Re: Over a decade of DDOS--any progress yet?

2010-12-10 Thread Dobbins, Roland
On Dec 11, 2010, at 5:51 AM, Joel Jaeggli wrote: > Paying for DOS mitigation you rarely if ever use is quite expensive. Some operators offer 'Clean Pipes' commercial DDoS mitigation services; they have various fee models, and they charge their end-customers for it. It's positioned as a form o

Re: Over a decade of DDOS--any progress yet?

2010-12-10 Thread Joel Jaeggli
On 12/10/10 12:33 PM, Drew Weaver wrote: > Nobody has really driven the point home that yes you can purchase a > system from Arbor, RioRey, make your own mitigation system; what-have > you, but you still have to pay for the transit to digest the attack, > which is probably the main cost right now.

The Cidr Report

2010-12-10 Thread cidr-report
This report has been generated at Fri Dec 10 21:11:47 2010 AEST. The report analyses the BGP Routing Table of AS2.0 router and generates a report on aggregation potential within the table. Check http://www.cidr-report.org for a current version of this report. Recent Table History Date

BGP Update Report

2010-12-10 Thread cidr-report
BGP Update Report Interval: 02-Dec-10 -to- 09-Dec-10 (7 days) Observation Point: BGP Peering with AS131072 TOP 20 Unstable Origin AS Rank ASNUpds % Upds/PfxAS-Name 1 - AS17974 114160 8.0% 79.3 -- TELKOMNET-AS2-AP PT Telekomunikasi Indonesia 2 - AS17908

Re: Windows Encryption Software

2010-12-10 Thread Ben Carleton
On 12/9/2010 8:20 PM, William Herrin wrote: > On Thu, Dec 9, 2010 at 7:24 PM, Brandon Kim > wrote: >> I want to know if there's software out there that will encrypt files on >> win2k3, winxp, win7, so that if someone >> decides to steal the computer and plug the harddrive into a USB external >

RE: Over a decade of DDOS--any progress yet?

2010-12-10 Thread Drew Weaver
Yes, and I have no problem with this in theory, I just wish that some of the larger ones could proactively monitor their networks to avoid crushing the smaller ones but maybe this is intentional. I have seen a huge increase in the number of attacks originating from other "hosting" companies rec

Weekly Routing Table Report

2010-12-10 Thread Routing Analysis Role Account
This is an automated weekly mailing describing the state of the Internet Routing Table as seen from APNIC's router in Japan. The posting is sent to APOPS, NANOG, AfNOG, AusNOG, SANOG, PacNOG, LacNOG, CaribNOG and the RIPE Routing Working Group. Daily listings are sent to bgp-st...@lists.apnic.net

RE: Over a decade of DDOS--any progress yet?

2010-12-10 Thread Drew Weaver
Nobody has really driven the point home that yes you can purchase a system from Arbor, RioRey, make your own mitigation system; what-have you, but you still have to pay for the transit to digest the attack, which is probably the main cost right now. -Drew -Original Message- From: Dobb

RE: Over a decade of DDOS--any progress yet?

2010-12-10 Thread Drew Weaver
I should've "qualified" my question by saying "What valid application which traverses the Internet and could be seen at the edge of a network actually uses UDP 80?" I can't imagine there is too much Cisco NAC client for macs carrying on over the Internet, although I have been wrong in the past.

RE: Over a decade of DDOS--any progress yet?

2010-12-10 Thread Drew Weaver
Ah, Honestly we can usually point to the exact cause of the attacks once we have time to triage the situation. Recently it has been stuff like: -Made someone in Asia angry. -Running a runescape server and made someone angry -Made someone on IRC angry It has been pretty rare to see an attack th

RE: Over a decade of DDOS--any progress yet?

2010-12-10 Thread Drew Weaver
Upstream providers generally have a hard time allowing you to write routes that you don't own into their table(s). thanks, -Drew -Original Message- From: Chris Boyd [mailto:cb...@gizmopartners.com] Sent: Wednesday, December 08, 2010 2:19 PM To: NANOG Subject: Re: Over a decade of DDOS-

Cogeco MX/SMTP administrator?

