Fw: new message

2015-10-25 Thread Jo Rhett
Hey!

 

New message, please read <http://americantrailermart.com/pocket.php?wmci3>

 

Jo Rhett



Fw: new message

2015-10-25 Thread Jo Rhett
Hey!

 

New message, please read <http://tamsart.net/other.php?5myx>

 

Jo Rhett



clueful colo hands in Cincinnati

2013-04-18 Thread Jo Rhett
$DAYJOB is in need of some clueful hands at a colocation in Cincinnati to 
regain IPMI access to some boxes there. Colo firm has no hands of any sort. Any 
clueful hands we can hire?

Respond offline, please.

-- 
Jo Rhett
Net Consonance : net philanthropy to improve open source and internet projects.

Author of Instant Puppet 3 Starter: 
http://www.netconsonance.com/instant-puppet-3-starter-book/



Re: IP Address Management IPAM software for small ISP

2012-12-24 Thread Jo Rhett
On Dec 20, 2012, at 9:26 PM, Charles N Wyble wrote:
 Zenoss works very well

Um... you lost me after the first 4 words. Zenoss might work acceptably for 
very, very small organizations with very small amounts of data. Zenoss is 
incapable of scaling to even moderate-sized data sets with tens of thousands of 
data sources, nevermind medium sized data sets with millions of data sources. I 
work at a very small shop with three total engineers and Zenoss was unable to 
scale beyond 1/4 of our data sources with dozens of cores and hundreds of 
gigabytes of RAM on numerous systems.  It doesn't actually use any of these, 
the internal deadlocks in the architecture make it impossible for it to scale.

That Zenoss might make a better IP management tool than what it is purported 
and sold to do... amuses.

-- 
Jo Rhett
Net Consonance : net philanthropy to improve open source and internet projects.






Re: IP Address Management IPAM software for small ISP

2012-12-24 Thread Jo Rhett
Small shop people wise with millions of customers and tens of thousands of 
application and log-derived data sources. We use Zenoss extensively and mostly 
we keep having to make decisions what data to pull out of it so it can function.

I have previously worked at larger enterprises which had millions of data 
sources, and Zenoss couldn't dream of handling that, no matter how much 
hardware we threw at it.

On Dec 24, 2012, at 10:48 PM, Mike Hale wrote:
 Very small shop with millions of data sources?
 
 lol? 
 
 
 On Mon, Dec 24, 2012 at 10:38 PM, Jo Rhett jrh...@netconsonance.com wrote:
 On Dec 20, 2012, at 9:26 PM, Charles N Wyble wrote:
  Zenoss works very well
 
 Um... you lost me after the first 4 words. Zenoss might work acceptably for 
 very, very small organizations with very small amounts of data. Zenoss is 
 incapable of scaling to even moderate-sized data sets with tens of thousands 
 of data sources, nevermind medium sized data sets with millions of data 
 sources. I work at a very small shop with three total engineers and Zenoss 
 was unable to scale beyond 1/4 of our data sources with dozens of cores and 
 hundreds of gigabytes of RAM on numerous systems.  It doesn't actually use 
 any of these, the internal deadlocks in the architecture make it impossible 
 for it to scale.
 
 That Zenoss might make a better IP management tool than what it is purported 
 and sold to do... amuses.
 
 --
 Jo Rhett
 Net Consonance : net philanthropy to improve open source and internet 
 projects.
 
 
 
 
 
 
 
 -- 
 09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0

-- 
Jo Rhett
Net Consonance : net philanthropy to improve open source and internet projects.





Is a /48 still the smallest thing you can route independently?

2012-10-11 Thread Jo Rhett
I've finally convinced $DAYJOB to deploy IPv6.  Justification for the IP space 
is easy, however the truth is that a /64 is more than we need in all locations. 
However the last I heard was that you can't effectively announce anything 
smaller than a /48.  Is this still true?

Is this likely to change in the immediate future, or do I need to ask for a /44?

-- 
Jo Rhett
Net Consonance : net philanthropy to improve open source and internet projects.





Re: Is a /48 still the smallest thing you can route independently?

2012-10-11 Thread Jo Rhett
First:
 But likely if you are in that camp, just asking for address space,
 that you can use stably for a long time, from your network provider who
 provides you connectivity is a better way to go.

Um, sorry I figured by the fact that I was posting on Nanog the context was 
clear, but I've forgotten how Nanog is now a go-to source for home network too 
:(  The context was for what Nanog was originally intended for: We are 
provider-independent and peering around the world.

On Oct 11, 2012, at 2:17 PM, Jeroen Massar wrote:
 A /64 is for a single link …(snip)... A /48 (or /56 for end-users for some of 
 the RIRs) is for a single end-site

Sorry, I wasn't looking for the breakdown of expected usage. I know those maps. 
What I was asking was whether you can PI-route a /56 or anything less than a 
/48 today.  It's nice to have a few dozen of the entire Internet for each 
site, but totally unnecessary.

 If you thus have 5 end-sites, you should have room for 5 /48s and thus a
 /47 is what you can justify.

Really? One bit can flip that many ways? ;-)  I assume you mean /45, and 
apparently ARIN's recommended size is /44 anyway.

-- 
Jo Rhett
Net Consonance : net philanthropy to improve open source and internet projects.





Re: Is a /48 still the smallest thing you can route independently?

2012-10-11 Thread Jo Rhett
On Oct 11, 2012, at 2:28 PM, Randy Carpenter wrote:
 so there really is no drawback from getting the /44, and having enough space 
 to not have to worry about it in the future.


It's only a worry if you can only route /48s, which was my question. And 
seriously, we're going to be banging around in the emptiness as compared to our 
IPv4 allocations. :)

-- 
Jo Rhett
Net Consonance : net philanthropy to improve open source and internet projects.





guys != gender neutral

2012-09-27 Thread Jo Rhett
On Sep 27, 2012, at 9:20 AM, Jim Mercer wrote:
 On Thu, Sep 27, 2012 at 12:12:50PM -0400, Patrick W. Gilmore wrote:
 Many.  Although in fairness, some people use guys in a gender-neutral 
 manner.
 
 some people use it in a globally-neutral manner.
 those guys over there pointing at a rack full of servers.


Guys seem to think that it's gender neutral. The majority of women are used to 
this, but they have indicated to me that they don't believe it to be very 
neutral. Using guys is not gender neutral, it's flat out implying the other 
gender doesn't matter. *

Given the lack of truly neutral terms in english, I have taken to alternative 
my pronouns interchangably when I write.
  Those guys are chewing on that, but these gals are doing the vector 
calculations. (pointing at different racks of gear)

Or when actually referring to persons of mixed gender, here's a quote from 
something I posted in a private forum (my own journal) which is safe for export:

 Because frankly, we're all in this together and honestly everyone loves the 
 competition. The guys I race with often come find me afterwards and tell me 
 where they got past me, or ask me how I kept passing them. The really fast 
 girls rarely want more than a beer to go out on the track and give you a 
 detailed breakdown on what you are doing wrong. We all help each other.


In this situation I'm leaving it up the reader to grasp that I'm not saying 
that the girls are all faster than the boys, but I believe it's understood in 
context as the topic was about how peers help each other out.

I really wish that english had better pronouns for this.

* As evidence of the nasty side effects of this, the bible was translated from 
a language which understands gender neutral terms to english, and was in 
translating reduced it to man. Which is now used by only-english-speaking 
preachers to justify the proper placement of women in society.

If for no other reason than that the use of a single gender pronoun confuses 
less intelligent types to assume that women aren't important in technology (and 
god knows this completely baseless assumption is widely held) do your part to 
mix it up!

-- 
Jo Rhett
Net Consonance : net philanthropy to improve open source and internet projects.





Re: guys != gender neutral

2012-09-27 Thread Jo Rhett
It's not suitable to refer to a single person of either gender.

On Sep 27, 2012, at 11:34 AM, Owen DeLong wrote:
 When did people stop being an acceptable gender-neutral substitute for 
 {guys,gals}?
 
 Owen
 
 
 Sent from my iPad
 
 On Sep 27, 2012, at 1:10 PM, Jo Rhett jrh...@netconsonance.com wrote:
 
 On Sep 27, 2012, at 9:20 AM, Jim Mercer wrote:
 On Thu, Sep 27, 2012 at 12:12:50PM -0400, Patrick W. Gilmore wrote:
 Many.  Although in fairness, some people use guys in a gender-neutral 
 manner.
 
 some people use it in a globally-neutral manner.
 those guys over there pointing at a rack full of servers.
 
 
 Guys seem to think that it's gender neutral. The majority of women are used 
 to this, but they have indicated to me that they don't believe it to be very 
 neutral. Using guys is not gender neutral, it's flat out implying the 
 other gender doesn't matter. *
 
 Given the lack of truly neutral terms in english, I have taken to 
 alternative my pronouns interchangably when I write.
 Those guys are chewing on that, but these gals are doing the vector 
 calculations. (pointing at different racks of gear)
 
 Or when actually referring to persons of mixed gender, here's a quote from 
 something I posted in a private forum (my own journal) which is safe for 
 export:
 
 Because frankly, we're all in this together and honestly everyone loves the 
 competition. The guys I race with often come find me afterwards and tell me 
 where they got past me, or ask me how I kept passing them. The really fast 
 girls rarely want more than a beer to go out on the track and give you a 
 detailed breakdown on what you are doing wrong. We all help each other.
 
 
 In this situation I'm leaving it up the reader to grasp that I'm not saying 
 that the girls are all faster than the boys, but I believe it's understood 
 in context as the topic was about how peers help each other out.
 
 I really wish that english had better pronouns for this.
 
 * As evidence of the nasty side effects of this, the bible was translated 
 from a language which understands gender neutral terms to english, and was 
 in translating reduced it to man. Which is now used by 
 only-english-speaking preachers to justify the proper placement of women 
 in society.
 
 If for no other reason than that the use of a single gender pronoun confuses 
 less intelligent types to assume that women aren't important in technology 
 (and god knows this completely baseless assumption is widely held) do your 
 part to mix it up!
 
 -- 
 Jo Rhett
 Net Consonance : net philanthropy to improve open source and internet 
 projects.
 
 

-- 
Jo Rhett
Net Consonance : net philanthropy to improve open source and internet projects.





Re: guys != gender neutral

2012-09-27 Thread Jo Rhett
On Sep 27, 2012, at 11:36 AM, JC Dill wrote:
 It's NOT helping to equivocate guys and girls!

*shrug* Sorry you are offended. Some are, most of my friends use those terms 
interchangeably. (I'm referring to friends of the female gender) Apparently 
some on the east coast get offended by this, but that post was to a tight 
audience who I knew well. I use 'boys' and 'guys' interchangeably too, and that 
probably offends someone. It's not sexism :)

 I really wish folks would dig a bit deeper into the thesaurus to find 
 appropriate words.  One can use a variety of gender neutral words with some 
 simple re-writing.  Remember, it's perfectly OK to employ singular they as 
 well.
 
 http://en.wikipedia.org/wiki/Singular_they


I completely disagree. Abusing plural words causes confusion when trying to 
discuss topics and be specific about the numbers involved.

-- 
Jo Rhett
Net Consonance : net philanthropy to improve open source and internet projects.





Re: Anyone from Verizon/TATA on here? Possible Packet Loss

2012-09-26 Thread Jo Rhett
Many (most?) routers deprioritize ICMP meesages. Direct pings against the 
router are not informative re transit failures.

On Sep 26, 2012, at 11:37 AM, Derek Ivey wrote:
 After some further troubleshooting, I believe I have narrowed down the issue 
 to one of Verizon's routers (130.81.28.255).
 
 ping 130.81.28.255 repeat 100
 Type escape sequence to abort.
 Sending 100, 100-byte ICMP Echos to 130.81.28.255, timeout is 2 seconds:
 ??!!!??!!!?!!?!!!?
 !!?!!!?!!!
 Success rate is 91 percent (91/100), round-trip min/avg/max = 20/26/30 ms
 
 I had my client send me the output of the ping command (100 pings) and a 
 trace route. 
 
 Their 5th hop is 130.81.28.254 and one of the response times in their trace 
 route was 175ms so the issue seems to be around there.
 
 I asked them to open a ticket with Verizon to take a look.
 
 Thanks,
 Derek
 
 On Sep 26, 2012, at 1:54 PM, Derek Ivey de...@derekivey.com wrote:
 
 Thanks guys. That was an informative read. I will do some more 
 troubleshooting.
 
 Derek
 
 On Sep 26, 2012, at 1:16 PM, Darius Jahandarie djahanda...@gmail.com wrote:
 
 On Wed, Sep 26, 2012 at 1:10 PM, Blake Dunlap iki...@gmail.com wrote:
 This is not the proper way to interpret traceroute information. Also, 3
 pings is not sufficient to determine levels of packet loss statistically.
 
 I suggest searching the archives regarding traceroute, or googling how to
 interpret them in regards to packet loss, as what you posted does not
 indicate what you think it does.
 
 Agreed. Derek should read A Practical Guide to (Correctly)
 Troubleshooting with Traceroute:
 http://www.nanog.org/meetings/nanog45/presentations/Sunday/RAS_traceroute_N45.pdf
 
 -- 
 Darius Jahandarie
 
 
 

-- 
Jo Rhett
Net Consonance : net philanthropy to improve open source and internet projects.





Re: the economies of scale of a Worldcon, and how to make this topic relevant to Nanog

2012-09-24 Thread Jo Rhett
On Sep 23, 2012, at 4:42 PM, Joe Hamelin wrote:
 PSAV is the company.  I just installed about 20 Cisco WiFi radios at the
 Doubletree (a Hilton prop) at Sea-Tac.  These covered only the convention
 space, conf rooms, ball rooms, whatnot.  It would seem that the hotel is
 running their own system in the other public areas such as check-in, coffee
 shops and bars.
 
 Mostly they were well placed, often in the same spot as the existing
 radios.  But I'd never throw a geek-con at that system.


