Re: [Operational] Internet Police

2010-12-09 Thread Suresh Ramasubramanian
Let's put it this way.

1. If you host government agencies, provide connectivity to say a
nuclear power plant or an army base, or a bank or .. .. - you'd
certainly work with your customers to meet their security
requirements.

2. If you are a service provider serving up DSL - why then, there are
some governments (say Australia) that have blacklists of child porn
sites - and I think Interpol came up with something similar too.  And
yes there's CALEA and a few other such things .. not much more that's
new.

Separating rhetoric and military metaphors will help you see this a
lot more clearly.  As will not dismissing the entire idea with
contempt.

As a service provider for anything at all, you'll see your share of attacks.

Whether coordinated by 4chan or by comrade joe chan shouldnt really
matter, except at the level where you work with law enforcement etc to
coordinate a response that goes beyond the technical.  [And ALL
responses to these are not going to restrict themselves to being
solvable by technical means].

--srs

On Fri, Dec 10, 2010 at 12:01 AM, Michael Smith mich...@hmsjr.com wrote:
 How is what to block identified?  ...by content key words?  ..traffic
 profiles / signatures?  Deny all, unless flow (addresses/protocol/port) is
 pre-approved / registered?

 What does the technical solution look like?

 Any solutions to maintain some semblance of freedom?




-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: [Operational] Internet Police

2010-12-09 Thread Suresh Ramasubramanian
And if I ever find the genius who came up with the we are not the
internet police meme ...

On Fri, Dec 10, 2010 at 12:19 AM, Suresh Ramasubramanian
ops.li...@gmail.com wrote:
 Let's put it this way.

 1. If you host government agencies, provide connectivity to say a
 nuclear power plant or an army base, or a bank or .. .. - you'd
 certainly work with your customers to meet their security
 requirements.

 2. If you are a service provider serving up DSL - why then, there are
 some governments (say Australia) that have blacklists of child porn
 sites - and I think Interpol came up with something similar too.  And
 yes there's CALEA and a few other such things .. not much more that's
 new.

 Separating rhetoric and military metaphors will help you see this a
 lot more clearly.  As will not dismissing the entire idea with
 contempt.

 As a service provider for anything at all, you'll see your share of attacks.

 Whether coordinated by 4chan or by comrade joe chan shouldnt really
 matter, except at the level where you work with law enforcement etc to
 coordinate a response that goes beyond the technical.  [And ALL
 responses to these are not going to restrict themselves to being
 solvable by technical means].

 --srs

 On Fri, Dec 10, 2010 at 12:01 AM, Michael Smith mich...@hmsjr.com wrote:
 How is what to block identified?  ...by content key words?  ..traffic
 profiles / signatures?  Deny all, unless flow (addresses/protocol/port) is
 pre-approved / registered?

 What does the technical solution look like?

 Any solutions to maintain some semblance of freedom?




 --
 Suresh Ramasubramanian (ops.li...@gmail.com)




-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: [Operational] Internet Police

2010-12-09 Thread Suresh Ramasubramanian
On Fri, Dec 10, 2010 at 12:42 AM, Randy Bush ra...@psg.com wrote:
 And if I ever find the genius who came up with the we are not the
 internet police meme ...

 he died over a decade ago

All due respect to him, but I didnt want to kick his teeth in or
anything, merely ask if he'd like to reconsider it, given the new
security threats we all face that have outdated that meme.

-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Windows Encryption Software

2010-12-09 Thread Suresh Ramasubramanian
On Fri, Dec 10, 2010 at 6:25 AM, Brandon Kim brandon@brandontek.com wrote:

 Wow, sounds like TrueCrypt it is.not a single other app was suggested!!!

 Thank you gentlemen!


There's also PGP WDE (Whole Disk Encryption)

-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Cloud proof of failure - was:: wikileaks unreachable

2010-12-06 Thread Suresh Ramasubramanian
On Mon, Dec 6, 2010 at 3:08 PM, Peter Dambier pe...@peter-dambier.de
wrote:
 The cloud is a failure. Too easy to get it down.
 I guess wikileaks returning to dedicated hosting proofs that.

I haven't used this sign in nearly a decade.  And certainly not on nanog.
Anyway .. I'll end this thread now.  And folks ..

   .:\:/:.
+---+ .:\:\:/:/:.
|   PLEASE DO NOT   |:.:\:\:/:/:.:
|  FEED THE TROLLS  |   :=.' -   - '.=:
|   |   '=(\ 9   9 /)='
|   Thank you,  |  (  (_)  )
|   Management  |  /`-vvv-'\
+---+ / \
|  |@@@  / /|,|\ \
|  |@@@ /_//  /^\  \\_\
  @x@@x@|  | |/ WW(  (   )  )WW
  \/|  |\|   __\,,\ /,,/__
   \||/ |  | |  jgs (__Y__)
   /\/\/\/\/\/\/\/\//\/\\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)


Re: Free Ping services that test your servers Availability from the Internet

2010-11-27 Thread Suresh Ramasubramanian
An alternative would be Gomez GPN .. however all these are a bit of
overkill for what you specifically need (uptime) - pingdom does very
well for that.

On Sat, Nov 27, 2010 at 12:59 AM, Stefan Fouant
sfou...@shortestpathfirst.net wrote:
 Webmetrics provides such a service (full disclosure I used to work for these 
 guys)...

 http://www.webmetrics.com/



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Blocking International DNS

2010-11-21 Thread Suresh Ramasubramanian
This isnt new - there have been proposals elsewhere for a resolver
based blacklist of child porn sites.

There are also of course the various great firewalls of various
countries.   In case you'd prefer that to having to blacklist them at
your end ..

Doing this for trademark infringement is going to be a bit thick though.

On Mon, Nov 22, 2010 at 2:02 AM, Joe Sniderman
joseph.snider...@thoroquel.org wrote:

 So I suppose operation of a recursor requires one to check with the
 government to see what names its okay to resolve.. They can have my dns
 recursor when they pry it from my cold dead hands. Otherwise no.

 /me waits for the knock at the door and the yell of Search warrant, we
 hear you're running an uncensored BIND



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: The i-root china reroute finally makes fox news. And congress.

2010-11-17 Thread Suresh Ramasubramanian
I had the timeframe wrong then and it was the April 8 routing leaks.
Sorry for the false alarm.

On Wed, Nov 17, 2010 at 8:07 PM, Lindqvist Kurt Erik
kur...@kurtis.pp.se wrote:


 I can detect from the report that this has anything to do with i.root? Can 
 you explain that?

 Looking at the dates referred to it seem more to be related to the routing 
 leaks on April 8th. Or do you have additional information?



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



The i-root china reroute finally makes fox news. And congress.

2010-11-16 Thread Suresh Ramasubramanian
http://www.foxnews.com/politics/2010/11/16/internet-traffic-reportedly-routed-chinese-servers/

-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: The i-root china reroute finally makes fox news. And congress.

2010-11-16 Thread Suresh Ramasubramanian
On Wed, Nov 17, 2010 at 6:09 AM, Jorge Amodio jmamo...@gmail.com wrote:

 Cheers
 BTW avoid foxnews, not much operational content there.

I know it, you know it .. and the problem is that operational content
turning up there has a nasty way of getting political

As it is, fox news is reporting something which was presented to congress

So, lessigisms like code is law aside, I guess yes, it IS political now.

-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: The i-root china reroute finally makes fox news. And congress.

2010-11-16 Thread Suresh Ramasubramanian
Man in the middle rewriting of DNS query responses is the only thing I
can think of.

On Wed, Nov 17, 2010 at 11:47 AM, Fred Baker f...@cisco.com wrote:
 I have read the article and the list, and I'm puzzled. It's pretty clear that 
 the root gets its records from a common source, and that the copies of them 
 being delivered by a given root server were different. As a result, traffic 
 intended to go place A went to place B if the TLD lookup happened to go to 
 the particular root server in question. How did an instance of the root 
 server find itself serving changed records? While there is no obvious 
 indication of who made the change or for what reason, it's unlikely it was 
 accidental.



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Low end, cool CPE.

2010-11-11 Thread Suresh Ramasubramanian
And does this take cellular modems as a backup?  The only wifi AP I've
seen that would take SIM cards besides ethernet was a no-name chinese
brand I saw in a Hong Kong electronics store.

On Fri, Nov 12, 2010 at 7:18 AM, Jeffrey Lyon
jeffrey.l...@blacklotus.net wrote:
 Try the Linksys RV016. We're using this to load balance three
 satellite uplinks in Afghanistan, 2 Mbps each, but it will supposedly
 handle much higher.



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: BGP support on ASA5585-X

2010-11-01 Thread Suresh Ramasubramanian
Juniper srx runs JunOS.

On Sat, Oct 30, 2010 at 11:31 AM, Jeffrey Lyon
jeffrey.l...@blacklotus.net wrote:

 Juniper Netscreen does, in case the OP is looking for alternatives.

 Best regards, Jeff


--
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Dutch Hotels Must Register As ISPs

2010-10-13 Thread Suresh Ramasubramanian
Oh I dont know.  There's lots of hotels that charge something like 20
Euro for a day's worth of wifi [the same with paris airport]

You can get a month's worth of high speed dsl for 20 euro.

So, what's sauce for the goose is sauce for the gander, or however
that translates into dutch.

On Wed, Oct 13, 2010 at 2:47 PM, Wayne E. Bouchard w...@typo.org wrote:
 Okay, if we go down that road, that makes Starbucks, Borders, a number
 of restaurants, and any other place that offers publically accessible
 wifi (free or otherwise) an ISP. If they start to increase the burden
 on these businesses, expect to see wifi hotspots diminish. IMO, that
 classification would be a bad thing.



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: do you use SPF TXT RRs? (RFC4408)

2010-10-04 Thread Suresh Ramasubramanian
On Mon, Oct 4, 2010 at 12:47 PM, Greg Whynott greg.whyn...@oicr.on.ca wrote:

 A partner had a security audit done on their site.  The report said they were 
 at risk of a DoS due to the fact they didn't have a SPF record.

