Re: BCP38 making it work, solving problems

2004-10-21 Thread Joe Abley
On 20 Oct 2004, at 21:49, Jon Lewis wrote: On Wed, 20 Oct 2004, Patrick W Gilmore wrote: Have you actually done the work to see how many packets it takes to shut down a session with and without MD5 enabled? (The question is rhetorical, since your post shows that you have not.) Just a bit more sau

Re: BCP38 making it work, solving problems

2004-10-20 Thread Jon Lewis
On Wed, 20 Oct 2004, Patrick W Gilmore wrote: > Have you actually done the work to see how many packets it takes to > shut down a session with and without MD5 enabled? (The question is > rhetorical, since your post shows that you have not.) Just a bit more sauce for the goose...enabling MD5 on

Re: BCP38 making it work, solving problems

2004-10-20 Thread JP Velders
> Date: Wed, 20 Oct 2004 03:33:05 GMT > From: "Fergie (Paul Ferguson)" <[EMAIL PROTECTED]> > To: [EMAIL PROTECTED] > Cc: [EMAIL PROTECTED] > Subject: Re: BCP38 making it work, solving problems > Hmm, so let me figure this one out... Are you arguing against &g

Re: BCP38 making it work, solving problems

2004-10-19 Thread Patrick W Gilmore
On Oct 19, 2004, at 1:14 PM, JP Velders wrote: jacking the connection is in a completely different class as someone bombarding you with a bunch of forged BGP packets to close down a session. Without that MD5 checksum you are quite vulnerable to that. I haven't seen a vendor come up with a solution

Re: BCP38 making it work, solving problems

2004-10-19 Thread Randy Bush
> Hmm, so let me figure this one out... Are you arguing against > BCP38 implementation/filtering, or what? no one is arguing against it. they're just trying to tell the religious zealots (who seem not to run large networks) why it is not deploying as rapidly as they might like. randy

Re: BCP38 making it work, solving problems

2004-10-19 Thread Fergie (Paul Ferguson)
Hmm, so let me figure this one out... Are you arguing against BCP38 implementation/filtering, or what? - ferg -- JP Velders <[EMAIL PROTECTED]> wrote: In most cases it will go like that, the minority of when it doesn't go like that, you start filtering / whatever, just like we do now. Regard

Re: BCP38 making it work, solving problems

2004-10-19 Thread Mark Andrews
>dropped over it's 25 day uptime: > > RPF Failures: Packets: 34889152, Bytes: 12838806927 > RPF Failures: Packets: 4200, Bytes: 449923 > RPF Failures: Packets: 3066337401, Bytes: 122772518288 > RPF Failures: Packets: 30954487, Bytes: 3272647457 > RPF Failures: Packets: 470

Re: BCP38 making it work, solving problems

2004-10-19 Thread Jared Mauch
On Tue, Oct 19, 2004 at 01:36:18PM +, Paul Vixie wrote: > > > ... the first thing is, some nets who want the internet to work this > > > way have to implement BCP38 in their own corner of the internet. > > > then they have to start de-peering with nets who don't do it, and > > > offer a better

Re: BCP38 making it work, solving problems

2004-10-19 Thread JP Velders
> Date: Tue, 19 Oct 2004 13:36:18 + > From: Paul Vixie <[EMAIL PROTECTED]> > To: [EMAIL PROTECTED] > Subject: Re: BCP38 making it work, solving problems > [ ... ] > > As it was "in the old days": first clean up your own act and then > > start point

Re: BCP38 making it work, solving problems

2004-10-19 Thread JP Velders
> Date: Tue, 19 Oct 2004 13:20:08 -0400 > From: David G. Andersen <[EMAIL PROTECTED]> > Subject: Re: BCP38 making it work, solving problems > [ ... ] > Unless you're worried about an adversary who taps into your > fiber, how is MD5 checksums any better than anti sp

Re: BCP38 making it work, solving problems

2004-10-19 Thread David G. Andersen
On Tue, Oct 19, 2004 at 07:14:32PM +0200, JP Velders scribed: > > > Date: Tue, 19 Oct 2004 09:21:46 -0700 > > From: Randy Bush <[EMAIL PROTECTED]> > > Subject: Re: BCP38 making it work, solving problems > > > > For example, how many ISPs use TCP MD5 to l