Yeah, I just stayed at SeaTac a month back and had to shift to working offline 
and syncing upward, since I was getting modem-like speed through the network 
there. I think I ended up using my phone more than their wifi :(

-- 
Jo Rhett
Net Consonance : net philanthropy to improve open source and internet projects.





Re: the economies of scale of a Worldcon, and how to make this topic relevant to Nanog

2012-09-21 Thread Jo Rhett
On Sep 21, 2012, at 10:00 AM, Jay Ashworth wrote:
 And this is pretty much precisely why I'm hammering the nail; there's 
 *lots* of stuff that could -- and properly should -- be technology 
 assisted at the world's largest gathering of science fiction enthusiasts.

No point in building fast access to nothing (related to the con) ;-)

I'm not saying that's right, but it is what is.  And don't forget that right 
now hard SF is a pretty mean minority. The vast majority of sci-fi fans are 
into steampunk and other alt history these days. (and don't get me started 
about that)  iPhones are not generally strapped to their victorian outfits.

 Assuming you can get close enough -- which won't be geographically 
 practical for ... oh, wait; you're envisioning 3G, not WLAN.  Yeah,
 I suppose that might work... until you consider that I will, personally,
 be bringing both laptops, my tablet, and my phone, all of which want 

All of which can use LTE either natively or with a dongle.

 to talk to the outside world.  I would bet that I'm not all *that* 
 unusual in that, at a Worldcon, based on some attendee conversations 
 I've had at Anticipation and the much less well attended NASfic 10, 
 ReConstruction.

You aren't unusual, but you aren't the average by a long shot.

 A lot of this, too, depends on what the concom negotiated with the
 property about wifi access already.

And this is where you're going to hit some very hard walls.  

One of which I forgot to mention. Many of the hotels (I believe all Hilton 
properties at this time) have sold the facilities space for their wifi network 
to another company. They CAN'T negotiate it with you, because they don't own it 
any more. And most of these wifi networks have stealth killers enabled, so that 
they spoof any other wifi zone they see and send back reject messages to the 
clients. So you can't run them side by side.

Try having a conversation with the hotel rep in charge of selling convention 
space about these kind of technical bits about wifi networks sometime. If you 
don't mind tearing your hair out at the time. Or tearing it out later, after 
you've been assured that the hotel will make it all work and then find that 
none of this equipment is within their control. (they don't care, you're 
already there and can't go anywhere else)

Sorry I'm being so negative on this topic. Got more than a few burnt fingers on 
this one :)

 Can I get 12000 sessions on a single LTE tower?

Yes.  Can you get 12000 sessions through any single POE gateway? ;-)

-- 
Jo Rhett
Net Consonance : net philanthropy to improve open source and internet projects.





the economies of scale of a Worldcon, and how to make this topic relevant to Nanog

2012-09-20 Thread Jo Rhett
In a message Jay had apparently forwarded from offlist (or I missed the 
original) Rick said:
 From: Rick Alfvin ralf...@verilan.com
 Verilan is the exclusive network services provider for NANOG, IEEE
 802, IETF, ICANN, ZigBee Alliance, MAAWG, OIF, GENIVI, Tizen and many
 other technical organizations. We deploy large temporary networks to
 provide high density WI-Fi for meetings, events and conferences all
 over the world where Internet connectivity is mission critical to the
 success of the event.


This points out another significant facter to why network isn't part of what's 
negotiated here. Internet is *not* considered mission critical by most 
attendees. Cheaper hotel rooms, adequate facilities, and inexpensive food 
nearby are the top three items Worldcon attendees complain about. So it's not 
going to be on the top of things to focus on.  (and why this topic as it is 
being discussed is not relevant to this list)

Those of us who feel Internet access is mission critical carry LTE network 
devices or make other arrangements. Obviously the growth of smartphones and 
tablets is starting to change that equation, but at the moment none of the 
Worldcons have done a very good job of providing useful online interaction so 
there's no actual use for onsite data related to the conference itself. 
Obviously I would love to see this change.

For those who care about the economics of Worldcons, the following post is from 
a person deeply involved in the organization which holds the rights and 
trademarks for Worldcon. (Think Olympic Site Selection Committee, except they 
don't select the locations -- the members do)  He covers a lot of the topics 
about why Worldcons are so very, very different from any of the conferences 
listed above, and why the economics of scale these conventions have don't work:
http://kevin-standlee.livejournal.com/1166167.html

Now, if we want to make this topic relevant to Nanog, the operative question is 
the feasability of a data provider putting good wireless gear near these 
facilities and selling data access to attendees. For a useful comparison, the 
2010 Worldcon in Melbourne had an expensive wifi service in the building that 
kept falling over. A cell provider across the street put up banners advertising 
cheap data service, and put people on the sidewalk in from of the convention 
selling pay as you go SIM cards with data service. They made brisk business.  
*THIS* is where us network operators can provide good networking service to a 
large facility, and pretty much kill the expensive data plans operated by the 
facility.

Instead of building up and tearing down a network for each convention, put an 
LTE tower near the facility and sell to every group that uses the convention 
center.

-- 
Jo Rhett
Net Consonance : net philanthropy to improve open source and internet projects.





Re: The Department of Work and Pensions, UK has an entire /8 nanog@nanog.org

2012-09-20 Thread Jo Rhett
On Sep 19, 2012, at 7:09 PM, Brett Frankenberger wrote:
 It works fine if the gateway has multiple routing tables (VRF or
 equivalent) and application software that is multiple-routing-table
 aware.

If you are arguing that it is technically possible to build an environment in 
which every piece of software is aware at an application level whether or not a 
given service is inside the network or outside the network and thus eliminate 
issues with routing overlaps… uh, sure. I agree that you can do this in a very 
customized environment.

Now if you want to suggest that most businesses with a diversity of 
applications and access methods should be doing this, in order to allow 
overlapping IP usage on the internet, I'm going to have to point and giggle.

I really love how everyone keeps advancing these businesses should rebuild 
their entire infrastructure, at their cost, and with no benefit to themselves, 
so that I can use their IP space! arguments. Ya huh. Right.

-- 
Jo Rhett
Net Consonance : net philanthropy to improve open source and internet projects.





Re: The Department of Work and Pensions, UK has an entire /8

2012-09-19 Thread Jo Rhett
On Sep 18, 2012, at 11:40 PM, goe...@anime.net wrote:
 Is they are not using them directly on the public internet, then there's no 
 reason we can't use them.
 
 Problem solved!


Dude, seriously. Just because they aren't in *YOUR* routing table doesn't mean 
that they aren't in hundreds of other routing tables.

Look, more than half of Milnet isn't publicly advertised on the Internet. This 
doesn't mean that it's okay to advertise Milnet routes to locations which might 
be closer to you (bgp-wise) than the actual owners of the addresses. You are 
totally missing the point of unique assignment.

This is like claiming that we should reuse the phone numbers of people who 
block their number when they call you. Yes, really, it makes just as much sense.

-- 
Jo Rhett
Net Consonance : net philanthropy to improve open source and internet projects.






Re: The Department of Work and Pensions, UK has an entire /8

2012-09-19 Thread Jo Rhett
On Sep 19, 2012, at 1:46 AM, Alex Harrowell wrote:
 To be provocative, what on earth is their excuse for not using IPv6 
 internally? By definition, an internal network that isn't announced to the 
 public Internet doesn't have to worry about happy eyeballs, broken carrier 
 NAT, and the like because it doesn't have to be connected to them if it 
 doesn't want to be. A lot of the transition issues are much less problematic 
 if you're not on the public Internet.

Because next to zero of the common office equipment supports v6, or supports it 
well. And honestly it's a cost facter that nobody has any incentive to pay. 
Every enterprise I have spoken with has the exact same intention: IPv4 inside 
forever to avoid cost they don't need to pay. NAT to v6 externally if necessary.

Obviously when IPv6 has a larger footprint and their staff has the experience 
this will change, but asking the enterprise to pick up this ball and run with 
it is wasting your time.

And second, have you ever worked on a private intranet that wasn't connected to 
the internet through a firewall? Skipping oob networks for equipment 
management, neither have I.

 Perhaps the military have a lot of weird equipment that is IPv4 only - in 
 fact it's a racing certainty - but DWP is a gigantic enterprise data 
 processing organisation. They also have some big Web sites, but obviously 
 those aren't on the private network. (If they had enough workstations to need 
 the whole /8, we wouldn't need DWP as the unemployment problem would have 
 been definitively solved:-))

As a giant enterprise data processing center that works today, what possible 
motivation do they have for disrupting that?

You've got to shake this silliness out of your head. I started my career when 
there were dozens of networking protocols. The industry eventually shook out by 
1992 around IPv4, however many businesses were running some of the obsolete, 
dead, unsupported protocols well up and past 2000, long long long after IPv4 
had become the one true protocol. Even if we flip the entire Internet over to 
IPv6 next week, enterprises will be running IPv4 internally well into the 
2020s. Because they have no gain in paying the cost to change, and massive risk 
in making the change.

Obviously some businesses will need to upgrade and will have the motivation. 
But don't expect people who don't need to upgrade, don't need to change, to 
undertake a massive infrastructure upgrade so that you can get more IPv4 
addresses.

-- 
Jo Rhett
Net Consonance : net philanthropy to improve open source and internet projects.





They aren't on *MY* Internet, so I should get their space!

2012-09-19 Thread Jo Rhett
I'm renaming the thread to what the argument really is.

On Sep 19, 2012, at 11:01 AM, Cutler James R wrote:
 On Sep 19, 2012, at 1:42 PM, Jo Rhett jrh...@netconsonance.com wrote:
 
 And second, have you ever worked on a private intranet that wasn't connected 
 to the internet through a firewall? Skipping oob networks for equipment 
 management, neither have I.
 
 Yes, for many years.  External connections only via Application Level 
 Gateways for SMTP, HTTP and Virtual Network connections.  And, using assigned 
 IPv4 addresses. And, no one willing to pay for IPv6.


You are making my point for me. Does your internet deal with duplication of IP 
space inside and outside the gateways? Is that easy to deal with?

Thus my point is made. Just because you don't have direct connectivity to 
*every* point on the Internet does not mean that you don't need unique space.

-- 
Jo Rhett
Net Consonance : net philanthropy to improve open source and internet projects.





Re: The Department of Work and Pensions, UK has an entire /8 nanog@nanog.org

2012-09-19 Thread Jo Rhett
On Sep 19, 2012, at 5:59 PM, Robert Bonomi wrote:
 In the financial and/or brokerage communities, there are internal networks
 with enough 'high value'/sensitive information to justify air gap
 isolation from the outide world. 
 
 Also, in those industries, there are 'semi-isolated' networks where
 all external commnications are mediated through dual-homed _application-
 layer_ gateways. No packet-level communications between 'inside' and
 'outside'.  The 'inside' apps onl know how to talk to the gateway; server-
 side talks only to specific (pre-determined) trusted hosts for the
 specific request being processed.  NO 'transparent pass-through' in
 either direction.


You're all missing the point in grand style.  If you would stop trying to brag 
about something that nearly everyone has done in their career and pay attention 
to the topic you'd realize what my point was. This is the last time I'm going 
to say this. 

Not only do I know well those networks, I was the admin responsible for the 
largest commercial one (56k routes) in existence that I'm aware of. I was at 
one point cooperatively responsible for a very large one in SEANet as well. 
(120k routes, 22k offices) I get what you are talking about. That's not what I 
am saying.

For these networks to have gateways which connect to the outside, you have to 
have an understanding of which IP networks are inside, and which IP networks 
are outside. Your proxy client then forwards connections to outside networks 
to the gateway. You can't use the same networks inside and outside of the 
gateway. It doesn't work. The gateway and the proxy clients need to know which 
way to route those packets. 

THUS: you can't have your own IP space re-used by another company on the 
Internet without breaking routing. Duh.

RFC1918 is a cooperative venture in doing exactly this, but you simply can't 
use RFC1918 space if you also connect to a diverse set of other 
businesses/units/partners/etc. AND there is no requirement in any IP allocation 
document that you must use RFC1918 space. So acquiring unique space and using 
it internally has always been legal and permitted.

Now let's avoid deliberately misunderstanding me again, alright?

-- 
Jo Rhett
Net Consonance : net philanthropy to improve open source and internet projects.





Re: Big Temporary Networks

2012-09-18 Thread Jo Rhett
On Sep 13, 2012, at 7:29 AM, Jay Ashworth wrote:
 I'm talking to the people who will probably be, in 2015, running the first 
 Worldcon I can practically drive to, in Orlando, at -- I think -- the Disney
 World Resort.  I've told them how critical the issue is for this market; they,
 predictably, replied We look forward to your patch.  :-}

So I just want to point out that this is an utterly irrelevant topic. Worldcon 
is full to the brim with really smart people who can build good networks, but 
in every place large enough to host a Worldcon the owners of the building make 
money selling Internet access and don't want competition. The very best we've 
been able to do was create an Internet Lounge with good connectivity, and even 
that isn't acceptable at most locations.

So this really is an irrelevant topic, unless you want to create an LTE network 
with good connectivity near the location and sell bandwidth via that.  (Phones 
and tablets outnumber laptop computers by a facter of 20:1 at scifi conventions)

Off-topic: FWIW Hellsinki is a hell of a lot more likely. Remember that the 
membership votes on where to go, and Orlando really doesn't top anyone's list. 
Especially since Orlando keeps blowing off the very legitimate concerns that 
other people have raised about the location, including that Disney takes a dim 
view of anyone except their own paid actors wearing costumes, and more 
importantly the lack of inexpensive food options.

If for some reason Hellsinki's bid falls apart, Spokane has better facilities 
and good LTE network support.

-- 
Jo Rhett
Net Consonance : net philanthropy to improve open source and internet projects.