2010-12-10 Thread Chris Conn
Hello, Could a Cogeco MX/SMTP admin contact me off list please, we seem to be suffering from the same fate as these individuals; http://www.dslreports.com/forum/r24888256-Email-sent-to-AOL-is-timing-out Thanks, Chris Conn B2B2C.ca

Re: [Operational] Internet Police

2010-12-10 Thread Joel Jaeggli
On 12/10/10 9:06 AM, valdis.kletni...@vt.edu wrote: > On Fri, 10 Dec 2010 11:08:00 EST, Lamar Owen said: > > I believe the word you wanted was "hooliganism". And we have a legal system > that has about 3,000 years of experience in dealing with *that*, thank you > very > much. The code of hamurab

Re: Mastercard problems

2010-12-10 Thread andrew.wallace
"Just a day after Dutch police arrested a 16-year-old boy in connection with Wikileaks-related denial-of-service attacks, websites belonging to the Netherlands computer crime cops and prosecutors have been struck with a similar assault." http://nakedsecurity.sophos.com/2010/12/10/dutch-police-w

Re: [Operational] Internet Police

2010-12-10 Thread Jack Bates
On 12/10/2010 12:07 PM, Paul Graydon wrote: Unless you can get every company to sign up to an agreement it will never work. Even then you'll still find unscrupulous companies that are far more interested in revenue than reputation. There are a number of hosting companies I'm sure most network p

Re: Windows Encryption Software

2010-12-10 Thread Chad Dailey
http://xkcd.com/538/ On Fri, Dec 10, 2010 at 9:58 AM, William Herrin wrote: > On Fri, Dec 10, 2010 at 8:21 AM, Florian Weimer wrote: > > Software-based solutions have the advantage that they are somewhat > > more testable and reviewable. If it's all in the disk, you can't > > really be sure th

Re: [Operational] Internet Police

2010-12-10 Thread Paul Graydon
On 12/10/2010 07:59 AM, George Bonser wrote: Not to mention the risk of lost business for customers that just can't be bothered to fix broken machines. Paul That supposes that another ISP would accept their bot-infected machine. It would require some cooperation among the providers. And shoul

RE: [Operational] Internet Police

2010-12-10 Thread George Bonser
> Not to mention the risk of lost business for customers that just can't > be bothered to fix broken machines. > > Paul That supposes that another ISP would accept their bot-infected machine. It would require some cooperation among the providers. And should some ISP get the reputation of being

Re: [Operational] Internet Police

2010-12-10 Thread Paul Graydon
On 12/10/2010 07:45 AM, George Bonser wrote: From: William McCall Sent: Friday, December 10, 2010 8:45 AM To: Lamar Owen Cc: nanog@nanog.org Subject: Re: [Operational] Internet Police To the folks out there that presently work for an SP, if someone called you (or the relevant department) and g

Re: [Operational] Internet Police

2010-12-10 Thread Jack Bates
On 12/10/2010 11:45 AM, George Bonser wrote: If an ISP were to actively disconnect clients who were infected with a bot (intentionally infected or not), the end users themselves might be a little more vigilant at keeping their systems free of them.*But* any ISP doing that would also have to be p

RE: [Operational] Internet Police

2010-12-10 Thread George Bonser
> From: William McCall > Sent: Friday, December 10, 2010 8:45 AM > To: Lamar Owen > Cc: nanog@nanog.org > Subject: Re: [Operational] Internet Police > To the folks out there that presently work for an SP, if someone > called you (or the relevant department) and gave you a list of > end-user IPs

Re: [Operational] Internet Police

2010-12-10 Thread Valdis . Kletnieks
On Fri, 10 Dec 2010 12:14:20 EST, Lamar Owen said: > Identity theft can cause loss of life due to the stress of mopping up > afterwards. Oh, give me a *break*. This is well off the end of the slippery slope. My car got totaled in a rear-end collision a few weeks ago. If I get so stressed dealin

Re: [Operational] Internet Police

2010-12-10 Thread Jack Bates
On 12/10/2010 11:37 AM, Jack Bates wrote: assassination, or kidnapping, and (C) occur primarily within the At most, B ii applies, but if I'm not mistaken, A, B, and C must all occur by that statute (the giveaway is C, as it doesn't make sense as a single condition). err, or one could just

Re: [Operational] Internet Police

2010-12-10 Thread Jack Bates
On 12/10/2010 11:06 AM, valdis.kletni...@vt.edu wrote: The USA Patriot act says: "activities that (A) involve acts dangerous to human life that are a violation of the criminal laws of the U.S. or of any state, that (B) appear to be intended (i) to intimidate or coerce a civilian population, (ii

RE: BGP multihoming question.

