Re: ICMPv6 "too-big" packets ignored (filtered ?) by Cloudflare farms

2019-03-04 Thread Mark Tinka
On 5/Mar/19 08:26, Mark Andrews wrote: > It does work as designed except when crap middleware is added. ECMP > should be using the flow label with IPv6. It has the advantage that > it works for non-0-offset fragments as well as 0-offset fragments and > also works for transports other than TCP

Re: ICMPv6 "too-big" packets ignored (filtered ?) by Cloudflare farms

2019-03-04 Thread Mark Andrews
> On 5 Mar 2019, at 5:18 pm, Mark Tinka wrote: > > > > On 5/Mar/19 00:25, Mark Andrews wrote: > >> >> Then Cloudflare should negotiate MSS’s that don’t generate PTB’s if >> they have installed broken ECMP devices. The simplest way to do that >> is to set the interface MTUs to 1280 on all

Re: ICMPv6 "too-big" packets ignored (filtered ?) by Cloudflare farms

2019-03-04 Thread Mark Tinka
On 5/Mar/19 00:25, Mark Andrews wrote: > > Then Cloudflare should negotiate MSS’s that don’t generate PTB’s if > they have installed broken ECMP devices. The simplest way to do that > is to set the interface MTUs to 1280 on all the servers. Why should > the rest of the world have to put up

Re: ICMPv6 "too-big" packets ignored (filtered ?) by Cloudflare farms

2019-03-04 Thread Mark Andrews
> On 5 Mar 2019, at 6:06 am, Saku Ytti wrote: > > Hey Jean, > >>I confess using IPv6 behind a 6in4 tunnel because the "Business-Class" >> service >>of the concerned operator doesn't handle IPv6 yet. >> >>as such, I realised that, as far as I can figure, ICMPv6 packet "too-big"

Re: a quick survey about LLDP and similar

2019-03-04 Thread Saku Ytti
Hey Thomas, > switches connected to end-user/customer gear: never ever. > switch to server interfaces: only to servers of teams you can trust. > temporarily enable to untrusted teams if you'd need to order remote > hands to lookup the exact cabling in case of problems. What are the problems in

Re: ICMPv6 "too-big" packets ignored (filtered ?) by Cloudflare farms

2019-03-04 Thread Saku Ytti
Hey Jean, > I confess using IPv6 behind a 6in4 tunnel because the "Business-Class" > service > of the concerned operator doesn't handle IPv6 yet. > > as such, I realised that, as far as I can figure, ICMPv6 packet "too-big" > (rfc 4443) > seem to be ignored or filtered at ~60%

Re: HULU NOC

2019-03-04 Thread Eddie Parra
John, I have used supportrequ...@hulu.com prior. Not sure if this is valid anymore. -Eddie > On Feb 28, 2019, at 12:33 PM, John Alcock wrote: > > Afternoon, > > I have searched the forums and have had no luck. > > We have just received a new block of ip's. None of my subscribers can

Re: Best practices for BGP Communities

2019-03-04 Thread John Kristoff
On Mon, 4 Mar 2019 01:42:02 + Joshua Miller wrote: > A while back I read somewhere that transit providers shouldn't delete > communities unless the communities have a specific impact to their > network, but my google-fu is failing me and I can't find any sources. Perhaps you're referring to

Re: A Deep Dive on the Recent Widespread DNS Hijacking

2019-03-04 Thread Bill Woodcock
> On Feb 26, 2019, at 1:34 PM, James Renken via NANOG wrote: > > On Feb 25, 2019, at 5:20 AM, Bill Woodcock wrote: >> We know that neither Comodo nor Let's Encrypt were DNSSEC validating before >> issuing certs. > > I’d like to clarify that Let’s Encrypt has always validated DNSSEC, dating

Best practices for BGP Communities

2019-03-04 Thread Joshua Miller
Hello everybody, A while back I read somewhere that transit providers shouldn't delete communities unless the communities have a specific impact to their network, but my google-fu is failing me and I can't find any sources. Is this still the case? Does anyone have a source for the practice of

Re: WIndows Updates Fail Via IPv6 - Update!

2019-03-04 Thread Jeroen Massar
On 2019-03-03 20:13, Mark Tinka wrote: > > > On 3/Mar/19 18:05, Jeroen Massar wrote: > >> IPv6 requires a minimum MTU of 1280. >> >> If you cannot transport it, then the transport (the tunnel in this case) >> needs to handle the fragmentation of packets of 1280 down to whatever does >> fit in

Re: WIndows Updates Fail Via IPv6 - Update!

2019-03-04 Thread Jeroen Massar
On 2019-03-03 11:31, Mark Tinka wrote: [..] > Across the 6-in-4 tunnel, the tested MTU is 1,232 for IPv6. IPv6 requires a minimum MTU of 1280. If you cannot transport it, then the transport (the tunnel in this case) needs to handle the fragmentation of packets of 1280 down to whatever does fit

Re: a quick survey about LLDP and similar

2019-03-04 Thread Thomas Mieslinger
A little more on the "it depends" switches connected to end-user/customer gear: never ever. switch to switch, switch to router interfaces: yes, to validate cabling and resolve problems as quickly as possible. switch to server interfaces: only to servers of teams you can trust. temporarily

