[Nanog-futures] Membership, was Transition update

2010-06-10 Thread John Springer
Am I correct in noticing that as of __11_day of May 2010 the requirement 
of written application and paid membership dues has been instantiated for 
newnog?

http://www.newnog.org/docs/consent-full.pdf

I advocate that the previous attendance requirements for voting continue 
to be sufficient for membership (and voting rights) and that anyone 
presently qualified to vote under such terms be permitted to continue to 
qualify that way for $some_lengthy_period, if they wish. A sufficient 
rationale for me would be that to do otherwise would impose a monetary 
penalty, however modest, on those who attend meetings.

Will the upcoming NANOG Community Meeting constitute a proper venue to 
vote on such an amendment to the bylaws? Or would the existing Board of 
Directors be so kind as to vote by a 2/3rds majority to do the same? :)

I volunteer to serve on the Bylaws Committee.

John Springer

___
Nanog-futures mailing list
Nanog-futures@nanog.org
https://mailman.nanog.org/mailman/listinfo/nanog-futures


Re: Nato warns of strike against cyber attackers

2010-06-10 Thread JC Dill

Owen DeLong wrote:


Software has been out of control for a long time and I hope that the gov't will start by 
ruling the not responsible for our negligence or the damage it causes clauses 
of software licenses invalid.


The beauty of my attractive nuisance argument is that the EULA doesn't 
shield Microsoft from the damage their software causes to a 3rd party 
such as the ISP who has to deal with the botnet infections of their 
customers. 


jc




SCO UNIX Errors

2010-06-10 Thread jacob miller
Hi,

Am getting the following error from my SCO UNIX box.

Any idea as to what they mean.



proto: 0, age: 1274191185

locks:  inits:

sockaddrs: DST,GATEWAY

 172.16.3.12 172.16.1.254

route: got message of size 120

RTM_LOSING: Kernel Suspects Partitioning: len 120, pid: 0, seq 0, errno 0, flags

:UP,GATEWAY,HOST,DONE,PMTU,PMTUMOD

proto: 0, age: 1274191200

locks:  inits:

sockaddrs: DST,GATEWAY

 172.16.3.12 172.16.1.254

route: got message of size 120

RTM_LOSING: Kernel Suspects Partitioning: len 120, pid: 0, seq 0, errno 0, flags

:UP,GATEWAY,HOST,DONE,PMTU

proto: 0, age: 1274191204

locks:  inits:

sockaddrs: DST,GATEWAY

 172.16.10.3 172.16.1.254

route: got message of size 120

RTM_LOSING: Kernel Suspects Partitioning: len 120, pid: 0, seq 0, errno 0, flags

:UP,GATEWAY,HOST,DONE,PMTU,PMTUMOD

proto: 0, age: 1274191206

locks:  inits:

sockaddrs: DST,GATEWAY

 172.16.3.12 172.16.1.254

route: got message of size 120

RTM_LOSING: Kernel Suspects Partitioning: len 120, pid: 0, seq 0, errno 0, 
flags:UP,GATEWAY,HOST,DONE,PMTU,PMTUMOD

proto: 0, age: 1274191249

locks:  inits:

sockaddrs: DST,GATEWAY

 172.16.3.12 172.16.1.254

route: got message of size 120

RTM_LOSING: Kernel Suspects Partitioning: len 120, pid: 0, seq 0, errno 0, 
flags:UP,GATEWAY,HOST,DONE,PMTU

proto: 0, age: 1274191250

locks:  inits:

sockaddrs: DST,GATEWAY

 172.16.10.3 172.16.1.254

route: got message of size 120

RTM_LOSING: Kernel Suspects Partitioning: len 120, pid: 0, seq 0, errno 0, 
flags:UP,GATEWAY,HOST,DONE,PMTU,PMTUMOD

proto: 0, age: 1274191264

locks:  inits:

sockaddrs: DST,GATEWAY

 172.16.3.12 172.16.1.254

route: got message of size 120

RTM_LOSING: Kernel Suspects Partitioning: len 120, pid: 0, seq 0, errno 0, 
flags:UP,GATEWAY,HOST,DONE,PMTU

proto: 0, age: 1274191268

locks:  inits:

sockaddrs: DST,GATEWAY

 172.16.10.3 172.16.1.254

route: got message of size 120

RTM_LOSING: Kernel Suspects Partitioning: len 120, pid: 0, seq 0, errno 0, 
flags:UP,GATEWAY,HOST,DONE,PMTU,PMTUMOD

proto: 0, age: 1274191270

locks:  inits:

sockaddrs: DST,GATEWAY

 172.16.3.12 172.16.1.254

route: got message of size 120

RTM_LOSING: Kernel Suspects Partitioning: len 120, pid: 0, seq 0, errno 0, 
flags:UP,GATEWAY,HOST,DONE,PMTU

proto: 0, age: 1274191297

locks:  inits:

sockaddrs: DST,GATEWAY

 172.16.10.3 172.16.1.254 

Regards,
Jacob 




  



Re: SCO UNIX Errors

2010-06-10 Thread William Pitcock
On Wed, 2010-06-09 at 23:40 -0700, jacob miller wrote:
 Hi,
 
 Am getting the following error from my SCO UNIX box.

They mean use an operating system not made by crackheads.  There's a
reason why SCO switched from UNIX sales to Intellectual Property
trolling after all.

William





Re: ISP Responsibilities [WAS: Re: Nato warns of strike against cyber attackers]

2010-06-10 Thread Ina Faye-Lund
On Tue, Jun 08, 2010 at 11:14:10PM -0700, Paul Ferguson wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 To cut through the noise and non-relevant discussion, let's see if we can
 boil this down to a couple of issues:
 
 1. Should ISPs be responsible for abuse from within their customer base?

No and no.  The first no being legally, the second, morally.

