Re: SIP on FTTH systems

2014-02-06 Thread Mark Tinka
On Thursday, February 06, 2014 09:19:59 AM Måns Nilsson 
wrote:

 Or, one could make sure everything has a globally unique
 IP address and is using reasonably secured
 communications. The downside is that one then can't
 defend the existence  of those empire-building
 middleboxes. It is not the telco way, so is of course
 unthinkable. Like anything beyond WAP was on cell phones
 a decade ago.

There are, typically, three topology models for modern FTTH 
(wireline, really) networks that a service provider could 
deploy:

1. SVLAN N:1 model
2. CVLAN 1:1 model
3. Hybrid of both

The SVLAN (N:1) model is simple; just have a single VLAN for 
each service (VLAN 10 for Internet/Unicast, VLAN 20 for 
VoIP, VLAN 30 for IPTv/Multicast). This is simple and easy 
to scale, but if one is using relatively dumb AN's (like 
GPON's or MSAN's), it can be difficult to control how much 
bandwidth customers need, and how they can roam between 
services in the home (given CPE ties services to ports).

The CVLAN (1:1) model is good for identifying services and 
bandwidth requirements on a per-customer basis. The main 
problem with this model is that Multicast traffic gets 
treated like Unicast, because each customer has a unique 
VLAN for themselves, and as such, the upstream PE router 
ends up having to replicate the same linear video stream as 
many times as there are customers down the line.

The Hybrid model, where CVLAN's are used for all Unicast 
traffic (Internet, VoIP and VoD, typically), and a single 
SVLAN is used for all customers to handle Multicast traffic 
(so-called MVLAN). The challenge here is if you're the type 
of operator that likes to have a consistent set of address 
per VLAN, it can become a little tricky if your VoIP service 
is a walled-garden running on private IP space, given it 
shares the same VLAN as Internet and VoD which would 
normally run on public IP space.

The N:1 SVLAN model is quite simple and scalable for 
wholesale FTTH services. 

There is product from some vendors, now, that is built with 
FTTH in mind. 1U, dense switches (Active-E) that support 
(reasonably) proper QoS and bandwidth management controls on 
customer- and core-facing ports, at Layer 2. So that offers 
you a lot more capability at the AN, and you can manage 
bandwidth as close to the customer as possible, unlike 
typical GPON deployments which may not have these features, 
leaving you to apply bandwidth policy at the PE router - 
much too far up the line.

These new products can also support split horizons across 
bridge domains (which GPON's and DSLAM's do today), meaning 
that customers can use the same SVLAN's, but can only 
communicate via the upstream router (Layer 3), eliminating 
risk associated with Layer 2 visibility between customers 
connected to the same bridge domain.

Cheers,

Mark.


signature.asc
Description: This is a digitally signed message part.


Re: SIP on FTTH systems

2014-02-06 Thread cdel.firsthand.net
Time for users to consider splitting L2 services from IP ? 

Christian de Larrinaga


 On 6 Feb 2014, at 08:01, Mark Tinka mark.ti...@seacom.mu wrote:
 
 On Thursday, February 06, 2014 09:19:59 AM Måns Nilsson 
 wrote:
 
 Or, one could make sure everything has a globally unique
 IP address and is using reasonably secured
 communications. The downside is that one then can't
 defend the existence  of those empire-building
 middleboxes. It is not the telco way, so is of course
 unthinkable. Like anything beyond WAP was on cell phones
 a decade ago.
 
 There are, typically, three topology models for modern FTTH 
 (wireline, really) networks that a service provider could 
 deploy:
 
1. SVLAN N:1 model
2. CVLAN 1:1 model
3. Hybrid of both
 
 The SVLAN (N:1) model is simple; just have a single VLAN for 
 each service (VLAN 10 for Internet/Unicast, VLAN 20 for 
 VoIP, VLAN 30 for IPTv/Multicast). This is simple and easy 
 to scale, but if one is using relatively dumb AN's (like 
 GPON's or MSAN's), it can be difficult to control how much 
 bandwidth customers need, and how they can roam between 
 services in the home (given CPE ties services to ports).
 
 The CVLAN (1:1) model is good for identifying services and 
 bandwidth requirements on a per-customer basis. The main 
 problem with this model is that Multicast traffic gets 
 treated like Unicast, because each customer has a unique 
 VLAN for themselves, and as such, the upstream PE router 
 ends up having to replicate the same linear video stream as 
 many times as there are customers down the line.
 
 The Hybrid model, where CVLAN's are used for all Unicast 
 traffic (Internet, VoIP and VoD, typically), and a single 
 SVLAN is used for all customers to handle Multicast traffic 
 (so-called MVLAN). The challenge here is if you're the type 
 of operator that likes to have a consistent set of address 
 per VLAN, it can become a little tricky if your VoIP service 
 is a walled-garden running on private IP space, given it 
 shares the same VLAN as Internet and VoD which would 
 normally run on public IP space.
 
 The N:1 SVLAN model is quite simple and scalable for 
 wholesale FTTH services. 
 
 There is product from some vendors, now, that is built with 
 FTTH in mind. 1U, dense switches (Active-E) that support 
 (reasonably) proper QoS and bandwidth management controls on 
 customer- and core-facing ports, at Layer 2. So that offers 
 you a lot more capability at the AN, and you can manage 
 bandwidth as close to the customer as possible, unlike 
 typical GPON deployments which may not have these features, 
 leaving you to apply bandwidth policy at the PE router - 
 much too far up the line.
 
 These new products can also support split horizons across 
 bridge domains (which GPON's and DSLAM's do today), meaning 
 that customers can use the same SVLAN's, but can only 
 communicate via the upstream router (Layer 3), eliminating 
 risk associated with Layer 2 visibility between customers 
 connected to the same bridge domain.
 
 Cheers,
 
 Mark.



Need trusted NTP Sources

2014-02-06 Thread Notify Me
Hi !

I'm trying to help a company I work for to pass an audit, and we've
been told we need trusted NTP sources (RedHat doesn't cut it). Being
located in Nigeria, Africa, I'm not very knowledgeable about trusted
sources therein.

Please can anyone help with sources that wouldn't mind letting us sync
from them?

Thanks a lot!



Re: Need trusted NTP Sources

2014-02-06 Thread Alexander Maassen
www.pool.ntp.org

 Oorspronkelijk bericht 
Van: Notify Me notify.s...@gmail.com 
Datum:  
Aan: nanog@nanog.org list nanog@nanog.org,af...@afnog.org 
Onderwerp: Need trusted NTP Sources 
 
Hi !

I'm trying to help a company I work for to pass an audit, and we've
been told we need trusted NTP sources (RedHat doesn't cut it). Being
located in Nigeria, Africa, I'm not very knowledgeable about trusted
sources therein.

Please can anyone help with sources that wouldn't mind letting us sync
from them?

Thanks a lot!



Re: Need trusted NTP Sources

2014-02-06 Thread Nick Hilliard
On 06/02/2014 10:03, Notify Me wrote:
 I'm trying to help a company I work for to pass an audit, and we've
 been told we need trusted NTP sources (RedHat doesn't cut it).

So presuming that your company is using RH or Fedora or CentOS something,
the auditors are claiming that Red Hat, Inc is trusted enough to provide a
precompiled based operating system with no feasible means of proving its
reliability, but that they're not trustworthy enough to provide a clock
synchronisation service?

My head spins.

Get new auditors.  Your current ones are stupid.

Nick




Re: SIP on FTTH systems

2014-02-06 Thread Mark Tinka
On Thursday, February 06, 2014 11:56:45 AM 
cdel.firsthand.net wrote:

 Time for users to consider splitting L2 services from IP
 ?

But consumer broadband is all about IP; the Layer 2 is 
needed to transport that IP, and that's a network problem, 
not a user one.

Mark.


signature.asc
Description: This is a digitally signed message part.


Re: Need trusted NTP Sources

2014-02-06 Thread Notify Me
We're a redhat shop, and we  use redhat auth which by default uses redhat
NTP sources. Sounds odd to me too. They claim this is what PCI DSS demands.
On Feb 6, 2014 11:43 AM, Nick Hilliard n...@foobar.org wrote:

 On 06/02/2014 10:03, Notify Me wrote:
  I'm trying to help a company I work for to pass an audit, and we've
  been told we need trusted NTP sources (RedHat doesn't cut it).

 So presuming that your company is using RH or Fedora or CentOS something,
 the auditors are claiming that Red Hat, Inc is trusted enough to provide a
 precompiled based operating system with no feasible means of proving its
 reliability, but that they're not trustworthy enough to provide a clock
 synchronisation service?

 My head spins.

 Get new auditors.  Your current ones are stupid.

 Nick




Re: Need trusted NTP Sources

2014-02-06 Thread Notify Me
According to the auditors, trusted means

1. Universities or Research facilities (nuclear/atomic facilities,
space research (such as NASA) etc.)
2. Main country internet/telecom providers
3. Government departments
4. Satellites (using GPS module)

Which is a bit of a tall order over here.

On Thu, Feb 6, 2014 at 11:16 AM, Marc Storck msto...@voipgate.com wrote:
 You may start by checking who is providing NTP services in Africa via the NTP 
 pool. In Africa there are 27 public servers 
 (http://www.pool.ntp.org/zone/africa).

 But then all depends on your definition of trusted.

 Regards,

 Marc
 
 From: Notify Me [notify.s...@gmail.com]
 Sent: Thursday, February 06, 2014 11:03
 To: nanog@nanog.org list; af...@afnog.org
 Subject: Need trusted NTP Sources

 Hi !

 I'm trying to help a company I work for to pass an audit, and we've
 been told we need trusted NTP sources (RedHat doesn't cut it). Being
 located in Nigeria, Africa, I'm not very knowledgeable about trusted
 sources therein.

 Please can anyone help with sources that wouldn't mind letting us sync
 from them?

 Thanks a lot!




Re: Need trusted NTP Sources

2014-02-06 Thread Nick Hilliard
On 06/02/2014 11:46, Notify Me wrote:
 We're a redhat shop, and we  use redhat auth which by default uses redhat
 NTP sources. Sounds odd to me too. They claim this is what PCI DSS demands.

PCI DSS states:

 10.4.3 Time settings are received from industry-accepted time sources.

The default RHEL time servers are defined as X.rhel.ntp.org.  Many people
would consider ntp.org as industry-accepted, and there are several PCI-DSS
auditing companies out there who explicitly recommend using pool.ntp.org
for this purpose.

If that's not good enough, the PCI DSS standards explicitly state in the
NTP interpretation section:

 More information on NTP can be found at www.ntp.org, including
 information about time, time standards, and servers.

So, if PCI themselves view ntp.org as being authoritative about NTP I can't
see any reason why the time servers they publish wouldn't pass an audit.

Nick





Re: Need trusted NTP Sources

2014-02-06 Thread Aled Morris
GPS time sources are pretty cheap ( US$500) and easy to set up nowadays.

You could probably build your own for less that US$100:
http://www.satsignal.eu/ntp/Raspberry-Pi-NTP.html

Aled


On 6 February 2014 11:51, Notify Me notify.s...@gmail.com wrote:

 According to the auditors, trusted means

 1. Universities or Research facilities (nuclear/atomic facilities,
 space research (such as NASA) etc.)
 2. Main country internet/telecom providers
 3. Government departments
 4. Satellites (using GPS module)

 Which is a bit of a tall order over here.

 On Thu, Feb 6, 2014 at 11:16 AM, Marc Storck msto...@voipgate.com wrote:
  You may start by checking who is providing NTP services in Africa via
 the NTP pool. In Africa there are 27 public servers (
 http://www.pool.ntp.org/zone/africa).
 
  But then all depends on your definition of trusted.
 
  Regards,
 
  Marc
  
  From: Notify Me [notify.s...@gmail.com]
  Sent: Thursday, February 06, 2014 11:03
  To: nanog@nanog.org list; af...@afnog.org
  Subject: Need trusted NTP Sources
 
  Hi !
 
  I'm trying to help a company I work for to pass an audit, and we've
  been told we need trusted NTP sources (RedHat doesn't cut it). Being
  located in Nigeria, Africa, I'm not very knowledgeable about trusted
  sources therein.
 
  Please can anyone help with sources that wouldn't mind letting us sync
  from them?
 
  Thanks a lot!
 




Re: SIP on FTTH systems

2014-02-06 Thread Mikael Abrahamsson

On Thu, 6 Feb 2014, Mark Tinka wrote:


There are, typically, three topology models for modern FTTH
(wireline, really) networks that a service provider could
deploy:

1. SVLAN N:1 model
2. CVLAN 1:1 model
3. Hybrid of both


There are more. There are models where each ISP gets its own customer vlan 
and L2 equipment do inspection of ARP/ND and does security filtering on 
L2/L3 using this information. There are also L3 networks where the traffic 
is source-routed out to the correct ISP, or each ISP gets its own VRF in 
the equipment and it's VRF a long way out.


To the original poster. People using PPPoE for FTTH makes me sad. When 
someone suggests this, please just say go back to the drawingboard, redo 
it right.


--
Mikael Abrahamssonemail: swm...@swm.pp.se



Re: SIP on FTTH systems

2014-02-06 Thread Mark Tinka
On Thursday, February 06, 2014 02:15:57 PM Mikael 
Abrahamsson wrote:

 There are more. There are models where each ISP gets its
 own customer vlan and L2 equipment do inspection of
 ARP/ND and does security filtering on L2/L3 using this
 information. There are also L3 networks where the
 traffic is source-routed out to the correct ISP, or each
 ISP gets its own VRF in the equipment and it's VRF a
 long way out.

Agree.

The models I listed are typical to an operator that runs its 
own infrastructure (including the FTTH last mile), and does 
not necessarily wholesale out to other operators.

I've seen certain countries that have given the incumbents 
leeway to wholesale at the IP level, which the incumbent 
likes because they perceive more control than if they had 
to hand-off Layer 2 wholesale. In such cases, VRF's and/or 
logical routers have been deployed.