This is pure unadulterated BS from someone who doesnt understand
either DDOS mitigation, or SPF .. or more likely both.

-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: do you use SPF TXT RRs? (RFC4408)

2010-10-04 Thread Suresh Ramasubramanian
dig throwaway1.com NS
dig throwaway2.com NS

etc etc ... and then check_sender_ns_access in postfix, for example.

Scales much better than whackamoling one domain after the other on the same NS

On Mon, Oct 4, 2010 at 4:59 PM,  valdis.kletni...@vt.edu wrote:

 140 million .coms. Throw-away domains. I do believe that Marcus Ranum had
 trying to enumerate badness on his list of Six stupidest security ideas.
 This won't scale as long as you have more spammers adding new domains faster
 than your NOC staff can add them to the blacklist.

 (And even centralized blacklists run by dedicated organizations haven't solved
 the problem yet, so I'm not holding my breath waiting for that to work out...)



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Copyright Enforcement DoS/DDoS Attacks

2010-09-09 Thread Suresh Ramasubramanian
On Fri, Sep 10, 2010 at 1:29 AM,  khatfi...@socllc.net wrote:

 Kind of a shame..  We are likely already tracking his botnets so I almost 
 welcome it as well. Out of curiosity, I did pull some stats over the last 60 
 days and we have seen more attacks originating from the India area than we 
 have seen in the past 12 months.

There's no shortage of botted PCs and wide open dsl providers in India
- extremely high # of cbl listings for massmailer bots for example.

So could be any number of bots .. not like russian, brazilian etc
botmasters arent able to compromise PCs in India, or in Outer Mongolia
if they want to.

-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Copyright Enforcement DoS/DDoS Attacks

2010-09-08 Thread Suresh Ramasubramanian
If that's the india story .. seems to be a press release fed by the
vendor - which from their website also offers medical transcription
and SEO

On Thu, Sep 9, 2010 at 10:15 AM, Brandon Galbraith
brandon.galbra...@gmail.com wrote:
 http://www.smh.com.au/technology/technology-news/film-industry-hires-cyber-hitmen-to-take-down-internet-pirates-20100907-14ypv.html

 http://www.smh.com.au/technology/technology-news/film-industry-hires-cyber-hitmen-to-take-down-internet-pirates-20100907-14ypv.htmlHas
 anyone dealt with this in the wild? I wasn't aware DoS/DDoS attacks were
 suddenly legal.

 --
 Brandon Galbraith
 Voice: 630.492.0464




-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: IPv4 squatters on the move again?

2010-09-07 Thread Suresh Ramasubramanian
Yeah.  This is just the way snowshoe spammers operate - GRE or VPN
tunnels back to a master server, and a /24 full of output points with
throwaway hostnames / reverse dns

On Tue, Sep 7, 2010 at 8:05 PM, Jon Lewis jle...@lewis.org wrote:
 I haven't seen that excuse/justification from customers.  What I did see
 recently that I have to admit was very slick was a customer who claimed they
 were going to be doing a bunch of remote terminals in stores VPN'd into
 their dedi servers and would be streaming video from the servers to the
 clients.  This was of course 99% BS.  There was VPN involvedthey used
 the dedi servers as VPN endpoints for their spam servers that were hosted
 elsewhere.  When we shut them down, there was absolutely nothing
 incriminating of spam operations on their servers...and all they had to do
 was sign up for service at another hosting company, setup the VPN server,
 change the IPs their spam servers VPN to, and they're back in business.
 When sales brought me their initial request, I really didn't believe it, but
 I didn't have good enough cause to reject it.



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: ISP port blocking practice

2010-09-06 Thread Suresh Ramasubramanian
No.  It'd just increase a LOT, astronomically.

Something on the lines of turning a firehose of petrol on a wildfire

On Tue, Sep 7, 2010 at 7:00 AM, Randy Bush ra...@psg.com wrote:
 i suspect that, if we opened smtp relays again, unblocked 25 for
 consumer chokeband, etc., total spam received would likely increase a
 bit.  but my guess, and i mean guess, is that the limiting parameter
 could well be how many bots the perps can get, not how well those bots
 are blocked.



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: ISP port blocking practice

2010-09-06 Thread Suresh Ramasubramanian
On Tue, Sep 7, 2010 at 7:29 AM, Randy Bush ra...@psg.com wrote:
 i keep hearing that, but am having a hard time finding supporting data.

Might see the stats from http://cbl.abuseat.org - by AS.  Then compare
the stats on a non port 25 filtered network (they have stats by AS) to
stats on a network that is filtered on port 25

The networks that are filtered on port 25 will of course have any bots
on that network originating spam by other means (social networks,
webmail scripting etc), or other types of nastiness (DDoS etc).  But
you won't find them mailing out direct on port 25.

The bots are very much there - and if the port 25 filtering were to be
taken out, you'd at once see the increase in spam volumes.

--srs
-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: ISP port blocking practice

2010-09-02 Thread Suresh Ramasubramanian
Zhiyun, this is by far the most comprehensive paper I've seen on
asymmetric routing spam .. a technique that's as old as, for example,
Alan Ralsky.  So been around for about a decade.

Congratulations, great effort.  Do you have more results available (in
more detail than were published in this paper)?  Should be worth
seeing.

thanks
--srs

On Fri, Sep 3, 2010 at 3:29 AM, Zhiyun Qian zhiy...@umich.edu wrote:
 Sorry for bringing this old topic back. But we have made some academic effort 
 investigating the spamming behaviors using assymetric routing (we named it 
 triangualr spamming). This work appeared in this year's IEEE Security  
 Privacy conference. You can take a look at it if you are interested (and 
 feedbacks are welcome):

 http://www.eecs.umich.edu/~zhiyunq/pub/oakland10_triangular-spamming.pdf



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: ISP port blocking practice

2010-09-02 Thread Suresh Ramasubramanian
BCP38 / RFC2827 were created specifically to address some quite
similar problems.  And googling either of those two strings on nanog
will get you a lot of griping and/or reasons as to why these aren't
being more widely adopted :)

--srs

On Fri, Sep 3, 2010 at 7:47 AM, Zhiyun Qian zhiy...@umich.edu wrote:
 Suresh, thanks for your interest. I see you've had a lot of experience in 
 fighting spam, so you must have known this. Yes, I know this spamming 
 technique has been around for a while. But it's surprising to see that the 
 majority of the ISPs that we studied are still vulnerable to this attack.  
 That probably indicates that it is not as widely known as we would expect. So 
 I thought it would be beneficial to raise the awareness of the problem.

 In terms of more results, the paper is the most detailed document we have. 
 Otherwise, if you interested in the data that we collected (which ISPs or IP 
 ranges are vulnerable to this attack). We can chat offline.

 Regards.
 -Zhiyun



Re: Other NOGs around the world?

2010-08-22 Thread Suresh Ramasubramanian
and of course apricot (www.apricot.net)

On Sun, Aug 22, 2010 at 7:47 PM, Marshall Eubanks t...@americafree.tv wrote:

 SANOG (Southeast Asia) - http://www.sanog.org/

 PACNOG (Pacific) - http://www.pacnog.org/



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: net-neutrality

2010-08-11 Thread Suresh Ramasubramanian
If you announce anything worth reaching in that AS of yours .. MAYBE,
JUST MAYBE they'd care rather than yawn

84.22.96.0/19 has, for instance -  84.22.96.254  cock-is.huge.nl

If sony music etc want to engage in a size war with you, that's
entirely up to them.

Meanwhile, please leave nanog out of this.   It is your toy AS with
what looks like little or no production traffic on it, and you're free
to play with it as you like.

--srs

On Wed, Aug 11, 2010 at 4:22 PM, Sven Olaf Kamphuis s...@cb3rob.net wrote:
 Hi, considering the fact that several organisations have been severely
 undermining net-neutrality over the past few months, which they seem to see
 as less important than their copyright bullshit, we have decided to set an
 example:

 Should the following networks, to which list more will be added over the
 coming month, desire to exchange traffic with AS34109, they can obtain a
 traffic relay contract at sa...@cb3rob.net, the costs of which amount to
 1 euros per month, excl. 19% VAT, if not, well, then it's simply no more
 internets for them... sorry peeps.


 193.108.8.0/21#GEMA-NET
 195.109.249.64/29#SONYMUSIC
 195.143.92.160/27#SBMG1-NETS
 212.123.224.240/29#Net-WEGENER-MEDIA-BV
 212.123.227.64/29#BumaStemra2
 212.136.193.216/29#BUMA
 212.78.179.240/28#BUMA-STEMRA
 213.208.242.160/29#NL-COLT-BUMA-STEMRA
 217.148.80.112/28#NL-NXS-CUST-1004613
 85.236.46.0/24#IX-UNIVERSAL-NET


 --
 Greetings,

 Sven Olaf Kamphuis,
 CB3ROB Ltd.  Co. KG
 =
 Address: Koloniestrasse 34         VAT Tax ID:      DE267268209
         D-13359                   Registration:    HRA 42834 B
         BERLIN                    Phone:           +31/(0)87-8747479
         Germany                   GSM:             +49/(0)152-26410799
 RIPE:    CBSK1-RIPE                e-Mail:          s...@cb3rob.net
 =
 penpen C3P0, der elektrische Westerwelle

 =

 Confidential: Please be advised that the information contained in this
 email message, including all attached documents or files, is privileged
 and confidential and is intended only for the use of the individual or
 individuals addressed. Any other use, dissemination, distribution or
 copying of this communication is strictly prohibited.






-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: net-neutrality

2010-08-11 Thread Suresh Ramasubramanian
On Wed, Aug 11, 2010 at 4:59 PM, Sven Olaf Kamphuis s...@cb3rob.net wrote:
 hmm funny, it had the piratebay on it, the 3rd most visted .org domain in
 the world, as well as number 7 or so on the list of most visted websites in
 the entire world, until a few months ago.

no, that doesnt matter as much as just how much traffic you actually
exchange with those asns



Re: net-neutrality

2010-08-11 Thread Suresh Ramasubramanian
Not that I am speaking for anybody but myself here.  I'll killfile
this thread now

On Wed, Aug 11, 2010 at 5:14 PM, Raymond Dijkxhoorn
raym...@prolocation.net wrote:

 btw, considering that you appearantly run a larger network than the 3
 networks we own and operate, willing to sell? :P

 That would be rarther funny Sven, you buying IBM. Sweet dreams.



