Re: Programmers can't get IPv6 thus that is why they do not have IPv6 in their applications....

2012-11-27 Thread Dobbins, Roland
On Nov 28, 2012, at 12:32 PM, Nigel Stepp wrote: So there's one data point with the promise of others. You are atypical in comparison the the legions of ordinary developers within enterprise organizations, in terms of your skillset, your breadth of perspective, and your ability to effectuate

Re: Big day for IPv6 - 1% native penetration

2012-11-26 Thread Dobbins, Roland
On Nov 26, 2012, at 5:57 PM, Randy Bush wrote: almost all ip traffic is unintentional. Sure. But my point is the notion that observed IPv6 traffic volumes are due to deliberate migration is not correct. when the average consumer (real) broadband connection becomes v6 capable, about 40%

Re: Big day for IPv6 - 1% native penetration

2012-11-26 Thread Dobbins, Roland
On Nov 26, 2012, at 7:10 PM, Arturo Servin wrote: Users do not care and they will never have a deliberate migration. I understand this. However, the way that IPv6 migration is discussed in most contexts seems to be predicated upon the notion that there is some industry imperative to

Re: Big day for IPv6 - 1% native penetration

2012-11-26 Thread Dobbins, Roland
On Nov 26, 2012, at 8:33 PM, Mikael Abrahamsson wrote: Why is that a significant question? It is significant because it provides some rough measure of the relative *importance* of IPv6 connectivity to the users and to the content/app/services networks. We are not yet at the point where

Re: Big day for IPv6 - 1% native penetration

2012-11-26 Thread Dobbins, Roland
On Nov 26, 2012, at 10:36 PM, Cameron Byrne wrote: Ipv6 is not important for users, it is important for network operators who want to sustain their business. I agree with the first part; not sure I agree with the second part. Nope. Nobody will leave money on the table by alienating users.

Re: Big day for IPv6 - 1% native penetration

2012-11-26 Thread Dobbins, Roland
On Nov 27, 2012, at 3:37 AM, Owen DeLong wrote: If you don't think that the need to sustain the growth in the number of devices attached to the network (never mind the number of things causing that rate to accelerate[1]) makes IPv6 inevitable at this point, you really aren't paying

Re: Big day for IPv6 - 1% native penetration

2012-11-26 Thread Dobbins, Roland
On Nov 27, 2012, at 12:15 AM, Cameron Byrne wrote: NAT is bad. I agree wholeheartedly with this sentiment. I'm unsure whether or not this is the prevalent view amongst those who control the pursestrings within network operators, however.

Re: Big day for IPv6 - 1% native penetration

2012-11-26 Thread Dobbins, Roland
On Nov 27, 2012, at 3:37 AM, Owen DeLong wrote: CGN does not scale and cannot scale. At best, it's a hack that might allow us to cope with a few years of transition while there are still devices in homes that are IPv4-only, but it certainly doesn't reduce or remove the imperative. I agree

Re: Big day for IPv6 - 1% native penetration

2012-11-26 Thread Dobbins, Roland
On Nov 27, 2012, at 12:38 AM, Tony Hain wrote: Unfortunately most people that actually deploy and support applications can't make the math come out right when the access providers don't provide a path to 99% of the paying customers, then do just about everything they can to hobble bypass

Re: Big day for IPv6 - 1% native penetration

2012-11-26 Thread Dobbins, Roland
On Nov 27, 2012, at 6:56 AM, Michael Thomas wrote: Er, uh, huh? v6 has been available forever on the usual suspect host operating systems, and most server side apps don't need to do much to support lighting v6 support up that I can think of. Where are the *deployments*, though? And

Re: Big day for IPv6 - 1% native penetration

2012-11-26 Thread Dobbins, Roland
On Nov 27, 2012, at 7:12 AM, Carsten Bormann wrote: We have seen your kind of thinking. You totally mischaracterize my 'kind of thinking'. My entire career arc has been that of a technological evangelist. Yes, I think there's a lot that's wrong with IPv6, but it appears that it's the only

Re: Big day for IPv6 - 1% native penetration

2012-11-26 Thread Dobbins, Roland
On Nov 27, 2012, at 7:35 AM, Michael Thomas wrote: Not on the server side that I can see. It's a network problem first and foremost, and starts by having the excuse that they can't get v6 upstream from their ISP's. It's hugely problematic to accomplish internally, never mind for external

Re: Big day for IPv6 - 1% native penetration

2012-11-26 Thread Dobbins, Roland
On Nov 27, 2012, at 7:27 AM, Cutler James R wrote: Have you looked at the current Apple software? It pretty much just works on IPv6. Yes, but it doesn't do or enable anything via IPv6 that it doesn't do or enable via IPv4. This also automatically brings along IPv6 capabilities.

