RE: Semi-automated L3 interface DNS records

2012-10-22 Thread Pedersen, Sean
Thanks to everyone that responded. Based on the information from this list and 
several other areas I posted the same question, it seems like a feasible goal. 

If anyone has any ideas on how to either reduce my sleeping requirements or 
extend the number of hours in a day so that I can actually implement this, I 
would love to hear from you. :-P

-Original Message-
From: Pedersen, Sean [mailto:sean.peder...@usairways.com] 
Sent: Thursday, October 18, 2012 12:57 PM
To: nanog@nanog.org
Subject: Semi-automated L3 interface DNS records

Does anyone out there have any experience with a script, tool or appliance that 
would help manage the creation and maintenance of DNS records for Layer 3 
interfaces on routers and switches?

We'd like to move toward this practice to help with troubleshooting and IPAM, 
but it's not feasible to do it manually. At a minimum, I was mulling over the 
idea of writing a script that would poll a device via SNMP to obtain interface 
information, parse it, compare the results to DNS, then generate a report if it 
found a miss. It wouldn't be fully-automated, but it would be better than doing 
that portion of the work manually. Cleaning up dead entries would be another 
issue.



forward and reverse DNS (was: Please, talk me down.)

2012-10-22 Thread Andrew Sullivan
On Mon, Oct 22, 2012 at 03:18:52PM +1100, Mark Andrews wrote:
 records are consistent.  It is however good practice that these exist and
 are consistent.

I will note that the IETF DNSOP WG was unable to agree even on that
latter claim.

A

-- 
Andrew Sullivan
Dyn Labs
asulli...@dyn.com



Issues encountered with assigning .0 and .255 as usable addresses?

2012-10-22 Thread Paul Zugnoni
Curious whether it's commonplace to find systems that automatically regard .0 
and .255 IP addresses (ipv4) as src/dst in packets as traffic that should be 
considered invalid. When you have a pool of assignable addresses, you should 
expect to see x.x.x.0 and x.x.x.255 in passing traffic (ie. VIP or NAT pool, or 
subnets larger than /24). Yet I've run into a commercial IP mgmt product and 
getting reports of M$ ISA proxy that is specifically blocking traffic for an IP 
ending in .0 or .255.

Any experience or recommendations? Besides replace the ISA proxy…. Since it's 
not mine to replace. Also curious whether there's an RFC recommending against 
the use of .0 or .255 addresses for this reason.


Re: Issues encountered with assigning .0 and .255 as usable addresses?

2012-10-22 Thread Bryan Tong
As far as I know. There is no RFC based restrictions based on having
those as usable IPs.

We have been routing customers IP blocks on our network for a while
and never had a problem with 0 or .255 as the assigned IP even with
Microsoft Windows 2003 as the operating system.

Im not sure how to fix your issue but I dont think its automatically
disregarded by anyone that would seem silly.

On Mon, Oct 22, 2012 at 4:07 PM, Paul Zugnoni
paul.zugn...@jivesoftware.com wrote:
 Curious whether it's commonplace to find systems that automatically regard .0 
 and .255 IP addresses (ipv4) as src/dst in packets as traffic that should be 
 considered invalid. When you have a pool of assignable addresses, you should 
 expect to see x.x.x.0 and x.x.x.255 in passing traffic (ie. VIP or NAT pool, 
 or subnets larger than /24). Yet I've run into a commercial IP mgmt product 
 and getting reports of M$ ISA proxy that is specifically blocking traffic for 
 an IP ending in .0 or .255.

 Any experience or recommendations? Besides replace the ISA proxy…. Since it's 
 not mine to replace. Also curious whether there's an RFC recommending against 
 the use of .0 or .255 addresses for this reason.



-- 

Bryan Tong
Nullivex LLC | eSited LLC
(507) 298-1624



Re: Issues encountered with assigning .0 and .255 as usable addresses?

2012-10-22 Thread Matt Buford
On Mon, Oct 22, 2012 at 5:07 PM, Paul Zugnoni paul.zugn...@jivesoftware.com
 wrote:

 Any experience or recommendations? Besides replace the ISA proxy…. Since
 it's not mine to replace. Also curious whether there's an RFC recommending
 against the use of .0 or .255 addresses for this reason.


