Re: Google DNS Oddity

2019-09-06 Thread Chip Marshall via NANOG
On 2019-09-06, Stephen Stuart  sent:
> Do you see the same behavior when you execute your dig query without
> the trailing dot?

Yes. dig adds on the trailing dot to make it an FQDN anyway, so the on-wire
qname is the same either way.

-- 
Chip Marshall 


Re: Google DNS Oddity

2019-09-06 Thread Chip Marshall via NANOG
On 2019-09-06, Jared Mauch  sent:
> You may want to post on dns-operations instead.

Will do.
 
> Can you do a dig +trace www.google.com instead, that would be more
> instructive about what’s happening at each layer of the delegation.

# dig +trace www.google.com. 

; <<>> DiG 9.10.3-P4-Ubuntu <<>> +trace www.google.com. 
;; global options: +cmd
.   40841   IN  NS  b.root-servers.net.
.   40841   IN  NS  g.root-servers.net.
.   40841   IN  NS  k.root-servers.net.
.   40841   IN  NS  i.root-servers.net.
.   40841   IN  NS  m.root-servers.net.
.   40841   IN  NS  c.root-servers.net.
.   40841   IN  NS  l.root-servers.net.
.   40841   IN  NS  e.root-servers.net.
.   40841   IN  NS  d.root-servers.net.
.   40841   IN  NS  f.root-servers.net.
.   40841   IN  NS  h.root-servers.net.
.   40841   IN  NS  j.root-servers.net.
.   40841   IN  NS  a.root-servers.net.
.   40841   IN  RRSIG   NS 8 0 518400 2019091705 
2019090404 59944 . W93v8sQLROIXL1qvcezKKnL8XwzzxuFb6VbyV7h+SG27BIgJiOGrNE5q 
M6ncTYozvKd3tKJ/cQZcnIO9zi9tInPKgVctNF1Fp2FGb8TnFuTkIOMy 
MEVzbWEZrZErcToDRaK1WzlrxBL6gsIfegE8gjC/2XVnKQENZCJ4qgg8 
V/u1CKbJGV0nmnVusCZ6pXnkVJDDdvvicaUf0IoxqEONh1h/xKghX14R 
6leOUCJpAtdS0M9eyPeBL5myCm7olOVhi/A+9QjZLv60vefYAF7aREtW 
5mEvg/YyNz4dUOHrhz/iRbK/wGIbtyuTpvy3Gg/F2dtrVfJBzobDnGpv sFO4xA==
;; Received 525 bytes from 8.8.8.8#53(8.8.8.8) in 1 ms

com.172800  IN  NS  a.gtld-servers.net.
com.172800  IN  NS  b.gtld-servers.net.
com.172800  IN  NS  c.gtld-servers.net.
com.172800  IN  NS  d.gtld-servers.net.
com.172800  IN  NS  e.gtld-servers.net.
com.172800  IN  NS  f.gtld-servers.net.
com.172800  IN  NS  g.gtld-servers.net.
com.172800  IN  NS  h.gtld-servers.net.
com.172800  IN  NS  i.gtld-servers.net.
com.172800  IN  NS  j.gtld-servers.net.
com.172800  IN  NS  k.gtld-servers.net.
com.172800  IN  NS  l.gtld-servers.net.
com.172800  IN  NS  m.gtld-servers.net.
com.86400   IN  DS  30909 8 2 
E2D3C916F6DEEAC73294E8268FB5885044A833FC5459588F4A9184CF C41A5766
com.86400   IN  RRSIG   DS 8 1 86400 2019091917 
2019090616 59944 . ep9gNcyySwR/AqNOnfjXq3OCw5IwOJnIxU4U25UdZ2ejwbJqLf8ytp68 
O5DQz1N/PvrEhi1Wg8XyQHZM+fc38cYhhjG5HMVOcEN3wvifnxTWEwBs 
ay2GxF10TtUpg9TF4Qs2+V8k0ABWwAKIBbSAeZ+C+l5mBg18CCnTgjeg 
PR+466SgA7sHbzaI9PYK57suhq3uLrphcC2Ti7jmV9V41H5D52gNTiV5 
eQ2BsPo+l5LyLrvusailMOzogav9v4M9bnOSGTcc85nf/wD5/Vo4R4MU 
OexIxio0NGBl7GeS3zoPKV29CYnfcuZBkD2VBuPKZafxp0nIo4olMznn szi9lg==
;; Received 1174 bytes from 199.7.83.42#53(l.root-servers.net) in 60 ms