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Feds disable movie piracy websites in raids

2010-07-01 Thread Suresh Ramasubramanian
On Thu, Jul 1, 2010 at 11:11 AM, Michael Painter tvhaw...@shaka.com wrote:
 As randy said not too long ago, First they came for...

No. Not Randy. That was pastor martin neimoller about the nazis.
So, you just invoked godwin's law.  Thread over.

thank you
suresh



Re: eur.army.mil net ops contact?

2010-05-19 Thread Suresh Ramasubramanian
On Wed, May 19, 2010 at 5:48 PM, Malte von dem Hagen m...@hosteurope.de wrote:
 We cannot reach www.army.mil, we cannot reach their nameservers, we
 cannot reach their MXes. Any further hints?

In plainer english -

Your customer contacts his contact (friend / relative / customer etc)
in the US army
The army guy contacts his base IT staff to bitch about his email
His base IT staff escalates the bitching up through a long and twisty channel
Then you may or may not hear a status back, or get your AS unblocked
Sit tight and wait, till then

-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: eur.army.mil net ops contact?

2010-05-19 Thread Suresh Ramasubramanian
There's this old joke - spread across multiple countries around the
world - about there being three ways to do something ..

1. The right way
2. The wrong way
3. The army way

viel glück

On Wed, May 19, 2010 at 6:06 PM, Malte von dem Hagen m...@hosteurope.de wrote:
 Am 19.05.10 14:28, schrieb Suresh Ramasubramanian:
 Your customer contacts his contact (friend / relative / customer etc)
 in the US army
 The army guy contacts his base IT staff to bitch about his email
 His base IT staff escalates the bitching up through a long and twisty channel
 Then you may or may not hear a status back, or get your AS unblocked
 Sit tight and wait, till then

 I am aware of this way, sure. I just hoped, there would be a more...
 efficient way.



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Config and scheduled event management software?

2010-05-17 Thread Suresh Ramasubramanian
http://snmpstat.sourceforge.net/ and its cisco configuration
repository look good

On Tue, May 18, 2010 at 10:34 AM, George Bonser gbon...@seven.com wrote:
 Anyone have any recommendations of software for Configuration Management
 (change control for hardware, networks etc) and
 event scheduling?

 We are using a hodgepodge of homegrown stuff and RT but are outgrowing
 it.

 What's good? What sucks?



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: DDoS mitigation services from SPs

2010-04-28 Thread Suresh Ramasubramanian
Might also try Prolexic. Or level3, which resells Prolexic.

And then there's other forms of redundancy - ultradns or similar for
your nameservers, for example.

On Wed, Apr 28, 2010 at 7:39 PM, William McCall
william.mcc...@gmail.com wrote:
 All:

 I did some searching and have not found any concrete replies on the
 list, but what carriers can offer L3 DDoS mitigation? Specifically, I
 noticed an old UUnet offering, but it seems like I must be speaking
 the wrong language to my sales drones. Specifically, we're dealing
 with ATT, Qwest and Verizon Business. My thought is that they all
 offered some type of service like this, but my security folks have
 been driving this and having limited success.

 Names of other SPs (we're looking at Verisign) is helpful, but we are
 stuck with the Dallas area.

 Note: I am not interested in changing DNS records and prefixes should
 be able to be advertised through BGP like normal. (Apparently, people
 like to do funky DNS stuff to make this work and sometimes don't want
 to do BGP in other scenarios.)

 Thanks in advance,

 --
 William McCall





-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Mail Submission Protocol

2010-04-21 Thread Suresh Ramasubramanian
Log and monitor all that you can.  And watch for a large number of IPs
logging into an account over a day (over a set limit - even across
country - that takes into account home - blackberry - airport lounge
- airport lounge in another country - hotel - RIPE meeting venue
type scenarios).

And especially watch for and/or firewall off logins from areas from
where you see particularly high levels of smtp auth abuse / logins to
compromised accounts

--srs

2010/4/21 Alex Kamiru nderitua...@gmail.com:
Inside customers, we have not changed to force port 587 and
authentication for email clients, but the topic has come up in
discussions.  This won't of course, stop spammers if they are hijacking
the users local email client settings.

 How best would you stop spammers hijacking local users email clients

 -Mike



Re: Mail Submission Protocol

2010-04-21 Thread Suresh Ramasubramanian
No. UCEProtect is certainly not a decent or any other kind of place to start.

The MAAWG BCPs have far more available than one of the worst
maintained blacklists that has ever been in existence.

If you want FAQs from blocklists - there is much that's available on
the spamhaus.org website

On Thu, Apr 22, 2010 at 8:24 AM, Franck Martin fra...@genius.com wrote:
 If you have left port 25 open, this is a good place to start.

 http://www.uceprotect.net/en/rblcheck.php

 I suspect any decent IDS will tell you which machine has weird traffic. I 
 suppose you can put rules based on the IDS result to redirect them to a 
 special web page to tell them, they have to do something.

 The main issue, it not to know which machines are hijacked, but to support 
 these machines.

 - Original Message -
 From: Suresh Ramasubramanian ops.li...@gmail.com
 To: Alex Kamiru nderitua...@gmail.com
 Cc: nanog@nanog.org
 Sent: Thursday, 22 April, 2010 1:35:56 PM
 Subject: Re: Mail Submission Protocol

 Log and monitor all that you can. And watch for a large number of IPs
 logging into an account over a day (over a set limit - even across
 country - that takes into account home - blackberry - airport lounge
 - airport lounge in another country - hotel - RIPE meeting venue
 type scenarios).

 And especially watch for and/or firewall off logins from areas from
 where you see particularly high levels of smtp auth abuse / logins to
 compromised accounts

 --srs

 2010/4/21 Alex Kamiru nderitua...@gmail.com:
Inside customers, we have not changed to force port 587 and
authentication for email clients, but the topic has come up in
discussions. This won't of course, stop spammers if they are
hijacking the users local email client settings.

 How best would you stop spammers hijacking local users email clients

 -Mike




-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: FCC dealt major blow in net neutrality ruling favoring, Comcast

2010-04-12 Thread Suresh Ramasubramanian
On Mon, Apr 12, 2010 at 11:41 AM, Paul WALL pauldotw...@gmail.com wrote:
 It should probably be noted, for purpose of establishing bias, that
 Richard is a Washington lobbyist, hired to represent Comcast on
 regulatory matters.  What he views as overstepping legal bounds,
 others may view as protecting consumers...

Hell, funnily enough Susan Crawford warned at the time that the FCC
action wouldn't stand up in court the way it was done.

http://www.circleid.com/posts/comcast_vs_the_fcc_a_reply_to_susan_crawfords_article/

--srs
-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Carrier class email security recommendation

2010-04-12 Thread Suresh Ramasubramanian
You have multiple options

1. Ironport / Fortinet etc gateways.   [Not barracuda - hardly carrier
class, enterprise grade more like it]

2. Outsource to a provider like Messagelabs or MXLogic that only
handles the spam filtering, lets you host your own mailboxes

3. Outsource to one or more vendors of hosted email services - Google
Apps, Microsoft BPOS, IBM Lotuslive etc

your choice based on what meets your requirements.

--srs (full disclosure - head, antispam @ ibm lotuslive)

2010/4/12 Alex Kamiru nderitua...@gmail.com:
 I am in the process of sourcing for a carrier class email security
 solution that will replace our current edge spam gateways based on open
 source solutions. Some solutions that am currently considering are
 Ironport, Fortinet Fortimail, MailFoundry and Barracuda. I'd therefore
 wish to know, based on your experiences, what works for you
 satisfactorily. Areas that are key for me are centralized management and
 reporting, carrier class performance, per mailbox policy and quarantine,
 and favourable licensing for an MSSP. I know Ironport is rated highly in
 this space but I find its per user licensing is not favourable for a
 MSSP.



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Carrier class email security recommendation

2010-04-12 Thread Suresh Ramasubramanian
Right.  Just to add one more choice into your mix .. Bizanga is one
such vendor that I've seen deployed by carriers who want an appliance.
 They were recently acquired by Cloudmark.

There are also rate limiting .. kind of like netflow for email type
devices - Symantec E160, and Mailchannels (mailchannels.com).These
might be worth considering for systemwide filtering after which you
can apply your own policies per user.

ps: About Barracuda - I am not aware, they may have a carrier grade /
larger scale product too.   If you see one of those, or any other
vendor that meets your needs go for it.

-suresh

2010/4/12 Alex Kamiru nderitua...@gmail.com:
 Suresh,
 I am more interested in option 1 and would want opinion from those with
 experience on that.

 -Original Message-
 From: Suresh Ramasubramanian ops.li...@gmail.com
 To: Alex Kamiru nderitua...@gmail.com
 Cc: nanog nanog@nanog.org
 Subject: Re: Carrier class email security recommendation
 Date: Mon, 12 Apr 2010 15:37:46 +0530

 You have multiple options

 1. Ironport / Fortinet etc gateways.   [Not barracuda - hardly carrier
 class, enterprise grade more like it]

 2. Outsource to a provider like Messagelabs or MXLogic that only
 handles the spam filtering, lets you host your own mailboxes

 3. Outsource to one or more vendors of hosted email services - Google
 Apps, Microsoft BPOS, IBM Lotuslive etc

 your choice based on what meets your requirements.