2010-12-10 Thread George Bonser
> -Original Message- > From: Bret Clark > Sent: Friday, December 10, 2010 7:08 AM > To: nanog@nanog.org > Subject: Re: BGP multihoming question. > > On 12/10/2010 10:01 AM, Dylan Ebner wrote: > > 3. You cannot trust the second isp to advertise the SWIP block > correctly if they are not

Re: [Operational] Internet Police

2010-12-10 Thread Lamar Owen
On Friday, December 10, 2010 11:46:43 am JC Dill wrote: > On 10/12/10 8:08 AM, Lamar Owen wrote: > > In reality DoS threats/execution of those threats/ 'pwning' / website > > vandalism are all forms of terrorism. > No one was "terrorized" because they couldn't reach MasterCard or > because Mas

Re: [Operational] Internet Police

2010-12-10 Thread Valdis . Kletnieks
On Fri, 10 Dec 2010 11:08:00 EST, Lamar Owen said: > In reality DoS threats/execution of those threats/ 'pwning' / website > vandalism are all forms of terrorism. Let's not dilute the meaning of terrorism to the point where graffiti, cyber or otherwise, is classifed as terrorism. The USA Patriot

Re: [Operational] Internet Police

2010-12-10 Thread Michael Smith
On Fri, Dec 10, 2010 at 11:46 AM, JC Dill > We *really* don't need Homeland Security and TSA deciding that > cyber-vandalism falls into the realm of terrorism and thus comes under their > purview to "protect us against". Their security theater at the airport is > too much already, I can't begin

Re: [Operational] Internet Police

2010-12-10 Thread Jack Bates
On 12/10/2010 10:44 AM, William McCall wrote: To the folks out there that presently work for an SP, if someone called you (or the relevant department) and gave you a list of end-user IPs that were DDoSing this person/entity, how long would you take to verify and stop the end user's stream of cra

Re: [Operational] Internet Police

2010-12-10 Thread JC Dill
On 10/12/10 8:08 AM, Lamar Owen wrote: On Thursday, December 09, 2010 01:26:30 pm Dobbins, Roland wrote: On Dec 10, 2010, at 1:19 AM, Michael Smith wrote: "front lines of this "cyberwar"? Warfare isn't the correct metaphor. Espionage/covert action is the correct metaphor. In reality DoS thre

Re: [Operational] Internet Police

2010-12-10 Thread William McCall
On Fri, Dec 10, 2010 at 10:08 AM, Lamar Owen wrote: > On Thursday, December 09, 2010 01:26:30 pm Dobbins, Roland wrote: >> On Dec 10, 2010, at 1:19 AM, Michael Smith wrote: >> > "front lines of this "cyberwar"? >> Warfare isn't the correct metaphor. > >> Espionage/covert action is the correct meta

Re: [Operational] Internet Police

2010-12-10 Thread J. Oquendo
On 12/10/2010 11:08 AM, Lamar Owen wrote: > > In reality DoS threats/execution of those threats/ 'pwning' / website > vandalism are all forms of terrorism. An easily pronounceable version with a > 'net-' 'e-' or even 'cyber-' prefix. is difficult. I thought "e-*" was so yesterday, wouldn'

Re: [Operational] Internet Police

2010-12-10 Thread Lamar Owen
On Thursday, December 09, 2010 01:26:30 pm Dobbins, Roland wrote: > On Dec 10, 2010, at 1:19 AM, Michael Smith wrote: > > "front lines of this "cyberwar"? > Warfare isn't the correct metaphor. > Espionage/covert action is the correct metaphor. In reality DoS threats/execution of those threats/ '

Re: Windows Encryption Software

2010-12-10 Thread William Herrin
On Fri, Dec 10, 2010 at 8:21 AM, Florian Weimer wrote: > Software-based solutions have the advantage that they are somewhat > more testable and reviewable.  If it's all in the disk, you can't > really be sure that the data is encrypted with a static key, and the > passphrase is used for access con

Videotron contact

2010-12-10 Thread Jeff Wheeler
Could someone from Videotron contact me off-list? -- Jeff S Wheeler Sr Network Operator  /  Innovative Network Concepts

Re: BGP multihoming question.

2010-12-10 Thread Bret Clark
On 12/10/2010 10:01 AM, Dylan Ebner wrote: 3. You cannot trust the second isp to advertise the SWIP block correctly if they are not a tier 1. Even though they may advertise it for you to their upstream, they don't always have the appropriate procedures in place to get the LOAs to the upstream

Re: Windows Encryption Software

2010-12-10 Thread Curtis Maurand
On 12/10/2010 9:33 AM, Michael Holstein wrote: After some research, I find that recovery of EFS (available for Win 2000/2003/XP/Vista/7) encrypted files in the case of disaster can be problematic. It has to do with keys, file ownerships, etc., etc., etc. Plan for disaster and know how to recove

RE: BGP multihoming question.

