58 PM=0ASubject: Re: YAY! Re: Atrivo/Intercage=
: NO Upstream depeer=0A=0AHold the rejoicing, Atrivo is back, this time on =
UnitedLayer.=0A=0AI'd contact them, only they seem to change CTOs every mon=
th or two,=0Adoes anybody know who's currently in charge?=0A=0AThank you, a=
nd Drive Slow,=0APaul Wall=0A=0A=0A  
--0-593512929-125655=:9145
Content-Type: text/html; charset=us-ascii

Hello All,
 
It seems you all missed the memo.As of about 11PM PST Last night 
09/22/08, Esthost has been ENTIRELY Shutdown. They no longer have ANY Machine 
on my network.
 
I'm currently starting to monitor some of the public media, such as google, 
DroneBL, as well as several Anti-Malware community websites for abuse.
 
Being that Esthost is now entirely GONE, we should not have any further 
issues.
In the case that something does arise, such as an exploited host, we're 
currently developing a game plan for response to the issues.
To make the best effort towards combatting abuse on our network, here's 
what I have planned so far for ANY Type of abuse:
Step 1, Suspend Power to the affected machine.
Step 2, Call/Email the client whom the affected machine is leased to.
Step 3, Allow the client the option to investigate the machine 
further (Nullroute access via KVM)
Step 4, Verify the reported content, domain, user, or 
exploit is patched/eliminated from the machine.
Step 5, Remove the Nullroute. Allow the machine to return to the 
network.
 
Any comments? 
 
This is the result of a zero tolerance policy regarding abuse. If it's 
clear that the server owner is the cause of the abusive material etc, the 
client will then be immediately cancelled. No questions. 


 
It seems that this approach will be the best supported by the anti-abuse 
communities, so please let me know your input.
 
Thank you for your time. Have a great day. ---Russell 
Mitchell
InterCage, Inc.

- 
Original Message From: Paul Wall <[EMAIL PROTECTED]>To: Mark 
Foo <[EMAIL PROTECTED]>Cc: nanog@nanog.orgSent: Tuesday, 
September 23, 2008 5:46:58 PMSubject: Re: YAY! Re: Atrivo/Intercage: NO 
Upstream depeerHold the rejoicing, Atrivo is back, this time on 
UnitedLayer.I'd contact them, only they seem to change CTOs every month 
or two,does anybody know who's currently in charge?Thank you, and 
Drive Slow,Paul Wall

  
--0-593512929-125655=:9145--




Re: Atrivo/Intercage

2008-09-23 Thread Jo Rhett

On Sep 22, 2008, at 1:33 PM, Tom Sparks (Applied Operations) wrote:

I also don't believe Intercage was complicit in any
net-crime; Thats not to say it didn't exist, but more along the lines
of they got lost in the noise of running a business.


Which is not acceptable.  You answer your abuse complaints, you shut  
down your spammers.  Period, end of subject.


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness






Re: YAY! Re: Atrivo/Intercage: NO Upstream depeer

2008-09-23 Thread Paul Ferguson
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Well, their management team is listed here:

http://www.unitedlayer.com/team.html

- - ferg

On Tue, Sep 23, 2008 at 5:46 PM, Paul Wall <[EMAIL PROTECTED]> wrote:
> Hold the rejoicing, Atrivo is back, this time on UnitedLayer.
>
> I'd contact them, only they seem to change CTOs every month or two,
> does anybody know who's currently in charge?
>
> Thank you, and Drive Slow,
> Paul Wall
>
>

-BEGIN PGP SIGNATURE-
Version: PGP Desktop 9.6.3 (Build 3017)

wj8DBQFI2Y/zq1pz9mNUZTMRAnfWAKClED9vjhHusr2Y6+HJ4Bc9fHAosACeOhfK
8coixrmTH5I3Hlh2phmut5w=
=gzBi
-END PGP SIGNATURE-



-- 
"Fergie", a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 fergdawgster(at)gmail.com
 ferg's tech blog: http://fergdawg.blogspot.com/



Re: YAY! Re: Atrivo/Intercage: NO Upstream depeer

2008-09-23 Thread Paul Wall
Hold the rejoicing, Atrivo is back, this time on UnitedLayer.

I'd contact them, only they seem to change CTOs every month or two,
does anybody know who's currently in charge?

Thank you, and Drive Slow,
Paul Wall



RE: Seattle Peering

2008-09-23 Thread Chris Caputo
If you are in S&D/PAIX's facility, you have two options for connecting to 
the SIX:

 - direct to the SIX core via the fiber-meet-me-room, thus no VLAN.  You 
   won't get access to the PAIX-SEA fabric with this method, but if what 
   you really want is the SIX, this is the way to go.

 - direct to the PAIX-SEA switch, in which case you'll need to instruct 
   S&D to enable your port to also have access to the SIX fabric.  Your 
   router will have two VLAN interfaces on the port, one for PAIX-SEA and 
   one for the SIX.

Feel free to direct further questions to [EMAIL PROTECTED] if you like.

Chris

On Tue, 23 Sep 2008, Paul Stewart wrote:
> Thanks very much... we have a price from S&D for the x-connect.  If we
> connect on the PAIX side (most likely) do we need multiple VLAN's?  I
> had planned on a single VLAN on the port for there - just need to
> understand ;)
> 
> Thanks,
> 
> Paul
> 
> 
> -Original Message-
> From: Chris Caputo [mailto:[EMAIL PROTECTED]
> Sent: September 23, 2008 6:13 PM
> To: Paul Stewart; Michael K. Smith
> Cc: NANOG list
> Subject: Re: Seattle Peering
> 
> On Thu, 18 Sep 2008, Michael K. Smith wrote:
> > Hello Paul:
> >
> > On 9/18/08 8:01 AM, "Paul Stewart" <[EMAIL PROTECTED]> wrote:
> > > Hi folks...
> > >
> > > We're working on some plans to peer in the Seattle area.  Choices so 
> > > far considered are SIX and PAIX Seattle pretty much
> > >
> > > I was of the impression that if you get a port on one of these 
> > > exchanges, you can connect to the other one as well?  Just looking 
> > > for clarification from folks who are connected out there..;)  Any 
> > > charges to go between the exchanges or it just included?
> >
> > Speaking from the SIX side, there is no charge to connect to the 
> > fabric if you supply the optics, and there is a one-time fiber cross 
> > connect charge of $200.00 US.  The SIX and PAIX are directly connected 
> > and you can peer across the fabric.  The SIX page is 
> > http://www.seattleix.net for more info or you can email me directly.
> 
> And keep in mind that while the SIX and PAIX-SEA are directly connected,
> 
> the exchanges are on different VLANs from the perspective of a PAIX-SEA 
> connection.
> 
> If you connect on the SIX side, you can only reach the SIX fabric.  No 
> MRC.
> 
> If you connect on the PAIX-SEA side, you can reach both the SIX fabric 
> and the PAIX-SEA fabric via a single router port.  For MRC talk to an 
> S&D rep.
> 
> Chris