 --srs (full disclosure - head, antispam @ ibm lotuslive)

 2010/4/12 Alex Kamiru nderitua...@gmail.com:
 I am in the process of sourcing for a carrier class email security
 solution that will replace our current edge spam gateways based on open
 source solutions. Some solutions that am currently considering are
 Ironport, Fortinet Fortimail, MailFoundry and Barracuda. I'd therefore
 wish to know, based on your experiences, what works for you
 satisfactorily. Areas that are key for me are centralized management and
 reporting, carrier class performance, per mailbox policy and quarantine,
 and favourable licensing for an MSSP. I know Ironport is rated highly in
 this space but I find its per user licensing is not favourable for a
 MSSP.







-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Carrier class email security recommendation

2010-04-12 Thread Suresh Ramasubramanian
The man did say carrier class .. not small webhost for four
families and dog.   You're talking multiple mailservers + filtering
gateways / appliances etc, clustered .. rather tough to do that with
one pizzabox 1U running a linux that's not updated in years and
configured with webmin.

And have you used / deployed any of those devices to claim they don't
support NTP?  Or whether that's a bigger constraint than an
underpowered linux box? :)

On Mon, Apr 12, 2010 at 7:48 PM, todd glassey tglas...@earthlink.net wrote:
 Yes William, but realize that was an easiest method solution. There
 are any number of others as well.

 The point is that integrating an appliance type functionality is pretty
 easy if you bother to take the time.

 What I really wanted to point out is how many of the devices dont allow
 authenticated NTP meaning they are worthless from an evidence
 perspective, something that we as network engineers are constrained by
 as well.



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Carrier class email security recommendation

2010-04-12 Thread Suresh Ramasubramanian
On Mon, Apr 12, 2010 at 8:45 PM, todd glassey tglas...@earthlink.net wrote:
 On 4/12/2010 7:22 AM, Suresh Ramasubramanian wrote:
 The man did say carrier class .. not small webhost for four
 families and dog.

 yes he did Suresh ... meaning that something larger and more secure than
 the off-the-shelf copy of Linux is needed. Funny the NSA and many others
 would disagree with you.

I know of (and have been the postmaster for) multiple million user
installations that run happily on linux + postfix (and sendmail,
qmail..).

None that run on one server running webmin, even a 3U server.

 or layered as stages within a new system design based on GPU's which
 allow for the specific assignment of threads of control to specific
 processes. Imaging a cloud type environment running in a single GPU with
 the abililty to properly map threads to GPU threads.

You don't have single of anything at all for large and well scaled
environments.

 OK our server is 3U but that was because I wanted bigger fans inside
 it... The 1U single TESLA based email GW is exactly what you describe -
 a 512 thread CUDA based GPU with serious capabilities therein.

So how many users do you run on that one 3U box?  100K?  300K?  A
couple of million?  :)

The man said carrier class.  And when you talk that you dont just talk
features, you talk operations on a rather larger scale than what
you're describing.

--srs

-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Carrier class email security recommendation

2010-04-12 Thread Suresh Ramasubramanian
Its nanog and not an RFQ process or I'd have asked him that too :)

On Mon, Apr 12, 2010 at 9:29 PM, Zaid Ali z...@zaidali.com wrote:
 I haven't seen the man ask support for messages/hour, 3M..10M..1B ? Or maybe
 I missed this question?



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Carrier class email security recommendation

2010-04-12 Thread Suresh Ramasubramanian
I did ask him how many users he was looking to size email for.  But a
lot of questions like, and beyond, that - you may or may not want to
answer on nanog.

The man said carrier class .. and you have a set of assumptions.  If
you say enterprise you're assuming like 300K..400K mailboxes for the
very largest enterprises.  Tops.

That'd be a small to mid sized carrier to spec carrier class for.

I'll end this thread here.

On Mon, Apr 12, 2010 at 9:47 PM, Zaid Ali z...@zaidali.com wrote:
 I think it is a perfectly reasonable question to ask in NANOG. If someone
 asks how much memory do I need on my router to do BGP, you have to ask the
 fundamental question of how big your routing table will be. I don't see this
 as any different. Its helpful to provide opinions when you are guided by
 some data :)




-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Carrier class email security recommendation

2010-04-12 Thread Suresh Ramasubramanian
Scale it all.  Then manage it centrally. Provision users. Manage
security.  etc etc.

You use much the same IOS whether you run a router for a T1 or run
networks for a tier 1 :)

On Mon, Apr 12, 2010 at 9:51 PM, joel jaeggli joe...@bogus.com wrote:

 I build basically the same mail-system where is collapsed into a single box
 or spread out across a cluster.

 sendmail + clamav milter + milter graylist - procmail - spamd - maildir
 delivery - dovecot imap.

 When you need to scale the front end you deploy a load balancer and fire up
 more smtp boxes...

 When you need to scale the filestore you move it to nfs and divide and
 conquer.

 When you need to scale imap you shift it in front of the load balancer and
 deploy more boxes.

 For load balancer we used LVS back in the day.

 can replace sendmail with postfix or exim, it's mostly a place to hang the
 various on-connect filter regimes.



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: BGP hijack from 23724 - 4134 China?

2010-04-09 Thread Suresh Ramasubramanian
It depends.  Preventing packet flow from a rather more carefully
selected list of prefixes may actually make sense.

These for example - www.spamhaus.org/drop/

Filtering prefixes that your customers may actually exchange valid
email / traffic with, and that are not 100% bad is not the best way to
go.

Block specific prefixes from China, the USA, Eastern Europe, wherever
- that are a specific threat to your network .. great.   Even better
if you are able to manage that blocking and avoid turning your router
ACLs into a sort of Hotel California for prefixes.

On Fri, Apr 9, 2010 at 11:52 AM, Daniel Karrenberg
daniel.karrenb...@ripe.net wrote:


  Selectively preventing packet flow is *not* a security measure.

  Selectively preventing packet flow leads to unexpected and hard to 
 diagnose breakage.

  Many independent actors selectively preventing packet flow will 
 eventually
     partition the Internet sufficiently to break it beyond recognition.



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: FCC dealt major blow in net neutrality ruling favoring Comcast

2010-04-07 Thread Suresh Ramasubramanian
On Wed, Apr 7, 2010 at 8:12 PM, Chris Grundemann cgrundem...@gmail.com wrote:
 They are now using the phrase Open
 Internetworking to describe their stance on the issue.

How very sensible of ISOC.

-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: What is The Internet TCP/IP or UNIX-to-UNIX ?

2010-04-04 Thread Suresh Ramasubramanian
On Sun, Apr 4, 2010 at 2:42 PM, James Bensley jwbens...@gmail.com wrote:

 Also having the email account ipv3@gmail.com, thats not very useful?

He's still got to reach the heights of IPv9

-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Books for the NOC guys...

2010-04-02 Thread Suresh Ramasubramanian
The Limoncelli etc book is brilliant.

There's phil smith and barry greene's old Cisco ISP Essentials too.
 Very good if somewhat outdated

And then there's this if you just want security -
http://www.amazon.com/Router-Security-Strategies-Securing-Network/dp/1587053365/ref=sr_1_1?ie=UTF8s=booksqid=1270223489sr=1-1

On Fri, Apr 2, 2010 at 9:06 PM, Eliot Lear l...@cisco.com wrote:
  On 4/2/10 2:09 PM, Robert E. Seastrom wrote:

 So, what are you having your up-and-coming NOC staff read?

 Practice of System and Network Administration by Limoncelli, Hogan, and
 Challup.  I may be biased, being married to Hogan.



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: FTC / Nexband

2010-04-01 Thread Suresh Ramasubramanian
On Thu, Apr 1, 2010 at 8:24 PM, Mark Andrews ma...@isc.org wrote:
 You only need to add PTR records for the addresses in use.


Not really the way most automated dns provisioning systems work today
.. and where would they be without $GENERATE in bind? :)

-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: NEED ANY LINK OR SAMPLE TEMPLATE FOR ROUTINE NETWORK (ISP) MAINTENANCE PLAN

2010-03-16 Thread Suresh Ramasubramanian
If you want to search for something - use google
http://www.google.co.in/search?hl=enq=routine+network+maintenance+plansourceid=navclient-ffrlz=1B3GGGL_enIN311IN311ie=UTF-8

If you want to ask specific questions, use nanog, or as you're in the
asiapac region, use sanog.

Before you ask questions, show your work .. say what you have done,
what you plan to do, and what question you have based on that.

On Tue, Mar 16, 2010 at 3:44 PM, sakthi vadivel
sakthivadivel.c...@gmail.com wrote:

 .It doesn't mean that we have a title that every one knows
 everything...First of all , i am not a document specialist, i come across
 some requirement where i need to search for ...that is what all other people
 do..



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: OBESEUS - A new type of DDOS protector

2010-03-15 Thread Suresh Ramasubramanian
That's right M.Fortaine .. and your model does not, as yet, appear to
address what you term as EDoS and what the general security community
calls DDoS

On Tue, Mar 16, 2010 at 7:29 AM, Guillaume FORTAINE gforta...@live.com wrote:
 From my point of view, it seems similar to the EDoS concept :

 http://www.rationalsurvivability.com/blog/?s=EDos

 EDoS attacks, however, are death by a thousand cuts. EDoS can also utilize
 distributed attack sources as well as single entities, but works by making
 legitimate web requests at volumes that may appear to be “normal” but are
 done so to drive compute, network, and storage utility billings in a cloud
 model abnormally high.



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: OBESEUS - A new type of DDOS protector

2010-03-15 Thread Suresh Ramasubramanian
I got your point.  What I was saying is that what he calls EDoS (and
I'm sure he'll say obliterating infrastructure is the ultimate form of
an economic dos) is just what goes on ...

You may or may not be able to overload the AWS infrastructure by too
many queries but you sure as hell will blow the application out if
that ddos isnt filtered .. edos again.

On Tue, Mar 16, 2010 at 7:35 AM, Christopher Morrow
morrowc.li...@gmail.com wrote:


 eh.. I guess I'm splitting hairs. the goal of 100k bots sending 1
 query per second to a service that you know can only sustain 50k
 queries/second is.. not to economically Dos someone, it's to
 obliterate their service infrastructure.