Re: Big day for IPv6 - 1% native penetration

2012-11-26 Thread Dobbins, Roland
On Nov 27, 2012, at 7:53 AM, Michael Thomas wrote: If they don't commit, the game of chicken continues. Right - so, what new capabilities/economies of scale/essential conveniences are made possible by IPv6 but not IPv4, pour encourager les autres? This is not a rhetorical question. I

Re: Big day for IPv6 - 1% native penetration

2012-11-26 Thread Dobbins, Roland
On Nov 27, 2012, at 8:15 AM, Owen DeLong wrote: Interesting. All the IPv6 capable carriers I talk to are only gatewaying/proxying to IPv4 for things unreachable via IPv6. Which is pretty much everything on the Internet. If you've got an IPv6 capable cell phone on an IPv6 capable mobile

Re: Big day for IPv6 - 1% native penetration

2012-11-26 Thread Dobbins, Roland
On Nov 27, 2012, at 8:07 AM, Cutler James R wrote: Those content/services/applications will only be reachable via IPv6 because that is all that can be deployed without truly horrendous and costly mismanagement of IPv4 address space. Our views differ in that it is my belief that said truly

Re: Big day for IPv6 - 1% native penetration

2012-11-26 Thread Dobbins, Roland
On Nov 27, 2012, at 11:57 AM, Mikael Abrahamsson wrote: The problem is that CGN and NAT444 works with todays devices, whereas IPv6 does not (thinking mobile devices and residential CPEs). Yet everyone (except you) insist that it does work with everything, and that all this CGN and 444 stuff

Re: Big day for IPv6 - 1% native penetration

2012-11-24 Thread Dobbins, Roland
On Nov 25, 2012, at 10:09 AM, joel jaeggli wrote: from goeff huston's data they have more v6 at home. And not purposely, either - because it's enabled by default on recent client OSes. My guess is that a non-trivial fraction of observed IPv6 traffic today is unintentional.

Re: Overview on Defending DDoS attack

2012-11-07 Thread Dobbins, Roland
On Nov 7, 2012, at 5:56 PM, Mohamed Al-fateh wrote: Could you please share them with us or direct us to other good resources for that https://www.box.com/s/4h2l6f4m8is6jnwk28cg --- Roland Dobbins rdobb...@arbor.net //

Re: p2p addresses for point-to-point connections with customers

2012-11-06 Thread Dobbins, Roland
On Nov 6, 2012, at 6:32 PM, Tassos Chatzithomaoglou wrote: Do you consider them infrastructure addresses or customer addresses? They're infrastructure addresses. Do you put them in your IGP or in BGP? You should treat them as you do your other infrastructure addresses (i.e., if you're

Re: p2p addresses for point-to-point connections with customers

2012-11-06 Thread Dobbins, Roland
On Nov 6, 2012, at 7:31 PM, Tassos Chatzithomaoglou wrote: Only specific types of icmp messages? That, plus the routing session (if any) with your customer, plus anything else that's situationally-specific (GRE tunnel termination, etc.).

Re: www.ipv6.facebook.com not loading)

2012-10-25 Thread Dobbins, Roland
On Oct 25, 2012, at 8:40 PM, Scott Howard wrote: Same from here. dig www.facebook.com. ; DiG 9.7.3-P3 www.facebook.com. ;; global options: +cmd ;; Got answer: ;; -HEADER- opcode: QUERY, status: NOERROR, id: 41039 ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 2, ADDITIONAL: 2

Re: www.ipv6.facebook.com not loading)

2012-10-25 Thread Dobbins, Roland
On Oct 25, 2012, at 8:50 PM, Jeroen Massar wrote: www.facebook.com. 120 IN 2a03:2880:2050:1f01:face:b00c:: I found this to be rather amusing. ; Note that is 2110 != 2050. Right. But now indeed to the c10r one... thus there are at least a couple of clusters it seems

Re: IP tunnel MTU

2012-10-22 Thread Dobbins, Roland
On Oct 23, 2012, at 5:24 AM, Templin, Fred L wrote: Since tunnels always reduce the effective MTU seen by data packets due to the encapsulation overhead, the only two ways to accommodate the tunnel MTU is either through the use of path MTU discovery or through fragmentation and reassembly.