RE: Seattle Peering

2008-09-23 Thread Paul Stewart
Thanks very much... we have a price from S&D for the x-connect.  If we
connect on the PAIX side (most likely) do we need multiple VLAN's?  I
had planned on a single VLAN on the port for there - just need to
understand ;)

Thanks,

Paul


-Original Message-
From: Chris Caputo [mailto:[EMAIL PROTECTED]
Sent: September 23, 2008 6:13 PM
To: Paul Stewart; Michael K. Smith
Cc: NANOG list
Subject: Re: Seattle Peering

On Thu, 18 Sep 2008, Michael K. Smith wrote:
> Hello Paul:
>
> On 9/18/08 8:01 AM, "Paul Stewart" <[EMAIL PROTECTED]> wrote:
> > Hi folks...
> >
> > We're working on some plans to peer in the Seattle area.  Choices so
far
> > considered are SIX and PAIX Seattle pretty much
> >
> > I was of the impression that if you get a port on one of these
> > exchanges, you can connect to the other one as well?  Just looking
for
> > clarification from folks who are connected out there..;)  Any
charges to
> > go between the exchanges or it just included?
>
> Speaking from the SIX side, there is no charge to connect to the
fabric if
> you supply the optics, and there is a one-time fiber cross connect
charge of
> $200.00 US.  The SIX and PAIX are directly connected and you can peer
across
> the fabric.  The SIX page is http://www.seattleix.net for more info or
you
> can email me directly.

And keep in mind that while the SIX and PAIX-SEA are directly connected,

the exchanges are on different VLANs from the perspective of a PAIX-SEA
connection.

If you connect on the SIX side, you can only reach the SIX fabric.  No
MRC.

If you connect on the PAIX-SEA side, you can reach both the SIX fabric
and
the PAIX-SEA fabric via a single router port.  For MRC talk to an S&D
rep.

Chris






"The information transmitted is intended only for the person or entity to which 
it is addressed and contains confidential and/or privileged material. If you 
received this in error, please contact the sender immediately and then destroy 
this transmission, including all attachments, without copying, distributing or 
disclosing same. Thank you."



Re: Seattle Peering

2008-09-23 Thread Chris Caputo
On Thu, 18 Sep 2008, Michael K. Smith wrote:
> Hello Paul:
> 
> On 9/18/08 8:01 AM, "Paul Stewart" <[EMAIL PROTECTED]> wrote:
> > Hi folks...
> > 
> > We're working on some plans to peer in the Seattle area.  Choices so far
> > considered are SIX and PAIX Seattle pretty much
> > 
> > I was of the impression that if you get a port on one of these
> > exchanges, you can connect to the other one as well?  Just looking for
> > clarification from folks who are connected out there..;)  Any charges to
> > go between the exchanges or it just included?
>
> Speaking from the SIX side, there is no charge to connect to the fabric if
> you supply the optics, and there is a one-time fiber cross connect charge of
> $200.00 US.  The SIX and PAIX are directly connected and you can peer across
> the fabric.  The SIX page is http://www.seattleix.net for more info or you
> can email me directly.

And keep in mind that while the SIX and PAIX-SEA are directly connected, 
the exchanges are on different VLANs from the perspective of a PAIX-SEA 
connection.

If you connect on the SIX side, you can only reach the SIX fabric.  No 
MRC.

If you connect on the PAIX-SEA side, you can reach both the SIX fabric and 
the PAIX-SEA fabric via a single router port.  For MRC talk to an S&D rep.

Chris



Re: prefix hijack by ASN 8997

2008-09-23 Thread Jim Popovitch
On Mon, Sep 22, 2008 at 22:13, Jim Popovitch <[EMAIL PROTECTED]> wrote:
> On Mon, Sep 22, 2008 at 21:06, Scott Weeks <[EMAIL PROTECTED]> wrote:
>>
>> I am hoping to confirm a short-duration prefix hijack of 72.234.0.0/15 (and 
>> another of our
>> prefixes) by ASN 8997 ("OJSC North-West Telecom" in Russia) in using ASN 3267
>> (Russian Federal University Network) to advertise our space to ASN 3277 
>> (Regional
>> University and Scientific Network (RUSNet) of North-Western and 
>> Saint-Petersburg
>> Area of Russia).
>
> Yep, saw this for 69.61.0.0/17 GlobalCompass (my upstream) this AM:
>
> SEQUENCE_NUMBER: 1222091638
> TYPE: last-hop
> BGP-UPDATE-TIME: 1222075864
> PHAS-DETECT-TIME: 1222091637
> PHAS-NOTIFY-TIME: 1222091637
> PREFIX: 69.61.0.0/17
> SET: 3561,3267,3356,3491
> GAINED: 3267  <- Russian Federal University Network
> LOST:
>
> SEQUENCE_NUMBER: 1222091638
> TYPE: origin
> BGP-UPDATE-TIME: 1222075864
> PHAS-DETECT-TIME: 1222091637
> PHAS-NOTIFY-TIME: 1222091637
> PREFIX: 69.61.0.0/17
> SET: 8997,22653
> GAINED: 8997 <- OJSC North-West Telecom, St.-Petersburg, Russia
> LOST:
>
> SEQUENCE_NUMBER: 1222096125
> TYPE: origin
> BGP-UPDATE-TIME: 1222076569
> PHAS-DETECT-TIME: 1222092415
> PHAS-NOTIFY-TIME: 1222096124
> PREFIX: 69.61.0.0/17
> SET: 22653   <- GlobalCrossing

Small typo on my part above...  22653 is GlobalCompass, not
GlobalCrossing as I mistakenly typed above.

-Jim P.



Re: eigrp and managed ethernet

2008-09-23 Thread Stephen Kratzer
On Tuesday 23 September 2008 13:46:02 Joseph Doran wrote:
> EIGRP timers over WAN media default to 60 seconds. Neighborship will not
> expire for up to 180 seconds. To verify your EIGRP neighborship do a "show
> ip eigrp neighbor"
>
>
> Message: 6
> Date: Tue, 23 Sep 2008 09:25:34 -0700 (PDT)
> From: Philip Lavine <[EMAIL PROTECTED]>
> Subject: Re: eigrp and managed ethernet
> To: nanog <[EMAIL PROTECTED]>
> Message-ID: <[EMAIL PROTECTED]>
> Content-Type: text/plain; charset=us-ascii
>
> What is really bizarre is that I am down for minutes not seconds and the
> timers never fire. If I don't manually passive the connection eigrp will
> for some reason think there is a neighbor even though I am unable to source
> ping across the WAN.