The user is responsible for the abuse.  Now, if the question had been whether
the ISP should be responsible for dealing with it appropriately, then the
answer would be yes.

Of course, when it comes to the legal aspect, it would probably vary from
country to country.  No, let me rephrase that:  It _does_ vary from country to
country, and probably also state to state.

However, to hold someone else responsible for a person's criminal activity
would be just plain wrong, as long as the ISP's part in the activity is only to
give their customer access to networks and services that every other customer
also gets access to.


 2. Should hosting providers also be held responsible for customers who abuse
 their services in a criminal manner?

No.  For several reasons.

First, the hosting provider normally does not have too much control over what
the customers actually do.  If someone complains, or they detect something
through audits or similar, that is different.  But even then, there will be
certain problems. 

How does the hosting provider know that something is, in fact, criminal?  In
some cases, that may be obvious, but there will be cases where the case is not
so clear.  If the provider might be held responsible for something their
customers do, they might decide to remove legal content 'just in case'.

Also, who would determine whether something is illegal or not?  Tech support?
The admin?  I doubt that any of those are able to determine something that
courts tend to spend a lot of time and resources on.


 I think anyone in their right mind would agree that if a provider see
 criminal activity, they should take action, no?

Not necessarily.

Again, this would of course depend on the laws in the given state or country.
However, people disagree on what is considered legal or not.  If everyone _had_
agreed on this, the courts would have had less work.

It is the responsibility of the judicial system to determine whether someone is
breaking the law or not.  For commercial companies to start making that sort of
judgements is, at least in my opinion, _not_ a good thing.



-- 
Ina Faye-Lund 



Re: ISP Responsibilities [WAS: Re: Nato warns of strike againstcyber attackers]

2010-06-10 Thread Michael Painter

From recent article at MIT Technology Review:


How ISPs Could Combat Botnets
Focusing on the top 50 infected networks could eliminate half of all 
compromised machines.

Convincing Internet service providers to pinpoint infected computers on their networks could eliminate the lion's share of 
zombie computers responsible for churning out spam and initiating other online threats, according to a new analysis.


The researchers analyzed more than 63 billion unsolicited e-mail messages sent over a four-year period and found more than 
138 million unique internet addresses linked to sending out the spam. Typically such machines have been hijacked by 
hackers and are corralled into a vast network of remote-controlled system known as a botnet.


By correlating the Internet protocol addresses of these spam-sending machines with the networks maintained by Internet 
service providers, the researchers found that about two-thirds of them were located in the networks managed by the 200 
largest ISPs from 40 countries. The top-50 networks responsible accounted for more than half of all compromised IP 
addresses. If these ISPs were to shut down, or block, the malicious machines on their networks, it could cut worldwide 
spam by half.


Those 50 ISPs are not the [dubious] ones we hear about, says Michel van Eeten, professor of public administration at the 
Delft University of Technology in the Netherlands and one of the authors of a paper on the research, which will be 
presented next month at the Workshop on the Economics of Information Security at Harvard University. They are the ones we 
deal with every day, and so are more approachable and are in the reach of government.


Rest here:
http://www.technologyreview.com/computing/25245/ 





Re: Nato warns of strike against cyber attackers

2010-06-10 Thread Alexander Harrowell
This would appear to be political in nature and therefore not operational, 
right?

Larry Sheldon larryshel...@cox.net wrote:

On 6/9/2010 08:21, Joe Greco wrote:

 Your car emits lots of greenhouse gases.  Just because it's /less/ doesn't
 change the fact that the Prius has an ICE.  We have a Prius and a HiHy too.

Did Godwin say anything about rand discussions degenerating to
mythologies like gorebull warming?

-- 
Somebody should have said:
A democracy is two wolves and a lamb voting on what to have for dinner.

Freedom under a constitutional republic is a well armed lamb contesting
the vote.

Requiescas in pace o email
Ex turpi causa non oritur actio
Eppure si rinfresca

ICBM Targeting Information:  http://tinyurl.com/4sqczs
http://tinyurl.com/7tp8ml

   


-- 
Sent from my Android phone with K-9 Mail. Please excuse my brevity.



Re: SCO UNIX Errors

2010-06-10 Thread N. Yaakov Ziskind
The best place to ask this question is on usenet:comp.unix.sco.misc.

jacob miller wrote (on Wed, Jun 09, 2010 at 11:40:27PM -0700):
 Hi,
 
 Am getting the following error from my SCO UNIX box.
 
 Any idea as to what they mean.
 
 
 
 proto: 0, age: 1274191185
 
 locks:  inits:
 
 sockaddrs: DST,GATEWAY
 
  172.16.3.12 172.16.1.254
 
 route: got message of size 120
 
 RTM_LOSING: Kernel Suspects Partitioning: len 120, pid: 0, seq 0, errno 0, 
 flags
 
 :UP,GATEWAY,HOST,DONE,PMTU,PMTUMOD
 
 proto: 0, age: 1274191200
 
 locks:  inits:
 
 sockaddrs: DST,GATEWAY
 
  172.16.3.12 172.16.1.254
 
 route: got message of size 120
 
 RTM_LOSING: Kernel Suspects Partitioning: len 120, pid: 0, seq 0, errno 0, 
 flags
 
 :UP,GATEWAY,HOST,DONE,PMTU
 
 proto: 0, age: 1274191204
 
 locks:  inits:
 
 sockaddrs: DST,GATEWAY
 
  172.16.10.3 172.16.1.254
 
 route: got message of size 120
 
 RTM_LOSING: Kernel Suspects Partitioning: len 120, pid: 0, seq 0, errno 0, 
 flags
 