HULU NOC

2019-03-04 Thread John Alcock
Afternoon, I have searched the forums and have had no luck. We have just received a new block of ip's. None of my subscribers can get to Hulu. I have started updating all the major GeoIP Databases. I figure I need to get Hulu to update their database. Of course calling regular support is

Re: a quick survey about LLDP and similar

2019-03-04 Thread Eddie Parra
+1 on it depends. IMO, I would prefer LLDP vs. a vendor proprietary discovery protocol. Where you intend to run it in your network is a major factor for risk. Also, you forgot to add LLDP-MED to #5 (but it might not be relevant to your services). -Eddie > On Feb 28, 2019, at 1:27 AM,

Issue with Geolocation in Virginia US

2019-03-04 Thread Raja Sekhar Gullapalli
Team, We are having issues in our Virginia US office & it shows geolocation in all browsers as Canada instead of US region when we access news.google.com in our PC. Our public ip is 129.46.232.65. This issue is being observed for more than 2 month. Can you help to whom we can contact to

ICMPv6 "too-big" packets ignored (filtered ?) by Cloudflare farms

2019-03-04 Thread Jean-Daniel Pauget
hello, I confess using IPv6 behind a 6in4 tunnel because the "Business-Class" service of the concerned operator doesn't handle IPv6 yet. as such, I realised that, as far as I can figure, ICMPv6 packet "too-big" (rfc 4443) seem to be ignored or filtered at ~60% of

AWS - amzn-noc-contact

2019-03-04 Thread Luiz Rosas
Hi, Can someone with amzn-noc contact me off list regarding AWS-ZOOMVIDEOCOMMUNICATIONS. Thx Luiz Luiz Rosas Sr. Network Engineer Race Communications Phone: +1 415-376-3327 luiz.ro...@race.com / www.race.com

Re: A Deep Dive on the Recent Widespread DNS Hijacking

2019-03-04 Thread James Renken via NANOG
On Feb 25, 2019, at 1:16 PM, Hank Nussbacher wrote: > Yes if an attacker pwned the DNS then game over no matter what. I go > under the assumption that the attacker was not able to take over the DNS > system but rather other things along the way, in which case CAA should > be of some

Re: A Deep Dive on the Recent Widespread DNS Hijacking

2019-03-04 Thread James Renken via NANOG
On Feb 25, 2019, at 5:20 AM, Bill Woodcock wrote: > We know that neither Comodo nor Let's Encrypt were DNSSEC validating before > issuing certs. I’d like to clarify that Let’s Encrypt has always validated DNSSEC, dating to before we issued our first publicly trusted certificate in September

Re: A Deep Dive on the Recent Widespread DNS Hijacking

2019-03-04 Thread Nico Cartron
> On 26 Feb 2019, at 21:58, Bill Woodcock wrote: > > > >> On Feb 26, 2019, at 8:12 AM, John Levine wrote: >> >> In article >> you >> write: >>> Swapping the DNS cabal for the CA cabal is not an improvement. Right? They >>> are really the same arbitraging rent-seekers, just different

Looking for a digitalocean contact with clue.

2019-03-04 Thread Marc Runkel via NANOG
Sorry for the noise, Can anyone in digitalocean contact me off-list. I'm having what I believe to be a networking issue with three new droplets that doesn't appear on older droplets out of the Frankfurt datacenter and I can't seem to break through level 1 support. Would be appreciated. Marc

RE: FYI - Major upgrade this weekend to www.arin.net and ARIN Online

2019-03-04 Thread Adrienne Esposito
https://teamarin.net/2019/02/27/getting-ready-for-the-big-reveal/ From: NANOG On Behalf Of Mitcheltree, Harold B Sent: Wednesday, February 27, 2019 11:59 AM To: John Curran ; nanog list Subject: Re: FYI - Major upgrade this weekend to www.arin.net and ARIN Online Link fails - ARTICLE NOT

Re: sendmail.cf

2019-03-04 Thread Alan Clegg
On 2/21/19 1:07 AM, Brielle Bruns wrote: > Can you believe its been _36_ years since the first version of sendmail? > > *holds up a glass of maker's mark* > > To the people who made the internet possible.  Cheers! To those that are bringing back memories, Cheers! ALAN AT NCSUVM,

Re: sendmail.cf

2019-03-04 Thread Joe Hamelin
I'm still running it on my private email server in my basement, on FreeBSD. Some things just work. -- Joe Hamelin, W7COM, Tulalip, WA, +1 (360) 474-7474 On Wed, Feb 20, 2019 at 10:08 PM Brielle Bruns wrote: > On 2/20/2019 4:25 PM, Suresh Ramasubramanian wrote: > > I've tried never to hand

Re: WIndows Updates Fail Via IPv6 - Update!

2019-03-04 Thread Saku Ytti
On Mon, Mar 4, 2019 at 10:02 AM Mark Tinka wrote: > > Can we make a short rule that says: For ICMP, *ALLOW* *ALL* unless you do > > have a very specific and motivated reason to block some types. > > I would even go as far as "allow all icmp from any to any" (and if possible > > as the first

Re: WIndows Updates Fail Via IPv6 - Update!

2019-03-04 Thread Mark Tinka
On 4/Mar/19 09:12, Radu-Adrian Feurdean wrote: > Can we make a short rule that says: For ICMP, *ALLOW* *ALL* unless you do > have a very specific and motivated reason to block some types. > I would even go as far as "allow all icmp from any to any" (and if possible > as the first firewall