RFC6598 in AWS?

2016-08-04 Thread Arlington Albertson
Hey folks,

We've filed a support ticket to find out the supported level for this
range, but I wanted to see if there was anyone out there who'd experienced
using the 100.64.0.0/10 space in AWS?

Thanks,
-AA


Re: Host.us DDOS attack -and- related conversations

2016-08-04 Thread Christopher Morrow
"it's good that there aren't any easy solutions to this sort of problem..."

On Thu, Aug 4, 2016 at 12:03 PM, Robert Webb  wrote:

> Looks like ATL01 is down again hard.
>
> Although, as someone else mentioned earlier, IPv6 seems to be just fine.
>
> Robert
>
> On Wed, Aug 3, 2016 at 12:40 PM, Phil Gardner 
> wrote:
>
> > One of my VPS with them is in Atlanta, and while the IPv4 address is
> > unresponsive, the IPv6 address is working without issue.
> >
> >
> > On 08/03/2016 11:08 AM, Soon Keat Neo wrote:
> > > Back on topic about HostUS, I've been following a thread on LowEndTalk
> > > where seemingly Alexander's been updating (
> > > https://www.lowendtalk.com/discussion/comment/1791998/#Comment_1791998
> )
> > -
> > > seems like Atlanta and LA are still down ATM based on latest reports -
> > > nearly 10 hours now.
> > >
> > > Tks.
> > >
> > > Regards,
> > > Neo Soon Keat
> > >
> > >
> > >
> > > 2016-08-03 22:28 GMT+08:00 Robert Webb :
> > >
> > >> Apologies to all as the hostname in my subject is incorrect.
> > >>
> > >> It should be hostus.us...
> > >>
> > >>
> > >>
> > >> On Wed, Aug 3, 2016 at 10:25 AM, Robert Webb 
> > wrote:
> > >>
> > >>> Not sure if it is related to the PokemonGO or not. This started
> around
> > >>> 23:00 EDT last night per my monitoring.
> > >>>
> > >>> Seems like a pretty big attack at 300Gbps and to also temporarily
> take
> > a
> > >>> down a Tier 1 POP in a major city.
> > >>>
> > >>> I was interested as to if this might be a botnet or some type of
> > >>> reflection attack.
> > >>>
> > >>>
> > >>> Robert
> > >>>
> > >>> On Wed, Aug 3, 2016 at 10:16 AM, Alain Hebert 
> > >> wrote:
> > >>>
> >  Well,
> > 
> > 
> >  Could it be related to the last 2 days DDoS of PokemonGO (which
> >  failed) and some other gaming sites (Blizzard and Steam)?
> > 
> > 
> >  And on the subject of CloudFlare, I'm sorry for that CloudFlare
> >  person that defended their position earlier this week, but there may
> > be
> >  more hints (unverified) against your statements:
> > 
> >  https://twitter.com/xotehpoodle/status/756850023896322048
> > 
> >  That could be explored.
> > 
> > 
> >  On top of which there is hints (unverified) on which is the real
> > bad
> >  actor behind that new DDoS service:
> > 
> > 
> > 
> > 
> > >>
> > http://news.softpedia.com/news/pokemon-go-ddos-attacks-
> postponed-as-poodlecorp-botnet-suffers-security-breach-506910.shtml
> > 
> > 
> >  And I quote:
> > 
> >  "One thing LeakedSource staff spotted was that the first
> > payment
> >  recorded in the botnet's control panel was of $1, while payments for
> > the
> >  same package plan were of $19.99."
> > 
> >  ( Paypal payments btw )
> > 
> > 
> >  There is enough information, and damages, imho, to start looking
> > for
> >  the people responsible from a legal standpoint.  And hopefully the
> >  proper authorities are interested.
> > 
> >  PS:
> > 
> >  I will like to take this time to underline the lack of
> >  participation from a vast majority of ISPs into BCP38 and the like.
> > We
> >  need to keep educating them at every occasion we have.
> > 
> >  For those that actually implemented some sort of tech
> against
> >  it, you are a beacon of hope in what is a ridiculous situation that
> > has
> >  been happening for more than 15 years.
> > 
> >  -
> >  Alain Hebertaheb...@pubnix.net
> >  PubNIX Inc.
> >  50 boul. St-Charles
> >  P.O. Box 26770 Beaconsfield, Quebec H9W 6G7
> >  Tel: 514-990-5911  http://www.pubnix.netFax: 514-990-9443
> > 
> >  On 08/03/16 09:41, Robert Webb wrote:
> > > Anyone have any additonal info on a DDOS attack hitting host.us?
> > >
> > > Woke up to no email this morning and the following from their web
> > >> site:
> > >
> > >
> > >
> > > *Following an extortion attempt, HostUS is currently experiencing
> >  sustained
> > > large-scale DDOS attacks against a number of locations. The attacks
> > >> were
> > > measured in one location at 300Gbps. In another location the
> attacks
> > > temporarily knocked out the entire metropolitan POP for a Tier-1
> >  provider.
> > > Please be patient. We will return soon. Your understanding is
> >  appreciated.
> > >   *
> > >
> > >
> > > >From my monitoring system, looks like my VPS went unavailable
> around
> >  23:00
> > > EDT last night.
> > >
> > > Robert
> > >
> > 
> > 
> > >>>
> > >>
> >
> > --
> > Phil Gardner
> > PGP Key ID 0xFECC890C
> > OTR Fingerprint 6707E9B8 BD6062D3 5010FE8B 36D614E3 D2F80538
> >
>