 To the original poster. People using PPPoE for FTTH makes
 me sad. When someone suggests this, please just say go
 back to the drawingboard, redo it right.

Agree. DHCP really is the way to go, now. Plus, there is 
good support for IPv6 with vendors today re: DHCP-based 
subscriber management.

Mark.


signature.asc
Description: This is a digitally signed message part.


Re: SIP on FTTH systems

2014-02-06 Thread Mikael Abrahamsson

On Thu, 6 Feb 2014, Mark Tinka wrote:

The models I listed are typical to an operator that runs its own 
infrastructure (including the FTTH last mile), and does not necessarily 
wholesale out to other operators.


I disagree on that one as well. It might be in some markets, but it's not 
in all.


I've seen certain countries that have given the incumbents leeway to 
wholesale at the IP level, which the incumbent likes because they 
perceive more control than if they had to hand-off Layer 2 wholesale. 
In such cases, VRF's and/or logical routers have been deployed.


This wasn't incumbents specifically, but just a different model to achieve 
the same thing, give end users access to multiple ISPs, multiple cable 
TV vendors, and multiple VOIP providers through a neutral network.


Agree. DHCP really is the way to go, now. Plus, there is good support 
for IPv6 with vendors today re: DHCP-based subscriber management.


What do you mean by subscriber management? This worked 10 years ago, what 
problem are you saying has been solved recently?


--
Mikael Abrahamssonemail: swm...@swm.pp.se



RE: Need trusted NTP Sources

2014-02-06 Thread Martin Hotze
 I'm trying to help a company I work for to pass an audit, and we've
 been told we need trusted NTP sources (RedHat doesn't cut it). Being
 located in Nigeria, Africa, I'm not very knowledgeable about trusted
 sources therein.
 
 Please can anyone help with sources that wouldn't mind letting us sync
 from them?

given that you trust the US-government (well, ...) you might use your own 
stratum 1 server using a Raspberry Pi with GPS.

here is a well done how-to:
http://open.konspyre.org/blog/2012/10/18/raspberry-pi-time-server/

I still need some spare time to get it running, all parts are here, but within 
my office location I have a bad GPS signal reception, so I have to do it at 
home.

So build your own stratum 1 server (maybe a second one with DCF77 or whatever 
you can use for redundancy), off from these servers build 2 or more stratum 2 
timeservers for redistribution to offload your stratum 1 servers.

http://clepsydratime.com/Products/Time-Server-NTS3000 is a cool alternative. 
They are located in Poland, IIRC. And this box sells for less than 2,000 euros 
(this price is 2 years old). And it gives you GPS (USA), Glonass (Russia) and 
DCF77 (land based).

One of the best Timeservers are sold by meinberg.de

just my 2 euro-cents.

#m




Re: Need trusted NTP Sources

2014-02-06 Thread Aled Morris
On 6 February 2014 12:30, Martin Hotze m.ho...@hotze.com wrote:

  I'm trying to help a company I work for to pass an audit, and we've
  been told we need trusted NTP sources (RedHat doesn't cut it). Being
  located in Nigeria, Africa,

 [...]

 So build your own stratum 1 server (maybe a second one with DCF77 or
 whatever you can use for redundancy),


I don't think DCF77 is going to reach Nigeria.

Aled


Re: SIP on FTTH systems

2014-02-06 Thread Mark Tinka
On Thursday, February 06, 2014 02:29:40 PM Mikael 
Abrahamsson wrote:

 I disagree on that one as well. It might be in some
 markets, but it's not in all.

I keep using the word typical, but not sure if you're 
missing it.

Typical, not limited to, i.e., common, but not the only 
option.

I'm basing this on what I've seen in various countries 
across a few continents I've worked in.

 This wasn't incumbents specifically, but just a different
 model to achieve the same thing, give end users access
 to multiple ISPs, multiple cable TV vendors, and
 multiple VOIP providers through a neutral network.

Again, just an example I gave, not to say it was the norm.

The countries I was referring to is where the incumbents 
either owned the infrastructure and were reluctant to open 
it up to competitors, or were awarded national broadband 
projects to deploy and run the infrastructure but were not 
specifically governed to how low the OSI Layer they can open 
up the infrastructure to.

In other places, it is a business model, in addition to more 
traditional ways of unbundling. These tend to be more 
evolved markets, but again, not limited to.

 What do you mean by subscriber management? This worked 10
 years ago, what problem are you saying has been solved
 recently?

End user authentication and management typically being done 
via PPPoE because that was the best and most secure way to 
manage customer connections (for some operators, still is).

By DHCP I mean an alternative to PPPoE-based authentication 
where Option 82 and friends can allow service providers to 
authenticate customers based on AN port, MAC address, VLAN 
ID, e.t.c., instead of username/password a la PPPoE. This 
gets passed as part of initial DHCP transactions.

Rethinking your comment (because I thought you meant DHCP as 
the way to go for subscriber management when you debunked 
PPPoE) I'm guessing you refer to simply assigning IP 
addresses to customer interfaces in FTTH scenarios? No?

Mark.


signature.asc
Description: This is a digitally signed message part.


Re: Need trusted NTP Sources

2014-02-06 Thread Nick Hilliard
On 06/02/2014 12:30, Martin Hotze wrote:
 here is a well done how-to:
 http://open.konspyre.org/blog/2012/10/18/raspberry-pi-time-server/

The OP had a question about standards compliance, not about something that
made technical sense and would deliver a superior service.  The two things
aren't incompatible, but they're not especially closely related either.

Nick




Re: Need trusted NTP Sources

2014-02-06 Thread Notify Me
Raspberries! Not common currency here either, but let's see!
grateful for all the input and responses, this list is amazing as usual.

On Thu, Feb 6, 2014 at 1:41 PM, Aled Morris al...@qix.co.uk wrote:
 On 6 February 2014 12:30, Martin Hotze m.ho...@hotze.com wrote:

  I'm trying to help a company I work for to pass an audit, and we've
  been told we need trusted NTP sources (RedHat doesn't cut it). Being
  located in Nigeria, Africa,

  [...]

 So build your own stratum 1 server (maybe a second one with DCF77 or
 whatever you can use for redundancy),


 I don't think DCF77 is going to reach Nigeria.

 Aled



Re: SIP on FTTH systems

2014-02-06 Thread Mikael Abrahamsson

On Thu, 6 Feb 2014, Mark Tinka wrote:

End user authentication and management typically being done via PPPoE 
because that was the best and most secure way to manage customer 
connections (for some operators, still is).


Why do you need to authenticate the customer? Don't your documentation 
system know the port/subscriber mapping? And why is this secure, instead 
of being tied to a physical connection the customer can now take the 
credentials and move? If the credentials are stolen, someone else can 
impersonate that customer.


By DHCP I mean an alternative to PPPoE-based authentication where Option 
82 and friends can allow service providers to authenticate customers 
based on AN port, MAC address, VLAN ID, e.t.c., instead of 
username/password a la PPPoE. This gets passed as part of initial DHCP 
transactions.


This worked 10 years ago, it's nothing recent.

Rethinking your comment (because I thought you meant DHCP as the way to 
go for subscriber management when you debunked PPPoE) I'm guessing you 
refer to simply assigning IP addresses to customer interfaces in FTTH 
scenarios? No?


Yes? Since option 82 and friends gives you what port the DHCP request came 
in on, you now log IP/MAC connected to a port, and since you know to what 
apartment/house this port is physically connected to, nothing more is 
needed.


--
Mikael Abrahamssonemail: swm...@swm.pp.se



Re: BCP38 [Was: Re: TWC (AS11351) blocking all NTP?]

2014-02-06 Thread jamie rishaw
Don't fight it.

It's clear that implementation on a per-packet basis of RFC4824 (datagrams
over Semaphore Flag Signaling System) would have prevented this entire
situation.

Refer to sections 3.3 and 3.4.

-j

On Mon, Feb 3, 2014 at 12:23 PM, Paul Ferguson fergdawgs...@mykolab.com
wrote:


 On 2/2/2014 2:17 PM, Cb B wrote:

  And, i agree bcp38 would help but that was published 14 years ago.

 But what? Are you somehow implying that because BCP38 was
 ...published 14 years ago (RFC2267 was initially published in 1998,
 and it was subsequently replaced by RFC2827)?


Re: SIP on FTTH systems

2014-02-06 Thread Mark Tinka
On Thursday, February 06, 2014 02:58:14 PM Mikael 
Abrahamsson wrote:

 Why do you need to authenticate the customer? Don't your
 documentation system know the port/subscriber mapping?
 And why is this secure, instead of being tied to a
 physical connection the customer can now take the
 credentials and move? If the credentials are stolen,
 someone else can impersonate that customer.

Which is why I said DHCP was better than PPPoE.

Failing to see where we disagree.

 This worked 10 years ago, it's nothing recent.

In my previous post, I didn't say it was recent. I said it 
was better than PPPoE if you're deploying FTTH now. What I 
said was recent was that DHCP_IA and DHCP_IA_PD 
implementation has improved significantly both in BNG's as 
well as CPE.

Again, failing to see where we disagree.

 Yes? Since option 82 and friends gives you what port the
 DHCP request came in on, you now log IP/MAC connected to
 a port, and since you know to what apartment/house this
 port is physically connected to, nothing more is needed.

Again, don't see where we disagree.

This is a good thing.

Some operators provide services with no subscriber 
management (i.e., no PPPoE, no DHCP; just a static IP 
address documented about where it is, what street, what 
building, what floor, what apartment, what customer), while 
other service providers have a subscriber management 
technique, PPPoE or DHCP, to log all the same information in 
concert with the backend.

I'm just saying DHCP is better than PPPoE if you're 
greenfielding FTTH deployments today, and I'm not sure you 
entirely disagree.

Mark.


signature.asc
Description: This is a digitally signed message part.


Re: SIP on FTTH systems

2014-02-06 Thread Mikael Abrahamsson

On Thu, 6 Feb 2014, Mark Tinka wrote:

I'm just saying DHCP is better than PPPoE if you're greenfielding FTTH 
deployments today, and I'm not sure you entirely disagree.


We're in violent agreement it seems. My only beef was that it seemed like 
you were implying this was something new.


--
Mikael Abrahamssonemail: swm...@swm.pp.se



Re: SIP on FTTH systems

2014-02-06 Thread Anders Löwinger

On 2014-02-06 09:01, Mark Tinka wrote:


1. SVLAN N:1 model

The SVLAN (N:1) model is simple; just have a single VLAN for
each service (VLAN 10 for Internet/Unicast, VLAN 20 for
VoIP, VLAN 30 for IPTv/Multicast).


This is a deep hole, and basically does not work with IPv6.

You need a bunch of stuff, proxy ND, proxy DAD, DHCPv6 inspection, RA guard 
and more. One VLAN per customer and a separate multicast is much simpler.


Or do something bold, run L3 at the edge :)

/Anders



Re: SIP on FTTH systems

2014-02-06 Thread Mark Tinka
On Thursday, February 06, 2014 03:46:54 PM Mikael 
Abrahamsson wrote:

 We're in violent agreement it seems.

Tend to agree.

 My only beef was
 that it seemed like you were implying this was something
 new.

In most of my travels, there is a healthy amount of 
resistance toward DHCP from new (but mostly, existing) 
broadband service providers when choosing between DHCP and 
PPPoE for Unicast traffic. And the reasons for this vary - 
we saw the OP is PPPoE-biased, for example.

It is better in 2014 than it was in 2011 in those places, 
but by and large, DHCP adoption for subscriber management is 
not moving as quickly as one would think, especially when 
you consider all the FTTH work going on around the world.

Mark.


signature.asc
Description: This is a digitally signed message part.


Re: SIP on FTTH systems

2014-02-06 Thread Mark Tinka
On Thursday, February 06, 2014 03:51:51 PM Anders Löwinger 
wrote:

 This is a deep hole, and basically does not work with
 IPv6.
 
 You need a bunch of stuff, proxy ND, proxy DAD, DHCPv6
 inspection, RA guard and more. One VLAN per customer and
 a separate multicast is much simpler.

If you have a reasonably intelligent AN (like some of 
today's Active-E devices), you can create so-called split 
horizons on the same bridge domain (VLAN, really) where 
customers will only communicate via the upstream BNG at 
Layer 3.

At Layer 2, even though they are all sitting on the same 
VLAN, there is no inter-communication between them.

I've also know Huawei OLT's support these split horizons 
too.

 Or do something bold, run L3 at the edge :)

BNG's are too big to distributed that deeply, even in 
distributed BNG designs. This would get costly.

Cheap switches that have decent IP/MPLS support are mostly 
geared toward Metro-E deployments, i.e., business-grade 
services. So they are quite poor with regard to susbcriber 
management features and capabilities.

Mark.


signature.asc
Description: This is a digitally signed message part.


Re: SIP on FTTH systems

2014-02-06 Thread Mikael Abrahamsson

On Thu, 6 Feb 2014, Mark Tinka wrote:


Or do something bold, run L3 at the edge :)


BNG's are too big to distributed that deeply, even in
distributed BNG designs. This would get costly.


You don't need a BNG. You need an L3 switch as the first hop the customer 
is talking to.


Cheap switches that have decent IP/MPLS support are mostly geared toward 
Metro-E deployments, i.e., business-grade services. So they are quite 
poor with regard to susbcriber management features and capabilities.


If you have L3-in-vlan-per-customer at the first hop then you don't really 
need all of that. If you include rudimentary VRF support then you can even 
support wholesale. /64 per customer, DHCPv6(-PD) server support in the L3 
switch and you're good to go. There is equipment that already claim to do 
this (I never got to test their implementation based on my requirements 
because I switched jobs, but they claimed to have implemented everything 
last year).


--
Mikael Abrahamssonemail: swm...@swm.pp.se



Re: Need trusted NTP Sources

2014-02-06 Thread jamie rishaw
PCI DSS only requires that all clocks be synchronized; It doesn't
/require/ how.

If you have servers getting time from external sources (authenticated
always a plus) and peering with each other internally, then you comply
with PCI DSS 2.0 (3.0 has no changes to this that I'm aware of).