 :UP,GATEWAY,HOST,DONE,PMTU,PMTUMOD
 
 proto: 0, age: 1274191206
 
 locks:  inits:
 
 sockaddrs: DST,GATEWAY
 
  172.16.3.12 172.16.1.254
 
 route: got message of size 120
 
 RTM_LOSING: Kernel Suspects Partitioning: len 120, pid: 0, seq 0, errno 0, 
 flags:UP,GATEWAY,HOST,DONE,PMTU,PMTUMOD
 
 proto: 0, age: 1274191249
 
 locks:  inits:
 
 sockaddrs: DST,GATEWAY
 
  172.16.3.12 172.16.1.254
 
 route: got message of size 120
 
 RTM_LOSING: Kernel Suspects Partitioning: len 120, pid: 0, seq 0, errno 0, 
 flags:UP,GATEWAY,HOST,DONE,PMTU
 
 proto: 0, age: 1274191250
 
 locks:  inits:
 
 sockaddrs: DST,GATEWAY
 
  172.16.10.3 172.16.1.254
 
 route: got message of size 120
 
 RTM_LOSING: Kernel Suspects Partitioning: len 120, pid: 0, seq 0, errno 0, 
 flags:UP,GATEWAY,HOST,DONE,PMTU,PMTUMOD
 
 proto: 0, age: 1274191264
 
 locks:  inits:
 
 sockaddrs: DST,GATEWAY
 
  172.16.3.12 172.16.1.254
 
 route: got message of size 120
 
 RTM_LOSING: Kernel Suspects Partitioning: len 120, pid: 0, seq 0, errno 0, 
 flags:UP,GATEWAY,HOST,DONE,PMTU
 
 proto: 0, age: 1274191268
 
 locks:  inits:
 
 sockaddrs: DST,GATEWAY
 
  172.16.10.3 172.16.1.254
 
 route: got message of size 120
 
 RTM_LOSING: Kernel Suspects Partitioning: len 120, pid: 0, seq 0, errno 0, 
 flags:UP,GATEWAY,HOST,DONE,PMTU,PMTUMOD
 
 proto: 0, age: 1274191270
 
 locks:  inits:
 
 sockaddrs: DST,GATEWAY
 
  172.16.3.12 172.16.1.254
 
 route: got message of size 120
 
 RTM_LOSING: Kernel Suspects Partitioning: len 120, pid: 0, seq 0, errno 0, 
 flags:UP,GATEWAY,HOST,DONE,PMTU
 
 proto: 0, age: 1274191297
 
 locks:  inits:
 
 sockaddrs: DST,GATEWAY
 
  172.16.10.3 172.16.1.254 
 
 Regards,
 Jacob 
 
 
 
 
   

-- 
_
Nachman Yaakov Ziskind, FSPA, LLM   aw...@ziskind.us
Attorney and Counselor-at-Law   http://ziskind.us
Economic Group Pension Services http://egps.com
Actuaries and Employee Benefit Consultants



Re: SCO UNIX Errors

2010-06-10 Thread Valdis . Kletnieks
On Thu, 10 Jun 2010 05:39:43 EDT, N. Yaakov Ziskind said:
 The best place to ask this question is on usenet:comp.unix.sco.misc.

This is, of course, if you can find a still-functional usenet server. ;)


pgp74dWyAu0bD.pgp
Description: PGP signature


Re: Nato warns of strike against cyber attackers

2010-06-10 Thread Michael Dillon
 Going back then to a previous question, do we want more/any regulation ?

Yes.

All vulnerable industries should have their use of network
communications regulated. This means all power stations, electricity
line operators, dam gate operators, etc. They should all be required
to meet a standard of practice for secure network communications, air
gap between SCADA networks and all other networks, and annual network
inspections to ensure compliance.

If any organization operates an infrastructure which could be
vulnerable to cyberattack that would damage the country in which they
operate, that organization needs to be regulated to ensure that their
networks cannot be exploited for cyberattack purposes. That is the
correct and measured response which does not involve the military
except possibly in a security advisory role, and which is within the
powers of governments.

I would expect that the increased awareness of network security that
resulted would pay dividends in business and home use of networks.

--Michael Dillon



Re: Nato warns of strike against cyber attackers

2010-06-10 Thread Tim Franklin
 I would expect that the increased awareness of network security that
 resulted would pay dividends in business and home use of networks.

I'd expect a lot of nice business for audit firms with the right government 
connections, and another checklist with a magic acronym that has everything to 
do with security theatre and nothing to do with either actual security or the 
reality of operating a network.

But perhaps I'm jaded from dealing with current auditors.

Regards,
Tim.



Re: Nato warns of strike against cyber attackers

2010-06-10 Thread Valdis . Kletnieks
On Thu, 10 Jun 2010 12:27:18 BST, Michael Dillon said:

 If any organization operates an infrastructure which could be
 vulnerable to cyberattack that would damage the country in which they
 operate, that organization needs to be regulated to ensure that their
 networks cannot be exploited for cyberattack purposes.

s/cannot be/minimize the risk of/

And would damage the country is a very fuzzy concept that you really don't
want to go anywhere near.  Remember Microsoft arguing that a Federal judge
shouldn't impose an injunction that was going to make them miss a ship
date, on the grounds that the resulting delay would cause lost productivity
at customer sites and harm the economy?

