Re: Strange IPSEC traffic

2023-11-13 Thread Adrian Minta

On 11/13/23 19:10, Shawn L via NANOG wrote:


Is anyone else seeing a lot of 'strange' IPSEC traffic?  We started 
seeing logs of IPSEC with invalid spi on Friday. We're seeing it on 
pretty much all of our PE routers, none of which are setup to do 
anything VPN related.  Most are just routing local customer traffic.


decaps: rec'd IPSEC packet has invalid spi for destaddr=X.X.X.X, 
prot=50, spi=0x9D2D(2636972032), srcaddr=211.112.195.167, input 
interface=TenGigabitEthernet0/0/11


decaps: rec'd IPSEC packet has invalid spi for destaddr=Y.Y.Y.Y, 
prot=50, spi=0x1469(342425600), srcaddr=74.116.56.244, input 
interface=TenGigabitEthernet0/0/5


The destination address is always one of our customer's ip addresses.  
The source seems to be all over the place, mostly Russia, Korea, China 
or south east asia.  It's not really impacting anything at the moment, 
just rather annoying.


Thanks

Shawn



Hi Shawn,

we saw a lot of syslog messages like these and the targets are cisco 
devices, some of witch, according to the data sheets, are not even 
capable of ipsec.


Cisco is punting some ESP traffic to control plane on ios and ios-xe 
devices, regardless of the configuration.


Last week somebody on the internet started a campaign to scan and 
perhaps to exploit some zero day ipsec vulnerabilities.



This is the list of ip addresses we saw: https://pastebin.com/vrLRai9Q

--
Best regards,
Adrian Minta



Re: massive facebook outage presently

2021-10-04 Thread Adrian Minta

https://www.youtube.com/watch?v=gmk673M5BoA

On 10/4/21 7:03 PM, Eric Kuhnke wrote:
https://downdetector.com/status/facebook/ 
<https://downdetector.com/status/facebook/>


Normally not worth mentioning random $service having an outage here, 
but this will undoubtedly generate a large volume of customer service 
calls.


Appears to be failure in DNS resolution.