OTOH, I'm surprised nobody has mentioned
http://www.team-cymru.org/ReadingRoom/Templates/secure-ntp-template.html

-j

On Thu, Feb 6, 2014 at 6:53 AM, Notify Me notify.s...@gmail.com wrote:
 Raspberries! Not common currency here either, but let's see!
 grateful for all the input and responses, this list is amazing as usual.

 On Thu, Feb 6, 2014 at 1:41 PM, Aled Morris al...@qix.co.uk wrote:
 On 6 February 2014 12:30, Martin Hotze m.ho...@hotze.com wrote:

  I'm trying to help a company I work for to pass an audit, and we've
  been told we need trusted NTP sources (RedHat doesn't cut it). Being
  located in Nigeria, Africa,

  [...]

 So build your own stratum 1 server (maybe a second one with DCF77 or
 whatever you can use for redundancy),


 I don't think DCF77 is going to reach Nigeria.

 Aled




-- 
jamie rishaw // .com.arpa@j - reverse it. ish.

Reality defeats prejudice. - Rep. Barney Frank



Re: Need trusted NTP Sources

2014-02-06 Thread Chris Adams
Once upon a time, Nick Hilliard n...@foobar.org said:
 So presuming that your company is using RH or Fedora or CentOS something,
 the auditors are claiming that Red Hat, Inc is trusted enough to provide a
 precompiled based operating system with no feasible means of proving its
 reliability, but that they're not trustworthy enough to provide a clock
 synchronisation service?

Red Hat does not provide an NTP service themselves.  The default NTP
config on a Red Hat Enterprise Linux system uses rhel.pool.ntp.org.

I suppose some auditor could dislike the openness of pool.ntp.org
(basically anybody can join).  If that is the case, your best bet is to
do some combination of the following:

- As others have suggested, set up your own stratum-1 clock (can be done
  for around $100).  Ideally you'd set up more than one.

- Set up several servers with a static set of NTP servers rather than
  the general pool servers.  See the lists on www.pool.ntp.org; look
  under the docs for setting up a server to join the pool.  You don't
  have to actually join the pool, but following those docs is a good way
  to set up a stable server.

After that, point the rest of your servers at your master servers,
rather than the public pool.

-- 
Chris Adams c...@cmadams.net



Re: SIP on FTTH systems

2014-02-06 Thread Mark Tinka
On Thursday, February 06, 2014 04:17:42 PM Mikael 
Abrahamsson wrote:

 You don't need a BNG. You need an L3 switch as the first
 hop the customer is talking to.

Fine for FTTB, but not for FTTH where you're serving tens-
to-hundreds-of-thousands of customers.

If your FTTH deployments are low scale (measure of low or 
large scale depends on each operator's point of view), the 
case for doing without subscriber management technologies 
can be made.

 If you have L3-in-vlan-per-customer at the first hop then
 you don't really need all of that. If you include
 rudimentary VRF support then you can even support
 wholesale. /64 per customer, DHCPv6(-PD) server support
 in the L3 switch and you're good to go.

I'm curious; in these deployments, what kind of customer 
scale are you talking about? When someone says FTTH, I'm 
thinking thousands and thousands of customers, in which case 
not having a scalable susbcriber management system as well 
as not having a scalable customer termination topology could 
be difficult. Unless I misunderstand...

 There is
 equipment that already claim to do this (I never got to
 test their implementation based on my requirements
 because I switched jobs, but they claimed to have
 implemented everything last year).

Modern Metro-E switches that support full IP/MPLS in the 
Access have a lot of good IPv4 and IPv6 features, including 
DHCP_IA and DHCP_IA_PD, but again, these are more FTTB- than 
FTTH-focused, if you're talking about scale.

Cheers,

Mark.


signature.asc
Description: This is a digitally signed message part.


Re: SIP on FTTH systems

2014-02-06 Thread Mikael Abrahamsson

On Thu, 6 Feb 2014, Mark Tinka wrote:


On Thursday, February 06, 2014 04:17:42 PM Mikael
Abrahamsson wrote:


You don't need a BNG. You need an L3 switch as the first
hop the customer is talking to.


Fine for FTTB, but not for FTTH where you're serving tens-
to-hundreds-of-thousands of customers.


Why?

If your FTTH deployments are low scale (measure of low or large scale 
depends on each operator's point of view), the case for doing without 
subscriber management technologies can be made.


Why is it different?

I'm curious; in these deployments, what kind of customer scale are you 
talking about? When someone says FTTH, I'm thinking thousands and 
thousands of customers, in which case not having a scalable susbcriber 
management system as well as not having a scalable customer termination 
topology could be difficult. Unless I misunderstand...


Yes, this is for hundreds of thousands of customers. Why do you need 
customer management? You document where a certain fiber goes to (what 
port), and then this port goes to a certain customer. That is the only 
customer management you need.


So you provision your L3 switch with a protocol based 0x86dd vlan per 
port, put a static /64 L3 subinterface into this vlan, then you have a 
built in DHCPv6(-PD) server in the same switch that hands out a static /56 
on this vlan, plus hands out DNS-resolver etc. No dynamics, just static. 
You provision ACLs to only allow the /56, /64 and LL in on the L3 
interface. You set ND cache max size to 20-50 entries per L3 subinterface 
to protect the 1024-2048 entries or whatever the L3 switch can handle. For 
IPv4 you need to do all the L2/L3-inspection magic in a common vlan.


This is now a standalone unit and you don't need any central system to 
stay up and running in order to move IPv6 packets, and you support both 
directly attached computer or a residential gateway that wants PD.


I did this type of DSL deplayment early 2000nds with an L3 switch and an 
ethernet DSLAM as media converter. This was obviously IPv4 only, but 
worked very well. At the same time the guys with central DHCP systems had 
a lot of country wide outages when the DHCP system went belly-up.


I only a few years later learnt what an LNS was when I talked to someone 
else who did more of a follow-the-whitepaper deployment of DSL.


Modern Metro-E switches that support full IP/MPLS in the Access have a 
lot of good IPv4 and IPv6 features, including DHCP_IA and DHCP_IA_PD, 
but again, these are more FTTB- than FTTH-focused, if you're talking 
about scale.


I would never want to have MPLS that far out into the network.

--
Mikael Abrahamssonemail: swm...@swm.pp.se



Re: Need trusted NTP Sources

2014-02-06 Thread Larry Sheldon



It has been a while since I have done anything with NTP, but I would start
with ntp.org (which didn't exist when I WAS working with it) which I am led
to believe has the stuff that used to be at U. Delaware, like the public
servers lists:

http://support.ntp.org/bin/view/Servers/WebHome


Where I found http://support.ntp.org/bin/view/Servers/PublicTimeServer79
--
Requiescas in pace o email   Two identifying characteristics
of System Administrators:
Ex turpi causa non oritur actio  Infallibility, and the ability to
learn from their mistakes.
  (Adapted from Stephen Pinker)



Re: Need trusted NTP Sources

2014-02-06 Thread Larry Sheldon
After all these years I still can not get used to the non-standard NANOG 
response to reply.  I wonder if there is a way for ne to fix that locally.


On 2/6/2014 8:49 AM, Larry Sheldon wrote:

On 2/6/2014 4:43 AM, Nick Hilliard wrote:

On 06/02/2014 10:03, Notify Me wrote:

I'm trying to help a company I work for to pass an audit, and we've
been told we need trusted NTP sources (RedHat doesn't cut it).


So presuming that your company is using RH or Fedora or CentOS something,
the auditors are claiming that Red Hat, Inc is trusted enough to
provide a
precompiled based operating system with no feasible means of proving its
reliability, but that they're not trustworthy enough to provide a clock
synchronisation service?

My head spins.

Get new auditors.  Your current ones are stupid.


It has been a while since I have done anything with NTP, but I would
start with ntp.org (which didn't exist when I WAS working with it) which
I am led to believe has the stuff that used to be at U. Delaware, like
the public servers lists:

http://support.ntp.org/bin/view/Servers/WebHome





--
Requiescas in pace o email   Two identifying characteristics
of System Administrators:
Ex turpi causa non oritur actio  Infallibility, and the ability to
learn from their mistakes.
  (Adapted from Stephen Pinker)



Re: Need trusted NTP Sources

2014-02-06 Thread Larry Sheldon

On 2/6/2014 9:02 AM, Nick Hilliard wrote:

On 06/02/2014 14:57, Larry Sheldon wrote:

http://support.ntp.org/bin/view/Servers/PublicTimeServer79


bear in mind that due to the vagaries of african peering weirdness, the
actual path from there to the OP's network could be over multiple satellite
links and peered in Asia, Europe or the US.  The Internet in africa can be
... odd.


If it was me (having made a living getting with auditors who had no idea 
what they were doing) I would look for some close-by reliable (my 
judgement) 1- and 2- level sources (including, usually) the router at 
the ISP that I talk-to to get good service then add one or two the 
auditor likes.


Larry (long time responder-to-audits that demanded that my UNIVAC and HP 
hardware and software look like IBM)



--
Requiescas in pace o email   Two identifying characteristics
of System Administrators:
Ex turpi causa non oritur actio  Infallibility, and the ability to
learn from their mistakes.
  (Adapted from Stephen Pinker)



carrier comparison

2014-02-06 Thread Adam Greene
Hi,

 

We're a small ISP / datacenter with a Time Warner fiber-based DIA contract
that is coming up for renewal. 

 

We're getting much better pricing offers from Cogent, and are finding out
what Level 3 can do for us as well. Both providers will use Time Warner
fiber for last mile.

 

My questions are:

-  Will we be sacrificing quality if we spring for Cogent?
(yesterday's Cogent/Verizon thread provided some cold chills for my spine)

-  Is there a risk with contracting a carrier that utilizes another
carrier (such as Time Warner) for the last mile? (i.e. if there is a
downtime situation, are we going to be caught in a web of confusion and
finger-pointing that delays problem resolution)?

-  How are peoples' experiences with L3 vs TWC?

 

Although I assume everyone on the list would be interested in what others
have to say about these questions, out of respect for the carriers in
question, I encourage you to email frank opinions off list. 

 

Or if there are third party tools or resources you know that I could consult
to deduce the answers to these questions myself, they are most welcome. 

 

Thanks,

Adam



Re: Need trusted NTP Sources

2014-02-06 Thread Michael DeMan
Hi Alexander,

I think you or your consultant may have an overly strict reading of the PCI 
documents.
Looking at section 10.4 of PCI DSS 3.0, and from having gone through PCI a few 
times...
If you have your PCI hosts directly going against ntp.org or similar, then you 
are not in compliance.

My understanding is that you need to:

A) Run a local set of NTP servers - these are your 'trusted' servers, under 
your control, properly managed/secured, fully meshed, etc.
These in turn (section 10.4.3) can get their time from 'industry-accepted time 
sources'.

B) The rest of your PCI infrastructure in turn uses these NTP servers and only 
these NTP servers.

- Michael DeMan

On Feb 6, 2014, at 2:27 AM, Alexander Maassen outsi...@scarynet.org wrote:

 www.pool.ntp.org
 
  Oorspronkelijk bericht 
 Van: Notify Me notify.s...@gmail.com 
 Datum:  
 Aan: nanog@nanog.org list nanog@nanog.org,af...@afnog.org 
 Onderwerp: Need trusted NTP Sources 
 
 Hi !
 
 I'm trying to help a company I work for to pass an audit, and we've
 been told we need trusted NTP sources (RedHat doesn't cut it). Being
 located in Nigeria, Africa, I'm not very knowledgeable about trusted
 sources therein.
 
 Please can anyone help with sources that wouldn't mind letting us sync
 from them?
 
 Thanks a lot!
 



Re: SIP on FTTH systems

2014-02-06 Thread Mark Tinka
On Thursday, February 06, 2014 04:56:15 PM Mikael 
Abrahamsson wrote:

 Yes, this is for hundreds of thousands of customers. Why
 do you need customer management? You document where a
 certain fiber goes to (what port), and then this port
 goes to a certain customer. That is the only customer
 management you need.
 
 So you provision your L3 switch with a protocol based
 0x86dd vlan per port, put a static /64 L3 subinterface
 into this vlan, then you have a built in DHCPv6(-PD)
 server in the same switch that hands out a static /56 on
 this vlan, plus hands out DNS-resolver etc. No dynamics,
 just static. You provision ACLs to only allow the /56,
 /64 and LL in on the L3 interface. You set ND cache max
 size to 20-50 entries per L3 subinterface to protect the
 1024-2048 entries or whatever the L3 switch can handle.
 For IPv4 you need to do all the L2/L3-inspection magic
 in a common vlan.

 This is now a standalone unit and you don't need any
 central system to stay up and running in order to move
 IPv6 packets, and you support both directly attached
 computer or a residential gateway that wants PD.

I won't lie, it is impressive that you strung the network 
this way. I can certainly see how it would work, although 
I'm not sure how well it would scale if you're diddling 
about with all sorts of kinky services beyond just access to 
the Internet (certinaly a concern for me, anyway).

At previous job, we looked at various topologies and 
deployment techniques for how to support large scale FTTH 
installations, and one of the key issues is impact on the 
control plane for locally-ran DHCP servers on the routers, 
particularly when the same router is providing business 
services as well. Some vendors have seen the light and are 
finally running x86-based multi-core 64-bit CPU's for 
control plane processing, and while this may help, CPU 
horsepower is finite (although it would, most certainly, 
scale better than a Layer 3 switch doing the same thing).

When you start to add services like Multicast for IPTv, and 
depending on whether you run these switches in a ring or 
not, and whether you're running Rosen MVPN vs. NG-MVPN, you 
can quickly start to hit platform limits or feature 
constraints.

 I did this type of DSL deplayment early 2000nds with an
 L3 switch and an ethernet DSLAM as media converter. This
 was obviously IPv4 only, but worked very well. At the
 same time the guys with central DHCP systems had a lot
 of country wide outages when the DHCP system went
 belly-up.