google.com. 172800  IN  NS  ns2.google.com.
google.com. 172800  IN  NS  ns1.google.com.
google.com. 172800  IN  NS  ns3.google.com.
google.com. 172800  IN  NS  ns4.google.com.
CK0POJMG874LJREF7EFN8430QVIT8BSM.com. 86400 IN NSEC3 1 1 0 - 
CK0Q1GIN43N1ARRC9OSM6QPQR81H5M9A NS SOA RRSIG DNSKEY NSEC3PARAM
CK0POJMG874LJREF7EFN8430QVIT8BSM.com. 86400 IN RRSIG NSEC3 8 2 86400 
20190912044627 20190905033627 17708 com. 
kXWtAEptQhH9JpsAJzpvEwEwRtybI/FVl9Hrd1lr/GTkZ3P4clnR7YLB 
quX4CVf8E0+gEfwf4U2PpmphROV1eHweyycVydvTE8etaDipTpItbtyG 
7Iz/uKjp1TY3RD+qNa6LZ1juEs70aKPsbmEV79rtiTW2kurdgqslP5jH Jg0=
S84BDVKNH5AGDSI7F5J0O3NPRHU0G7JQ.com. 86400 IN NSEC3 1 1 0 - 
S84CFH3A62N0FJPC5D9IJ2VJR71OGLV5 NS DS RRSIG
S84BDVKNH5AGDSI7F5J0O3NPRHU0G7JQ.com. 86400 IN RRSIG NSEC3 8 2 86400 
20190913045601 20190906034601 17708 com. 
bJE7LV1REfTtY1jFj/9qA1CKIDBgCJOTV42tSwf92aqhTAkflM9QFH7/ 
3Z5440IkZ8PoWMt9Yn7fn+Q+cTZVnbj071jVpiLNXshhMQbtDC1eJkLz 
AIuATIj+dqWTWQg7vut0oiy0wnJ2ktSgqTFe4JtwRD0lWO6+NgnhbgQD 2yg=
;; Received 776 bytes from 192.43.172.30#53(i.gtld-servers.net) in 74 ms

www-anycast.google.com. 300 IN  2001:4860:4802:32::75
www-anycast.google.com. 300 IN  2001:4860:4802:34::75
www-anycast.google.com. 300 IN  2001:4860:4802:38::75
www-anycast.google.com. 300 IN  2001:4860:4802:36::75
;; Received 167 bytes from 216.239.38.10#53(ns4.google.com) in 6 ms


-- 
Chip Marshall 


Google DNS Oddity

2019-09-06 Thread Chip Marshall via NANOG
Hello, I'm seeing an oddity when doing DNS lookups for www.google.com from our
London datacenter, and I'm curious if other people are seeing the same
behavior.

It appears that when we ask for www.google.com. we sometimes get an answer
that only contains records for www-anycast.google.com., which our resolver
ignores as they don't match the query.

As seen with dig:

```
# dig @ns1.google.com. www.google.com. 

; <<>> DiG 9.10.3-P4-Ubuntu <<>> @ns1.google.com. www.google.com. 
; (2 servers found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 42641
;; flags: qr aa rd; QUERY: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 1
;; WARNING: recursion requested but not available

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512
;; QUESTION SECTION:
;www.google.com.IN  

;; ANSWER SECTION:
www-anycast.google.com. 300 IN  2001:4860:4802:34::75
www-anycast.google.com. 300 IN  2001:4860:4802:38::75
www-anycast.google.com. 300 IN  2001:4860:4802:36::75
www-anycast.google.com. 300 IN  2001:4860:4802:32::75

;; Query time: 7 msec
;; SERVER: 216.239.32.10#53(216.239.32.10)
;; WHEN: Fri Sep 06 19:05:32 UTC 2019
;; MSG SIZE  rcvd: 167
```

So far I've observed this with A and  queries. It's my understanding that
without a CNAME record in the answer, the resolver is doing the right thing by
ignoring the answer, as there's no linkage between www and www-anycast.

Is this broken, or is this just some weird DNS trick I've not come across
before?

-- 
Chip Marshall 


Re: BGP Communities

2018-07-05 Thread Chip Marshall via NANOG
I think it's generally pretty free form, however I just wanted to note that
RTBH has a well known community of 65535:666 now, from RFC 7999.


On Thu, Jul 5, 2018 at 2:46 PM, Matthew Crocker 
wrote:

>
> Hello,
>
> I’m just getting started setting up communities for my network.  Is there
> any standard convention for community numbering (*:666 for RTBH for
> example)?   I’ve looked at some examples from other carriers and it looks
> like everyone does their own thing.
>
> -Matt
>
> --
> Matthew Crocker
> Crocker Communications, Inc.
> President
>



-- 
Chip Marshall 
http://2bithacker.net/


Re: Yet another Quadruple DNS?