Re: Attacking on Source Port 0 (ZERO)

2012-10-15 Thread Dobbins, Roland
On Oct 16, 2012, at 8:57 AM, Ryan Malayter wrote: 10G+ forwarding with minimum packet sizes is possible on a single core using optimized kernels (see Intel DPDK and PF_RING DNA). Of course it isn't. You can *approach* 10gb/sec with multiple cores and minimum packet sizes, granted. You

Re: Attacking on Source Port 0 (ZERO)

2012-10-14 Thread Dobbins, Roland
On Oct 14, 2012, at 4:48 PM, Shahab Vahabzadeh wrote: Does any body know what kind of attack can be come to port 0? If it's protocol 0, instead of port 0, it's likely a packet-flooding DDoS attack. If it's port 0, you may be incorrectly blocking non-initial fragments. Alternately, it could

Re: Attacking on Source Port 0 (ZERO)

2012-10-14 Thread Dobbins, Roland
On Oct 15, 2012, at 2:59 AM, Shahab Vahabzadeh wrote: I think it act like a warm or some attacks which cause high CPU load in some IOS. i.e., a DDoS attack. You should configure iACLs at your edge so that random sources on the Internet can't packet your routers. Hopefully, you have

Re: Attacking on Source Port 0 (ZERO)

2012-10-14 Thread Dobbins, Roland
On Oct 15, 2012, at 3:57 AM, Nick Hilliard wrote: If you haven't already configured CoPP on your BRASs, you might want to look at deploying it. CoPP is pretty much a wash on software-based boxes; it only really helps on hardware-based boxes. And iACLs is easier/a bigger win, anyways

Re: Dropping IPv6 Fragments

2012-10-04 Thread Dobbins, Roland
On Oct 4, 2012, at 9:26 PM, Sander Steffann wrote: The closer you get to the edge the more common it might become... iACLs should be implemented at the network edge to drop all IPv4 and IPv6 traffic - including non-initial fragments - directed towards point-to-point links, loopbacks, and

Re: Dropping IPv6 Fragments

2012-10-04 Thread Dobbins, Roland
On Oct 4, 2012, at 9:58 PM, joel jaeggli wrote: Likewise with the acl I have the property that the initial packet has all the info in it while the fragment does not. For iACLs, just filter non-initial fragments directed to infrastructure IPs. Cisco Juniper ACLs have ACL matching criteria

Re: Real world sflow vs netflow?

2012-09-23 Thread Dobbins, Roland
On Sep 23, 2012, at 7:55 PM, Danny McPherson wrote: If the *flow generation process is not performed on the router (or otherwise conveyed by some metadata outside of raw [sampled] packet headers) then you lose visibility to ingress and egress ifIndex (interface) information -- information

Re: Real world sflow vs netflow?

2012-09-23 Thread Dobbins, Roland
On Sep 23, 2012, at 11:23 PM, Peter Phaal wrote: The difference between packet oriented or flow oriented export is an implementation detail if your only requirement is to obtain layer IP flow records, but becomes significant if you want to create customized flow records or create packet

Re: Real world sflow vs netflow?

2012-09-22 Thread Dobbins, Roland
On Sep 23, 2012, at 1:51 AM, Peter Phaal wrote: Here are some comments and links to additional information that address each of your concerns: You have misinterpreted what I said. I was saying that flow telemetry of any variety must be exported from edge devices, which in most cases are

Re: Real world sflow vs netflow?

2012-09-21 Thread Dobbins, Roland
On Sep 22, 2012, at 12:40 AM, Peter Phaal wrote: However, moving the flow generation out of the router gives a lot of flexibility. Actually, moving it out of the router creates huge problems and destroys a lot of the value of the flow telemetry - it nullifies your ability to traceback

Re: Return two locations or low TTL [was: DNS caches that support partitioning ?]

2012-08-20 Thread Dobbins, Roland
On Aug 20, 2012, at 5:24 PM, Patrick W. Gilmore wrote: But I do not think returning multiple A records for multiple datacenters is as useful as lowering the TTL. Some folks do this via various GSLB mechanisms which selectively respond with different records based on the assumed relative

Re: Return two locations or low TTL [was: DNS caches that support partitioning ?]

2012-08-20 Thread Dobbins, Roland
On Aug 20, 2012, at 5:56 PM, Patrick W. Gilmore wrote: My question above is asking Mark how you guarantee the user/application selects the A record closest to them and only use the other A record when the closer one is unavailable. I understand - my point was that folks using a GSLB-type

Re: DDoS using port 0 and 53 (DNS)

2012-07-25 Thread Dobbins, Roland
On Jul 25, 2012, at 12:08 PM, Jimmy Hess wrote: The packet is a non-initial fragment if and only if, the fragmentation offset is not set to zero. Port number's not a field you look at for that. I understand all that, thanks. NetFlow reports source/dest port 0 for non-initial fragments.