 Sure, you could ALSO target something hosted (for instance) at
 Amazon-AWS and increase costs by making lots and lots and lots of
 queries, but that wasn't the point of what Deepak wrote, nor what i
 corrected.



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Hotels in Tampa

2010-02-26 Thread Suresh Ramasubramanian
tripadvisor.com probably has a lot of hotel reviews for you.   carrier
hotels that allow smoking (!) might be more on topic on nanog i guess?

On Sat, Feb 27, 2010 at 11:40 AM, Joe Hamelin j...@nethead.com wrote:
 I'm going to be in Tampa for two weeks turning up a 4G data center.
 Any recommendations on good hotels that allow smoking?



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Email Portability Approved by Knesset Committee

2010-02-22 Thread Suresh Ramasubramanian
Am I missing something?  All the ISP has to do is to provision a pop3
/ imap / webmail mailbox for that user and keep it around.

On Mon, Feb 22, 2010 at 10:14 PM, Owen DeLong o...@delong.com wrote:
 There are huge differences in LNP/WLNP vs. Email Address portability.

 Prior to LNP/WLNP, there was already SS7 which is, essentially a centralized
 layer of indirection for phone numbers. This was necessary in order to support



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Spamhaus

2010-02-21 Thread Suresh Ramasubramanian
On Mon, Feb 22, 2010 at 12:08 AM, Joel M Snyder joel.sny...@opus1.com wrote:
 but the false positive count jumped by 112 messages per 10,000 (because
 APEWS was somehow having a lousy month).

 In general, the more reputation services you include, the more likely it is
 you're going to have false positives.

Christ.  You pick APEWS as a reputation filter.. and then even bother
to *count* the false positives?

That's not a list that's particularly designed to minimize FPs, to put
it very mildly.

-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Spamhaus and Barracuda Networks BRBL

2010-02-21 Thread Suresh Ramasubramanian
Is it your position that, as a vendor of antispam services, nobody
else should offer their services for a fee?

That would be strange indeed.

On Fri, Feb 19, 2010 at 5:41 AM, Dean Drako dr...@barracuda.com wrote:

 With respect to Barracuda Networks and Spamhaus.

 I expect, but I do not know, that Spamhaus probes on port 25
 in order to identify Barracuda Spam and Virus Firewalls and then block
 their access to their RBL.  Many Barracuda customers have been
 cut off without warning causing them trouble and pain.

 Barracuda attempted to find a deal that would work for licensing
 Spamhaus for our products, however, spamhaus's desire for money
 could not be met without significantly increasing the price to
 each of our customers.    They wanted us to charge the
 spamhaus feed price to each of our customers.
 We tried to find an arrangement for a long time.   I personally
 love the work that spamhaus has done. I was disappointed that we could
 not find an arrangement once they changed into a commercial entity and
 started charging customers.  When they were providing a free
 service we promoted them strongly, but when they started charging
 the customers that really used it, we had to part ways.
 It is a pity.

 We recommend customers use only Barracuda's Free RBL:  BRBL
 and this is now built into the Barracuda Spam and Virus Firewall.
 http://www.barracudacentral.org/rbl

 The BRBL is provided at no charge to anyone who wants to use it (even
 non barracuda customers).
 The BRBL has a full time staff that answers phone and email
 to correct any false positives and handle removal requests -- unlike competing
 services that charge money and who do not provide a staff.   We will consider
 providing data feeds if anyone has interest.  We currently provide
 the BRBL as a free service.  We make no claims about it being better
 or worse than any other RBL.   It does use a massive amount of data in
 order to determine which IP's should be on the list. Others have made claims
 about its accuracy and say great things about it.  Others complain that
 we unjustly block them, however, 99.9% of the people who are blocked and who 
 contact
 us find a BOT in their network.


 Sincerely,

 Dean Drako
 CEO Barracuda Networks















-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: The Internet Revealed - A film about IXPs v2.0: now available

2010-02-10 Thread Suresh Ramasubramanian
On Thu, Feb 11, 2010 at 7:50 AM, Randy Bush ra...@psg.com wrote:
 But, as a hyper-aware viewer I did detect a tone in favor of network
 neutrality type arguments- and I suppose that is OK.

 is this a bug or a feature

bug

-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Yahoo abuse

2010-02-09 Thread Suresh Ramasubramanian
On Tue, Feb 9, 2010 at 8:20 PM, Drew Weaver drew.wea...@thenap.com wrote:

 Half of the time our abuse people spend is wading through the spam at the 
 abuse@ addresses =)

Oh we love that.  Find some way to automate feeding all that to your
spam filters and you got yourself a sizeable trap, if the abuse
address is about a decade old.

-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Yahoo abuse

2010-02-09 Thread Suresh Ramasubramanian
That's IODEF, if and when it picks up enough steam to get widely deployed.

On Wed, Feb 10, 2010 at 10:37 AM, Mikael Abrahamsson swm...@swm.pp.se wrote:

 Unfortunately this seems very focused on reporting SPAM and other email
 related abuses. What I was looking for was a way to format a generic abuse
 report where the most important parts would be type of abuse, IP doing
 the abuse, time the abuse occured and free text field about what
 happened that could be used by end users. Creating a new MIME type
 precludes most end users from ever using it because their MUA won't support
 it.



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: google contact? why is google hosting/supporting/encouraging spammers?

2010-02-03 Thread Suresh Ramasubramanian
ab...@gmail.com maybe? Looks like some random spammer based in Dubai
judging by the airport code.

On Thu, Feb 4, 2010 at 11:37 AM, Jim Mercer j...@reptiles.org wrote:
 we have recently started getting alot of spam, out of dubai, from 
 ecampaigners@gmail.com

 all of the spam comes from/through google and google groups.

 is this accepted/supported activity on google?

 if not, where might i find a contact who can cluefully respond?



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Mitigating human error in the SP

2010-02-02 Thread Suresh Ramasubramanian
Never said it was, and never said foolproof either.  Minimizing the
chance of error is what I'm after - and ssh'ing in + hand typing
configs isn't the way to go.

Use a known good template to provision stuff - and automatically
deploy it, and the chances of human error go down quite a lot. Getting
it down to zero defect from there is another kettle of fish altogether
- a much more expensive with dev / test, staging and production
environments, documented change processes, maintenance windows etc.

On Wed, Feb 3, 2010 at 7:00 AM, Michael Dillon
wavetos...@googlemail.com wrote:

 It is easy to create a tangled mess of OSS applications that are glued 
 together
 by lots of manual human effort creating numerous opportunities for human 
 error.
 So while I wholeheartedly support automation of network configuration, that is
 not a magic bullet. You also need to pay attention to the whole process, the
 whole chain of information flow.



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Mitigating human error in the SP

2010-02-01 Thread Suresh Ramasubramanian
On Tue, Feb 2, 2010 at 7:51 AM, Chadwick Sorrell mirot...@gmail.com wrote:

 This outage, of a high profile customer, triggered upper management to
 react by calling a meeting just days after.  Put bluntly, we've been
 told Human errors are unacceptable, and they will be completely
 eliminated.  One is too many.

Automated config deployment / provisioning.   And sanity checking
before deployment.

-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Mitigating human error in the SP

2010-02-01 Thread Suresh Ramasubramanian
I'll say as vijay gill notes after Stefan posted those two very
interesting links.  He's saying much the same that I did - in a great
deal more detail.  Fascinating.

 http://www.nanog.org/meetings/nanog44/presentations/Monday/Gill_programatic_N44.pdf
 His Blog article on Infrastructure is Software further expounds upon the 
 benefits of such an approach - 
 http://vijaygill.wordpress.com/2009/07/22/infrastructure-is-software/

On Tue, Feb 2, 2010 at 8:28 AM, Dave CROCKER d...@dcrocker.net wrote:

 Otherwise, as Suresh notes, the only way to eliminate human error completely
 is to eliminate the presence of humans in the activity.



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Countries with the most botnets

2010-01-27 Thread Suresh Ramasubramanian
The CBL has stats too -

http://cbl.abuseat.org/totalflow.html - total spamtrap flow
http://cbl.abuseat.org/country.html - by country (india leads the pack yay?)
http://cbl.abuseat.org/domain.html - by ISP

On Thu, Jan 28, 2010 at 4:37 AM, Steven Bellovin s...@cs.columbia.edu wrote:
 A colleague needs to know, along with citable sources if possible.

 Ideally - number of zombified PCs, percentage of zombified PCs, name of
 nation, source.

 Threat reports from symantec and macafee suggest the US leads, with
 China a very close second.

 Yes, we realize that answers will be imperfect.



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Enhancing automation with network growth

2010-01-20 Thread Suresh Ramasubramanian
This should help with part of what you're doing - snmpstat and cisco
config repository.
http://snmpstat.sourceforge.net/

On Thu, Jan 21, 2010 at 8:24 AM, Steve Bertrand st...@ibctech.ca wrote:

 One thing that would take a major load off would be if my MRTG system
 could simply update its config/index files for itself, instead of me
 having to  do it on each and every port change.



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Virbl: The First IPv6 enabled dnsbl?

2010-01-15 Thread Suresh Ramasubramanian
The listing method is if you actually receive virus traffic over v6.
Which someone will, sooner or later ..

Yes, I agree with listing a slightly larger range - given that /64
seems to be what most anyone gets these days with a free tunnel.

I wish you all the very best of fun trying to run dnsbl zones serving up v6.

--srs

On Fri, Jan 15, 2010 at 9:20 PM, Mark Schouten ma...@bit.nl wrote:
 Hi,

 FYI:

 http://virbl.bit.nl/index.php#ipv6

 Comments on the listing method are appreciated.

 Regards,



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Suresh Ramasubramanian
On Tue, Jan 5, 2010 at 8:36 AM, Jeffrey Lyon
jeffrey.l...@blacklotus.net wrote:
 We have such a configuration in progress, it works great without any of the
 issues you're proposing.

So .. this is interesting.

The firewall would have to frontend your mail / web / whatever
application .. and if something goes beyond the firewall's rated
capacity (100k ++ - maybe nearly 150..175k connections per second for
a high end firewall), the firewall falls over.