I don't believe in centralized BNG's; mostly because traffic 
forwarding is not optimal. That and it's too much trust in 
one device.

I prefer distributed BNG's (much like the topology you 
describe, only just less your deployment in number given how 
much you can scale a single Layer 3 switch to act as a 
service termination device). Along with distributed BNG's, 
you can also distribute DHCP servers, and multiple DHCP 
servers can maintain lease state amongst each other to allow 
for failover in case the primary DHCP server breaks. This is 
a known design tactic, and helps to take away from the 
issues of centralized architectures.

 I would never want to have MPLS that far out into the
 network.

This is a different topic, but what we did was deploy MPLS 
all the way into the Metro-E access using Cisco's ME3600X 
because there had simply been to much pain doing legacy 
Layer 2-based Metro-E solutions (stringing VLAN's together 
between end points, keeping hands away from VTP, e.t.c.). 
This was in 2010, and by then, there wasn't any decent 
devices cheap enough with sufficient features to make this 
possible.

I'd certainly recommend this architecture for Metro-E 
deployments focused on business-grade services. I don't 
expect most to follow it given there is a large Layer 2-
based Metro-E installed base, but I think it will grow with 
time.

Mark.


signature.asc
Description: This is a digitally signed message part.


Re: carrier comparison

2014-02-06 Thread Vlade Ristevski
We have had Cogent over Verizon's Fiber for more than a few years now. 
Cogent goes down once at year at minimum. They had 2 outages in a single 
day a couple days ago in Northern NJ.  One in the AM ..caused by a 
power outage in a vendor data center where Cogent is collocated. They 
went on to have another outage at around 9:30 PM on the same day for 
which I'm still waiting for an RFO. During this outage, they still were 
advertising our BGP routes so we didn't fail over to our 2nd provider. I 
notice that happens alot with them. When they go down, they still 
advertise your routes.


As far as price goes, for us Cogent is cheap but Lightpath is cheaper.

Our college is kind of far from things so we don't have a lot of outside 
fiber coming. The last mile fiber for both of our connections are 
different from our Internet providers. I've never had a big issue with 
the two working with each other. The only issue we had is I suspected we 
weren't getting as much bandwidth as we paid for. They had to work out 
where the policer and/or bottle neck was. This is the only issue we had 
in 5 years with this set up and it got resolved. IME, when there is a 
full outage, it's always been clear who the responsible party is.






On 2/6/2014 10:17 AM, Adam Greene wrote:

Hi,

  


We're a small ISP / datacenter with a Time Warner fiber-based DIA contract
that is coming up for renewal.

  


We're getting much better pricing offers from Cogent, and are finding out
what Level 3 can do for us as well. Both providers will use Time Warner
fiber for last mile.

  


My questions are:

-  Will we be sacrificing quality if we spring for Cogent?
(yesterday's Cogent/Verizon thread provided some cold chills for my spine)

-  Is there a risk with contracting a carrier that utilizes another
carrier (such as Time Warner) for the last mile? (i.e. if there is a
downtime situation, are we going to be caught in a web of confusion and
finger-pointing that delays problem resolution)?

-  How are peoples' experiences with L3 vs TWC?

  


Although I assume everyone on the list would be interested in what others
have to say about these questions, out of respect for the carriers in
question, I encourage you to email frank opinions off list.

  


Or if there are third party tools or resources you know that I could consult
to deduce the answers to these questions myself, they are most welcome.

  


Thanks,

Adam





Re: carrier comparison

2014-02-06 Thread Joshua Goldbard
Cogent always has the cheapest rates but they also have the most peering 
disputes of any operator. I've seen intra-data center hops between cogent and 
Verizon take over 150ms.

As with all things Internet, your mileage may vary. I would not put something 
with a 5 9'a uptime requirement on cogent without a failover circuit. For less 
sensitive applications it seems like a win.

The Internet is both incredibly robust and fragile simultaneously.

Cheers,
Joshua

Sent from my iPhone

On Feb 6, 2014, at 8:06 AM, Vlade Ristevski vrist...@ramapo.edu wrote:

 We have had Cogent over Verizon's Fiber for more than a few years now. Cogent 
 goes down once at year at minimum. They had 2 outages in a single day a 
 couple days ago in Northern NJ.  One in the AM ..caused by a power outage in 
 a vendor data center where Cogent is collocated. They went on to have 
 another outage at around 9:30 PM on the same day for which I'm still waiting 
 for an RFO. During this outage, they still were advertising our BGP routes so 
 we didn't fail over to our 2nd provider. I notice that happens alot with 
 them. When they go down, they still advertise your routes.
 
 As far as price goes, for us Cogent is cheap but Lightpath is cheaper.
 
 Our college is kind of far from things so we don't have a lot of outside 
 fiber coming. The last mile fiber for both of our connections are different 
 from our Internet providers. I've never had a big issue with the two working 
 with each other. The only issue we had is I suspected we weren't getting as 
 much bandwidth as we paid for. They had to work out where the policer and/or 
 bottle neck was. This is the only issue we had in 5 years with this set up 
 and it got resolved. IME, when there is a full outage, it's always been clear 
 who the responsible party is.
 
 
 
 
 
 On 2/6/2014 10:17 AM, Adam Greene wrote:
 Hi,
 
  
 We're a small ISP / datacenter with a Time Warner fiber-based DIA contract
 that is coming up for renewal.
 
  
 We're getting much better pricing offers from Cogent, and are finding out
 what Level 3 can do for us as well. Both providers will use Time Warner
 fiber for last mile.
 
  
 My questions are:
 
 -  Will we be sacrificing quality if we spring for Cogent?
 (yesterday's Cogent/Verizon thread provided some cold chills for my spine)
 
 -  Is there a risk with contracting a carrier that utilizes another
 carrier (such as Time Warner) for the last mile? (i.e. if there is a
 downtime situation, are we going to be caught in a web of confusion and
 finger-pointing that delays problem resolution)?
 
 -  How are peoples' experiences with L3 vs TWC?
 
  
 Although I assume everyone on the list would be interested in what others
 have to say about these questions, out of respect for the carriers in
 question, I encourage you to email frank opinions off list.
 
  
 Or if there are third party tools or resources you know that I could consult
 to deduce the answers to these questions myself, they are most welcome.
 
  
 Thanks,
 
 Adam
 
 



Re: carrier comparison

2014-02-06 Thread Patrick W. Gilmore
On Feb 6, 2014, at 11:22, Joshua Goldbard j...@2600hz.com wrote:
 
 Cogent always has the cheapest rates

Objectively, provably false.

-- 
TTFN,
patrick


 but they also have the most peering disputes of any operator. I've seen 
 intra-data center hops between cogent and Verizon take over 150ms.
 
 As with all things Internet, your mileage may vary. I would not put something 
 with a 5 9'a uptime requirement on cogent without a failover circuit. For 
 less sensitive applications it seems like a win.
 
 The Internet is both incredibly robust and fragile simultaneously.
 
 Cheers,
 Joshua
 
 Sent from my iPhone
 
 On Feb 6, 2014, at 8:06 AM, Vlade Ristevski vrist...@ramapo.edu wrote:
 
 We have had Cogent over Verizon's Fiber for more than a few years now. 
 Cogent goes down once at year at minimum. They had 2 outages in a single day 
 a couple days ago in Northern NJ.  One in the AM ..caused by a power outage 
 in a vendor data center where Cogent is collocated. They went on to have 
 another outage at around 9:30 PM on the same day for which I'm still waiting 
 for an RFO. During this outage, they still were advertising our BGP routes 
 so we didn't fail over to our 2nd provider. I notice that happens alot with 
 them. When they go down, they still advertise your routes.
 
 As far as price goes, for us Cogent is cheap but Lightpath is cheaper.
 
 Our college is kind of far from things so we don't have a lot of outside 
 fiber coming. The last mile fiber for both of our connections are different 
 from our Internet providers. I've never had a big issue with the two working 
 with each other. The only issue we had is I suspected we weren't getting as 
 much bandwidth as we paid for. They had to work out where the policer and/or 
 bottle neck was. This is the only issue we had in 5 years with this set up 
 and it got resolved. IME, when there is a full outage, it's always been 
 clear who the responsible party is.
 
 
 
 
 
 On 2/6/2014 10:17 AM, Adam Greene wrote:
 Hi,
 
 
 We're a small ISP / datacenter with a Time Warner fiber-based DIA contract
 that is coming up for renewal.
 
 
 We're getting much better pricing offers from Cogent, and are finding out
 what Level 3 can do for us as well. Both providers will use Time Warner
 fiber for last mile.
 
 
 My questions are:
 
 -  Will we be sacrificing quality if we spring for Cogent?
 (yesterday's Cogent/Verizon thread provided some cold chills for my spine)
 
 -  Is there a risk with contracting a carrier that utilizes another
 carrier (such as Time Warner) for the last mile? (i.e. if there is a
 downtime situation, are we going to be caught in a web of confusion and
 finger-pointing that delays problem resolution)?
 
 -  How are peoples' experiences with L3 vs TWC?
 
 
 Although I assume everyone on the list would be interested in what others
 have to say about these questions, out of respect for the carriers in
 question, I encourage you to email frank opinions off list.
 
 
 Or if there are third party tools or resources you know that I could consult
 to deduce the answers to these questions myself, they are most welcome.
 
 
 Thanks,
 
 Adam
 



Re: Need trusted NTP Sources

2014-02-06 Thread Saku Ytti
On (2014-02-06 07:24 -0800), Michael DeMan wrote:

 A) Run a local set of NTP servers - these are your 'trusted' servers, under 
 your control, properly managed/secured, fully meshed, etc.

I'm not sure if full-mesh is best practice, the external clients should have
full view of as close to source data as possible.
If in full-mesh you're already masking the data with inaccuracy, giving the
clients less information to make decision?

We used to have full-mesh in our meinbergs, until from their recommendation we
removed it completely. It makes sense to me, but I don't understand the issue
deeply.

-- 
  ++ytti



Re: carrier comparison

2014-02-06 Thread Seth Mattinen
On 2/6/14, 7:17 AM, Adam Greene wrote:
 Hi,
 
  
 
 We're a small ISP / datacenter with a Time Warner fiber-based DIA contract
 that is coming up for renewal. 
 
  
 
 We're getting much better pricing offers from Cogent, and are finding out
 what Level 3 can do for us as well. Both providers will use Time Warner
 fiber for last mile.
 
  
 
 My questions are:
 
 -  Will we be sacrificing quality if we spring for Cogent?
 (yesterday's Cogent/Verizon thread provided some cold chills for my spine)
 
 -  Is there a risk with contracting a carrier that utilizes another
 carrier (such as Time Warner) for the last mile? (i.e. if there is a
 downtime situation, are we going to be caught in a web of confusion and
 finger-pointing that delays problem resolution)?
 
 -  How are peoples' experiences with L3 vs TWC?
 
  
 
 Although I assume everyone on the list would be interested in what others
 have to say about these questions, out of respect for the carriers in
 question, I encourage you to email frank opinions off list. 
 
  
 
 Or if there are third party tools or resources you know that I could consult
 to deduce the answers to these questions myself, they are most welcome. 
 
  


Short answer: multihome.

~Seth



Re: SIP on FTTH systems

2014-02-06 Thread Jean-Francois Mezei
On 14-02-06 08:06, Mark Tinka wrote:

 I'm just saying DHCP is better than PPPoE if you're 
 greenfielding FTTH deployments today, and I'm not sure you 
 entirely disagree.


When an incumbent already has PPPoE deployed for its DSL, putting FTTH
on PPPoE makes it simpler.

And PPPoE really simplifies wholesale systems.

You do not want the incumbent/wholesaler to perform DHCP. This is a HUGE
headache. We have that in Canada for cable wholesale (TPIA). The
incumbent has to micromanage each ISPs IP blocks and carve subnets for
each CMTS (for cable).

For as much as everyone hates PPPoE, it makes for managememnt of a
wholesale systems much much easier.

Ideally, there would be some protocol where the CPE would setup a layer
2 SVC to the ISP, after which the ISP can provide DHCP services etc.



Re: carrier comparison

2014-02-06 Thread Vlade Ristevski
When I priced out providers 2 years ago for 500Mbps over 1 gig fiber 
link the list from most expensive to least expensive was:


Verizon--XO--Cogent--Lightpath

This is for Northern NJ. Abovenet and some of the other big providers 
couldn't reach our Campus. Lightpath ate the cost of running Fiber to 
our campus while the other weren't willing to do that.



On 2/6/2014 11:28 AM, Patrick W. Gilmore wrote:

On Feb 6, 2014, at 11:22, Joshua Goldbard j...@2600hz.com wrote:

Cogent always has the cheapest rates

Objectively, provably false.






Re: SIP on FTTH systems

2014-02-06 Thread Mikael Abrahamsson

On Thu, 6 Feb 2014, Jean-Francois Mezei wrote:

You do not want the incumbent/wholesaler to perform DHCP. This is a HUGE 
headache. We have that in Canada for cable wholesale (TPIA). The 
incumbent has to micromanage each ISPs IP blocks and carve subnets for 
each CMTS (for cable).


You could have the wholesaler do DHCP inspection and antispoofing etc 
based on that, but not actually do the DHCP servering.


For as much as everyone hates PPPoE, it makes for managememnt of a 
wholesale systems much much easier.


FTTH is supposed to be for higher speeds, putting PPPoE in there makes it 
a lot more expensive than it has to be.


Ideally, there would be some protocol where the CPE would setup a layer 
2 SVC to the ISP, after which the ISP can provide DHCP services etc.


I don't see that needed, doesn't the wholesaler already know what port has 
chosen what ISP and can set up L2 to that ISP?


--
Mikael Abrahamssonemail: swm...@swm.pp.se



Re: SIP on FTTH systems

2014-02-06 Thread Mark Tinka
On Thursday, February 06, 2014 06:38:23 PM Jean-Francois 
Mezei wrote:

 When an incumbent already has PPPoE deployed for its DSL,
 putting FTTH on PPPoE makes it simpler.

