Re: Sites blocking ISP Addresses

2022-12-01 Thread Grant Taylor via NANOG

On 12/1/22 10:21 AM, Owen DeLong via NANOG wrote:
The WAF is under control of the site, but many sites blindly implement 
the recommendations of the WAF provider.


I have heard tell of a CDN / WAF that is generally held in good regard 
having a free tier that many people use that is much less flexible than 
the paid tiers.  As in things are enabled by default and you can't 
disable them.  --  I have no first hand experience with said CDN / WAF 
save as a consumer behind such CDN / WAF.




--
Grant. . . .
unix || die



smime.p7s
Description: S/MIME Cryptographic Signature


Re: Fwd: Alternative Re: ipv4/25s and above Re: 202212010732.AYC Re: 202211220729.AYC

2022-12-01 Thread Tom Beecher
Mr. Chen-

I don't have any interest in continuing this discussion on this topic. Best
of luck to you.

On Thu, Dec 1, 2022 at 7:44 AM Abraham Y. Chen  wrote:

> Dear Tom:
>
> Have not heard from you since the below MSG. Could you please let me
> know if you have seen it, so that we can carry on by avoiding the
> repeated open-loop situation with this thread?
>
> Regards,
>
>
> Abe (2022-12-01 07:44 EST)
>
>
> On 2022-11-22 23:23, Abraham Y. Chen wrote:
> > Dear Tom:  Please disregard an earlier partial transmission of
> > this MSG, caused by operator error. ***
> >
> > 1) One look at the NANOG archive that you retrieved tells me that we
> > are the victims of the idiosyncrasies of the eMail system. Unlike
> > snail mails that are slow but reliable (There was a story that USPS
> > found a forty years old letter stuck in one of the mail collection
> > boxes on Boston sidewalk and then delivered it.), eMails are fast
> > (Once my eMail monitoring account started to receive a long message
> > that I was sending out, even before it was fully sent.) but
> > unpredictable from time to time. Unfortunately, most of us are
> > conditioned with its daily behavior and do not suspect the electronic
> > system hiccups (As Andrew Grove once said, "It is the software, not
> > the hardware."). To deal with this kind of issues in none-real-time
> > communications, I practice a discipline, started from VM and FAX, that
> > I will do my best to respond within 24 hours. I encourage my
> > colleagues to start reminding me (either repeat the MSG or using
> > alternative channels, such as SkyPe - My handle is "Abraham.Y.Chen"),
> > if they do not hear from me after 48 hours on topics that they expect
> > my response. This convention prevented much of the disruptions.
> > Looking at your comments, I definitely would have responded back then
> > if I saw them. One possibility is that I was in the midst of being
> > overwhelmed by NANOG posting protocols, such as the digest mode,
> > uni-code, personal writing styles, etc. and miseed your MSG. Anyway,
> > allow me to try carrying on.
> >
> > 2)   "...Your proposal appears to rely on a specific value in the IP
> > option header to create your overlay": Not really, as soon as the
> > 100.64/10 netblock is replaced by the 240/4, each CG-NAT module can
> > serve a very large area (such as Tokyo Metro and such) that becomes
> > the RAN in EzIP terminology. Since each RAN is tethered from the
> > existing Internet core by an umbilical cord operating on one IPv4
> > public address, this is like a kite floating in the sky which is the
> > basic building block for the overlaying EzIP Sub-Internet when they
> > expand wide enough to begin covering significant areas of the world.
> > Note that throughout this entire process, the Option Word mechanism in
> > the IP header does not need be used at all. (It turns out that
> > utilizing the CG-NAT configuration as the EzIP deployment vehicle, the
> > only time that the Option Word may be used is when subscribers in two
> > separate RANs wishing to have end-to-end communication, such as direct
> > private eMail exchanges.)
> >
> > 3) " ... to drop any packet with an IP option set that you don't
> > explicitly want because a significant number of routers kick every
> > packet with options to CPU, ... ": Yes, this was what we were reminded
> > of when we started our study. However, this appears to be another
> > Internet myth. Dr. Chimiak of the EnIP project (see EzIP Draft's
> > Refernce 13) told me that his team had successfully sent packets with
> > Option Words. Again, even if the existing routers do knock out packs
> > with Option words, the overlay architecture of the RANs allows the
> > search for those do allow this operation. Since the use of the Option
> > Word turns out to be an option to superceed IPv4's capabilities, we
> > should treat it as a consideration for future premium services.
> >
> > 4) " ...Any device that still treated 240/4 differently would need to
> > be updated to treat it like anything else. .. ": Yes, this applies to
> > regions that desire to enjoy the EzIP characteristics. Since the root
> > of each RAN (or sub-RAN) still appears to be one of the current CG-NAT
> > modules, there is no change can be detected by other CG-NAT modules.
> > This avoids interoperability issues during the incremental deployment.
> >
> > 5) "  ...Any existing filters that dropped packets with *any* IP
> > option set would have to be modified to permit the ones you define for
> > EzIP":  Since EzIP is not going to activate Option Words initially
> > for enhancing the CG-NAT, this should not be a concern. In the future,
> > inter-RAN communication by subscribers would use Option words. But, by
> > that time, finite number of backbone / gateway routers among RANs
> > capable of preserving Option Words would have been identified. This
> > approach takes advantage of the hierarchical network configuration
> > that CG-NAT has 