Re: BCP38 making it work, solving problems

2004-10-19 Thread JP Velders
> Date: Tue, 19 Oct 2004 09:21:46 -0700 > From: Randy Bush <[EMAIL PROTECTED]> > Subject: Re: BCP38 making it work, solving problems > > For example, how many ISPs use TCP MD5 to limit the possibility of a > > BGP/TCP connection getting hijacked or disrupted by a ddos

Re: BCP38 making it work, solving problems

2004-10-19 Thread Randy Bush
> For example, how many ISPs use TCP MD5 to limit the possibility of a > BGP/TCP connection getting hijacked or disrupted by a ddos attack? i hope none use it for the latter, as it will not help. more and more use it for the former. why? becuase they perceived the need to solve an immediate p

Re: BCP38 making it work, solving problems

2004-10-19 Thread Paul Vixie
> > ... the first thing is, some nets who want the internet to work this > > way have to implement BCP38 in their own corner of the internet. > > then they have to start de-peering with nets who don't do it, and > > offer a better rate to customers who do it than to those who don't. > > then they

Re: BCP38 making it work, solving problems

2004-10-19 Thread Fred Baker
At 01:11 PM 10/19/04 +0200, JP Velders wrote: As it was "in the old days": first clean up your own act and then start pointing at others that they're doing "it" wrong. hear hear... But Paul knows and in fact does that. He is pointing out the difficulty of getting people to do basic things that ar

Re: BCP38 making it work, solving problems

2004-10-19 Thread JP Velders
> Date: 12 Oct 2004 16:22:17 + > From: Paul Vixie <[EMAIL PROTECTED]> > To: [EMAIL PROTECTED] > Subject: Re: BCP38 making it work, solving problems > [ ... ] > how are we going to get there? the first thing is, some nets who want the > internet to work this way

Re: BCP38 making it work, solving problems

2004-10-14 Thread Iljitsch van Beijnum
On 14-okt-04, at 0:17, Fred Baker wrote: Trusting the source when it says that its packets aren't evil might be sub-optimal. Evaluation of evilness is best left up to the receiver. Likely true. Next question is whether the receiver can really determine that in real time. For some things, yes, b

Re: BCP38 making it work, solving problems

2004-10-14 Thread bmanning
On Thu, Oct 14, 2004 at 11:48:24AM +0100, [EMAIL PROTECTED] wrote: > > > At 12:01 PM 10/13/04 +0200, Iljitsch van Beijnum wrote: > > >Trusting the source when it says that its packets aren't evil might be > > >sub-optimal. Evaluation of evilness is best left up to the receiver. > > > > Likely t

Re: BCP38 making it work, solving problems

2004-10-14 Thread Michael . Dillon
> At 12:01 PM 10/13/04 +0200, Iljitsch van Beijnum wrote: > >Trusting the source when it says that its packets aren't evil might be > >sub-optimal. Evaluation of evilness is best left up to the receiver. > > Likely true. Next question is whether the receiver can really determine > that in real

Re: BCP38 making it work, solving problems

2004-10-13 Thread Fred Baker
At 12:01 PM 10/13/04 +0200, Iljitsch van Beijnum wrote: Trusting the source when it says that its packets aren't evil might be sub-optimal. Evaluation of evilness is best left up to the receiver. Likely true. Next question is whether the receiver can really determine that in real time. For some t

Re: BCP38 making it work, solving problems

2004-10-13 Thread Stephen J. Wilcox
On 13 Oct 2004, Paul Vixie wrote: > > >How many people have seen "forged" spoofed IP addresses being used for DOS > > >attacks lately? > > syn-flood protection, and random TCP ISS, are now common enough that > spoofed-source isn't effective for TCP flows. if you want to bring down > somebody's

Re: BCP38 making it work, solving problems

2004-10-13 Thread Paul Vixie
> >How many people have seen "forged" spoofed IP addresses being used > >for DOS attacks lately? syn-flood protection, and random TCP ISS, are now common enough that spoofed-source isn't effective for TCP flows. if you want to bring down somebody's web server then blackhats really do have to use

Re: BCP38 making it work, solving problems

2004-10-13 Thread Paul Vixie
> Some medium-big (and up) operators implement 'RFC-1918 source' filters on > their gateways to the 'external internet', ... maybe so. but i want to renew an old complaint, with updated numbers: # ipfw show ... 00400 576234043927757977 deny ip from 10.0.0.0/8 to any in 00500