--
Best regards,
Adrian Minta




Re: Unexplainable router log entries mentioning IPSEC from Yahoo IPs

2020-12-18 Thread Adrian Minta
=203.84.212.20
Dec    18    02:49:16:    %CRYPTO-4-RECVD_PKT_INV_SPI:    decaps: 
rec'd    IPSEC    packet    has    invalid    spi    for 
destaddr=    prot=50 spi=0x4CF4BE5D(1291107933)    
srcaddr=203.84.212.51
Dec    18    02:45:59:    %CRYPTO-4-RECVD_PKT_INV_SPI:    decaps: 
rec'd    IPSEC    packet    has    invalid    spi    for 
destaddr=    prot=50 spi=0x4CF4BE5D(1291107933)    
srcaddr=66.196.91.232
Dec    18    02:42:21:    %CRYPTO-4-RECVD_PKT_INV_SPI:    decaps: 
rec'd    IPSEC    packet    has    invalid    spi    for 
destaddr=    prot=50 spi=0x4CF4BE5D(1291107933)    
srcaddr=203.84.212.23
Dec    18    02:33:05:    %CRYPTO-4-RECVD_PKT_INV_SPI:    decaps: 
rec'd    IPSEC    packet    has    invalid    spi    for 
destaddr=    prot=50 spi=0x4CF4BE5D(1291107933)    
srcaddr=203.84.212.37
Dec    18    02:30:46:    %CRYPTO-4-RECVD_PKT_INV_SPI:    decaps: 
rec'd    IPSEC    packet    has    invalid    spi    for 
destaddr=    prot=50 spi=0x4CF4BE5D(1291107933)    
srcaddr=203.84.212.50
Dec    18    02:23:02:    %CRYPTO-4-RECVD_PKT_INV_SPI:    decaps: 
rec'd    IPSEC    packet    has    invalid    spi    for 
destaddr=    prot=50 spi=0x4CF4BE5D(1291107933)    
srcaddr=203.84.212.20
Dec    18    00:57:45:    %CRYPTO-4-RECVD_PKT_INV_SPI:    decaps: 
rec'd    IPSEC    packet    has    invalid    spi    for 
destaddr=    prot=50 spi=0x4CF4BE5D(1291107933)    
srcaddr=203.84.212.50
Dec    17    17:06:12:    %CRYPTO-4-RECVD_PKT_INV_SPI:    decaps: 
rec'd    IPSEC    packet    has    invalid    spi    for 
destaddr=    prot=50 spi=0x4CF4BE5D(1291107933)    
srcaddr=68.180.160.18
Dec    17    14:45:06.899:    %CRYPTO-4-RECVD_PKT_INV_SPI: decaps:    
rec'd    IPSEC    packet    has    invalid    spi for    
destaddr=    prot=50 spi=0x4CF4BE5D(1291107933)    
srcaddr=68.180.160.34
Dec    17    16:38:03:    %CRYPTO-4-RECVD_PKT_INV_SPI:    decaps: 
rec'd    IPSEC    packet    has    invalid    spi    for 
destaddr=    prot=50 spi=0x4CF4BE5D(1291107933)    
srcaddr=203.84.212.37
Dec    17    16:28:13:    %CRYPTO-4-RECVD_PKT_INV_SPI:    decaps: 
rec'd    IPSEC    packet    has    invalid    spi    for 
destaddr=    prot=50 spi=0x4CF4BE5D(1291107933)    
srcaddr=203.84.212.40
Dec    17    16:24:06:    %CRYPTO-4-RECVD_PKT_INV_SPI:    decaps: 
rec'd    IPSEC    packet    has    invalid    spi    for 
destaddr=    prot=50 spi=0x4CF4BE5D(1291107933)    
srcaddr=68.180.160.99
Dec    17    15:14:03:    %CRYPTO-4-RECVD_PKT_INV_SPI:    decaps: 
rec'd    IPSEC    packet    has    invalid    spi    for 
destaddr=    prot=50 spi=0x4CF4BE5D(1291107933)    
srcaddr=68.180.160.40
Dec    17    15:06:40:    %CRYPTO-4-RECVD_PKT_INV_SPI:    decaps: 
rec'd    IPSEC    packet    has    invalid    spi    for 
destaddr=    prot=50 spi=0x4CF4BE5D(1291107933)    
srcaddr=68.180.160.100
Dec    17    08:57:00:    %CRYPTO-4-RECVD_PKT_INV_SPI:    decaps: 
rec'd    IPSEC    packet    has    invalid    spi    for 
destaddr=    prot=50 spi=0xEF7ED795(4018067349)    
srcaddr=68.180.160.23
Dec    17    08:25:36:    %CRYPTO-4-RECVD_PKT_INV_SPI:    decaps: 
rec'd    IPSEC    packet    has    invalid    spi    for 
destaddr=    prot=50 spi=0xEF7ED795(4018067349)    
srcaddr=68.180.160.104
Dec    17    08:11:54:    %CRYPTO-4-RECVD_PKT_INV_SPI:    decaps: 
rec'd    IPSEC    packet    has    invalid    spi    for 
destaddr=    prot=50 spi=0xEF7ED795(4018067349)    
srcaddr=68.180.160.19
Dec    17    07:22:22:    %CRYPTO-4-RECVD_PKT_INV_SPI:    decaps: 
rec'd    IPSEC    packet    has    invalid    spi    for 
destaddr=    prot=50 spi=0xEF7ED795(4018067349)    
srcaddr=203.84.212.55
Dec    17    06:18:55:    %CRYPTO-4-RECVD_PKT_INV_SPI:    decaps: 
rec'd    IPSEC    packet    has    invalid    spi    for 
destaddr=    prot=50 spi=0xEF7ED795(4018067349)    
srcaddr=68.180.160.20
Dec    17    06:14:35:    %CRYPTO-4-RECVD_PKT_INV_SPI:    decaps: 
rec'd    IPSEC    packet    has    invalid    spi    for 
destaddr=    prot=50 spi=0xEF7ED795(4018067349)    
srcaddr=203.84.212.36
Dec    17    06:13:05:    %CRYPTO-4-RECVD_PKT_INV_SPI:    decaps: 
rec'd    IPSEC    packet    has    invalid    spi    for 
destaddr=    prot=50 spi=0xEF7ED795(4018067349)    
srcaddr=203.84.212.17
Dec    17    05:36:24:    %CRYPTO-4-RECVD_PKT_INV_SPI:    decaps: 
rec'd    IPSEC    packet    has    invalid    spi    for 
destaddr=    prot=50 spi=0xEF7ED795(4018067349)    
srcaddr=203.84.212.53
Dec    17    01:56:17:    %CRYPTO-4-RECVD_PKT_INV_SPI:    decaps: 
rec'd    IPSEC    packet    has    invalid    spi    for 
destaddr=    prot=50 spi=0xEF7ED795(4018067349)    
srcaddr=68.180.160.17
Dec    17    03:27:47:    %CRYPTO-4-RECVD_PKT_INV_SPI:    decaps: 
rec'd    IPSEC    packet    has    invalid    spi    for 
destaddr=    prot=50 spi=0xEF7ED795(4018067349)    
srcaddr=203.84.212.34


--
Best regards,
Adrian Minta




Re: Product for heat containment per rack unit?