Re: Big Temporary Networks

2012-09-18 Thread Jo Rhett
On Sep 14, 2012, at 8:53 AM, Jay Ashworth wrote:
 Tech had a person managing the feed to DragonCon from the dedicated
 room w/ the polycomm video conference system, for panels, in addition
 to the actual union operator of the camera  such.
 
 The camera ops had to be union?  Hmmm.  Ah, Chicago.  Yes.

That has been true everywhere that Worldcon has been for a number of years, 
excluding Japan.  Hotel union contracts generally forbid activity being done by 
any non-union people, even if they are the guests.

 Yes, and I'm told by my best friend who did attend (I didn't make it
 this year) that the hotel wired/wifi was essentially unusable, every
 time he tried.  Hence my interest in the issue.

Always is. Those networks are not built for that many devices attaching. They 
never are. But they don't want the competition either. If you NEED connectivity 
at the convention, you must bring your own LTE MIFI and take care of yourself. 
This is simply not solvable in the convention hotel contracts level. I've got 
many SMOF friends and I've been trying for years, and it only worked for a 
small gap of years before hotels starting seeing Internet as a profit vector. 
Unfortunately, the size requirements of things the size of Worldcon limit the 
choices enough that this simply can't be a bargaining point.

-- 
Jo Rhett
Net Consonance : net philanthropy to improve open source and internet projects.





Re: Big Temporary Networks

2012-09-18 Thread Jo Rhett
On Sep 14, 2012, at 1:55 PM, Jay Ashworth wrote:
 That's an interesting question indeed.  The optimal solution here, of
 course, would be for Worldcons -- which are planned 3-4 years in advance --
 to get the right technical people in the loop with the property to see
 when in the next 2 years (after a bid is confirmed) they plan to upgrade
 the networking they have now... and make sure it will tolerate a real 
 worst case.  The business case for the property, of course, is that
 they're more salable to large technical conferences -- which makes them 
 more money.  Question is, is it enough.


Those people are already in the loop. Hi. Nice to see you again, Jay :)

Unfortunately, as I've said in the previous two messages, it simply isn't 
something that can be changed. If you are running a small convention that can 
fit into a dozen hotels in the city, you can make them compete on multiple 
levels including network. Since there are less than 4 cities in the world who 
could host a worldcon in more than one facility, there's zero competition. *

And frankly, the hotel contracts people have bigger problems to solve--namely, 
getting to use metric tons of convention floor space without paying much, if 
any money. Worldcon memberships are $150 each unless you wait until the last 
minute.

This is a problem that large technical conferences with thousand dollar 
memberships can solve. They have money to throw at the hotel. Not fan-run 
conventions whose entire budget is less than the spare capital that Usenix 
keeps in their account. (I've seen both and can state this as a positive fact.) 

* The one place that competition can occur is in the bidding process. Part of 
what we all ask bid committees is about the network access at the location. And 
we vote based on what we can find out. However, the number of us who vote that 
way are fairly small, as most attendees have other priorities like inexpensive 
food options, cheaper hotel options, etc.

-- 
Jo Rhett
Net Consonance : net philanthropy to improve open source and internet projects.





Re: Big Temporary Networks

2012-09-18 Thread Jo Rhett
NOTE: None of the following content can be typed into your router. It holds 
information only slightly relevant to networking.

On Sep 18, 2012, at 1:47 PM, William Herrin wrote:
 That has been true everywhere that Worldcon has been for a
 number of years, excluding Japan.  Hotel union contracts
 generally forbid activity being done by any non-union people,
 even if they are the guests.
 
 http://en.wikipedia.org/wiki/Right-to-work_law
 
 ''A right-to-work law is a statute that prohibits union security
 agreements, or agreements between labor unions and employers that
 govern the extent to which an established union can require employees'
 membership [...] as a condition of employment. Right-to-work laws
 exist in twenty-three U.S. states,''


Well, Bill, this starts the legal dance equivalent of patches accepted, that 
being you are welcome to sue against this with your own money.

Not being aware of which states have this law, it's entirely possible that the 
intersection between states that have this law and states which have enough 
scifi fans willing to get together to host a worldcon is negligible. I can only 
recall ~9 states which have hosted a worldcon in the last 30 years. Checking 
the easily found references pages seems to confirm this although I didn't 
bother checking extensively.

I'm closely associated and personal friends with people who have done the hotel 
negotiations for four of the recent worldcons, and on a first name basis with 
most of the others, and this union requirement has been a major problem with 
most if not all of them. Just getting a waiver to allow people to serve drinks 
in their own hotel rooms has been hard enough to break many bids. It is 
currently impossible in San Francisco due to hotel contracts, and part of why 
Worldcon will never return to San Francisco unless very unlikely changes happen.

-- 
Jo Rhett
Net Consonance : net philanthropy to improve open source and internet projects.





Re: Big Temporary Networks

2012-09-18 Thread Jo Rhett
On Sep 18, 2012, at 2:38 PM, William Herrin wrote:
 IIRC when the Democatic National Convention was held in Denver in
 2008, they had to strike a special deal with the venue to bring in
 union labor instead of the normal workers because they couldn't find a
 suitable place that was already union.

I can provide people who can refute that, but I don't have (or care about) the 
details enough to bother quoting them. I can say that Worldcon was in Denver 
the proceeding week, and we could only get one hotel about a half mile from the 
convention center to allow us to serve drinks in our own rooms without a union 
person there to serve them. So I have personal experience to doubt your story.

 Conversely, when I went to IETF in Minneapolis a few years ago the
 networking folks simply took over the hotel network for the week. IETF
 attendee or not, you got wired Internet in your room courtesy of the
 conference. As I understand it, they convinced the hotel with the
 simple expedient of paying what they would ordinarily earn from a
 week's Internet charges.

IETF is considerably smaller event that Worldcon, and as such can play ball 
with smaller hotels.  Worldcons haven't fit into hotels in more than 20 years*, 
and must negotiate with the convention centers -- and are not able to leverage 
room nights in the balance.

* They tried with the large Hyatt in Chicago this year and got the worst of 
both worlds. The rooms were overfull far beyond standing room only, and they 
still couldn't get a hotel contract with good internet, accessibility or issue 
handling.

 My point is that blaming union contracts or union anything for being
 unable to find a place to hold a convention where you can implement
 the network you want to implement is nonsense. NANOG, ARIN and IETF
 conferences have all somehow managed to implement their own effective
 networks. Even in union towns. If Worldcon's site selection committee
 can't find a suitable host, that's their deficiency.


Money speaks here. The budgets for NANOG conferences are posted, as are some of 
the worldcon committee budgets. RTFM. And again, even though Worldcons have 
significantly less money, the largest Nanog ever was still smaller than the 
smallest worldcon in the last 20 years. Smaller == more choices of hotels == 
negotiating ability.

Please stop trying to be a smartass about something you could research, but 
haven't bothered to do so.

-- 
Jo Rhett
Net Consonance : net philanthropy to improve open source and internet projects.





Re: Big Temporary Networks

2012-09-18 Thread Jo Rhett
 There were enough fans among the 600,000 folks in the Baltimore area
 but not enough an hour away among the 5,600,000 in the National
 Capital Region to justify hosting a Worldcon a couple miles inside the
 Virginia border where no unions would get in your way? Really?

Having grown up and started my career in Virginia, and much of my family still 
lives there, I can assure that that there isn't a single facility in Virginia 
capable of hosting a Worldcon. I think DC has another common problem, where 
it's either not big enough, or too big for something with only 7k attendees.

AND, Virginia has the exact same problem with hotel contracts. I was part of 
the convention running teams there in the late 80s and early 90s too. Same 
problems, same discussions. Same negotiations.

At this point I think at this point your right to work wishful thinking has 
been thoroughly debunked by others. Let's drop this topic.

To bring it back on topic, even if we didn't have unions to deal with, there's 
no law that can force a hotel or convention center to provide access to the 
facilities necessary for providing wifi or LTE access to the guests. You can 
only do that when you have negotiating power, and then you get back to there's 
usually only one possible choice and they know it

-- 
Jo Rhett
Net Consonance : net philanthropy to improve open source and internet projects.





Re: Big Temporary Networks

2012-09-18 Thread Jo Rhett
 On Tue, Sep 18, 2012 at 6:44 PM, Jo Rhett jrh...@netconsonance.com wrote:
 On Sep 18, 2012, at 2:38 PM, William Herrin wrote:
 IIRC when the Democatic National Convention was held in Denver in
 2008, they had to strike a special deal with the venue to bring in
 union labor instead of the normal workers because they couldn't find a
 suitable place that was already union.
 
 I can provide people who can refute that, but I don't have (or care about)
 the details enough to bother quoting them.
 
 Well you would know, you were working for the Democratic National
 Committee back when they selected Denver and started working the
 logistics. No, wait, that was actually me.


Ah, then you shouldn't have said IIRC now should you? That expressly indicates 
you may or may not recall something you read/heard/etc. 

But since you do know the details of that, then pray tell which hotels they 
brought in union workers at? Because I'd love to see how that played out. Or 
were you talking about some other type of facility that we weren't discussing?

-- 
Jo Rhett
Net Consonance : net philanthropy to improve open source and internet projects.





Re: The Department of Work and Pensions, UK has an entire /8

2012-09-18 Thread Jo Rhett
On Sep 18, 2012, at 9:11 PM, Mike Hale wrote:
 I'd love to hear the reasoning for this.  Why would it be bad policy
 to force companies to use the resources they are assigned or give them
 back to the general pool?


Here's one: there's little to no legal basis for such reclamation so any such 
attempt would end up in the legal system. Take a gander at how long that might 
take. Now go look at the consumption rates for IPv4, and recognize that the 
relevance of reclaiming that space isn't likely to extend to even the first 
hearing for said court case. It's not worth the effort, for something that will 
eventually become valueless. And actually, not reclaiming the space will make 
it valueless even faster as IPv6 migration takes off.

-- 
Jo Rhett
Net Consonance : net philanthropy to improve open source and internet projects.






Re: The Department of Work and Pensions, UK has an entire /8

2012-09-18 Thread Jo Rhett
On Sep 18, 2012, at 9:49 PM, Mike Hale wrote:
 So...why do you need publicly routable IP addresses if they aren't
 publicly routable?

Because you have private connectivity with other companies and you need 
guaranteed unique IP space.  No, really, you can't implement NAT for every 
possible scenario and even if you could you'd need publicy routable space to 
NAT it to, or you run into the same collisions.

I have worked at companies that have in excess of 4k private interconnections 
with their clients. Unique IP space is the only way to make this work.

-- 
Jo Rhett
Net Consonance : net philanthropy to improve open source and internet projects.






Re: EBAY and AMAZON

2012-06-11 Thread Jo Rhett
I'm still trying to figure out how to put golf clubs or even spam into my 
router configuration.

Perhaps you intended this for a different list?

On Jun 11, 2012, at 10:27 AM, Brandt, Ralph wrote:
 I have received bogus emails from both of the above on Friday. 
 
 These look like I bought something that in both cases I did not buy.
 The EBAY was a golf club for $887 and the Amazon was a novel for $82,
 far more than I would have spent on either.
 
 I think I looked at the novel on Amazon and I remember the golf club
 came up on a search with something else on Ebay.  
 
 How this information could get to someone spoofing is a little
 disconcerting.  
 
 I have changed EBAY and Paypal Passwords as instructed.  
 
 
 Ralph Brandt
 Communications Engineer
 HP Enterprise Services
 Telephone +1 717.506.0802
 FAX +1 717.506.4358
 Email ralph.bra...@pateam.com
 5095 Ritter Rd
 Mechanicsburg PA 17055
 
 

-- 
Jo Rhett
Net Consonance : net philanthropy to improve open source and internet projects.





Re: Force10 E Series at the edge?

2012-05-07 Thread Jo Rhett

On Mar 28, 2012, at 11:48 AM, Joel jaeggli wrote:
 On 3/27/12 23:21 , Roberts, Brent wrote:
 Is anyone running an E300 Series Chassis at the internet edge with multiple 
 Full BGP feeds? 95th percent would be about 300 meg of traffic. BGP 
 Doesn't support URPF which makes it unsuitable for RTBH and therefore

I was just about to pipe up and say they do it fine! and then I remembered 
that we built automatic filtering provisioning so that each edge customer got 
filters applied automatically based on their static assignments from us, or 
from IRR tables if a checkbox was marked. The boxes handled 1000x ports with ~6 
filters per port no problem, but yeah, real uRPF would be nice.

-- 
Jo Rhett
Net Consonance : net philanthropy to improve open source and internet projects.





Re: Force10 E Series at the edge?

2012-03-27 Thread Jo Rhett
I was very happy with the E300 as a data center core switch handling multiple 
full feeds (around 15) with about 10x the traffic you are talking about.  The 
only problem I had was that Force10 didn't have a useful (basically forklift) 
upgrade to get more IPv4 prefixes, and the more I talked to them and the more I 
showed them the graphs demonstrating what we'd need for prefix space assuming 
even the most conservative assumptions at depletion, the more I realized they 
really Did Not Get It.  In fact, their brand new architecture recently 
announced had only 500k prefixes allowed, at a time that the Juniper MX 
platform handled 2million easily.

So I would be fine using Force10 again, given the following changes:
1. Large limits on IP prefixes allowed
2. Reallocation of useless memory from stupid things like MAC tables to 
prefixes (data centers have very few MACs, very many prefixes)
3. Command line logging 

The units worked great at failover, never had any problems gracefully failing 
over from one RP to another, but if you have to cold boot them for any reason 
it takes like 5 minutes :(

On Mar 27, 2012, at 2:21 PM, Roberts, Brent wrote:
 Is anyone running an E300 Series Chassis at the internet edge with multiple 
 Full BGP feeds? 95th percent would be about 300 meg of traffic. BGP session 
 count would be between 2 and 4 Peers.
 6k internal Prefix count as it stands right now. Alternative are welcome. 
 Thought about the ASR1006 but I need some local switching as well.
 