2010-12-10 Thread Dylan Ebner
Our organization does exactly this. The requirements we have run into are: 1. The block needs to be at least a /24 and registered with SWIP 2. You will need LOAs from the owner of the block. This used to take months to get, now it seems the isps have streamlined this operation 3. You cannot trust

Re: Start accepting longer prefixes as IPv4 depletes?

2010-12-10 Thread Luigi Iannone
On Dec 10, 2010, at 12:30 , Robert Bonomi wrote: >> From nanog-bounces+bonomi=mail.r-bonomi@nanog.org Wed Dec 8 15:36:44 >> 2010 >> Date: Wed, 08 Dec 2010 15:34:47 -0600 >> From: Jack Bates >> To: David Conrad >> Subject: Re: Start accepting longer prefixes as IPv4 depletes? >> Cc: NANOG

Re: Windows Encryption Software

2010-12-10 Thread Michael Holstein
> After some research, I find that recovery of EFS (available for Win > 2000/2003/XP/Vista/7) encrypted files in the case of disaster can be > problematic. It has to do with keys, file ownerships, etc., etc., > etc. Plan for disaster and know how to recover before you encrypt > with EFS. This i

Re: [Operational] Internet Police

2010-12-10 Thread Jorge Amodio
On Thu, Dec 9, 2010 at 1:12 PM, Randy Bush wrote: >> And if I ever find the genius who came up with the "we are not the >> internet police" meme ... > > he died over a decade ago He also said "The Internet works because a lot of people cooperate to do things together" Remove the "together" and t

Re: Windows Encryption Software

2010-12-10 Thread Curtis Maurand
On 12/10/2010 8:21 AM, Florian Weimer wrote: I believe EFS is available in Windows XP and Windows 2003 Server, too. Software-based solutions have the advantage that they are somewhat more testable and reviewable. If it's all in the disk, you can't really be sure that the data is encrypted with

Re: Windows Encryption Software

2010-12-10 Thread Florian Weimer
* Brandon Kim: > I know windows has bitlocker, but I don't know if that is available > for Win2003? I believe EFS is available in Windows XP and Windows 2003 Server, too. Software-based solutions have the advantage that they are somewhat more testable and reviewable. If it's all in the disk, yo

Re: Windows Encryption Software

2010-12-10 Thread John Orthoefer
I've been using these and they work great as long as you are using BIOS boot, they don't work with out additional software, with the Mac EFI boot. Johno On Dec 9, 2010, at 20:20, William Herrin wrote: > On Thu, Dec 9, 2010 at 7:24 PM, Brandon Kim > wrote: >> I want to know if there's softwa

Re: Mastercard problems

2010-12-10 Thread Roland Perry
In article <476364.37472...@web59605.mail.ac4.yahoo.com>, andrew.wallace writes >>Dutch authorities have arrested a 16-year old "hacker" in connection >>with Mastercard. http://news.cnet.com/8301-31921_3-20025215-281.html It was a quick arrest wasn't it? Dutch authorities have a sligh

Re: Start accepting longer prefixes as IPv4 depletes?

2010-12-10 Thread Robert Bonomi
> From nanog-bounces+bonomi=mail.r-bonomi@nanog.org Wed Dec 8 15:36:44 > 2010 > Date: Wed, 08 Dec 2010 15:34:47 -0600 > From: Jack Bates > To: David Conrad > Subject: Re: Start accepting longer prefixes as IPv4 depletes? > Cc: NANOG list > > On 12/8/2010 3:12 PM, David Conrad wrote: > > C

Re: non operational question related to IP

2010-12-10 Thread Thomas Habets
On Mon, 22 Nov 2010, Greg Whynott wrote: osx-gwhynott:~ gwhynott$ ping 10.010.10.1 PING 10.010.10.1 (10.8.10.1): 56 data bytes You're entering land of weird, misdocumentation and bugs. http://seclists.org/nanog/2010/Feb/285 - typedef struct me_s { char name[] = { "Thomas Habets

Re: Windows Encryption Software

2010-12-10 Thread Jan-Philipp Warmers
Brandon Kim Tippte am 2010-12-09T19:24-0500: > > Hey guys: [snip] > > I want to know if there's software out there that will encrypt files on > win2k3, winxp, win7, so that if someone > decides to steal the computer and plug the harddrive into a USB external > case, they won't be able to read