And even before that, there's the risk of whatever application you're
protecting getting pounded flat if your firewall passes even a small
percentage of this traffic.

Do you -

1. Have (say) two firewalls in HA config?

2. Back your firewall with routing based measures, S/RTBH, blackhole
communities your upstream offers, etc [the standard nspsec bootcamp
stuff]

3. Simply back the firewall with a netflow based device?

4. Estimate that the risk of a DDoS that exceeds your firewall's rated
capacity is extremely low?  [and yes, 150k ++ connections per second
ddos is going to be massive, and relatively rare for most people]

--srs

-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Suresh Ramasubramanian
Two more options.  And for Netflow device - read that to mean Arbor or
its competitors.

5 Ditch the stateful firewall and exclusively use a netflow device

6. Outsource to a hosted DDoS mitigation service (Prolexic etc)

On Tue, Jan 5, 2010 at 8:43 AM, Suresh Ramasubramanian
ops.li...@gmail.com wrote:
 Do you -

 1. Have (say) two firewalls in HA config?

 2. Back your firewall with routing based measures, S/RTBH, blackhole
 communities your upstream offers, etc [the standard nspsec bootcamp
 stuff]

 3. Simply back the firewall with a netflow based device?

 4. Estimate that the risk of a DDoS that exceeds your firewall's rated
 capacity is extremely low?  [and yes, 150k ++ connections per second
 ddos is going to be massive, and relatively rare for most people]



Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Suresh Ramasubramanian
With these safeguards in place - and with flow devices being part of
the mix somewhere .. what you propose is quite reasonable.

There's still the question of whether an application that receives a
lot of new / untrusted traffic - a mail or web server - would benefit
from having a stateful firewall in front .. Roland seems to think not.

--srs

On Tue, Jan 5, 2010 at 9:35 AM, Jeffrey Lyon
jeffrey.l...@blacklotus.net wrote:
 1. We have multiple nodes conducting DDoS scrubbing, one failing would not
 be catastrophic.

 2.  Indeed.

 3.  Sort of, such devices are downstream for extremely valid reasons I won't
 get into now.

 4. Indeed, were equipped to handle substantially higher than 150kpps.

 I'm sure Arbor is really neat but I disagree that any DDoS appliance is a
 standalone solution. I don't expect an employee of the vendor themselves to
 attest to this though.



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Suresh Ramasubramanian
On Tue, Jan 5, 2010 at 10:35 AM, Rick Ernst na...@shreddedmail.com wrote:
 I'm interested in seeing products (including software) that already have the
 development (anomaly detection, trends/reports, etc.)  work done so I can
 spend my cycles elsewhere.

This might fit the bill - http://www.zurich.ibm.com/aurora/
Now commercially available as
http://www-01.ibm.com/software/tivoli/products/netcool-performance-flow/

Full disclosure - I work for big blue - but not in any division that
works on Aurora / Tivoli Netcool.

-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Suresh Ramasubramanian
On Tue, Jan 5, 2010 at 10:38 AM, Dobbins, Roland rdobb...@arbor.net wrote:

 Additional mitigation would be  via manual or automatic RTBH or 
 security/abuse@ involvement with upstreams.

 Automagic is generally bad, as it can be gamed.

... and manual wont scale in ddos

-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: D/DoS mitigation hardware/software needed.

2010-01-04 Thread Suresh Ramasubramanian
On Tue, Jan 5, 2010 at 10:52 AM, Dobbins, Roland rdobb...@arbor.net wrote:

 I'm referring to the employment and selection of situationally-appropriate 
 tools, mind.  The tools themselves must of necessity perform their work in a 
 largely automated fashion once they're employed, which is what I believe you 
 actually meant.


fair enough.

-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Article on spammers and their infrastructure

2010-01-03 Thread Suresh Ramasubramanian
On Sun, Jan 3, 2010 at 10:24 PM, Eric Brunner-Williams
brun...@nic-naa.net wrote:
 On 1/2/10 11:38 PM, Suresh Ramasubramanian wrote:
 ... it would be interesting if some process were developed to
 deaccredit or otherwise kill off the shell registrars

 Suresh, Why?

My comment was more in the context of this thread's original topic -
killing off bogus spam / botnet operations that become registrars
(and/or registrar resellers) who buy an outsourced instance of one of
the registrar in a box services, and are immediately in business.

Though, you might want to prevent shell registrars for the same
reasons that auctions try to weed out shill bidders.

And while it is a rational economic idea for a bidder to game an
auction by setting up shills, the auctioneer and the other bidders
lose out in the end.

 Now, shell registrars are a pain in the ass, not for operational reasons,
 but because every time someone wants to say something stupid and get away
 with it they say some large number of registrars.

That too of course.   Reminds you of Tammanny Hall sometimes? :)

 Shell registrars are not, generally, the source of primary registrations of
 arbitrarily abusive intent. That problem lies elsewhere and is adequately
 documented.

Wasn't talking about shell entities setup by various registrars for
drop catching and such.   Though as I pointed out, those could be
weeded out for fairly sensible economic reasons, for the same reasons
such practices are discouraged in elections, auctions, rationing
systems (like the depression era / WW-II food stamps system) etc.

Was talking about totally bogus registrars that are spammer sets up
an LLC, said LLC submits all the paperwork to become a registrar,
rents an instance of a DIY registrar service .. and starts doing
roaring business with just one customer - the spammer)

--srs



Re: Are the Servers of Spamhaus.rg and blackholes.us down?

2010-01-02 Thread Suresh Ramasubramanian
If our friend here is checking for spamhaus.rg he's out of luck.  I am
sure he'll have better luck checking for spamhaus.ORG instead

--srs

On Thu, Dec 31, 2009 at 6:41 PM, John Peach john-na...@johnpeach.com wrote:
 On Thu, 31 Dec 2009 12:28:41 +0100 (CET)
 Raymond Dijkxhoorn raym...@prolocation.net wrote:

  Are this Blacklistservers since x-mas down. We receive in the last
  days many errors from this servers...

 blackholes.us has been non-existent for over a year. Their netblocks

 Can't help you with spamhaus...



Re: Article on spammers and their infrastructure

2010-01-02 Thread Suresh Ramasubramanian
While not at all touching the accuracy of knujon's stats with a
bargepole, it would be interesting if some process were developed to
deaccredit or otherwise kill off the shell registrars .. and the bogus
LIRs (which is how the thread started).

On Thu, Dec 31, 2009 at 10:02 PM, Eric Brunner-Williams
brun...@nic-naa.net wrote:

 [1] shell registrars exist for another exploit, to maximize race contention
 results for the VGRS drop pool, the acquisition of expired names which have
 name value or residual traffic monitization value. Four companies control
 318 US domiciled ICANN accreditations: eNom (116), Directi/PDR (47), Dotster
 (51), and Snapnames (104). Source: http://www.knujon.com/registrars/



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: RBN and it's spin-offs

2009-12-30 Thread Suresh Ramasubramanian
On Thu, Dec 31, 2009 at 4:00 AM, Keith Medcalf kmedc...@dessus.com wrote:

 Reportedly started by someone operating under the name Flyman, RBN is
 known as the mother of cybercrime among online investigators. François
 Paget, senior expert for the McAfee company, says that RBN began as an
 Internet provider and offered impenetrable hosting for $600 a month.
 This meant a guarantee that it would not give out information about
 its clients, no matter what business they were in.

 This is a commendable position and one that should be the default for all 
 businesses.  Severe penalties (such as cutting out of the tongue or cutting 
 off hands) should be dealt to anyone who releases private information without 
 having first ensured that such disclosure is in accordance with a properly 
 obtained court order issued by a competent court in a public hearing (and no, 
 administrative tribunals are not courts of law).



Wow.  I always knew there existed some alternate universe where the
RBN were actually the good guys.  Didn't expect to find it so fast,
and on nanog at that.


-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: RBN and it's spin-offs

2009-12-30 Thread Suresh Ramasubramanian
Ferg nailed it.  I'll shut up now as he's made my point and its new
year's eve ..

On Thu, Dec 31, 2009 at 9:42 AM, Paul Ferguson fergdawgs...@gmail.com wrote:

 That's funny.

 You're assuming that the MLAT [1] process works -- it doesn't.

 - - ferg

 [1] http://en.wikipedia.org/wiki/Mutual_Legal_Assistance_Treaty



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Article on spammers and their infrastructure

2009-12-22 Thread Suresh Ramasubramanian
With the added refinement of spammer / botmaster controlled LIRs ..
after spammer / botmaster controlled registrars.
I did wonder sometimes how some snowshoe spammers could keep acquiring
a series of /20 to /15 sized CIDRs over the past year or two.

On Tue, Dec 22, 2009 at 6:38 PM, Tony Finch d...@dotat.at wrote:
 Sounds like a snowshoe setup to me.

 Tony.



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Article on spammers and their infrastructure

2009-12-22 Thread Suresh Ramasubramanian
On Wed, Dec 23, 2009 at 4:24 AM, Joel Jaeggli joe...@bogus.com wrote:
 Christopher Morrow wrote:
 On Tue, Dec 22, 2009 at 4:24 PM, Jon Lewis jle...@lewis.org wrote:


 Should US based networks be willing to route RIPE ASSIGNED PA space
 customers provide?

 Are any of your customers multinationals?

What would you do if a shell company (the european equivalent of a LLC
with a UPS store address) came to you with a large sized PA netblock
from out of region, and asked you to route it for them?

-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Tools BOF at NANOG-48

2009-12-21 Thread Suresh Ramasubramanian
Hi.  I'd like to see some content on log aggregation from multiple
sources (parse mail / web / IDS / netflow / ... etc logs) and analysis
of logs from these multiple sources.  For security, traffic
engineering etc etc.

Using a tool like Splunk, for example - and any other alternatives to
homegrown perl scripts.