Re: BCP38 making it work, solving problems

2004-10-13 Thread Steven Champeon
on Wed, Oct 13, 2004 at 07:09:10AM +0530, Suresh Ramasubramanian wrote: > > [EMAIL PROTECTED] [12/10/04 13:16 -0400]: > > > > > If I, and my little 7-man company, can afford to have me solve the > > > problem on our end, why the heck can't you do the same? > > > > You can do it because you are

Re: BCP38 making it work, solving problems

2004-10-13 Thread Randy Bush
>> any idea why someone(s) is ddosing dark space? seems a bit silly. > No one is DDOSing dark space. The dark space telescope picks up the > "richochets" caused by DDOS. sorry. i guess i should give up getting more sleep and go make coffee. randy

Re: BCP38 making it work, solving problems

2004-10-13 Thread Suresh Ramasubramanian
Randy Bush wrote: For the week starting Sept 12, our dark space telescope "saw" 1675 spoofed DDOS attacks. any idea why someone(s) is ddosing dark space? seems a bit silly. Something like this I rather fancy ... http://lists.planet-lab.org/pipermail/announce/2004-April/12.html [Planetlab-anno

Re: BCP38 making it work, solving problems

2004-10-13 Thread Hank Nussbacher
At 04:59 AM 13-10-04 -0700, Randy Bush wrote: > For the week starting Sept 12, our dark space telescope "saw" > 1675 spoofed DDOS attacks. any idea why someone(s) is ddosing dark space? seems a bit silly. No one is DDOSing dark space. The dark space telescope picks up the "richochets" caused by

Re: BCP38 making it work, solving problems

2004-10-13 Thread Randy Bush
> For the week starting Sept 12, our dark space telescope "saw" > 1675 spoofed DDOS attacks. any idea why someone(s) is ddosing dark space? seems a bit silly. randy

Re: BCP38 making it work, solving problems

2004-10-13 Thread Iljitsch van Beijnum
On 12-okt-04, at 7:30, Fred Baker wrote: From an ISP perspective, I would think that it would be of value to offer *not* ingress filtering (whether by ACL or by uRPF) as a service that a customer pays for. So what is our collective position on ISPs filtering their peers? Both the position that th

Re: BCP38 making it work, solving problems

2004-10-13 Thread Hank Nussbacher
At 09:50 AM 12-10-04 -0700, Bora Akyol wrote: How many people have seen "forged" spoofed IP addresses being used for DOS attacks lately? For the week starting Sept 12, our dark space telescope "saw" 1675 spoofed DDOS attacks. No idea how many non-spoofed attacks took place during the same time p

Re: BCP38 making it work, solving problems

2004-10-12 Thread Robert Bonomi
> From [EMAIL PROTECTED] Tue Oct 12 20:41:45 2004 > Date: Wed, 13 Oct 2004 07:09:10 +0530 > From: Suresh Ramasubramanian <[EMAIL PROTECTED]> > To: [EMAIL PROTECTED] > Cc: Steven Champeon <[EMAIL PROTECTED]>, [EMAIL PROTECTED] > Subject: Re: BCP38 making it work,

Re: BCP38 making it work, solving problems

2004-10-12 Thread Suresh Ramasubramanian
[EMAIL PROTECTED] [12/10/04 13:16 -0400]: > > > If I, and my little 7-man company, can afford to have me solve the > > problem on our end, why the heck can't you do the same? > > You can do it because you are a 7-man company. So can I. However, companies > the size of Sprint cannot do it. > M

Re: BCP38 making it work, solving problems

2004-10-12 Thread alex
> If I, and my little 7-man company, can afford to have me solve the > problem on our end, why the heck can't you do the same? You can do it because you are a 7-man company. So can I. However, companies the size of Sprint cannot do it. Alex

Re: BCP38 making it work, solving problems

2004-10-12 Thread Christopher L. Morrow
On Tue, 12 Oct 2004, Bora Akyol wrote: > Excerpt from the text quoted above: > >2.3. For a DDoS attack to succeed more than once, the launch points must >remain anonymous. Therefore, forged IP source addresses are used. From >the victim's point of view, a DDoS attack seems to come

Re: BCP38 making it work, solving problems

2004-10-12 Thread Patrick W Gilmore
On Oct 12, 2004, at 12:50 PM, Bora Akyol wrote: 2.3. For a DDoS attack to succeed more than once, the launch points must remain anonymous. Therefore, forged IP source addresses are used. From the victim's point of view, a DDoS attack seems to come from everywhere at once, even from