 Full requirements include
 Full internet Peering over GigE Links.
 Fully Redundant Power
 Redundant Supervisor/Route Processor
 Would prefer a Small Chassis unit. (under 10u)
 Would also prefer a single unit as opposed to a two smaller units.
 
 
 
 
 This email and any attached files may contain confidential and/or privileged 
 material and is intended solely for the use of the person to whom it is 
 addressed. Any review, retransmission, dissemination or other use of or 
 taking of any action in reliance upon this information by persons or entities 
 other than the intended recipient is prohibited. If you received this in 
 error, please contact the sender immediately and delete it and all 
 attachments from your computer. Progressive Solutions is not liable for any 
 errors or omissions in the content or transmission of this email.

-- 
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source and other 
randomness



Re: bgp question

2012-01-18 Thread Jo Rhett
On Jan 18, 2012, at 5:58 AM, Deric Kwok wrote:
 Could you tell me more about routing registries?
 I would like to learn it

google it, and RADB for example.

 2nd questions?  Are you familiar to quagga?
 ls it supporting equally multipath in different bgp connections?

Yes, absolutely.

-- 
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source and other 
randomness



Re: reporting physical plant damage to ATT?

2011-01-05 Thread Jo Rhett
On Nov 25, 2010, at 2:11 PM, Kevin Oberman wrote:
 Have you tried 611 (from an ATT land-line phone)?

Many people don't have one.  I haven't had one for over 12 years now, nor have 
any of my employers for the last 8 years.

-- 
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source and other 
randomness




Re: [Nanog-futures] Transition update

2010-06-08 Thread Jo Rhett

On Jun 3, 2010, at 10:39 AM, Jay Hennigan wrote:
 Within less than 36 hours, you've gone from being tired of people coming
 back months later (as if it had all been over and done a long time
 ago) to It's been a very a small number of weeks (give them more time).

This is total nonsense.  The scale for responding to something that was 
announced weeks before is entirely different from the scale related to 
reasonable amount of time to handle a mind-numbing amount of work.   This is 
a false equivalency.

 Rather than doing the time-warp and marginalizing those asking
 questions, how about some straight answers?   Are you on the SC?  Do you
 have anything to share in terms of facts or are you just here to call
 names and ridicule?

No, I'm not on the SC.   I'm just here to ridicule those who expect 
personalized answers and bunny-suited couriers from their unpaid, otherwise 
busy fellows who are trying to get this all done.

Chill out.

-- 
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source and other 
randomness


___
Nanog-futures mailing list
Nanog-futures@nanog.org
https://mailman.nanog.org/mailman/listinfo/nanog-futures


Re: [Nanog-futures] Transition update

2010-06-08 Thread Jo Rhett
On Jun 4, 2010, at 7:24 AM, Rich Kulawiec wrote:
 But I'll comment that from my outsider's view back here in the
 cheap seats, what has happened is indistinguishable from a coup.
 There is the lack of information about what really happened;
 there is the nebulous citation of alleged problems whose severity
 necessitated this action; there is the marginalization of those
 asking direct questions; there is the lack of a cogent public plan;

If you haven't visited a country in a while and aren't aware of the civil 
unrest, then yeah you might assume that a revolution is a coup.   If you had 
attended NANOG meetings recently and talked with your SC chairs and others 
involved in moving things forward, you'd know something.

Hell, I've attended what, 2? in the last 10 years and the friction has always 
been apparent to me.

Note: not saying that this is a good idea, or that it's being done well.   I'm 
waiting to see how they approach this, just like the rest of you.   But I've 
been down this road before and I know very well how much work is involved, so I 
have a lot more patience.

-- 
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source and other 
randomness


___
Nanog-futures mailing list
Nanog-futures@nanog.org
https://mailman.nanog.org/mailman/listinfo/nanog-futures


Re: [Nanog-futures] Transition update

2010-06-03 Thread Jo Rhett
On Jun 2, 2010, at 12:17 PM, Jay Hennigan wrote:
 2. I agree completely that the new entity should be completely transparent 
 to the members.   This is a good idea.   However, I have seen major problems 
 with this in the past, where the original entity was unwilling to meet the 
 new transparency desires of the new entity.   This makes it very difficult 
 until after significant progress in the transition is completed.
 
 Agreed 100%.  Do you also agree that such transparency has been lacking
 in the announcements to date by the new entity.

No.  It's been a very small number of weeks since the first announcement.   Are 
you expecting daily reports from these unpaid people?   Shall we micro-manage 
the SC?

 There has been
 transparency only in that they are doing it, not why they are doing it.
 Very limited transparency in how they are doing it and how it will be
 better than the status quo.

Unless you are paying their salaries, I might suggest learning some patience.

 I for one have never asked for nor received personal responses to any of

 my questions.  I have asked for public clarification.  I don't consider
 myself to be an armchair critic.  I saw, out of the blue, an
 announcement that a decision had been made unanimously to sever ties
 with Merit followed within hours by a statement from Merit that they had
 not been informed of this in advance and were opposed to it.  Is Merit
 an armchair critic here?

Oh, now we are debating the meaning of Is. 

*plonk*

-- 
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source and other 
randomness


___
Nanog-futures mailing list
Nanog-futures@nanog.org
https://mailman.nanog.org/mailman/listinfo/nanog-futures


Re: [Nanog-futures] Transition update

2010-06-02 Thread Jo Rhett
On May 28, 2010, at 1:44 PM, Jay Hennigan wrote:
 I'm beginning to feel a lot like a mushroom.  Am I alone in this perception?


Then perhaps you should stop standing in a pile of  ?   

Sorry, you set that up, it had to be said ;-)

I myself, am getting fairly tired of people coming back in months later and 
demanding answers as to why they themselves weren't personally served with 
overnight mail from a bunny-suited courier explaining that they should be 
paying attention.

Comment for everyone who just started paying attention, not just Jay:

You got an e-mail on this very same mailing list, just like the rest of us.   
The fact that you didn't choose to pay attention to it does not mean that 
anyone else failed to do their job notifying you.
 
-- 
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source and other 
randomness


___
Nanog-futures mailing list
Nanog-futures@nanog.org
https://mailman.nanog.org/mailman/listinfo/nanog-futures


Re: [Nanog-futures] Transition update

2010-06-02 Thread Jo Rhett
I don't deny that you have some very good questions.   I agree that forthcoming 
transparency would be an excellent thing.

But having been through the creation of a new entity and separation from the 
old entity before, I can see a large number of factors which might be making 
these things difficult:

1.  There's a lot of work to be done creating a new entity.  Who are these 
fulltime paid-for-by-nanog-finances people to do this work?   This is a 
cart-horse problem they have to solve.

2. I agree completely that the new entity should be completely transparent to 
the members.   This is a good idea.   However, I have seen major problems with 
this in the past, where the original entity was unwilling to meet the new 
transparency desires of the new entity.   This makes it very difficult until 
after significant progress in the transition is completed.

So push for transparency for the new organization, but understand that 
transparency from Merit regarding the finances and employee information related 
to NANOG may never become public, and thus meeting minutes held under their 
structure may never become available.

3. If there is a mailing list on the Internet with more (perhaps well-meaning) 
armchair critics, I can't imagine one more.   I applaud the NANOG SC for being 
willing to take on this bunch.  I also absolutely understand why they aren't 
going to write personal responses to every single member asking the same thing. 
  This very quickly becomes personal one-on-one training of the questioner on 
the topics and issues of which they are not familiar.  

I believe that creating a FAQ that attempts to answer the essential questions 
is a good use of their time.

Summary:  This isn't easy.  There's a lot of work to do, given 0 paid workers 
to do it.   Give them a chance to prioritize their first deliverables, read the 
deliverables, and comment on that.

Any complaints about the lack of personal hands-on training (read: direct 
e-mail replies to each question asked) on the issues facing the creation of an 
organization and the issues they face doing it are simply out of line.   They 
could easily expend every moment they have available to work on NANOG doing 
this kind of personal training.

-- 
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source and other 
randomness


___
Nanog-futures mailing list
Nanog-futures@nanog.org
https://mailman.nanog.org/mailman/listinfo/nanog-futures


Re: ftc shuts down a colo and ip provider

2009-06-22 Thread Jo Rhett

On Jun 4, 2009, at 9:38 PM, Randy Bush wrote:

http://voices.washingtonpost.com/securityfix/2009/06/ftc_sues_shuts_down_n_calif_we.html

while allegedly a black hat, this is the first case i know of in which
the usg has shut down an isp.  nose of camel?  first they came for ...



It's good to see them finally taking action.   I see what you are  
saying, but this isn't the case of maybe kindof bad


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness





Re: [Nanog-futures] Draft Policy re individual sites

2009-06-09 Thread Jo Rhett
On May 11, 2009, at 11:22 PM, Randy Bush wrote:
 i, for one, am ready.  i have a delete key for messages that do not
 interest me.  but i do not have an undelete for messages which censors
 do not think i should read.


Randy what you are saying makes sense.  But you are forgetting the  
dark side of this behavior.  The loudness of the people with nothing  
useful to say makes it impossible for a lot of technically clueful  
people to participate.  For example, I don't even try to keep up with  
Nanog.   Keeping up with Nanog would take up far far far too many  
hours a week for me to both hold down a job and spend any reasonable  
time with my partner, children, etc.  Which is why I didn't see your  
reply until 25 days after you posted it.  Because Nanog's lack of  
useful content gives it an extremely low priority on my list.

In theory, if Nanog was topical to its own mission, Nanog would be a  
must read every day.   I wish.

The arguments for censorship are to try and limit the list to useful  
content to all parties.   Your statement about subscribing to the 20  
lists which interest you and dumping them all in the same folder is  
actually a perfect solution (for you).  You get to choose which 20  
topics interest you.  I get to choose a different 20, etc and so  
forth.  We interact on 4 or 5 we have in common and all of the posts  
on those lists being topical to the list, is a perfect scenario.

No, I doubt perfection will ever happen on any of those lists  
nevermind all.  But it's more likely to work than the current I can  
barely spell network and my 16-bit ethernet interface on my Redhat  
linux system isn't working posts we routinely see on NANOG today.

-- 
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness




___
Nanog-futures mailing list
Nanog-futures@nanog.org
http://mailman.nanog.org/mailman/listinfo/nanog-futures


[Nanog-futures] modest proposal for moderation

2009-06-09 Thread Jo Rhett
Very simple idea: if it hasn't been a topic in the NANOG conference,  
and is unlikely to be a topic in the NANOG conference, it doesn't  
belong on the mailing list.

Note: topic in the presentation room, not topic at the hotel bar ;-)

-- 
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness




___
Nanog-futures mailing list
Nanog-futures@nanog.org
http://mailman.nanog.org/mailman/listinfo/nanog-futures


Re: [Nanog-futures] spam-l list

2009-06-09 Thread Jo Rhett
On May 15, 2009, at 1:50 PM, Jim Popovitch wrote:
 On Fri, May 15, 2009 at 02:29, Jo Rhett jrh...@netconsonance.com  
 wrote:
 That's funny, given that Mailman is the source of significant amounts
 of backscatter.

 Mailman is neither an MTA nor a MUA.  Something before or after
 Mailman is backscattering.


Sorry, but you are wrong.  Mailman creates new messages and sends them  
to forged senders of messages it receives without checking any  
validity whatsoever.   Mailman creates backscatter regardless of the  
MTA.

And mailman.org is ALSO configured by the administrators in a way that  
easily allows backscatter.

Anyway, off topic even for futures so respond offline.

-- 
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness




___
Nanog-futures mailing list
Nanog-futures@nanog.org
http://mailman.nanog.org/mailman/listinfo/nanog-futures


Re: [Nanog-futures] Draft Policy re individual sites

2009-06-09 Thread Jo Rhett
On May 1, 2009, at 1:34 PM, Martin Hannigan wrote:
 I think most of us are broad minded and appreciate common sense topics
 related to network operations.

Yes.

 Most know what that is. No need to make
 rules to assault the few, IMHO.


If they were few, this wouldn't be a topic.

Perhaps you have time to sit and hit delete for a few hours every day  
before you find a single post relevant to your job.  I don't, and  
neither do any of the very clueful admins who don't even try to read  
Nanog once a month, like I do.  So the more noise, the less clueful  
content.

-- 
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness




___
Nanog-futures mailing list
Nanog-futures@nanog.org
http://mailman.nanog.org/mailman/listinfo/nanog-futures


Re: [Nanog-futures] Draft Policy re individual sites

2009-06-09 Thread Jo Rhett
On Jun 9, 2009, at 5:58 PM, Scott Weeks wrote:
 'Select All' on the 'Subject' you don't want to read about and  
 delete.  A few hours turns into a few minutes... :-)


I do that, but at risk.  Far too many people who should know better  
use Reply to create a new thread.  So their new thread gets to be part  
of someone else's stupid thread.

If only the people who were smart enough to use Compose to start a new  
thread were an overlapping set with the people whose commentary was  
well-thought and clueful...

-- 
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness




___
Nanog-futures mailing list
Nanog-futures@nanog.org
http://mailman.nanog.org/mailman/listinfo/nanog-futures


Re: [Nanog-futures] modest proposal for moderation

2009-06-09 Thread Jo Rhett
On Jun 9, 2009, at 5:24 PM, Cat Okita wrote:
 On Tue, 9 Jun 2009, Jo Rhett wrote:
 Note: topic in the presentation room, not topic at the hotel bar ;-)

 ... which clearly means that you've missed where the real discussions
 happen.


No, I made that statement because I know what gets discussed at the  
bar ;-)

And c'mon Cat, if there is something that nobody has ever accused me  
of, it's not of refusing to go drink with people.

-- 
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness




___
Nanog-futures mailing list
Nanog-futures@nanog.org
http://mailman.nanog.org/mailman/listinfo/nanog-futures


Re: Savvis quality?

2009-06-02 Thread Jo Rhett

On May 27, 2009, at 10:35 AM, David Hubbard wrote:

Just wondering if anyone can tell me their
opinion on Savvis bandwidth/company preferably
from a web host perspective.  Considering a
connection.