Re: DDoS using port 0 and 53 (DNS)

2012-07-25 Thread Dobbins, Roland
On Jul 25, 2012, at 1:13 PM, sth...@nethelp.no wrote: No, routers normally do *not* reassemble fragments. Absolutely correct. I missed this in the rest of the reply, good catch! --- Roland Dobbins rdobb...@arbor.net //

Re: DDoS using port 0 and 53 (DNS)

2012-07-25 Thread Dobbins, Roland
On Jul 25, 2012, at 9:52 PM, Joel Maslak wrote: In addition to the fragments, these packets might also be non-TCP/UDP (ICMP, GRE, 6to4 and other IP-IP, etc). NetFlow will report the correct protocol number. --- Roland

Re: DDoS using port 0 and 53 (DNS)

2012-07-25 Thread Dobbins, Roland
On Jul 25, 2012, at 10:27 PM, Frank Bulk wrote: Can netflow _properly_ capture whether a packet is a fragment or not? No. If not, does IPFIX address this? Yes. But this is all a distraction. We are now down in the weeds. Your customers were victims of a DNS reflection/amplification

Re: DDoS using port 0 and 53 (DNS)

2012-07-25 Thread Dobbins, Roland
On Jul 26, 2012, at 5:13 AM, Drew Weaver wrote: Another nice emerging tool [I say emerging because it's been around forever but nobody implements it] to deal with this is Flowspec, using flowspec you can instruct your Upstream to block traffic with much more granular characteristics.

Re: Another LTE network turns up as IPv4-only squat space + NAT

2012-07-25 Thread Dobbins, Roland
On Jul 19, 2012, at 3:50 PM, Måns Nilsson wrote: No, reusing somebody's prefix is A Very Bad Idea. Concur 100%. There is no security value to doing this whatsoever - quite the opposite, given the possible negative consequences to reachability and, thus, availability.

Re: ZOMG: IPv6 a plot to stymie FBI !!!11!ONE!

2012-06-17 Thread Dobbins, Roland
On Jun 18, 2012, at 10:50 AM, Jonathon Exley wrote: APNIC has a web based whois form that is pretty easy to drive. Yes, but data-entry tools which are viewed as secondary to the task at hand - i.e., address allocations - and which require interactive human participation to perform

Re: ZOMG: IPv6 a plot to stymie FBI !!!11!ONE!

2012-06-17 Thread Dobbins, Roland
On Jun 18, 2012, at 11:23 AM, Mark Andrews wrote: APNIC has B2B over email. It should be possible to totally automate updating APNIC. That's a much better option than the Web form. --- Roland Dobbins rdobb...@arbor.net //

Re: Whither Cometh BCP38?

2012-06-11 Thread Dobbins, Roland
On Jun 11, 2012, at 10:13 PM, Jay Ashworth wrote: Or are spoofed-source-address attacks not, as Vix suggests, significant and trending upwards? They're enjoying a renaissance because of attackers leveraging spoofing in order to enable DNS, SNMP, and ntp reflection/amplification DDoS

Re: Whither Cometh BCP38?

2012-06-11 Thread Dobbins, Roland
On Jun 11, 2012, at 11:09 PM, Jay Ashworth wrote: So, are the knobs actually on? (I'm guessing clearly, not) In many cases, no, or we wouldn't be seeing many spoofed packets, would we? ; --- Roland Dobbins

Re: Open DNS Resolver reflection attack Mitigation

2012-06-08 Thread Dobbins, Roland
On Jun 9, 2012, at 2:09 AM, Joe Maimon wrote: Google and Level3 manage to run open resolvers, why cant I? Because they have probably have opsec resources you don't. If you can't defend it/keep it from being abused, don't do it. ;

Re: ipv6 book recommendations?

2012-06-05 Thread Dobbins, Roland
On Jun 5, 2012, at 9:29 PM, David Hubbard wrote: security practices http://www.ciscopress.com/bookstore/product.asp?isbn=1587055945 http://www.ciscopress.com/bookstore/product.asp?isbn=1587053365 --- Roland Dobbins

Re: rpki vs. secure dns?

2012-05-01 Thread Dobbins, Roland
On Apr 28, 2012, at 5:05 AM, Paul Vixie wrote: is anybody taking it seriously? It's hard to take seriously any proposal which is predicated upon recursive dependencies. --- Roland Dobbins rdobb...@arbor.net //

Re: rpki vs. secure dns?

