Peering with the Internet Alert Registry

2008-03-10 Thread Josh Karlin
All, Some of you are aware of the site for network operators: http://iar.cs.unm.edu/ which has running for two years now. The purpose of the site is to detect and distribute network anomaly information to the network operators that need to know. The flip side of our proposed security system,

Re: Peering with the Internet Alert Registry

2008-03-10 Thread Josh Karlin
, Mar 10, 2008 at 11:01 AM, Josh Karlin [EMAIL PROTECTED] wrote: All, Some of you are aware of the site for network operators: http://iar.cs.unm.edu/ which has running for two years now. The purpose of the site is to detect and distribute network anomaly information to the network

Re: YouTube IP Hijacking

2008-02-25 Thread Josh Karlin
Tomas: It's primarily a proof of concept site, to show that such an idea would be useful, but it has been running for over a year now and discovered many interesting hijacks (such as eBay/google/etc..). You're right that there is a glaring ommission, which is yesterday's youtube hijack. This is

Re: odd hijack

2006-11-10 Thread Josh Karlin
Wouldn't they want to hijack more specifics to spam? no. see nick feamster's work, and the lightning talk i proxied for him in dallas. randy Right, you might want to announce less specifics so that you go unnoticed and then you can spam from blocks not in use. I'm just somewhat surprised

odd hijack

2006-11-09 Thread Josh Karlin
I recently brought up a prefix hijack that the NANOG community solved, the AS had accidentally started announcing their bogon list. Here is one that is somewhat the opposite, the AS announced a significant portion of IANA allocated space. Note, they are large blocks and as such probably did

Re: odd hijack

2006-11-09 Thread Josh Karlin
Wouldn't they want to hijack more specifics to spam? I doubt much of that space is going to correctly route for spamming purposes. On 11/9/06, Hank Nussbacher [EMAIL PROTECTED] wrote: On Thu, 9 Nov 2006, Josh Karlin wrote: Here is one that is somewhat the opposite, the AS announced

AS 8437 announced a quarter of the net for half of an hour

2006-08-14 Thread Josh Karlin
Greetings, Today (Aug 14th 2006) AS 8437 announced 63 /8 nets from 14:30 to 15:00 UTC. I don't believe that this is normal, but please correct me if I am wrong. More info can be found at the Internet Alert Registry here: http://cs.unm.edu/~karlinjf/IAR/prefix.php?filter=most If you come to

Re: AS 8437 announced a quarter of the net for half of an hour

2006-08-14 Thread Josh Karlin
Yes but no response yet. On 8/14/06, Randy Bush [EMAIL PROTECTED] wrote: Today (Aug 14th 2006) AS 8437 announced 63 /8 nets from 14:30 to 15:00 UTC. I don't believe that this is normal, but please correct me if I am wrong. have you written to tele2uta in asutria? randy

Re: AS 8437 announced a quarter of the net for half of an hour

2006-08-14 Thread Josh Karlin
PROTECTED] wrote: On Mon, Aug 14, 2006 at 01:36:36PM -0600, Josh Karlin wrote: Greetings, Today (Aug 14th 2006) AS 8437 announced 63 /8 nets from 14:30 to 15:00 UTC. I don't believe that this is normal, but please correct me if I am wrong. Note they're all unallocated blocks, so probably someone's

Re: a fun hijack: 1/8, 2/8, 3/8, 4/8, 5/8, 7/8, 8/8, 12/8 briefly announced by AS 23520 (today)

2006-06-09 Thread Josh Karlin
I am happy folks like at RIPE and the IETF are looking at solutions, but sBGP isn't a new idea, and well, how LONG have we been waiting for DNS-SEC now? I just read a paper yesterday from '97 that suggested complete registries would be available within the next couple of years ;)

a fun hijack: 1/8, 2/8, 3/8, 4/8, 5/8, 7/8, 8/8, 12/8 briefly announced by AS 23520 (today)