And that is the practical issue I saw (and still see). A lot 
of operators just continue with it because it is maturely 
deployed in their networks, and attempting DHCP may not be 
as easy.

Would I recommend trying DHCP, hell yes!

 And PPPoE really simplifies wholesale systems.

 You do not want the incumbent/wholesaler to perform DHCP.
 This is a HUGE headache. We have that in Canada for
 cable wholesale (TPIA). The incumbent has to micromanage
 each ISPs IP blocks and carve subnets for each CMTS (for
 cable).
 
 For as much as everyone hates PPPoE, it makes for
 managememnt of a wholesale systems much much easier.

In one country I worked, we pressured the incumbent to offer 
us Layer 2 backhaul instead of Layer 3, for the very same 
reasons. Co-managing IP address assignments, e.t.c., was 
problematic, especially because they were not sure how large 
their network was going to grow, which presented us with 
planning challenges in how we pre-assign address space for 
each of their service PoP's.

Of course, because the regulator had done their job re: 
unbundling the fibre, they didn't care how wholesale 
services were actually provided over said fibre. And yes, 
the incumbent jumped at the chance not to offer Layer 2 
backhaul, because then they knew everything we were up to 
(to some degree of measure).

 Ideally, there would be some protocol where the CPE would
 setup a layer 2 SVC to the ISP, after which the ISP can
 provide DHCP services etc.

Some of the vendors I've worked with don't support LNS 
functionality on their current generation BNG's. Just LAC. 
In this scenario, for PPPoE-centric operators and 
wholesalers, VPLS has been used to backhaul customer 
traffic, as opposed to L2TP, and recently, some vendors are 
now able to do this over EoMPLS pw's instead.

If you have some control over the AN's that go into the 
incumben's/wholesaler's CO, you can get that Layer 2 
connection (VPLS or EoMPLS pw) between your backbone and the 
CPE, that way.

Mark.


signature.asc
Description: This is a digitally signed message part.


RE: carrier comparison

2014-02-06 Thread Martin Hotze
 My questions are:
 
 -  Will we be sacrificing quality if we spring for Cogent?
 (yesterday's Cogent/Verizon thread provided some cold chills for my spine)


Jehova!

Popcorn!

 :-)

We used Cogent for some time. We dropped them, but not for poor quality (au 
contraire) but for other more complex reasons. IMHO, Cogent is far better than 
many say (any many of them only from 'knowledge' from word of mouth), Cogent 
has some oddities that you have to deal with, yust like with almost all other 
transit providers. Having said that: I don't want to be single homed again.

hth, martin




Fwd: SAFNOG 2014 - Call for Papers OPEN

2014-02-06 Thread Mark Tinka
FYI.

Mark.
---BeginMessage---
The Southern Africa Network Operators Group (SAFNOG)
Johannesburg, South Africa  22 April - 23 April, 2014
http://www.safnog.org

CALL FOR PAPERS
===

The SAFNOG 2014 Programme Committee is now seeking contributions for
Presentations and Tutorials for SAFNOG 2014.

We are looking for presenters who would:

- Offer a technical tutorial on an appropriate topic;
- Participate in the technical conference sessions as a speaker;
- Convene and chair panel sessions of relevant topics.

Please submit on-line at:

   http://papers.safnog.org/user/login.php?event=10

CONFERENCE MILESTONES
--

Call for Papers Opens  27 January 2014
First Draft Program Published  28 February 2014
Final Deadline for Submissions 10 April 2014
Final Program Published15 April 2014
Final Slides Received  18 April 2014

PROGRAMME MATERIAL
--

The SAFNOG Programme Committee is organised in three parts, including
workshops, tutorials and the conference.

Topics for tutorials and the conference must be relevant to Internet
Operations and Technologies:

- IPv4 / IPv6 Routing and operations
- IPv6 deployment and transition technologies
- Internet backbone operations
- ISP and Carrier services
- IXPs and Peering
- Research on Internet Operations and Deployment
- The African Internet
- Network security issues (NSP-SEC, DDoS, Anti-Spam, Anti-Malware)
- DNS / DNSSEC
- Internet policy (Security, Regulation, Content Management, Addressing,
etc)
- Access and Transport Technologies, including Cable/DSL, 3G/LTE, wireless,
metro ethernet, fibre, MPLS
- Content  Service Delivery (Multicast, Voice, Video, telepresence,
Gaming) and Cloud Computing


CfP SUBMISSION
---

Draft slides for both tutorials and conference sessions MUST be provided
with CfP submissions otherwise the Programme Committee will be unable to
review the submission. For work in progress, the most current information
available at time of submission is acceptable.

All draft and complete slides must be submitted in PDF format only.

Final slides are to be provided by the specified deadline for publication
on the SAFNOG website.

Prospective presenters should note that the majority of speaking slots will
be filled well before the final submission deadline.  The Programme
Committee will retain a limited number of slots up to the final submission
deadline for presentations that are exceptionally timely, important, or of
critical operational importance.

Please submit on-line at:

http://papers.safnog.org/user/login.php?event=10

Any questions or concerns should be addressed to the Programme Committee
co-chairs by e-mail at:

 safnog-pc-chairs at safnog.org

We look forward to receiving your presentation proposals.

On Behalf of Kevin Chege
Co-Chair
SAFNOG Programme Committee.
___
afnog mailing list
http://afnog.org/mailman/listinfo/afnog---End Message---


signature.asc
Description: This is a digitally signed message part.


Re: Need trusted NTP Sources

2014-02-06 Thread Mark Milhollan
On Thu, 6 Feb 2014, Notify Me wrote:

According to the auditors, trusted means

1. Universities or Research facilities (nuclear/atomic facilities,
space research (such as NASA) etc.)
2. Main country internet/telecom providers
3. Government departments
4. Satellites (using GPS module)

Which is a bit of a tall order over here.

In general you should probably be asking news:comp.protocols.time.ntp.

You could run your own NTP server using GPS as its reference clock (#4), 
at least I don't think it would be impossible for you to obtain such a 
device.  But not cheap either.  But then RHEL and an audit suggest you 
have some money to spend.  You might even build your own using ntpd and 
a receiver, e.g., GNSS.  See 
http://www.eecis.udel.edu/~mills/ntp/index.html for more information.

Some stratum 1 or 2 servers (which are generally run by entities 1 thru 
3 from your list) may allow you to obtain time (perhaps using crypto), 
but of course you'd need to contact them directly.  ntp.org has a list: 
http://support.ntp.org/bin/view/Servers/WebHome.

Generally speaking, you'll need at least 3 sources if you want stablity.


Mark



Route Server Filters at IXPs and 4-byte ASNs

2014-02-06 Thread Aris Lambrianidis
Food for thought:

- ASNs can be reused at different locations by IXPs, barring perhaps
certain business or administrative reasons. Ask Equinix.

- For IXPs that already have 16-bit ASNs for route servers, this saves 
additional 
allocations from RIRs and mitigates concerns for the IXP getting potentially a 
32-bit ASN, 
thus having trouble with BGP communities as described. Having a single ASN
may raise other issues but it is an option. 

- I believe it would help if RIRs reserved 16-bit ASNs
in addition to IPv4 micro allocations for IXPs, until a formal
solution can be finally found about the 32-bit ASN BGP communities issue. 

Aris Lambrianidis



Re: SIP on FTTH systems

2014-02-06 Thread Anders Löwinger

On 2014-02-06 15:08, Mark Tinka wrote:


You need a bunch of stuff, proxy ND, proxy DAD, DHCPv6 inspection


If you have a reasonably intelligent AN (like some of
today's Active-E devices), you can create so-called split
horizons on the same bridge domain (VLAN, really) where
customers will only communicate via the upstream BNG at
Layer 3.

At Layer 2, even though they are all sitting on the same
VLAN, there is no inter-communication between them.


Ok, then you have not understood the problem with IPv6 in shared VLANs. You 
need to allow some communication between the user ports on L2, to get the IPv6 
control procotol to work. You do this on IPv4 today, with proxy arp etc. Its 
much more complex in IPv6.



I've also know Huawei OLT's support these split horizons too.


Many devices support what Cisco calls Private VLAN or MACFF as specificed in 
RFC4562. There are IPv4 only implementations today - but not all these 
protocols are standardized, and are not interoperable between vendors. I have 
still not heard of any vendor shipping the same functionality to share VLANs 
with IPv6, in a secure way.



Or do something bold, run L3 at the edge :)


Cheap switches that have decent IP/MPLS support are mostly
geared toward Metro-E deployments, i.e., business-grade
services. So they are quite poor with regard to susbcriber
management features and capabilities.


You need a basic L3 access switch, with some tweaks. I've been working at and 
designing such devices for seven years at my former employeer PacketFront 
Networks. Whole bunch of standard protocols. OSPF, PIM-SM, IGMPv2/v3 in the 
edge, and now with OSPFv3, PIM-SMv6 and MLD/MLDv2. DHCPv4/v6 is relayed to the 
correct service provider, unless its management traffic and should be handled 
by the network.


Very easy, very few security issues since no L2 is allowed between customers, 
no strange protocols (ARP inspection, proxy ARP, IP source guard, DHCP 
Snooping/option82 or their IPv6 counterparts).


Open-access is done on the L3 layer, no VLANs. There are free seating in the 
CPE so all equipment in the home can talk to each other. Important with todays 
DLNA/TV sets and mobile phones.


It is very scalable, since that is how Internet is built :)

Of course, it needs a proper management system, so we built one as well.

We also pushed Python into the access device, so DHCPv4/DHCPv6, radius, 802.1x 
functionality and how those are used can easily be adjusted in a script 
instead of trying to express programming in a CLI.


On top of that some simple templates describing the services. The radius 
server just returns the service name with needed parameters (bandwidth, 
priority etc) and the python script installs/removes instances of the service 
as needed.


I promise this access device has NO problems with spoofed packets, see the 
BCP38 discussion :)


So, it's a small BNG in the access device.

And no, it's not that expensive. We did look at sourcing a L2 switch from 
Taiwan, we could get the switch with L2 or L3 forwarding in a Broadcom switch 
ASIC, all the other features was equal. Cost difference was five dollars.


(PacketFronts access device uses a NPU, much more flexible)

Vendors charging both an arm and a leg for routers are doing that because they 
can, doing L3 is not more expensive than L2 with todays technology.


PacketFront has sold over 1 miljon ports, and the largest installation is 
5 ports, both in Sweden, Holland and Dubai. This can easily scale to 
much bigger networks.


The biggest issue with selling L3 to the edge is not technical or economical, 
its religious - people are just so used to build their networks in a specific 
way and they don't want to change


/Anders




Re: SIP on FTTH systems

2014-02-06 Thread Mikael Abrahamsson

On Thu, 6 Feb 2014, Anders Löwinger wrote:

Ok, then you have not understood the problem with IPv6 in shared VLANs. 
You need to allow some communication between the user ports on L2, to 
get the IPv6 control procotol to work. You do this on IPv4 today, with 
proxy arp etc. Its much more complex in IPv6.


No, you don't. It works perfectly well without direct port-to-port 
communication, you just have to align L3 configuration with this L2 
behavior (which can be done in IPv6 but not in IPv4).


IPv6 can be made to work without on-link /64, with only DHCPv6 IA_NA 
(optional) and only DHCPv6-PD. This means all communication goes via the 
router which then is perfectly aligned with how the L2 looks like with 
port isolation/private vlan.


--
Mikael Abrahamssonemail: swm...@swm.pp.se


Re: Need trusted NTP Sources

2014-02-06 Thread Chris Keladis
On Thu, Feb 6, 2014 at 9:03 PM, Notify Me notify.s...@gmail.com wrote:

I'm trying to help a company I work for to pass an audit, and we've
 been told we need trusted NTP sources (RedHat doesn't cut it). Being
 located in Nigeria, Africa, I'm not very knowledgeable about trusted
 sources therein.


Obviously trusted time sources are important, but at the end of the day
you have to trust someone who ultimately has the least risk (there is never
no risk) you are able to achieve.

I appreciate least level of risk is subjective to your auditors opinion
(in this case) :-)

Just wanted to mention, having a good number of servers (not blindly
trusting = 3 unique sources) adds some additional protection against
'false-tickers'.

Even trusted time-sources have their off-days due to a myriad of
technical reasons.

Configure multiple, relatively high stratum (taking into account how many
stratum's you intend to serve downstream), low-jitter/rtt, good-quality,
time-sources.

Also, risk changes over time, so vigilant monitoring is important too!


Regards,

Chris.


Re: Need trusted NTP Sources

2014-02-06 Thread Jimmy Hess
On Thu, Feb 6, 2014 at 8:28 AM, jamie rishaw j...@arpa.com wrote:

 PCI DSS only requires that all clocks be synchronized; It doesn't
 /require/ how.


If you read requirement 10.4  more carefully,  you will find that it Does
require that time
be synchronized from an INDUSTRY ACCEPTED  external  time source.

The GPS reference clock, a radio timecode receiver, receiving NIST or USNO,

Microsoft's time source  (time.windows.com),
Redhat's time source,  various univerisities and other public time servers
listed on NTP.org,

the NIST time servers   listed here:
http://tf.nist.gov/tf-cgi/servers.cgi

Are among the INDUSTRY ACCEPTED external time sources.


This is not an exhaustive enumeration of industry-accepted external time
sources.

--
-JH


Re: SIP on FTTH systems

2014-02-06 Thread Mark Tinka
On Thursday, February 06, 2014 07:41:34 PM Anders Löwinger 
wrote:

 Ok, then you have not understood the problem with IPv6 in
 shared VLANs. You need to allow some communication
 between the user ports on L2, to get the IPv6 control
 procotol to work. You do this on IPv4 today, with proxy
 arp etc. Its much more complex in IPv6.

No, it's not, and no, you don't.

Active-E and GPON AN's support split horizons where shared 
VLAN's allow for simple service delivery to the CPE, but do 
not permit inter-customer communications at Layer 2.

All communications happens upstream at the BNG, which works 
for IPv4 and IPv6.