Re: Sites blocking ISP Addresses

2022-12-01 Thread Mike Hammett
Pointing fingers is free. 




- 
Mike Hammett 
Intelligent Computing Solutions 
http://www.ics-il.com 

Midwest-IX 
http://www.midwest-ix.com 

- Original Message -

From: "Owen DeLong via NANOG"  
To: r...@rkhtech.org 
Cc: "James Dexter" , nanog@nanog.org 
Sent: Thursday, December 1, 2022 11:21:51 AM 
Subject: Re: Sites blocking ISP Addresses 

To make matters worse, many sites use CDNs with Web Application Firewalls. 


The WAF is under control of the site, but many sites blindly implement the 
recommendations of the WAF provider. 


So this allows the site to blame the CDN because they blindly implement their 
recommendations, while the CDN states that they cannot fix it because the WAF 
configuration is under the control of their customer. 


This was a persistent problem when I was at Akamai and has not been solved 
there yet to the best of my knowledge. Virtually every other CDN/WAF provider 
works the same way in my experience. 


Owen 






On Nov 30, 2022, at 10:28, Ryan Hamel  wrote: 



Based on experience, all I can say is good luck. They do not respond to anyone. 

Ryan 


From: NANOG  On Behalf Of James 
Dexter 
Sent: Tuesday, November 29, 2022 8:43 AM 
To: nanog@nanog.org 
Subject: Sites blocking ISP Addresses 





Dear list, 

We have address ranges that are being blocked by sites like Ticketmaster. 
Customer support is able to assist, and unable to receive a response from legal 
or hostmaster emails. What are the recommendations for requesting a removal 
from the blocked list at these sites? 





Re: Sites blocking ISP Addresses

2022-12-01 Thread Owen DeLong via NANOG
To make matters worse, many sites use CDNs with Web Application Firewalls.

The WAF is under control of the site, but many sites blindly implement the 
recommendations of the WAF provider.

So this allows the site to blame the CDN because they blindly implement their 
recommendations, while the CDN states that they cannot fix it because the WAF 
configuration is under the control of their customer.

This was a persistent problem when I was at Akamai and has not been solved 
there yet to the best of my knowledge. Virtually every other CDN/WAF provider 
works the same way in my experience.

Owen


> On Nov 30, 2022, at 10:28, Ryan Hamel  wrote:
> 
> Based on experience, all I can say is good luck. They do not respond to 
> anyone.
> 
> Ryan
>  
> From: NANOG  On Behalf Of James 
> Dexter
> Sent: Tuesday, November 29, 2022 8:43 AM
> To: nanog@nanog.org
> Subject: Sites blocking ISP Addresses
>  
> Dear list, 
> We have address ranges that are being blocked by sites like Ticketmaster. 
> Customer support is able to assist, and unable to receive a response from 
> legal or hostmaster emails. What are the recommendations for requesting a 
> removal from the blocked list at these sites? 



Remote code execution bug in FreeBSD's ping (CVE-2022-23093)

2022-12-01 Thread Mike Lewinski via NANOG
Ooof.

https://www.freebsd.org/security/advisories/FreeBSD-SA-22:15.ping.asc

Some hope here: "The ping process runs in a capability mode sandbox on all 
affected versions of FreeBSD and is thus very constrainted in how it can 
interact with the rest of the system at the point where the bug can occur."

Lots of other things are based on FreeBSD and may be affected, including 
firewalls like pfsense and OPNsense and possibly Junos. At the least I expect 
host discovery is ramping up by now.


Re: Fwd: Alternative Re: ipv4/25s and above Re: 202212010732.AYC Re: 202211220729.AYC

2022-12-01 Thread Abraham Y. Chen

Dear Tom:

Have not heard from you since the below MSG. Could you please let me 
know if you have seen it, so that we can carry on by avoiding the 
repeated open-loop situation with this thread?