Re: Host.us DDOS attack -and- related conversations

2016-08-04 Thread Robert Webb
Looks like ATL01 is down again hard.

Although, as someone else mentioned earlier, IPv6 seems to be just fine.

Robert

On Wed, Aug 3, 2016 at 12:40 PM, Phil Gardner 
wrote:

> One of my VPS with them is in Atlanta, and while the IPv4 address is
> unresponsive, the IPv6 address is working without issue.
>
>
> On 08/03/2016 11:08 AM, Soon Keat Neo wrote:
> > Back on topic about HostUS, I've been following a thread on LowEndTalk
> > where seemingly Alexander's been updating (
> > https://www.lowendtalk.com/discussion/comment/1791998/#Comment_1791998)
> -
> > seems like Atlanta and LA are still down ATM based on latest reports -
> > nearly 10 hours now.
> >
> > Tks.
> >
> > Regards,
> > Neo Soon Keat
> >
> >
> >
> > 2016-08-03 22:28 GMT+08:00 Robert Webb :
> >
> >> Apologies to all as the hostname in my subject is incorrect.
> >>
> >> It should be hostus.us...
> >>
> >>
> >>
> >> On Wed, Aug 3, 2016 at 10:25 AM, Robert Webb 
> wrote:
> >>
> >>> Not sure if it is related to the PokemonGO or not. This started around
> >>> 23:00 EDT last night per my monitoring.
> >>>
> >>> Seems like a pretty big attack at 300Gbps and to also temporarily take
> a
> >>> down a Tier 1 POP in a major city.
> >>>
> >>> I was interested as to if this might be a botnet or some type of
> >>> reflection attack.
> >>>
> >>>
> >>> Robert
> >>>
> >>> On Wed, Aug 3, 2016 at 10:16 AM, Alain Hebert 
> >> wrote:
> >>>
>  Well,
> 
> 
>  Could it be related to the last 2 days DDoS of PokemonGO (which
>  failed) and some other gaming sites (Blizzard and Steam)?
> 
> 
>  And on the subject of CloudFlare, I'm sorry for that CloudFlare
>  person that defended their position earlier this week, but there may
> be
>  more hints (unverified) against your statements:
> 
>  https://twitter.com/xotehpoodle/status/756850023896322048
> 
>  That could be explored.
> 
> 
>  On top of which there is hints (unverified) on which is the real
> bad
>  actor behind that new DDoS service:
> 
> 
> 
> 
> >>
> http://news.softpedia.com/news/pokemon-go-ddos-attacks-postponed-as-poodlecorp-botnet-suffers-security-breach-506910.shtml
> 
> 
>  And I quote:
> 
>  "One thing LeakedSource staff spotted was that the first
> payment
>  recorded in the botnet's control panel was of $1, while payments for
> the
>  same package plan were of $19.99."
> 
>  ( Paypal payments btw )
> 
> 
>  There is enough information, and damages, imho, to start looking
> for
>  the people responsible from a legal standpoint.  And hopefully the
>  proper authorities are interested.
> 
>  PS:
> 
>  I will like to take this time to underline the lack of
>  participation from a vast majority of ISPs into BCP38 and the like.
> We
>  need to keep educating them at every occasion we have.
> 
>  For those that actually implemented some sort of tech against
>  it, you are a beacon of hope in what is a ridiculous situation that
> has
>  been happening for more than 15 years.
> 
>  -
>  Alain Hebertaheb...@pubnix.net
>  PubNIX Inc.
>  50 boul. St-Charles
>  P.O. Box 26770 Beaconsfield, Quebec H9W 6G7
>  Tel: 514-990-5911  http://www.pubnix.netFax: 514-990-9443
> 
>  On 08/03/16 09:41, Robert Webb wrote:
> > Anyone have any additonal info on a DDOS attack hitting host.us?
> >
> > Woke up to no email this morning and the following from their web
> >> site:
> >
> >
> >
> > *Following an extortion attempt, HostUS is currently experiencing
>  sustained
> > large-scale DDOS attacks against a number of locations. The attacks
> >> were
> > measured in one location at 300Gbps. In another location the attacks
> > temporarily knocked out the entire metropolitan POP for a Tier-1
>  provider.
> > Please be patient. We will return soon. Your understanding is
>  appreciated.
> >   *
> >
> >
> > >From my monitoring system, looks like my VPS went unavailable around
>  23:00
> > EDT last night.
> >
> > Robert
> >
> 
> 
> >>>
> >>
>
> --
> Phil Gardner
> PGP Key ID 0xFECC890C
> OTR Fingerprint 6707E9B8 BD6062D3 5010FE8B 36D614E3 D2F80538
>