And no, Proxy ARP is recommended for my competitors. If 
you're not my competitor, suggest you turn it off if you 
want happiness.

 Many devices support what Cisco calls Private VLAN or
 MACFF as specificed in RFC4562. There are IPv4 only
 implementations today - but not all these protocols are
 standardized, and are not interoperable between vendors.
 I have still not heard of any vendor shipping the same
 functionality to share VLANs with IPv6, in a secure way.

And that is why for modern Active-E kit, I prefer to enable 
split horizons using split horizon tech. against bridge 
domains, rather than Private VLAN's. Private VLAN's have 
lots of restrictions, and on AN's that support EVC (Cisco-
style), you can enable split horizons on bridge domains, 
which works perfectly for Layer 2 and Layer 3 traffic.

 PacketFront has sold over 1 miljon ports, and the largest
 installation is
 
  5 ports, both in Sweden, Holland and Dubai. This
  can easily scale to
 
 much bigger networks.

The system specs. are impressive - basically, a little BNG 
in a switch, which I can't complain with.

I suppose if I'm a business that wants to consolidate BNG 
and business services on a single platform, the existing 
routers I pay big money for to enable those business servics 
can double as BNG's. It's distributed, uniform and a single 
place where I can offer multiple services to different types 
of customers.

But, if I'm a business with a low start-up budget focused on 
broadband services, or lots of cash with no plans to break 
into the enterprise or service provider markets, the 
PacketFront make sense. My only concern would be NG-MVPN 
support - does the PacketFront have that?

 The biggest issue with selling L3 to the edge is not
 technical or economical, its religious - people are just
 so used to build their networks in a specific way and
 they don't want to change

Well:
- I support DHCP instead of PPPoE for subscriber
  management.

- I support decentralized rather than centralized
  BNG's.

- I support Active-E rather than GPON.

These are all relatively less-than-popular scenarios based 
on many of the deployments I've seen in previous years.

So while I agree that there is a healthy amount of religion 
to these things, there is also room for change if the 
reasons are compelling. But yes, it can come down to 
personal taste by one person in the company.

Cheers,

Mark.


signature.asc
Description: This is a digitally signed message part.


Re: SIP on FTTH systems

2014-02-06 Thread Mark Tinka
On Thursday, February 06, 2014 09:04:40 PM Mikael 
Abrahamsson wrote:

 No, you don't. It works perfectly well without direct
 port-to-port communication, you just have to align L3
 configuration with this L2 behavior (which can be done
 in IPv6 but not in IPv4).
 
 IPv6 can be made to work without on-link /64, with only
 DHCPv6 IA_NA (optional) and only DHCPv6-PD. This means
 all communication goes via the router which then is
 perfectly aligned with how the L2 looks like with port
 isolation/private vlan.

Yep.

Mark.


signature.asc
Description: This is a digitally signed message part.


Re: SIP on FTTH systems

2014-02-06 Thread Fletcher Kittredge
On Wed, Feb 5, 2014 at 11:52 PM, Jean-Francois Mezei 
jfmezei_na...@vaxination.ca wrote:

 Quick question:

 In the USA,  do CLECs have access to homes served only by FTTH ? If so,
 how it is accomplisehd ?


In practice CLECs do not have access.   The TR order of the last decade
mandated that access via FTTH was not a section 251 requirement under the
Telco Act of 1996 except for a 64kbs stream which in theory could be used
for voice.  However, I believe there has been no widescale use of that
feature because it is uneconomical compared to over-the-top VoIP.

-- 
Fletcher Kittredge
GWI
8 Pomerleau Street
Biddeford, ME 04005-9457
207-602-1134


Re: Why won't providers source-filter attacks? Simple.

2014-02-06 Thread Leo Bicknell

On Feb 5, 2014, at 2:46 AM, Saku Ytti s...@ytti.fi wrote:

 If we keep thinking this problem as last-mile port problem, it won't be solved
 in next 20 years. Because lot of those ports really can't do RPF and even if
 they can do it, they are on autopilot and next change is market forced
 fork-lift change. Company may not even employ technical personnel, only buy
 consulting when making changes.

It can be solved, but not by NANOG.

Imagine if Cable labs required all DOCSIS compliant cable modems to default
to doing source address verification in the next version of DOCSIS?  It would
(eventually) get rolled out, and it would solve the problem.  Even if it doesn't
default to on, requiring the hardware to be capable would be a nice step.

The consumer last mile is actually simpler in that there are a few organizations
who control the standards.  Efforts need to focus on getting the BCP38 stuff
into those standards, ideally as mandatory defaults.

-- 
   Leo Bicknell - bickn...@ufp.org - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/







signature.asc
Description: Message signed with OpenPGP using GPGMail


Re: TWC (AS11351) blocking all NTP?

2014-02-06 Thread Michael Smith

On Feb 4, 2014, at 8:52 AM, William Herrin b...@herrin.us wrote:

 On Tue, Feb 4, 2014 at 11:23 AM, Jared Mauch ja...@puck.nether.net wrote:
 On Feb 4, 2014, at 11:04 AM, William Herrin b...@herrin.us wrote:
 If just three of the transit-free networks rewrote their peering
 contracts such that there was a $10k per day penalty for sending
 packets with source addresses the peer should reasonably have known
 were forged, this problem would go away in a matter of weeks.
 
 I've seen similar comments in other forums.  We are all generally paid
 for moving packets, not filtering them.  The speed at which you can forward
 packets can often cause increased $$.  Using these features also impacts
 performance, so the cost may actually be 2x in capex+opex to provision ports
 due to reduced line-rate capability.
 
 Hi Jared,
 
 You're gonna need a bigger TCAM, but even so  I think you're
 overstating the case.

No, he's not.  The intelligence required to analyze packets is in addition to 
the intelligence required to move them.  More packets, more cost.

 
 
 Even if you take a RPSL-IRR approach to building filters, and even if the 
 router
 can handle such long ACLs bug-free, you have some objects that expand to
 cover 50-90% of the internet. They may be someones backup route at some
 point because of 'something'.
 
 Yes, but that's OK. In order to make sure that they're aren't
 originating from the penalizing 10%, your peers will have to implement
 similar filtering downstream... where the breadth isn't 90%.
 
 

So who determines this break point?  Who is responsible for a full-table Tier-1 
to Tier-1 peering link?  Who polices it?  Who arbitrates disputes?


 Clearly putting the filters as close to the source is helpful but detecting 
 the
 actual spoofed packet is hard.
 
 At the customer boundary it's trivial: they'll tell you what they
 originate, and that's what you'll allow. If your customer lies, pass
 the penalty forward.
 
 At the peering boundary, you don't have to detect the forged packets.
 You can wait until someone complains, confirm it, and then apply the
 penalty. Packets coming from your peers won't
 go to your other peers, only to your customers. That's how you rigged
 your routing. More, evidence that the downstream was authorized to
 send those packets refutes the penalty.
 
 

You know this is completely unworkable at scale right?

 Until you find yourself on the receiving end of these types of things, you 
 may not
 ask for or pay for DDoS protection services, or advanced filtering, or even 
 ask
 your vendor to support these features.  I have to wait months for fixes in 
 the
 features because no support from others in the industry on the platform, etc.
 
 DDoS is a bigger problem than spoofing and amplification.  My
 suggestion only addresses spoofing and amplification, not botnets in
 general.
 

But they have the same economic inputs, yes?  As Jared said, providers get paid 
by the bit.  Many (most?) Bad Actors get paid by the bit, Vendors get paid by 
the bit, mitigation vendors get paid by the bit.  That's a lot of dollars for a 
lot of bits and they increase together.
 
 Those that are up in arms about this stuff seem to not be the ones asking
 the vendors for features and fixes.
 
 Like I said, the tier 1's can't be the source of the solution until
 they stop being part of the problem.
 

You are asking the guys who build and maintain the highways to be responsible 
for checking every car on the road to see if it's carrying illegal drugs.  How 
can that possibly work?

Mike






Re: carrier comparison

2014-02-06 Thread Matthew Crocker


IMHO  Cogent bandwidth is fine so long as it isn’t your only bandwidth.  Good, 
Cheap, Fast,  Pick any two.


--
Matthew S. Crocker
President
Crocker Communications, Inc.
PO BOX 710
Greenfield, MA 01302-0710

E: matt...@crocker.com
P: (413) 746-2760
F: (413) 746-3704
W: http://www.crocker.com



On Feb 6, 2014, at 10:17 AM, Adam Greene maill...@webjogger.net wrote:

 Hi,
 
 
 
 We're a small ISP / datacenter with a Time Warner fiber-based DIA contract
 that is coming up for renewal. 
 
 
 
 We're getting much better pricing offers from Cogent, and are finding out
 what Level 3 can do for us as well. Both providers will use Time Warner
 fiber for last mile.
 
 
 
 My questions are:
 
 -  Will we be sacrificing quality if we spring for Cogent?
 (yesterday's Cogent/Verizon thread provided some cold chills for my spine)
 
 -  Is there a risk with contracting a carrier that utilizes another
 carrier (such as Time Warner) for the last mile? (i.e. if there is a
 downtime situation, are we going to be caught in a web of confusion and
 finger-pointing that delays problem resolution)?
 
 -  How are peoples' experiences with L3 vs TWC?
 
 
 
 Although I assume everyone on the list would be interested in what others
 have to say about these questions, out of respect for the carriers in
 question, I encourage you to email frank opinions off list. 
 
 
 
 Or if there are third party tools or resources you know that I could consult
 to deduce the answers to these questions myself, they are most welcome. 
 
 
 
 Thanks,
 
 Adam
 
 




Re: carrier comparison

2014-02-06 Thread Sam Moats

+1 Same feeling here.
Sam Moats

On 2014-02-06 16:22, Matthew Crocker wrote:

IMHO  Cogent bandwidth is fine so long as it isn’t your only
bandwidth.  Good, Cheap, Fast,  Pick any two.


--
Matthew S. Crocker
President
Crocker Communications, Inc.
PO BOX 710
Greenfield, MA 01302-0710

E: matt...@crocker.com
P: (413) 746-2760
F: (413) 746-3704
W: http://www.crocker.com



On Feb 6, 2014, at 10:17 AM, Adam Greene maill...@webjogger.net 
wrote:



Hi,



We're a small ISP / datacenter with a Time Warner fiber-based DIA 
contract

that is coming up for renewal.



We're getting much better pricing offers from Cogent, and are 
finding out
what Level 3 can do for us as well. Both providers will use Time 
Warner

fiber for last mile.



My questions are:

-  Will we be sacrificing quality if we spring for Cogent?
(yesterday's Cogent/Verizon thread provided some cold chills for my 
spine)


-  Is there a risk with contracting a carrier that utilizes 
another

carrier (such as Time Warner) for the last mile? (i.e. if there is a
downtime situation, are we going to be caught in a web of confusion 
and

finger-pointing that delays problem resolution)?

-  How are peoples' experiences with L3 vs TWC?



Although I assume everyone on the list would be interested in what 
others
have to say about these questions, out of respect for the carriers 
in

question, I encourage you to email frank opinions off list.



Or if there are third party tools or resources you know that I could 
consult
to deduce the answers to these questions myself, they are most 
welcome.




Thanks,

Adam







Re: carrier comparison

2014-02-06 Thread Blake Dunlap
I use Cogent as well, no real issues other than I wouldn't single home to
them. Personally, I don't understand why someone would depend on a single
provider for connectivity however...

-Blake


On Thu, Feb 6, 2014 at 3:22 PM, Matthew Crocker matt...@corp.crocker.comwrote:



 IMHO  Cogent bandwidth is fine so long as it isn't your only bandwidth.
  Good, Cheap, Fast,  Pick any two.


 --
 Matthew S. Crocker
 President
 Crocker Communications, Inc.
 PO BOX 710
 Greenfield, MA 01302-0710

 E: matt...@crocker.com
 P: (413) 746-2760
 F: (413) 746-3704
 W: http://www.crocker.com



 On Feb 6, 2014, at 10:17 AM, Adam Greene maill...@webjogger.net wrote:

  Hi,
 
 
 
  We're a small ISP / datacenter with a Time Warner fiber-based DIA
 contract
  that is coming up for renewal.
 
 
 
  We're getting much better pricing offers from Cogent, and are finding out
  what Level 3 can do for us as well. Both providers will use Time Warner
  fiber for last mile.
 
 
 
  My questions are:
 
  -  Will we be sacrificing quality if we spring for Cogent?
  (yesterday's Cogent/Verizon thread provided some cold chills for my
 spine)
 
  -  Is there a risk with contracting a carrier that utilizes
 another
  carrier (such as Time Warner) for the last mile? (i.e. if there is a
  downtime situation, are we going to be caught in a web of confusion and
  finger-pointing that delays problem resolution)?
 
  -  How are peoples' experiences with L3 vs TWC?
 
 
 
  Although I assume everyone on the list would be interested in what others
  have to say about these questions, out of respect for the carriers in
  question, I encourage you to email frank opinions off list.
 
 
 
  Or if there are third party tools or resources you know that I could
 consult
  to deduce the answers to these questions myself, they are most welcome.
 
 
 
  Thanks,
 
  Adam
 
 





Re: carrier comparison

2014-02-06 Thread Eric Flanery (eric)
Vlade,

When you say that they still advertise your routes, do you mean:

A: That you were having them originate your routes, and they failed to stop
doing so when they had problems? Or...

B: That routes you were originating continued to be propagated by them,
even though your session with them was down? Or...

C: Something else.

I ask, as we are considering some cheap Cogent bandwidth in the
not-too-distant future, to allow us to keep commit rates low on higher
quality connections. 'A' wouldn't be a real problem, since we run our own
AS and originate our own routes; 'B' could be potentially devastating.