(Mind you, I thought MS was making a good case they *should* be regulated,
if their ship dates actually had that much influence.. ;)


pgpw3BZV4d1P7.pgp
Description: PGP signature


Re: Nato warns of strike against cyber attackers

2010-06-10 Thread J. Oquendo
Tim Franklin wrote:
 and another checklist with a magic acronym that has everything to do
 with security theatre and nothing to do with either actual security or
 the reality of operating a network.
Checklists come in handy in fact if many were followed (BCP checklists,
appropriate industry standard fw, system rules) the net would be a
cleaner place. What I've seen by many responses are feet dragging: Ah
why bother it won't do nothing to stop it... Without even trying. It
all begins with one's own network. The entire concept of peering was
built on trust of the peer. Would you knowingly allow someone to share
your hallway without taking precautionary measures or at least a
vigilant eye. What happens when you see something out of the norm, do
you continue to allow them without saying anything waiting for your
neighbor to speak. In doing so, how can you be assured the individual
won't try to creep up on your property.

// JC Dill wrote:

Yes, ISPs are going to have to handle the problem.  But, IMHO the root
cause of the problem starts in Redmond, and ISPs should sue Redmond for
the lack of suitable security in their product, rendering it an
attractive nuisance and requiring ISPs to clean up after Redmond's
mess.  It's not fair to expect ISPs to shoulder this burden, and it's
not fair to pass on the cost to customers as a blanket surcharge (and it
won't work from a business standpoint) as not all customer use
Microsoft's virus-vector software.  And it's not really fair to expect
the end customer to shoulder this burden when it's Microsoft's fault for
failing to properly secure their software.  But end user customers don't
have the resources to sue Microsoft, and then there's that whole EULA
problem. 

ISPs who are NOT a party to the EULA between Microsoft and the user, but
who are impacted by Microsoft's shoddy security can (IMHO) make a valid
claim that Microsoft created an attractive nuisance (improperly secured
software), and should be held accountable for the vandal's use thereof,
used to access and steal resources (bandwidth, etc.) from the ISP thru
the ISP's customers infested Windows computer.
//

More finger pointing here. Should MS now sue Adobe for shoddy coding
because Adobe's PDF reader caused a compromise (improperly secured
software). Let's take it from the top down for a moment and focus on
what is going on. Operating systems are insecure it doesn't matter if it
was produced by a company in Redmond or hacked together on IRC. ANY
operating system that is in an attacking state (dishing out malware,
attacking other machines) is doing so via a network. If slash when you
see it, do you shrug it off and say not my problem, its because of
someone's lack of oversight in Redmond when you have the capability to
stop it.

ISP's don't have to handle the problem, they SHOULD handle the problem.


-- 

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
J. Oquendo
SGFA, SGFE, C|EH, CNDA, CHFI, OSCP, CPT

It takes 20 years to build a reputation and five minutes to
ruin it. If you think about that, you'll do things
differently. - Warren Buffett

227C 5D35 7DCB 0893 95AA  4771 1DCE 1FD1 5CCD 6B5E
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0x5CCD6B5E




Broadband Internet Technical Advisory Group

2010-06-10 Thread Marshall Eubanks
This just popped up - BITAG, the Broadband Internet Technical Advisory  
Group, which
apparently has some Google backing. While it does not impact router  
configuration today, it sure does sound like they

want to in the future.

http://www.prnewswire.com/news-releases/initial-plans-for-broadband-internet-technical-advisory-group-announced-95950709.html

http://googlepublicpolicy.blogspot.com/2010/06/broadband-internet-technical-advisory.html

For some time now, we’ve been advocating for the formation of a group  
of technical experts to put forward their best thinking on how to  
manage broadband networks in ways that still preserve and promote an  
open Internet. We’ve worked closely with Verizon and others in the  
Internet sector to further develop the concept, and we’re excited by  
today’s announcement that the Broadband Internet Technical Advisory  
Group , or BITAG, has begun the process of formally launching.


Regards
Marshall


Re: Nato warns of strike against cyber attackers

2010-06-10 Thread Tim Franklin
 Checklists come in handy in fact if many were followed (BCP
 checklists, appropriate industry standard fw, system rules)
 the net would be a cleaner place.

Sensible checklists that actually improve matters, yes.

The audit checklists I've often been subjected to, full of security theatre and 
things that are accepted auditor wisdom rather than contributing to the 
security of the network in any meaningful way, not so much.

Regards,
Tim.



Re: SCO UNIX Errors

2010-06-10 Thread N. Yaakov Ziskind
valdis.kletni...@vt.edu wrote (on Thu, Jun 10, 2010 at 06:27:09AM -0400):
 On Thu, 10 Jun 2010 05:39:43 EDT, N. Yaakov Ziskind said:
  The best place to ask this question is on usenet:comp.unix.sco.misc.
 
 This is, of course, if you can find a still-functional usenet server. ;)

If not, there's Google Groups, and I believe that CUSM is gated to a
mailing list.

I'm just saying.

-- 
_
Nachman Yaakov Ziskind, FSPA, LLM   aw...@ziskind.us
Attorney and Counselor-at-Law   http://ziskind.us
Economic Group Pension Services http://egps.com
Actuaries and Employee Benefit Consultants



Re: Broadband Internet Technical Advisory Group

2010-06-10 Thread Jorge Amodio
Looks to me more like the constitution of the Net'Cartel somebody
forgot to invite ICANN ?

BITAG-BCP01 how to hijack the net and the standards process ...

Are we evolving ?

Cheers
Jorge



Re: SCO UNIX Errors

2010-06-10 Thread N. Yaakov Ziskind
William Pitcock wrote (on Thu, Jun 10, 2010 at 01:45:18AM -0500):
 On Wed, 2010-06-09 at 23:40 -0700, jacob miller wrote:
  Hi,
  
  Am getting the following error from my SCO UNIX box.
 
 They mean use an operating system not made by crackheads.  There's a
 reason why SCO switched from UNIX sales to Intellectual Property
 trolling after all.
 