Re: BCP38 making it work, solving problems

2004-10-12 Thread Steven Champeon
on Tue, Oct 12, 2004 at 12:49:54PM -0400, [EMAIL PROTECTED] wrote: > This is just the cold blooded economic reality. The same reality which > dictates that only smaller companies can enfore strict anti-spam policies, > and prevent their customers from behaving badly. You want cold-blooded economi

Re: BCP38 making it work, solving problems

2004-10-12 Thread alex
> uPRF is only one of several ways to implement BCP38. you could do it with > contracts and reverse-SLA's and thus no technology (on your side) at all: > demand that a customer pay 10X his bill, or $1.00 per packet, whichever is > lower, if they emit packets with source addresses no explicitly na

Re: BCP38 making it work, solving problems

2004-10-12 Thread Bora Akyol
On 10/12/04 9:06 AM, "Paul Vixie" <[EMAIL PROTECTED]> wrote: > >> There is, of course, the issue of multihomed networks, or networks that >> have satellite connectivity etc emitting spoofed source packets. > > y'know, SAC004 (http://www.icann.org/committees/security/sac004.txt) is > only four p

Re: BCP38 making it work, solving problems

2004-10-12 Thread Paul Vixie
> ... > Example: > > the 'chris.net' network is a customer of MCI, his customer "bakker.net". > 'bakker.net' decides 'chris.net' has priced transit cheaply this > year/month/day and choses not to accept traffic from 'chris.net' but send > all outbound traffic through 'chris.net'. 'chris.net' neve

Re: BCP38 making it work, solving problems

2004-10-12 Thread Suresh Ramasubramanian
Paul Vixie wrote: There is, of course, the issue of multihomed networks, or networks that have satellite connectivity etc emitting spoofed source packets. y'know, SAC004 (http://www.icann.org/committees/security/sac004.txt) is only four pages long, and one of those is references. you should read

Re: BCP38 making it work, solving problems

2004-10-12 Thread Paul Vixie
> There is, of course, the issue of multihomed networks, or networks that > have satellite connectivity etc emitting spoofed source packets. y'know, SAC004 (http://www.icann.org/committees/security/sac004.txt) is only four pages long, and one of those is references. you should read it before yo

Re: BCP38 making it work, solving problems

2004-10-12 Thread Christopher L. Morrow
On Tue, 12 Oct 2004, Niels Bakker wrote: > > * [EMAIL PROTECTED] (Christopher L. Morrow) [Tue 12 Oct 2004, 05:18 CEST]: > > a common occurance we've seen is a customer of a customer NOT > > announcing , nor planning on announcing, their routes to their > > upstream#1 which they use ONLY for outbo

Re: BCP38 making it work, solving problems

2004-10-12 Thread Niels Bakker
* [EMAIL PROTECTED] (Christopher L. Morrow) [Tue 12 Oct 2004, 05:18 CEST]: > a common occurance we've seen is a customer of a customer NOT > announcing , nor planning on announcing, their routes to their > upstream#1 which they use ONLY for outbound traffic (cheap transit for > instance, and perha

Re: BCP38 making it work, solving problems

2004-10-11 Thread Fred Baker
At 08:39 AM 10/12/04 +0530, Suresh Ramasubramanian wrote: Yes I know that multihoming customers must make sure packets going out to the internet over a link match the route advertised out that link .. but stupid multihoming implementations do tend to ensure that lots of people will yell loudly,

Re: BCP38 making it work, solving problems

2004-10-11 Thread Christopher L. Morrow
On Tue, 12 Oct 2004, Suresh Ramasubramanian wrote: > Daniel Senie wrote: > > One of your arguments presented was that corporate customers weren't > > asking for unicast RPF, and I responded that corporate customers are not > > in need of automated mechanisms to implement BCP38, since in most cas

Re: BCP38 making it work, solving problems

2004-10-11 Thread Suresh Ramasubramanian
Daniel Senie wrote: One of your arguments presented was that corporate customers weren't asking for unicast RPF, and I responded that corporate customers are not in need of automated mechanisms to implement BCP38, since in most cases their networks are EDGE networks, and it's quite simple to fil

Re: BCP38 making it work, solving problems

2004-10-11 Thread Daniel Senie
At 07:51 PM 10/11/2004, Richard A Steenbergen wrote: On Mon, Oct 11, 2004 at 06:03:08PM -0400, Daniel Senie wrote: > > I've removed the rest of your message, talking about which vendors do or > don't have what capabilities. While I agree it'd be nice if more vendors > offered automated tools for im