With regard to EIGRP, link type is dictated by the medium and speed. In this 
case, Ethernet will be considered a high-speed, broadcast link regardless of 
its use for LAN or WAN, so the hello/dead intervals should, by default, be 
5/15 seconds.



Re: prefix hijack by ASN 8997

2008-09-23 Thread Larry Blunk

Scott Weeks wrote:

-- [EMAIL PROTECTED] wrote: --
From: Marshall Eubanks <[EMAIL PROTECTED]>

So, do you think this was lots of little tests / hijacks / mistakes ?  
Or did it just not propagate very far ?

-

According to Andree Toonk (and someone confirmed privately) ASN 8997 leaked a 
full table to ASN 3267 (who didn't filter!).  The only upstream of ASN 3267 I 
saw in bgplay was ASN 174 (Cogent) who seems to have filtered, but I can't 
confirm.  So I guess that the impact would've only been to the peers downstream 
of ASN 3267.

scott





-
Andree Toonk <[EMAIL PROTECTED]>

Not a false positive, It actually was detected by the RIS box in Moscow 
(rrc13). Strange that it's not visible in RIS search website, but it's 
definitely in the raw data files.
Looking at that raw data from both routeviews and Ripe, it looks like 
they (AS8997) 'leaked' a  full table,  i.e. :

--

  


  I did some analysis of updates on routeviews.
The only routeviews peer I saw leaking  the routes
was AS3277 (out of 42 peers).   There were roughly
117,000 prefixes with origin AS8997 with the path
going through AS3267 to AS3277.   The initial
announcements were seen at 09:29:32 UTC and
updates with the correct path were seen starting
at about 09:36:42 UTC (last ones seen at 09:43:42).

-Larry






Re: eigrp and managed ethernet

2008-09-23 Thread Joseph Doran
EIGRP timers over WAN media default to 60 seconds. Neighborship will not
expire for up to 180 seconds. To verify your EIGRP neighborship do a "show
ip eigrp neighbor"


Message: 6
Date: Tue, 23 Sep 2008 09:25:34 -0700 (PDT)
From: Philip Lavine <[EMAIL PROTECTED]>
Subject: Re: eigrp and managed ethernet
To: nanog <[EMAIL PROTECTED]>
Message-ID: <[EMAIL PROTECTED]>
Content-Type: text/plain; charset=us-ascii

What is really bizarre is that I am down for minutes not seconds and the
timers never fire. If I don't manually passive the connection eigrp will for
some reason think there is a neighbor even though I am unable to source ping
across the WAN.


Re: Atrivo/Intercage

2008-09-23 Thread Gadi Evron

http://www.giantitp.com/comics/oots0595.html

I think that sums up this thread.


On Tue, 23 Sep 2008, Joe Greco wrote:


On Sep 22, 2008, at 4:33 PM, Tom Sparks (Applied Operations) wrote:

Intercage is not a big shop, there are very few people involved in
running it


I have no dog in this fight, but I would comment on the "small shop"
issue as it relates to handling abuse complaints.

I own a small colo/hosting shop too.  We don't have many employees.
If we had to deal with so many abuse complaints that things were
"getting lost in the noise", I'd have to seriously examine my AUP and
associated enforcement policies, add staff to handle abuse issues, or
both.  Being small isn't an excuse.  In fact, a small shop that runs a
clean network should be far better at handling abuse issues than the
larger players could ever hope to be.


I would have to agree with this latter bit.  We count incidents per YEAR.
On a hand.  Mostly because we haven't made a habit of accepting random
clients, I guess, but were it a problem, it would be made not to be.

Being proactive is a big part of this.  For example, when ARIN began to
allow abuse contacts for IP space, we fairly quickly registered a POC
for it.

... JG
--
Joe Greco - sol.net Network Services - Milwaukee, WI - http://www.sol.net
"We call it the 'one bite at the apple' rule. Give me one chance [and] then I
won't contact you again." - Direct Marketing Ass'n position on e-mail spam(CNN)
With 24 million small businesses in the US alone, that's way too many apples.





Re: eigrp and managed ethernet

2008-09-23 Thread Kevin Hodle
You may want to check out BFD for EIGRP,

http://www.cisco.com/en/US/technologies/tk648/tk365/tk207/technologies_white_paper0900aecd80243fe7_ps6599_Products_White_Paper.html

Regards,
Kevin

On Tue, Sep 23, 2008 at 11:25 AM, Philip Lavine <[EMAIL PROTECTED]> wrote:
> What is really bizarre is that I am down for minutes not seconds and the 
> timers never fire. If I don't manually passive the connection eigrp will for 
> some reason think there is a neighbor even though I am unable to source ping 
> across the WAN.
>
>
>
> - Original Message 
> From: Matthew Huff <[EMAIL PROTECTED]>
> To: Philip Lavine <[EMAIL PROTECTED]>; nanog <[EMAIL PROTECTED]>
> Sent: Tuesday, September 23, 2008 8:59:14 AM
> Subject: RE: eigrp and managed ethernet
>
> Correct. Eigrp neighbor connectivity has a short-cut when L2 connectivity 
> goes down, otherwise it will use the eigrp neighbor hold-down timer. You can 
> decrease that timer:
>
> interface fa0/0
>  ip hello-interval eigrp p x
>  ip hold-time eigrp p y
>
> where p is your eigrp as-number, and x is how often you want the hello (in 
> seconds) and y is the max hold-down timer. Generally y is = x * 3
>
> http://www.cisco.com/en/US/docs/ios/12_2/iproute/command/reference/1rfeigrp.html
>
>
> 
> Matthew Huff   | One Manhattanville Rd
> OTA Management LLC | Purchase, NY 10577
> www.ox.com| Phone: 914-460-4039
> aim: matthewbhuff  | Fax:   914-460-4139
>
> -Original Message-
> From: Philip Lavine [mailto:[EMAIL PROTECTED]
> Sent: Tuesday, September 23, 2008 11:43 AM
> To: nanog
> Subject: eigrp and managed ethernet
>
> For some reason when I lose layer 3 connectivity between two managed Ethernet 
> sites EIGRP does not bounce.Is this because the physical interface does not 
> bounce?
>
>
>
>
>



Re: eigrp and managed ethernet

2008-09-23 Thread Stephen Kratzer
Be sure to differentiate between unicast and multicast reachability. Try 'ping 
224.0.0.10'.