 William

Te be pednatic, the *operating system* was not made by crackheads. The
crackheads who trashed the company (hint: it started a *long* time before
McBride) were always the suits. The operating system is quite solid, but
a bit dated, and (with the shift to IP trolling) became more and more
out of date.

But the coders were really nice people, and they did some really nice
things.

Operational content: never let the suits run your company. :-)
Or, if they do, keep your eye on the door.

-- 
_
Nachman Yaakov Ziskind, FSPA, LLM   aw...@ziskind.us
Attorney and Counselor-at-Law   http://ziskind.us
Economic Group Pension Services http://egps.com
Actuaries and Employee Benefit Consultants



Re: Nato warns of strike against cyber attackers

2010-06-10 Thread Michael Dillon
 And would damage the country is a very fuzzy concept that you really don't
 want to go anywhere near.

I wasn't drafting legislation; I was introducing a concept. I would
expect that actual
legislation would explicitly list which industries were subject to
such regulation.

Otherwise it might include all Internet PoPs and datacenters which
would be rather dumb.

--Michael Dillon



Re: Nato warns of strike against cyber attackers

2010-06-10 Thread JC Dill

J. Oquendo wrote:
More finger pointing here. 


You say that like it's a bad thing.  I'm pointing fingers at the company 
that has a long history of selling software with shoddy security 
(including releasing newer versions with restored vulnerabilities that 
were found and fixed years earlier), and then passing the buck on 
fixing the issues it causes by hiding behind their EULA.  Their EULA 
protects Microsoft from their own customers, but it does NOT protect 
Microsoft from the effects the damage causes on OTHERS who are not 
parties to the EULA.  This is where attractive nuisance comes in.


ISP's don't have to handle the problem, they SHOULD handle the problem.
  


This whole thread is about ISPs not handling the problem and allowing 
the problem to affect others beyond the ISP.  In this case we could 
claim the ISP is also allowing an attractive nuisance to damage others 
and hold that ISP responsible for the damage that extends outside their 
network.  However, we don't need a legal framework to solve THAT problem 
- we can address it with appropriate network blocks etc.  (UDP-style)


jc





Re: Nato warns of strike against cyber attackers

2010-06-10 Thread Owen DeLong

On Jun 9, 2010, at 11:05 PM, JC Dill wrote:

 Owen DeLong wrote:
 
 Software has been out of control for a long time and I hope that the gov't 
 will start by ruling the not responsible for our negligence or the damage 
 it causes clauses of software licenses invalid.
 
 The beauty of my attractive nuisance argument is that the EULA doesn't 
 shield Microsoft from the damage their software causes to a 3rd party such as 
 the ISP who has to deal with the botnet infections of their customers. 
 jc
 

Yep... Much the same as my suggestion merely involves applying the same product 
liability standards as
every other industry faces to software.

Owen




Best Practices checklists

2010-06-10 Thread Michael Dillon
I expect that the collected members of this list could do a good job
of defining some network security practices checklists. Now that NANOG
has been spun out as an independent entity, I would hate to see it
become just another conference organizer. In the recent past many
professions have learned how valuable a simple checklist is in
preventing errors and ensuring that work adheres to a certain
standard.

So I am suggesting that NANOG take on the task of compiling and
publishing checklists for various areas of network operations. We
could have a NANOG wiki where people can publish, and work over,
suggestions for checklist topics and content. Then at the conferences,
a BOF-style meeting could hash out the official published versions.

We could have an interesting debate on whether or not this would make
a difference and whether or not NANOG should take on this role. But I
hope that we are now at a point where we see that network sloppiness
and insecurity are becoming such major issues that action is needed.
Let's act first, and evaluate the usefulness of the work, later.

--Michael Dillon



Re: Best Practices checklists

2010-06-10 Thread David Meyer
On Thu, Jun 10, 2010 at 05:05:35PM +0100, Michael Dillon wrote:
 I expect that the collected members of this list could do a good job
 of defining some network security practices checklists. Now that NANOG
 has been spun out as an independent entity, I would hate to see it
 become just another conference organizer. In the recent past many
 professions have learned how valuable a simple checklist is in
 preventing errors and ensuring that work adheres to a certain
 standard.
 
 So I am suggesting that NANOG take on the task of compiling and
 publishing checklists for various areas of network operations. We
 could have a NANOG wiki where people can publish, and work over,
 suggestions for checklist topics and content. Then at the conferences,
 a BOF-style meeting could hash out the official published versions.
 
 We could have an interesting debate on whether or not this would make
 a difference and whether or not NANOG should take on this role. But I
 hope that we are now at a point where we see that network sloppiness
 and insecurity are becoming such major issues that action is needed.
 Let's act first, and evaluate the usefulness of the work, later.

This is in large part what Aaron is trying to organize. There is
a track on this topic on Monday afternoon. Please see

http://nanog.org/meetings/nanog49/abstracts.php?pt=MTU2NyZuYW5vZzQ5nm=nanog49

Thnx,

Dave


signature.asc
Description: Digital signature


Re: Best Practices checklists

2010-06-10 Thread kris foster
This is a good topic for nanog-futures and not the main list since it's about 
the organization.

Kris

On Jun 10, 2010, at 9:05 AM, Michael Dillon wrote:

 I expect that the collected members of this list could do a good job
 of defining some network security practices checklists. Now that NANOG
 has been spun out as an independent entity, I would hate to see it
 become just another conference organizer. In the recent past many
 professions have learned how valuable a simple checklist is in
 preventing errors and ensuring that work adheres to a certain
 standard.
 
 So I am suggesting that NANOG take on the task of compiling and
 publishing checklists for various areas of network operations. We
 could have a NANOG wiki where people can publish, and work over,
 suggestions for checklist topics and content. Then at the conferences,
 a BOF-style meeting could hash out the official published versions.
 