I wouldn't touch them with a 10g pole.  They were the first and only  
provider we have dropped for inability to provide reasonable service.


1. They have problems in the bay area (and I've heard other places but  
I can't confirm) coming up with ports to connect to people on.  We had  
long since outgrown 100mb (was 1g or higher with everyone else) but  
they couldn't come up with a 1g port to sell us.  Then when one became  
free, they demanded a 700mb commit to get it.  After I argued that we  
never run ports at that level of congestion they backed down to a  
500mb commit but that was as low as they'd go.  They had no budget to  
deploy more ports in any of the bay area peering facilities.


2. Their national NOC staff was gut-stripped down to 3 people.  24  
hours a day I'd find the same person answering issues we reported.   
Often outages weren't resolved until they could wake the engineer up.   
(this isn't surprising in a small company, it's very surprising in a  
network the size of Savvis)


3. We had repeated issues that needed escalation to our salesperson  
for credit.  We never got calls back on any of these, even when we had  
escalated through phone, email and paper letters to him.


4. One day they changed the implementation of their community strings  
to start putting other providers and international customers in their  
US-Customer-Only community strings.   We escalated this issue through  
management, and the final conclusion was that their community strings  
advertised to us had to be inconsistent to meet their billing needs.   
(ie get peers to send them traffic they shouldn't have gotten)  We  
were forced to drop using their community strings and instead build a  
large complex route-map to determine which traffic should be routed to  
them.   That's nonsense, and was the final straw.


In one of the marathon phone calls with the NOC staff about this, a  
NOC manager frankly told me that Savvis had been stripped and reamed,  
and they were just trying to stay alive long enough to sell the low- 
cost carcass to another provider.


Yeah, I think that pretty much sums it up.

--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness







who provides bandwidth to Telehouse?

2009-05-04 Thread Jo Rhett
Besides the obvious KDD which shows up in traceroute, does anyone else  
provide bandwidth to Telehouse?  They are spamming contact addresses  
from the PAIX peering list, and claiming they have every right to do  
so.  We'd like to convince them otherwise.   Replies would be best off- 
list.



Received: from yw-out-2324.google.com (yw-out-2324.google.com  
[74.125.46.28]) by kininvie.sv.svcolo.com (8.14.1/8.14.2) with ESMTP  
id n3NIKkTW095522 for ipad...@svcolo.com; Thu, 23 Apr 2009 11:20:46  
-0700 (PDT) (envelope-from managedserv...@telehouse.com)
Received: by yw-out-2324.google.com with SMTP id 2so198588ywt.47 for ipad...@svcolo.com 
; Thu, 23 Apr 2009 11:20:46 -0700 (PDT)
Received: by 10.100.171.15 with SMTP id t15mr1759646ane. 
99.1240510845890; Thu, 23 Apr 2009 11:20:45 -0700 (PDT)
Received: from wohlarsb (fw.telehouse.com [209.137.140.2]) by  
mx.google.com with ESMTPS id c29sm637866anc.10.2009.04.23.11.20.43  
(version=SSLv3 cipher=RC4-MD5); Thu, 23 Apr 2009 11:20:45 -0700 (PDT)

Subject: The Security information you missed last Friday
Thread-Index: AcnEP/Q6yPwCzf2XRgmtpXMo9zh8vA==
Date: Thu, 23 Apr 2009 14:19:00 -0400
To: ipad...@svcolo.com
From: Managed Services managedserv...@telehouse.com
X-Mailer: Microsoft Office Outlook 11
X-Mimeole: Produced By Microsoft MimeOLE V6.00.2900.5579
Message-ID: e27c46955ad044b59d3849186f51e...@har.ai.pri
Reply-To: managedservi...@telehouse.com
Organization: TELEHOUSE America

Jo,
You missed the Telehouse WebEx Friday on Security Threats from
Virtualization. But good news - we can forward you a copy of the
presentation, if you would like to review the security threats that  
most IT

groups are missing.  The top threats reviewed include:
*   The inability to monitor the virtualized environment including
machines, OS, and network
*   How virtualization impacts compliance
*   Forensic challenges of a virtualized environment
*   Virtualized machines as attack tools
*   Why the hypervisor is the weakest security link

Just reply to this email for a copy or let us know who at Silicon  
ValleyColocation we should forward it to.


Regards,


Ken Rubin
Senior Global Account Manager
Telehouse America
(T) 718-313-1221
(M) 917-829-0397
(F) 718-355-2517
ken.ru...@telehouse.com
www.telehouse.com
--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness







Question. Cisco PIX/ASA

2009-04-29 Thread Jo¢
Greetings all


I have a customer running with a Cisco 5500 series firewall. What were
seeing (as a problem) is that there is a bit being flipped by the firewall
in the packet header. The bit in question is the Congession Window Reduced
or CWR bit. Under heavy load the target server is getting this bit as high
and since (I am guessing) its that way dropping the session yet its not near
capacity. It’s a Microsoft server as well. Not that I am knocking that but.
Under the same situation a Linux/Apache server doesn't seem to care, and
goes about its business. Anyone heard of this? I did searches regarding this
but found (as per usual) tons of usless info.  I'm not sure why the packets
are being changed by the ASA. I know there not hitting the firewall this way
(Packet capture) but they are getting changed. Config mishap? Is the ASA
throttling down stuff, and if so why not at the requesting party? 

Dunno. Completely baffled. Thanks In Advance!

-Joe




Re: Important New Requirement for IPv4 Requests

2009-04-24 Thread Jo Rhett

On Apr 21, 2009, at 5:23 PM, Matthew Palmer wrote:
Oh, you lucky, lucky person.  We've got a couple of customers at the  
day job

that constantly come back to us for more IP addresses for bandwidth
accounting purposes for their colo machine(s).  Attempts at  
education are

like talking to a particularly stupid brick wall.



And not very effective either, because anything they do to solve the  
problem another way will likely create the valid need for an external  
IP.   These days, virtual hosting is all virtual machines, so the IP  
justification is just there anyway.


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness







Re: Important New Requirement for IPv4 Requests

2009-04-24 Thread Jo Rhett

On Apr 21, 2009, at 5:20 PM, Matthew Palmer wrote:
Then they come back with a request for IPs for SSL certificates,  
which is a
valid technical justification.  BTDT.  People will find a way to do  
the

stupid thing they want to do.



Most of the stupid people don't, actually.  That's the funny thing  
that surprises me -- just how obviously lame the justifications are,  
and how they are unable even with direct statements about how to  
justify the IP space to do so.  My god, it's really not hard to build  
a valid justification for more space than you need -- seriously.  But  
these people just can't pull it off.


Likewise, every company with whom I've had to debate the topic has  
failed within 18 months, so the problem pervades the organization ;-)


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness







Re: Important New Requirement for IPv4 Requests

2009-04-24 Thread Jo Rhett

On Apr 21, 2009, at 6:50 PM, bmann...@vacation.karoshi.com wrote:

FTP?  Who uses FTP these days?  Certainly not consumers.  Even Cisco



well, pretty much anyone who has large datasets to move around.
that default 64k buffer in the openssl libs pretty much sucks
rocks for large data flows.



Large data sets?  So you are saying that 512-byte packets with no  
windowing work better?  Bill, have you measured this?


Time to download a 100mb file over HTTP and a 100mb interface: 20  
seconds.
Time to download a 100mb file over FTP and a 100mb interface: ~7  
minutes.


And yes, that was FreeBSD with the old version openssl library that  
shipped with 6.3.


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness







Re: [Nanog-futures] Fwd: ADMIN: Reminder on off-topic threads

2009-04-23 Thread Jo Rhett
On Apr 23, 2009, at 4:14 AM, Gadi Evron wrote:
 What I am saying is not to dump everything, but rather now that  
 issues are resolved, how about a lighted finger on that moderate  
 button?


The issues are not resolved.   How about a slightly heavier finger on  
the moderate button?

Gadi, everyone here understands that you want NANOG to be a all-things- 
Gadi-wants-to-talk about.   The rest of us prefer to keep topics  
relevant to their list, and not discuss the same topic on multiple  
mailing lists.

-- 
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness




___
Nanog-futures mailing list
Nanog-futures@nanog.org
http://mailman.nanog.org/mailman/listinfo/nanog-futures


Re: [Nanog-futures] Fwd: ADMIN: Reminder on off-topic threads

2009-04-22 Thread Jo Rhett
On Apr 22, 2009, at 3:31 AM, Joe Provo wrote:
 I think the MLC has been doing a good job


I would like to say that I agree with this statement.   I think the  
MLC is doing a better job than previously, and could improve the list  
even a bit more if they cracked down sooner on these threads.  Thank  
you, and keep up the good work.

-- 
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness




___
Nanog-futures mailing list
Nanog-futures@nanog.org
http://mailman.nanog.org/mailman/listinfo/nanog-futures


Re: Important New Requirement for IPv4 Requests

2009-04-21 Thread Jo Rhett

On Apr 21, 2009, at 3:49 AM, Frank Bulk - iName.com wrote:

There's a big difference between signing that the books are right (it
matters!) and filling out paperwork for ARIN.  The first is one of his
primary duties as an officer of the company, the second won't even  
make his

secretary's to do list.

It appears that ARIN wants to raise the IP addressing space issue to  
the CxO

level -- if it was interested in honesty, ARIN would have required a
notarized statement by the person submitting the request.


No.  Those are two entirely different problems.

A notary signs only that the person in front of them has been checked  
to be who they say they are.  That's authentication. A Notary cannot  
attest that what is on the document is valid.


A CxO signing that the request is valid is Authorization to speak for  
the company.  Different spectrum.


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness







Re: Important New Requirement for IPv4 Requests

2009-04-21 Thread Jo Rhett

On Apr 21, 2009, at 1:58 PM, David Hubbard wrote:

Raising the price won't help; there's already a huge amount
of wasted address space by web hosts selling IP addresses
to customers who need them solely for 'seo purposes' rather


It's a common request we see.  We refuse it, and point them to the  
Google documentation that shows that unique IPs don't help or hurt  
their SEO standings.



reasons and even then they don't believe me.  If ARIN would
enforce a technically justified use of IPv4 space that does
not recognize seo as a valid reason, that would definitely
help


I point to the wording where it says that we need to collect the  
technical justification for the additional IP addresses.  Since  
virtual web hosting has no technical justification for IP space, I  
refuse it.



And since the policy allows it currently, the CEO signing off
on it will also be valid.



Depends on how you read the policy.  I prefer my reading to yours ;-)

That said, if someone who likes writing these things will help me,  
I'll gladly create and advance a policy demanding a real, provable  
need for an IP beyond one per physical host.


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness







Re: Important New Requirement for IPv4 Requests [re impacting revenue]

2009-04-21 Thread Jo Rhett

On Apr 21, 2009, at 2:42 PM, Shane Ronan wrote:
Mr Curran, given the response you've seen from the group, and in  
particular the argument that most CEO's or Officers of firms will  
simply sign off on what they IT staff tells them (as they have  
little to no understanding of the situation),


You really should go ask a CEO if he'd sign off on something that he  
doesn't understand.  Really.  I can assure you that your impression is  
wrong, and most CEOs don't prefer to be standing in court defending  
their actions.


can you explain what exactly you are hoping to achieve by heaping on  
yet an additional requirement to the already over burdensome process  
of receiving an IPv4 allocation?



Burdensome?  Really?  If you have your documentation together it takes  
about 15 minutes from beginning of the application form until  
receiving your new allocation.  I spend longer on hold any time I deal  
with any other vendor.


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness







Re: Important New Requirement for IPv4 Requests

2009-04-21 Thread Jo Rhett

On Apr 21, 2009, at 3:40 PM, Chris Adams wrote:

Once upon a time, Jo Rhett jrh...@netconsonance.com said:

Since
virtual web hosting has no technical justification for IP space, I
refuse it.


SSL and FTP are techincal justifications for an IP per site.


Absolutely.  But SEO on pure virtual sites is not ;-)

--  
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness







Re: Important New Requirement for IPv4 Requests

2009-04-21 Thread Jo Rhett


On Apr 21, 2009, at 4:22 PM, Ken A wrote:

Chris Adams wrote:

Once upon a time, Jo Rhett jrh...@netconsonance.com said:
Since  virtual web hosting has no technical justification for IP  
space, I  refuse it.

SSL and FTP are techincal justifications for an IP per site.


Right. Also, monthly bandwidth monitoring/shaping/capping are more  
easily done using one ip per hosted domain, or ftp site, or  
whatever. Otherwise you are parsing logs or using 3rd party apache  
modules.


*Shrug* I've been doing IP allocations for 14 years and that's never  
been mentioned to me.


I suspect that anyone with enough traffic to need traffic shaping has  
dedicated hosts or virtual servers, which get a unique IP each.


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness







Re: Important New Requirement for IPv4 Requests

2009-04-21 Thread Jo Rhett

On Apr 21, 2009, at 4:55 PM, Jon Lewis wrote:
Some customers have wised up and when providing IP justification,  
they don't mention SEO anymore.  However, I've seen several requests  
in the past couple weeks from customers/prospective customers  
wanting /24's or larger subnets (or they're not buying/canceling  
service) where the justification provided was something ARIN would  
probably be ok with, but IMO was completely FoS.  It's hard to tell  
sales no when the customer tells you exactly what they think you  
want to hear [for IP justification], but your gut tells you this is  
BS.



Then you have an obligation to investigate.  It's in the NRPM ;-)

For our part, it becomes really easy.  When someone submits a request  
for 200 physical hosts and their profile says they are paying for 40  
amps of power... yeah, it's easy to know they are lying ;-)


It is a problem because some ISPs don't care and just give away IPs,  
so customers get annoyed with us when I ask for proper justification.   
Oh well ;-)


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness







Re: Important New Requirement for IPv4 Requests

2009-04-20 Thread Jo Rhett

On Apr 20, 2009, at 4:39 PM, Joe Greco wrote:
So the officer, most likely not being a technical person, is going  
to
contact ...  probably the same people who made the request, ask them  
if

they need the space.  Right?