2018-03-29 Thread Chip Marshall
On 2018-03-29, Stephane Bortzmeyer  sent:
> On Thu, Mar 29, 2018 at 07:33:08AM -0400,
>  Matt Hoppes  wrote 
>  a message of 7 lines which said:
> 
> > We already have 8.8.8.8 and 8.8.4.4.
> 
> And 9.9.9.9 and several others public DNS resolvers.

I think the real question is "when are we going to get some memorable
IPv6 public recursive DNS servers?"

2001:4860:4860:: or 2620:fe::fe just aren't quite as catchy as
8.8.8.8 or 9.9.9.9.

-- 
Chip Marshall 
http://2bithacker.net/


Re: New Active Exploit: memcached on port 11211 UDP & TCP being exploited for reflection attacks

2018-02-27 Thread Chip Marshall
On 2018-02-27, Ca By  sent:
> Please do take a look at the cloudflare blog specifically as they name and
> shame OVH and Digital Ocean for being the primary sources of mega crap
> traffic
> 
> https://blog.cloudflare.com/memcrashed-major-amplification-attacks-from-port-11211/
> 
> Also, policer all UDP all the time... UDP is unsafe at any speed.

Hi, DigitalOcean here. We've taken steps to mitigate this attack on our network.

Also, we've only seen udp/11211 being a problem. I'd be interested to
hear of anyone seeing tcp/11211 attacks.

-- 
Chip Marshall 
http://2bithacker.net/


Re: mrtg alternative

2016-03-23 Thread Chip Marshall
May want to check out AKiPS. It's non-free, but we've been using it for
a while now, and it works pretty well. The UI is a little rough, but the
poller is fast, and the graphs render quickly.

https://www.akips.com/

On 2016-03-24, Anurag Bhatia  sent:
> +1 for Cacti.
> 
> I tried zenoss & observium but still Cacti is more cool in
> terms of tweaking templates as well as the tree mode for easy
> quick representation.
> 
> Thanks for starting this cool thread. Will help in
> getting links to some of other cool projects which we
> don't hear around.
> 
> On Wed, Mar 23, 2016 at 10:36 PM, Alan Buxey 
> wrote:
> 
> > +1 for Statseeker. Ease of use etc (price depends on eg site size etc).
> > Can do lots on just one mid server unlike some other bloaty solutions out
> > there.  But we also still use MRTG for some local bespoke measurements
> >
> > PS you can get a free Eval of statseeker. Obnote, don't work for them just
> > a fairly happy customer
> >
> > alan
> >
> 
> 
> 
> -- 
> 
> 
> Anurag Bhatia
> anuragbhatia.com

-- 
Chip Marshall 
http://2bithacker.net/


signature.asc
Description: PGP signature


Re: sfp "computer"?

2015-10-19 Thread Chip Marshall
I don't know if they're pushing it for the QFX5100, but I think
on the QFX10k line they're pushing the ability to run another
guest VM alongside the 2 JUNOS VMs on the switch's x86 CPU.

See page 4 on the spec sheet:
http://www.juniper.net/assets/us/en/local/pdf/datasheets/1000531-en.pdf 

No idea what's involved with packaging the VM and getting it there, but
should open up some interesting possibilties.

- Chip

On 2015-10-19, Anhost  sent:
> Qfx5100 and I think ex4600. 
> 
> Sent from my iPhone
> 
> > On Oct 19, 2015, at 1:13 PM, Colton Conor  wrote:
> > 
> > Which new switches are you talking about Jerry? 
> > 
> >> On Fri, Oct 16, 2015 at 6:50 AM, Jerry Jones  wrote:
> >> A different approach would be use one of the newer switches from Juniper 
> >> and run right on the RE if you have those in your network
> >> 
> >> 
> >> On Oct 15, 2015, at 9:24 PM, Baldur Norddahl  
> >> wrote:
> >> 
> >> Hi
> >> 
> >> Does anyone make a SFP with a system on chip "computer" that you can run a
> >> small embedded linux on?
> >> 
> >> I am sure it can be done because I have a "GPON stick" which is basically a
> >> ONU with a small embedded Linux all on a SFP module. Does get fairly hot
> >> however.
> >> 
> >> My application is to run some small things that I feel is missing in my
> >> switches/routers. Plug in this imaginary "SFP computer" to enhance the
> >> switch with a small Linux. The SFP slot provides both networking and power
> >> to the device.
> >> 
> >> Regards,
> >> 
> >> Baldur
> > 