2012-05-01 Thread Dobbins, Roland
On Apr 28, 2012, at 5:17 PM, Saku Ytti wrote: People might scared to rely on DNS on accepting routes, but is this really an issue? Yes, recursive dependencies are an issue. I'm really surprised that folks are even seriously considering something like this, but OTOH, this sort of thing

Re: rpki vs. secure dns?

2012-05-01 Thread Dobbins, Roland
On May 1, 2012, at 8:18 PM, David Conrad wrote: Do you mean the need to be able to use rsync to fetch the data to enable you to use rsync? A lot more than just rsync is necessary in order to allow rsync transactions to work. But, you know this already. ; Or the need to be able to use

Re: rpki vs. secure dns?

2012-05-01 Thread Dobbins, Roland
On May 1, 2012, at 10:31 PM, John Kristoff wrote: As Radia says in her book, we're probably stuck with BGP forever, but I frequently wonder if she is right in suggesting we could have done better by having a link state protocol instead. At the time, link-state protocols weren't practical

Re: rpki vs. secure dns?

2012-05-01 Thread Dobbins, Roland
On May 2, 2012, at 12:46 AM, Russ White wrote: There are situations where it won't work (mostly thinking high mobility environments, or complete system failures), but these don't seem to be big stoppers, to me Within the next 10 years, everything/everywhere is going to become a

Re: Concern about gTLD servers in India

2012-03-10 Thread Dobbins, Roland
On Mar 10, 2012, at 7:02 PM, Robert E. Seastrom wrote: there are four gtlds Aren't there actually seven? --- Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com Luck is the residue of opportunity and

Re: do not filter your customers

2012-02-25 Thread Dobbins, Roland
On Feb 26, 2012, at 5:39 AM, Dongting Yu wrote: you drop updates, which would lead to inconsistent views on the two sides of the session. Views are inconsistent by design - there is no state synchronization. All a sender knows is that he sent the updates, not what (if anything) was done

Re: do not filter your customers

2012-02-25 Thread Dobbins, Roland
On Feb 26, 2012, at 7:55 AM, Christopher Morrow wrote: I'm not sure... here's a few ideas though to toss on the fire of thought: Concur with this general approach, which is a longer-term effort - but it would be nice if there was some discrete, limited-scope knob which could conceivably be

Re: do not filter your customers

2012-02-24 Thread Dobbins, Roland
On Feb 25, 2012, at 7:49 AM, Randy Bush wrote: i would love to see progress on the route leak problem. i do not confuddle it with security. Availability is a key aspect of security - the most important one, in many cases/contexts. The availability of the control plane itself (i.e., being

Re: do not filter your customers

2012-02-24 Thread Dobbins, Roland
On Feb 25, 2012, at 8:59 AM, Christopher Morrow wrote: max-prefix already exists... sometimes it works, sometimes it's a burden. Some sort of throttle - i.e., allow only X number of routing updates within Y number of [seconds? milliseconds? BGP packets?] would be more useful, IMHO. If the

Re: do not filter your customers

2012-02-24 Thread Dobbins, Roland
On Feb 25, 2012, at 9:39 AM, Christopher Morrow wrote: it seems to me that most of the options discussed for this are .. bad, in one dimension or another :( Concur. X prefixes/packets in Y seconds/milliseconds doesn't keep the peer from blowing up your RIB, How so? If the configured

Re: do not filter your customers

2012-02-24 Thread Dobbins, Roland
On Feb 25, 2012, at 2:15 PM, Christopher Morrow wrote: if the rate is 1/ms ... I can fill the rib in 2million ms ... ~30mins? Rate alone isn't the problem :( size matters. Sure; the idea is that some sort of throttling, coupled with overall size limitations, might be useful. People

Re: do not filter your customers

2012-02-23 Thread Dobbins, Roland
On Feb 24, 2012, at 9:00 AM, Danny McPherson wrote: Prefix limits are rather binary and indiscriminate, indeed. AS-PATH filters and max-length filters, OTOH, are not. Also, it's important that network operators understand that flap-dampening has been iatrogenic for many years, now.

