Re: mail admins?

2020-04-23 Thread Matt Palmer
On Thu, Apr 23, 2020 at 07:47:58PM -0700, Michael Thomas wrote:
> On 4/23/20 7:35 PM, Matt Palmer wrote:
> > While I do think webauthn is a neat idea, and solves at least one very real
> > problem (credential theft via phishing), you do an absolutely terrible job
> > of making that case.
> 
> see RFC 4876, it is not about phishing. not even a little bit. Never has
> been.

Whilst I do *absolutely* agree with you that "A Configuration Profile Schema
for Lightweight Directory Access Protocol (LDAP)-Based Agents" is "not about
phishing, not even a little bit", I'm not entirely sure how it advances your
argument.

- Matt



Re: mail admins?

2020-04-23 Thread Raymond Burkholder

On 2020-04-23 7:31 p.m., Michael Thomas wrote:

On 4/23/20 6:20 PM, William Herrin wrote:

On Thu, Apr 23, 2020 at 4:57 PM Michael Thomas  wrote:
Passwords over the wire are the *key* problem of computer security. 
Nothing else even comes close. One only needs to look at the LinkedIn 
salting problem to know how trivial it is to exploit password reuse. 
They are a big company and they still absolutely failed. There are a 
trillion smaller sites who are just as vulnerable, and all it takes is 
one.

You think sending encrypted passwords over the wire is more of a
problem than intentionally allowing untrusted code to run on the same
machine that contains personally sensitive information? Really? Do you
understand that when malicious code gains a sufficient foothold on
your computer, webauthn protects exactly squat?


Um, they are not encrypted. The are plain text after TLS unencrypts 
them. That is their Achilles Heal.




The ironic catch 22 is that libsodium.js runs in the browser to encrypt 
the passwords before being sent over the wire.  But happens to be 
javascript.


Re: mail admins?

2020-04-23 Thread Michael Thomas



On 4/23/20 6:20 PM, William Herrin wrote:

On Thu, Apr 23, 2020 at 4:57 PM Michael Thomas  wrote:

If you want an actual verifiable current day problem which is a clear
and present danger, you should be running as fast as you can to retrofit
every piece of web technology with webauthn to get rid of over the wire
passwords.

I think I posted about this before and got a collective ho-hum.

Yeah, it came up last week on an ARIN group and I called it "flavor of
the month." It does some interesting things on a strictly technical
level but it's a solution in search of a problem. You're not at
significant risk that your password will be captured from inside an
encrypted channel and that's all webauthn adds to other widely
deployed technologies that also haven't caught on.

PS: you clearly lack imagination. password reuse is the default. 
$SHINYNEWSITE has only to entice you to enter your reused password which 
comes out in the clear on the other side of that TLS connection.  
basically password phishing. you can whine all you like about how stupid 
they are, but you know what... that is what they average person does. 
that is reality. js exploits do not hold a candle to that problem.


Mike



Re: mail admins?

2020-04-23 Thread Michael Thomas



On 4/23/20 7:35 PM, Matt Palmer wrote:

On Thu, Apr 23, 2020 at 06:31:04PM -0700, Michael Thomas wrote:

Passwords over the wire are the *key* problem of computer security. Nothing
else even comes close.

Hmm, a bold claim, but I'm confident the author will have strong support for
their position.


One only needs to look at the LinkedIn salting problem

That was a stored password problem, not a passwords-over-the-wire problem,
but OK.  I'm sure we'll be back on track shortly.

You can't have a stored password problem if you never see them.


While I do think webauthn is a neat idea, and solves at least one very real
problem (credential theft via phishing), you do an absolutely terrible job
of making that case.


see RFC 4876, it is not about phishing. not even a little bit. Never has 
been. Please get a clue.


Mike



Re: mail admins?

2020-04-23 Thread Matt Palmer
On Thu, Apr 23, 2020 at 06:31:04PM -0700, Michael Thomas wrote:
> Passwords over the wire are the *key* problem of computer security. Nothing
> else even comes close.

Hmm, a bold claim, but I'm confident the author will have strong support for
their position.

> One only needs to look at the LinkedIn salting problem

That was a stored password problem, not a passwords-over-the-wire problem,
but OK.  I'm sure we'll be back on track shortly.

> to know how trivial it is to exploit password reuse.

Not sure how exploiting password reuse causes problems with passwords over
the wire.  Halfway through the paragraph now, still haven't seen anything
talking about passwords over the wire.  No doubt the next sentence will
address the claim in detail, though.

> They are a big company and they still absolutely failed.

Starting to think that maybe there isn't going to be the solid justification
for the topic sentence that I'd originally assumed.

> There are a trillion smaller sites who are just as vulnerable, and all it
> takes is one.

A trillion smaller sites that are just as vulnerable... to passwords over the
wire?

Wait, this is the end of the paragraph.  How odd, not a single statement in
support of the assertion.  Perhaps it's not, in fact, true, then, that
passwords over the wire are the *key* problem of computer security.

While I do think webauthn is a neat idea, and solves at least one very real
problem (credential theft via phishing), you do an absolutely terrible job
of making that case.

- Matt



Re: mail admins?

2020-04-23 Thread Bryan Fields
On 4/23/20 1:47 PM, William Herrin wrote:
> Even if mailman saw it, mailman doesn't use VERP.

Both 2.1 and 3.0 of mailman support VERP.  I've had it running for some time
on mailman 2.1.

I'm not sure how it will impact delivery time (a consideration).  I've found
it to be a non issue in my case.  I'd be willing to talk off list if anyone
wants details on how to configure and test it.
-- 
Bryan Fields

727-409-1194 - Voice
http://bryanfields.net


Re: mail admins?

2020-04-23 Thread Michael Thomas



On 4/23/20 6:20 PM, William Herrin wrote:

On Thu, Apr 23, 2020 at 4:57 PM Michael Thomas  wrote:

If you want an actual verifiable current day problem which is a clear
and present danger, you should be running as fast as you can to retrofit
every piece of web technology with webauthn to get rid of over the wire
passwords.

I think I posted about this before and got a collective ho-hum.

Yeah, it came up last week on an ARIN group and I called it "flavor of
the month." It does some interesting things on a strictly technical
level but it's a solution in search of a problem. You're not at
significant risk that your password will be captured from inside an
encrypted channel and that's all webauthn adds to other widely
deployed technologies that also haven't caught on.



Passwords over the wire are the *key* problem of computer security. 
Nothing else even comes close. One only needs to look at the LinkedIn 
salting problem to know how trivial it is to exploit password reuse. 
They are a big company and they still absolutely failed. There are a 
trillion smaller sites who are just as vulnerable, and all it takes is one.



that is infinitely more serious than some age-old js
breaches. and it is especially critical for the equipment that nanog
members run every day to configure, monitor, and manage. Ironically, it
requires... javascript browser-side.

You think sending encrypted passwords over the wire is more of a
problem than intentionally allowing untrusted code to run on the same
machine that contains personally sensitive information? Really? Do you
understand that when malicious code gains a sufficient foothold on
your computer, webauthn protects exactly squat?


Um, they are not encrypted. The are plain text after TLS unencrypts 
them. That is their Achilles Heal.


Yes, that is way more of a problem than code running in a sandbox. The 
one -- mischief. The other -- buh-bye retirement savings.


Please, get a clue.

Mike



Re: mail admins?

2020-04-23 Thread William Herrin
On Thu, Apr 23, 2020 at 4:57 PM Michael Thomas  wrote:
> If you want an actual verifiable current day problem which is a clear
> and present danger, you should be running as fast as you can to retrofit
> every piece of web technology with webauthn to get rid of over the wire
> passwords.
>
> I think I posted about this before and got a collective ho-hum.

Yeah, it came up last week on an ARIN group and I called it "flavor of
the month." It does some interesting things on a strictly technical
level but it's a solution in search of a problem. You're not at
significant risk that your password will be captured from inside an
encrypted channel and that's all webauthn adds to other widely
deployed technologies that also haven't caught on.


> that is infinitely more serious than some age-old js
> breaches. and it is especially critical for the equipment that nanog
> members run every day to configure, monitor, and manage. Ironically, it
> requires... javascript browser-side.

You think sending encrypted passwords over the wire is more of a
problem than intentionally allowing untrusted code to run on the same
machine that contains personally sensitive information? Really? Do you
understand that when malicious code gains a sufficient foothold on
your computer, webauthn protects exactly squat?

