Re: BGP Experiment

2019-01-09 Thread Töma Gavrichenkov
Is that a competition in sarcasm? Because I can do better than that! 10 Jan. 2019 г., 2:41 : > > Töma Gavrichenkov > > Sent: Wednesday, January 9, 2019 7:08 PM > > > > On Wed, Jan 9, 2019 at 10:03 PM Saku Ytti wrote: > > > Finding forwarding issues indeed is harder due to the limited access > >

RE: BGP Experiment

2019-01-09 Thread adamv0025
> Töma Gavrichenkov > Sent: Wednesday, January 9, 2019 7:08 PM > > On Wed, Jan 9, 2019 at 10:03 PM Saku Ytti wrote: > > Finding forwarding issues indeed is harder due to the limited access > > to devices, so bit of security through obscurity I guess. > > Or, rather, security by complexity. Today

Re: Centurylink/Level3 WDM?

2019-01-09 Thread James Breeden
followup: they fixed it. Accidental fiber roll on their interface facing us during maintenance. James W. Breeden Managing Partner [logo_transparent_background] Arenal Group: Arenal Consulting Group | Acilis Telecom | Pines Media PO Box 1063 | Smithville, TX 78957 Email: ja...@arenalgroup

Re: BGP Experiment

2019-01-09 Thread Töma Gavrichenkov
On Wed, Jan 9, 2019 at 10:33 PM Owen DeLong wrote: > Fair enough, but the frequency of vulnerability announcements > even in some of the best implementations is still more often than > I think my customers will tolerated reboots. Well, and when I think about it for the second time, I can't help p

Re: BGP Experiment

2019-01-09 Thread Töma Gavrichenkov
On Wed, Jan 9, 2019 at 10:33 PM Owen DeLong wrote: > At the end of the day, this is really about risk analysis > and it helps to put things into 1 of 4 risk quadrants > based on two axes… Axis 1 is the likelihood of the > vulnerability being exploited, while axis 2 is the > severity of the cost/co

Re: BGP Experiment

2019-01-09 Thread Owen DeLong
> On Jan 9, 2019, at 10:51 , Saku Ytti wrote: > > On Wed, 9 Jan 2019 at 20:45, Töma Gavrichenkov wrote: > >> Nope, this is a misunderstanding. One has to *check* for advisories at >> least once or twice a week and only update (and reboot is necessary) >> if there *is* a vulnerability. > > I

Re: BGP Experiment

2019-01-09 Thread Owen DeLong
> On Jan 9, 2019, at 10:37 , Töma Gavrichenkov wrote: > > On Wed, Jan 9, 2019 at 9:31 PM Owen DeLong wrote: >> So if I understand you correctly, your statement is that everyone >> should be (potentially) rebooting every core, backbone, edge, >> and other router at least once or twice a week…

Re: BGP Experiment

2019-01-09 Thread Töma Gavrichenkov
On Wed, Jan 9, 2019 at 10:03 PM Saku Ytti wrote: > Finding forwarding issues indeed is harder due to the limited access > to devices, so bit of security through obscurity I guess. Or, rather, security by complexity. Today's network infrastructure is complex enough for people to dive into it, look

Re: BGP Experiment

2019-01-09 Thread Saku Ytti
Hey, > firmware which only runs on certain expensive devices. My point is > that e.g. FRR is an open source software which is designed to run on > the same Intel-based systems as the one which probably powers your > laptop. Most vendors have virtual image for your laptop, all of the modern route

Re: BGP Experiment

2019-01-09 Thread Töma Gavrichenkov
On Wed, Jan 9, 2019 at 9:51 PM Saku Ytti wrote: > I think this contains some assumptions > > 1. discovering security issues in network devices is expensive (and > thus only those you glean from vendor notices realistically exist) > 2. downside of being affected by network device security issue is

Re: BGP Experiment

2019-01-09 Thread Saku Ytti
On Wed, 9 Jan 2019 at 20:45, Töma Gavrichenkov wrote: > Nope, this is a misunderstanding. One has to *check* for advisories at > least once or twice a week and only update (and reboot is necessary) > if there *is* a vulnerability. I think this contains some assumptions 1. discovering security i

Re: BGP Experiment

2019-01-09 Thread Töma Gavrichenkov
On Wed, Jan 9, 2019 at 9:32 PM Saku Ytti wrote: > Those are scheduled, they have to meet some criteria to be pushed on > scheduled lot. There are also out of cycle SIRTs. And yes, vendors are > delaying them, because customers don't want to upgrade often, because > customer's customers don't want

Centurylink/Level3 WDM?