Re: NFV Solution Evaluation Methodology

2016-08-04 Thread Hugo Slabbert


On Thu 2016-Aug-04 08:20:58 +0200, Mark Tinka  wrote:



On 3/Aug/16 18:11, jim deleskie wrote:


I struggled with this whole SDN/NVF/insert marketing term for a while at
first, until I sat down and actually though about.  When I strip away all
the foo, what I'm left with is breaking things down to pieces and and
putting logo blocks together in a way that best suits what I'm doing.  It
is really going back to the way things were a long time ago in the days of
12/2400 baud models and 56k frame relay.  It doesn't help vendors vendors
that want to sell you over priced foo for features you don't really need.
It lets you, if you have clue build your own right bits. It will see some
vendors evolve, new vendors of their brand of foo appear and some vendors
die, but end of day, its no different then most of were doing back in the
"good ol days"


The way I see it, the whole SDN/NFV talk has finally devolved into
automation (separating the control and data plane is so 2013).

Automation is not new - a lot of networks have been automating for a
long time now, albeit in custom ways that only worked for them... ummh,
rephrase: was not tested in other networks.

The reason I see SDN/NFV becoming a thing is just to have a standard way
of automating. That's it.


That somewhat mirrors my take on it.  At the risk of being flamed to hell, 
I see SDN/NFV being to network operations as DevOps/CI/CM/containers are to 
dev and systems.  Both are bringing in new tools and such, but ultimately 
they *require* solid automation and having your house (systems, processes 
workflow) in order to be able to deploy, with the hype train providing 
budget allocation and sufficient buy-in to get it to fly.


You can do network automation and service provisioning without NFV and 
centralized SDN controllers, and you can do CM and good tooling without 
going headlong into DevOps.  Obviously SDN/NFV and DevOps have their own 
pieces that layer on top of that (e.g.  control plane / forwarding plane 
separation and commoditization of the forwarding hardware in the former; 
development model and "culture" in the latter), and you have to sift 
through the hype and buzzword bingo to find what if any of that would 
deliver value in your environment.  But, that doesn't mean we can't benefit 
from the advances and possible standardization in tooling and automation 
that come along for the ride.