Regards,
Bill Herrin



--
William Herrin
b...@herrin.us
https://bill.herrin.us/


Re: mail admins?

2020-04-23 Thread Michael Thomas



On 4/23/20 6:07 PM, Matt Palmer wrote:

On Thu, Apr 23, 2020 at 09:10:37AM -0700, Michael Thomas wrote:

javascript is a hell of a lot safer than downloading native apps on your
phone, for example.

Because those are, of course, the *only* two possible options for accessing
information.

I'm sorry that you all need to prove as muchly as possible that you're 
capable of living in the Stone Age, but us devs give you a collective 
::yawn:: you are completely irrelevant.


Mike



Re: mail admins?

2020-04-23 Thread Matt Palmer
On Thu, Apr 23, 2020 at 09:10:37AM -0700, Michael Thomas wrote:
> javascript is a hell of a lot safer than downloading native apps on your
> phone, for example.

Because those are, of course, the *only* two possible options for accessing
information.

- Matt



Re: mail admins?

2020-04-23 Thread Matt Palmer
On Thu, Apr 23, 2020 at 04:30:28PM -0700, Michael Thomas wrote:
> Ironically it seems that the way to disable javascript is to install a
> browser extension.

Nope.  chrome://settings/content/javascript for Chromium, about:config ->
javascript.enabled in Firefox.

- Matt



Re: Best way to get foreign ISPs to shut down DDoS reflectors?

2020-04-23 Thread TJ Trout
Bottiger,

If what you are saying is true and can be backed by documentation, I would
start at the abuse contact for the offending 'Amplifier' and then start
working your way up the transits of the offending AS# until someone cuts
them off.
The Squeaky wheel gets the grease!

On Thu, Apr 23, 2020 at 3:33 PM Bottiger  wrote:

> There are many decent options for ddos protection in the US and Europe,
> however there are very few in Brazil and Asia that support BGP. Servers and
> bandwidth in these areas are much more expensive.
>
> Even though we are already doing anycast to split up the ddos attack, a
> majority of the attack traffic is now ending up in these expensive areas,
> and to top it off, these ISPs won't respond to abuse emails.
>
> It makes me wonder what the point of these abuse email are and if the
> regional registries have any power to force them to reply.
>
> On Thu, Apr 23, 2020 at 3:12 PM Compton, Rich A 
> wrote:
>
>> Good luck with that.    As Damian Menscher has presented at NANOG,
>> even if we do an amazing job and shut down 99% of all DDoS reflectors,
>> there will still be enough bandwidth to generate terabit size attacks.
>> https://stats.cybergreen.net
>>
>> I think we need to instead collectively focus on stopping the spoofed
>> traffic that allows these attacks to be generated in the first place.
>>
>> -Rich
>>
>>
>>
>> *From: *NANOG Email List  on behalf of Bottiger
>> 
>> *Date: *Thursday, April 23, 2020 at 3:32 PM
>> *To: *Siyuan Miao 
>> *Cc: *NANOG list 
>> *Subject: *Re: Best way to get foreign ISPs to shut down DDoS reflectors?
>>
>>
>>
>> We are unable to upgrade our bandwidth in those areas. There are no
>> providers within our budget there at the moment. Surely there must be some
>> way to get them to respond.
>>
>>
>>
>> On Thu, Apr 23, 2020 at 2:23 PM Siyuan Miao  wrote:
>>
>> It won't work.
>>
>>
>>
>> Get a good DDoS protection and forget about it.
>>
>>
>>
>> On Fri, Apr 24, 2020 at 5:17 AM Bottiger  wrote:
>>
>> Is there a guide on how to get foreign ISPs to shut down reflectors used
>> in DDoS attacks?
>>
>>
>>
>> I've tried sending emails listed under abuse contacts for their regional
>> registries. Either there is none listed, the email is full, email does not
>> exist, or they do not reply. Same results when sending to whatever other
>> email they have listed.
>>
>>
>>
>> Example Networks:
>>
>>
>>
>> CLARO S.A.
>>
>> Telefonica
>>
>> China Telecom
>>
>> Korea Telecom
>>
>> The contents of this e-mail message and
>> any attachments are intended solely for the
>> addressee(s) and may contain confidential
>> and/or legally privileged information. If you
>> are not the intended recipient of this message
>> or if this message has been addressed to you
>> in error, please immediately alert the sender
>> by reply e-mail and then delete this message
>> and any attachments. If you are not the
>> intended recipient, you are notified that
>> any use, dissemination, distribution, copying,
>> or storage of this message or any attachment
>> is strictly prohibited.
>>
>


Re: Best way to get foreign ISPs to shut down DDoS reflectors?

2020-04-23 Thread Damian Menscher via NANOG
On Thu, Apr 23, 2020 at 3:26 PM Ca By  wrote:

> On Thu, Apr 23, 2020 at 3:14 PM Compton, Rich A 
> wrote:
>
>> Good luck with that.    As Damian Menscher has presented at NANOG,
>> even if we do an amazing job and shut down 99% of all DDoS reflectors,
>> there will still be enough bandwidth to generate terabit size attacks.
>> https://stats.cybergreen.net
>>
>> I think we need to instead collectively focus on stopping the spoofed
>> traffic that allows these attacks to be generated in the first place.
>>
>> -Rich
>>
>
> The bcp38 religion has failed to deliver the promised land for 20 years.
>

That's because it's been opt-in for thousands of ASNs.

1 spoofer is all you need to trigger all the reflectors.
>

A handful of transit providers is all you need to identify and filter all
sources of spoofing.

I do bcp38, i encourage others to as well, but i do not plan on it
> unclogging the pipes in my lifetime.
>
> You will get more miles from ACL dropping and policing known bad traffic
> (most of udp)
>

Do you have 10 Tbps of spare ingress capacity?  If not, you should re-think
your strategy (which may simply include a playbook for how to explain
the outage to your customers).

Damian

*From: *NANOG Email List  on behalf of Bottiger <
>> bottige...@gmail.com>
>> *Date: *Thursday, April 23, 2020 at 3:32 PM
>> *To: *Siyuan Miao 
>>
>> *Cc: *NANOG list 
>> *Subject: *Re: Best way to get foreign ISPs to shut down DDoS reflectors?
>>
>>
>>
>> We are unable to upgrade our bandwidth in those areas. There are no
>> providers within our budget there at the moment. Surely there must be some
>> way to get them to respond.
>>
>>
>>
>> On Thu, Apr 23, 2020 at 2:23 PM Siyuan Miao  wrote:
>>
>> It won't work.
>>
>>
>>
>> Get a good DDoS protection and forget about it.
>>
>>
>>
>> On Fri, Apr 24, 2020 at 5:17 AM Bottiger  wrote:
>>
>> Is there a guide on how to get foreign ISPs to shut down reflectors used
>> in DDoS attacks?
>>
>>
>>
>> I've tried sending emails listed under abuse contacts for their regional
>> registries. Either there is none listed, the email is full, email does not
>> exist, or they do not reply. Same results when sending to whatever other
>> email they have listed.
>>
>>
>>
>> Example Networks:
>>
>>
>>
>> CLARO S.A.
>>
>> Telefonica
>>
>> China Telecom
>>
>> Korea Telecom
>>
>> The contents of this e-mail message and
>> any attachments are intended solely for the
>> addressee(s) and may contain confidential
>> and/or legally privileged information. If you
>> are not the intended recipient of this message
>> or if this message has been addressed to you
>> in error, please immediately alert the sender
>> by reply e-mail and then delete this message
>> and any attachments. If you are not the
>> intended recipient, you are notified that
>> any use, dissemination, distribution, copying,
>> or storage of this message or any attachment
>> is strictly prohibited.
>>
>


Re: mail admins?

2020-04-23 Thread Michael Thomas



On 4/23/20 4:40 PM, William Herrin wrote:

On Thu, Apr 23, 2020 at 4:13 PM Scott Weeks  wrote:

--- m...@mtcc.com wrote:

I'm not sure why the admins of nanog's site should
particularly care about appeasing the js tinfoil hat
set.

Not the tin foil hat crowd, security.

Can't it be both?