 We could have an interesting debate on whether or not this would make
 a difference and whether or not NANOG should take on this role. But I
 hope that we are now at a point where we see that network sloppiness
 and insecurity are becoming such major issues that action is needed.
 Let's act first, and evaluate the usefulness of the work, later.
 
 --Michael Dillon
 




Re: Nato warns of strike against cyber attackers

2010-06-10 Thread Brielle Bruns

On 6/9/10 2:56 PM, Owen DeLong wrote:


On Jun 9, 2010, at 8:26 AM, Brielle Bruns wrote:


On 6/9/10 6:27 AM, Jorge Amodio wrote:

Going back then to a previous question, do we want more/any
regulation ?


Laws and regulation exist because people can't behave civilly and
be expected to respect the rights/boundries/property others.

CAN-SPAM exists because the e-mail marketing business refused to
self regulate and respect the wishes of consumers/administrators


Which is good, because it certainly eliminated most of the SPAM. --
NOT!


FDCPA exists because the debt collectors couldn't resist the
temptation to harass and intimidate consumers, and behave
ethically.


And of course, it has caused them all to do so, now, right? -- NOT!



These may not solve all problems, but it does give victims (at least in 
the case of debt collectors) the ability to club them in the face in 
court a few times to the tune of a thousand bucks or so an incident.


Nothing is more satisfying then being able to offer a debt collector the 
option to settle for $X amount.  :)





Lately, the courts have been ruling that companies like LimeWire
are responsible for their products being used for
piracy/downloading because they knew what was going on, but were
turning a blind eye.


This is a positive step, IMHO, but, now companies like Apple and
Micr0$0ft need to be held to similar standards.



Problem is, Microsoft and Apple, though being lax in their coding 
practices, can't entirely help it.  Open Source software has the same 
problems, but do you really think that we should be charging Linus every 
time a Linux box is owned?


There comes a point where a program is so large and expansive that 
holes/exploits is a fact of life.






Why not apply the same standards to ISPs?  If it can be shown that
you had knowledge of specific abuse coming from your network, but
for whatever reason, opted to ignore it and turn a blind eye, then
you are responsible.


I agree.


When I see abuse from my network or am made aware of it, I isolate
and drop on my edge the IPs in question, then investigate and
respond.  Most times, it takes me maybe 10-15 minutes to track down
the user responsible, shut off their server or host, then terminate
their stupid self.


Yep.


A little bit of effort goes a long way.  But, if you refuse to put
in the effort (I'm looking at you, GoDaddy Abuse Desk), then of
course the problems won't go away.


Agreed.




Now if only we could get certain providers to put some effort into it...

--
Brielle Bruns
The Summit Open Source Development Group
http://www.sosdg.org/ http://www.ahbl.org



Re: Nato warns of strike against cyber attackers

2010-06-10 Thread andrew.wallace
On Thu, Jun 10, 2010 at 4:22 AM, Jorge Amodio jmamo...@gmail.com  wrote:
 Cyber Threats Yes, But Is It Cyber War?
 http://www.circleid.com/posts/20100609_cyber_threats_yes_but_is_it_cyberwar/

 -J

Cyber war is something made up by the security industry to save it from going 
bankrupt because the traditional profit vectors such as virus and worm authors 
aren't releasing threats to the web anymore because the motivation for the 
hackers has changed from fun to money.

You've got folks now trying to artificially ramp up cyber security as a 
national security agenda now to create a new profit vector now that the 
traditional threats don't exist anymore.

How do we ramp up cyber security as a national security agenda, something the 
next president has to worry about?

How do we get cyber security as the top headline on CNN and Fox News so that 
cyber security is something The White House works on?

http://www.youtube.com/watch?v=FSUPTZVlkyU

The response to this video was It Shouldn't Take a 9/11 to Fix Cybersecurity 
(But it Might)

http://www.youtube.com/watch?v=cojeP3kJBugfeature=watch_response

I highlighted these suspicious videos on Full-disclosure mailing list but they 
didn't seem to think there was anything wrong.

I also sent them to MI5 via their web form but I've had no reply from them.

Andrew

http://sites.google.com/site/n3td3v/







Re: Nato warns of strike against cyber attackers

2010-06-10 Thread Henry Yen
On Wed, Jun 09, 2010 at 16:44:38PM -0400, Barry Shein wrote:
 MAYBE IF [please read thru before replying because I probably cover
 most knee-jerk responses eventually]:
 
 d) Microsoft hadn't ignored all these basic security practices in
 operating systems which were completely well understood and
 implemented in OS after OS back to at least 1970 if not before because
 they saw more profit in, to use a metaphor, selling cars without
 safety glass in the windshields etc, consequences be damned.

That's a thesis argued in Clarke's book (already mentioned here on NANOG,
and slashdot and ...):

 Microsoft  has  vast  resources,  literally billions of dollars in
 cash,  or  liquid  assets  reserves.  Microsoft  is  an  incredibly
 successful  empire  built  on  the premise of market dominance with
 low-quality goods.

   Who  wrote  those  lines?  Steve  Jobs? Linux inventor Linus Torvalds?
   Ralph  Nader?  No, the author is former White House adviser Richard A.
   Clarke  in  his  new  book,  Cyber  War:  The  Next Threat to National
   Security and What to Do About It.