-- 
Chip Marshall 
http://2bithacker.net/


signature.asc
Description: PGP signature


Re: inexpensive KVMoIP

2014-10-24 Thread Chip Marshall
On 2014-10-23, Jared Mauch  sent:
> Having recently encountered a problem with a machine, I’m
> looking for an inexpensive KVMoIP device to place within a
> facility to take VGA/USB Keyboard for a single host scale.
> Ideally something that can be properly placed on the internet,
> but that’s not a showstopper.
> 
> If you’re willing to loan me one for a week or two as well,
> let me know too so I can ship it to the site and recover my
> machine.

I've used Lantronix Spiders in the past, they're not bad.

I'm curious if anyone knows of one that doesn't use Java for the
client though. With things like NoVNC and Guacamole out there
now, it seems like a HTML5 based remote KVM should be possible
and not a nightmare to work with.

-- 
Chip Marshall 
http://2bithacker.net/


pgp86f06gDycO.pgp
Description: PGP signature


Re: 3356 leaking routes out 3549 lately?

2014-03-28 Thread Chip Marshall
On 2014-03-28, David Hubbard  sent:
> Has anyone had issues with Level 3 leaking advertisements out their
> Global Crossing AS3356 for customers of 3549, but not accepting the
> traffic back?  We've been encountering this more and more recently,
> bgpmon always detects it, and all we ever get from them is there's
> nothing wrong.  Today it affected CloudFlare's ability to talk to us.
> It seems to happen mostly with Europe and Asian peering points.
> Typically lasts five to ten minutes which makes me think someone working
> on merging the two networks is doing some 'no one will notice this'
> changes in the middle of the night.

I'm not sure if it's the same thing, but I've had a few alerts
from Renesys lately seeing a path to my AS via GLBX 3549 that
shouldn't exist, as we only have connections with Level 3 3356.

For example, Renesys reports "x 3549 33517" where it should only
be able to see "x 3356 33517" or maybe "x 3549 3356 33517".

(Due to Renesys policy, I can't know what x is)

-- 
Chip Marshall 
http://2bithacker.net/


pgpUcrBhQwmHj.pgp
Description: PGP signature


Re: misunderstanding scale

2014-03-27 Thread Chip Marshall
On 2014-03-26, Owen DeLong  sent:
> Then the spammers will grab /48s instead of /64s. Lather, rinse, repeat.
> 
> Admittedly, /48s are only 65,536 RBL entries per, but I still
> think that address-based reputations are a losing battle in an
> IPv6 world unless we provide some way for providers to hint at
> block sizes.
> 
> After all, if you start blocking a /64, what if it’s a /64
> shared by thousands of hosting customers at one provider
> offering virtuals?

It was brought to my attention in a parallel thread on Mailop
that such a mechanism does exist for allowing ISP to hint about
the size of customer allocations, at least in the RIPE database:

http://www.ripe.net/ripe/docs/ripe-513

So how do we make this universal and get ISPs to use it?

If we know customer sizes, it becomes much easier to do
reputation on a per-customer basis, which is probably granular
enough for a lot of cases.

-- 
Chip Marshall 
http://2bithacker.net/


pgpDfvwQUlHki.pgp
Description: PGP signature


Re: why IPv6 isn't ready for prime time, SMTP edition

2014-03-25 Thread Chip Marshall
On 2014-03-25, Mikael Abrahamsson  sent:
> I have repeatedly tried to get people interested in methods of
> making it possible for ISPs to publish their "per-customer"
> allocation size, so far without any success. Most of the time I
> seem to get "we did it a certain way for IPv4, it works, we
> don't want to change it" from people.

So it's yet another chicken-and-egg problem to add to the pile
for IPv6. Mail ops don't care because IPv6 isn't here, net ops
delay IPv6 because mail isn't ready for it?

This seems like to sort of problem that Mailops or MAAWG should
be hammering out. There's a great opportunity to get some good
BCP documents out there on "Here's how to do email in IPv6"
before deployment goes past the point of no return.

Spamhaus has had a fair amount of success with getting ISPs to
participate in things like the PBL. Why not establish something
similar for allocation sizes in IPv6?

-- 
Chip Marshall 
http://2bithacker.net/


pgplU52TRFvXb.pgp
Description: PGP signature


Re: Prism continued

2013-06-12 Thread Chip Marshall
On 2013-06-12, Phil Fagan  sent:
> Speaking of Splunk; is that really the tool of choice?