2020-08-13 Thread Adrian Minta

https://objects.eanixter.com/PD317813.PDF

On 8/13/20 9:26 PM, David Hubbard wrote:


Curious if anyone has knowledge of a vendor / product designed to make 
it possible to use back-to-front cooled equipment in racks that need 
to be ‘sealed’ for heat containment reasons?  I’d envision this 
looking like some kind of adjustable depth sleeve, to get the cold air 
to the equipment, and perhaps a brush strip opening to allow power 
cables in?


Thanks!


--
Best regards,
Adrian Minta




Re: Widespread Firefox issues

2019-05-03 Thread Adrian Minta

My temporary solution was to set "xpinstall.signatures.required" to "false".


On 5/4/19 4:55 AM, Brielle Bruns wrote:

Just an FYI since this is bound to impact users:

https://bugzilla.mozilla.org/show_bug.cgi?id=1548973

Basically, Mozilla forgot to renew an intermediate cert, and people's 
Firefox browsers have mass-disabled addons.


Whoops.


--
Best regards,
Adrian Minta




whois.radb.net down ?

2016-01-22 Thread Adrian Minta

Anyone else seeing the radb.net whois server as being down?


$ date
Sat Jan 23 00:04:29 EET 2016

$ ping whois.radb.net
PING whois.radb.net (207.75.117.18) 56(84) bytes of data.
^C
--- whois.radb.net ping statistics ---
7 packets transmitted, 0 received, 100% packet loss, time 6047ms

$ telnet whois.radb.net 43
Trying 207.75.117.18...
^C

--
Best regards,
Adrian Minta




Re: Linux router traffic monitoring, how? netflow?

2014-11-14 Thread Adrian Minta
Softflowd is also nice, supports Netflow versions 1, 5 and 9 and is 
fully IPv6-capable.

The package is included on ubuntu  debian.


On 14.11.2014 20:38, srn.na...@prgmr.com wrote:

fprobe is a linux-based netflow probe that uses libpcap (as does tcpdump) and 
is already in the
ubuntu universe repository. There is an ipv4-only iptables based version too 
called fprobe-ulog.

For collectors, it looks like the ones already available in ubuntu are nfcapd 
from nfdump and
flow-capture from flow-tools. For analysis/alerts, cacti with the thold and 
flowview plugins might
do the job.




--
Best regards,
Adrian Minta




Re: BGPMON Alert Questions

2014-04-02 Thread Adrian Minta

Already too late :(

*Delivery has failed to these recipients or groups:*

indriana.triyunianingt...@indosat.com 
mailto:indriana.triyunianingt...@indosat.com
The recipient's mailbox is full and can't accept messages now. Please 
try resending this message later, or contact the recipient directly.





On 02.04.2014 23:40, Aris Lambrianidis wrote:

Contacted ip@indosat.com about this, I urge others to do the same.

--Aris


On Wed, Apr 2, 2014 at 9:33 PM, Andrew (Andy) Ashley
andre...@aware.co.thwrote:


Hi All,

I am a network admin for Aware Corporation AS18356 (Thailand), as
mentioned in the alert.
We operate a BGPMon PeerMon node on our network, which peers with the
BGPMon service as a collector.

It is likely that AS4761 (INDOSAT) has somehow managed to hijack these
prefixes and CAT (Communications Authority of Thailand AS4651) is not
filtering them,
hence they are announced to us and are triggering these BGPMon alerts.

I have had several mails to our NOC about this already and have responded
directly to those.
I suggest contacting Indosat directly to get this resolved.
AS18356 is a stub AS, so we are not actually advertising these learned
hijacked prefixes to anyone but BGPMon for data collection purposes.





--
Best regards,
Adrian Minta




Re: 10gbps peering subscriber switch recommendation

2014-01-06 Thread Adrian Minta

Good morning,
We're in the market to move our IX peering off of our core (too much
BGP/CPU :-/ ) and onto a dedicated switch.



Brocade ICX 7750 Switch seems to satisfy all the requirements.

--
Best regards,
Adrian Minta





Re: anybody seeing mail problems sending to yahoo.com? (and a yahoo email contact?)

2014-01-04 Thread Adrian Minta

I'm seeing the same thing:

Jan  4 19:13:20 mail2 postfix/error[21241]: 8C9BD1F20045: relay=none, 
delay=30958, delays=30835/121/0/2.1, dsn=4.4.2, status=deferred 
(delivery temporarily suspended: lost connection with 
mta5.am0.yahoodns.net[98.136.217.202] while sending end of data -- 
message may be sent more than once)
Jan  4 19:19:44 mail2 postfix/smtp[21813]: 3993E1F20045: 
relay=mta7.am0.yahoodns.net[66.196.118.33]:25, delay=98, 
delays=0.58/0.03/46/51, dsn=4.4.2, status=deferred (lost connection with 
mta7.am0.yahoodns.net[66.196.118.33] while sending end of data -- 
message may be sent more than once)
Jan  4 19:19:44 mail2 postfix/smtp[21813]: 3993E1F20045: 
relay=mta7.am0.yahoodns.net[66.196.118.33]:25, delay=98, 
delays=0.58/0.03/46/51, dsn=4.4.2, status=deferred (lost connection with 
mta7.am0.yahoodns.net[66.196.118.33] while sending end of data -- 
message may be sent more than once)



--
Best regards,
Adrian Minta




Re: Attack on the DNS ?