Mobile code (javascript) has a long a storied history of security
disaster. So yes, I surf with javascript disabled and when I run in to
a web site that I can't use without it about 75% of the time I back up
to the search engine and pick a different web site because I don't
want to let my computer run the horrid crapware the site author thinks
I should allow him to run.

Does controlling what I allow my computer to run make me a member of
the tinfoil hat set? Watching folks around me use their equipment,
it's apparent that it does. Is it good security hygiene? Why yes, it's
that too.


Billions of people and by far the vast majority of users on the planet 
use js enabled sites. Would that it were that it was even in the top 1% 
of security problems we face.


The fact is, nobody in devland cares whatsoever about this non-issue. 
that the nanog site ran without the need of js is more of an accident of 
history more likely than not: if it ain't broke don't fix it.


If you want an actual verifiable current day problem which is a clear 
and present danger, you should be running as fast as you can to retrofit 
every piece of web technology with webauthn to get rid of over the wire 
passwords. that is infinitely more serious than some age-old js 
breaches. and it is especially critical for the equipment that nanog 
members run every day to configure, monitor, and manage. Ironically, it 
requires... javascript browser-side.


I think I posted about this before and got a collective ho-hum.

Mike


Re: mail admins?

2020-04-23 Thread William Herrin
On Thu, Apr 23, 2020 at 4:13 PM Scott Weeks  wrote:
> --- m...@mtcc.com wrote:
>> I'm not sure why the admins of nanog's site should
>> particularly care about appeasing the js tinfoil hat
>> set.
>
> Not the tin foil hat crowd, security.

Can't it be both?

Mobile code (javascript) has a long a storied history of security
disaster. So yes, I surf with javascript disabled and when I run in to
a web site that I can't use without it about 75% of the time I back up
to the search engine and pick a different web site because I don't
want to let my computer run the horrid crapware the site author thinks
I should allow him to run.

Does controlling what I allow my computer to run make me a member of
the tinfoil hat set? Watching folks around me use their equipment,
it's apparent that it does. Is it good security hygiene? Why yes, it's
that too.

Regards,
Bill Herrin


-- 
William Herrin
b...@herrin.us
https://bill.herrin.us/


Re: mail admins?

2020-04-23 Thread Michael Thomas

On 4/23/20 4:13 PM, Scott Weeks wrote:


--- m...@mtcc.com wrote:
From: Michael Thomas 

I'm not sure why the admins of nanog's site should
particularly care about appeasing the js tinfoil hat
set. i mean, computers computing! who will stop this
madness!
-


Not the tin foil hat crowd, security.  Computers be
computing with or without security.  Many turn off JS.
Especially in this crowd.  The only time I wanted to
use the site anyway was to find a thread as I can't
seem to find them well in search engines.  For example,
what was the thread about SOHO firewalls and pfsense
not too long ago?  I can't remember what everyone was
saying about a pfsense replacement as pfsense is no
longer what it was.  I am having to greenfield my home
network and want to find a nerdable "dual WAN' firewall.
That's off topic, though, as it's just a home network
question.

Unless your $DAYJOB consists solely of not using browsers whatsoever, 
you cannot function without javascript.


Ironically it seems that the way to disable javascript is to install a 
browser extension. which is both javascript and outside the browser 
sandbox. *those* i fear.


Mike




Re: mail admins?

2020-04-23 Thread Scott Weeks



--- m...@mtcc.com wrote:
From: Michael Thomas 

I'm not sure why the admins of nanog's site should 
particularly care about appeasing the js tinfoil hat 
set. i mean, computers computing! who will stop this 
madness!
-


Not the tin foil hat crowd, security.  Computers be
computing with or without security.  Many turn off JS.
Especially in this crowd.  The only time I wanted to 
use the site anyway was to find a thread as I can't 
seem to find them well in search engines.  For example, 
what was the thread about SOHO firewalls and pfsense
not too long ago?  I can't remember what everyone was 
saying about a pfsense replacement as pfsense is no 
longer what it was.  I am having to greenfield my home 
network and want to find a nerdable "dual WAN' firewall.  
That's off topic, though, as it's just a home network 
question.

scott



Re: mail admins?

2020-04-23 Thread Michael Thomas



On 4/23/20 12:15 PM, Scott Weeks wrote:


--- m...@mtcc.com wrote


So I should just get used to configuring routers with HTTP and
Notepad and forget about that nasty, old, 20th century vi crap? :)

No, but complaining about javascript on websites
-


Just to be clear, I was only complaining about NANOG's site.
Well, ARIN's, too. I get what you're saying for the internet
in general.  It seems NANOG could see javascript being
blocked and redirect folks to a non-insecure (javascript)
site like others (twitter, for example) do.  Then, I could
use Lynx! (kidding!) :)

I'm not sure why the admins of nanog's site should particularly care 
about appeasing the js tinfoil hat set. i mean, computers computing! who 
will stop this madness!


Mike



Re: Best way to get foreign ISPs to shut down DDoS reflectors?

2020-04-23 Thread Bottiger
There are many decent options for ddos protection in the US and Europe,
however there are very few in Brazil and Asia that support BGP. Servers and
bandwidth in these areas are much more expensive.

Even though we are already doing anycast to split up the ddos attack, a
majority of the attack traffic is now ending up in these expensive areas,
and to top it off, these ISPs won't respond to abuse emails.

It makes me wonder what the point of these abuse email are and if the
regional registries have any power to force them to reply.

On Thu, Apr 23, 2020 at 3:12 PM Compton, Rich A 
wrote:

> Good luck with that.    As Damian Menscher has presented at NANOG, even
> if we do an amazing job and shut down 99% of all DDoS reflectors, there
> will still be enough bandwidth to generate terabit size attacks.
> https://stats.cybergreen.net
>
> I think we need to instead collectively focus on stopping the spoofed
> traffic that allows these attacks to be generated in the first place.
>
> -Rich
>
>
>
> *From: *NANOG Email List  on behalf of Bottiger <
> bottige...@gmail.com>
> *Date: *Thursday, April 23, 2020 at 3:32 PM
> *To: *Siyuan Miao 
> *Cc: *NANOG list 
> *Subject: *Re: Best way to get foreign ISPs to shut down DDoS reflectors?
>
>
>
> We are unable to upgrade our bandwidth in those areas. There are no
> providers within our budget there at the moment. Surely there must be some
> way to get them to respond.
>
>
>
> On Thu, Apr 23, 2020 at 2:23 PM Siyuan Miao  wrote:
>
> It won't work.
>
>
>
> Get a good DDoS protection and forget about it.
>
>
>
> On Fri, Apr 24, 2020 at 5:17 AM Bottiger  wrote:
>
> Is there a guide on how to get foreign ISPs to shut down reflectors used
> in DDoS attacks?
>
>
>
> I've tried sending emails listed under abuse contacts for their regional
> registries. Either there is none listed, the email is full, email does not
> exist, or they do not reply. Same results when sending to whatever other
> email they have listed.
>
>
>
> Example Networks:
>
>
>
> CLARO S.A.
>
> Telefonica
>
> China Telecom
>
> Korea Telecom
>
> The contents of this e-mail message and
> any attachments are intended solely for the
> addressee(s) and may contain confidential
> and/or legally privileged information. If you
> are not the intended recipient of this message
> or if this message has been addressed to you
> in error, please immediately alert the sender
> by reply e-mail and then delete this message
> and any attachments. If you are not the
> intended recipient, you are notified that
> any use, dissemination, distribution, copying,
> or storage of this message or any attachment
> is strictly prohibited.
>


Re: Best way to get foreign ISPs to shut down DDoS reflectors?

2020-04-23 Thread Ca By
On Thu, Apr 23, 2020 at 3:14 PM Compton, Rich A 
wrote:

> Good luck with that.    As Damian Menscher has presented at NANOG, even
> if we do an amazing job and shut down 99% of all DDoS reflectors, there
> will still be enough bandwidth to generate terabit size attacks.
> https://stats.cybergreen.net
>
> I think we need to instead collectively focus on stopping the spoofed
> traffic that allows these attacks to be generated in the first place.
>
> -Rich
>

The bcp38 religion has failed to deliver the promised land for 20 years.

1 spoofer is all you need to trigger all the reflectors.

I do bcp38, i encourage others to as well, but i do not plan on it
unclogging the pipes in my lifetime.