Regards,


Abe (2022-12-01 07:44 EST)


On 2022-11-22 23:23, Abraham Y. Chen wrote:
Dear Tom:  Please disregard an earlier partial transmission of 
this MSG, caused by operator error. ***


1) One look at the NANOG archive that you retrieved tells me that we 
are the victims of the idiosyncrasies of the eMail system. Unlike 
snail mails that are slow but reliable (There was a story that USPS 
found a forty years old letter stuck in one of the mail collection 
boxes on Boston sidewalk and then delivered it.), eMails are fast 
(Once my eMail monitoring account started to receive a long message 
that I was sending out, even before it was fully sent.) but 
unpredictable from time to time. Unfortunately, most of us are 
conditioned with its daily behavior and do not suspect the electronic 
system hiccups (As Andrew Grove once said, "It is the software, not 
the hardware."). To deal with this kind of issues in none-real-time 
communications, I practice a discipline, started from VM and FAX, that 
I will do my best to respond within 24 hours. I encourage my 
colleagues to start reminding me (either repeat the MSG or using 
alternative channels, such as SkyPe - My handle is "Abraham.Y.Chen"), 
if they do not hear from me after 48 hours on topics that they expect 
my response. This convention prevented much of the disruptions. 
Looking at your comments, I definitely would have responded back then 
if I saw them. One possibility is that I was in the midst of being 
overwhelmed by NANOG posting protocols, such as the digest mode, 
uni-code, personal writing styles, etc. and miseed your MSG. Anyway, 
allow me to try carrying on.


2)   "...Your proposal appears to rely on a specific value in the IP 
option header to create your overlay": Not really, as soon as the 
100.64/10 netblock is replaced by the 240/4, each CG-NAT module can 
serve a very large area (such as Tokyo Metro and such) that becomes 
the RAN in EzIP terminology. Since each RAN is tethered from the 
existing Internet core by an umbilical cord operating on one IPv4 
public address, this is like a kite floating in the sky which is the 
basic building block for the overlaying EzIP Sub-Internet when they 
expand wide enough to begin covering significant areas of the world. 
Note that throughout this entire process, the Option Word mechanism in 
the IP header does not need be used at all. (It turns out that 
utilizing the CG-NAT configuration as the EzIP deployment vehicle, the 
only time that the Option Word may be used is when subscribers in two 
separate RANs wishing to have end-to-end communication, such as direct 
private eMail exchanges.)


3) " ... to drop any packet with an IP option set that you don't 
explicitly want because a significant number of routers kick every 
packet with options to CPU, ... ": Yes, this was what we were reminded 
of when we started our study. However, this appears to be another 
Internet myth. Dr. Chimiak of the EnIP project (see EzIP Draft's 
Refernce 13) told me that his team had successfully sent packets with 
Option Words. Again, even if the existing routers do knock out packs 
with Option words, the overlay architecture of the RANs allows the 
search for those do allow this operation. Since the use of the Option 
Word turns out to be an option to superceed IPv4's capabilities, we 
should treat it as a consideration for future premium services.


4) " ...Any device that still treated 240/4 differently would need to 
be updated to treat it like anything else. .. ": Yes, this applies to 
regions that desire to enjoy the EzIP characteristics. Since the root 
of each RAN (or sub-RAN) still appears to be one of the current CG-NAT 
modules, there is no change can be detected by other CG-NAT modules. 
This avoids interoperability issues during the incremental deployment.


5) "  ...Any existing filters that dropped packets with *any* IP 
option set would have to be modified to permit the ones you define for 
EzIP":  Since EzIP is not going to activate Option Words initially 
for enhancing the CG-NAT, this should not be a concern. In the future, 
inter-RAN communication by subscribers would use Option words. But, by 
that time, finite number of backbone / gateway routers among RANs 
capable of preserving Option Words would have been identified. This 
approach takes advantage of the hierarchical network configuration 
that CG-NAT has already been practicing implicitly.


6) "... ( At one point in the past, one big router vendor only allowed 
you to configure an ip-options filter based on the IANA defined 
values, not others. ) ...": Well, you are talking about the overly 
intertwined relationship between one big roouter vendor and the IANA 
which is sponsored by the former. So, this is not a technical but a 
"busniess" 

Mozilla and others move to distrust the "Trustcor" CA

2022-12-01 Thread Eric Kuhnke
https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/oxX69KFvsm4/m/yLohoVqtCgAJ

Start from the top post for a full history.