2012-03-31 Thread Adrian Minta
We already have this type of attack in Bucharest/Romania since last 
Friday. The targets where IP's of some local webhosters, but at one 
moment we event saw IP's from Go Daddy.

Tcpdump will show something like:
11:10:41.447079 IP target  open_resolver_ip.53: 80+ [1au] ANY? isc.org. 
(37)
11:10:41.447082 IP target  open_resolver_ip.53: 59147+ [1au] ANY? 
isc.org. (37)
11:10:41.447084 IP target  open_resolver_ip.53: 13885+ [1au] ANY? 
isc.org. (37)


After one week the attack has been mostly mitigated, and the remaining 
open resolvers are probably windows servers. Apparently in bill'g world 
is impossible to restrict the recursion.





Re: 10G switchrecommendaton

2012-02-09 Thread Adrian Minta

Cisco has finally release a new 10G switch, Catalyst 4500-X:
http://www.cisco.com/en/US/products/ps12332/index.html

Does anyone know the price range, or the FCS date for this ?




Re: Business Ethernet Services

2011-06-18 Thread Adrian Minta

On 06/17/11 21:55, Elliot Finley wrote:

Anyone using a CPE that is reliable and costs= $300 ?

features needed:

SFP for uplink, QnQ, basic layer 2 functionality.

If you're using something with the above parameters and you like it,
please share. :)

Thanks,
Elliot



Something like Zyxel MES-2110 ?






Re: multicast nightmare #42

2009-10-14 Thread Adrian Minta

Philip Lavine wrote:

Please explain how this would be possible:

1 sender
1 mcast group
1 receiver

 = no data loss

1 sender
1 mcast group
2+ receivers on same VLAN and physical segment

= data loss


  

Probably a crappy switch.

--
Best regards,
Adrian Minta  





Re: multicast nightmare #42 - REDUX

2009-10-14 Thread Adrian Minta

Philip Lavine wrote:

More info if this helps:

Switch Platform:
4500 SUPII+
with gig line cards

Data rate is 100Mbps

Server OS: Windows 2003 R2 (please withhold snickering).

  

Multicast traffic is routed ?

--
Best regards,
Adrian Minta  






Re: Hijacked Blocks

2009-09-14 Thread Adrian Minta
In Europe RIPE has a nice database. Hijacking is not possible since most 
ISP's use filters based on RIPE Database.

Why ARIN don't use a similar tool ?





Re: Subnet Size for BGP peers.

2009-07-30 Thread Adrian Minta
Shared link for BGP connectivity is a bad idea. Imagine that one of your 
customer leave proxy-arp on his interface, or imagine that he makes a 
Layer2 loop. Then all other customers will be affected. Usually a 
customer with BGP is on another level, so a gain of some IP's doesn't  
worth the trouble IMHO.


--
Best regards,
Adrian Minta






RE: What else shall we test?

2009-07-22 Thread Adrian Minta
I will sugest to test the throughput when a BGP peer is flapping.

-Original Message-
From: Michael J McCafferty m...@m5computersecurity.com
Sent: 23 iulie 2009 03:05
To: nanog nanog@nanog.org
Subject: What else shall we test?

All,
We are putting together a test plan to test a pair of Cisco 7206 VXR's,
each with with NPE-G2. The purpose of the test is just to make sure we
know where their realistic limits are with a real configuration, full
route tables from two providers, etc. We have one JDSU T-Berd 8000 test
system with interfaces and software to test a single stream through
multi-mode fiber interfaces. We plan to test through the interfaces on
the NPE and through PA-GE cards with a variety of packet sizes
(especially 64 Byte).
I'd be interested in any thoughts on additional testing or testing
methodologies we might want to do, to help us set our expectations for
this setup and to plan when we need to go bigger as we grow traffic,
hosts, etc.
We plan to get 1 to 3 additional full tables and peer with Any2 Easy on
this network within the next year. We want to determine how this
platform will behave under moderate DoS attacks, BGP updates, etc. Is
there anything else we need to be mindful of? Can we get a realistic
test of the routers with the T-Berd? What else should we test while we
have the maintenance window and the test system on hand?

Your thoughts and experience are appreciated!

Thanks !
Mike

-- 

Michael J. McCafferty
Principal, Security Engineer
M5 Hosting
http://www.m5hosting.com

You can have your own custom Dedicated Server up and running today !
RedHat Enterprise, CentOS, Ubuntu, Debian, OpenBSD, FreeBSD, and more