You will get more miles from ACL dropping and policing known bad traffic
(most of udp)

>
>
> *From: *NANOG Email List  on behalf of Bottiger <
> bottige...@gmail.com>
> *Date: *Thursday, April 23, 2020 at 3:32 PM
> *To: *Siyuan Miao 
>
> *Cc: *NANOG list 
> *Subject: *Re: Best way to get foreign ISPs to shut down DDoS reflectors?
>
>
>
> We are unable to upgrade our bandwidth in those areas. There are no
> providers within our budget there at the moment. Surely there must be some
> way to get them to respond.
>
>
>
> On Thu, Apr 23, 2020 at 2:23 PM Siyuan Miao  wrote:
>
> It won't work.
>
>
>
> Get a good DDoS protection and forget about it.
>
>
>
> On Fri, Apr 24, 2020 at 5:17 AM Bottiger  wrote:
>
> Is there a guide on how to get foreign ISPs to shut down reflectors used
> in DDoS attacks?
>
>
>
> I've tried sending emails listed under abuse contacts for their regional
> registries. Either there is none listed, the email is full, email does not
> exist, or they do not reply. Same results when sending to whatever other
> email they have listed.
>
>
>
> Example Networks:
>
>
>
> CLARO S.A.
>
> Telefonica
>
> China Telecom
>
> Korea Telecom
>
> The contents of this e-mail message and
> any attachments are intended solely for the
> addressee(s) and may contain confidential
> and/or legally privileged information. If you
> are not the intended recipient of this message
> or if this message has been addressed to you
> in error, please immediately alert the sender
> by reply e-mail and then delete this message
> and any attachments. If you are not the
> intended recipient, you are notified that
> any use, dissemination, distribution, copying,
> or storage of this message or any attachment
> is strictly prohibited.
>


Re: Best way to get foreign ISPs to shut down DDoS reflectors?

2020-04-23 Thread William Herrin
On Thu, Apr 23, 2020 at 2:38 PM Shawn L via NANOG  wrote:
> This brings up an interesting question -- what is "good DDoS protection" on 
> an ISP scale?  Apart from having enough bandwidth to weather the attack and 
> having upstream providers attempt to filter it for you/

Hi Shawn,

I believe the normal mechanism is that you use BGP to sink the
impacted /24s at many high-bandwidth exchange points worldwide,
filter, and pass the traffic which  the filter accepts back to your
core infrastructure via a tunnel (VPN).

Build or buy.

If it's practical to sink the bandwidth near the DDOS target, I
wouldn't think it was much of a DDOS.

A question which interests me: How many attacks do folks find landing
in the middle-ground between "annoying but readily handled" and "far
beyond my ability?"

Regards,
Bill Herrin


-- 
William Herrin
b...@herrin.us
https://bill.herrin.us/


Re: Best way to get foreign ISPs to shut down DDoS reflectors?

2020-04-23 Thread Compton, Rich A
Good luck with that.    As Damian Menscher has presented at NANOG, even if we 
do an amazing job and shut down 99% of all DDoS reflectors, there will still be 
enough bandwidth to generate terabit size attacks. https://stats.cybergreen.net
I think we need to instead collectively focus on stopping the spoofed traffic 
that allows these attacks to be generated in the first place.
-Rich

From: NANOG Email List  on behalf of Bottiger 

Date: Thursday, April 23, 2020 at 3:32 PM
To: Siyuan Miao 
Cc: NANOG list 
Subject: Re: Best way to get foreign ISPs to shut down DDoS reflectors?

We are unable to upgrade our bandwidth in those areas. There are no providers 
within our budget there at the moment. Surely there must be some way to get 
them to respond.

On Thu, Apr 23, 2020 at 2:23 PM Siyuan Miao 
mailto:avel...@misaka.io>> wrote:
It won't work.

Get a good DDoS protection and forget about it.

On Fri, Apr 24, 2020 at 5:17 AM Bottiger 
mailto:bottige...@gmail.com>> wrote:
Is there a guide on how to get foreign ISPs to shut down reflectors used in 
DDoS attacks?

I've tried sending emails listed under abuse contacts for their regional 
registries. Either there is none listed, the email is full, email does not 
exist, or they do not reply. Same results when sending to whatever other email 
they have listed.

Example Networks:

CLARO S.A.
Telefonica
China Telecom
Korea Telecom
E-MAIL CONFIDENTIALITY NOTICE: 
The contents of this e-mail message and any attachments are intended solely for 
the addressee(s) and may contain confidential and/or legally privileged 
information. If you are not the intended recipient of this message or if this 
message has been addressed to you in error, please immediately alert the sender 
by reply e-mail and then delete this message and any attachments. If you are 
not the intended recipient, you are notified that any use, dissemination, 
distribution, copying, or storage of this message or any attachment is strictly 
prohibited.


Re: Best way to get foreign ISPs to shut down DDoS reflectors?

2020-04-23 Thread Compton, Rich A
The answer is “it depends”.  What are you trying to accomplish?  Are you trying 
to detect and surgically mitigate every DDoS attack?  If so, you will need a 
good DDoS attack detection and mitigation solution and a team of people to run 
it or a 3rd party company that can do this for you.  Do you want a cheap 
solution?  There are open source projects that can detect DDoS attacks and 
generate RTBHs, flowspec rules, and inline filters that can block the traffic 
(eg. https://fastnetmon.com).  Also, RTBHs can usually be advertised upstream 
(and to UTRS https://www.team-cymru.com/utrs.html) to reduce the amount of 
attack traffic that the victim network receives.  Some ISPs just do the RTBH to 
the customer’s IP when there’s a DDoS and then force the customer to get 
another IP via DHCP, etc.

-Rich

From: NANOG Email List  on behalf of NANOG list 

Reply-To: Shawn L 
Date: Thursday, April 23, 2020 at 3:39 PM
To: NANOG list 
Subject: Re: Best way to get foreign ISPs to shut down DDoS reflectors?


This brings up an interesting question -- what is "good DDoS protection" on an 
ISP scale?  Apart from having enough bandwidth to weather the attack and having 
upstream providers attempt to filter it for you/




-Original Message-
From: "Bottiger" 
Sent: Thursday, April 23, 2020 5:30pm
To: "Siyuan Miao" 
Cc: "North American Network Operators' Group" 
Subject: Re: Best way to get foreign ISPs to shut down DDoS reflectors?
We are unable to upgrade our bandwidth in those areas. There are no providers 
within our budget there at the moment. Surely there must be some way to get 
them to respond.

On Thu, Apr 23, 2020 at 2:23 PM Siyuan Miao 
mailto:avel...@misaka.io>> wrote:
It won't work.
Get a good DDoS protection and forget about it.

On Fri, Apr 24, 2020 at 5:17 AM Bottiger 
mailto:bottige...@gmail.com>> wrote:
Is there a guide on how to get foreign ISPs to shut down reflectors used in 
DDoS attacks?
I've tried sending emails listed under abuse contacts for their regional 
registries. Either there is none listed, the email is full, email does not 
exist, or they do not reply. Same results when sending to whatever other email 
they have listed.
Example Networks:
CLARO S.A.
Telefonica
China Telecom
Korea Telecom
E-MAIL CONFIDENTIALITY NOTICE: 
The contents of this e-mail message and any attachments are intended solely for 
the addressee(s) and may contain confidential and/or legally privileged 
information. If you are not the intended recipient of this message or if this 
message has been addressed to you in error, please immediately alert the sender 
by reply e-mail and then delete this message and any attachments. If you are 
not the intended recipient, you are notified that any use, dissemination, 
distribution, copying, or storage of this message or any attachment is strictly 
prohibited.


Re: Best way to get foreign ISPs to shut down DDoS reflectors?

2020-04-23 Thread Shawn L via NANOG

This brings up an interesting question -- what is "good DDoS protection" on an 
ISP scale?  Apart from having enough bandwidth to weather the attack and having 
upstream providers attempt to filter it for you/
 


-Original Message-
From: "Bottiger" 
Sent: Thursday, April 23, 2020 5:30pm
To: "Siyuan Miao" 
Cc: "North American Network Operators' Group" 
Subject: Re: Best way to get foreign ISPs to shut down DDoS reflectors?



We are unable to upgrade our bandwidth in those areas. There are no providers 
within our budget there at the moment. Surely there must be some way to get 
them to respond.