Way back in the late 90's I tried this with a /23 dialup DHCP pool and
quickly found that the .0 and .255 users couldn't get to some scattered web
sites, though they seemed to be able to get to most of the Internet.

However, a year or so ago I spun up an always-on Amazon ec2 instance with a
static IP and was handed a .0 address.  I still use this VM regularly and
have not run into any problems with reachability for this address.


Re: Issues encountered with assigning .0 and .255 as usable addresses?

2012-10-22 Thread Job Snijders
Hi Paul,

On Oct 22, 2012, at 5:07 PM, Paul Zugnoni paul.zugn...@jivesoftware.com wrote:

 Curious whether it's commonplace to find systems that automatically regard .0 
 and .255 IP addresses (ipv4) as src/dst in packets as traffic that should be 
 considered invalid. When you have a pool of assignable addresses, you should 
 expect to see x.x.x.0 and x.x.x.255 in passing traffic (ie. VIP or NAT pool, 
 or subnets larger than /24). Yet I've run into a commercial IP mgmt product 
 and getting reports of M$ ISA proxy that is specifically blocking traffic for 
 an IP ending in .0 or .255.
 
 Any experience or recommendations? Besides replace the ISA proxy…. Since it's 
 not mine to replace. Also curious whether there's an RFC recommending against 
 the use of .0 or .255 addresses for this reason.

In the post-classfull routing world .0 and .255 should be normal IP addresses. 
CIDR was only recently defined (somewhere in 1993) so I understand it might 
take companies some time to adjust to this novel situation. Ok, enough 
snarkyness!

Quite recently a participant of the NLNOG RING had a problem related to an .255 
IP address. You can read more about it here: 
https://ring.nlnog.net/news/2012/10/ring-success-the-ipv4-255-problem/ So yes, 
apparently problems like these still arise once in a while. My recommendation 
would be to fix the equipment and not blame it on .0 or .255. 

Kind regards,

Job Snijders


Re: Issues encountered with assigning .0 and .255 as usable addresses?

2012-10-22 Thread Dan White

On 10/22/12 17:18 -0500, Matt Buford wrote:

On Mon, Oct 22, 2012 at 5:07 PM, Paul Zugnoni paul.zugn...@jivesoftware.com

wrote:



Any experience or recommendations? Besides replace the ISA proxy…. Since
it's not mine to replace. Also curious whether there's an RFC recommending
against the use of .0 or .255 addresses for this reason.



Way back in the late 90's I tried this with a /23 dialup DHCP pool and
quickly found that the .0 and .255 users couldn't get to some scattered web
sites, though they seemed to be able to get to most of the Internet.

However, a year or so ago I spun up an always-on Amazon ec2 instance with a
static IP and was handed a .0 address.  I still use this VM regularly and
have not run into any problems with reachability for this address.


I had a similar experience about 10 years ago, with DSL customers who had
been assigned .0 or .255 addresses not able to reach some sites.

--
Dan White



IP tunnel MTU

2012-10-22 Thread Templin, Fred L
Hello,

Several months ago, there was discussion on the list regarding IP
tunnel maximum transmission unit (MTU). Since that time, it has been
brought to my attention by members of my company's network operations
staff that tunnel MTU is a very real problem they need to cope with
on a daily basis - especially with the growing need to depend on
both tunnels and tunnels-within-tunnels to track mobile devices.

Since tunnels always reduce the effective MTU seen by data packets
due to the encapsulation overhead, the only two ways to accommodate
the tunnel MTU is either through the use of path MTU discovery or
through fragmentation and reassembly. Unfortunately, both are known
to be problematic in a non-trivial number of cases.

The discussions on NANOG from back in the June timeframe resulted in
Operational Issues with Tunnel Maximum transmission Unit:

  https://datatracker.ietf.org/doc/draft-generic-v6ops-tunmtu/

I would like to ask this group to now give this document a look and
post your comments/thoughts/experiences. For example, has the tunnel
MTU problem crept into daily operational considerations to the point
that we should now at least be documenting it and preferably trying
to do something about it? From talking to our staff, I believe the
answer is yes but it would be good to have confirmation from others.