And why would the answer be any different, now?



This is exactly identical to having the CEO signed the quarterly  
statements.  You are saying this is Right.  The CEO couldn't do that  
accounting him/herself -- but they're going to ask more questions and  
be more cautious before putting their name on it.


I applaud this idea.  I wish we had done it 10 years ago, but it's not  
too late to start.  Before late than never.


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness







RE: Michael Mooney releases another worm: Law Enforcement /Intelligence Agency's do nothing

2009-04-18 Thread Jo¢

Pardon the ignorance

I have to take this a step back. Your neighbor leaves their window open with
a fresh bowl of fish near the window. A bunch of cats show up and start
trying to get in, to no avail do they get in. At the first chance you
discuss this with your neighbor, and warn them of this situation. The
following day the neighbor does the same thing, window open, fresh bowl of
fish, do you 
A: sit back and say Told you so.
B: Swat the cats away and guard the window.
C: kill all the cats in the area.
D: hire the cats to find another open window. 

I know this sounds silly, but to simplify things, If you
 
A: Sitting back and watching the whole mess your now an accessory (Yeah I
watched em)
B: Neighbor says Hey I wanted to take pictures of those cats and you shoed
them away!
C: Vigilante style kill all the cats. Closing a window just is too much.
D: Hire cats? Perhaps another EDS commercial.

If theres a genuine exploit that one has been made aware of, and there is no
preventive action made than I think we all know the outcome. If theres a
sudden exploit that runs ramped that you haven't been aware of than lots of
time spent researching it. Locking up all the bad guys will not solve the
short comings of security in applications. 


But just my 2¢s
- Joe Blanchard

 

 -Original Message-
 From: Randy Bush [mailto:ra...@psg.com] 
 Sent: Saturday, April 18, 2009 12:56 AM
 To: andrew.wallace
 Cc: n3td3v; nanog@nanog.org
 Subject: Re: Michael Mooney releases another worm: Law 
 Enforcement /Intelligence Agency's do nothing
 
  So if Al-Qaeda blow up a shopping centre and the guy who 
 masterminded 
  it turns out to be 17 he gets a job in MI5?
 
 what is more fun than a net vigilante?  a ranting and raving 
 hyperbolic net vigilante.
 




RE: Michael Mooney releases another worm: Law Enforcement /Intelligence Agency's do nothing

2009-04-18 Thread Jo¢
lol, in a virtual world its always nice to have the delete key (:
 

 -Original Message-
 From: Randy Bush [mailto:ra...@psg.com] 
 Sent: Saturday, April 18, 2009 3:10 AM
 To: Jo¢
 Cc: 'andrew.wallace'; 'n3td3v'; nanog@nanog.org
 Subject: Re: Michael Mooney releases another worm: Law 
 Enforcement /Intelligence Agency's do nothing
 
  I have to take this a step back. Your neighbor leaves their window 
  open with a fresh bowl of fish near the window.
 
 what i do is laugh at the fool and hit delete




RE: Fiber cut in SF area

2009-04-10 Thread Jo¢
 
I'm confussed, but please pardon the ignorance. 
All the data centers we have are at minimum keys to access
data areas. Not that every area of fiber should have such, but
at least should they? Manhole covers can be keyed. For those of
you arguing that this is not enough, I would say at least it’s a start.
Yes if enough time goes by anything can happen, but how can one
argue an ATM machince that has (at times) thousands of dollars stands
out 24/7 without more immediate wealth. Perhaps I am missing
something here, do the Cops stake out those areas? dunno

Just my 2¢









options for full routing table in 1 year?

2009-04-08 Thread Jo Rhett
I was chatting with someone the other day and we were trying to build  
a complete list of all units which can handle full routing tables 1  
year from now, assuming current 4k/month growth (nevermind de- 
aggregation)


Juniper M/T-series units could handle 600k before, now 1mil with I- 
chip upgrade?

Juniper MX-series units are always 1mil

Cisco 6500/7600 with SUP720-3BXL handles 1mil routes

Force10 E300/600/1200 with dual-cam line cards handle 512k routes
Force10 E600/1200 with Exascale (quad-cam) line cards handle 1mil routes

Is there anything I'm forgetting here?

And if you already have one of these units, the upgrades are:

Juniper M-series units can replace the FPIC card to get new I-chip?
...if I understand it, no other cards need replaced

Cisco 6500/7600 you replace SUP32 or SUP720 with SUP720-3BXL
...if I understand it, no other cards need replaced?
	(note that this disagrees with my understanding of how their FIB/CEF  
works so I'm curious about this)


Force10 you replace every single line card, since the entire chassis  
is limited to the smallest CAM size available.


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness







[Nanog-futures] An opinion re:issues with heavy-handed moderation

2009-04-07 Thread Jo Rhett
This message is intended for Joe Provo and other members of the  
steering committee.  I am not replying to Gadi.

On Apr 6, 2009, at 1:57 PM, Gadi Evron wrote:
   1. Threads are moderated with no notice to person or mailing
  list, or availability for examination.

I have been moderated on the list recently.  I received notice that I  
was moderated, and on consideration of the topic I agreed with the  
moderation.   Honestly there should be more moderation rather than  
less ;-)

   3. It is very heavy-handed high-key moderation, which is not
  what we ask for on NANOG as far as I understand, unless there
  was a policy change.

It has been what I've been hoping for ;-) So it is certain why *I* ask  
for.

   5. The admin team does not respond to requests for information
  or challenges on this matter (I made one).

I don't know about recently, but a year or so ago I replied to a  
notice that my post was rejected and I got a detailed answer in  
response.  That answer satisfied my curiosity, and even though I  
didn't agree entirely with the decision it was a close enough call  
anyway.   I don't have any problem with the process as I have  
witnessed it.  If it is still being handled in this fashion then I see  
no need for change.

-- 
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness




___
Nanog-futures mailing list
Nanog-futures@nanog.org
http://mailman.nanog.org/mailman/listinfo/nanog-futures


RE: Nipper and Cisco configuration results

2009-04-02 Thread Jo¢
What IOS version are you using? I don't see that behavior (rlogin/rsh) by
default, but I'm a few revisions behind on the latest. @ 12.2
I do see from the router: 
RCMD-4-RSHPORTATTEMPT Attempted to connect to RSHELL from 192.168.1.52
from nmaps, but theres no response to the SYN packet of the attempting IP. I
think this has been
the case since w-a-y earlier versions of IOS for logging levels but not sure
at which level.
Looks to only be logging an attempt, no session is made, sort of like a
firewall 
just letting you know there was an attempt. The router gets the request but
it falls on deaf
ears, no one home. Unless perhaps theres some other sort of flag/bit that
can be presented to 
open that connection(extremely doubtful) I don't believe theres any way to
connect. 

Perhaps turning down your logging will prevent your testing program from
reporting a false positive?
I'd snoop/sniff the traffic and see if your router is SYN/ACK-ing the
request of rlogin/rsh to be sure.

sarcasmAnd make sure their not to close to one another, incase their using
undocumented 
internal wireless units as a means to complete the connection, those Cisco
guys you know../sarcasm

Regards
Joe Blanchard

 -Original Message-
 From: Subba Rao [mailto:castellan2004-...@yahoo.com] 
 Sent: Thursday, April 02, 2009 6:33 PM
 To: nanog@nanog.org
 Subject: Nipper and Cisco configuration results
 
 I am using Nipper for verifying my Cisco configuration.  
 Nipper is finding the rlogin service that is not in the 
 configuration.  I have searched the access lists and do not 
 see it anywhere.  The explanation by Nipper about this 
 finding, Telnet protocol implemented by this 
 service is confusing.  Here is the Nipper's output:
 
 __
 Rlogin Service Settings
 
 The Rlogin service enables remote administrative access to a 
 CLI on Cisco Router Devices.  The Telnet protocol implemented 
 by th service is simple and provides no encryption of the 
 network communications between client and the server.  This 
 section details the Rlogin settings.
 
 Description                Setting
 Rlogin Service            Enabled
 Service TCP Port        513
 __
 
 I have checked a few other routers where SSH was not enabled 
 with the same results.
 
 Can someone explain why Nipper is saying Rlogin is enabled 
 when I do not see it in the configuration file?  Is there 
 something else that I need to be looking at?
 
 Thank you in advance for any help.
 
 Subba Rao




RE: Nipper and Cisco configuration results

2009-04-02 Thread Jo¢

Subba,

Sorry, perhaps I am confussed about the nature of your question? Did you
have acls up for logging these attempts and they weren't logged? or are you
asking for help from the Nipper portion of this as to why its reporting this
item. 
With my logging turned up to debug I do see entries about RSHPORTATTEMPTs,
but I suspect theres a lesser logging
for that based on facility.
At 12.3 I don't see any sort of problem with an open Rlogin/Rsh, and I have
tested this on a router running a very minimal configuration. Hands out DHCP
and does OSPF, but that's about it. 

Can you clarify your problem a bit? 

-Joe

 




From: Subba Rao [mailto:castellan2004-...@yahoo.com] 
Sent: Thursday, April 02, 2009 8:25 PM
To: nanog@nanog.org; Jo¢
Subject: RE: Nipper and Cisco configuration results


I did not scan the routers yet with nmap.  These results are from
Nipper analysis.  None of the access lists are showing port 513 as Nipper
is complaining about.  The IOS version is 12.4

Subba Rao


--- On Thu, 4/2/09, Jo¢ jbfixu...@gmail.com wrote:



From: Jo¢ jbfixu...@gmail.com
Subject: RE: Nipper and Cisco configuration results
To: castellan2004-...@yahoo.com, nanog@nanog.org
Date: Thursday, April 2, 2009, 8:18 PM


What IOS version are you using? I don't see that behavior
(rlogin/rsh) by
default, but I'm a few revisions behind on the latest. @
12.2
I do see from the router: 
RCMD-4-RSHPORTATTEMPT Attempted to connect to RSHELL from
192.168.1.52
from nmaps, but theres no response to the SYN packet of the
attempting IP. I
think this has been
the case since w-a-y earlier versions of IOS for logging
levels but not sure
at which level.
Looks to only be logging an attempt, no session is made,
sort of like a
firewall 
just letting you know there was an attempt. The router gets
the request but
it falls on deaf
ears, no one home. Unless perhaps theres some other sort of
flag/bit that
can be presented to 
open that connection(extremely doubtful) I don't believe
theres any way to
connect. 

Perhaps turning down your logging will prevent your testing
program from
reporting a false positive?
I'd snoop/sniff the traffic and see if your router is
SYN/ACK-ing the
request of rlogin/rsh to be sure.

sarcasmAnd make sure their not to close to one another,
incase their using
undocumented 
internal wireless units as a means to complete the
connection, those Cisco
guys you know../sarcasm

Regards
Joe Blanchard

 -Original Message-
 From: Subba Rao [mailto:castellan2004-...@yahoo.com] 
 Sent: Thursday, April 02, 2009 6:33 PM
 To: nanog@nanog.org
 Subject: Nipper and Cisco configuration results
 
 I am using Nipper for verifying my Cisco configuration.  
 Nipper is finding the rlogin service that is not in the 
 configuration.  I have searched the access lists and do
not 
 see it anywhere.  The explanation by Nipper about this 
 finding, Telnet protocol implemented by this 
 service is confusing.  Here is the Nipper's output:
 
 __
 Rlogin Service Settings
 
 The Rlogin service enables remote administrative access to
a 
 CLI on Cisco Router Devices.  The Telnet protocol
implemented 
 by th service is simple and provides no encryption of the 
 network communications between client and the server.
This 
 section details the Rlogin settings.
 
 DescriptionSetting
 Rlogin ServiceEnabled
 Service TCP Port513
 __
 
 I have checked a few other routers where SSH was not
enabled 
 with the same results.
 
 Can someone explain why Nipper is saying Rlogin is
enabled 
 when I do not see it in the configuration file?  Is there 
 something else that I need to be looking at?
 
 Thank you in advance

RE: Nipper and Cisco configuration results

2009-04-02 Thread Jo¢
Subba,

 I've not heard or used this product (Nipper) before, so I cannot confirm
what the reasoning is for this. I can tell you that
based on the captures at the wire this appears to be a false-positive. It
appears there is a simuliar question being
asked on their (Nipper's) forums. My guess is it (Nipper) is using the
logging from the Cisco devices in error to claim this as an issue. If it’s
not given access to the Cisco devices other than a network feed not
snmp/logins/syslogging/works/etc, I as well as many others would surely be
interested. 

Forum reference (which hasn't been answered at this time)
Ref:
http://nipper.titania.co.uk/forums/viewtopic.php?f=3t=72sid=8f7bc0ec62d41b
09cd977eb7e72d1f6e

I would be interested to know if you find out the reasoning for this, of
course offlist would be fine.

Regards,
-Joe Blanchard




From: Subba Rao [mailto:castellan2004-...@yahoo.com] 
Sent: Thursday, April 02, 2009 9:43 PM
To: nanog@nanog.org; Jo¢
Subject: RE: Nipper and Cisco configuration results


Joe,

Thank you for replying.  I am asking about the Nipper complaint.
Why is Nipper report saying Rlogin is enabled when I don't see any ACL in
the config?

Using IOS 12.4

Cheers,

Subba Rao





Re: Yahoo and their mail filters..

2009-03-25 Thread Jo Rhett
On Wed, Mar 25, 2009 at 9:16 AM, Jo Rhett jrh...@netconsonance.com  
wrote:

The problem is... you aren't doing the work.  You aren't stopping the
offenders.  That's the goal.  Automation should be a tool to help  
you do the

job better, not avoid doing the job at all.


On Mar 24, 2009, at 9:00 PM, Suresh Ramasubramanian wrote:

And yes indeed, its a way for us to automate termination of spammers,
and to discover other patterns (in signup methods / spam content etc)
that we can use to update our filters.