Mark.


--
Hugo Slabbert   | email, xmpp/jabber: h...@slabnet.com
pgp key: B178313E   | also on Signal


signature.asc
Description: Digital signature


Re: Host.us DDOS attack -and- related conversations

2016-08-04 Thread Phil Gardner
One of my VPS with them is in Atlanta, and while the IPv4 address is
unresponsive, the IPv6 address is working without issue.


On 08/03/2016 11:08 AM, Soon Keat Neo wrote:
> Back on topic about HostUS, I've been following a thread on LowEndTalk
> where seemingly Alexander's been updating (
> https://www.lowendtalk.com/discussion/comment/1791998/#Comment_1791998) -
> seems like Atlanta and LA are still down ATM based on latest reports -
> nearly 10 hours now.
> 
> Tks.
> 
> Regards,
> Neo Soon Keat
> 
> 
> 
> 2016-08-03 22:28 GMT+08:00 Robert Webb :
> 
>> Apologies to all as the hostname in my subject is incorrect.
>>
>> It should be hostus.us...
>>
>>
>>
>> On Wed, Aug 3, 2016 at 10:25 AM, Robert Webb  wrote:
>>
>>> Not sure if it is related to the PokemonGO or not. This started around
>>> 23:00 EDT last night per my monitoring.
>>>
>>> Seems like a pretty big attack at 300Gbps and to also temporarily take a
>>> down a Tier 1 POP in a major city.
>>>
>>> I was interested as to if this might be a botnet or some type of
>>> reflection attack.
>>>
>>>
>>> Robert
>>>
>>> On Wed, Aug 3, 2016 at 10:16 AM, Alain Hebert 
>> wrote:
>>>
 Well,


 Could it be related to the last 2 days DDoS of PokemonGO (which
 failed) and some other gaming sites (Blizzard and Steam)?


 And on the subject of CloudFlare, I'm sorry for that CloudFlare
 person that defended their position earlier this week, but there may be
 more hints (unverified) against your statements:

 https://twitter.com/xotehpoodle/status/756850023896322048

 That could be explored.


 On top of which there is hints (unverified) on which is the real bad
 actor behind that new DDoS service:




>> http://news.softpedia.com/news/pokemon-go-ddos-attacks-postponed-as-poodlecorp-botnet-suffers-security-breach-506910.shtml


 And I quote:

 "One thing LeakedSource staff spotted was that the first payment
 recorded in the botnet's control panel was of $1, while payments for the
 same package plan were of $19.99."

 ( Paypal payments btw )


 There is enough information, and damages, imho, to start looking for
 the people responsible from a legal standpoint.  And hopefully the
 proper authorities are interested.

 PS:

 I will like to take this time to underline the lack of
 participation from a vast majority of ISPs into BCP38 and the like.  We
 need to keep educating them at every occasion we have.

 For those that actually implemented some sort of tech against
 it, you are a beacon of hope in what is a ridiculous situation that has
 been happening for more than 15 years.

 -
 Alain Hebertaheb...@pubnix.net
 PubNIX Inc.
 50 boul. St-Charles
 P.O. Box 26770 Beaconsfield, Quebec H9W 6G7
 Tel: 514-990-5911  http://www.pubnix.netFax: 514-990-9443

 On 08/03/16 09:41, Robert Webb wrote:
> Anyone have any additonal info on a DDOS attack hitting host.us?
>
> Woke up to no email this morning and the following from their web
>> site:
>
>
>
> *Following an extortion attempt, HostUS is currently experiencing
 sustained
> large-scale DDOS attacks against a number of locations. The attacks
>> were
> measured in one location at 300Gbps. In another location the attacks
> temporarily knocked out the entire metropolitan POP for a Tier-1
 provider.
> Please be patient. We will return soon. Your understanding is
 appreciated.
>   *
>
>
> >From my monitoring system, looks like my VPS went unavailable around
 23:00
> EDT last night.
>
> Robert
>


>>>
>>

-- 
Phil Gardner
PGP Key ID 0xFECC890C
OTR Fingerprint 6707E9B8 BD6062D3 5010FE8B 36D614E3 D2F80538