Stephen Kratzer

On Tuesday 23 September 2008 12:25:34 Philip Lavine wrote:
> What is really bizarre is that I am down for minutes not seconds and the
> timers never fire. If I don't manually passive the connection eigrp will
> for some reason think there is a neighbor even though I am unable to source
> ping across the WAN.
>
>
>
> - Original Message 
> From: Matthew Huff <[EMAIL PROTECTED]>
> To: Philip Lavine <[EMAIL PROTECTED]>; nanog <[EMAIL PROTECTED]>
> Sent: Tuesday, September 23, 2008 8:59:14 AM
> Subject: RE: eigrp and managed ethernet
>
> Correct. Eigrp neighbor connectivity has a short-cut when L2 connectivity
> goes down, otherwise it will use the eigrp neighbor hold-down timer. You
> can decrease that timer:
>
> interface fa0/0
>   ip hello-interval eigrp p x
>   ip hold-time eigrp p y
>
> where p is your eigrp as-number, and x is how often you want the hello (in
> seconds) and y is the max hold-down timer. Generally y is = x * 3
>
> http://www.cisco.com/en/US/docs/ios/12_2/iproute/command/reference/1rfeigrp
>.html
>
>
> 
> Matthew Huff   | One Manhattanville Rd
> OTA Management LLC | Purchase, NY 10577
> www.ox.com| Phone: 914-460-4039
> aim: matthewbhuff  | Fax:   914-460-4139
>
> -Original Message-
> From: Philip Lavine [mailto:[EMAIL PROTECTED]
> Sent: Tuesday, September 23, 2008 11:43 AM
> To: nanog
> Subject: eigrp and managed ethernet
>
> For some reason when I lose layer 3 connectivity between two managed
> Ethernet sites EIGRP does not bounce.Is this because the physical interface
> does not bounce?



RE: eigrp and managed ethernet

2008-09-23 Thread Brian Knoll
The issue may be that only one direction of traffic is being impacted.  So 
maybe your A end is receiving all the hellos, while the Z end is not.  
Therefore A still has Z as a neighbor, but Z doesn't have A as a neighbor.

Brian Knoll


-Original Message-
From: Philip Lavine [mailto:[EMAIL PROTECTED]
Sent: Tuesday, September 23, 2008 11:26 AM
To: nanog
Subject: Re: eigrp and managed ethernet

What is really bizarre is that I am down for minutes not seconds and the timers 
never fire. If I don't manually passive the connection eigrp will for some 
reason think there is a neighbor even though I am unable to source ping across 
the WAN.



- Original Message 
From: Matthew Huff <[EMAIL PROTECTED]>
To: Philip Lavine <[EMAIL PROTECTED]>; nanog <[EMAIL PROTECTED]>
Sent: Tuesday, September 23, 2008 8:59:14 AM
Subject: RE: eigrp and managed ethernet

Correct. Eigrp neighbor connectivity has a short-cut when L2 connectivity goes 
down, otherwise it will use the eigrp neighbor hold-down timer. You can 
decrease that timer:

interface fa0/0
  ip hello-interval eigrp p x
  ip hold-time eigrp p y

where p is your eigrp as-number, and x is how often you want the hello (in 
seconds) and y is the max hold-down timer. Generally y is = x * 3

http://www.cisco.com/en/US/docs/ios/12_2/iproute/command/reference/1rfeigrp.html



Matthew Huff   | One Manhattanville Rd
OTA Management LLC | Purchase, NY 10577
www.ox.com| Phone: 914-460-4039
aim: matthewbhuff  | Fax:   914-460-4139

-Original Message-
From: Philip Lavine [mailto:[EMAIL PROTECTED]
Sent: Tuesday, September 23, 2008 11:43 AM
To: nanog
Subject: eigrp and managed ethernet

For some reason when I lose layer 3 connectivity between two managed Ethernet 
sites EIGRP does not bounce.Is this because the physical interface does not 
bounce?







Re: eigrp and managed ethernet

2008-09-23 Thread Jeremy_Lunsford
Are you 100% positive that the link is really not passing any traffic? 
Have you looked at interface stats to verify that there are no incoming 
packets?  I'd suggest running some EIGRP debug commands during the outage 
to verify if you are really not getting any packets..





Philip Lavine <[EMAIL PROTECTED]> 
09/23/2008 09:25 AM

To
nanog <[EMAIL PROTECTED]>
cc

Subject
Re: eigrp and managed ethernet






What is really bizarre is that I am down for minutes not seconds and the 
timers never fire. If I don't manually passive the connection eigrp will 
for some reason think there is a neighbor even though I am unable to 
source ping across the WAN.



- Original Message 
From: Matthew Huff <[EMAIL PROTECTED]>
To: Philip Lavine <[EMAIL PROTECTED]>; nanog <[EMAIL PROTECTED]>
Sent: Tuesday, September 23, 2008 8:59:14 AM
Subject: RE: eigrp and managed ethernet

Correct. Eigrp neighbor connectivity has a short-cut when L2 connectivity 
goes down, otherwise it will use the eigrp neighbor hold-down timer. You 
can decrease that timer:

interface fa0/0
  ip hello-interval eigrp p x
  ip hold-time eigrp p y

where p is your eigrp as-number, and x is how often you want the hello (in 
seconds) and y is the max hold-down timer. Generally y is = x * 3

http://www.cisco.com/en/US/docs/ios/12_2/iproute/command/reference/1rfeigrp.html




Matthew Huff   | One Manhattanville Rd
OTA Management LLC | Purchase, NY 10577
www.ox.com| Phone: 914-460-4039
aim: matthewbhuff  | Fax:   914-460-4139

-Original Message-
From: Philip Lavine [mailto:[EMAIL PROTECTED]
Sent: Tuesday, September 23, 2008 11:43 AM
To: nanog
Subject: eigrp and managed ethernet

For some reason when I lose layer 3 connectivity between two managed 
Ethernet sites EIGRP does not bounce.Is this because the physical 
interface does not bounce?


 





Re: eigrp and managed ethernet

2008-09-23 Thread Philip Lavine
What is really bizarre is that I am down for minutes not seconds and the timers 
never fire. If I don't manually passive the connection eigrp will for some 
reason think there is a neighbor even though I am unable to source ping across 
the WAN.



- Original Message 
From: Matthew Huff <[EMAIL PROTECTED]>
To: Philip Lavine <[EMAIL PROTECTED]>; nanog <[EMAIL PROTECTED]>
Sent: Tuesday, September 23, 2008 8:59:14 AM
Subject: RE: eigrp and managed ethernet

Correct. Eigrp neighbor connectivity has a short-cut when L2 connectivity goes 
down, otherwise it will use the eigrp neighbor hold-down timer. You can 
decrease that timer:

interface fa0/0
  ip hello-interval eigrp p x
  ip hold-time eigrp p y

where p is your eigrp as-number, and x is how often you want the hello (in 
seconds) and y is the max hold-down timer. Generally y is = x * 3

http://www.cisco.com/en/US/docs/ios/12_2/iproute/command/reference/1rfeigrp.html



Matthew Huff   | One Manhattanville Rd
OTA Management LLC | Purchase, NY 10577
www.ox.com| Phone: 914-460-4039
aim: matthewbhuff  | Fax:   914-460-4139

-Original Message-
From: Philip Lavine [mailto:[EMAIL PROTECTED]
Sent: Tuesday, September 23, 2008 11:43 AM
To: nanog
Subject: eigrp and managed ethernet

For some reason when I lose layer 3 connectivity between two managed Ethernet 
sites EIGRP does not bounce.Is this because the physical interface does not 
bounce?