Re: UDP port 80 DDoS attack

2012-02-08 Thread Dobbins, Roland
On Feb 8, 2012, at 2:56 PM, bas wrote: The big drawback with S/RTBH is that it is a DoS method in itself. I'm not an advocate of *automated* S/RTBH, and I am an advocate of whitelisting various well-known 'golden networks/IPs' via prefix-lists in order to avoid this issue in part; also, note

Re: UDP port 80 DDoS attack

2012-02-08 Thread Dobbins, Roland
On Feb 8, 2012, at 8:07 PM, bas wrote: As far as I see it S/RTBH is in no way a solution against smart attackers, of course it does help against all the kiddie attacks out there. Once again, I've used S/RTBH myself and helped others use it many, many times, including to defend against

2011 Worldwide Infrastructure Report available for download.

2012-02-07 Thread Dobbins, Roland
[Apologies if you've already seen this announcement in other forums.] We've just posted the 2011 Worldwide Infrastructure Security Report for download at this URL: http://www.arbornetworks.com/report This year's WWISR contains responses and data from 114 network operators in all major

Re: report botnet CC?

2012-02-07 Thread Dobbins, Roland
On Feb 8, 2012, at 10:20 AM, Ryan Rawdon wrote: Assuming it is not a futile/wasted effort, where is the current best place/resource to report an active botnet CC to? Probably the abuse contact for the network in question, if contact info is available.

Re: DOS ATTACK ON BGP , LPTS ??

2012-02-06 Thread Dobbins, Roland
On Feb 7, 2012, at 1:37 PM, Peter Ehiwe wrote: What is the best way to mitigate DOS attack against the bgp process of a router , iACLs and CoPP: https://files.me.com/roland.dobbins/prguob --- Roland Dobbins

Re: UDP port 80 DDoS attack

2012-02-05 Thread Dobbins, Roland
On Feb 6, 2012, at 7:21 AM, Keegan Holley wrote: There aren't very many ways to combat DDOS. Start with the various infrastructure/host/service BCPs, and S/RTBH, as outlined in this preso: https://files.me.com/roland.dobbins/dweagy

Re: UDP port 80 DDoS attack

2012-02-05 Thread Dobbins, Roland
On Feb 6, 2012, at 8:10 AM, Keegan Holley wrote: An entire power point just to recommend ACL's, uRPF, CPP, DHCP snooping, and RTBH? Actually, no, that isn't the focus of the preso. The first four will not work against a DDOS attack This is incorrect - suggest you read the preso. and the

Re: UDP port 80 DDoS attack

2012-02-05 Thread Dobbins, Roland
On Feb 6, 2012, at 8:20 AM, Dobbins, Roland wrote: Actually, no, that isn't the focus of the preso. More info here: https://files.me.com/roland.dobbins/l53gjr --- Roland Dobbins rdobb...@arbor.net // http

Re: UDP port 80 DDoS attack

2012-02-05 Thread Dobbins, Roland
On Feb 6, 2012, at 8:37 AM, Keegan Holley wrote: Source RTBH often falls victim to rapidly changing or spoofed source IPs. S/RTBH can be rapidly shifted in order to deal with changing purported source IPs, and it isn't limited to /32s. It's widely supported on Cisco and Juniper gear

Re: UDP port 80 DDoS attack

2012-02-05 Thread Dobbins, Roland
On Feb 6, 2012, at 8:50 AM, Keegan Holley wrote: Yes but assuming everything discussed at a conference is instantly adopted by the entire industry gives one false hope no? I'm certainly not making that assumption - hence the presos. ;

Re: DNS Attacks

2012-01-18 Thread Dobbins, Roland
On Jan 18, 2012, at 2:45 AM, Leigh Porter wrote: The firewall is significant because the attacks killed the firewall as it is rather under specified (not my idea..). DNS servers (nor any other kind of server, for that matter) should never be placed behind stateful firewalls - the largest

Re: L3 consequences of WLAN offload in cellular networks (was - endless DHCPv6 thread)

2011-12-30 Thread Dobbins, Roland
On Dec 30, 2011, at 9:34 PM, Cameron Byrne wrote: The state of the industry is the support of nomadic mobility from cellular to / from Wi-Fi , there is nearly no support of mobile IP that I have seen. Concur. This .pdf preso may also be of interest:

Re: overview on defending DDoS attack

2011-12-27 Thread Dobbins, Roland
On Dec 27, 2011, at 6:47 PM, Joe wrote: is there any overview on current technology or method dealing with DDoS attack ? https://files.me.com/roland.dobbins/prguob https://files.me.com/roland.dobbins/k4zw3x https://files.me.com/roland.dobbins/dweagy

Re: BGP and Firewalls...

2011-12-07 Thread Dobbins, Roland
On Dec 8, 2011, at 1:04 AM, Gregory Croft wrote: Just investigating to see if there is a reason I shouldn't use a firewall at the edge versus a dedicated router You should only use a dedicate router if you want your network to remain available. ;

Re: BGP and Firewalls...