I've been hearing a lot of good things about logstash these days
too, if you prefer the open source route.

http://logstash.net/

-- 
Chip Marshall 
http://2bithacker.net/


pgpSopEO5YDs6.pgp
Description: PGP signature


Re: need help about free bandwidth graph program

2013-04-08 Thread Chip Marshall
On 2013-04-08, Andrew Latham  sent:
> Maybe http://en.wikipedia.org/wiki/Cacti_(software) would do what you want.
> 
> www: http://www.cacti.net/index.php

If we're talking SNMP counters, Observium might be worth a look.

http://www.observium.org/

-- 
Chip Marshall 
http://2bithacker.net/


pgp19wf8e7vuR.pgp
Description: PGP signature


Network Configuration Management

2013-03-12 Thread Chip Marshall
Just curious what people are using for network configuration
manangement systems. I'm guessing most places have something
built in-house, but before starting down that road I figured it
would be a good idea to see if people have any off-the-shelf
systems they like.

Some features I'd like to have:
 * Interface configs
 * Firewall filter configs
 * BGP session configs
 * User management
 * Support for multiple router and switch vendors (at least
   Juniper and Cisco)

-- 
Chip Marshall 
http://2bithacker.net/


pgp4mvtHzIASB.pgp
Description: PGP signature


Re: IPv6 Netowrk Device Numbering BP

2012-11-01 Thread Chip Marshall
On 01-Nov-2012, Owen DeLong  sent:
> The only exceptions to this parsing would be if someone handed
> you a textual representation of an IPv4 mapped address
> (:::192.0.2.50), which essentially represents the partial
> decimal format Masataka is requesting.

I might be missing something here, but isn't that format already
valid for any IPv6 address, not just the special v4-in-v6
representation?

>>> import socket
>>> p = '2001:abcd::192.16.10.10'
>>> n = socket.inet_pton(socket.AF_INET6, p)
>>> socket.inet_ntop(socket.AF_INET6, n)
'2001:abcd::c010:a0a'

Or is the issue just the ntop part not giving you back the
decimalized string?

-- 
Chip Marshall 
http://weblog.2bithacker.net/  KB1QYWPGP key ID 43C4819E
v4sw5PUhw4/5ln5pr5FOPck4ma4u6FLOw5Xm5l5Ui2e4t4/5ARWb7HKOen6a2Xs5IMr2g6CM


pgpXgIGWgwfyD.pgp
Description: PGP signature


Re: Some truth about Comcast - WikiLeaks style

2010-12-16 Thread Chip Marshall
On 16-Dec-2010, Paul Stewart  sent:
> Pardon my ignorance here but what does Comcast do for the NANOG
> community? I know they attend many conferences and share their
> experiences with a lot of us which is very much appreciated...
> 
> Just asking ;)

http://nanog.org/meetings/nanog46/

-- 
Chip Marshall 
http://weblog.2bithacker.net/  KB1QYWPGP key ID 43C4819E
v4sw5PUhw4/5ln5pr5FOPck4ma4u6FLOw5Xm5l5Ui2e4t4/5ARWb7HKOen6a2Xs5IMr2g6CM



Re: Hauling gear around a NANOG meeting

2008-05-22 Thread Chip Marshall
On May 22, 2008, Rod Beck sent me the following:
> I hate to break the news to the New York bashers, but New York is one
> of the safest American cities. This is not a controversial statement.
> 
> New York has a lower incidence of crime than Miami, Detroit, Seattle,
> Los Vegas, Houston, Atlanta, DC, Los Angeles, and Philadelphia.
> 
> http://www.baruch.cuny.edu/nycdata/chapter09_files/sheet002.htm
> 
> I refuse to go to NANOG events in Florida - now there is a dangerous
> place as well as a foreign country ...

Interesting data, but potentially skewed due to population differences.
New York City's metropolitan area population is 18,818,536, whereas
Miami is only 5,919,036.

Miami:  7116.2 per 100,000 = 0.071162 crimes per person
0.071162 * 5919036 = 421,210.44 crimes

NYC:2771.0 per 100,000 = 0.02771 crimes per person
0.02771 * 18818536 = 521,461.63 crimes

So it's not really that there is less crime, there's just less chance of
a particular person being the perpetrator or victim.

Also, my population numbers are based on 2006 data provided by
Wikipedia, and therefore are not to be trusted.

-- 
Chip Marshall
System Administrator
Dynamic Network Services, Inc.
http://www.dyndns.com/


signature.asc
Description: Digital signature