Thanks in advance for your thoughts,

Fred
fred.l.temp...@boeing.com





RE: Issues encountered with assigning .0 and .255 as usable addresses?

2012-10-22 Thread David Hubbard
From: Paul Zugnoni [mailto:paul.zugn...@jivesoftware.com] 
 
 Curious whether it's commonplace to find systems that 
 automatically regard .0 and .255 IP addresses (ipv4) as 
 src/dst in packets as traffic that should be considered 
 invalid. When you have a pool of assignable addresses, you 
 should expect to see x.x.x.0 and x.x.x.255 in passing traffic 
 (ie. VIP or NAT pool, or subnets larger than /24). Yet I've 
 run into a commercial IP mgmt product and getting reports of 
 M$ ISA proxy that is specifically blocking traffic for an IP 
 ending in .0 or .255.
 
 Any experience or recommendations? Besides replace the ISA 
 proxy Since it's not mine to replace. Also curious whether 
 there's an RFC recommending against the use of .0 or .255 
 addresses for this reason.
 

We're a web host and over the past 12 years we've randomly
attempted to put non-critical customer sites on .0 and .255
addresses and found customers fairly consistently had
problems accessing them.  These would typically be sites
for development, etc. where the customer was the only one
accessing it and even then it has been a high percentage
of failures.  It is nearly always the customer's small biz
/ home office cheap-o router that is the issue even in this
day and age but occassionally it has been the ISP as well.
I haven't kept a list of vendors/isp's unfortunately so I
don't have more useful information to offer you other
than that it's still a problem.  We still use those
addresses for that purpose since they'd otherwise go to
waste but most of the time it ends up being changed when
the customer tries to access it from somewhere and can't.

David



hotmail.com live.com admin needed

2012-10-22 Thread Carlos M. Perez
Hi,

We're trying to resolve some delivery issues reported by hotmail users.
Started happening a few weeks ago.  Getting immediate NDRs, and the
server that is supposed to receive the email has no records of
attempts.  The messages also don't match what the receiving server
should be sending.  The server(s) listed in the MX should receive all
email without authentication, since it's a mail filtering service (Maxmail)

===
Reporting-MTA: dns;snt0-omc3-s27.snt0.hotmail.com
Received-From-MTA: dns;SNT133-W53
Arrival-Date: Mon, 22 Oct 2012 14:09:49 -0700

Final-Recipient: rfc822;administra...@.com
Action: failed
Status: 5.5.0
Diagnostic-Code: smtp;550 authentication required
===

Kindly contact me off-list.

Thanks,

--
Carlos M. Perez
Runcentral, LLC









Re: Issues encountered with assigning .0 and .255 as usable addresses?

2012-10-22 Thread Scott Weeks


--- j...@instituut.net wrote:
From: Job Snijders j...@instituut.net

 Curious whether it's commonplace to find systems that automatically regard 
 .0 and .255 IP addresses (ipv4) as src/dst in packets as traffic that should 
 be considered invalid. When you have a pool of assignable addresses, you 
 should expect to see x.x.x.0 and x.x.x.255 in passing traffic (ie. VIP or NAT 
 pool, or subnets larger than /24). Yet I've run into a commercial IP mgmt 
 product 
 and getting reports of M$ ISA proxy that is specifically blocking traffic for 
 an 
 IP ending in .0 or .255.



I used about a /15s worth of /23s for DHCP at a previous employer for 5 years 
(2005 - 2010) and they're still using them today years later.  Never got one 
complaint AFAIK.  I even got one of the .0 or .255 addresses for a while and
never had trouble.  This was discussed in detail a while back.  Look in the 
archives.

scott



Re: Issues encountered with assigning .0 and .255 as usable addresses?

2012-10-22 Thread Joe Greco
 d be considered invalid. When you have a pool of assignable addresses, you =
 should expect to see x.x.x.0 and x.x.x.255 in passing traffic (ie. VIP or N=
 AT pool, or subnets larger than /24). Yet I've run into a commercial IP mgm=
 t product and getting reports of M$ ISA proxy that is specifically blocking=
  traffic for an IP ending in .0 or .255.