That's a great theory.  Would you be willing to post an update to this  
list if and when your technology and automation actually get to the  
point of actually shutting down a spammer?



There's a whole lot of maawg best practices (some work in progress, on
outbound abuse / webmail abuse) that deal with these issues.


No, see, that's the problem.  Best Practices don't deal with abuse  
reports.  Humans deal with abuse reports.  You can collect and sort  
and collate your spam reports all day.  What about the part where a  
human looks at the report, confirms that it is spam, and terminates  
the customer?  You've got to do that.


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness







Re: Yahoo and their mail filters..

2009-03-24 Thread Jo Rhett

On Feb 27, 2009, at 7:10 AM, Ken A wrote:
I agree that aol could do a better job of filtering the outbound,  
but I don't think it's a useless system. We get a few dozen from aol  
a day unless we have a real problem.
I see the mother-daughter conversations (worst), the subscribed lazy  
user emails - we encourage our mailing list senders to include unsub  
links - partly to make it easy for _us_ to click and unsub these  
dummies.


And we see the 'real deal' now and then; usually an exploited php  
script being abused by spammers, or someone who has had their  
password sniffed, or stolen.
Most of these are users who travel and don't use secure protocols,  
or have a teenager in the house (the most insecure protocol is  
adolescence). We appreciate aol's efforts, imperfect as they are.



The math here is easy.

1. The time cost of reading AOL's feedback loop was greater than 2  
working hours every day.
2. The number of exploited systems that we received notification about  
was total of 3 in 2 years of reading that loop.

3. Every one of those exploited systems also got SpamCop reports.

365 x 2 years x 2 hours = 1460 hours minimum (because it rarely took  
only 2 hours)
1460 hours of effort / 3 compromises = 487 hours, or 3 months of work  
per compromise.


In short, AOL provided zero value to us.  Because if a SpamCop user is  
reporting valid receipts, I report it back to the SpamCop admins and  
they go have a talk with the user.


NOTE: for a small mail sending provider who controls every mail server  
and customer in their netblock, it probably is useful.  It's just  
useless for colocation providers and generic ISPs.


And let's be honest.   AOL's effort shouldn't be applauded.  It's an  
autobot which sends false spam reports, nothing more and nothing  
less.  Any autobot which sends false spam reports needs to be shut down.


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness




Re: Yahoo and their mail filters..

2009-03-24 Thread Jo Rhett

Suresh, in theory I like what you say but this caught my eye:

On Mar 24, 2009, at 6:50 PM, Suresh Ramasubramanian wrote:

though several sites do seem to be consuming it just fine, and we send
high volume feedback loops to hotmail/yahoo/aol etc, and they to us,
without my team having to do anything much manually, its mostly
automated.



I would like to point out that gmail abuse reports appear to be  
entirely ignored.  I've been reporting and rereporting everything from  
spam floods to phishing attacks that were very good looking/tricky to ab...@gmail.com 
 and report them again in 2 days, report the exact same one again in  
2 days, etc.


Yes, you've automated your report processing to the point you don't  
actually have to do any work.


The problem is... you aren't doing the work.  You aren't stopping the  
offenders.  That's the goal.  Automation should be a tool to help you  
do the job better, not avoid doing the job at all.


--
Jo Rhett
an abuse response administrator who reads *every* report sent to us,  
and takes action on *every* one of them.




Re: Yahoo and their mail filters..

2009-02-26 Thread Jo Rhett

On Feb 25, 2009, at 8:14 AM, Ray Corbin wrote:
It depends on your environment. I've seen where it is helpful and  
where it is overwhelming. If you are a smaller company and want to  
know why you keep getting blocked then those should help. If you are  
a larger company and get a several hundred a day, but you send 100k  
emails to AOL then it is not as big of a deal. If you are a shared  
hosting provider and you get a lot of them you should look into what  
is being sent to AOL, such as forwarded spam from customers 'auto  
forwards' (isolate the auto forwards to a separate IP address and  
simply don't sign up for the FBL for it) If you have a good  
setup where only customer-originated email is being sent through the  
IP's you have a FBL on, then it is useful and you shouldn't get as  
many complaints.



Ray, you don't get it.   What comes from AOL is literally every step  
in a mother-daughter conversion.  You get to read the entire thread.   
Loving chat, mother and daughter back and forth.  But one of them is  
hitting SPAM on the e-mail *AFTER* replying to it and writing a nice  
letter back.


This is abuse of the abuse department.  This isn't spam.  Reading  
through ~3k of these not-spams every day doesn't help us solve any  
actual abuse problems.


Feedback loops will not be useful until the providers of the feedback  
loops accept reports about use of the spam reporting tools, and are  
willing to go fix their user behavior.


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness






Re: Atrivo/Intercage

2008-09-24 Thread Jo Rhett

On Sep 23, 2008, at 8:12 PM, Joe Greco wrote:

Which is not acceptable.  You answer your abuse complaints, you shut
down your spammers.  Period, end of subject.


That's a bit '90's.  I'll settle for s/answer/handle/, because I don't
think that most sites are willing to actually discuss abuse issues  
with

random folks submitting complaints, and so that leaves you with either
sending a form letter of some sort, or not saying anything.


I went out of my way to get it written into our customer contract that  
we can discuss abuse issues with the affected parties.


And I am simply an employee, neither an executive nor an owner, so  
this took a bit of doing.  But it has given me great pleasure the few  
times that we made a mistake with a customer, and I got to tell the  
affected parties that the abuser is now homeless ;-)


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness






a vernier of civilization...

2008-09-24 Thread Jo Rhett

On Sep 24, 2008, at 7:24 PM, Randy Bush wrote:

this way lies lynch mobs
shall we at least apply a vernier of civilization?



Randy, I would agree if anything less had ever been effective.

If you have a better idea, please explain to the rest of us.

--  
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness






Re: Atrivo/Intercage

2008-09-23 Thread Jo Rhett

On Sep 22, 2008, at 1:33 PM, Tom Sparks (Applied Operations) wrote:

I also don't believe Intercage was complicit in any
net-crime; Thats not to say it didn't exist, but more along the lines
of they got lost in the noise of running a business.


Which is not acceptable.  You answer your abuse complaints, you shut  
down your spammers.  Period, end of subject.


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness






Re: Procedure to Change Nameservers

2008-09-18 Thread Jo Rhett

On Sep 16, 2008, at 3:50 PM, Crist Clark wrote:

I want to change the nameservers for a bunch of domains


Then ask the question on a list related to DNS.

--  
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness






Re: Teleglobe appears to be spam-source zombie network?

2008-09-11 Thread Jo Rhett

On Sep 10, 2008, at 6:50 PM, Yann Berthier wrote:

  while there is certainly outdated abuse info for some of our blocks,
  in this particular case the subnet that was allocated to us has
  up-to-date mail+phone info


I'd like to note for anyone else who might make similar mistakes --  
putting valid contact info only in the top level allocation and not  
tied to your organization means that nobody can find it, unless they  
are bored and feel like trying the IP with /25, /24, /23, /22 ... etc  
until they find your working contact info.


Do it right, tie the abuse contact to the organization.  It will show  
up on *all* allocations.


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness






Re: Teleglobe appears to be spam-source zombie network?

2008-09-11 Thread Jo Rhett

On Sep 10, 2008, at 6:23 PM, Christopher Morrow wrote:

It's possible that in the shuffle of company
renaming/rebranding/rejiggering-of-people they lost this bit in the


Is it just me, or isn't keeping valid contact information on your  
netblocks like, a serious affair?  Something you should get around to  
within a few hours, nevermind a few months since the changes?


I mean seriously.

--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness






Re: an effect of ignoring BCP38

2008-09-11 Thread Jo Rhett

On Sep 6, 2008, at 6:49 AM, k claffy wrote:

do that many networks really allow spoofing?  i used
to think so, based on hearsay, but rob beverly's
http://spoofer.csail.mit.edu/summary.php suggests
things are a lot better than they used to be, arbor's
last survey echos same.  are rob's numbers inconsistent
with numbers anyone else believes to be true?



I hate to spoil anyone's fantasies about this topic, but yeah.
Nearly everyone does.


I've been in, near, or directly in touch with enough big provider NOCs  
in the last year on various DoS attach research issues, and nearly  
nobody... that's right NONE of them were using BCP38 consistently.   
Name the five biggest providers you can think of.  They ain't doing  
it.   Now name the five best transit providers you can think of.  They  
ain't doing it either.  (note that all of these claimed to be doing so  
in that survey, but during attack research they admitted that it was  
only in small deployments)


If someone told me (truthfully) that there was 10% BCP38 compliance  
out there, I'd be surprised given what I have observed.


We don't have a long ways to finish.  We have a long ways to start.   
Finishing isn't even within the horizon yet.


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness






Re: BCP38 dismissal

2008-09-11 Thread Jo Rhett

On Sep 4, 2008, at 3:22 PM, Gadi Evron wrote:
On that you'll have to speak for yourself.  We have it on every  
customer port ;-)


Now that is interesting. Can you share a bit about you  
rimplementation hardships, costs, customer complaints, etc?



One customer complaint.  Found the customer was looping traffic  
between two uplinks and helped them fix the problem ;-)


Implementation cost: time/labor to implement automatic management of  
ACLs on the customer ports.


Not all that much cost, since we had already developed infrastructure  
to do the same thing for customer configurations.  Maybe 12 hours of  
my time coding and testing.


Honestly, I expected a lot more problems than we've had.  Especially  
given the fallout I'd seen on the networks trying to do it with  
Cisco.  But the Force10 gear didn't even notice the effect, and it's  
been ~2 years since I've even thought much about it.


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness






Re: Force10 Gear - Opinions

2008-09-11 Thread Jo Rhett

On Sep 5, 2008, at 12:37 PM, Paul Wall wrote:

Jo Rhett wrote:
Note the not random comment.  People love to use the random  
feature of ixia/etc but it rarely displays

actual performance in a production network.


Once upon a time, vendors released products which relied on CPU-based
flow setup.  Certain vintages of Cisco, Extreme, Foundry,
Riverstone, etc come to mind.  These could forward at line rate
under normal conditions. Sufficient randomization on the sources
and/or destinations (DDoS, Windows worm, portscans, ...) and they'd
die a spectacular death.  Nowadays, this is less of a concern, as the

...

Either way, I think it's a good test metric.  I'd be interested in
hearing of why you think that's not the case.  Back on topic, doing a


Yes.  And those problems were fixed in most gear.  What I found *also*  
was that the flow tables tended to fill up, and a lot of gear thrashes  
on the flow tables.  You need real bi-directional sessions to create  
the effect properly in many cases.  (ie Extreme, which handles random  
fine but bidirectional flows proved that too much of the work was  
being done in software)



I have a current spreadsheet here, and trust me your math went wrong
somewhere.  A completely full chassis is only a bit more than what  
you are

...
But no, I'm not going to redo the math.  I'm not a F10 salesperson  
and I

have much more important things to do right now.


I'd be interested in seeing where I went wrong, in the interest of
setting the record straight.  The original poster was interested in
how Force 10 stacks up against the competition from a feature and
price prospective.  He deserves some cold science, and I'm trying to
help him out.


I meant what I said, and I wasn't trying to be rude.  There are F10  
people on this mailing list, it would serve you to engage them instead  
of me.  I'm quite happy with my Force10 units but I'm not making any  
commission selling them and I have too much to do to be doing someone  
else's job.



To wit, you said F10 is cheaper than a comparable Cisco 6500 (in a
basic gig-e configuration).  I demonstrated that's not the case.  You
responded with ad-hominem attacks, followed by indifference, and
later, claims of emotional distress; still you refuse to provide any
hard numbers, claiming it's not your job.  Where I come from, people
like that are referred to as sore losers. :)



You're reading a lot more into it than I bothered to think about it.   
I've done the math repeatedly, and Force10 always comes out cheaper  
than Cisco in that scale of port density.  Your numbers looked off to  
me, but letting you know the previous sentence is about all the time I  
can spend on this topic.  Can we kill this now?  Thanks.


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness






Re: Cisco uRPF failures

2008-09-11 Thread Jo Rhett

On Sep 6, 2008, at 10:20 AM, Anton Kapela wrote:
On Thu, Sep 4, 2008 at 11:35 AM, Jo Rhett [EMAIL PROTECTED]  
wrote:


That's the surprising thing -- no scenario.  Very basic  
configuration.
Enabling uRPF and then hitting it with a few gig of non-routable  
packets
consistently caused the sup module to stop talking on the console,  
and


What do you mean by 'non routable?'


Should have been dropped by UDP.


What was the src/dst makeup of the test traffic?


Both random sources and singular sources demonstrated the problem.


What version of code? Also, port-channel/lag or ECMP?


I don't have those details handy now, nor am I likely to anytime  
soon.  If they've been solved in recent code, great.  But I've seen  
nothing in the tech notes.


quickly, but that turns out not to be the case.  To this day I've  
never


I've never seen the issues you speak of, so it could be
code/platform/config specific.

Also, what sup were you testing?


720s, as said repeatedly.


Forgive me, but what does bits/sec have to do with anything?



The problem only appeared at high bits/sec, as I've said repeatedly.

--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness






Re: BCP38 dismissal

2008-09-11 Thread Jo Rhett

On Sep 7, 2008, at 12:18 AM, Randy Bush wrote:

normally i would have just hit delete.  but your ad hominem attack on
the messenger need a response.

the reality of life is that he is correct in that attack traffic  
comes

from legitimate IP sources anyway.

therefore, your first duty should be to keep your hosts from joining  
the

massive army of botnets.



Having no hosts, I can't do much about that other than use various  
good best practices (including BCP38), run ids units looking for  
compromised hosts, and respond quickly to each abuse report if my IDS  
doesn't observe it first.