  



Re: eigrp and managed ethernet

2008-09-23 Thread Stephen Kratzer
On Tuesday 23 September 2008 11:43:06 Philip Lavine wrote:
> For some reason when I lose layer 3 connectivity between two managed
> Ethernet sites EIGRP does not bounce.Is this because the physical interface
> does not bounce?

Because EIGRP hellos are sent via IP multicast, layer 3 connectivity is 
required to establish and maintain adjacencies. However, layer 3 failures 
aren't detected for, at most, 15 seconds by default on an Ethernet link.

Stephen Kratzer
Network Engineer
CTI Networks, Inc.



RE: eigrp and managed ethernet

2008-09-23 Thread Luan Nguyen
Yeah.  If the link-layer failure is hidden from your routing protocol, then
the routing protocol has to rely on its timer setting.  When your EIGRP's
hold-time expires, peering would bounce.

Luan

-Original Message-
From: Philip Lavine [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, September 23, 2008 11:43 AM
To: nanog
Subject: eigrp and managed Ethernet 

For some reason when I lose layer 3 connectivity between two managed
Ethernet sites EIGRP does not bounce.Is this because the physical interface
does not bounce? 



  




Re: prefix hijack by ASN 8997

2008-09-23 Thread Marshall Eubanks

Note that my bgp was through Cogent - my guess is they did filter.

Marshall

On Sep 23, 2008, at 11:54 AM, Scott Weeks wrote:



-- [EMAIL PROTECTED] wrote: --
From: Marshall Eubanks <[EMAIL PROTECTED]>

So, do you think this was lots of little tests / hijacks / mistakes ?
Or did it just not propagate very far ?
-

According to Andree Toonk (and someone confirmed privately) ASN 8997  
leaked a full table to ASN 3267 (who didn't filter!).  The only  
upstream of ASN 3267 I saw in bgplay was ASN 174 (Cogent) who seems  
to have filtered, but I can't confirm.  So I guess that the impact  
would've only been to the peers downstream of ASN 3267.


scott





-
Andree Toonk <[EMAIL PROTECTED]>

Not a false positive, It actually was detected by the RIS box in  
Moscow

(rrc13). Strange that it's not visible in RIS search website, but it's
definitely in the raw data files.
Looking at that raw data from both routeviews and Ripe, it looks like
they (AS8997) 'leaked' a  full table,  i.e. :
--






RE: eigrp and managed ethernet

2008-09-23 Thread Matthew Huff
Correct. Eigrp neighbor connectivity has a short-cut when L2 connectivity goes 
down, otherwise it will use the eigrp neighbor hold-down timer. You can 
decrease that timer:

interface fa0/0
  ip hello-interval eigrp p x
  ip hold-time eigrp p y

where p is your eigrp as-number, and x is how often you want the hello (in 
seconds) and y is the max hold-down timer. Generally y is = x * 3

http://www.cisco.com/en/US/docs/ios/12_2/iproute/command/reference/1rfeigrp.html



Matthew Huff   | One Manhattanville Rd
OTA Management LLC | Purchase, NY 10577
www.ox.com| Phone: 914-460-4039
aim: matthewbhuff  | Fax:   914-460-4139

-Original Message-
From: Philip Lavine [mailto:[EMAIL PROTECTED]
Sent: Tuesday, September 23, 2008 11:43 AM
To: nanog
Subject: eigrp and managed ethernet

For some reason when I lose layer 3 connectivity between two managed Ethernet 
sites EIGRP does not bounce.Is this because the physical interface does not 
bounce?








Re: prefix hijack by ASN 8997

2008-09-23 Thread Scott Weeks

-- [EMAIL PROTECTED] wrote: --
From: Marshall Eubanks <[EMAIL PROTECTED]>

So, do you think this was lots of little tests / hijacks / mistakes ?  
Or did it just not propagate very far ?
-

According to Andree Toonk (and someone confirmed privately) ASN 8997 leaked a 
full table to ASN 3267 (who didn't filter!).  The only upstream of ASN 3267 I 
saw in bgplay was ASN 174 (Cogent) who seems to have filtered, but I can't 
confirm.  So I guess that the impact would've only been to the peers downstream 
of ASN 3267.

scott





-
Andree Toonk <[EMAIL PROTECTED]>

Not a false positive, It actually was detected by the RIS box in Moscow 
(rrc13). Strange that it's not visible in RIS search website, but it's 
definitely in the raw data files.
Looking at that raw data from both routeviews and Ripe, it looks like 
they (AS8997) 'leaked' a  full table,  i.e. :
--



eigrp and managed ethernet

2008-09-23 Thread Philip Lavine
For some reason when I lose layer 3 connectivity between two managed Ethernet 
sites EIGRP does not bounce.Is this because the physical interface does not 
bounce? 



  



Re: prefix hijack by ASN 8997

2008-09-23 Thread Marshall Eubanks


On Sep 23, 2008, at 8:15 AM, Scott Weeks wrote:




--- [EMAIL PROTECTED] wrote:
From: Marshall Eubanks <[EMAIL PROTECTED]>

: You didn't specify the time zone you are in,
: so I looked at +- 1 day around it. If the
: hijack lasted 6 hours, we should have seen it.

My apologies, I just used the time zone the tool  
(bgplay.routeviews.org/bgplay) was using when I said:

22/9/2008  9:00:00   and   22/9/2008  15:00:00

I'm sure it was in GMT.  Seeing the many responses, we now know  
something happened and it was only about 15 minutes in duration.


These two times are separated by 6 hours exactly (0500 and 1100 EDT).

There is a positive report at 1330 Moscow time or 0930 UTC  or 0530 EDT.
There is a positive report "a few minutes" before 0122 UTC - say 0115
There is a positive report at 1222091563 which I cannot interpret.  
(1222 UTC ?)


We have my negative reports at 0607 EDT and 1207 EDT, etc., or 1007  
UTC and 1607 UTC, etc.


So (all times UTC)

0407 no
0900 yes
0930 yes
1007 no
1500 yes
1607 no
2207 no
0115 yes
0407 no

So, do you think this was lots of little tests / hijacks / mistakes ?  
Or did it just not propagate very far ?


Marshall



bgplay shows the problem with the above data and I was just  
wondering if I was understanding the impact correctly:



If the above two are correct, would it be
correct to say only the downstream customers
of ASN 3267 were affected?