--srs

On Sun, Dec 20, 2009 at 10:42 PM, Mohit Lad mohit...@gmail.com wrote:

  As part of the tools BOF, I also plan to run a short 15-20 min Tools
 roundup outlining the most common non-commercial tools used for day to day
 networking tasks. The objective of this is not to present details of tools,
 but rather a rough taxonomy. Feel free to suggest tools you find useful.



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Arrogant RBL list maintainers

2009-12-15 Thread Suresh Ramasubramanian
Security by obscurity, in this day and age? :)

On Wed, Dec 16, 2009 at 11:42 AM, James Hess mysi...@gmail.com wrote:
 As is common for many domains.
 Spammers coming in  by  scanning  large ranges of IPs,  have no
 pointer to report  the  mailserver they discovered  is �...@example.com
  inbound  (or outbound) mail.

 Since the RDNS domain is different, and in fact generic,  which  helps
 avoid  assisting the spammer  in identifying the IP as an  inbound
 mail server.



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Qwest mail admin contact?

2009-12-10 Thread Suresh Ramasubramanian
Related to any of these?
http://www.spamhaus.org/sbl/listings.lasso?isp=data102.com
Or maybe this - http://www.spamhaus.org/sbl/sbl.lasso?query=SBL51908

$ whois -h whois.cymru.com 128.168.0.0/16
AS  | IP   | AS Name
33302   | 128.168.0.0  | ONS-COS - Data 102, LLC

Whatever the issue is, it might make sense for you to fix it before
you contact Qwest - they'd be more likely to respond that way.

On Fri, Dec 11, 2009 at 1:06 AM, randal k na...@data102.com wrote:
 If one is listening, can I get a Qwest mail admin to drop me a line
 off-list? Numerous emails to postmaster, abuse, relay, etc all seem to be
 deadends.

-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Earthlink SMTP Admin Contact?

2009-12-09 Thread Suresh Ramasubramanian
Is the IP space anywhere near these -
http://www.spamhaus.org/sbl/listings.lasso?isp=limestonenetworks.com

Found 7 SBL listings for IPs under the responsibility of limestonenetworks.com

SBL82484
69.162.119.163/32   limestonenetworks.com
03-Dec-2009 18:14 GMT   BOA phish site

SBL81933
74.63.211.0/24  limestonenetworks.com
25-Nov-2009 01:23 GMT   Snowshoe spam range (Dynabucks)

SBL81769
69.162.115.157/32   limestonenetworks.com
22-Nov-2009 21:54 GMT   Spammed malware sites on fast-flux hacked systems

SBL81707
216.245.216.64/27   limestonenetworks.com
21-Nov-2009 16:24 GMT   MMF snowshoe spam

SBL81125
216.245.222.192/26  limestonenetworks.com
10-Nov-2009 14:00 GMT   Suspected Snowshoe Spam Range

SBL78721
69.162.68.160/29limestonenetworks.com
17-Sep-2009 08:03 GMT   emailmkt.org

SBL78720
216.245.204.32/27   limestonenetworks.com
17-Sep-2009 08:01 GMT   emailmkt.org


On Wed, Dec 9, 2009 at 10:26 PM, Ryan Gelobter
r.gelob...@limestonenetworks.com wrote:
 Thanks for the number, but their NOC was unable to help me. They referred me 
 back to their Abuse Mailbox and abuse e-mail addresses 
 (blockedbyearthl...@abuse.earthlink.net, ab...@abuse.earthlink.net). They 
 were unable to provide any alternative number or e-mail address. I ended up 
 calling their corporate office (404.815.0770) and spoke to an operator who 
 confirmed with senior tech's that the abuse team their checks the mailbox but 
 they apparently are not in the office and work from home. Senior tech support 
 tells me the mail server is not blocked even though I get blocked messages 
 and escalating it further would not do anything as they show it as not 
 blocked.

 Tech support uses the same procedure as the mail administrator does which is 
 to e-mail blockedbyearthlink@ address with the subject BLOCKED: 
 xxx.xxx.xxx.xxx (replace with the ip) and if it is blocked they will unblock 
 you. Sadly, I tried that already.



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: SPF Configurations

2009-12-08 Thread Suresh Ramasubramanian
Absolutely #3 - far more of a threat than #1 and #2.

On Tue, Dec 8, 2009 at 10:09 PM, Tony Finch d...@dotat.at wrote:
 Three :-)

 1. Forwarding users on your campus - with mailboxes that accept a lot
 of spam and then forward it over to student / alumni AOL, Comcast,
 Yahoo etc accounts
 2. Spam generated by infected PCs / laptops, hacked machines etc on
 your campus LAN

 3. Spammers abusing your webmail and/or remote message submission service
 using phished credentials.



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: SPF Configurations

2009-12-07 Thread Suresh Ramasubramanian
On Mon, Dec 7, 2009 at 11:21 PM, Michael Holstein
michael.holst...@csuohio.edu wrote:

 Personally, I think SPF is a major PITA operations-wise .. but if you've
 ever had to fill out the form to get un-blacklisted at Yahoo/AOL, that's
 one of the first things they ask .. do you have a spfv1 record defined?.

With yahoo and aol - they'd be just as satisfied if you used, say, DKIM.
Hotmail's the only one that insists on sender-id (not spfv1 either)

As for a university smarthost getting blocked you'd probably need to
look at one of two things -
1. Forwarding users on your campus - with mailboxes that accept a lot
of spam and then forward it over to student / alumni AOL, Comcast,
Yahoo etc accounts
2. Spam generated by infected PCs / laptops, hacked machines etc on
your campus LAN

If you took steps to fix some of these -
1. Isolate your forwarding through a separate IP or subnet, filter it
before forwarding on
2. Separate your outbound to another set of IPs, again filter
and a few other things - related to this .. you'd get blocked far less.

Joe St.Sauver of UOregon, being a maawg senior tech advisor and also
active in EDUCAUSE etc, might have a white paper on this, like he does
on most other security related issues under the sun :)

-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Breaking the internet (hotels, guestnet style)

2009-12-07 Thread Suresh Ramasubramanian
Swisscom Eurospot - found all through europe and ruinously expensive
at like 25 euro a day, 9 euro an hour
See http://www.mcabee.org/lists/nanog/Feb-07/msg00046.html for what
goes on there .. dns proxying, and broken at that.

On Tue, Dec 8, 2009 at 6:08 AM, Jared Mauch ja...@puck.nether.net wrote:

 On Dec 7, 2009, at 7:23 PM, Brielle Bruns wrote:

 I'm noticing alot of these places are doing things which work perfectly with 
 Windows, but not Mac, Linux, etc.  Drives me bonkers, and we make sure to 
 let management know we won't stay at their hotel in the future because of 
 said issues.

 I'd prefer to not create a blacklist of hotels that have ghetto internet 
 access, but perhaps this is something we can aggregate?

 I'm mostly tired of people saying the internet is http(s) only.  Even had 
 hotels in Japan do some really nasty things...

 - Jared




-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: Breaking the internet (hotels, guestnet style)

2009-12-07 Thread Suresh Ramasubramanian
You could just firewall off port 25 and leave 587 open - to save
yourself from a bunch of viruses and such.
A lot of people will use webmail anyway - from a hotel.  And you avoid
getting blacklisted

The other option is to install a device that examines email flows and
allows only stuff it doesnt think is spammy (netflow for email kind
of, with all the bayesian etc secret sauce).
Two devices come to mind

* Symantec E160 (used to be called turntide, and before that, back in
2002-03, spam squelcher)
* Mailchannels (www.mailchannels.com)

There's probably a few more that do this and are totally transparent.

On Tue, Dec 8, 2009 at 6:54 AM, Andrew Cox and...@accessplus.com.au wrote:

 I would be interested to hear what people have to say about this, as the
 only other option I could think of would involve checking the incoming
 connection to see if the end user was trying to authenticate to a mail
 server before determining where to forward the connection onto (Layer 7
 stuff, gets a bit tricky)



-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Remote hands requested near sherman oaks LA [urgent]

2009-12-06 Thread Suresh Ramasubramanian
Sorry for the noise ..  Got me a (personal) box that has a borked grub
after an OS upgrade.

Need to get somebody there who can just go in, probably fix
/boot/grub/menu.lst to say the right thing, run grub (maybe boot in
with a live cd, mount and run grub.. you know the drill)

Is anybody in or near Sherman Oaks LA who can help fix this?   Please
email ASAP, I'll hook you up with the person who can get you access.

Sorry for the urgent - that box has been down for over 24 hrs now.

gave up waiting for root device
common problem:
boot args (cat/proc/cmdline)
check root delay = (did the system wait long enough?)
check root = (did the system wait for the right device?0
missing modules (cat/pro/modules;ls/dev)
alert!  /dev/disk/by-uuid/42b8599e-f7bc-4626-ad08-4ba6427513d1 does
not exist.  dropping to a shell
busybox v1.13.3(ubuntu 1:1.13.3-1ubuntu7 built in shell (ash)
enter 'help' for a list of commands
(initramfs):

-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Sherman Oaks CA - Re: Remote hands requested near sherman oaks LA [urgent]

2009-12-06 Thread Suresh Ramasubramanian
Too damn early (5:23 AM) .. the box is at Sherman Oaks CA - near Los Angeles LA.
Sigh.

 --Original Message--
 From: Suresh Ramasubramanian
 To: nanog@nanog.org
 Subject: Remote hands requested near sherman oaks LA [urgent]
 Sent: Dec 6, 2009 15:42

 Sorry for the noise ..  Got me a (personal) box that has a borked grub
 after an OS upgrade.



Re: Remote hands requested near sherman oaks LA [urgent]

2009-12-06 Thread Suresh Ramasubramanian
Remote hand found. Thank you.



Re: port scanning from spoofed addresses

2009-12-04 Thread Suresh Ramasubramanian
On Thu, Dec 3, 2009 at 10:35 PM, Matthew Huff mh...@ox.com wrote:
 We are seeing a large number of tcp connection attempts to ports known to 
 have security issues. The source addresses are spoofed from our address 
 range. They are easy to block at our border router obviously, but the number 
 and volume is a bit worrisome. Our upstream providers appear to be 
 uninterested in tracing or blocking them. Is this the new normal? One of my 
 concerns is that if others are seeing probe attempts, they will see them from 
 these addresses and of course, contact us.