2011-12-07 Thread Dobbins, Roland
On Dec 8, 2011, at 1:36 AM, Leo Bicknell wrote: I don't think you're looking at defense in depth in the right way, Actually, it sometimes seems as if nobody in the industry understands what 'defense in depth' really means, heh. 'Defense in depth' is a military term of art which equates to

Re: Internet Edge and Defense in Depth

2011-12-06 Thread Dobbins, Roland
On Dec 7, 2011, at 6:20 AM, Robert Brockway wrote: This is completely separate to whether servers should even have a firewall or IPS in front of them. That's another (interesting) discussion :) http://www.nanog.org/meetings/nanog48/presentations/Monday/Kaeo_FilterTrend_ISPSec_N48.pdf

Re: Water Utility SCADA 'Attack': The, um, washout

2011-11-28 Thread Dobbins, Roland
On Nov 28, 2011, at 5:31 PM, Owen DeLong wrote: Making it harder to spread misinformation and FUD is good. Making it harder to share information is bad. Unfortunately, it's often quite difficult to distinguish between the two when formulating policies, regulations, legislation, and so forth.

Re: Water Utility SCADA 'Attack': The, um, washout

2011-11-25 Thread Dobbins, Roland
On Nov 26, 2011, at 10:14 AM, Jay Ashworth wrote: traveling in Russia on personal business. I've noticed that in general, when there isn't an actual attack taking place, but rather some kind of misconfiguration or other issue, there's all too often a tendency to run around shouting about the

Re: Network device command line interfaces

2011-11-23 Thread Dobbins, Roland
On Nov 24, 2011, at 11:41 AM, Jonathon Exley wrote: I have a personal hate of text based menus and binary config backup files. So, the obvious solution is to buy the products of vendors whose CLIs one finds least offensive, is it not? ;

Last call for participation in the Arbor 2011 WISR opsec survey.

2011-11-16 Thread Dobbins, Roland
[Apologies if you've already seen this message in other forums.] We'd be grateful if folks who've yet to do so would take a few minutes to participate in the 2011 WISR opsec survey - responses will be tabulated on Sunday, 20Nov11, and input from the operational community is greatly

Re: Arguing against using public IP space

2011-11-13 Thread Dobbins, Roland
On Nov 13, 2011, at 10:36 PM, Jason Lewis wrote: I don't want to start a flame war, but this article seems flawed to me. The real issue is interconnecting SCADA systems to publicly-routed networks, not the choice of potentially routable space vs. RFC1918 space for SCADA networks, per se.

Re: Arguing against using public IP space

2011-11-13 Thread Dobbins, Roland
On Nov 14, 2011, at 6:29 AM, Jay Ashworth wrote: SCADA networks should be hard air-gapped from any other network. Concur, GMTA. My point is that without an airgap, the attacker can jump from a production network to the SCADA network, so we're in violent agreement. ;

Re: Arguing against using public IP space

2011-11-13 Thread Dobbins, Roland
On Nov 14, 2011, at 9:24 AM, Joe Greco wrote: Getting fixated on air-gapping is unrealistically ignoring the other threats out there. I don't think anyone in this thread is 'fixated' on the idea of airgapping; but it's generally a good idea whenever possible, and as restrictive a

Re: where was my white knight....

2011-11-08 Thread Dobbins, Roland
On Nov 8, 2011, at 5:56 PM, bmann...@vacation.karoshi.com wrote: how would a sidr-enabled routing infrastructure have fared in yesterdays routing circus? The effects of large amounts of route-churn on the auth chain - perhaps DANE? - might've been interesting . . .

Re: where was my white knight....

2011-11-08 Thread Dobbins, Roland
On Nov 9, 2011, at 1:14 AM, bmann...@vacation.karoshi.com wrote: that was/is kindof orthoginal to the question... would the sidr plan for routing security have been a help in this event? SIDR is intended to provide route-origination validation - it isn't intended to be nor can it possibly

Re: where was my white knight....

2011-11-08 Thread Dobbins, Roland
On Nov 9, 2011, at 1:22 AM, Dobbins, Roland wrote: Validation storm-control is something which must be accounted for in SIDR/DANE architecture, implementation, and deployment. But at the end of the day, vendors are still responsible for their own code. To be clear, I was alluding to some

Re: where was my white knight....

2011-11-08 Thread Dobbins, Roland
On Nov 9, 2011, at 4:22 AM, Christopher Morrow wrote: the routers have (in some form of the plan) a cache A cache that's persistent across reboots? --- Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com

Re: where was my white knight....