On Thu, Apr 23, 2020 at 2:23 PM Siyuan Miao <[ avel...@misaka.io ]( 
mailto:avel...@misaka.io )> wrote:
It won't work.
Get a good DDoS protection and forget about it.


On Fri, Apr 24, 2020 at 5:17 AM Bottiger <[ bottige...@gmail.com ]( 
mailto:bottige...@gmail.com )> wrote:
Is there a guide on how to get foreign ISPs to shut down reflectors used in 
DDoS attacks?
I've tried sending emails listed under abuse contacts for their regional 
registries. Either there is none listed, the email is full, email does not 
exist, or they do not reply. Same results when sending to whatever other email 
they have listed.
Example Networks:
CLARO S.A.
Telefonica
China Telecom
Korea Telecom

Re: Best way to get foreign ISPs to shut down DDoS reflectors?

2020-04-23 Thread Filip Hruska
Sounds like you'll need to talk to your upstreams if they can provide DDOS 
protection, alternatively look for remote DDOS protection options.

Regards,
Filip

On 23 April 2020 11:30:36 pm GMT+02:00, Bottiger  wrote:
>We are unable to upgrade our bandwidth in those areas. There are no
>providers within our budget there at the moment. Surely there must be
>some
>way to get them to respond.
>
>On Thu, Apr 23, 2020 at 2:23 PM Siyuan Miao  wrote:
>
>> It won't work.
>>
>> Get a good DDoS protection and forget about it.
>>
>> On Fri, Apr 24, 2020 at 5:17 AM Bottiger 
>wrote:
>>
>>> Is there a guide on how to get foreign ISPs to shut down reflectors
>used
>>> in DDoS attacks?
>>>
>>> I've tried sending emails listed under abuse contacts for their
>regional
>>> registries. Either there is none listed, the email is full, email
>does not
>>> exist, or they do not reply. Same results when sending to whatever
>other
>>> email they have listed.
>>>
>>> Example Networks:
>>>
>>> CLARO S.A.
>>> Telefonica
>>> China Telecom
>>> Korea Telecom
>>>
>>

-- 
Sent from my mobile device. Please excuse my brevity.

Re: Best way to get foreign ISPs to shut down DDoS reflectors?

2020-04-23 Thread Bottiger
We are unable to upgrade our bandwidth in those areas. There are no
providers within our budget there at the moment. Surely there must be some
way to get them to respond.

On Thu, Apr 23, 2020 at 2:23 PM Siyuan Miao  wrote:

> It won't work.
>
> Get a good DDoS protection and forget about it.
>
> On Fri, Apr 24, 2020 at 5:17 AM Bottiger  wrote:
>
>> Is there a guide on how to get foreign ISPs to shut down reflectors used
>> in DDoS attacks?
>>
>> I've tried sending emails listed under abuse contacts for their regional
>> registries. Either there is none listed, the email is full, email does not
>> exist, or they do not reply. Same results when sending to whatever other
>> email they have listed.
>>
>> Example Networks:
>>
>> CLARO S.A.
>> Telefonica
>> China Telecom
>> Korea Telecom
>>
>


Re: Comcast - Significant v4 vs v6 throughput differences, almost stateful.

2020-04-23 Thread Matthew Petach
On Thu, Apr 23, 2020 at 12:45 PM Sabri Berisha 
wrote:

> - On Apr 23, 2020, at 8:06 AM, Nick Zurku 
> wrote:
>
> We’re having serious throughput issues with our AS20326 pushing packets to
> Comcast over v4. Our transfers are either the full line-speed of the
> Comcast customer modem, or they’re seemingly capped at 200-300KB/s. This
> behavior appears to be almost stateful, as if the speed is decided when the
> connection starts. As long as it starts fast it will remain fast for the
> length of the transfer and slow if it starts slow. Traces seem reasonable
> and currently we’ve influenced the path onto GTT both ways. If we prepend
> and reroute on our side, the same exact issue with happen on another
> transit provider.
>
> Have you tried running a test to see if there may be ECMP issues? I wrote
> a rudimentary script once, https://pastebin.com/TTWEj12T, that might help
> here. This script is written to detect packet loss on multiple ECMP paths,
> but you might be able to modify it for througput.
>
> The rationale behind my thinking is that if you have certain ECMP links
> that are oversubscribed, the TCP sessions following that path will stay
> "low" bandwidth. Sessions what win the ECMP lottery and pass through a
> non-congested ECMP path may show better performance.
>
> Thanks,
>
> Sabri
>


And for a slightly more formal package to do this,
there's UDPing, developed by the amazing networking
team at Yahoo; it was written to identify intermittent
issues affecting a single link in an ECMP or L2-hashed
aggregate link pathway.

https://github.com/yahoo/UDPing

It does have the disadvantage of being designed for
one-way measurement in each direction; that decision
was intentional, to ensure each direction was measuring
a completely known, deterministic pathway based on the
hash values in the packets, without the return trip potentially
obscuring or complicating identification of problematic links.

But if you have access to both the source and destination ends
of the connection, it's a wonderful tool to narrow down exactly
where the underlying problem on a hashed ECMP/aggregate
link is.

Matt


Re: Best way to get foreign ISPs to shut down DDoS reflectors?

2020-04-23 Thread Siyuan Miao
It won't work.

Get a good DDoS protection and forget about it.

On Fri, Apr 24, 2020 at 5:17 AM Bottiger  wrote:

> Is there a guide on how to get foreign ISPs to shut down reflectors used
> in DDoS attacks?
>
> I've tried sending emails listed under abuse contacts for their regional
> registries. Either there is none listed, the email is full, email does not
> exist, or they do not reply. Same results when sending to whatever other
> email they have listed.
>
> Example Networks:
>
> CLARO S.A.
> Telefonica
> China Telecom
> Korea Telecom
>


Best way to get foreign ISPs to shut down DDoS reflectors?

2020-04-23 Thread Bottiger
Is there a guide on how to get foreign ISPs to shut down reflectors used in
DDoS attacks?

I've tried sending emails listed under abuse contacts for their regional
registries. Either there is none listed, the email is full, email does not
exist, or they do not reply. Same results when sending to whatever other
email they have listed.

Example Networks:

CLARO S.A.
Telefonica
China Telecom
Korea Telecom


Re: xplornet contact or any experience with their satellite service?

2020-04-23 Thread Brian J. Murrell
On Tue, 2020-04-21 at 18:54 +, Mel Beckman wrote:
> It’s not really oversold bandwidth. It’s just that the turnaround
> time for a bolus of data is too long for two-way video conferencing
> to be smooth or reliable. It’s like video conferencing using post
> cards :)

Except that videoconferencing is just the victim of the problem, and
the problem is bursty bandwidth not latency.  In fact, the back-and-
forth of conversation is actually surprisingly decent for satellite. 
Not as much "talking over" as I would have suspected.

But put the victim application aside, the real data is in the iperf3
results I posted, demonstrating how bursty the throughput is.  The
problem with that of course is that the "lowest" bandwidth "valleys"
becomes the "constant bandwidth" that the codec uses rather than the
average -- which of course cannot be used for real-time VC.

Cheers,
b.



signature.asc
Description: This is a digitally signed message part


Re: Venmo - Geolocation Challenges

2020-04-23 Thread Mike Hammett
I'm trying to build a list that has anyone of consequence on it for 
geolocation\VPN issues. 


http://thebrotherswisp.com/index.php/geo-and-vpn/ 


If you get anywhere with Venmo, let me know so I can add it to the list. 




- 
Mike Hammett 
Intelligent Computing Solutions 
http://www.ics-il.com 

Midwest-IX 
http://www.midwest-ix.com 

- Original Message -

From: "Justin Krejci"  
To: nanog@nanog.org 
Sent: Thursday, April 23, 2020 1:42:18 PM 
Subject: Venmo - Geolocation Challenges 



Hello, 


I am looking for a Venmo network contact that can assist with a geolocation 
error in their systems. We have customers on a particular IP prefix who are 
being flagged by Venmo as outside of the USA but they are not outside of the 
USA. All standard geolocation systems I can find, as well as ARIN, all show the 
IP prefix as within the USA. Normal Venmo support channels are not fruitful to 
resolve the issue, they mostly just indicated users need to use their mobile 
data connection to get a different IP address for Venmo transactions. That is 
fine as a temporary work around but that is not a solution. Venmo support has 
expressed they are not going to do anything more for us in this regard. 