I was not following the rules properly: never attribute to malice  
that which can be explained by human error.  I thought there might  
be some testing-of-the-water in preparation for future 'events' and  
I guess I was starting to be trigger happy after all the talk about  
the new BGP attack.


scott




--- [EMAIL PROTECTED] wrote:

From: Marshall Eubanks <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Cc:  <[EMAIL PROTECTED]>
Subject: Re: prefix hijack by ASN 8997
Date: Tue, 23 Sep 2008 07:51:36 -0400


On Sep 22, 2008, at 9:06 PM, Scott Weeks wrote:





I am hoping to confirm a short-duration prefix hijack of
72.234.0.0/15 (and another of our prefixes) by ASN 8997 ("OJSC North-
West Telecom" in Russia) in using ASN 3267 (Russian Federal
University Network) to advertise our space to ASN 3277 (Regional
University and Scientific Network (RUSNet) of North-Western and
Saint-Petersburg Area of Russia).

Is that what I'm seeing when I go to "bgplay.routeviews.org/bgplay",
put in prefix 72.234.0.0/15 and select the dates:

22/9/2008  9:00:00   and   22/9/2008  15:00:00

If so, am I understanding it correctly if I say ASN 3267 saw a
shorter path from ASN 8997, so refused the proper announcement from
ASN 36149 (me) it normally hears from ASN 174 (Cogent).


I cannot confirm that from the monitoring program at AS 16517 :

[EMAIL PROTECTED] mcast]$ grep 72.234.0.0 bgp.full.Sep_2*2008
bgp.full.Sep_21_00:07:00_EDT_2008:*> 72.234.0.0/15
38.101.161.1163990 0 174 209 36149 ?
bgp.full.Sep_21_06:07:00_EDT_2008:*> 72.234.0.0/15
38.101.161.1163990 0 174 209 36149 ?
bgp.full.Sep_21_12:07:00_EDT_2008:*> 72.234.0.0/15
38.101.161.1163990 0 174 209 36149 ?
bgp.full.Sep_21_18:07:00_EDT_2008:*> 72.234.0.0/15
38.101.161.1163990 0 174 209 36149 ?
bgp.full.Sep_22_00:07:00_EDT_2008:*> 72.234.0.0/15
38.101.161.1163990 0 174 209 36149 ?
bgp.full.Sep_22_06:07:00_EDT_2008:*> 72.234.0.0/15
38.101.161.1163990 0 174 209 36149 ?
bgp.full.Sep_22_12:07:00_EDT_2008:*> 72.234.0.0/15
38.101.161.1163990 0 174 209 36149 ?
bgp.full.Sep_22_18:07:00_EDT_2008:*> 72.234.0.0/15
38.101.161.1163990 0 174 209 36149 ?
bgp.full.Sep_23_00:07:00_EDT_2008:*> 72.234.0.0/15
38.101.161.1163990 0 174 209 36149 ?
bgp.full.Sep_23_06:07:00_EDT_2008:*> 72.234.0.0/15
38.101.161.1163990 0 174 209 36149 ?

You didn't specify the time zone you are in, so I looked at +- 1 day
around it. If the hijack lasted 6 hours, we
should have seen it.

Regards
Marshall





If the above two are correct, would it be correct to say only the
downstream customers of ASN 3267 were affected?

scott











Re: Atrivo/Intercage

2008-09-23 Thread Joe Greco
> On Sep 22, 2008, at 4:33 PM, Tom Sparks (Applied Operations) wrote:
> > Intercage is not a big shop, there are very few people involved in  
> > running it
> 
> I have no dog in this fight, but I would comment on the "small shop"  
> issue as it relates to handling abuse complaints.
> 
> I own a small colo/hosting shop too.  We don't have many employees.   
> If we had to deal with so many abuse complaints that things were  
> "getting lost in the noise", I'd have to seriously examine my AUP and  
> associated enforcement policies, add staff to handle abuse issues, or  
> both.  Being small isn't an excuse.  In fact, a small shop that runs a  
> clean network should be far better at handling abuse issues than the  
> larger players could ever hope to be.

I would have to agree with this latter bit.  We count incidents per YEAR.
On a hand.  Mostly because we haven't made a habit of accepting random
clients, I guess, but were it a problem, it would be made not to be.

Being proactive is a big part of this.  For example, when ARIN began to
allow abuse contacts for IP space, we fairly quickly registered a POC
for it.

... JG
-- 
Joe Greco - sol.net Network Services - Milwaukee, WI - http://www.sol.net
"We call it the 'one bite at the apple' rule. Give me one chance [and] then I
won't contact you again." - Direct Marketing Ass'n position on e-mail spam(CNN)
With 24 million small businesses in the US alone, that's way too many apples.



Re: InterCage, Inc. (NOT Atrivo)

2008-09-23 Thread Justin Shore

[EMAIL PROTECTED] wrote:

On Mon, 22 Sep 2008 17:00:35 CDT, Justin Shore said:

There may not be a law preventing you from asking him for proof of 
legitimate customers, but there is a law preventing him from answering 
you.  Google for CPNI and "red flag".


Hmm... I'm not sure how "Yes, XYZ is a customer of mine" qualifies as
a "red flag" question for identity theft.  I'm also not sure how "XYZ is
a customer" qualifies as CPNI, which (according to the first few pages of
Google hits) comprises things like calling/billing records.

Nope. Doesn't seem like "xyz is a customer" qualifies there...

Hmm... "xyz is a customer" doesn't seem to run afoul of that either.

Feel free to enlighten me about what I missed here?


Given the unfortunate vagueness of the FCC on their directive, 
consultants have interpreted CPNI differently and have given their 
customers (SP and CS organizations) wildly varying instructions. 
However every interpretation that I've been privy to extends far beyond 
call records like many people believe CPNI is limited to.  Our CPNI 
consultants instructed us to not even reveal that Company X is a 
customer (which is laughable given the size of the communities we serve, 
but I digress).  They did however tell us that we can trust all phone 
numbers listed on an account both for instant information providing and 
for callbacks.  Cox's interpretation is that only the primary number 
listed on the account is valid for callbacks and that the PIN is 
required regardless (something our consultants told us was only required 
if the caller couldn't be reached on a valid callback number). 
Everybody has different instructions to work with.


To answer the question the list is asking, the SP isn't simply stating 
that Company X is a customer of SP ABC.  They are stating that Company X 
is a customer and that they believe Company X is a valid, not malicious 
customer in good standing.  While that's not a call record that implies 
certain things about Company X's relationship with the SP.  They 
essentially stating that they haven't received spam or other abuse 
complaints regarding the customer.  They're implying that they are a 
customer in good standing.  That could even be construed to imply that 
their account is in good standing.  That's more than just saying that 
Company X is a customer of SP ABC.  Our consultants advised us against 
saying anything of the sort.  Think of it like HIPAA for SPs.