2011-11-08 Thread Dobbins, Roland
On Nov 9, 2011, at 5:19 AM, Nick Hilliard wrote: One solution is to have directly-connected rpki caches available to all your bgp edge routers throughout your entire network. They don't have to be directly-connected - they could be on the DCN, which ought to have at least some static

Re: Cell-based OOB management devices

2011-11-06 Thread Dobbins, Roland
On Nov 7, 2011, at 1:14 PM, David Hubbard wrote: Hi all, I am looking at cellular-based devices as a higher speed alternative to dial-up backup access methods for out of band management during emergencies. Some of the lower-end Cisco routers have '3G' interfaces available as an option, I

Re: Manage an enterprise network? Please fill out my survey - for Science! :-)

2011-11-01 Thread Dobbins, Roland
On Nov 1, 2011, at 1:28 PM, Jack Bates wrote: I'm confused as to the 6to4 gateway state. Last I checked, all my 6to4 is stateless. Depends upon the technology being used. I probably should've used a different term. My load balancers are also stateless. Most are not, or aren't configured

Re: Manage an enterprise network? Please fill out my survey - for Science! :-)

2011-10-31 Thread Dobbins, Roland
On Nov 1, 2011, at 11:44 AM, Cameron Byrne wrote: Unfotunately ISPs are deploying many middle boxen, frequently in series, for various reasons...cough cough cgn. This AusNOG presentation touches upon the topic: http://www.ausnog.net/images/ausnog-05/presentations/7-2-stateofdanger.pdf

Request for participation - Arbor 2011 Worldwide Infrastructure Security Report.

2011-10-14 Thread Dobbins, Roland
[Apologies if you've already seen this announcement in other forums.] Request for participation - Arbor 2011 Worldwide Infrastructure Security Report. - Folks, We're in the process of collecting survey responses for the 2011 Worldwide Infrastructure Security Report (WWISR); this is the

Re: Request for participation - Arbor 2011 Worldwide Infrastructure Security Report.

2011-10-14 Thread Dobbins, Roland
On Oct 14, 2011, at 10:43 PM, Bill Woodcock wrote: 404 I just saw that, thanks - it seems that DDoS attacks are comparatively easy to handle, compared to niggling little details such as URL redirects. ; Apologies for the inconvenience, the link will be active RSN!

Re: Request for participation - Arbor 2011 Worldwide Infrastructure Security Report.

2011-10-14 Thread Dobbins, Roland
On Oct 14, 2011, at 10:43 PM, Bill Woodcock wrote: The page you requested cannot be found. Fixed, thanks! --- Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com The basis of optimism is sheer

Re: meeting network

2011-10-10 Thread Dobbins, Roland
On Oct 10, 2011, at 7:46 PM, Nick Hilliard wrote: if it's wifi that's causing the trouble, the usual causes are: Don't forget RFI and various forms of spoofing used for MITM. ; --- Roland Dobbins rdobb...@arbor.net //

Re: Cisco 7600 PFC3B(XL) and IPv6 packets with fragmentation header

2011-09-30 Thread Dobbins, Roland
On Sep 30, 2011, at 9:45 PM, Christopher Morrow wrote: enough is enough please stop doing this. Yes, but keep in mind that this particular issue has to do with an ASIC which is several years old and which contains other significant handicaps as well (viz. NetFlow caveats, no per-interface

Re: Cisco 7600 PFC3B(XL) and IPv6 packets with fragmentation header

2011-09-30 Thread Dobbins, Roland
On Sep 30, 2011, at 11:44 PM, Christopher Morrow wrote: this is exactly why punting anything NOT management and/or routing-protocols should be banned. Thanks for making that point explicitly. And this is the requirement which should be placed in RFPs, along with other specific requirements

Re: wet-behind-the-ears whippersnapper seeking advice on building a nationwide network

2011-09-17 Thread Dobbins, Roland
On Sep 17, 2011, at 3:01 AM, Charles N Wyble wrote: One aspect of my network, will be operational transparency. So as much as possible will be viewable in real time. This includes v4/v6 traffic statistics. These books are required reading, IMHO:

Re: vyatta for bgp

2011-09-12 Thread Dobbins, Roland
On Sep 13, 2011, at 1:42 AM, Ben Albee wrote: Does anybody currently use vyatta as a bgp router for their company? The days of public-facing software-based routers were over years ago - you need an ASIC-based edge router, else you'll end up getting zorched.

<    1   2   3   4   5   6   >