So if anyone has a relevant contact I might reach out to at Venmo or knows if 
Venmo uses a particular 3rd party geolocation data set and can share that with 
me that would be appreciated. I don't mind working with any organization to 
straighten out any stale data, I just need some assistance getting to someone 
who has the info or access. 


Thanks!! 
Justin Krejci 




Re: Comcast - Significant v4 vs v6 throughput differences, almost stateful.

2020-04-23 Thread Sabri Berisha
- On Apr 23, 2020, at 8:06 AM, Nick Zurku  wrote: 

> We’re having serious throughput issues with our AS20326 pushing packets to
> Comcast over v4. Our transfers are either the full line-speed of the Comcast
> customer modem, or they’re seemingly capped at 200-300KB/s. This behavior
> appears to be almost stateful, as if the speed is decided when the connection
> starts. As long as it starts fast it will remain fast for the length of the
> transfer and slow if it starts slow. Traces seem reasonable and currently 
> we’ve
> influenced the path onto GTT both ways. If we prepend and reroute on our side,
> the same exact issue with happen on another transit provider.

Have you tried running a test to see if there may be ECMP issues? I wrote a 
rudimentary script once, [ https://pastebin.com/TTWEj12T | 
https://pastebin.com/TTWEj12T ] , that might help here. This script is written 
to detect packet loss on multiple ECMP paths, but you might be able to modify 
it for througput. 

The rationale behind my thinking is that if you have certain ECMP links that 
are oversubscribed, the TCP sessions following that path will stay "low" 
bandwidth. Sessions what win the ECMP lottery and pass through a non-congested 
ECMP path may show better performance. 

Thanks, 

Sabri 


Re: mail admins?

2020-04-23 Thread Scott Weeks



--- m...@mtcc.com wrote

> So I should just get used to configuring routers with HTTP and
> Notepad and forget about that nasty, old, 20th century vi crap? :)

No, but complaining about javascript on websites 
-


Just to be clear, I was only complaining about NANOG's site. 
Well, ARIN's, too. I get what you're saying for the internet 
in general.  It seems NANOG could see javascript being 
blocked and redirect folks to a non-insecure (javascript) 
site like others (twitter, for example) do.  Then, I could 
use Lynx! (kidding!) :)

scott


Venmo - Geolocation Challenges

2020-04-23 Thread Justin Krejci
Hello,


I am looking for a Venmo network contact that can assist with a geolocation 
error in their systems. We have customers on a particular IP prefix who are 
being flagged by Venmo as outside of the USA but they are not outside of the 
USA. All standard geolocation systems I can find, as well as ARIN, all show the 
IP prefix as within the USA. Normal Venmo support channels are not fruitful to 
resolve the issue, they mostly just indicated users need to use their mobile 
data connection to get a different IP address for Venmo transactions. That is 
fine as a temporary work around but that is not a solution. Venmo support has 
expressed they are not going to do anything more for us in this regard.


So if anyone has a relevant contact I might reach out to at Venmo or knows if 
Venmo uses a particular 3rd party geolocation data set and can share that with 
me that would be appreciated. I don't mind working with any organization to 
straighten out any stale data, I just need some assistance getting to someone 
who has the info or access.


Thanks!!

Justin Krejci



Re: Comcast - Significant v4 vs v6 throughput differences, almost stateful.

2020-04-23 Thread Nick Zurku
We started getting the wave of complaints over the last two weeks or so.
Perhaps up to a month ago was when the initial few issues that were
reported but were chalked up to being “an issues out on the internet.”

Did your issues in CT start on a certain date?

-- 
Nick Zurku
Systems Engineer
TeraSwitch, Inc.
Office: 412-945-7048
nzu...@teraswitch.com

On April 23, 2020 at 11:24:59 AM, Dovid Bender (do...@telecurve.com) wrote:

We have customers in CT with the same issues. When did this start?


On Thu, Apr 23, 2020 at 11:07 AM Nick Zurku  wrote:

> Hello all,
>
> I would appreciate if someone from Comcast could contact me about this.
>
> We’re having serious throughput issues with our AS20326 pushing packets to
> Comcast over v4. Our transfers are either the full line-speed of the
> Comcast customer modem, or they’re seemingly capped at 200-300KB/s. This
> behavior appears to be almost stateful, as if the speed is decided when the
> connection starts. As long as it starts fast it will remain fast for the
> length of the transfer and slow if it starts slow. Traces seem reasonable
> and currently we’ve influenced the path onto GTT both ways. If we prepend
> and reroute on our side, the same exact issue with happen on another
> transit provider.
>
> This issue does not affect v6 and that is full speed on every attempt.
> This may be regionalized to the Comcast Pittsburgh market.
>
> This is most widely affecting our linux mirror repository server:
> http://mirror.pit.teraswitch.com/
> Our colocation customers who are hosting VPN systems are also noticing
> bottlenecks have started recently for their Comcast employees.
>
> --
> Nick Zurku
> Systems Engineer
> TeraSwitch, Inc.
> nzu...@teraswitch.com
>


Re: mail admins?

2020-04-23 Thread William Herrin
On Thu, Apr 23, 2020 at 1:33 AM Rich Kulawiec  wrote:
> - I've received erroneous bounces from @email.uscc.net as well.
> It should be possible to track down the culprit via Mailman's logs
> and the MTA's logs.

Hi Rich,

One of the annoyances with both those guys and the swedish folks is
that they're not sending messages to the return path, they're
responding to the header from address. Mailman at NANOG never sees it.
It doesn't pass through their servers.

Even if mailman saw it, mailman doesn't use VERP. It has to scan the
message to match the subscriber and that doesn't consistently work.
The subscriber address forwards to another address, the second address
bounces and the bounce message doesn't necessarily contain the
original subscriber address.

To identify these jokers the ops will probably have to send a unique
message to each subscriber with crafted headers. That can be folded in
to a message that would go to the list anyway but the capability isn't
baked in to mailman.


> - There is zero point in obfuscating email addresses in archives or
> anywhere else on the 'net.  None.  There hasn't been any point for
> most of twenty years.

Not with open subscription where any spammer can join the list to
harvest the addresses of everybody who sends.

Regards,
Bill Herrin


-- 
William Herrin
b...@herrin.us
https://bill.herrin.us/


Re: "Is BGP safe yet?" test

2020-04-23 Thread Andrey Kostin

Vincent Bernat писал 2020-04-22 15:26:

❦ 22 avril 2020 12:51 -04, Andrey Kostin:


BTW, has anybody yet thought/looked into extending RPKI-RTR protocol
for validation of prefixes received from peer-as to make ingress
filtering more dynamic and move away prefix filters from the routers?


It could be used as is if the client implementations were a bit more
flexible.

With BIRD, you decide which AS to match. So you can match on the
neighbor AS instead of the origin AS. Then, you can use something like
GoRTR which accepts using JSON files instead of the RPKI as source. 
BIRD

also allows you to have several ROA tables. So, you can check against
the "real" RPKI as well as against your custom IRR-based RPKI.


That's what I meant. So I guess IX operators already can use BIRD on 
route-servers for prefix filtering. I think it could be useful on hw 
routers as well.


Kind regards,
Andrey


Re: FlowSpec

2020-04-23 Thread Denys Fedoryshchenko

On 2020-04-23 19:12, Roland Dobbins wrote:

On 23 Apr 2020, at 22:57, Denys Fedoryshchenko wrote:


In general operators don't like flowspec


Its increasing popularity tens to belie this assertion.

Yes, you're right that avoiding overflowing the TCAM is very
important.  But as Rich notes, a growing number of operators are in
fact using flowspec within their own networks, when it's appropriate.

One of operators told me why they dont provide flowspec anymore:
customers are installing rules by scripts, stacking them,
and not removing then when they dont need them anymore.
RETN solved that by limiting number of rules customer can install.



Smart network operators tend to do quite a bit of lab testing,
prototyping, PoCs, et. al. against the very specific combinations of
platforms/linecards/ASICs/OSes/trains/revisions before generally
deploying new features and functionality; this helps ameliorate many
concerns.
Definitely, and i know some hosting operators who provide Flowspec 
functionality
different way - over their own web interface/API. This way they can do 
unit tests,

and do additional verifications.

But if there is direct BGP, things like 
https://dyn.com/blog/longer-is-not-better/
might happen, if customer is using some exotic, "nightly-build" BGP 
implementation.