It's splitting hairs but that's the unfortunate situation that CPNI has 
put all of us in.  Instead of a common sense response we get to deal 
with the knee-jerk response from the FCC thanks chiefly to the Patty 
Dunn scandal.


Justin



comparison of hijack alert systems [was]: prefix hijack by ASN 8997

2008-09-23 Thread Scott Weeks


On Mon, 22 Sep 2008, Scott Weeks wrote:
>
> I am hoping to confirm a short-duration prefix hijack


--- [EMAIL PROTECTED] wrote:
From: Hank Nussbacher <[EMAIL PROTECTED]>

I too spotted this via PHAS for a large number of prefixes, but have not 
received alerts from IAR, Watchmy.Net nor does RIPE RIS show this hijack: 
http://www.ris.ripe.net/perl-risapp/risearch.html I would have expected 
with so many RRC boxes that RIPE RIS would have caught it.  I had thought 
it was a false positive from PHAS but now that you and others have seen it 
- I guess it is for real.



It'd be very interesting to compare said systems using this event.  I have not 
subscribed to MyASN or watchmy.net yet, so I can't do that.  I do note, 
however, that PHAS took 4 hours and 20 minutes to email me, which is within the 
specs noted on their site.

scott



RE: prefix hijack by ASN 8997

2008-09-23 Thread Church, Charles
Agree on #2 as well.  You can bet they're also reading Nanog right now
to see who and how it was detected.  Oh, well, on with the fight.


Chuck

-Original Message-
From: Christian Koch [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, September 23, 2008 12:58 AM
To: Justin Shore; [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re: prefix hijack by ASN 8997


At first glance this morning not seeing any data between the gain and
lost alerts from phas and inability to find a route in any of the many
collectors and route servers out there I had thought it was a possibly
a fat finger mistake by 8997 or a false positive.

After locating the data in bgplay/rviews, and noticing how many more
people this occured to I'm leaning towards 2 possible scenarios:

1 - bgp misconfigurations leading to leaks
 (Depends on the overall scale of how many other prefixes were
possibly announced)

2 - 8997 began announcing prefixes as an experiment to "test the
waters" for potential real hijacks in future...

'geography' hints towards #2

Or both theories could be way off :)

I'd be interested to know if Renesys collected any data that might
give some better insight to this...

Christian



On 9/23/08, Justin Shore <[EMAIL PROTECTED]> wrote:
> Looking up some of my prefixes in PHAS and BGPPlay, I too see my
> prefixes being advertised by 8997 for a short time.  It looks like it
> happened around 1222091563 according to PHAS.
>
> Was this a mistake or something else?
>
> Justin
>
>
> Christian Koch wrote:
>> I received a phas notification about this today as well...
>>
>> I couldn't find any relevant data confirming the announcement of one
>> of my /19 blocks, until a few minutes ago when i checked the route
>> views bgplay (ripe bgplay turns up nothing) and can now see 8997
>> announcing and quickly withdrawing my prefix
>>
>>
>>
>>
>> On Mon, Sep 22, 2008 at 9:06 PM, Scott Weeks <[EMAIL PROTECTED]>
>> wrote:
>>>
>>>
>>> I am hoping to confirm a short-duration prefix hijack of
72.234.0.0/15
>>> (and another of our prefixes) by ASN 8997 ("OJSC North-West Telecom"
in
>>> Russia) in using ASN 3267 (Russian Federal University Network) to
>>> advertise our space to ASN 3277 (Regional University and Scientific
>>> Network (RUSNet) of North-Western and Saint-Petersburg Area of
Russia).
>>>
>>> Is that what I'm seeing when I go to "bgplay.routeviews.org/bgplay",
put
>>> in prefix 72.234.0.0/15 and select the dates:
>>>
>>> 22/9/2008  9:00:00   and   22/9/2008  15:00:00
>>>
>>> If so, am I understanding it correctly if I say ASN 3267 saw a
shorter
>>> path from ASN 8997, so refused the proper announcement from ASN
36149
>>> (me) it normally hears from ASN 174 (Cogent).
>>>
>>> If the above two are correct, would it be correct to say only the
>>> downstream customers of ASN 3267 were affected?
>>>
>>> scott
>>>
>>>
>>
>

-- 
Sent from my mobile device




Re: prefix hijack by ASN 8997

2008-09-23 Thread Scott Weeks


--- [EMAIL PROTECTED] wrote:
From: Marshall Eubanks <[EMAIL PROTECTED]>

: You didn't specify the time zone you are in, 
: so I looked at +- 1 day around it. If the 
: hijack lasted 6 hours, we should have seen it.

My apologies, I just used the time zone the tool (bgplay.routeviews.org/bgplay) 
was using when I said: 
22/9/2008  9:00:00   and   22/9/2008  15:00:00

I'm sure it was in GMT.  Seeing the many responses, we now know something 
happened and it was only about 15 minutes in duration.  bgplay shows the 
problem with the above data and I was just wondering if I was understanding the 
impact correctly:

> If the above two are correct, would it be 
> correct to say only the downstream customers 
> of ASN 3267 were affected?

I was not following the rules properly: never attribute to malice that which 
can be explained by human error.  I thought there might be some 
testing-of-the-water in preparation for future 'events' and I guess I was 
starting to be trigger happy after all the talk about the new BGP attack.

scott




--- [EMAIL PROTECTED] wrote:

From: Marshall Eubanks <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Cc:  <[EMAIL PROTECTED]>
Subject: Re: prefix hijack by ASN 8997
Date: Tue, 23 Sep 2008 07:51:36 -0400


On Sep 22, 2008, at 9:06 PM, Scott Weeks wrote:

>
>
>
> I am hoping to confirm a short-duration prefix hijack of  
> 72.234.0.0/15 (and another of our prefixes) by ASN 8997 ("OJSC North- 
> West Telecom" in Russia) in using ASN 3267 (Russian Federal  
> University Network) to advertise our space to ASN 3277 (Regional  
> University and Scientific Network (RUSNet) of North-Western and  
> Saint-Petersburg Area of Russia).
>
> Is that what I'm seeing when I go to "bgplay.routeviews.org/bgplay",  
> put in prefix 72.234.0.0/15 and select the dates:
>
> 22/9/2008  9:00:00   and   22/9/2008  15:00:00
>
> If so, am I understanding it correctly if I say ASN 3267 saw a  
> shorter path from ASN 8997, so refused the proper announcement from  
> ASN 36149 (me) it normally hears from ASN 174 (Cogent).