To make a long story short:

If it's a product you're considering buying, problems with .0 and .255
reflect on the competence of the product's designers.  You can safely
assume that there are many other Severely Broken Things too and move on
to saner products.

For general Internet use, there is a lot of gear out there that's ten or
more years old.  You should avoid using .0 and .255 addresses if you can
avoid it, though it's a shame to waste valid IP space to accommodate the
brokenness of someone else's stuff.

Some of us park stuff on .0 and .255 addresses in order to motivate 
others to change.

... JG
-- 
Joe Greco - sol.net Network Services - Milwaukee, WI - http://www.sol.net
We call it the 'one bite at the apple' rule. Give me one chance [and] then I
won't contact you again. - Direct Marketing Ass'n position on e-mail spam(CNN)
With 24 million small businesses in the US alone, that's way too many apples.



Re: Issues encountered with assigning .0 and .255 as usable addresses?

2012-10-22 Thread Mark Andrews

In message 201210222307.q9mn7aiv063...@aurora.sol.net, Joe Greco writes:
  d be considered invalid. When you have a pool of assignable addresses, you 
 =
  should expect to see x.x.x.0 and x.x.x.255 in passing traffic (ie. VIP or N
 =
  AT pool, or subnets larger than /24). Yet I've run into a commercial IP mgm
 =
  t product and getting reports of M$ ISA proxy that is specifically blocking
 =
   traffic for an IP ending in .0 or .255.
 
 To make a long story short:
 
 If it's a product you're considering buying, problems with .0 and .255
 reflect on the competence of the product's designers.  You can safely
 assume that there are many other Severely Broken Things too and move on
 to saner products.
 
 For general Internet use, there is a lot of gear out there that's ten or
 more years old.  You should avoid using .0 and .255 addresses if you can
 avoid it, though it's a shame to waste valid IP space to accommodate the
 brokenness of someone else's stuff.

Ten year old equipment should be CIDR aware.  It's not like it CIDR
wasn't in wide spread using in 2002.

 Some of us park stuff on .0 and .255 addresses in order to motivate 
 others to change.
 
 ... JG
 -- 
 Joe Greco - sol.net Network Services - Milwaukee, WI - http://www.sol.net
 We call it the 'one bite at the apple' rule. Give me one chance [and] then I
 won't contact you again. - Direct Marketing Ass'n position on e-mail spam(CN
 N)
 With 24 million small businesses in the US alone, that's way too many apples.
 
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org



Re: Issues encountered with assigning .0 and .255 as usable addresses?

2012-10-22 Thread Joe Greco
 Ten year old equipment should be CIDR aware.  It's not like it CIDR
 wasn't in wide spread using in 2002.

And BCP38 has had sufficient time to be globally deployed.

What's your point, again?  ;-)

I was pretty careful in trying to outline that it's still expected 
that there are defective products which even today will filter .0
and .255.  This might be due to incompetence, or nobody having looked
at the code in a dozen years, or other various faults.  There is no
central agency to validate gear against RFC, common use, and common
sense, and from what I hear, even Cisco has maintained classful
routing in useless contexts many years beyond what it should have.

The painful difference between should be CIDR aware (we agree on
this!) and is actually CIDR compliant without amateur-hour mistakes
is a measurable distance, even today.

... JG
-- 
Joe Greco - sol.net Network Services - Milwaukee, WI - http://www.sol.net
We call it the 'one bite at the apple' rule. Give me one chance [and] then I
won't contact you again. - Direct Marketing Ass'n position on e-mail spam(CNN)
With 24 million small businesses in the US alone, that's way too many apples.



Re: Issues encountered with assigning .0 and .255 as usable addresses?

2012-10-22 Thread Jimmy Hess
On 10/22/12, Paul Zugnoni paul.zugn...@jivesoftware.com wrote:
[snip]
 Any experience or recommendations? Besides replace the ISA proxy…. Since
 it's not mine to replace. Also curious whether there's an RFC recommending
 against the use of .0 or .255 addresses for this reason.

ISA is old, and might not be supported anymore, unless you have an
extended support contract.   If it's not supported anymore, then don't
be surprised if it has breakage you will not be able to repair. I
don't recommend upgrading to TMG, either:  although still supported,
that was just discontinued.