2019-01-09 Thread James Breeden
Anyone else having issues with Centurylink IP (Legacy Level3/3356) in/around Houston, or WDM issues between Houston and San Antonio? James W. Breeden Managing Partner [logo_transparent_background] Arenal Group: Arenal Consulting Group | Acilis Telecom | Pines Media PO Box 1063 | Smithvi

Re: BGP Experiment

2019-01-09 Thread Töma Gavrichenkov
On Wed, Jan 9, 2019 at 9:31 PM Owen DeLong wrote: > So if I understand you correctly, your statement is that everyone > should be (potentially) rebooting every core, backbone, edge, > and other router at least once or twice a week… Nope, this is a misunderstanding. One has to *check* for advisori

Re: BGP Experiment

2019-01-09 Thread Saku Ytti
On Wed, 9 Jan 2019 at 20:24, Töma Gavrichenkov wrote: > So, network device vendors releasing security advisories twice a year > isn't a big part of the explanation? Those are scheduled, they have to meet some criteria to be pushed on scheduled lot. There are also out of cycle SIRTs. And yes, ven

Re: BGP Experiment

2019-01-09 Thread Owen DeLong
> On Jan 9, 2019, at 09:51 , Töma Gavrichenkov wrote: > > 9 Jan. 2019 г., 9:56 Randy Bush mailto:ra...@psg.com>>: > > the question is how soon the frr > > users out on the internet will upgrade. > > there are a lot of studies on > > this. it sure isn't on the order of a week > > Which is, as

RE: DNS Hijacking? - FiOS Northeast

2019-01-09 Thread Chris Kimball
FWIW Looks to be OpenDNS IP https://support.opendns.com/hc/en-us/articles/227986927-What-are-the-Cisco-Umbrella-Block-Page-IP-Addresses- It’s being abused… https://www.abuseipdb.com/check/146.112.61.106 From: NANOG On Behalf Of Blake Mckeeby Sent: Tuesday, January 8, 2019 3:43 PM To: nanog@

RE: DNS Hijacking? - FiOS Northeast

2019-01-09 Thread Phil Lavin
> We are seeing DNS requests for A and to 8.8.8.8 come back with erroneous > replies resolving to 146.112.61.106 when sent via FiOS circuits in the > northeast. Anyone else seeing issues with DNS on FiOS in Northeast? Issue > started around 12:25 AM ET this morning and seems to be affecting

Re: BGP Experiment

2019-01-09 Thread Töma Gavrichenkov
On Wed, Jan 9, 2019 at 9:07 PM Saku Ytti wrote: > Not disputing bug or bog house as ideal location for said policy, just > want to explain my perspective why it is so. So, network device vendors releasing security advisories twice a year isn't a big part of the explanation? > Hitless upgrades ar

Re: Report on Legal Barriers to RPKI Adoption

2019-01-09 Thread Ben Maddison via NANOG
Hi all, Thanks Christopher and co-authors for this document. The issues that you have highlighted are critical to ensuring that SOV and other future applications of the RPKI can be deployed in production without becoming serious latent risk to the Internet community and RIR system. As a case i

DNS Hijacking? - FiOS Northeast

2019-01-09 Thread Blake Mckeeby
We are seeing DNS requests for A and to 8.8.8.8 come back with erroneous replies resolving to 146.112.61.106 when sent via FiOS circuits in the northeast. Anyone else seeing issues with DNS on FiOS in Northeast? Issue started around 12:25 AM ET this morning and seems to be affecting customers

Spoofer Report for NANOG for Dec 2018

2019-01-09 Thread CAIDA Spoofer Project
In response to feedback from operational security communities, CAIDA's source address validation measurement project (https://spoofer.caida.org) is automatically generating monthly reports of ASes originating prefixes in BGP for systems from which we received packets with a spoofed source address.

Re: BGP Experiment

2019-01-09 Thread Saku Ytti
On Wed, 9 Jan 2019 at 19:54, Töma Gavrichenkov wrote: > Which is, as usual, a pity, because, generally, synchronizing a piece of > software with upstream security updates less frequently than once to twice in > a week belongs in Jurassic Park today; and doing it hardly more frequently > than o

Re: BGP Experiment

2019-01-09 Thread Töma Gavrichenkov
9 Jan. 2019 г., 9:56 Randy Bush : > the question is how soon the frr > users out on the internet will upgrade. > there are a lot of studies on > this. it sure isn't on the order of a week Which is, as usual, a pity, because, generally, synchronizing a piece of software with upstream security upda

Re: BGP Experiment

2019-01-09 Thread Owen DeLong
> On Jan 8, 2019, at 09:06 , valdis.kletni...@vt.edu wrote: > > On Tue, 08 Jan 2019 17:48:46 +0100, niels=na...@bakker.net said: > >> After seeing this initial result I'm wondering why the researchers >> couldn't set up their own sandbox first before breaking code on the >> internet. I beli