I cannot confirm that from the monitoring program at AS 16517 :

[EMAIL PROTECTED] mcast]$ grep 72.234.0.0 bgp.full.Sep_2*2008
bgp.full.Sep_21_00:07:00_EDT_2008:*> 72.234.0.0/15 
38.101.161.1163990 0 174 209 36149 ?
bgp.full.Sep_21_06:07:00_EDT_2008:*> 72.234.0.0/15 
38.101.161.1163990 0 174 209 36149 ?
bgp.full.Sep_21_12:07:00_EDT_2008:*> 72.234.0.0/15 
38.101.161.1163990 0 174 209 36149 ?
bgp.full.Sep_21_18:07:00_EDT_2008:*> 72.234.0.0/15 
38.101.161.1163990 0 174 209 36149 ?
bgp.full.Sep_22_00:07:00_EDT_2008:*> 72.234.0.0/15 
38.101.161.1163990 0 174 209 36149 ?
bgp.full.Sep_22_06:07:00_EDT_2008:*> 72.234.0.0/15 
38.101.161.1163990 0 174 209 36149 ?
bgp.full.Sep_22_12:07:00_EDT_2008:*> 72.234.0.0/15 
38.101.161.1163990 0 174 209 36149 ?
bgp.full.Sep_22_18:07:00_EDT_2008:*> 72.234.0.0/15 
38.101.161.1163990 0 174 209 36149 ?
bgp.full.Sep_23_00:07:00_EDT_2008:*> 72.234.0.0/15 
38.101.161.1163990 0 174 209 36149 ?
bgp.full.Sep_23_06:07:00_EDT_2008:*> 72.234.0.0/15 
38.101.161.1163990 0 174 209 36149 ?

You didn't specify the time zone you are in, so I looked at +- 1 day  
around it. If the hijack lasted 6 hours, we
should have seen it.

Regards
Marshall


>
>
> If the above two are correct, would it be correct to say only the  
> downstream customers of ASN 3267 were affected?
>
> scott
>






Re: prefix hijack by ASN 8997

2008-09-23 Thread Marshall Eubanks


On Sep 22, 2008, at 9:06 PM, Scott Weeks wrote:





I am hoping to confirm a short-duration prefix hijack of  
72.234.0.0/15 (and another of our prefixes) by ASN 8997 ("OJSC North- 
West Telecom" in Russia) in using ASN 3267 (Russian Federal  
University Network) to advertise our space to ASN 3277 (Regional  
University and Scientific Network (RUSNet) of North-Western and  
Saint-Petersburg Area of Russia).


Is that what I'm seeing when I go to "bgplay.routeviews.org/bgplay",  
put in prefix 72.234.0.0/15 and select the dates:


22/9/2008  9:00:00   and   22/9/2008  15:00:00

If so, am I understanding it correctly if I say ASN 3267 saw a  
shorter path from ASN 8997, so refused the proper announcement from  
ASN 36149 (me) it normally hears from ASN 174 (Cogent).


I cannot confirm that from the monitoring program at AS 16517 :

[EMAIL PROTECTED] mcast]$ grep 72.234.0.0 bgp.full.Sep_2*2008
bgp.full.Sep_21_00:07:00_EDT_2008:*> 72.234.0.0/15 
38.101.161.1163990 0 174 209 36149 ?
bgp.full.Sep_21_06:07:00_EDT_2008:*> 72.234.0.0/15 
38.101.161.1163990 0 174 209 36149 ?
bgp.full.Sep_21_12:07:00_EDT_2008:*> 72.234.0.0/15 
38.101.161.1163990 0 174 209 36149 ?
bgp.full.Sep_21_18:07:00_EDT_2008:*> 72.234.0.0/15 
38.101.161.1163990 0 174 209 36149 ?
bgp.full.Sep_22_00:07:00_EDT_2008:*> 72.234.0.0/15 
38.101.161.1163990 0 174 209 36149 ?
bgp.full.Sep_22_06:07:00_EDT_2008:*> 72.234.0.0/15 
38.101.161.1163990 0 174 209 36149 ?
bgp.full.Sep_22_12:07:00_EDT_2008:*> 72.234.0.0/15 
38.101.161.1163990 0 174 209 36149 ?
bgp.full.Sep_22_18:07:00_EDT_2008:*> 72.234.0.0/15 
38.101.161.1163990 0 174 209 36149 ?
bgp.full.Sep_23_00:07:00_EDT_2008:*> 72.234.0.0/15 
38.101.161.1163990 0 174 209 36149 ?
bgp.full.Sep_23_06:07:00_EDT_2008:*> 72.234.0.0/15 
38.101.161.1163990 0 174 209 36149 ?


You didn't specify the time zone you are in, so I looked at +- 1 day  
around it. If the hijack lasted 6 hours, we

should have seen it.

Regards
Marshall





If the above two are correct, would it be correct to say only the  
downstream customers of ASN 3267 were affected?


scott






Re: prefix hijack by ASN 8997

2008-09-23 Thread Ingo Flaschberger

Hi


http://www.msk-ix.ru/network/traffic.html
it was 12:00 moscow local time.


sorry, 13:xx

TIME: 09/22/08 09:30:05
TYPE: BGP4MP/MESSAGE/Update
FROM: 193.232.244.36 AS2895
TO: 193.232.244.114 AS12654
ORIGIN: IGP
ASPATH: 2895 3267 8997
NEXT_HOP: 193.232.244.36
ANNOUNCE

GMT+4

 Kind regards,
ingo flaschberger





Re: prefix hijack by ASN 8997

2008-09-23 Thread Ingo Flaschberger

Hi,

http://www.msk-ix.ru/network/traffic.html
it was 12:00 moscow local time.

Kind regards,
ingo flaschberger



Re: prefix hijack by ASN 8997

2008-09-23 Thread Andree Toonk
Hi Hank,

.-- My secret spy satellite informs me that at Tue, 23 Sep 2008, Hank 
Nussbacher wrote:

>> Looking at that raw data from both routeviews and Ripe, it looks like they 
>> (AS8997) 'leaked' a  full table,  i.e. :
>> * 217.208 unique prefixes detected by the RIS server in Moscow (ASpath: 2895 
>> 3267 8997)
>> * 250495 seen by routeviews (ASpath: 2895 3267 8997).
>> (results of quick query: where AS-path contained '3267 8997' update type = 
>> advertisement).
>>
>> ASpath: 2895 3267 8997
>
> Is that the only ASpath that leaked it?  There are others - did they  
> filter properly and only that path failed to filter?

Again:
* 217.208 unique prefixes detected by the RIS server in Moscow (ASpath: 2895 
3267 8997 & ASpath 2895 5431 3267 8997)
* 250495 seen by routeviews (ASpath: 3277 3267 8997).

Looks like those are the only ones, but this is just a quick egrep, awk, and 
sort on the rawdata so I might have missed something (It's getting late here, 
so no guarantees ;))

Cheers,
 Andree