If ISA is refusing traffic to/from IPs ending in .0, then ISA is
either broken, or misconfigured.
Get a support case with the vendor, raise it as a critical issue --
unable to pass traffic to critical infrastructure that ends with a
.255 or .0  IP address,  demand that the vendor provide a resolution,
And explain that changing the IP address of the remote server is not an option.


If the vendor can't or won't provide a resolution,   then  not only is
the proxy server broken,
but malfunctioning in a way   that has an impact on network connectivity.

I would consider its removal compulsory,  as you never know,  when a
network resource, web site, e-mail server, etc. your org has a
business  critical need to access,  or be accessed from;  may be
placed on .255 or  .0

--
-JH



Re: IP tunnel MTU

2012-10-22 Thread Dobbins, Roland

On Oct 23, 2012, at 5:24 AM, Templin, Fred L wrote:

 Since tunnels always reduce the effective MTU seen by data packets due to the 
 encapsulation overhead, the only two ways to accommodate
 the tunnel MTU is either through the use of path MTU discovery or through 
 fragmentation and reassembly.

Actually, you can set your tunnel MTU manually.

For example, the typical MTU folks set for a GRE tunnel is 1476.

This isn't a new issue; it's been around ever since tunneling technologies have 
been around, and tons have been written on this topic.  Look at your various 
router/switch vendor Web sites, archives of this list and others, etc.

So, it's been known about, dealt with, and documented for a long time.  In 
terms of doing something about it, the answer there is a) to allow the 
requisite ICMP for PMTU-D to work to/through any networks within your span of 
administrative control and b) adjusting your own tunnel MTUs to appropriate 
values based upon experimentation.

Enterprise endpoint networks are notorious for blocking *all* ICMP (as well as 
TCP/53 DNS) at their edges due to 'security' misinformation propagated by 
Confused Information Systems Security Professionals and their ilk.  Be sure 
that your own network policies aren't part of the problem affecting your 
userbase, as well as anyone else with a need to communicate with properties on 
your network via tunnels.

---
Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com

  Luck is the residue of opportunity and design.

   -- John Milton




Re: Issues encountered with assigning .0 and .255 as usable addresses?

2012-10-22 Thread Justin Krejci
And since owen has not yet mentioned it, consider something that supports 
having : in its address as well. 

Sort of tangentially related, I had a support rep for a vendor once tell me 
that a 255 in the second or third octet was not valid for an ipv4 address. Hard 
to troubleshoot a problem when I had to first explain how ip addressing worked 
because the rep was so fixated on the 255 we were using on the network. If any 
product really doesn't like 255 in any position then you should consider 
yourself lucky to still be in business at all. Jimmy Hess mysi...@gmail.com 
wrote:On 10/22/12, Paul Zugnoni paul.zugn...@jivesoftware.com wrote:
[snip]
 Any experience or recommendations? Besides replace the ISA proxy…. Since
 it's not mine to replace. Also curious whether there's an RFC recommending
 against the use of .0 or .255 addresses for this reason.

ISA is old, and might not be supported anymore, unless you have an
extended support contract.   If it's not supported anymore, then don't
be surprised if it has breakage you will not be able to repair. I
don't recommend upgrading to TMG, either:  although still supported,
that was just discontinued.

If ISA is refusing traffic to/from IPs ending in .0, then ISA is
either broken, or misconfigured.
Get a support case with the vendor, raise it as a critical issue --
unable to pass traffic to critical infrastructure that ends with a
.255 or .0  IP address,  demand that the vendor provide a resolution,
And explain that changing the IP address of the remote server is not an option.


If the vendor can't or won't provide a resolution,   then  not only is
the proxy server broken,
but malfunctioning in a way   that has an impact on network connectivity.