2006-06-07 Thread Josh Karlin
Check out the IAR for Potential Prefix Hijacks and if you're coming to this more than 24 hours after the post, do a search on AS 23520 as the hijacking AS. I don't know how long the routes were announced, but they seem to be gone now. Or maybe the IAR is horribly broken, in which case I will

Re: a fun hijack: 1/8, 2/8, 3/8, 4/8, 5/8, 7/8, 8/8, 12/8 briefly announced by AS 23520 (today)

2006-06-07 Thread Josh Karlin
Wonder if it was intentional or a 'classful' issue. This is why we (Level 3) and ATT announce the /9s of 4/8, 8/8, and 12/8 :) -Kevin The /9s were stolen too, as well as a host of other prefixes. I just listed the biggies that I was pretty sure didn't belong to 23520. No clue if

Re: So -- what did happen to Panix?

2006-02-08 Thread Josh Karlin
Here is what we propose in PGBGP. If you have a more specific route and its AS Path does not contain any of the less specific route's origins, then ignore it for a day and keep routing to the less specific origin. If it's legitimate the less specific origin should forward the data on for the

Re: So -- what did happen to Panix?

2006-02-07 Thread Josh Karlin
Chris has it! And to be clear, we only require a slow (1 day) provider changeover in the case that you want to announce your old provider's sub-prefix at a new provider. For instance, if you are an ATT customer using a 12/8 sub-prefix and change providers but keep the prefix, the prefix will

Re: So -- what did happen to Panix?

2006-02-03 Thread Josh Karlin
Hasn't that been said for years? Wouldn't perfect IRRs be great? I couldn't agree more. But in the meanwhile, why not protect your own ISP by delaying possible misconfigurations.Our proposed delay does *not* affect reachability, if the only route left is suspicious, it will be

Re: So -- what did happen to Panix?

2006-01-27 Thread Josh Karlin
Wouldn't a well-operated network of IRRs used by 95% of network operators be able to meet all three of your requirements? -certified prefix ownership -certified AS path ownership -dynamic changes to the above two items It seems to me that most of the pieces needed to do this already

Re: So -- what did happen to Panix?

2006-01-26 Thread Josh Karlin
The noise of origin changes is fairly heavy, somewhere in the low hundreds of alerts per day given a 3 day history window. Supposing a falsely originated route was delayed, what is the chance of identifying and fixing it before the end of the delay period? Do operators commonly catch

Re: So -- what did happen to Panix?

2006-01-26 Thread Josh Karlin
I unfortunately don't have answers to those questions, but you've piqued my interest so I will try to look into it within the next couple of days. Josh On 1/26/06, Jared Mauch [EMAIL PROTECTED] wrote: On Thu, Jan 26, 2006 at 04:22:29PM -0700, Josh Karlin wrote: The noise of origin changes

preventing future situations like panix

2006-01-23 Thread Josh Karlin
in detail how few routes will actually be delayed by our mechanism in the linked paper. http://www.cs.princeton.edu/~jrex/papers/pgbgp.pdf Your input is most welcome. Thanks, Josh Karlin

Re: preventing future situations like panix

2006-01-23 Thread Josh Karlin
It seems like most of the routers which would need to make this decision wouldn't have adequate information upon which to do so... not necessarily. the decision could be made in near real time by building prefix filters based on the algorithms that josh and co have worked on and leaving

Re: preventing future situations like panix

2006-01-23 Thread Josh Karlin
To what extent does the route object validation in the RIPE database (for routes covering RIPE-allocated space), together with maintainer object authentication, provide a perfect IRR, according to your research? (I realise the step from useful, authenticated source of data to

Re: preventing future situations like panix

2006-01-23 Thread Josh Karlin
the space among itself and those downstream of it without considering that suspicious behavior. This allows ASs to protect themselves via such methods. Thanks for your comments! Josh On 1/23/06, Thor Lancelot Simon [EMAIL PROTECTED] wrote: On Mon, Jan 23, 2006 at 12:47:38PM -0700, Josh