   Clarke  tries  to  be  fair. He notes that Microsoft didn't originally
   intend  its  software  for  critical networks. But even his efforts at
   fairness  are  unflattering. Microsoft's original goal was to get the
   product  out  the  door and at a low cost of production, he explains.

http://arstechnica.com/security/news/2010/06/cyber-war-microsof
  t-a-weak-link-in-national-security.ars

-- 
Henry Yen   Aegis Information Systems, Inc.
Senior Systems Programmer   Hicksville, New York



Re: Upcoming Improvements to ARIN's Directory Service

2010-06-10 Thread Seth Mattinen
On 6/10/2010 11:46, Jason Lewis wrote:
 I just found out that with the move to this new service that the bulk
 access FTP is going to be phased out.  By design, there will be no way
 to automate the bulk download of this data.
 
 Is anyone else using the data in an environment that will be seriously
 impacted by this change?
 


Apparently we're supposed to be going all Web 2.0 now.

~Seth



Re: Upcoming Improvements to ARIN's Directory Service

2010-06-10 Thread Brandon Galbraith
On Thu, Jun 10, 2010 at 2:23 PM, Seth Mattinen se...@rollernet.us wrote:

 On 6/10/2010 11:46, Jason Lewis wrote:
  I just found out that with the move to this new service that the bulk
  access FTP is going to be phased out.  By design, there will be no way
  to automate the bulk download of this data.
 
  Is anyone else using the data in an environment that will be seriously
  impacted by this change?
 


 Apparently we're supposed to be going all Web 2.0 now.

 ~Seth


Nothing wrong with having a nicer interface, but hopefully not at the
expense of bulk data. If it's a huge issue to support FTP data transfers,
they could at least provide a means through the web service to get bulk data
intelligently.

-- 
Brandon Galbraith
Voice: 630.492.0464


RE: Google Issues?

2010-06-10 Thread Thomas Magill
Yeah,  I cannot reproduce from any other location so it seems tied to our PAT 
address...  Guess I have to actually do work. :)  I suspect malware as our PAT 
is actually running less translations than typical.  Checking with our IDS 
vendor.  Thanks for the follow up.

-Original Message-
From: Rubens Kuhl [mailto:rube...@gmail.com] 
Sent: Thursday, June 10, 2010 12:34 PM
To: Thomas Magill
Cc: nanog@nanog.org
Subject: Re: Google Issues?

This usually indicates a heavily malware-contaminated userbase or
1-to-N NAT/PAT with a large N. Having both is what usually triggers
this, but sometimes if you are strong on one, it could be enough.


Rubens



On Thu, Jun 10, 2010 at 4:23 PM, Thomas Magill
tmag...@providecommerce.com wrote:
 Is anyone seeing warnings today from Google that they suspect that
 searches are coming from an automated source and asking to complete some
 captcha-type authentication to complete a search?  We have had a couple
 of reports on this and I want to make sure it isn't a google issue.  I
 know this isn't really an operator issue but there are enough
 knowledgeable people here that I thought I would ask.



 Thomas Magill
 Network Engineer

 Office: (858) 909-3777

 Cell: (858) 869-9685
 mailto:tmag...@providecommerce.com mailto:tmag...@providecommerce.com


 provide-commerce
 4840 Eastgate Mall

 San Diego, CA  92121



 ProFlowers http://www.proflowers.com/  | redENVELOPE
 http://www.redenvelope.com/  | Cherry Moon Farms
 http://www.cherrymoonfarms.com/  | Shari's Berries
 http://www.berries.com/







Re: Best Practices checklists

2010-06-10 Thread Valdis . Kletnieks
On Thu, 10 Jun 2010 17:05:35 BST, Michael Dillon said:
 I expect that the collected members of this list could do a good job
 of defining some network security practices checklists.

Already done for some stuff:  http://www.cisecurity.org

You disagree with the content or choices, feel free to join in and help ;)

(Full disclosure: I'll take partial blame for the Solaris, AIX, and
Linux benchmark documents...)


pgpBgz0cnCjjN.pgp
Description: PGP signature


Google Issues?

2010-06-10 Thread Thomas Magill
Is anyone seeing warnings today from Google that they suspect that
searches are coming from an automated source and asking to complete some
captcha-type authentication to complete a search?  We have had a couple
of reports on this and I want to make sure it isn't a google issue.  I
know this isn't really an operator issue but there are enough
knowledgeable people here that I thought I would ask.

 

Thomas Magill
Network Engineer

Office: (858) 909-3777

Cell: (858) 869-9685
mailto:tmag...@providecommerce.com mailto:tmag...@providecommerce.com 


provide-commerce 
4840 Eastgate Mall

San Diego, CA  92121

 

ProFlowers http://www.proflowers.com/  | redENVELOPE
http://www.redenvelope.com/  | Cherry Moon Farms
http://www.cherrymoonfarms.com/  | Shari's Berries
http://www.berries.com/ 

 



Re: Upcoming Improvements to ARIN's Directory Service

2010-06-10 Thread Michael Dillon
 Apparently we're supposed to be going all Web 2.0 now.

Web 2.0 can handle bulk transfers of data just fine.

I wonder if this is somehow related to privacy and data protection laws.

Just recently, RIPE announced that they were going to block bulk
transfers as a result of data protection laws, presumably because some
law has just changed. Obviously ARIN is under a different legal regime
than RIPE, however data protection has recently been a hot button
issue in the USA and it is possible that something similar will
happen. Given the importance of case law in the USA, as opposed to
legislation, I wouldn't be surprised if there was some sort of legal
review going on.

But again, as far as technology goes, HTTP is a superior file transfer
protocol to FTP, so the move to Web 2.0 RESTful transactions over HTTP
does not give any technical reason to stop bulk transfers. In fact, it
may just be an oversight so you should really ask them Clearly, if
nobody bothers to ask about bulk transfers, then nobody uses them and
nobody cares, so shutting them down is the right thing to do.

--Michael Dillon



Re: Google Issues?