I would consider its removal compulsory,  as you never know,  when a
network resource, web site, e-mail server, etc. your org has a
business  critical need to access,  or be accessed from;  may be
placed on .255 or  .0

--
-JH



Re: Semi-automated L3 interface DNS records

2012-10-22 Thread Joe Abley

On 2012-10-18, at 14:57, Pedersen, Sean sean.peder...@usairways.com wrote:

 Does anyone out there have any experience with a script, tool or appliance 
 that would help manage the creation and maintenance of DNS records for Layer 
 3 interfaces on routers and switches?

http://www.nanog.org/meetings/nanog26/presentations/stephen.pdf
ftp://ftp.isc.org/isc/toolmakers/

 We'd like to move toward this practice to help with troubleshooting and IPAM, 
 but it's not feasible to do it manually. At a minimum, I was mulling over the 
 idea of writing a script that would poll a device via SNMP to obtain 
 interface information, parse it, compare the results to DNS, then generate a 
 report if it found a miss. It wouldn't be fully-automated, but it would be 
 better than doing that portion of the work manually. Cleaning up dead entries 
 would be another issue.

AS6461 once had the bulk of its reverse DNS auto-generated from awk scripts. 
It's the only way to travel.


Joe


Re: forward and reverse DNS (was: Please, talk me down.)

2012-10-22 Thread Joe Abley

On 2012-10-22, at 11:36, Andrew Sullivan asulli...@dyn.com wrote:

 On Mon, Oct 22, 2012 at 03:18:52PM +1100, Mark Andrews wrote:
 records are consistent.  It is however good practice that these exist and
 are consistent.
 
 I will note that the IETF DNSOP WG was unable to agree even on that
 latter claim.

I will further note that just because dnsop can't agree on something doesn't 
mean that it's not worth agreeing on.


Joe




Re: forward and reverse DNS (was: Please, talk me down.)

2012-10-22 Thread Jimmy Hess
On 10/22/12, Joe Abley jab...@hopcount.ca wrote:
 I will further note that just because dnsop can't agree on something doesn't
 mean that it's not worth agreeing on.
[snip]
Some of the IETF WGs' members  wouldn't be able to agree what color
the sky appears to be on a clear sunny day.

But it is common  MTAs, to be configured to perform a  check for
Forward-Confirmed DNS, similar to the iprev authentication mechanism
mentioned in RFC5451, except this is mandatory,  and they refuse
delivery.

Many popular anti-spam solutions are implementing this out of the box,
 and common MTAs provide documentation recommending configurations

that implement constraints such as these:

1. If a 'HELO' or 'EHLO' message is received, and there is no
argument, the SMTP server will respond with a 5xx reject,  even though
it is technically allowed to have a HELO/EHLO without a hostnamr
parameter specified.

2. If a 'HELO'  or  'EHLO'  message is received;  the SMTP server
will begin a forward DNS lookup on the hostname presented in the
HELO/EHLO,  and a Reverse DNS lookup on the connecting IP;   it may
initiate an outgoing  connection to port 113 auth  (Ident)  on the
connecting IP,  in order to ask for a username to insert in message
headers.

a. If the forward DNS check on the HELO name, or the PTR query on the
connecting IP fails to get a response.  HELO fails with a 4xx reject.

b. If either result in a NXDOMAIN response,  HELO fails with a 5xx reject.

c. If both succeed, a forward DNS lookup is started for the name found
in the PTR response,  and a 4xx reject upon lookup failure,  or   5xx
reject  upon  a NXDOMAIN response,  or forward lookup response not
matching the IP address of the client.

o The  SMTP reject  might  instead trigger a tarpitting mechanism.
Some implementations currently accept the HELO and delay the SMTP
reject by default until a later stage,  such as RCPT TO,   and/or
cache  the reject decision,  to reduce the
impact of multiple connection attempts.



3.  If a 'RCPT TO' message is received,  a 5xx smtp error is sent,
unless a  'MAIL FROM' message has already been received and accepted,
and the mailbox is a known local mailbox.

4. If a 'MAIL FROM' message is received, a 5xx smtp error is sent,
unless a 'HELO'  or 'EHLO' message has already been received and
accepted.If the address referenced is  not ,   then  A  DNS
request is sent for forward lookup of the domain in the MAIL FROM,
and SPF query/policy test on the envelope from address.   If there
is a SPF soft fail, a 4xx reject;SPF hard fail, or the domain does
not exist, a  SMTP 5xx reject.




 Joe
--
-JH