On Thu, Feb 6, 2014 at 8:04 AM, Vlade Ristevski vrist...@ramapo.edu wrote:

 We have had Cogent over Verizon's Fiber for more than a few years now.
 Cogent goes down once at year at minimum. They had 2 outages in a single
 day a couple days ago in Northern NJ.  One in the AM ..caused by a power
 outage in a vendor data center where Cogent is collocated. They went on to
 have another outage at around 9:30 PM on the same day for which I'm still
 waiting for an RFO. During this outage, they still were advertising our BGP
 routes so we didn't fail over to our 2nd provider. I notice that happens
 alot with them. When they go down, they still advertise your routes.

 As far as price goes, for us Cogent is cheap but Lightpath is cheaper.

 Our college is kind of far from things so we don't have a lot of outside
 fiber coming. The last mile fiber for both of our connections are different
 from our Internet providers. I've never had a big issue with the two
 working with each other. The only issue we had is I suspected we weren't
 getting as much bandwidth as we paid for. They had to work out where the
 policer and/or bottle neck was. This is the only issue we had in 5 years
 with this set up and it got resolved. IME, when there is a full outage,
 it's always been clear who the responsible party is.






 On 2/6/2014 10:17 AM, Adam Greene wrote:

 Hi,


 We're a small ISP / datacenter with a Time Warner fiber-based DIA contract
 that is coming up for renewal.


 We're getting much better pricing offers from Cogent, and are finding out
 what Level 3 can do for us as well. Both providers will use Time Warner
 fiber for last mile.


 My questions are:

 -  Will we be sacrificing quality if we spring for Cogent?
 (yesterday's Cogent/Verizon thread provided some cold chills for my spine)

 -  Is there a risk with contracting a carrier that utilizes
 another
 carrier (such as Time Warner) for the last mile? (i.e. if there is a
 downtime situation, are we going to be caught in a web of confusion and
 finger-pointing that delays problem resolution)?

 -  How are peoples' experiences with L3 vs TWC?


 Although I assume everyone on the list would be interested in what others
 have to say about these questions, out of respect for the carriers in
 question, I encourage you to email frank opinions off list.


 Or if there are third party tools or resources you know that I could
 consult
 to deduce the answers to these questions myself, they are most welcome.


 Thanks,

 Adam





Re: carrier comparison

2014-02-06 Thread Vlade Ristevski
B)  We have our own AS and IP space. I advertise them to both Cogent and 
our other ISP. I use the local preference attribute to share the load 
for incoming traffic between both ISPs. In the last 5 outages over the 
last few years, this has happened twice. I'm waiting on the RFO so I can 
further investigate why this happened. I think someone mentioned this in 
a post a few months ago too.


It sucks for us, because we're a small school and don't have someone in 
a NOC to monitor our networks 24x7. I literally had to get out of bed 
and disable our BGP session with them for us to get through the outage. 
I was getting around 90% packet loss from my home to our router.



On 2/6/2014 4:57 PM, Eric Flanery (eric) wrote:

Vlade,

When you say that they still advertise your routes, do you mean:

A: That you were having them originate your routes, and they failed to 
stop doing so when they had problems? Or...


B: That routes you were originating continued to be propagated by 
them, even though your session with them was down? Or...


C: Something else.

I ask, as we are considering some cheap Cogent bandwidth in the 
not-too-distant future, to allow us to keep commit rates low on higher 
quality connections. 'A' wouldn't be a real problem, since we run our 
own AS and originate our own routes; 'B' could be potentially devastating.



On Thu, Feb 6, 2014 at 8:04 AM, Vlade Ristevski vrist...@ramapo.edu 
mailto:vrist...@ramapo.edu wrote:


We have had Cogent over Verizon's Fiber for more than a few years
now. Cogent goes down once at year at minimum. They had 2 outages
in a single day a couple days ago in Northern NJ.  One in the AM
..caused by a power outage in a vendor data center where Cogent
is collocated. They went on to have another outage at around 9:30
PM on the same day for which I'm still waiting for an RFO. During
this outage, they still were advertising our BGP routes so we
didn't fail over to our 2nd provider. I notice that happens alot
with them. When they go down, they still advertise your routes.

As far as price goes, for us Cogent is cheap but Lightpath is cheaper.

Our college is kind of far from things so we don't have a lot of
outside fiber coming. The last mile fiber for both of our
connections are different from our Internet providers. I've never
had a big issue with the two working with each other. The only
issue we had is I suspected we weren't getting as much bandwidth
as we paid for. They had to work out where the policer and/or
bottle neck was. This is the only issue we had in 5 years with
this set up and it got resolved. IME, when there is a full outage,
it's always been clear who the responsible party is.






On 2/6/2014 10:17 AM, Adam Greene wrote:

Hi,


We're a small ISP / datacenter with a Time Warner fiber-based
DIA contract
that is coming up for renewal.


We're getting much better pricing offers from Cogent, and are
finding out
what Level 3 can do for us as well. Both providers will use
Time Warner
fiber for last mile.


My questions are:

-  Will we be sacrificing quality if we spring for Cogent?
(yesterday's Cogent/Verizon thread provided some cold chills
for my spine)

-  Is there a risk with contracting a carrier that
utilizes another
carrier (such as Time Warner) for the last mile? (i.e. if
there is a
downtime situation, are we going to be caught in a web of
confusion and
finger-pointing that delays problem resolution)?

-  How are peoples' experiences with L3 vs TWC?


Although I assume everyone on the list would be interested in
what others
have to say about these questions, out of respect for the
carriers in
question, I encourage you to email frank opinions off list.


Or if there are third party tools or resources you know that I
could consult
to deduce the answers to these questions myself, they are most
welcome.


Thanks,

Adam





--
Vlad



ATT Security

2014-02-06 Thread Justin Wilson
Anyone have a contact for ATT security? I have a Denial of service attack
going on for a customer with an ATT Fiber Circuit. I called ATT and they
gave me an 888 number which is some security contractor.

Justin


--
Justin Wilson j...@mtin.net
MTCNA ­ CCNA ­ MTCRE ­ MTCWE - COMTRAIN
Aol  Yahoo IM: j2sw
http://www.mtin.net/blog ­ xISP News
http://www.zigwireless.com ­ High Speed Internet Options
http://www.thebrotherswisp.com ­ The Brothers Wisp




FW: Trusted Community Representation for Root KSK

2014-02-06 Thread Leo Vegoda
Hi,
 
People on this list might also want to submit responses.
 
Regards,
 
Leo
 
 
From: dns-operations-boun...@mail.dns-oarc.net
[mailto:dns-operations-boun...@mail.dns-oarc.net] On Behalf Of Kim
Davies
Sent: Thursday, February 06, 2014 12:38 PM
To: DNS Operations
Subject: [dns-operations] Trusted Community Representation for Root KSK
 
Hi folks,
 
ICANN is currently performing a consultation on how to evolve the
participation of Trusted Community Representatives in the management of
the root key signing key. I think this consultation is of particular
interest to this group as ultimately these TCRs are there to instill
trust in the DNS operations community that the KSK is being managed in a
proper fashion.
 
I'd encourage you to provide feedback to this consultation - available
at
http://www.icann.org/en/news/public-comment/tcr-dnssec-key-signing-21jan
14-en.htm - by 11th February. It is important we have a model of TCR
participation that is satisfactory to the community.
 
For convenience, here are the terms of reference replicated:
 
Background
 
Since July 2010, the DNS Root Zone has been secured using DNSSEC[1]. The
model of using DNSSEC in the DNS Root Zone revolves around a key
signing key (KSK) that is managed by ICANN in two secure facilities.
Four times a year, a ceremony is conducted at these facilities to
perform operations involving the KSK. As a key part of this process, a
minimum of three from a pool of 21 trusted community representatives
(TCRs) attend each ceremony to enable access to the secure materials, to
witness the procedure, and to attest that the ceremony was conducted
properly[2].
 
Each ceremony is attended by ICANN staff, the TCRs, representatives of
the Root Zone Maintainer (Verisign), representatives of an independent
audit firm retained by ICANN to monitor the process, and often
additional external witnesses. Ceremonies are recorded by three audit
cameras and webcast online. A typical ceremony lasts approximately four
hours, and involves a process of temporarily removing the key signing
key from a safe and performing key-signing operations in a secure manner
following a formal script. The script is designed to perform each
operation in a transparent manner to ensure the key signing key is only
used for its proper purpose, and there is no ability for its contents to
be disclosed for other purposes. Materials from each ceremony - such as
the scripts, video recordings, and system output - are posted online[3].
 
De-briefings and discussions are conducted post-ceremony, where
participants discuss how to improve future ceremonies. This feedback
helps inform the evolution of the KSK ceremony to be both efficient and
effective, while ensuring maximum trust in how ceremonies are performed.
 
The TCRs were selected[4] from the global community based on a number of
criteria[5]. These selection criteria relate to the volunteers ability
to travel to ceremonies, conscientiously oversee the process, ensure
transparency in its operation, and ultimately contribute to the broader
community's trust that the private component of the key signing key has
not been compromised. The TCRs are privately funded volunteers who are
not reimbursed or compensated by ICANN for their participation nor their
expenses. The original TCR proposal was silent on the length of service
of individual TCRs.
 
Of the 21 TCRs, seven are credentialed as crypto officers (COs) for
each of the two facilities, and the remaining seven act as recovery key
shareholders who only participate in ceremonies in the event the
requisite number of COs are unable to participate or there is a need to
rebuild the KSK following an unforeseen event. Of the seven COs for each
facility, ICANN aims to have four attend each ceremony, with an absolute
minimum of three required to successfully perform a ceremony. Each
facility hosts two ceremonies per year, approximately once every six
months. In practice, a TCR will attend at minimum one ceremony per year,
and some will attend two in order to ensure sufficient attendance.
 
Of the initial pool of 21 TCRs, one has resigned and been replaced from
the pool of recovery key shareholders. No TCR has been removed owing to
the other three criteria for replacement in the TCR selection document,
relating to lack of integrity or trustworthiness; assumption of a
conflicting role within a root management organization; or being unable
to serve in their position.
 
Based on feedback from the current TCRs and our experience from the
first 14 ceremonies, we are reviewing what changes, if any, should be
made to the current model of TCR participation.
 
Comments
 
Comments are welcome on any aspect of the consultation, and specifically
on the following questions:
 
1. Is the current TCR model effectively performing its function of
ensuring trust in the KSK management process?
2. Is the current size of the TCR pool appropriate to ensure sufficient
participation in the ceremonies, while not overburdening the

RE: Need trusted NTP Sources

2014-02-06 Thread Tony Hain
 -Original Message-
 From: Notify Me [mailto:notify.s...@gmail.com]
 Sent: Thursday, February 06, 2014 4:54 AM
 To: Aled Morris
 Cc: nanog@nanog.org; Martin Hotze
 Subject: Re: Need trusted NTP Sources
 
 Raspberries! Not common currency here either, but let's see!

While I would be using a Pi if I were doing it now, a few years ago I put
together a circuit that used a $100 outdoor mast-mount GPS receiver* with a
PPS out, to feed an RS232 connection to 3 FreeBSD 8.1 systems compiled with:
options PPS_SYNC#  
I don't know if that is still required in 10.0, and I understand Linux has
since fixed the kernel time resolution issues it was having, so research
into current OS configuration is required. To make the local time reference
preferred over external references, in ntp conf:
server 127.127.20.1 mode 8 minpoll 4 maxpoll 4 prefer
The diagram is at http://tndh.net/~tony/GPS-PPS-5v-ttl_232-box.pdf
While there is 'some assembly required', the components to feed existing
servers may be easier to come by than a Pi, and an outdoor receiver will
have better reception than the Adafruit one stuck inside a datacenter. 

As others have said, several external references help protect against any
one source having a bad day, but you should also be aware that network
asymmetry WILL impact your results so factor topology into your source
selection. Using this setup and OWAMP** I was able to track down a ~20ms
peering asymmetry between HE  Comcast inside the Seattle Westin colo,
which still persists.*** It would appear from the time delay that one of
their intermediaries is not really present in the building, but using a
fiber loop to a city about 400 miles away (Boise, or Medford ??). I am not
aware of the specific topology, other than traceroute shows different
intermediaries in each direction at one IP hop, with one taking 20ms longer
than the other to move between the same HE  Comcast routers inside that
colo. What I can see is the impact it has of showing the IPv6 connected NTP
peers as ~10ms off of the local IPv4 ones  the GPS receiver. 

Good luck


* MR-350P
http://www.amazon.com/Globalsat-Waterproof-External-Receiver-without/dp/B001
ENYWJC/ref=sr_sp-atf_title_1_1?ie=UTF8qid=1391734470sr=8-1keywords=mr-350
p

** OWAMP  http://software.internet2.edu/owamp/

*** ntpq -p
 remote   refid  st t when poll reach   delay   offset
jitter

==
xPPS(1)  .PPS.0 l7   16  3770.0000.001
0.002
oGPS_NMEA(1) .GPS.0 l7   16  3770.0000.001
0.002 
*bigben.cac.wash .GPS.1 u   69   64  372   13.0581.638
36.654 
+clock.fmt.he.ne .CDMA.   1 u   15   64  373   32.6411.938
28.828
-chronos6.es.net .CDMA.   1 u9   64  377   92.321   10.473
2.335
-2001:4f8:2:d::1 129.6.15.29  2 u   31   64  377   35.5459.912
43.519
-time0.apple.com 17.150.142.121   2 u2   64  377   44.922   -1.275
26.193


 grateful for all the input and responses, this list is amazing as usual.
 
 On Thu, Feb 6, 2014 at 1:41 PM, Aled Morris al...@qix.co.uk wrote:
  On 6 February 2014 12:30, Martin Hotze m.ho...@hotze.com wrote:
 
   I'm trying to help a company I work for to pass an audit, and we've
   been told we need trusted NTP sources (RedHat doesn't cut it).
   Being located in Nigeria, Africa,
 
   [...]
 
  So build your own stratum 1 server (maybe a second one with DCF77 or
  whatever you can use for redundancy),
 
 
  I don't think DCF77 is going to reach Nigeria.
 