Re: "Is BGP safe yet?" test

2020-04-23 Thread Andrey Kostin

Christopher Morrow писал 2020-04-22 14:05:


a question about the data types here...
So, a neighbor with no downstream ASN could be filtered directly with
ROA == prefixlist-content.
A neighbor with a downstream ASN has to be ROA (per asn downstream) ==
prefixlist-content.

So you'd now have to do some calculations which are more complicated
than just; "is roa for this prefix here and valid" to construct a
prefix-list.
correct?


Sorry, and this sidesteps the intent of the peer as well. For instance
you may have
a peer with 2 'downstream' asn, only 1 of which they wish to provide
transit to you
(from you?) for... how would you know this intent/policy from the
peer's perspective?
today you know that (most likely) from IRR data.

is your answer ASPA / AS-Cone ?


ASPA/As-Cone is a concept about whole as-path verification afaik, but I 
may be mistaken.
ROA validation prevents hijacking but doesn't prevent route-leaks. If my 
transit providers already do ROV, effect of doing it in local network 
will be limited to direct peers only and expected to be considerably 
small. For route-leaks prevention we still have to rely on IRR and 
filters configured directly on routers. Maintaining filters on routers 
is quite intensive task and they took a lot of space in the 
configuration. Adopting validation or similar mechanism for it could 
make it more dynamic and less resources-consuming. Or maybe I'm trying 
to invent a bicycle?


Kind regards,
Andrey


Re: Comcast - Significant v4 vs v6 throughput differences, almost stateful.

2020-04-23 Thread William Herrin
On Thu, Apr 23, 2020 at 8:06 AM Nick Zurku  wrote:
> We’re having serious throughput issues with our AS20326 pushing packets to 
> Comcast over v4. Our transfers are either the full line-speed of the Comcast 
> customer modem, or they’re seemingly capped at 200-300KB/s. This behavior 
> appears to be almost stateful, as if the speed is decided when the connection 
> starts. As long as it starts fast it will remain fast for the length of the 
> transfer and slow if it starts slow.

Hi Nick,

That's actually kinda normal for TCP behavior. The two most dominating
factors in TCP throughput are the round-trip time (RTT) and how large
the congestion window has grown prior to the first lost packet. Other
factors (including later mild packet loss) tend to move the needle so
slowly you might not notice it moving at all.

One of the interesting patterns with TCP is that the sender tends to
shove out all the packets it can in the first few percent of the RTT
and then sits idle. When the bandwidths are relatively fast, the
receiver receives and acks them all in a short time window as well. As
a result you get these high-bandwidth spurts where packet loss due to
full buffers is likely even though for most of the RTT there are no
packets being transmitted at all. It can take several minutes for
packets to spread out within the RTT, and by then the congestion
window (hence throughput) is firmly established.

Regards,
Bill Herrin


-- 
William Herrin
b...@herrin.us
https://bill.herrin.us/


Re: FlowSpec

2020-04-23 Thread Roland Dobbins



On 23 Apr 2020, at 22:57, Denys Fedoryshchenko wrote:


In general operators don't like flowspec


Its increasing popularity tens to belie this assertion.

Yes, you're right that avoiding overflowing the TCAM is very important.  
But as Rich notes, a growing number of operators are in fact using 
flowspec within their own networks, when it's appropriate.


Smart network operators tend to do quite a bit of lab testing, 
prototyping, PoCs, et. al. against the very specific combinations of 
platforms/linecards/ASICs/OSes/trains/revisions before generally 
deploying new features and functionality; this helps ameliorate many 
concerns.


Also, don't forget about S/RTBH.  It's generally confined to within an 
operator's own span of administrative control for some of the same 
reasons as flowspec (not generally TCAM, per se, but concerns about 
giving Customer A the ability to interfere with Customer B's traffic, 
and the difficulty of implementing such constraints).  It can be an 
option worth exploring, in many circumstances.



Roland Dobbins 


Re: mail admins?

2020-04-23 Thread Michael Thomas



On 4/21/20 7:46 PM, Scott Weeks wrote:


--- m...@mtcc.com wrote:

From: Michael Thomas 
To: nanog@nanog.org
Subject: Re: mail admins?
Date: Tue, 21 Apr 2020 17:34:36 -0700


On 4/21/20 5:19 PM, Scott Weeks wrote:



I think you just need to let scripts run in your browser for
nanog.org.

sad.  http://nanog.org used to be the brilliant example of a fully
featured web site sans javascript, flash, ...
---


I'm not one to plus-one anything, but this should be plus-infinity.
I whined about it a year or so ago.  Crickets.  I gave up on doing
anything on the web site because I can't get anything to work
unless I make my computer less secure.  Sad trend.  More flash and
trash marketing crap and less network engineering acumen.  Like
configuring routers from a web browser, rather than a CLI...


this ship left port in the 90's. you might as well be an old man yelling
at clouds. oh wait, randy does kind of resemble grandpa simpson :)
--



So I should just get used to configuring routers with HTTP and
Notepad and forget about that nasty, old, 20th century vi crap? :)


No, but complaining about javascript on websites is about as relevant 
today as complaining that the horsepoop pushers union is lacking 
relevance. javascript is a hell of a lot safer than downloading native 
apps on your phone, for example. and don't get me started on OAUTH being 
used for native apps...


Mike



Re: FlowSpec

2020-04-23 Thread Denys Fedoryshchenko

On 2020-04-23 18:13, Colton Conor wrote:

Do any of the large transit providers support FlowSpec to transit
customers / other carriers, or is that not a thing since they want to
sell DDoS protection services? FlowSpec sounds much better than RTBH
(remotely triggered blackhole), but I am not sure if  FlowSpec is
widely implemented. I see the large router manufacturers support it.


RETN

They have extended blackholing, and FlowSpec, sure its all have costs.
I'm using both services from them and quite satisfied.

In general operators don't like flowspec, because it is not easy to 
implement it right,

there is bugs and most important its "eating" TCAM.
For example: 
https://blog.cloudflare.com/todays-outage-post-mortem-82515/


Re: FlowSpec

2020-04-23 Thread Denys Fedoryshchenko

On 2020-04-23 18:13, Colton Conor wrote:

Do any of the large transit providers support FlowSpec to transit
customers / other carriers, or is that not a thing since they want to
sell DDoS protection services? FlowSpec sounds much better than RTBH
(remotely triggered blackhole), but I am not sure if  FlowSpec is
widely implemented. I see the large router manufacturers support it.

RETN considered Tier-2?
They offer it, but it is more expensive than


Re: Comcast - Significant v4 vs v6 throughput differences, almost stateful.

2020-04-23 Thread Ca By
On Thu, Apr 23, 2020 at 8:27 AM Dovid Bender  wrote:

> We have customers in CT with the same issues. When did this start?
>

Seems to have started 5 years ago when we ran out of ipv4 and all comers
needed to embrace ipv4 life-support mechanisms

https://www.arin.net/vault/announcements/2015/20150924.html

The e2e ipv6 internet being faster and more robust than life-supported,
bot-ridden, and scarce ipv4 is a feature, not a bug.

https://www.internetsociety.org/blog/2015/04/facebook-news-feeds-load-20-40-faster-over-ipv6/




>
> On Thu, Apr 23, 2020 at 11:07 AM Nick Zurku  wrote:
>
>> Hello all,
>>
>> I would appreciate if someone from Comcast could contact me about this.
>>
>> We’re having serious throughput issues with our AS20326 pushing packets
>> to Comcast over v4. Our transfers are either the full line-speed of the
>> Comcast customer modem, or they’re seemingly capped at 200-300KB/s. This
>> behavior appears to be almost stateful, as if the speed is decided when the
>> connection starts. As long as it starts fast it will remain fast for the
>> length of the transfer and slow if it starts slow. Traces seem reasonable
>> and currently we’ve influenced the path onto GTT both ways. If we prepend
>> and reroute on our side, the same exact issue with happen on another
>> transit provider.
>>
>> This issue does not affect v6 and that is full speed on every attempt.
>> This may be regionalized to the Comcast Pittsburgh market.
>>
>> This is most widely affecting our linux mirror repository server:
>> http://mirror.pit.teraswitch.com/
>> Our colocation customers who are hosting VPN systems are also noticing
>> bottlenecks have started recently for their Comcast employees.
>>
>> --
>> Nick Zurku
>> Systems Engineer
>> TeraSwitch, Inc.
>> nzu...@teraswitch.com
>>
>