2010-06-10 Thread Rubens Kuhl
This usually indicates a heavily malware-contaminated userbase or
1-to-N NAT/PAT with a large N. Having both is what usually triggers
this, but sometimes if you are strong on one, it could be enough.


Rubens



On Thu, Jun 10, 2010 at 4:23 PM, Thomas Magill
tmag...@providecommerce.com wrote:
 Is anyone seeing warnings today from Google that they suspect that
 searches are coming from an automated source and asking to complete some
 captcha-type authentication to complete a search?  We have had a couple
 of reports on this and I want to make sure it isn't a google issue.  I
 know this isn't really an operator issue but there are enough
 knowledgeable people here that I thought I would ask.



 Thomas Magill
 Network Engineer

 Office: (858) 909-3777

 Cell: (858) 869-9685
 mailto:tmag...@providecommerce.com mailto:tmag...@providecommerce.com


 provide-commerce
 4840 Eastgate Mall

 San Diego, CA  92121



 ProFlowers http://www.proflowers.com/  | redENVELOPE
 http://www.redenvelope.com/  | Cherry Moon Farms
 http://www.cherrymoonfarms.com/  | Shari's Berries
 http://www.berries.com/







Re: Upcoming Improvements to ARIN's Directory Service

2010-06-10 Thread Jason Lewis
It's very clear.  I went back and forth with support, asking how to
automate my bulk transfer with the new system.

Me: Is the bulk data download going to be available for automated
download. I can currently download the data daily from the ftp via a
script. The new web page doesn't seem to support that.
Support:  No, there is no automation by design.

I'm ok with whatever system they provide if the functionality stays
the same.  I don't understand what they gain by making a human login
and download the file.

On Thu, Jun 10, 2010 at 5:26 PM, Michael Dillon
wavetos...@googlemail.com wrote:
 Apparently we're supposed to be going all Web 2.0 now.

 Web 2.0 can handle bulk transfers of data just fine.

 I wonder if this is somehow related to privacy and data protection laws.

 Just recently, RIPE announced that they were going to block bulk
 transfers as a result of data protection laws, presumably because some
 law has just changed. Obviously ARIN is under a different legal regime
 than RIPE, however data protection has recently been a hot button
 issue in the USA and it is possible that something similar will
 happen. Given the importance of case law in the USA, as opposed to
 legislation, I wouldn't be surprised if there was some sort of legal
 review going on.

 But again, as far as technology goes, HTTP is a superior file transfer
 protocol to FTP, so the move to Web 2.0 RESTful transactions over HTTP
 does not give any technical reason to stop bulk transfers. In fact, it
 may just be an oversight so you should really ask them Clearly, if
 nobody bothers to ask about bulk transfers, then nobody uses them and
 nobody cares, so shutting them down is the right thing to do.

 --Michael Dillon





Re: Nato warns of strike against cyber attackers

2010-06-10 Thread Larry Sheldon
http://www.theatlantic.com/politics/archive/2010/06/homeland-securitys-cyber-bill-would-codify-executive-emergency-powers/57946/

http://tinyurl.com/2gyezyg
-- 
Somebody should have said:
A democracy is two wolves and a lamb voting on what to have for dinner.

Freedom under a constitutional republic is a well armed lamb contesting
the vote.

Requiescas in pace o email
Ex turpi causa non oritur actio
Eppure si rinfresca

ICBM Targeting Information:  http://tinyurl.com/4sqczs
http://tinyurl.com/7tp8ml





huawei-nsp

2010-06-10 Thread Jared Mauch

I've created a new list on puck, huawei-nsp

You can subscribe here:

   https://puck.nether.net/mailman/listinfo/huawei-nsp

- Jared

-- 
Jared Mauch  | pgp key available via finger from ja...@puck.nether.net
clue++;  | http://puck.nether.net/~jared/  My statements are only mine.



Re: Upcoming Improvements to ARIN's Directory Service

2010-06-10 Thread Rubens Kuhl
 I'm ok with whatever system they provide if the functionality stays
 the same.  I don't understand what they gain by making a human login
 and download the file.

Accountability. If versions X and Y of database got abused (breach of
ToS), and only user U has downloaded such versions, gotcha.
Using honeytokens on the downloaded file can be interesting to quickly
connect the dots: if one of the handles on the list is
comeonspammer32...@wannahaveapieceofme.com, dynamically generated to
match a download session, and suddenly this account starts to get
spam...


Rubens



Re: Upcoming Improvements to ARIN's Directory Service

2010-06-10 Thread James Hess
On Thu, Jun 10, 2010 at 9:56 PM, Rubens Kuhl rube...@gmail.com wrote:
 comeonspammer32...@wannahaveapieceofme.com, dynamically generated to
 match a download session, and suddenly this account starts to get
 spam...
well...  yes..  doesn't help much if the token being abused is the
admin POC's phone number, however. A session-based  generated
token alone would not be a very robust form of accountability;it
is only as good as the strength of the verification required to get an
account
(and the confidence that multiple accounts do not collude).

A user might simply sign up twice or more using fake signup details,
they can compare their different downloads, and screen out any records
that changed between the several sessions.

e.g.  grab 3 copies of thesame file  (that were obtained using 3
different logins, from 3 different countries),  run a 3-way diff,
strip out any lines that changed.
Any session-specific token would be excluded...


That is, if obtaining such a listing of e-mail addresses is even is
worth it to them.   Maybe it is not.
Maybe the more common abuse is  manual solicitation by a human being,
trying to sell some high-margin product  targeted at enterprises in
the directory, who can easily recognize comeonspammer  and stay
away.

I  doubt the average POC  is going to be duped by the pill salesmen,
latest money making scam,  too-good-to-be-true offer,  go phish
attempt,  or other standardized junk mail.


--
-J