 Any suggestions on what to do next? Or just ignore.

Filter it out and then ignore.   Might as well filter it out - see
http://thespamdiaries.blogspot.com/2006/02/new-host-cloaking-technique-used-by.html



Re: SPF Configurations

2009-12-04 Thread Suresh Ramasubramanian
On Fri, Dec 4, 2009 at 9:55 PM, Jeffrey Negro jne...@billtrust.com wrote:
 I'm wondering if a few DNS experts out there could give me some input on
 SPF record configuration.  Our company sends out about 50k - 100k emails
 a day, and most emails are on behalf of customers to their end users at

SPF records aren't going ot help as much as some list sending and
deliverability best practices (feedback loops etc) are.
Look at the MAAWG senders best practices document - www.maawg.org -
Published Documents

Other than delivery to hotmail, spf is a total waste of time - plus it
plays russian roulette with whatever email you handle



Re: ATT SMTP Admin contact?

2009-12-02 Thread Suresh Ramasubramanian
On Thu, Dec 3, 2009 at 12:08 AM, Chris Owen ow...@hubris.net wrote:
 On Dec 2, 2009, at 12:31 PM, Rich Kulawiec wrote:

 Because SenderID and SPF have no anti-spam value, and almost no
 anti-forgery value.  Not that this stops a *lot* of people who've drunk
 the kool-aid from trying to use them anyway,

 OK, I'll bite--How exactly do you go about forging email from my domain name 
 if the host receiving it is checking SPF?

Dont let me stop you playing russian roulette with your users' email.



Re: Finding asymmetric path

2009-11-28 Thread Suresh Ramasubramanian
Yes - term the account would be my recommendation

And if you filter port 25 traffic do it both ways

Read these old nanog threads ..
http://www.irbs.net/internet/nanog/0408/0465.html and
http://www.mail-archive.com/na...@merit.edu/msg28863.html

On Sun, Nov 29, 2009 at 3:58 AM, William Herrin
herrin-na...@dirtside.com wrote:
 On Sat, Nov 28, 2009 at 2:14 PM, ML m...@kenweb.org wrote:
 Brielle is correct.  The customer in question is spamming networks and we
 are having trouble filtering them because another provider allows them to
 source traffic however they please.

 What trouble? SMTP requires two-way traffic with a static port number
 that nothing else uses. If for some reason you don't want to simply
 terminate their account altogether, block packets outbound to your
 customer sourced from TCP port 25 but not from your SMTP smarthosts.

 Seriously though, if you can prove they're spamming (regardless of
 whether the packets pass through your network) save yourself some
 grief and just terminate the account.

 Regards,
 Bill Herrin


 --
 William D. Herrin  her...@dirtside.com  b...@herrin.us
 3005 Crane Dr. .. Web: http://bill.herrin.us/
 Falls Church, VA 22042-3004





-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: I got a live one! - Spam source

2009-11-25 Thread Suresh Ramasubramanian
On Wed, Nov 25, 2009 at 10:55 PM, Michael Peddemors
mich...@linuxmagic.com wrote:

 Could you elaborate on what constitutes correct swip information?


 Sure, you just opened the door to my opinions on this :)


Dysfunctional rwhois servers sounds more like general brokenness than
malice.  The other interesting (!) characteristic of thie sort of bulk
mailer discussed in this thread is that the netblock is most likely
swipped / rwhois'd to a brand new shell company LLC, headquartered in
what looks like a UPS store maildrop.



fight club :) richard bennett vs various nanogers, on paid peering

2009-11-24 Thread Suresh Ramasubramanian
http://gigaom.com/2009/11/22/how-video-is-changing-the-internet/

Does the FTC's question 106 hurt paid peering or not?  88 comments.
Makes real interesting reading, I must say.

srs



Re: I got a live one! - Spam source

2009-11-24 Thread Suresh Ramasubramanian
On Wed, Nov 25, 2009 at 8:52 AM, Russell Myba rusm...@gmail.com wrote:
 Looks like of our customers has decided to turn their /24 into a nice little
 space spewing machine.  Doesn't seem like just one compromised host.

 Reverse DNS for most of the /24 are suspicious domains.  Each domain used in
 the message-id forwards to a single .net which lists their mailing address
 as a PO box an single link to an unsubscribe field.

Sounds like what spamhaus.org calls snowshoe. What /24 would this be?



Re: dealing with bogon spam ?

2009-10-28 Thread Suresh Ramasubramanian
Ah, colo4jax I see. Jacksonville, Florida.

68.234.16.0/20 shows up as unallocated but as these guys own the
previous /20 its probably a stale arin db and a brand new allocation

  Prefix   AS Path
Aggregation Suggestion
  68.234.0.0/204777 2497 25973 40430
  68.234.16.0/20   4608 1221 4637 3561 40430
  69.174.96.0/21   4777 2497 25973 40430
  173.205.80.0/20  4777 2497 25973 40430
  204.237.184.0/21 4777 2497 25973 40430
  204.237.192.0/22 4777 2497 25973 40430
  208.153.96.0/22  4777 2497 25973 40430
  208.169.228.0/22 4777 2497 25973 40430


On Wed, Oct 28, 2009 at 12:14 PM, Leslie les...@craigslist.org wrote:
 Yes, unallocated (at least according to ARIN's whois db) but not unannounced
 - obviously our network can get to the space or else I wouldn't be having a
 spam problem with them!   I'm actually seeing this  /20 as advertised
 through Savvis from AS40430

 It seems to me like the best solution might be a semi-hacky solution of
 asking arin (and other IRR's) if i can copy its DB and creating an internal
 peer which null routes unallocated blocks (updated nightly?)

 Has anyone seen an IRR's DB's not being updated for more than 30 days after
 allocations?  I always assumed that they are quickly updated.

 Thanks again,
 Leslie

 Jon Lewis wrote:

 Unallocated doesn't mean non-routed.  All a spammer needs is a
 willing/non-filtering provider doing BGP with them, and they can announce
 any space they like, send out some spam, and then pull the announcement.
 Next morning, when you see the spam and try to figure out who to send
 complaints to, you're either going to complain to the wrong people or find
 that whois is of no help.

 On Tue, 27 Oct 2009, Church, Charles wrote:

 This is puzzling me.  If it's from non-announced space, at some point
 some router should report no route to it.  How is the TCP handshake
 performed to allow a sync to turn into spam?

 Chuck

 Chuck Church
 Network Planning Engineer, CCIE #8776
 Harris Information Technology Services
 DOD Programs
 1210 N. Parker Rd. | Greenville, SC 29609
 Office: 864-335-9473 | Cell: 864-266-3978
 --
 Sent using BlackBerry







-- 
Suresh Ramasubramanian (ops.li...@gmail.com)



Re: dealing with bogon spam ?

2009-10-28 Thread Suresh Ramasubramanian
You are using it the wrong way .. most of the drop list is directly
spammer controlled space used as, for example, CC for botnets.
You'd see tons of abuse and little or no smtp traffic from a lot of
those hosts.

On Thu, Oct 29, 2009 at 12:26 AM, Jason Bertoch ja...@i6ix.com wrote:
 Justin Shore wrote:
 As a brief off-shoot of the original topic, has anyone scripted the use of
 Spamhaus's DROP list in a RTBH, ACLs, null-routes, etc?  I'm not asking if
 people think it's safe; that's up to the network wanting to deploy it.  I'm

 Downloading and parsing is easy.  I used to drop it into the config for a
 small dns server, rbldnsd I believe, that understands CIDR and used it as a
 local blacklist.  It did very little to stop spam and I was never brave
 enough to script an automatic update to BGP.



Re: dealing with bogon spam ?

2009-10-27 Thread Suresh Ramasubramanian
What /20 would this be, and can you blame an out of date whois client
or whois db for it?

If the /20 is being routed, and announced - chances are it IS allocated.

On Wed, Oct 28, 2009 at 5:40 AM, Leslie les...@craigslist.org wrote:
 I failed to mention we're seeing this from an unallocated /20 whose parent
 /8 is allocated to ARIN (and is partially in use)

 Leslie



Re: dealing with bogon spam ?

2009-10-27 Thread Suresh Ramasubramanian
Having been postmastering at various places for about a decade, I have
seen that too - yes.  But cymru style filtering means its kind of out
of fashion now.

Though - a lot of the cases I've seen have been

1. Out of date whois client and the IP's been allocated after the
whois client came out (with a hardcoded list of unallocated IPs)
2. Whois db is out of date - comparatively rarer but known to occur

Especially if you see a mainstream carrier routing it instead of some
small outfit in Eastern Europe  .. chances are its stale db somewhere
rather than totally unallocated block and phantom routing

On Wed, Oct 28, 2009 at 6:25 AM, Jon Kibler jon.kib...@aset.com wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 Suresh Ramasubramanian wrote:

 If the /20 is being routed, and announced - chances are it IS allocated.

 Don't bet on it. This is one of the oldest spammer tricks in the book. I 
 worked
 with ISPs as far back as the late 90s trying to track down poachers who
 temporarily squat on an unallocated block and announce it to the world.




Re: dealing with bogon spam ?

2009-10-27 Thread Suresh Ramasubramanian
Seen it before - but mostly for malware rather than for spam.  And
certainly not long enough / persistent enough for a full fledged spam
campaign (4..5 days rather than a day or two at the most when people
start noticing and dropping the bogus announcement)

On Wed, Oct 28, 2009 at 6:57 AM, Jon Lewis jle...@lewis.org wrote:
 Unallocated doesn't mean non-routed.  All a spammer needs is a
 willing/non-filtering provider doing BGP with them, and they can announce
 any space they like, send out some spam, and then pull the announcement.
 Next morning, when you see the spam and try to figure out who to send
 complaints to, you're either going to complain to the wrong people or find
 that whois is of no help.



<    1   2   3   4   5   6   >