  Aled




Re: Need trusted NTP Sources

2014-02-06 Thread Jay Ashworth
- Original Message -
 From: Mark Milhollan m...@pixelgate.net

 Generally speaking, you'll need at least 3 sources if you want
 stablity.

My usual practice is to set up two in house servers, each of which 
talks to:

time.windows.com
time.apple.com
and one of the NIST servers

0.us.pool.ntp.org
1.us.pool.ntp.org
2.us.pool.ntp.org

and each other. 

And then point everyone in house to both of them, assuming they accept
multiple server names.

But I am young, and not much travelled.  :-)

Cheers,
-- jra
-- 
Jay R. Ashworth  Baylink   j...@baylink.com
Designer The Things I Think   RFC 2100
Ashworth  Associates   http://www.bcp38.info  2000 Land Rover DII
St Petersburg FL USA  BCP38: Ask For It By Name!   +1 727 647 1274



Re: Need trusted NTP Sources

2014-02-06 Thread Larry Sheldon

On 2/6/2014 8:24 PM, Jay Ashworth wrote:


Mailing lists aren't *supposed* to set Reply-To, Larry; your mail client is
supposed to have a Reply To List command.


It does.  And does not light up for most of the lists I am on (including 
one I own).  I am apparently not bright enough to notice when it does 
light up.



 Most consumer MUAs, of course,

don't.

Reply-All is a (usually) winked-upon subterfuge, or you can do like I
do and just manually readjust the To header when you reply to the list.


The later apparently requiring even more brain power than I able to 
bring to bear on the problem.


A FB community I am part of has several people in it that work in the 
same company--much flapping about a message sent to all--including 
people on continents who have no capability of being interested.  Much 
don't send replies to all--sent to all.



Just don't do what I do and accidentally set it to NANOG when you're
replying to a different list's message.  :-)


I was mildly chastised yesterday about a lengthy thread that I started 
about GPSs on MTRA when I could swear that I started on MTR.


Old age has not been kind to me.


Cheers,
-- jra


And I did consider sending this just to Jay, but decided the public 
humbling would be good.


You need not bother everybody to tell me I was wrong.  Again.


It will get warm again someday.  I'm pretty sure.

--
Requiescas in pace o email   Two identifying characteristics
of System Administrators:
Ex turpi causa non oritur actio  Infallibility, and the ability to
learn from their mistakes.
  (Adapted from Stephen Pinker)



Re: Need trusted NTP Sources

2014-02-06 Thread Jay Ashworth
- Original Message -
 From: Larry Sheldon larryshel...@cox.net

 After all these years I still can not get used to the non-standard NANOG
 response to reply. I wonder if there is a way for ne to fix that.

Noo!!!  Everybody!!!  Don't reply to that!!!  

:-)

Mailing lists aren't *supposed* to set Reply-To, Larry; your mail client is
supposed to have a Reply To List command.  Most consumer MUAs, of course,
don't.

Reply-All is a (usually) winked-upon subterfuge, or you can do like I 
do and just manually readjust the To header when you reply to the list.

Just don't do what I do and accidentally set it to NANOG when you're 
replying to a different list's message.  :-)

Cheers,
-- jra
-- 
Jay R. Ashworth  Baylink   j...@baylink.com
Designer The Things I Think   RFC 2100
Ashworth  Associates   http://www.bcp38.info  2000 Land Rover DII
St Petersburg FL USA  BCP38: Ask For It By Name!   +1 727 647 1274



Re: carrier comparison

2014-02-06 Thread Faisal Imtiaz
Based on your description, it sounds like the outage did not bring your BGP 
session down, as such you were connected and advertising to the broken Service 
Provider.

e.g. Cogent typically does multi-hop bgp, as such if there a network outage 
past the BGP router, you will experience the situation you described.

You might have to deploy some other means of (script ?) to bring your BGP 
session down from the 'broken' Service Provider.

To the best of my knowledge, BGP does not have any mechanism to determine 
broken connectivity upstream past the router you are BGP session is up with.

Faisal Imtiaz
Snappy Internet  Telecom
7266 SW 48 Street
Miami, FL 33155
Tel: 305 663 5518 x 232

Help-desk: (305)663-5518 Option 2 or Email: supp...@snappytelecom.net 

- Original Message -
 From: Vlade Ristevski vrist...@ramapo.edu
 Cc: nanog@nanog.org
 Sent: Thursday, February 6, 2014 5:25:53 PM
 Subject: Re: carrier comparison
 
 B)  We have our own AS and IP space. I advertise them to both Cogent and
 our other ISP. I use the local preference attribute to share the load
 for incoming traffic between both ISPs. In the last 5 outages over the
 last few years, this has happened twice. I'm waiting on the RFO so I can
 further investigate why this happened. I think someone mentioned this in
 a post a few months ago too.
 
 It sucks for us, because we're a small school and don't have someone in
 a NOC to monitor our networks 24x7. I literally had to get out of bed
 and disable our BGP session with them for us to get through the outage.
 I was getting around 90% packet loss from my home to our router.
 
 
 On 2/6/2014 4:57 PM, Eric Flanery (eric) wrote:
  Vlade,
 
  When you say that they still advertise your routes, do you mean:
 
  A: That you were having them originate your routes, and they failed to
  stop doing so when they had problems? Or...
 
  B: That routes you were originating continued to be propagated by
  them, even though your session with them was down? Or...
 
  C: Something else.
 
  I ask, as we are considering some cheap Cogent bandwidth in the
  not-too-distant future, to allow us to keep commit rates low on higher
  quality connections. 'A' wouldn't be a real problem, since we run our
  own AS and originate our own routes; 'B' could be potentially devastating.
 
 
  On Thu, Feb 6, 2014 at 8:04 AM, Vlade Ristevski vrist...@ramapo.edu
  mailto:vrist...@ramapo.edu wrote:
 
  We have had Cogent over Verizon's Fiber for more than a few years
  now. Cogent goes down once at year at minimum. They had 2 outages
  in a single day a couple days ago in Northern NJ.  One in the AM
  ..caused by a power outage in a vendor data center where Cogent
  is collocated. They went on to have another outage at around 9:30
  PM on the same day for which I'm still waiting for an RFO. During
  this outage, they still were advertising our BGP routes so we
  didn't fail over to our 2nd provider. I notice that happens alot
  with them. When they go down, they still advertise your routes.
 
  As far as price goes, for us Cogent is cheap but Lightpath is cheaper.
 
  Our college is kind of far from things so we don't have a lot of
  outside fiber coming. The last mile fiber for both of our
  connections are different from our Internet providers. I've never
  had a big issue with the two working with each other. The only
  issue we had is I suspected we weren't getting as much bandwidth
  as we paid for. They had to work out where the policer and/or
  bottle neck was. This is the only issue we had in 5 years with
  this set up and it got resolved. IME, when there is a full outage,
  it's always been clear who the responsible party is.
 
 
 
 
 
 
  On 2/6/2014 10:17 AM, Adam Greene wrote:
 
  Hi,
 
 
  We're a small ISP / datacenter with a Time Warner fiber-based
  DIA contract
  that is coming up for renewal.
 
 
  We're getting much better pricing offers from Cogent, and are
  finding out
  what Level 3 can do for us as well. Both providers will use
  Time Warner
  fiber for last mile.
 
 
  My questions are:
 
  -  Will we be sacrificing quality if we spring for Cogent?
  (yesterday's Cogent/Verizon thread provided some cold chills
  for my spine)
 
  -  Is there a risk with contracting a carrier that
  utilizes another
  carrier (such as Time Warner) for the last mile? (i.e. if
  there is a
  downtime situation, are we going to be caught in a web of
  confusion and
  finger-pointing that delays problem resolution)?
 
  -  How are peoples' experiences with L3 vs TWC?
 
 
  Although I assume everyone on the list would be interested in
  what others
  have to say about these questions, out of respect for the
  carriers in
 

RE: Need trusted NTP Sources

2014-02-06 Thread Frank Bulk
This doesn't address the full-mesh part, but this discussion suggests at
least four servers, but better to have five.
http://support.ntp.org/bin/view/Support/SelectingOffsiteNTPServers#Section_5
.3.3.

Frank

-Original Message-
From: Saku Ytti [mailto:s...@ytti.fi] 
Sent: Thursday, February 06, 2014 10:34 AM
To: nanog@nanog.org
Subject: Re: Need trusted NTP Sources

On (2014-02-06 07:24 -0800), Michael DeMan wrote:

 A) Run a local set of NTP servers - these are your 'trusted' servers,
under your control, properly managed/secured, fully meshed, etc.

I'm not sure if full-mesh is best practice, the external clients should have
full view of as close to source data as possible.
If in full-mesh you're already masking the data with inaccuracy, giving the
clients less information to make decision?

We used to have full-mesh in our meinbergs, until from their recommendation
we
removed it completely. It makes sense to me, but I don't understand the
issue
deeply.

-- 
  ++ytti






RE: SIP on FTTH systems

2014-02-06 Thread Frank Bulk
And then you need MACFF to overcome the split-horizon to that customers in
the same subnet can talk to each other. =)

Frank

-Original Message-
From: Mark Tinka [mailto:mark.ti...@seacom.mu] 
Sent: Thursday, February 06, 2014 8:09 AM
To: nanog@nanog.org
Subject: Re: SIP on FTTH systems

On Thursday, February 06, 2014 03:51:51 PM Anders Löwinger 
wrote:

 This is a deep hole, and basically does not work with
 IPv6.
 
 You need a bunch of stuff, proxy ND, proxy DAD, DHCPv6
 inspection, RA guard and more. One VLAN per customer and
 a separate multicast is much simpler.

If you have a reasonably intelligent AN (like some of 
today's Active-E devices), you can create so-called split 
horizons on the same bridge domain (VLAN, really) where 
customers will only communicate via the upstream BNG at 
Layer 3.

At Layer 2, even though they are all sitting on the same 
VLAN, there is no inter-communication between them.

I've also know Huawei OLT's support these split horizons 
too.

 Or do something bold, run L3 at the edge :)

BNG's are too big to distributed that deeply, even in 
distributed BNG designs. This would get costly.

Cheap switches that have decent IP/MPLS support are mostly 
geared toward Metro-E deployments, i.e., business-grade 
services. So they are quite poor with regard to susbcriber 
management features and capabilities.

Mark.




Re: SIP on FTTH systems

2014-02-06 Thread Jay Ashworth
- Original Message -
 From: Frank Bulk frnk...@iname.com

 And then you need MACFF to overcome the split-horizon to that
 customers in the same subnet can talk to each other. =)

In my not-at-all humble opinion, in an eyeball network, you almost *never*
want to make it easier for houses to talk to one another directly; there
isn't any real traffic there.  Just attack traffic.

Well, ok; slim chance of P2P, but carriers hate that anyway, right? :-)

Cheers,
-- jra
-- 
Jay R. Ashworth  Baylink   j...@baylink.com
Designer The Things I Think   RFC 2100
Ashworth  Associates   http://www.bcp38.info  2000 Land Rover DII
St Petersburg FL USA  BCP38: Ask For It By Name!   +1 727 647 1274



Re: SIP on FTTH systems

2014-02-06 Thread Mikael Abrahamsson

On Fri, 7 Feb 2014, Jay Ashworth wrote:

In my not-at-all humble opinion, in an eyeball network, you almost 
*never* want to make it easier for houses to talk to one another 
directly; there isn't any real traffic there.  Just attack traffic.


But creating a solution where you can talk to anyone else on the Internet 
but not the ones in your own neighborhood is broken, so it needs to be 
fixed. In IPv4 I've seen this solved with local-proxy-arp within the 
subnet, and for IPv6 it's easily solvable by not announcing an on-link 
network so they won't even try to communicate directly with each other but 
instead everything is routed via the ISP upstream router and then down 
again to the other customer CPE/computer.


--
Mikael Abrahamssonemail: swm...@swm.pp.se



Re: SIP on FTTH systems

2014-02-06 Thread Jay Ashworth
- Original Message -
 From: Mikael Abrahamsson swm...@swm.pp.se

 On Fri, 7 Feb 2014, Jay Ashworth wrote:
  In my not-at-all humble opinion, in an eyeball network, you almost
  *never* want to make it easier for houses to talk to one another
  directly; there isn't any real traffic there. Just attack traffic.
 
 But creating a solution where you can talk to anyone else on the Internet
 but not the ones in your own neighborhood is broken, so it needs to be
 fixed. In IPv4 I've seen this solved with local-proxy-arp within the
 subnet, and for IPv6 it's easily solvable by not announcing an on-link
 network so they won't even try to communicate directly with each other but
 instead everything is routed via the ISP upstream router and then down
 again to the other customer CPE/computer.

I did not show my work. 

I apologize.  I will try again:

If I am a commercial customer of an eyeball ISP like Road Runner: *I am 
entitled to expect that that ISP is technically capable of protecting
me from possible attack traffic from that other customer*, who's outside
my administrative span of control.  If they can send me traffic directly
across a local access subnet, that requires a much larger hammer than if
such traffic must cross the edge concentrator first, the configuration
I assert is a better choice.

Does that help?

Cheers,
-- jra
-- 
Jay R. Ashworth  Baylink   j...@baylink.com
Designer The Things I Think   RFC 2100
Ashworth  Associates   http://www.bcp38.info  2000 Land Rover DII
St Petersburg FL USA  BCP38: Ask For It By Name!   +1 727 647 1274



Re: SIP on FTTH systems

2014-02-06 Thread Mikael Abrahamsson

On Fri, 7 Feb 2014, Jay Ashworth wrote:


If I am a commercial customer of an eyeball ISP like Road Runner: *I am
entitled to expect that that ISP is technically capable of protecting
me from possible attack traffic from that other customer*, who's outside
my administrative span of control.  If they can send me traffic directly
across a local access subnet, that requires a much larger hammer than if
such traffic must cross the edge concentrator first, the configuration
I assert is a better choice.

Does that help?


Violent agreement. Customers should not talk L2 directly to each other 
using local switching, but they should be able to send IP packets to each 
other.


--
Mikael Abrahamssonemail: swm...@swm.pp.se