Re: FlowSpec

2020-04-23 Thread Compton, Rich A
Hi Colton,
It is fairly common to use flowspec internally at an ISP for mitigation of DDoS 
attacks.  eBGP flowspec is not very common though.  I know of only a couple of 
ISPs that allow flowspec rules to be advertised by their customers.  The 
biggest issue with this is that other providers are very hesitant to allow an 
external party to reach into their routers and modify the configuration (add a 
flowspec rule).  I (with others at my company) had attempted to work on this to 
provide a validation mechanism that would be performed on the advertised rules 
before adding them to the router.  We didn’t see much interest at that time on 
this.  https://www.youtube.com/watch?v=rKEz8mXcC7o
From conversations I have had with a couple of large ISPs recently it seems 
like there is an increased interest in this topic.
Here is a document on flowspec best practices that I worked on for M3AAWG that 
may be of interest: 
https://www.m3aawg.org/sites/default/files/m3aawg-flowspec-bp-2019-02.pdf

-Rich

From: NANOG Email List  on behalf of Colton Conor 

Date: Thursday, April 23, 2020 at 9:15 AM
To: NANOG list 
Subject: FlowSpec

Do any of the large transit providers support FlowSpec to transit customers / 
other carriers, or is that not a thing since they want to sell DDoS protection 
services? FlowSpec sounds much better than RTBH (remotely triggered blackhole), 
but I am not sure if  FlowSpec is widely implemented. I see the large router 
manufacturers support it.





E-MAIL CONFIDENTIALITY NOTICE: 
The contents of this e-mail message and any attachments are intended solely for 
the addressee(s) and may contain confidential and/or legally privileged 
information. If you are not the intended recipient of this message or if this 
message has been addressed to you in error, please immediately alert the sender 
by reply e-mail and then delete this message and any attachments. If you are 
not the intended recipient, you are notified that any use, dissemination, 
distribution, copying, or storage of this message or any attachment is strictly 
prohibited.


Re: Comcast - Significant v4 vs v6 throughput differences, almost stateful.

2020-04-23 Thread Dovid Bender
We have customers in CT with the same issues. When did this start?


On Thu, Apr 23, 2020 at 11:07 AM Nick Zurku  wrote:

> Hello all,
>
> I would appreciate if someone from Comcast could contact me about this.
>
> We’re having serious throughput issues with our AS20326 pushing packets to
> Comcast over v4. Our transfers are either the full line-speed of the
> Comcast customer modem, or they’re seemingly capped at 200-300KB/s. This
> behavior appears to be almost stateful, as if the speed is decided when the
> connection starts. As long as it starts fast it will remain fast for the
> length of the transfer and slow if it starts slow. Traces seem reasonable
> and currently we’ve influenced the path onto GTT both ways. If we prepend
> and reroute on our side, the same exact issue with happen on another
> transit provider.
>
> This issue does not affect v6 and that is full speed on every attempt.
> This may be regionalized to the Comcast Pittsburgh market.
>
> This is most widely affecting our linux mirror repository server:
> http://mirror.pit.teraswitch.com/
> Our colocation customers who are hosting VPN systems are also noticing
> bottlenecks have started recently for their Comcast employees.
>
> --
> Nick Zurku
> Systems Engineer
> TeraSwitch, Inc.
> nzu...@teraswitch.com
>


FlowSpec

2020-04-23 Thread Colton Conor
Do any of the large transit providers support FlowSpec to transit customers
/ other carriers, or is that not a thing since they want to sell DDoS
protection services? FlowSpec sounds much better than RTBH (remotely
triggered blackhole), but I am not sure if  FlowSpec is widely implemented.
I see the large router manufacturers support it.


Comcast - Significant v4 vs v6 throughput differences, almost stateful.

2020-04-23 Thread Nick Zurku
Hello all,

I would appreciate if someone from Comcast could contact me about this.

We’re having serious throughput issues with our AS20326 pushing packets to
Comcast over v4. Our transfers are either the full line-speed of the
Comcast customer modem, or they’re seemingly capped at 200-300KB/s. This
behavior appears to be almost stateful, as if the speed is decided when the
connection starts. As long as it starts fast it will remain fast for the
length of the transfer and slow if it starts slow. Traces seem reasonable
and currently we’ve influenced the path onto GTT both ways. If we prepend
and reroute on our side, the same exact issue with happen on another
transit provider.

This issue does not affect v6 and that is full speed on every attempt. This
may be regionalized to the Comcast Pittsburgh market.

This is most widely affecting our linux mirror repository server:
http://mirror.pit.teraswitch.com/
Our colocation customers who are hosting VPN systems are also noticing
bottlenecks have started recently for their Comcast employees.

-- 
Nick Zurku
Systems Engineer
TeraSwitch, Inc.
nzu...@teraswitch.com


IGMPv3/MLDv2 implementation and deployment survey

2020-04-23 Thread John Kristoff
[ Apologies if you've seen this already - jtk ]

Friends,

Those of you with knowledge, interest, or deployment experience with
IP multicast in real networks should consider taking the survey linked
to below. Forwarded with knowledge and permission of the original email
author.

The survey deadline has been extended to the end of this month.

John

From: Stig Venaas 
Date: Tue, Feb 25, 2020 at 1:24 PM
Subject: Re: IGMPv3/MLDv2 implementation and deployment survey
To: 
Cc: 


The IETF PIM Working Group intends to progress IGMPv3 and MLDv2 from
Proposed Standards to Internet Standards. To facilitate that, the working
group  would like to get input from operators and others deploying multicast,
and implementors of these protocols, to learn what the current
implementation and deployment status is.

If you are using multicast, or have implemented these protocols, please
respond to the survey at
https://jisc.onlinesurveys.ac.uk/implementation-and-deployment-of-igmpv3-and-mldv2

It is sufficient to get responses from one person from each organization.
The survey closes on March 13 2020.

To get input from as many organizations as possible, please help forward
this email, or distribute the URL, to any contacts you may have that have
deployment or implementation experiences, on relevant mailing lists etc.

If you have any queries about the survey, please contact the PIM WG chairs
at pim-cha...@ietf.org.

Regards Stig and Mike


Re: mail admins?

2020-04-23 Thread Bryan Holloway



On 4/23/20 6:43 AM, John Osmon wrote:

On Wed, Apr 22, 2020 at 08:05:39AM +0300, Töma Gavrichenkov wrote:

On Wed, Apr 22, 2020, 12:45 AM Randy Bush  wrote:


sad.  http://nanog.org used to be the brilliant example of a fully
featured web site sans javascript, flash, ...



That was long ago now.  It was using Cvent for everything meeting-related
for 3 years already, and Cvent doesn't feel good with JS turned off.


Yes -- I think we all understand the technical problems with the site.

Thanks for helping Randy with being precise.



https://www.youtube.com/watch?v=tJ-LivK4-78

Sorry -- couldn't resist. Believe me, I've been on the receiving end of 
this myself.


Re: mail admins?

2020-04-23 Thread Rich Kulawiec
[ Bunch of replies to messages in thread bundled here. ]

On Tue, Apr 21, 2020 at 06:28:48PM -0400, Bryan Fields wrote:
> It's a mailman list, so nanog-ow...@nanog.org should work.  If not reach out
> to the communications committee.

All mailing lists should support that, regardless of what's running them.
Mailman, thankfully, makes it easy for configuring it by default.

Other topics:

- I've received erroneous bounces from @email.uscc.net as well.
It should be possible to track down the culprit via Mailman's logs
and the MTA's logs.

- There is zero point in obfuscating email addresses in archives or
anywhere else on the 'net.  None.  There hasn't been any point for
most of twenty years. It's cargo cult "privacy" and that capability
should be excised from Mailman's source code, because its presence
unfortunately encourages people to indulge in a worst practice.

- I also volunteered (in 2018? not sure, need coffee) to help out
with -owner technical issues, but never heard anything back.

- One of the queries that I've sent but not had an answer to is
whether the entire archives are available in "mbox" format.  (Including
the older ones.)  If they are, then it should be pretty easy to fold
the old pre-Mailman archives into the current with-Mailman archives.

---rsk