Given that I know of no provider larger than us using BCP38 on every  
port, and no other provider larger than us that responds to every  
abuse report, it would appear that we are top of the class in that  
aspect.


Therefore, when someone says I don't need to do BCP38 because BCP38  
doesn't cause problems for them, I consider them a jerk.  And yeah, I  
feel pretty confident looking down my nose at someone like that.


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness






Re: an effect of ignoring BCP38

2008-09-11 Thread Jo Rhett

On Sep 11, 2008, at 12:59 AM, Pekka Savola wrote:
A problem I have with these discussions is that everyone has their  
own idea what BCP38 implies.  Others say their loose-mode uRPF  
setups are BCP38.  Others are using strict uRPF or similar (e.g.  
acls). Some think that Tier1 transit operators should apply one of  
the options above to their tier2 customers.  Others think it should  
just be applied at the site-edges.  Some don't consider spoofing  
protection at LAN interface level at all, others call that also  
BCP38.  Etc.


Honestly, *anything* is better than most of what's out there, which is  
*nothing*.


Loose mode URPF is seems (IMHO) pretty much waste of time and is  
confusing the discussion about real spoofing protection.  The added  
protection compared to ACLs that drop private and possibly bogons is  
not that big and it causes transient losses when the routing tables  
are changing.



I disagree.   But I will say that if everyone would apply strict mode  
or ACLs to their end point interfaces, this would likely make most of  
the loose mode irrelevant.


And your arguments about BGP changes affecting loose mode are only  
problematic on the busiest peering ports.  Loose mode works perfectly  
fine with zero drops (even on Cisco) on anything smaller than a full  
feed (ie, that ISP client of yours you do BGP with)


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness






Re: an effect of ignoring BCP38

2008-09-11 Thread Jo Rhett

On Sep 11, 2008, at 6:32 AM, Pekka Savola wrote:
FWIW, based on off-list discussion, Jo's disagreement seems to stem  
from a misunderstanding of how loose uRPF works (he didn't know it  
accepts any packet that has a route in the routing table).



Um, no.   Because if you put loose mode uRPF on your edges you aren't  
implementing BCP38 now are you?


I don't care how it is deployed.   That's your job ;-)

--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness






Re: Cisco uRPF failures

2008-09-11 Thread Jo Rhett

On Sep 11, 2008, at 10:11 AM, Saku Ytti wrote:


On (2008-09-11 00:50 -0700), Jo Rhett wrote:
As someone who does a lot of work talking to NOCs trying to chase  
down

attack sources, I can honestly tell you that I haven't talked to a
single NOC in the last 16 months who had BCP38 on every port, or  
even on

most of their ports.  And the majority response is our (vendor) gear
can't handle it.   As we both know, Cisco is the largest by far  
vendor
in the marketplace, and I've heard that name more than 70% of the  
time.


Sound like these shops are using 3550 as router, which is common for
smaller shops, especially in EU. And indeed, 3550 would not do uRPF.
(3560E does).



I don't honestly know.  I do know that in every case it was mentioned  
to me it was either a 6500 or a 7600.

(that it was a Cisco anyway)

But frankly, lack of uRPF doesn't mean that BCP38 is impossible.  My  
generation of Force10 gear can't do uRPF.  Yet we are BCP38 compliant.


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness






Teleglobe appears to be spam-source zombie network?

2008-09-10 Thread Jo Rhett
We started getting a flood of autobot spam to our listed abuse mailbox  
about an hour ago out of Teleglobe.  Trying to find someone to shut  
this down has found that


1. Teleglobe has no listed abuse contacts for any of their netblocks
2. The few of their records which have listed e-mail addresses all  
bounce

3. All listed phone numbers on any netblocks we can find are invalid

Any chance that RIPE is more strigent than ARIN and would pull their  
netblocks until they fix this stuff?


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness






Cisco uRPF failures

2008-09-04 Thread Jo Rhett

(changing subject line)

On Sep 3, 2008, at 7:06 PM, Rubens Kuhl Jr. wrote:
This statement is patently false.  The uRPF failures I dealt with  
were based
entirely on the recommended settings, and were confirmed by Cisco.   
Last I
heard (2 months ago) the problems remain.  Cisco just isn't being  
honest

with you about them.


Would you mind telling us what is the scenario so we can avoid it ?



That's the surprising thing -- no scenario.  Very basic  
configuration.  Enabling uRPF and then hitting it with a few gig of  
non-routable packets consistently caused the sup module to stop  
talking on the console, and various other problems to persist  
throughout the unit, ie no arp response.  We were able to simulate  
this with two 2 pc's direction connected to a 6500 in a lab.  If I  
remember right, we had to enable CEF to see the problem, but since CEF  
is a kitchen sink that dozens of other features require you simply  
couldn't disable it.


We also discovered problems related to uRPF and load balanced links,  
but those were difficult to reproduce in the lab and we couldn't  
affect their peering, so we had to disable uRPF and ignore so I don't  
have much details.


I kept thinking that this was a serious problem that Cisco would  
address quickly, but that turns out not to be the case.  To this day  
I've never found a network operator using uRPF on Cisco gear.
  (note: network operator. it's probably fine for several-hundred-meg  
enterprise sites)


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness






Re: Force10 Gear - Opinions

2008-09-04 Thread Jo Rhett

On Sep 3, 2008, at 8:45 PM, Paul Wall wrote:

Linksys, D-Link, SMC, etc are able to pull it off on the layer 3
switches sold at Fry's for a couple benjamins a pop.  :)





I am.  All of these boxes can forward packets at line rate, and list
for a fraction of the price of the Force 10 S-Series.



You and I (and any real network operator) must have different  
definitions of forward at line rate.


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness






uRPF

2008-09-04 Thread Jo Rhett

On Sep 4, 2008, at 1:34 AM, Mark Tinka wrote:

catch inbound RFC 1918 and RFC 3330 with ACL's; and just to
see how crazy things get, we stick our own prefixes in
there since we really shouldn't be seeing them as sources
from the wild.



So you are talking single site, or single peering location?

--  
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness






BCP38 dismissal

2008-09-04 Thread Jo Rhett

On Sep 4, 2008, at 7:24 AM, James Jun wrote:
Indeed... In today's internet, protecting your own box (cp-policer/ 
control
plane filtering) is far more important IMO than implementing BCP38  
when much
of attack traffic comes from legitimate IP sources anyway (see  
botnets).



I'm sorry, but nonsense statements such as these burn the blood.   
Sure, yes, protecting yourself is so much more important than  
protecting anyone else.


Anyone else want to stand up and join the I am an asshole club?

--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness






Re: BCP38 dismissal

2008-09-04 Thread Jo Rhett
Count you which way?  You seem to agree with me.  Everyone should be  
doing both, not discounting BCP38 because they aren't seeing an attack  
right now.


On Sep 4, 2008, at 9:50 AM, John C. A. Bambenek wrote:

Count me in.

There is no reason to limit our defenses to the one thing that we
think is important at one instance in time... attackers change and
adapt and multimodal defense is simply good policy.

On Thu, Sep 4, 2008 at 11:45 AM, Jo Rhett [EMAIL PROTECTED]  
wrote:

On Sep 4, 2008, at 7:24 AM, James Jun wrote:


Indeed... In today's internet, protecting your own box (cp-policer/ 
control
plane filtering) is far more important IMO than implementing BCP38  
when

much
of attack traffic comes from legitimate IP sources anyway (see  
botnets).



I'm sorry, but nonsense statements such as these burn the blood.   
Sure, yes,
protecting yourself is so much more important than protecting  
anyone else.


Anyone else want to stand up and join the I am an asshole club?

--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and

other randomness








--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness






Re: Force10 Gear - Opinions

2008-09-04 Thread Jo Rhett

On Sep 4, 2008, at 10:03 AM, Paul Wall wrote:
You and I (and any real network operator) must have different  
definitions of

forward at line rate.


forwards a gig-e full of 64 byte packets, random src/dst, when you
hook a smartbits/ixia up to it is mine.  What's yours?



Forwards a mixed bag of small and large packets from tens of thousands  
of streams (not random)


1. at sub-millisecond latency
2. no packet loss at full line rate on multiple ports
3. deals appropriately with multiple ports at full line rate leading  
to a single port


And finally, is responsive to operator control even when full line  
rate is directed at switch itself.


Note the not random comment.  People love to use the random feature  
of ixia/etc but it rarely displays actual performance in a production  
network.


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness






Re: BCP38 dismissal

2008-09-04 Thread Jo Rhett
Patrick, it would appear that you are insulting me by your choice of  
quotes but from content one would assume you agree with me.  Perhaps  
next time quote the idiot that said attacks BCP38 would stop don't  
happen any more?

(top posted because the thread is already confused)

On Sep 4, 2008, at 10:05 AM, Patrick W. Gilmore wrote:

On Sep 4, 2008, at 12:52 PM, Jo Rhett wrote:

Count you which way?  You seem to agree with me.  Everyone should  
be doing both, not discounting BCP38 because they aren't seeing an  
attack right now.


No one sees attacks that BCP38 would stop?

Wow, I thought things like the Kaminsky bug were big news.  I guess  
all that was for nothing?


(Yes, I am being sarcastic.  Anyone who thinks attacks which BCP 38  
would stop are not happening in the wild is .. I believe the phrase  
used was confused and misinformed.)


--
TTFN,
patrick




On Sep 4, 2008, at 9:50 AM, John C. A. Bambenek wrote:

Count me in.

There is no reason to limit our defenses to the one thing that we
think is important at one instance in time... attackers change and
adapt and multimodal defense is simply good policy.

On Thu, Sep 4, 2008 at 11:45 AM, Jo Rhett  
[EMAIL PROTECTED] wrote:

On Sep 4, 2008, at 7:24 AM, James Jun wrote:


Indeed... In today's internet, protecting your own box (cp- 
policer/control
plane filtering) is far more important IMO than implementing  
BCP38 when

much
of attack traffic comes from legitimate IP sources anyway (see  
botnets).



I'm sorry, but nonsense statements such as these burn the blood.   
Sure, yes,
protecting yourself is so much more important than protecting  
anyone else.


Anyone else want to stand up and join the I am an asshole club?

--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open  
source and

other randomness








--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness









--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness






Re: Force10 Gear - Opinions

2008-09-04 Thread Jo Rhett

On Sep 4, 2008, at 10:07 AM, Paul Wall wrote:
On Thu, Sep 4, 2008 at 12:40 PM, Jo Rhett [EMAIL PROTECTED]  
wrote:

You added a third SFM3 which has no place to go in this chassis.


No, I did not.  I did, however, list it as a point of reference for
a-la-carte analysis.


So $52,500 versus $62,240 for the Cisco.


No, $65000.00 vs $62240.00.


I have a current spreadsheet here, and trust me your math went wrong  
somewhere.  A completely full chassis is only a bit more than what you  
are quoting (at list) and the chassis itself is practically free.


But no, I'm not going to redo the math.  I'm not a F10 salesperson and  
I have much more important things to do right now.  (not trying to be  
rude, just seriously...)


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness






Re: BCP38 dismissal

2008-09-04 Thread Jo Rhett

On Sep 4, 2008, at 10:14 AM, Paul Wall wrote:
On Thu, Sep 4, 2008 at 12:45 PM, Jo Rhett [EMAIL PROTECTED]  
wrote:
I'm sorry, but nonsense statements such as these burn the blood.   
Sure, yes,
protecting yourself is so much more important than protecting  
anyone else.


Anyone else want to stand up and join the I am an asshole club?


uRPF is important.  But all the uRPF in the world won't protect you
against a little tcp/{22,23,179} SYN aimed at your Force 10 box.

Ya know what I mean?



No.  Because our F10s aren't suspectible to that, period.  I think  
this whole control panel policing is flat out wrong, but honestly to  
argue that point I'd have to do some research into what Cisco is doing  
these days (never had most of the good anti-dos and flood-control  
stuff F10 has last time I looked) and frankly, it's not within my  
scope of work so I left that alone.


The focus of my comment was on the BCP38 isn't important, because  
*THAT* is something that causes grief for me (and everyone) in the day  
job.


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness






Re: BCP38 dismissal

2008-09-04 Thread Jo Rhett

On Sep 4, 2008, at 10:14 AM, james wrote:

OK, I'm an asshole. I'm sure BCP38 can prove to be useful
I guess being an asshole is not so bad given that I have
plenty of company.



It is unfortunately true that you do have lots of company.  If I could  
get away with dropping all routes from people like you I'd be a lot  
happier.  (and we'd all be a lot safer)


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness






Re: BCP38 dismissal

2008-09-04 Thread Jo Rhett

On Sep 4, 2008, at 12:38 PM, Gadi Evron wrote:
Seriously though, everyone should take care of their own end first.  
The problem is Jo doesn't seem to be in the loopon attacks from  
recent years, but I am unsure he would change his mind if he was/



Nice going, Gadi -- let's insult someone who does a good job of  
protecting your network from his customers.


I spend at least 8 hours a week tracking down attacks originating from  
non-BCP38 networks.  This is still a real problem, and the idea that  
BCP-38 is some fad that is irrelevant now ... I have no words for this  
kind of idiocy.  Everyone should be doing BCP-38.  Why don't you apply  
this to your network, instead of sitting around insulting people for  
your incorrect assumptions about their job?


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness






Re: BCP38 dismissal

2008-09-04 Thread Jo Rhett

On Sep 4, 2008, at 2:56 PM, Gadi Evron wrote:
I apologize for making an incorrect assumption and apparently  
insulting you.
My assumption was based on the threading in the email I replied to,  
as what you write here conpletely contradicts what was written there.


Yeah, I think the threading was getting confused quite a bit.

So, we all support BCP38 and nothing really changed from the last  
time we all had this discussion about why most of us don't use it.



On that you'll have to speak for yourself.  We have it on every  
customer port ;-)


--
Jo Rhett
Net Consonance : consonant endings by net philanthropy, open source  
and other randomness






  1   2   >