Re: BCP38 making it work, solving problems

2004-10-11 Thread Richard A Steenbergen
On Mon, Oct 11, 2004 at 06:03:08PM -0400, Daniel Senie wrote: > > I've removed the rest of your message, talking about which vendors do or > don't have what capabilities. While I agree it'd be nice if more vendors > offered automated tools for implementing ingress filtering, such tools are > u

Re: BCP38 making it work, solving problems

2004-10-11 Thread Daniel Senie
At 05:41 PM 10/11/2004, Richard A Steenbergen wrote: >On Mon, Oct 11, 2004 at 02:58:59AM +, Fergie (Paul Ferguson) wrote: > > It's better than a sharp stick in the eye, I'll tell ya, > lad. > > Listen to me: It's called a "best current practice" for a > reason -- people should do it. Not sit an

Re: BCP38 making it work, solving problems

2004-10-11 Thread Joe Maimon
Fergie (Paul Ferguson) wrote: True, but yet another cop out. If you're not part of the solution, . - ferg -- Dan Hollis <[EMAIL PROTECTED]> wrote: On Mon, 11 Oct 2004, Fergie (Paul Ferguson) wrote: I wrote it, I stand beside it. I'm sick of hearing why people haven't implemented it yet -- i

Re: BCP38 making it work, solving problems

2004-10-11 Thread Richard A Steenbergen
>On Mon, Oct 11, 2004 at 02:58:59AM +, Fergie (Paul Ferguson) wrote: > > It's better than a sharp stick in the eye, I'll tell ya, > lad. > > Listen to me: It's called a "best current practice" for a > reason -- people should do it. Not sit and around and endlessly > discuss it (we've already

Re: BCP38 making it work, solving problems

2004-10-11 Thread Edward B. Dreger
RB> Date: Sun, 10 Oct 2004 20:14:01 -0700 RB> From: Randy Bush RB> when it solves critical problems, it'll grow more quickly. Maybe. * Use 25/TCP for SMTP and 587/TCP for submission * Block outbound SMTP by default, but allow for the clueful * Run SMTP authentication * Let each authenticated us

Re: BCP38 making it work, solving problems

2004-10-11 Thread Randy Bush
the problem is that isp security folk doing actual measurement see very little spoofing. it's easy for the bad folk to get real bots. and tcp bad things are more popular and desirable, e.g. spam, ... and tcp does not work from spoofed addresses. isp security folk have limited resources. so wh

Re: BCP38 making it work, solving problems

2004-10-11 Thread Edward B. Dreger
SD> Date: Sun, 10 Oct 2004 21:35:33 -0400 (EDT) SD> From: Sean Donelan SD> People think BCP38 means the packets could only originate SD> from you. Were BCP38 universal, this would be true. If one receives a packet, it's either from the supposed source or a network that allows spoofing. If no n

Re: BCP38 making it work, solving problems

2004-10-10 Thread Fergie (Paul Ferguson)
True, but yet another cop out. If you're not part of the solution, . - ferg -- Dan Hollis <[EMAIL PROTECTED]> wrote: On Mon, 11 Oct 2004, Fergie (Paul Ferguson) wrote: > I wrote it, I stand beside it. I'm sick of hearing why people > haven't implemented it yet -- it's almost five years la

Re: BCP38 making it work, solving problems

2004-10-10 Thread Dan Hollis
On Mon, 11 Oct 2004, Fergie (Paul Ferguson) wrote: > I wrote it, I stand beside it. I'm sick of hearing why people > haven't implemented it yet -- it's almost five years later > and there's simply no excuse. It's sickening. it's cheaper to ignore bcp38 than to implement it. operators are reactiv

Re: BCP38 making it work, solving problems

2004-10-10 Thread Fergie (Paul Ferguson)
It's better than a sharp stick in the eye, I'll tell ya, lad. Listen to me: It's called a "best current practice" for a reason -- people should do it. Not sit and around and endlessly discuss it (we've already done that a thousand times). I wrote it, I stand beside it. I'm sick of hearing why p

Re: BCP38 making it work, solving problems

2004-10-10 Thread J. Oquendo
> I have received complaints from people about NOT being able to spoof > packets. Technical Support: "This is CompanyX, how can I help you?" 31337kiddi0t: "wHy c0m3 3ye c4nt sp0of?!$!*@" With all of the different standards which tend to add confusion, too much time seems to be going to waste